Subscribe via feed.

Befriending “Homeless Hacker” Adrian Lamo

Posted by deepquest on January 12, 2004 – 12:03 am

There is something about harboring a confessed criminal in your house that can bring new excitement to your life. Within minutes of meeting the so-called “homeless hacker” Adrian Lamo, he was showing me how to reprogram my cell phone. That is the kind of guy he is — someone who has broken into numerous computer systems around the world and knows his way around the cell phone firmware, yet isn’t afraid to share his knowledge with the common reporter. The funny thing was, he could remember the codes to get it into programming mode, but had trouble finding the phone’s power switch. It was sort of cute, in a way.

You could say he is a criminal with a conscience, and I mean that in just the nicest way. When I told him to help himself to whatever he could forage in my fridge (which is always a risky proposition in even the best of times), he told me he boosted a yogurt. No, you didn’t steal it, I offered it to you, I said. Then he told me his credo: “If you are going to be a criminal, you might as well be a trustworthy one.” I completely agree. So have all the yogurts you can find, Adrian. In the meantime, I got to watch him in action and spend more time with him doing normal (i.e., non-computer-related) activities. It was a gas.

I guess a more prudent person wouldn’t have offered his own sofa as a hacker crash pad, but there was something about my conversations with Lamo through the years that endeared him to me, and yes, made me trust him. Maybe it is his youthful exuberance. He is only 22 and still has that starry-eyed look about him. Maybe I find in him some of the same personality traits that I recall in the younger edition of myself long ago and in a galaxy far, far away. Maybe it was all of his storied exploits into various computer networks that he has helped himself to during the years. Maybe it was the same quality that attracted me to many of my high school students when I was teaching them about how to break into the school network and use hacker tools. After all, Lamo wasn’t much older than my students when he got his start.

Above all, I was impressed with his intensity. He has to be that way to deal with what he’s done over the past couple of years. He is completely self-trained, which is even more impressive given the knowledge that he has about computer networks and security practices. He told me he got his start when someone infected his PC with a virus, and he had to stop and figure out what made the virus work. From then on, he was hooked on computers.

I’ve corresponded with Lamo for about two years now. I finally got a chance to meet him and break bread with him this week, while he was in town to cop a plea. He has admitted to stealing information from the New York Times computer network and continues to be harassed by the FBI, despite his subsequent offer to show the Times how to protect itself from hackers like him.

What distinguishes Lamo from many others that break into computer networks is that he is the first to bring open-source techniques to his stock in trade. He doesn’t just try to force his way into vulnerable places over the Internet, but lets you know exactly what the weaknesses he observed and the methods he uses. He wants to share his knowledge with the rest of the world; in the hopes that many people will figure out ways to eliminate these sloppy security practices. In many cases, the methods are simplicity itself, with just a Web browser and little more than some savvy guessing about unprotected proxy servers. (Check out [url=http://www.freelamo.org]freelamo.org[/url] )

more from [url=http://www.internetwk.com/breakingNews/showArticle.jhtml?articleID=17300322]InternetNetwork[/url]


This post is under “Security” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.