Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Adrian Lamo — Part 2
Page 68
68 / 363
wt e
To: Detroit From: New Yo .
Computer Intrusion; b3 -2
0O:NY ; ; b7E -2,3
Synopsis: Conduct logical interviews
Enclosure(s): Packet containing, —~—~—SCSd ACS checks,
criminal history, DMV history and Internet checks
on each interviewee
Copy of article from sfweekly.com of recent
interview of the subject, ADRIAN LAMO
List of suggested interview questions for each
interviewee (Suggested questions worksheet)
Photograph of ADRIAN LAMO
Details: ADRIAN LAMO is a twenty two (22) year old male who commits
unauthorized computer intrusions into major corporations. LAMO is
labeled in the media as the “homeless hacker". He considers himself a
"white hat hacker", Investigation by the New York Office has revealed
that LAMO is a "black hat hacker", an individual who breaks into a
computer system with the purpose of inflicting damage or stealing
data. Each time LAMO hacks a major corporation he alerts friends in
the media first and has them contact the victim for comment.
In September 2001, LAMO hacked YAHOO! and rewrote the text
of a YAHOO! News article. LAMO gained access through the portal's b6 -5
web-based production tools and modified a news story about DMITRY p7c -5
SKLYAROV, a Russian computer programmer facing federal criminal
charges. LAMO used a free internet connection at KINKOS to commit the
hack. YAHOO! was informed of the breach after being contacted by
lof securityfocus.com, who was contacted by LAMO.
as convicted in 1990's by the FBI for committing unauthorized
computer intrusions.
In October 2001, LAMO contacted the
newsbytes.com to inform him that he had gained unauthorized access
into a MICROSOFT customer service database. LAMO had gained access to
MICROSOFT's database is September 2001 but choose not to disclose his
access until October 2001. LAMO utilized a vulnerability in
MICROSOFT's network that allowed an unpublished Internet Protocol (IP)
address to be entered into a web browser. The IP address provided
access to records of people who had bought products and services from
MICROSOFT. [___] contacted MICROSOFT to ask them for a comment for
the story he was writing about the hack. This was the first instance,
MICROSOFT learne@ of the intrusion. MICROSOFT confirmed the hack and
described the incident as
be -2,5
bic -2,5
FBI(19-cv-1495)-712
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Reader
Topic
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic