Hacker
Professional
- Messages
- 1,041
- Reaction score
- 852
- Points
- 113
The man I want to tell you about today is known to many in America: he was chased by federal marshals, the FBI and the police, and at the same time he managed to participate in live broadcasts of NBC, CNN, and, despite his youth (in 2010, he was 27 years old), he managed to hack the networks of such monsters as AOL, Yahoo, Microsoft, Excite@Home, AT&T Telecom, MCI WorldCom, Intel, Bank of America, Citibank, Cisco, Google and many, many other famous companies, it is not possible to list some of the names here.
When asked how he chose his victim for the next hack — he answered simply:"I just went down the Fortune 500 list from top to bottom."
At the age of 23, the documentary Hackers Wanted was already made about him, where Steve Wozniak, co-founder of Apple (whose network he visited in 2001), Leo Laporte, founder of the largest collective blog Digg (on whose servers he was registered in 2000), and other veterans of the IT industry tell about his adventures as eyewitnesses.
Feature #1
But let's talk about everything in order.
The first interesting thing about Adrian Lamo, and that's what our hero's name is, is that he's probably the only homeless hacker in the world. If you're lucky, he spends the night in abandoned buildings, in warm weather — on benches in parks, in cold weather-in youth squats.
They use the Internet only through public hotspots, Internet cafes, bars, and other free wireless Internet places, of which there are plenty in America. "I haven't paid a dollar for the Internet in my life," he jokes. He dropped out of school a long time ago as unnecessary, and since then he has been traveling around America, never staying anywhere for a long time.
At the same time, despite such a slightly frivolous lifestyle, Adrian has successfully penetrated the most secure networks in the world.
Feature #2
The second feature of Lamo is that it does not use anything other than a browser to get into closed Intranet networks of companies. This is its basic principle — no additional or specialized hacking tools: scripts, exploits, Trojans and sniffers, automation tools and automatic analysis-all this, as Adrian himself puts it, is "superfluous for him."
As a rule, Lamo uses incorrect settings of corporate proxy servers to break into the intranet of organizations, and various types of SQL injections are used to break into databases in these closed networks.
NBC Embarrassment
For example, when Adrian Lamo was invited to the NBC Nightly News show in 2002 to comment on someone else's hacking of a major website in prime time, no one expected how it would end. Since Lamo, despite his young age — a recognized security expert — the interviewer did not fail, among other things, to ask him if, for example, he could hack the network of their TV channel — NBC.
Not at all embarrassed by this unexpected turn of events, Lamo replied "just spit" and, opening his laptop, went to the external Internet. Exactly 5 minutes later, and all under the camera lens, he was able to get into the NBC Intranet, successfully bypassing all authorization pages and gaining full access to the channel's database with personal data of all experts, guests and employees, on the main page of which, ironically, it was written in capital letters: "All information contained on this Web site is to be held in the strictest confidence".
This program never aired on time — the channel's legal department categorically banned its release, because in this 15-minute, essentially training video, the hacker, using the example of NBC itself, showed in detail how to look for loopholes, errors in proxy server settings, and how easy it is to get into almost any closed network from the outside, using only a regular browser and very little ingenuity.
The thorny path to fame
The greatest peak of Adrian Lamo's "success" in terms of the number of hacks and the name of hacked companies fell on his 22-year-old age. Usually, Adrian's strategy was as follows: he quietly and anonymously penetrated the Intranet networks of companies, hacked their databases, while not modifying anything and not causing any damage, and then he wrote off their network administrators and described in detail the problems of this particular network, demonstrating and clearly proving its vulnerabilities.
Thus, he tried to remain a "White Hat" (at least in his own eyes), using essentially illegal methods. This usually worked as it should, and companies did not bring legal proceedings against him. Many were even grateful for the free testing and strengthening of their networks, although, of course, most companies treated this with barely contained irritation.
In most cases, the same Citibank and others simply did not want wide publicity of the fact that some homeless youngster who did not even have money for a paid Internet connection, from a regular McDonald's through their free hot spot, with the help of a regular Internet Explorer, penetrated their super-secure network and ran it absolutely with impunity.
Interestingly, among all of them there were such pragmatic companies that even tried to pay a young hacker for testing their network and a detailed report on all the vulnerabilities found — Adrian always refused such offers to earn money. I don't know why this was motivated in this age of money and profit, but Adrian never wanted to take money for hacking, and he didn't make any exceptions to this principle, even for Cisco, which wanted to hire him as a full-time security engineer.
Adrian himself believes that each of his hacking is an art performance, an attempt to bring something into this world that was impossible before him — which he discusses in great detail in an interview with Rolling Stones magazine, where he is introduced to readers as a "network artist".
Peak of hacker career and publicity
No matter how artful this may have seemed to a 23-year-old boy at the time, but now it is clear that such a "game with fire" with very serious companies was very dangerous, and it could not last forever...
And then, in late 2002, there was a fatal, and therefore the most high-profile hack in Adrian's career — as usual, he successfully penetrated the Intranet network of The New York Times newspaper
Using an incorrect corporate proxy server, he entered it in 5 minutes, after which it took him another hour to deal with the newspaper's internal database, which stored a sea of confidential information. When he wrote to the network administrators about the existence of vulnerabilities, they simply did not believe him in this, writing to him in response:
"Who the hell are you, and where did you come from?"
Then he went back and added his personal data to the newspaper's database in the list of top IT security experts that the newspaper consults during its journalistic work.
He re-sent a letter to the administrators, where he already referred to his resume in their own database of global IT authorities, in addition, he gave in the letter the personal mobile phone number of Jimmy Carter, the former US president, taken from the most secure part of the database (containing contacts with American VIPs) to show local administrators what he really achieved.
This time, everyone seemed to believe everything at once, but events took an unfavorable turn for Adrian — the newspaper filed an official request to the FBI on the fact of hacking the database and illegal entry into their corporate network. He was accused of illegally entering, hacking and modifying the database, as well as stealing from the database more than 3,000 mobile phone numbers of Hollywood stars, famous actors and musicians, political leaders, athletes, businessmen, TV presenters, models, as well as famous journalists and writers in America.
The investigation and search for Adrian lasted 15 months, after which, Adrian decided to turn himself in to the US marshals in Sacramento, admitting his guilt and publicly apologizing to all the companies that he unintentionally caused damage to.
The court ordered him to pay a fine of $65,000, 6 months of house arrest in his parents ' home, and another 2 years of probation, during which he was also forbidden to approach computers at a distance closer than 100 meters.
Interestingly, during the trial, Lamo again showed his hacker nature, categorically refusing to provide the FBI with samples of his blood in order to add his DNA to the unified database of US intelligence agencies. A very religious Lamo, right in court quoted Bible verses where the Lord recommends very careful handling of human blood, because of its very specific properties (Genesis 9: 6). The Lord Elohim forbids us to shed not only other people's blood, but also our own blood, no matter what our motivation.
In general, commenting on all these poems, Adrian builds quite complex and very subjective mystical-religious constructions (but we will omit them here, so as not to injure the psyche of our magazine editor, who will have to read and verify all this).
But this unexpected turn in the case of the young hacker again attracted wide public attention, and he again found himself on television, now in a new role - on religious and legal issues. Surprisingly, this long standoff with the special services ended in Adrian's victory:
thanks to this particular incident, the case law of the United States was changed-an amendment was added by law with the possibility of taking a DNA sample with a simple smear from the cheek, without the mandatory blood collection, as it was before
In one of the interviews, Adrian is asked how he generally assesses the security of large modern corporate structures, to which Adrian quite bravely states::
"I can break into any corporate network connected to the Internet in less than 15 minutes. My experience shows that most often, their highly paid network administrators do not know the most banal things, for example, that the Apache web server is also a proxy server, the fact of which in the vast majority of installations that I have seen in real life is simply ignored and not taken into account in any way: In my young life, I have seen a lot of DMZ implementations,..
Most network infrastructure configuration errors are typical. They are repeated from one company to another. For example, some professor once wrote in a smart book of an expensive publishing house that this is exactly what you need to do — since then, more and more generations of lemming administrators have been reproducing this in their online near-religious practice.
I corresponded with the administrators of many of the networks I hacked, explaining to them that this is not necessary — most often they did not believe me, even before the fact that their network was successfully hacked. Fortunately, I didn't read such clever books when I was learning it myself, so I don't have an innate taboo not to see these blunders directly."
It's funny enough that Adrian himself doesn't even have a high school education, let alone a high school one — he didn't pass the final tests of his native college and was expelled, which he doesn't particularly regret to this day. When asked about his education, he jokes, " It's a waste of time."
You have to admit that Adrian is antisocial in everything, and it seems that this really makes him free to choose his life
Feature #3
Interestingly, Lamo has a third feature. His more traditional colleagues, hackers, very often attack him and publicly call him a fraud and a crook. This attitude towards him has even become a kind of cliche in the hacker community.
Many experts, seeing it work in the browser, say :" This is too easy — anyone can do this." One of the editors of the most famous security portal SecurityFocus.com sarcastically remarks:
"Are you very impressed with Lamo's incredible abilities? But I'm telling you, it doesn't do anything out of the ordinary. He did not find or invent any new concepts or techniques in the field of computer security. It simply exploits super-banal and simple vulnerabilities, as well as elementary errors in proxy server settings. His secret is only one thing — this young guy glows too much on television. He didn't hack the networks, he hacked the media."
All the attacks against Lamo, who I repeat is not very popular with his colleagues, are successfully answered in absentia by his good friend-Oxblood Ruffian, the leader of the famous hacker group "Cult of the Dead Cow":
"It's like a dance. Almost everyone can dance. Moreover, everyone knows how to do it. But only a few people can dance the way Michael Jackson does."
Another friend of Lamo's, Kevin Mitnick, was once asked where to start learning hacking, and his answer was short:
"Check out the MCI WorldCom hacking report by Adrian Lamo. The entire range of techniques is perfectly used here: technical, social, and creative."
And if we are talking about MCI WorldCom, then by the way, hacking America's backbone providers is one of Adrian's favorite specializations:
"When I see a network or organization with the prefix Provider or ISP in its name — I immediately know for sure that I can feel at home here. Usually there are too many administrators, too many servers, and too much of the most diverse traffic — that is, I want to say that no one can keep up with the providers ' networks in terms of the degree of mess. Take my word for it, people like me can sit in such networks for years at the control panels of their servers, and none of the local admins will even scratch."
At the finish line
No matter what ratings are given to the genius of Adrian, he is certainly one of the brightest, most famous and youngest hackers in America, with his own style, and even a philosophy of life. After rewinding his deadline, Adrian calls on all of his followers:
there is no need to break the law, there are many other ways to create, he says, where you can put all your skills and creativity, achieving even more than is possible in the field of criminal craft. Now Adrian is done with his past.
Now he is a well-known journalist who receives prestigious awards in the field of network journalism, a lecturer who travels around computer conferences in America, and a consultant to one of the world's most famous security companies — @Stake. Adrian has settled down, and even married a girlfriend, Laura (given that Adrian is everywhere claiming to be a committed bisexual and a proponent of free relationships, one can only wonder at his unpredictability and penchant for incredible experiments with his life, which I think he will surprise us all more than once).
But, despite all that he has experienced, in one thing he still remains true to himself:
"There are things that you can only force me to do by putting the muzzle of a gun to my temple. I will never work full-time and spend my entire life chained up like a loyal dog in an office, even if Microsoft or Cisco cover the floor of my office with hundred-dollar bills. At the age of 28, I definitely realized that this is not for me."
And finally, it's better to see it once than hear it a hundred times: the whole life is in photos.
Endrian behind his famous laptop, which served him faithfully for 7 years, for which so much was done... which he bought with his hands for 150 bucks in 2002, and it still does not have keys with the letters P and Z.
Three of America's most famous hackers, left to right: Endrian Lamo, Kevin Mitnick, and Kevin Paulsen. All three were once arrested by the FBI under the same article-the total term of this trio: 9 years.
Lamo is showing the FBI WANTED poster live on CBS when he was hunted down by three US intelligence agencies at once. Think about it: this risky guy managed to participate in live broadcasts even when he was on the federal wanted list!
In fact, American television simply adores Lamo, he is a frequent guest of live hi-tech news broadcasts on such federal TV channels as CNN, CBS, NBC, Fox News, and many others.
A lot has changed since then…
Lamo is now a freelance consultant for one of the most prestigious and expensive network security companies in the world — @Stake, which is based in Cambridge, and which was founded by people from the super-famous hacker group L0pht. The expression "at stake" has not only the dictionary meaning "at risk", but it is also a slang expression used in casinos, the meaning of which is "to put everything on the line".
However, this company is now completely different from what it was in those golden years — @Stake was aggressively absorbed by Symantec in 2004, after which its most famous and biased hackers left this outstanding office. By the way, this is how Symantec got the famous audit package L0phtCrack.
Tech geniuses were completely defenseless in the world of big business, however, how it all happened (and this is quite a story!) — this is a completely different story, which we will definitely return to on the pages of our blog.
Oh, it's hard for Adrian to go to work in the office every day. That's why he doesn't go there!
Adrian is always on the edge — sharp criticism at the security conference of the infamous WikiLeaks project. ZDNet even called Endrian a national hero, for his principled civic position, for the fact that now... he himself knocks to the American authorities on dissidents.
Amazing life, amazing biography, amazing events… what is not a fact - all the link in Wikipedia. Adrian himself is sure that talents are not born, but become them. Life is like a supermarket: the main thing is that if you choose something-then to the end and forever!
When asked how he chose his victim for the next hack — he answered simply:"I just went down the Fortune 500 list from top to bottom."
At the age of 23, the documentary Hackers Wanted was already made about him, where Steve Wozniak, co-founder of Apple (whose network he visited in 2001), Leo Laporte, founder of the largest collective blog Digg (on whose servers he was registered in 2000), and other veterans of the IT industry tell about his adventures as eyewitnesses.
Feature #1
But let's talk about everything in order.
The first interesting thing about Adrian Lamo, and that's what our hero's name is, is that he's probably the only homeless hacker in the world. If you're lucky, he spends the night in abandoned buildings, in warm weather — on benches in parks, in cold weather-in youth squats.
They use the Internet only through public hotspots, Internet cafes, bars, and other free wireless Internet places, of which there are plenty in America. "I haven't paid a dollar for the Internet in my life," he jokes. He dropped out of school a long time ago as unnecessary, and since then he has been traveling around America, never staying anywhere for a long time.
At the same time, despite such a slightly frivolous lifestyle, Adrian has successfully penetrated the most secure networks in the world.
Feature #2
The second feature of Lamo is that it does not use anything other than a browser to get into closed Intranet networks of companies. This is its basic principle — no additional or specialized hacking tools: scripts, exploits, Trojans and sniffers, automation tools and automatic analysis-all this, as Adrian himself puts it, is "superfluous for him."
As a rule, Lamo uses incorrect settings of corporate proxy servers to break into the intranet of organizations, and various types of SQL injections are used to break into databases in these closed networks.
NBC Embarrassment
For example, when Adrian Lamo was invited to the NBC Nightly News show in 2002 to comment on someone else's hacking of a major website in prime time, no one expected how it would end. Since Lamo, despite his young age — a recognized security expert — the interviewer did not fail, among other things, to ask him if, for example, he could hack the network of their TV channel — NBC.
Not at all embarrassed by this unexpected turn of events, Lamo replied "just spit" and, opening his laptop, went to the external Internet. Exactly 5 minutes later, and all under the camera lens, he was able to get into the NBC Intranet, successfully bypassing all authorization pages and gaining full access to the channel's database with personal data of all experts, guests and employees, on the main page of which, ironically, it was written in capital letters: "All information contained on this Web site is to be held in the strictest confidence".
This program never aired on time — the channel's legal department categorically banned its release, because in this 15-minute, essentially training video, the hacker, using the example of NBC itself, showed in detail how to look for loopholes, errors in proxy server settings, and how easy it is to get into almost any closed network from the outside, using only a regular browser and very little ingenuity.
The thorny path to fame
The greatest peak of Adrian Lamo's "success" in terms of the number of hacks and the name of hacked companies fell on his 22-year-old age. Usually, Adrian's strategy was as follows: he quietly and anonymously penetrated the Intranet networks of companies, hacked their databases, while not modifying anything and not causing any damage, and then he wrote off their network administrators and described in detail the problems of this particular network, demonstrating and clearly proving its vulnerabilities.
Thus, he tried to remain a "White Hat" (at least in his own eyes), using essentially illegal methods. This usually worked as it should, and companies did not bring legal proceedings against him. Many were even grateful for the free testing and strengthening of their networks, although, of course, most companies treated this with barely contained irritation.
In most cases, the same Citibank and others simply did not want wide publicity of the fact that some homeless youngster who did not even have money for a paid Internet connection, from a regular McDonald's through their free hot spot, with the help of a regular Internet Explorer, penetrated their super-secure network and ran it absolutely with impunity.
Interestingly, among all of them there were such pragmatic companies that even tried to pay a young hacker for testing their network and a detailed report on all the vulnerabilities found — Adrian always refused such offers to earn money. I don't know why this was motivated in this age of money and profit, but Adrian never wanted to take money for hacking, and he didn't make any exceptions to this principle, even for Cisco, which wanted to hire him as a full-time security engineer.
Adrian himself believes that each of his hacking is an art performance, an attempt to bring something into this world that was impossible before him — which he discusses in great detail in an interview with Rolling Stones magazine, where he is introduced to readers as a "network artist".
Peak of hacker career and publicity
No matter how artful this may have seemed to a 23-year-old boy at the time, but now it is clear that such a "game with fire" with very serious companies was very dangerous, and it could not last forever...
And then, in late 2002, there was a fatal, and therefore the most high-profile hack in Adrian's career — as usual, he successfully penetrated the Intranet network of The New York Times newspaper
Using an incorrect corporate proxy server, he entered it in 5 minutes, after which it took him another hour to deal with the newspaper's internal database, which stored a sea of confidential information. When he wrote to the network administrators about the existence of vulnerabilities, they simply did not believe him in this, writing to him in response:
"Who the hell are you, and where did you come from?"
Then he went back and added his personal data to the newspaper's database in the list of top IT security experts that the newspaper consults during its journalistic work.
He re-sent a letter to the administrators, where he already referred to his resume in their own database of global IT authorities, in addition, he gave in the letter the personal mobile phone number of Jimmy Carter, the former US president, taken from the most secure part of the database (containing contacts with American VIPs) to show local administrators what he really achieved.
This time, everyone seemed to believe everything at once, but events took an unfavorable turn for Adrian — the newspaper filed an official request to the FBI on the fact of hacking the database and illegal entry into their corporate network. He was accused of illegally entering, hacking and modifying the database, as well as stealing from the database more than 3,000 mobile phone numbers of Hollywood stars, famous actors and musicians, political leaders, athletes, businessmen, TV presenters, models, as well as famous journalists and writers in America.
The investigation and search for Adrian lasted 15 months, after which, Adrian decided to turn himself in to the US marshals in Sacramento, admitting his guilt and publicly apologizing to all the companies that he unintentionally caused damage to.
The court ordered him to pay a fine of $65,000, 6 months of house arrest in his parents ' home, and another 2 years of probation, during which he was also forbidden to approach computers at a distance closer than 100 meters.
Interestingly, during the trial, Lamo again showed his hacker nature, categorically refusing to provide the FBI with samples of his blood in order to add his DNA to the unified database of US intelligence agencies. A very religious Lamo, right in court quoted Bible verses where the Lord recommends very careful handling of human blood, because of its very specific properties (Genesis 9: 6). The Lord Elohim forbids us to shed not only other people's blood, but also our own blood, no matter what our motivation.
In general, commenting on all these poems, Adrian builds quite complex and very subjective mystical-religious constructions (but we will omit them here, so as not to injure the psyche of our magazine editor, who will have to read and verify all this).
But this unexpected turn in the case of the young hacker again attracted wide public attention, and he again found himself on television, now in a new role - on religious and legal issues. Surprisingly, this long standoff with the special services ended in Adrian's victory:
thanks to this particular incident, the case law of the United States was changed-an amendment was added by law with the possibility of taking a DNA sample with a simple smear from the cheek, without the mandatory blood collection, as it was before
In one of the interviews, Adrian is asked how he generally assesses the security of large modern corporate structures, to which Adrian quite bravely states::
"I can break into any corporate network connected to the Internet in less than 15 minutes. My experience shows that most often, their highly paid network administrators do not know the most banal things, for example, that the Apache web server is also a proxy server, the fact of which in the vast majority of installations that I have seen in real life is simply ignored and not taken into account in any way: In my young life, I have seen a lot of DMZ implementations,..
Most network infrastructure configuration errors are typical. They are repeated from one company to another. For example, some professor once wrote in a smart book of an expensive publishing house that this is exactly what you need to do — since then, more and more generations of lemming administrators have been reproducing this in their online near-religious practice.
I corresponded with the administrators of many of the networks I hacked, explaining to them that this is not necessary — most often they did not believe me, even before the fact that their network was successfully hacked. Fortunately, I didn't read such clever books when I was learning it myself, so I don't have an innate taboo not to see these blunders directly."
It's funny enough that Adrian himself doesn't even have a high school education, let alone a high school one — he didn't pass the final tests of his native college and was expelled, which he doesn't particularly regret to this day. When asked about his education, he jokes, " It's a waste of time."
You have to admit that Adrian is antisocial in everything, and it seems that this really makes him free to choose his life
Feature #3
Interestingly, Lamo has a third feature. His more traditional colleagues, hackers, very often attack him and publicly call him a fraud and a crook. This attitude towards him has even become a kind of cliche in the hacker community.
Many experts, seeing it work in the browser, say :" This is too easy — anyone can do this." One of the editors of the most famous security portal SecurityFocus.com sarcastically remarks:
"Are you very impressed with Lamo's incredible abilities? But I'm telling you, it doesn't do anything out of the ordinary. He did not find or invent any new concepts or techniques in the field of computer security. It simply exploits super-banal and simple vulnerabilities, as well as elementary errors in proxy server settings. His secret is only one thing — this young guy glows too much on television. He didn't hack the networks, he hacked the media."
All the attacks against Lamo, who I repeat is not very popular with his colleagues, are successfully answered in absentia by his good friend-Oxblood Ruffian, the leader of the famous hacker group "Cult of the Dead Cow":
"It's like a dance. Almost everyone can dance. Moreover, everyone knows how to do it. But only a few people can dance the way Michael Jackson does."
Another friend of Lamo's, Kevin Mitnick, was once asked where to start learning hacking, and his answer was short:
"Check out the MCI WorldCom hacking report by Adrian Lamo. The entire range of techniques is perfectly used here: technical, social, and creative."
And if we are talking about MCI WorldCom, then by the way, hacking America's backbone providers is one of Adrian's favorite specializations:
"When I see a network or organization with the prefix Provider or ISP in its name — I immediately know for sure that I can feel at home here. Usually there are too many administrators, too many servers, and too much of the most diverse traffic — that is, I want to say that no one can keep up with the providers ' networks in terms of the degree of mess. Take my word for it, people like me can sit in such networks for years at the control panels of their servers, and none of the local admins will even scratch."
At the finish line
No matter what ratings are given to the genius of Adrian, he is certainly one of the brightest, most famous and youngest hackers in America, with his own style, and even a philosophy of life. After rewinding his deadline, Adrian calls on all of his followers:
there is no need to break the law, there are many other ways to create, he says, where you can put all your skills and creativity, achieving even more than is possible in the field of criminal craft. Now Adrian is done with his past.
Now he is a well-known journalist who receives prestigious awards in the field of network journalism, a lecturer who travels around computer conferences in America, and a consultant to one of the world's most famous security companies — @Stake. Adrian has settled down, and even married a girlfriend, Laura (given that Adrian is everywhere claiming to be a committed bisexual and a proponent of free relationships, one can only wonder at his unpredictability and penchant for incredible experiments with his life, which I think he will surprise us all more than once).
But, despite all that he has experienced, in one thing he still remains true to himself:
"There are things that you can only force me to do by putting the muzzle of a gun to my temple. I will never work full-time and spend my entire life chained up like a loyal dog in an office, even if Microsoft or Cisco cover the floor of my office with hundred-dollar bills. At the age of 28, I definitely realized that this is not for me."
And finally, it's better to see it once than hear it a hundred times: the whole life is in photos.
Endrian behind his famous laptop, which served him faithfully for 7 years, for which so much was done... which he bought with his hands for 150 bucks in 2002, and it still does not have keys with the letters P and Z.
Three of America's most famous hackers, left to right: Endrian Lamo, Kevin Mitnick, and Kevin Paulsen. All three were once arrested by the FBI under the same article-the total term of this trio: 9 years.
Lamo is showing the FBI WANTED poster live on CBS when he was hunted down by three US intelligence agencies at once. Think about it: this risky guy managed to participate in live broadcasts even when he was on the federal wanted list!
In fact, American television simply adores Lamo, he is a frequent guest of live hi-tech news broadcasts on such federal TV channels as CNN, CBS, NBC, Fox News, and many others.
A lot has changed since then…
Lamo is now a freelance consultant for one of the most prestigious and expensive network security companies in the world — @Stake, which is based in Cambridge, and which was founded by people from the super-famous hacker group L0pht. The expression "at stake" has not only the dictionary meaning "at risk", but it is also a slang expression used in casinos, the meaning of which is "to put everything on the line".
However, this company is now completely different from what it was in those golden years — @Stake was aggressively absorbed by Symantec in 2004, after which its most famous and biased hackers left this outstanding office. By the way, this is how Symantec got the famous audit package L0phtCrack.
Tech geniuses were completely defenseless in the world of big business, however, how it all happened (and this is quite a story!) — this is a completely different story, which we will definitely return to on the pages of our blog.
Oh, it's hard for Adrian to go to work in the office every day. That's why he doesn't go there!
Adrian is always on the edge — sharp criticism at the security conference of the infamous WikiLeaks project. ZDNet even called Endrian a national hero, for his principled civic position, for the fact that now... he himself knocks to the American authorities on dissidents.
Amazing life, amazing biography, amazing events… what is not a fact - all the link in Wikipedia. Adrian himself is sure that talents are not born, but become them. Life is like a supermarket: the main thing is that if you choose something-then to the end and forever!