Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Adrian Lamo — Part 3
Page 180
180 / 501
U.S. Department of Justice
Federal Bureau of Investigation
In Reply, Please Refer to
File No. 26 Federal Plaza
New York, NY 10278
May 13, 2003
Senate —_ couse! b6 -6
642 Senate Hart Building bIC -6
Washington, DC 20510
RE: ADRIAN LAMO, Hack of website www.senate.gov
Dear[___
As per ofr conversation on 12/28/2003, I am writing to
request informatigén pertaining the unauthorized intrusion of the’
website www.s: in December 2003. Investigation the
E New York Office has revealed that the inaiviaualcapetnny
(tao) responsible for this unauthorized intrusion.
LAMO is a subject of an ongoing investigation by the
FBI's New York office. LAMO has claimed credit for the
unauthorized intrusions into The New York Times, Worldcom,
Microsoft, Yahoo, AOL, SBC Communications and excite@home.com
through open proxy servers. LAMO uses a "Proxy Hunter" to search
the Internet for proxy servers that are misconfigured. Once he
obtains this information, he configures his browser to appear and
utilize the proxy server as his own. Once the computer intrusion
occurs, LAMO searches the network to determine if there are any
other vulnerabilities. LAMO has left backdoors in the networks
providing him with the ability to enter the network at another
time undetected.
The enclosed article dated 12/10/2002 from
Securityfocus.com states that LAMO gained access to
www.senate.gov through an open proxy server. TRACY WILLIAMS,
Director of technology development for the Sergeant-at-Arms,
blamed the incident on misconfigured devices associated with the
Web site and that the devices were taken off line until they
could be configured correctly.
The FBI's New York Office is requesting all records and
other evidence~imn—the,.possession of www.senate.gov. Such records
and evidence, include, ibutitaré Hot limited to, all accounts,
computer logs, files, communications, E-mail messages, programs,
client accolht’ records and files, and any other documents: worked
on, reviewed‘by, drafted by, edited by, examined by, received by,
Brags s
FBI(19-cv-1495)-1794
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic