Adrian Lamo faces two federal charges stemming from his alleged hack into The New York Times' network in February 2002.
Accused serial hacker Adrian Lamo is expected to formally face two federal charges Thursday stemming from his alleged hack into The New York Times' private network in February 2002. The first charge, according to a federal criminal complaint filed in the Southern District of New York, charges Lamo illegally accessed the internal network of the New York Times from February through April of 2002 and also altered the paper's Op-Ed database, resulting in more than $25,000 in damage.
The complaint also alleges Lamo illegally created five user names and passwords under the Times' LexusNexus account and totaled more than $300,000 in fees stemming from his news searches of the paper's electronic-information services.
If convicted, Lamo faces prison and fines under the Computer Fraud and Abuse Act.
The federal complaint states that Lamo's use of the LexusNexus database included searches for news stories containing his name, information regarding his parents' and neighbors' street addresses, other hackers, as well as various America Online executives.
The complaint also lists the string of intrusions Lamo had publicly admitted to committing during the past couple of years including Excite@Home (May 2001), Yahoo (September 2001), Microsoft (October 2001), MCI/WorldCom (November 2001), SBC Ameritech (December 2001), and Cingular (May 2003).
Earlier this week, Lamo was released into the custody of his parents after they secured a $250,000 bond. According to Patty Pontello, a spokeswoman for the U.S. Attorney's office in Sacramento, Lamo was ordered by U.S. Magistrate Judge Gregory Hollows not to use a computer and told that he must find employment.
Lamo has garnered a following in hacking circles for his one-of-a-kind-hacking style of breaking into corporate systems, then notifying the companies about their security holes and offering to help remediate their systems for free. Some of the companies he's intruded upon, including WorldCom, publicly thanked Lamo for helping them fix their security holes.
A Web site aimed at supporting Lamo, Freelamo.com, surfaced earlier this week.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.