Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Adrian Lamo — Part 3
Page 128
128 / 501
+--- Working Copy ---- Page 1
Precedence: ROUTINE Date: 03/14/2002
To: All Field Offices
From: New York
Squad C-37
b3 -2
ase # b6 -1 a wep
Title: ADRIAN LAMO; b7c -1
New York Times~-Victim; bITE -3 ok
Computer Intrusion; v
00: NY
Synopsis: Canvass all FBI Offices for positive information -k
regarding ADRIAN LAMO. c
Details: In February 2002, LAMO discovered several misconfigured
Approved By: Ld] ros
proxy servers acting as doorways between the public Internet and
the New York Times’ private intranet. LAMO utilized the proxy
servers to gain access to the New York Times network. Once on
the network, LAMO cracked a password for a userid with supervisor
vights. Utilizing this userid he was able to broaden his access
as well as perform certain functions within the network. LAMO
had access to individuals names and Social Security Numbers.
LAMO informed The New York Times of the security vulnerability
through SECURITYFOCUS.COM.
LAMO has committed computer intrusions into several
other corporations such as WORLDCOM, MICROSOFT, AOL, EXCITE@HOME
and YAHOO. LAMO uses a "Proxy Hunter" to search the Internet for
proxy servers that are misconfigured. Once he obtains this
information, he configures his browser to appear and utilize the
proxy server as his own. Once the computer intrusion occurs,
LAMO searches the network to determine if there are any other
vulnerabilities and in the case of The New York Times, left a
backdoor so that he could enter at another time undetected.
Each time LAMO commits a computer intrusion on a high
profile organization he reports the vunerability and intrusion to
the media causing a distrust of the company’s clients. The above
mentioned corporations have lost significant money and trust of
their clients.
LAMO has ties to former hacker who was b6 —-5
arrested by the FBI for pyc —5
LC) >
FBI(19-cv-1495)-173
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic