◆ SpookStack

Declassified Document Archive & Reader
Log In Register
Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.

Adrian Lamo — Part 3

501 pages · May 15, 2026 · Broad topic: General · Topic: Adrian Lamo · 501 pages OCR'd
← Back to feed
Rootsecure.net | Reports | In Depth: a) Lamo, the charges ER3\R\0 Page 1 of 2 o|T C|U|R|E S|E -|N[E|T| THE SECURITY NEWS SITE FOR SYSTEMS ADMINISTRATORS & HACKERS Random Quote: ‘Rootsecure Homepage About RootSecure Daily Newsletter News Archives SecNews XML Feeds SecNews Console inks: ---News Stories ---Videos ---Security ---Hacking ---Wireless ---Misq’ Downloads : ---PDF Documents ---Perl Scripts ~--Win32 Tools ---Other Reports Hacker Gear Win' Error Pic's ASCII Generator DDP Forum Your IP Address Comments Chat Room Live Chat ping Webmaster RootSecure: ~--Contact ---Search --~Publicity ---Affiliates ---Submit News ---Referer Logs ---Syndication (RSS/XML Feed) ---Privacy Policy Hits: 168,974 (Since 06/09/02) http:/Avww rootsecure.net/?p=reports/adrian_lamo_the_charges I do not fear computers I fear the lack of them - Isaac Asimov 17:07:07 GMT 11/09/2003 11/09/03 - In Depth: Adrian Lamo, the charges Accused New York Times hacker Adrian Lamo is charged with two title 18 violations of U.S.C (United States Code}. Specifically section 1030 (a) (5) (A) (ii) “intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage” and section 1029 (a) (2) “knowingly and with intent to defraud traffics in or uses one or more unauthorized access devices during any one-year period, and by such conduct obtains anything of value aggregating $1,000 or more during that period”. Count one alleges Adrian Lamo used the New York Times private Intranet without authorization causing damage in excess of $25,000 (the cost of “confirming, addressing, and repairing” the vulnerabilities) and altering contributors information. Count two alleges Lamo created, then used five usernames / passwor to obtain search services from “LexisNexis” valued at over $300,000. Bringing the charges is Special Agent Christina A. Howard of FBI Cybercrime Task Force who states: In or about late February 2002, I read an article on website SecurityFocus.com dated February 26, 2002 and entitled “New York Times Internal Network Hacked”. Article reported that ADRIAN LAMO, the defendant, had hacked into the New York Times’ private intranet. The Likely based on reading that article, Special agent Christina contacted the New York Times who then initiated an internal investigation. The investigation revealed Lamo had accessed various information ranging from staff lists to social security numbers and created a new “super user” account. Next after a two-three month wait another New York Times representative contacted Agent Howard informing her about compromised usernames / passwords which had been used to access LexisNexis search facilities. LexisNexis then provided further details including the IP addresses used to access the service that were found to belong to various Kinko’s locations (which it has been reported Lamo used to carry out computer intrusions before) in California and search queries including among others “Adrian . Lamo” . Background: In relation to the case New York Times supplied copies of: 1. Their administrative database (admin_db) / Op-Ed database (Oped_db) both before and after the alleged intrusion. 2. Various log files from a proxy server, and the NYT Intranet. 3. An email automatically generated by the creation of a new “super user” account . 4. Usernames / passwords created by the new “super user” account relating to “LexisNexis” . Special Agent Christina A. Howard has been with the FBI for six and a half years, and has an undergraduate degree in computer science. She views hackers in general as those who “discover and explorer vulnerabilities and computer weaknesses in computer networks and software” and that carry out their activities using “hacker tools that can be either custom written software code or, as is more common, software readily available for download on the internet or for purchase”. Related Links: FBI(19-cv-1495)-2010 9/1/2003
OCR quality for this page
Community corrections
First editor: none yet Last editor: none yet
No user corrections yet.
Comments
Document-wide discussion. Follow the Community Standards.
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.

Continue Exploring

Use the strongest next step for this document: continue reading, jump to the topic hub, or move into the matching agency collection.
Continue Reading at Page 261
Jump straight to page 261 of 501.
Reader
Adrian Lamo — Part 2
Stay inside Adrian Lamo with another closely related document.
Topic
FBI Documents & FOIA Archive
Open the FBI agency landing page for stronger archive context.
FBI
Adrian Lamo Topic Hub
See the topic overview, related documents, and linked subtopics.
Hub

Agency Collection

This document also belongs in the FBI Documents & FOIA Archive landing page, which is the stronger starting point for agency-level browsing and for searches focused on FBI records.
FBI Documents & FOIA Archive
Open the agency landing page for introduction text, topic links, and more FBI documents.
FBI

Explore This Archive Cluster

This document belongs to the General archive hub and the more specific Adrian Lamo topic page. Use these hub pages when you want the broader collection context, linked subtopics, and more documents around the same archive thread.
letter bureau
Related subtopics
John Murtha
57 documents · 1471 known pages
Subtopic
Sen Joseph Joe Mccarthy
42 documents · 2653 known pages
Subtopic
D B Cooper
41 documents · 13789 known pages
Subtopic
Kansas City Massacre
38 documents · 5300 known pages
Subtopic
Black Panther Party
36 documents · 3066 known pages
Subtopic
Malcolm X
36 documents · 3932 known pages
Subtopic