Meet the man who helped Lamo turn in Manning, the Wikileaker
IDG News Service - In early June 2010 security pro Chet Uber got a phone call from Adrian Lamo, a well-known hacker he had worked with for a year in a volunteer-run intelligence organization. Lamo had received classified documents from a U.S. Army intelligence analyst named Bradley Manning and wanted advice about what to do. Uber told Lamo to turn Manning in.
"Put it in a bag, take it off your computer, wipe your drive and I'm going to call you back in 10 minutes," Uber said he told Lamo, recalling his brush with Manning whose documents revealing secret details of the wars in Afghanistan and Iraq were eventually published on Wikileaks, setting off a U.S. government investigation and leading to Manning's arrest on July 29. Uber recalled the incident during a press conference at the Defcon security conference in Las Vegas on Sunday.
After Lamo called him, Uber contacted the U.S. Department of Defense and set things up with the U.S. Air Force Office of Special Investigation for Lamo to report the documents. He then called Lamo back and told him how to do that.
"I used my connections to make sure that the three-letter agencies knew about it," said Uber, who directs Project Vigilant, a volunteer-run effort to dig up intelligence on "bad actors," such as terrorists and drug cartels. Lamo has worked as a volunteer with the group since 2009, providing "adversary characterization," which helps its members understand the different types of computer intruders that they may be dealing with.
In an e-mail inteview, Lamo confirmed Uber's account. "Mr. Uber was, among a few others, an instrumental voice in helping me to come to my ultimate decision" to contact the authorities.
Uber does not know how WIkileaks obtained the documents, but said they came from another source. Wikileaks has not confirmed that Manning was the source of the documents, but has offered to defend him in court.
Uber said he came forward Sunday because he was disturbed by the characterization -- particularly strong in the hacker community -- of Lamo as a "narc."
"He did a patriotic thing. He sees all kinds of hacks and stuff every day. He was seriously worried about people dying," he said. "Someone put him in a bad position. Brad should have never given him those documents."
It was not an easy decision for Lamo, Uber said. "He was very apprehensive. He likes Brad. Brad and he had a kinship, he told me."
Lamo could have destroyed the documents, Uber thinks he essentially had no choice because the military standard for destroying secret documents is so high. "He would run the risk of possessing those documents if they found fragments in his garbage can."
Lamo, who earned fame as the so-called homeless hacker, had previously been convicted on federal charges of breaking into the computer systems of companies such as The New York Times and Microsoft.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Datacenter eGuide
- Read on to learn what technologies are essential for high-performing data centers today, and to get a glimpse of what the data center...
- EndPoint Interactive eGuide
- In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- The Business Value of Continuous Delivery
- Download this whitepaper to learn more about the business value of Continuous Delivery and see why it could be a game changer for...
- Ten Factors Shaping the Future of Application Delivery
- Download this research report conducted by Enterprise Management Associates (EMA) to learn how those that are seeking to accelerate application delivery are leveraging... All Government IT White Papers
- It's not too late...Get Your Mobile Questions Answered Live! How can IT provide seamless and secure mobile communications and collaboration for all? Join this live Webcast as IDG asks an expert panel...
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success!
- Transform Your IT Service Management Watch this webinar, to learn how EasyVista can increase IT productivity & efficiency and deliver streamlined & integrated IT Service & Asset Mgmt.
- IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- Leveraging Flash Storage to Accelerate Oracle Real Application Clusters Join this webinar to understand the latest solid-state storage trends, the specific applications driving solid-state storage deployments and the benefits of deploying the...
- All Government IT Webcasts