◆ SpookStack

Declassified Document Archive & Reader
Log In Register
Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.

Adrian Lamo — Part 3

501 pages · May 15, 2026 · Broad topic: General · Topic: Adrian Lamo · 501 pages OCR'd
← Back to feed
[ fexo PM 4/28/2003, Internet Policy News Page 2 of 8 would send out an alarm if anyone touched that particular number. The term “honeytokens" was coined on Feb. 21 by a programmer named Augusto Paes de Barros who used it in an e-mail message to a list of security professionals. Bui the idea is not new. It dates back in computing at least to 1986, when Clifford Stoll, a programmer at Lawrence Berkeley National Laboratory in California, buried fake records for an organization called the Strategic Defense Initiative Network deep in his server. When intruders started downloading the records, and then someone seni a letter to Mr. Stoll about the phony organization, he and federal investigators traced the intruders to East German and Soviet intelligence agencies. Today, the use of honeytokens is not uncommon. For example, ForeScout Technologies, based in San Mateo, Calif., has built a commercial software program that tracks incidents of surreptitious reconnaissance, like port scans — the computer equivalent of someone turning your doorknob to see if it is unlocked. The program will announce a false message of vulnerability to the scanner in the form of a honeytoken, It then breaks the connection if the hacker follows up with an attack. Honeytokens, like their cousins the honeypots, are based on the notion that if you build it, they will come. Mr. Spitzner became intrigued by the idea of honeypots after putting a new computer online at home and watching it get attacked within 15 minutes by an automatic program scanning the Internet for vulnerable prey. Many computer criminals break into systems simply for the fun and challenge. Others are looking to take over vulnerable systems in order to use them as safe houses for setting off further, more serious, attacks. Others want to mine credit card addresses or steal corporate secrets. According to a 2002 report by the Computer Security Institute, 90 percent of the 500 corporations, government agencies, financial institutions, medical institutions and universities surveyed detected security breaches during the previous year. Honeytokens could also be useful for national security purposes, Michael Vatis, director of the Institute for Security Technology Studies at Dartmouth University, said that the Defense Department could use them to b6é -5 bic -5 FBI(19-cv-1495)-2162 be -5 b7c -5
OCR quality for this page
Community corrections
First editor: none yet Last editor: none yet
No user corrections yet.
Comments
Document-wide discussion. Follow the Community Standards.
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.

Continue Exploring

Use the strongest next step for this document: continue reading, jump to the topic hub, or move into the matching agency collection.
Continue Reading at Page 401
Jump straight to page 401 of 501.
Reader
Adrian Lamo — Part 2
Stay inside Adrian Lamo with another closely related document.
Topic
FBI Documents & FOIA Archive
Open the FBI agency landing page for stronger archive context.
FBI
Adrian Lamo Topic Hub
See the topic overview, related documents, and linked subtopics.
Hub

Agency Collection

This document also belongs in the FBI Documents & FOIA Archive landing page, which is the stronger starting point for agency-level browsing and for searches focused on FBI records.
FBI Documents & FOIA Archive
Open the agency landing page for introduction text, topic links, and more FBI documents.
FBI

Explore This Archive Cluster

This document belongs to the General archive hub and the more specific Adrian Lamo topic page. Use these hub pages when you want the broader collection context, linked subtopics, and more documents around the same archive thread.
letter bureau
Related subtopics
John Murtha
57 documents · 1471 known pages
Subtopic
Sen Joseph Joe Mccarthy
42 documents · 2653 known pages
Subtopic
D B Cooper
41 documents · 13789 known pages
Subtopic
Kansas City Massacre
38 documents · 5300 known pages
Subtopic
Black Panther Party
36 documents · 3066 known pages
Subtopic
Malcolm X
36 documents · 3932 known pages
Subtopic