◆ SpookStack

Declassified Document Archive & Reader
Log In Register
Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.

Adrian Lamo — Part 3

501 pages · May 15, 2026 · Broad topic: General · Topic: Adrian Lamo · 501 pages OCR'd
← Back to feed
mm has used honeytokens to detect when employees ‘ilicitly download forbidden material. For example, he has entered corporate memos with particular typos into private databases and then monitored company networks to see where those typos show up. Tracing these honeytokens, he says, often leads to caches of illegal materials stored on the network. No one believes that honeytokens can stop all cybercrime. But they could offer an upgrade in protection. Honeytokens offer another advantage: They help reduce the number of false positives in other cyberdefense systems. Like car alarms, intrusion detection systems can go off so frequently because of accidental trespassing that many security administrators ignore the warnings. Honeytokens, if designed correctly, should trigger alarms only if there is a malicious attack. Hackers, however, are not impressed. Adrian Lamo, who gained notoriety last year when he claimed to have broken into the systems of a number of companies, including Yahoo, says he is not worried. "It's a form of old-school security," he says. "It will work on the people who have been to the old schools." Mr. Lamo says that he only goes after information that he knows other people frequently seek access to and that he runs credit checks fo ensure that information he uncovers, like Social Security numbers, are real. Mr. Spitzner contends that it should not matter whether a hacker bothers to run a credit check because the alarm should ring any time the decoy record is accessed. Hackers can also evade honeytokens by compressing and password-protecting the information they steal, thereby changing or hiding the data, like fake Social Security numbers or typos, in memos that the sniffers are searching for. And "phone home" honeytokens designed to trace users could be thwarted if opened only on computers disconnected from the Internet. Some experts are also worried about the possibility that using honeytokens could violate the federal Wiretap Act, which places limits on intercepting and monitoring electronic communications. Richard Salgado, senior counsel for the Justice Department's computer crime and intellectual property unit, has said that very little law governs this new area and that security technicians should consult first their lawyers. Vage 5 014 bé -1 b7c -1 5/7/2003 FBI(19-cv-1495)-1781
OCR quality for this page
Community corrections
First editor: none yet Last editor: none yet
No user corrections yet.
Comments
Document-wide discussion. Follow the Community Standards.
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.

Continue Exploring

Use the strongest next step for this document: continue reading, jump to the topic hub, or move into the matching agency collection.
Continue Reading at Page 171
Jump straight to page 171 of 501.
Reader
Adrian Lamo — Part 2
Stay inside Adrian Lamo with another closely related document.
Topic
FBI Documents & FOIA Archive
Open the FBI agency landing page for stronger archive context.
FBI
Adrian Lamo Topic Hub
See the topic overview, related documents, and linked subtopics.
Hub

Agency Collection

This document also belongs in the FBI Documents & FOIA Archive landing page, which is the stronger starting point for agency-level browsing and for searches focused on FBI records.
FBI Documents & FOIA Archive
Open the agency landing page for introduction text, topic links, and more FBI documents.
FBI

Explore This Archive Cluster

This document belongs to the General archive hub and the more specific Adrian Lamo topic page. Use these hub pages when you want the broader collection context, linked subtopics, and more documents around the same archive thread.
letter bureau
Related subtopics
John Murtha
57 documents · 1471 known pages
Subtopic
Sen Joseph Joe Mccarthy
42 documents · 2653 known pages
Subtopic
D B Cooper
41 documents · 13789 known pages
Subtopic
Kansas City Massacre
38 documents · 5300 known pages
Subtopic
Black Panther Party
36 documents · 3066 known pages
Subtopic
Malcolm X
36 documents · 3932 known pages
Subtopic