◆ SpookStack

Declassified Document Archive & Reader
Log In Register
Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.

Adrian Lamo — Part 3

501 pages · May 15, 2026 · Broad topic: General · Topic: Adrian Lamo · 501 pages OCR'd
← Back to feed
[__Josios PM 12/5/2001, Fwd: Hacker Story Peto Such information could allow an intruder to divert network traffic for any of the affected companies, or disable their networks altogether. In contrast to most networks, which are routed publicly over the Intemet, these customer networks were fully internal, running over private lines and address space, sometimes connecting corporate offices across coasts or continents. "It would have been pretty trivial to reset the password on any of these routers, which would have made it impossible for companies to perform remote maintenance on them," Lamo. said in an interview with Newsbytes. "That would effectively paralyze many of the companies dependent on their network infrastructure, because support staff would have to be dispatched to reset each router's information via a live hardware procedure. It could have been a real nightmare for some of the biggest players in the U.S. economy." The Web tool also included dial-up numbers and user/password information for routers serving dozens of other major companies - both domestically and abroad - including British Airways, Clorox, Daimler Chrysler, Dow Jones, the U.S, Department of Interior, the U.S. National Park Service, Ford Motor Co., Frito Lay, the Home Shopping Network, Nintendo and Pfizer, MCI Spokeswoman Jennifer Baker said the company Is grateful that Lamo opted to work with them over the weekend to correct the problem. "We learned on Friday that unauthorized access could be made to our adrrinistrative internal data network, a network that employees use to access MCI intranet sites," Baker said. "We immediately investigated the issue and corrected it and made sure no Worldcom customers were affected, and we certainly appreciated Adrian working with us so cooperatively over the weekend." Once on MCI's corporate intranet, the 20-year-old hacker was able to deconstruct most of the checks and balances that prevent the average employee from manipulating accounts and procedures on the network. Over time, he was able to make management-level decisions in various automated processes, such as creating, viewing and deleting employee records. ‘ "Using that information, an intruder could have intercepted and redirected e-mail for almost all employees, right up to the CEO, and with a bit of forethought changed the direct- deposit settings for any number of employees so that their paycheck ends up in an account in the Ukraine," said Larto, who provided Newsbytes with a set of partially redacted screenshots to document his tracks. "They had some very good precautions and fail-safes in place, but ultimately they were faced with an extraordinary situation that was never designed for someone sitting at Kinko's for a solid day looking at every angle he could think of," he said. Also buried within MCt's intranet was basic account information for other entities, including data and dial-up service accounts for the intelligence agencies, the MPAA, the Church of Scientology, and similarly diverse customers. The availability of such data raises chilling possibilities at a time when U.S. federal law be -5 bic -5 Printed fol 2 FBI(19-cv- 1495)-2166
OCR quality for this page
Community corrections
First editor: none yet Last editor: none yet
No user corrections yet.
Comments
Document-wide discussion. Follow the Community Standards.
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.

Continue Exploring

Use the strongest next step for this document: continue reading, jump to the topic hub, or move into the matching agency collection.
Continue Reading at Page 405
Jump straight to page 405 of 501.
Reader
Adrian Lamo — Part 2
Stay inside Adrian Lamo with another closely related document.
Topic
FBI Documents & FOIA Archive
Open the FBI agency landing page for stronger archive context.
FBI
Adrian Lamo Topic Hub
See the topic overview, related documents, and linked subtopics.
Hub

Agency Collection

This document also belongs in the FBI Documents & FOIA Archive landing page, which is the stronger starting point for agency-level browsing and for searches focused on FBI records.
FBI Documents & FOIA Archive
Open the agency landing page for introduction text, topic links, and more FBI documents.
FBI

Explore This Archive Cluster

This document belongs to the General archive hub and the more specific Adrian Lamo topic page. Use these hub pages when you want the broader collection context, linked subtopics, and more documents around the same archive thread.
letter bureau
Related subtopics
John Murtha
57 documents · 1471 known pages
Subtopic
Sen Joseph Joe Mccarthy
42 documents · 2653 known pages
Subtopic
D B Cooper
41 documents · 13789 known pages
Subtopic
Kansas City Massacre
38 documents · 5300 known pages
Subtopic
Black Panther Party
36 documents · 3066 known pages
Subtopic
Malcolm X
36 documents · 3932 known pages
Subtopic