StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Adrian Lamos Hacking Activity - Essay Example

Cite this document
Summary
From the paper "Adrian Lamos Hacking Activity" it is clear that generally speaking, according to Poulsen (2002), by the hacking, he got unauthorized access mainly to the paper’s social security numbers, customers’ order details, and “WireWatch” keywords…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Adrian Lamos Hacking Activity
Read Text Preview

Extract of sample "Adrian Lamos Hacking Activity"

The most notable element of Lamo’s hacking activity was that he could access a database of 3000 contributors. Similarly, he could acquire the social security numbers of many persons at reputed ranks. Lamo misused Times’ LexisNexis account with the intent to conduct some research on various high-profile subjects. In the words of Poulsen (2002), Lamo found ‘seven misconfigured proxy servers’ that acted as the connecting link between the public internet and Times’ private intranet. As a result of his discovery; any person, who properly configured his Web browser could have accessed into Times’ private intranet.

Adrian Lamo was a journalism student who was seeking a job. According to the report of Ewalt and Hulme (2004), Lamo thought that hacking high-security networks would give him fame so that he could get a reputed job. Therefore, it is obvious that Lamo did not ever think of making money out of the act. In most of his hacking cases, he has informed the companies regarding their flows in the database. It is reported that Lamo informed The New York Times about the weaker areas of its database and it indicates that his act did not intend to deceive Times.

The hacking activity of Lamo at The New York Times indicates that he was a grey hat hacker. Grey hat hackers apply their skills to prove their eligibility and thereby achieve public stature (Grey Hat Hackers). We have seen that Lamo never used Times’ data for achieving money. He was just trying to prove himself. Anyhow, on the course of pleading guilty, Lamo agreed that his activities caused losses to New York Times in the range of $30,000 to $70,000. After the course of legal proceedings, the court ordered Lamo to reimburse New York Times $65,000. In addition to this restitution money, as Marvin (2007) reports, Lamo was punished with six months of confinement at their parents’ home followed by two years probation.

In my opinion, the punishment pars with the intensity of Lamo’s crime. Although the ordered restitution money would not compensate Times' reputation loss, it is necessary to consider that Lamo was only 21 years old when he hacked into Time’s internal computer network. At this age, every individual tends to attract public concentration, and the same led Lamo to home imprisonment. This crime could have been successfully deterred if he had got the opportunity to employ his skills in other potential areas.
The incident reminds us of the significance of initiating proper promotional strategies to identify students with exceptional skills. Government must make provisions for the rehabilitation of computer hackers so that their skills would be utilized for potential or productive purposes. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Hacking Exposed Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/other/1410564-hacking-exposed
(Hacking Exposed Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/other/1410564-hacking-exposed.
“Hacking Exposed Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/other/1410564-hacking-exposed.
  • Cited: 0 times

CHECK THESE SAMPLES OF Adrian Lamos Hacking Activity

A Biography of Eleanor Roosevelt

This activity was pioneered by Mary Harriman and other debutantes from Eleanor Roosevelt's circle of friends who also created the Junior League4.... The author focuses on Eleanor Roosevelt, the First Lady of the world, who made the most memorable history with her civil rights' stands....
21 Pages (5250 words) Essay

Technology and Crime

In this paper, the writer aims to discuss crimes with respect to technology.... Several particular examples of pieces of technology and its applications are analyzed.... Additionally, the paper "Technology and Crime" describes various areas of technology-based crimes.... ... ... ... ... ... ... The variety of technology-based crime is always growing, both as a result of technological alteration and in terms of social interactions with new technologies....
7 Pages (1750 words) Term Paper

How Has the Banking Consolidation in Nigeria Affected Customer Long-Term Savings

Again, the policies of the then Nigerian government had been favorable for such rampant activity in the banking sector.... The paper "How Has the Banking Consolidation in Nigeria Affected Customer Long-Term Savings?... resumes that with the consolidation of the banking sector and the government policy to remove public sector funds from banks, the banking industry will diversify its services in all economic sectors....
5 Pages (1250 words) Case Study

The Champions of NFC, the George Halas Trophy

Initial possession of the ball in the game is determined by a toss activity in the presence of a referee.... The paper "The Champions of NFC, the George Halas Trophy " discusses that NFC is carried out on the penultimate Sunday in the first month of the year.... The champion is awarded the George Halas Trophy and proceeds to countenance the conqueror of the AFC Championship....
7 Pages (1750 words) Coursework

Problems and Challenges in Regulating Internet Banking In Nigeria

The dissertation aims to examine the emergence of online banking in Nigeria.... The research study analyses the progress of internet banking in the country to examine the success and failure factors.... The study focuses on the measures that have been taken by the government.... ... ... ... The study also discusses the progress of online banking in Nigeria from the perspective of diffusion of innovation and relative competitive advantage theories in order to evaluate the contribution of e-banking towards the economic development of the country....
20 Pages (5000 words) Dissertation

Cybercrime and Its Impact on International Trade

The "Cybercrime and Its Impact on International Trade" paper explore the cyber-world and take a brief look at how trade is conducted through this media while highlighting the effect of cybercrimes on this line of commerce.... It also analyzes the laws of the so-called 'virtual world'.... ... ... ...
75 Pages (18750 words) Research Paper

Bank's Risk-Taking Behaviour Prior to Financial Crisis

In general, conflict between the interests of shareholders of commercial banks and the depositors is very prominent.... Shareholders are always willing to.... ... ... The paper "Bank's Risk-Taking Behaviour Prior to Financial Crisis" is an outstanding example of a report on macro and microeconomics....
9 Pages (2250 words)

Mergers and Acquisitions in the UK Banking

The author of this paper "Mergers and Acquisitions in the UK Banking" focuses and presents mergers and acquisitions among UK banks and is a study of the general trend for mergers and acquisitions and their impact on businesses and the financial sector in general.... ... ... ... The essence of any structural overview of a modern banking and financial system is the nature of the conduits through which the financial assets of the ultimate savers flow to the liabilities of the ultimate users of finance....
17 Pages (4250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us