Misplaced Pages

Kevin Mitnick: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively
← Previous editContent deleted Content addedVisualWikitext
Revision as of 10:42, 12 May 2021 editDanloud (talk | contribs)Extended confirmed users, Pending changes reviewers, Rollbackers6,606 edits Reverted 1 pending edit by CorrectNetWorth to revision 1021849314 by SunDawnTag: Manual revert← Previous edit Latest revision as of 06:10, 18 December 2024 edit undoMlnxtd (talk | contribs)13 editsNo edit summaryTags: Manual revert Visual edit Mobile edit Mobile web edit 
(442 intermediate revisions by more than 100 users not shown)
Line 1: Line 1:
{{pp-pc1}} {{pp-pc1}}
{{Short description|American hacker (1963–2023)}}
{{pp-pc}} {{pp-pc}}
{{Use mdy dates|date=July 2023}}
{{short description|American computer security consultant, author, convicted criminal, and hacker}}
{{Use mdy dates|date=May 2015}}
{{Infobox person {{Infobox person
| name = Kevin Mitnick | name = Kevin Mitnick
| image = Cyber Incursion event at the City of London.jpg | image = Kevin Mitnick ex hacker y ahora famoso consultor en redes en Campus Party México 2010.jpg
| caption = Mitnick in 2010
| caption = Kevin Mitnick speaking at Cyber Incursion event 2018. He spoke about ] and its risks for users.
| birth_name = Kevin David Mitnick | birth_name = Kevin David Mitnick
| birth_date = {{birth date and age|1963|08|06}} | birth_date = {{birth date|1963|8|6}}
| birth_place = ], U.S. | birth_place = ], California, U.S.
| death_date = {{death date and age|2023|7|16|1963|8|6}}
| criminal_charge = 1995: ] (14 counts), possession of unauthorized access devices (8 counts), interception of wire or electronic communications, unauthorized access to a federal computer, and causing damage to a computer.<ref name="sciencedirect.com"/><ref>{{cite web|url=http://servv89pn0aj.sn.sourcedns.com/~gbpprorg/2600/mitnick_is_guilty/indictment.html |title=Kevin Mitnick's Federal Indictment |access-date=September 13, 2014 |url-status=dead |archive-url=https://web.archive.org/web/20140518042134/http://servv89pn0aj.sn.sourcedns.com/~gbpprorg/2600/mitnick_is_guilty/indictment.html |archive-date=May 18, 2014 }}</ref>
| death_place = ], Pennsylvania, U.S.
| criminal_charge = 1995: ] (14 counts), possession of unauthorized access devices (8 counts), interception of wire or electronic communications, unauthorized access to a federal computer, and causing damage to a computer<ref name="sciencedirect.com" /><ref>{{cite web |website= sourcedns.com |url=http://servv89pn0aj.sn.sourcedns.com/~gbpprorg/2600/mitnick_is_guilty/indictment.html |title=Kevin Mitnick's Federal Indictment |access-date=September 13, 2014 |url-status= dead |archive-url=https://web.archive.org/web/20140518042134/http://servv89pn0aj.sn.sourcedns.com/~gbpprorg/2600/mitnick_is_guilty/indictment.html |archive-date=May 18, 2014}}</ref>
| boards = KnowBe4 | boards = KnowBe4
| criminal penalty = {{Plainlist|
| criminal penalty = 1988: One year prison.<ref name="justice.gov">{{cite web|url=https://www.justice.gov/opa/pr/Pre_96/February95/89.txt.html |title=#089 Fugitive Computer Hacker Arrested in North Carolina |work=justice.gov |url-status=dead |archive-url=https://web.archive.org/web/20130613162729/http://www.justice.gov/opa/pr/Pre_96/February95/89.txt.html |archive-date=June 13, 2013 }}</ref><br>1999: 46 months prison plus 3 years' probation<ref name="law.jrank.org"/> * 1998: One year prison<ref>{{cite web|url=https://www.justice.gov/opa/pr/Pre_96/February95/89.txt.html |title=#089 Fugitive Computer Hacker Arrested in North Carolina |work=justice.gov |url-status=dead |archive-url= https://web.archive.org/web/20130613162729/http://www.justice.gov/opa/pr/Pre_96/February95/89.txt.html |archive-date=June 13, 2013}}</ref>
| organization = Mitnick Security Consulting<br />Chief Hacking Officer at KnowBe4
* 1999: 46 months prison plus 3 years probation
| nationality = American
}}
| spouse = {{marriage|Kimberley Mitnick|2022}}
| organization = {{Plainlist|
* Mitnick Security Consulting
* Chief Hacking Officer at KnowBe4, Inc
}}
| nationality =
| occupation = {{Plainlist| | occupation = {{Plainlist|
* ] (before, Hacker) * ]
* Author * Author
}} }}
| alias = The Condor, The Darkside Hacker | alias = The Condor, The Darkside Hacker
| callsign = N6NHG<ref>{{cite web|title=HEARING DESIGNATION ORDER (FCC 01-359)|url=https://apps.fcc.gov/edocs_public/attachmatch/FCC-01-359A1.pdf|publisher=Federal Communications Commission|access-date=3 December 2015|date=2001-12-21}}</ref> | callsign = N6NHG<ref>{{cite web|title=HEARING DESIGNATION ORDER (FCC 01-359)|url=https://apps.fcc.gov/edocs_public/attachmatch/FCC-01-359A1.pdf|publisher=Federal Communications Commission|access-date=December 3, 2015|date=December 21, 2001|archive-date=August 3, 2015|archive-url=https://web.archive.org/web/20150803013337/https://apps.fcc.gov/edocs_public/attachmatch/FCC-01-359A1.pdf|url-status=live}}</ref>
| website = https://www.mitnicksecurity.com | website = {{url|https://www.mitnicksecurity.com}}
}} }}
'''Kevin David Mitnick''' (born August 6, 1963) is an American ] consultant, author, and convicted ]. He is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes.<ref>{{cite press release|url=https://www.justice.gov/opa/pr/Pre_96/February95/89.txt.html |title=Kevin Mitnick sentenced to nearly four years in prison; computer hacker ordered to pay restitution to victim companies whose systems were compromised |date=August 9, 1999 |publisher=], Central District of California |url-status=dead |archive-url=https://web.archive.org/web/20130613162729/http://www.justice.gov/opa/pr/Pre_96/February95/89.txt.html |archive-date=June 13, 2013 }}</ref>


'''Kevin David Mitnick''' (August 6, 1963 – July 16, 2023) was an American ] consultant, author, and convicted ]. He is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes.<ref>{{cite press release |url=https://www.justice.gov/opa/pr/Pre_96/February95/89.txt.html |title=Kevin Mitnick sentenced to nearly four years in prison; computer hacker ordered to pay restitution to victim companies whose systems were compromised |website=justice.gov |date=August 9, 1999 |publisher=], Central District of California |url-status=dead |archive-url=https://web.archive.org/web/20130613162729/http://www.justice.gov/opa/pr/Pre_96/February95/89.txt.html |archive-date=June 13, 2013}}</ref>
Mitnick's pursuit, arrest, trial, and sentence along with the associated journalism, books, and films were all controversial.<ref name=kroll>, Jan 21, 2000, Jason Kroll, Linux Journal</ref><ref>{{cite web|url=http://digital.asiaone.com/digital/news/ex-hacker-reveals-tricks-trade|title=Ex-hacker reveals tricks of the trade|work=AsiaOne Digital}}</ref>
Mitnick's pursuit, arrest, trial and sentence were all controversial, as were the associated media coverage, books and films.<ref name="kroll">{{cite web |url=http://www.linuxjournal.com/article/5052 |title=Free Kevin, Kevin Freed |archive-url=https://web.archive.org/web/20171207101421/https://www.linuxjournal.com/article/5052 |archive-date=December 7, 2017 |date=January 21, 2000 |first=Jason |last=Kroll |website=Linux Journal}}</ref><ref>{{cite web |url=http://digital.asiaone.com/digital/news/ex-hacker-reveals-tricks-trade |archive-url=https://web.archive.org/web/20150723002954/http://digital.asiaone.com/digital/news/ex-hacker-reveals-tricks-trade |url-status=dead |archive-date=July 23, 2015 |title=Ex-hacker reveals tricks of the trade |work=AsiaOne Digital}}</ref> After his release from prison, he ran his own security firm, Mitnick Security Consulting, LLC, and was also involved with other computer security businesses.


==Early life and education==
He now runs the security firm Mitnick Security Consulting, LLC. He is also the Chief Hacking Officer and part owner<ref>{{Cite web|url=https://www.prnewswire.com/news-releases/kevin-mitnick-partners-with-knowbe4-159403195.html|title=Kevin Mitnick Partners With KnowBe4|last=KnowBe4|website=www.prnewswire.com|language=en|access-date=2020-04-18}}</ref> of the security awareness training company KnowBe4, as well as an active advisory board member at ],<ref>{{cite web|url=http://blogs.computerworld.com/security/20712/interview-worlds-most-famous-hacker-kevin-mitnick-mobile-security-zimperium|title=Interview: World's most famous hacker, Kevin Mitnick, on mobile security & Zimperium|author=Darlene Storm|date=July 19, 2012|work=Computerworld|url-status=dead|archive-url=https://web.archive.org/web/20131226121347/http://blogs.computerworld.com/security/20712/interview-worlds-most-famous-hacker-kevin-mitnick-mobile-security-zimperium|archive-date=December 26, 2013|df=mdy-all}}</ref> a firm that develops a mobile intrusion prevention system.<ref>{{cite web|url=https://techcrunch.com/2013/12/20/zimperium-raises-8m-for-mobile-security-that-turns-the-tables-on-attackers|title=Zimperium Raises $8M For Mobile Security That Turns The Tables On Attackers|author=Alex Williams|publisher=AOL|work=TechCrunch}}</ref>
Mitnick was born on August 6, 1963,<ref name="WaPoObit" /> in ], California.<ref>{{cite web |author=Hackers League |title=Kevin Mitnick |url=https://medium.com/@hackersleague/kevin-mitnick-7704a3e869fa |website=] |access-date=July 20, 2023 |language=en |date=May 31, 2019 |archive-date=July 20, 2023 |archive-url=https://web.archive.org/web/20230720184819/https://medium.com/@hackersleague/kevin-mitnick-7704a3e869fa |url-status=live}}</ref> His father was Alan Mitnick, his mother was Shelly Jaffe, and his maternal grandmother was Reba Vartanian.<ref name="nyt">{{cite news |last1=Albeck-Ripka |first1=Livia |last2=Mayorquin |first2=Orlando |date=July 20, 2023 |title=Kevin Mitnick, Hacker Who Once Eluded Authorities, Is Dead at 59 |work=] |url=https://www.nytimes.com/2023/07/20/technology/kevin-mitnick-dead-hacker.html |url-status=live |access-date=July 21, 2023 |archive-url=https://web.archive.org/web/20230721083417/https://www.nytimes.com/2023/07/20/technology/kevin-mitnick-dead-hacker.html |archive-date=July 21, 2023}}</ref><ref>{{Cite web |url=https://cosmolearning.org/documentaries/freedom-downtime-the-story-of-kevin-mitnick-2001/ |title=Freedom Downtime - The Story of Kevin Mitnick (2001) |website=CosmoLearning |date=August 20, 2009 |access-date=September 6, 2023 |archive-date=September 6, 2023 |archive-url=https://web.archive.org/web/20230906142646/https://cosmolearning.org/documentaries/freedom-downtime-the-story-of-kevin-mitnick-2001/ |url-status=live }}</ref> Mitnick was Jewish,<ref>{{cite news |last=Percival |first=Richard |date=2023-07-21 |title=Famed US hacker Kevin Mitnick, once dubbed 'America's most wanted', dies aged 59 |url=https://www.thejc.com/news/famed-us-hacker-kevin-mitnick-once-dubbed-americas-most-wanted-dies-aged-59-q9twbwke |work=] |quote=The Jewish cybercriminal... |access-date=2024-07-14}}</ref><ref> {{cite web |url=https://www.israelnationalnews.com/news/158220 |title="Hacker" Kevin Mitnick's Dramatic Turnaround |last=Bresky |first=Ben |date=2012-07-24 |website=] |access-date=2024-07-14 |quote=In the book, released in 2011, Mitnick briefly describes his bar mitzvah and secular Jewish upbringing in California.}}</ref> and grew up in Los Angeles, California.<ref name="WaPoObit" /> At age 12, Mitnick convinced a bus driver to tell him where he could buy his own ] for "a school project", and was then able to ride any bus in the greater Los Angeles area using unused transfer slips he found in a dumpster next to the bus company garage.<ref>{{cite web |url=https://www.theregister.co.uk/2003/01/13/chapter_one_kevin_mitnicks_story |title=Chapter One: Kevin Mitnick's story |website=] |date=January 13, 2003 |first=Thomas C. |last=Greene |archive-url=https://archive.today/20120912150528/http://www.theregister.co.uk/2003/01/13/chapter_one_kevin_mitnicks_story/ |archive-date=September 12, 2012 |url-status=live}}</ref>


Mitnick attended ] in ],<ref name="ghostinwiresmya00mitn_0" /><ref>{{cite news |title=Hacker Arraigned in Computer Fraud Case |url=https://www.latimes.com/archives/la-xpm-1996-10-01-me-49310-story.html |access-date=July 20, 2023 |work=] |date=October 1, 1996 |quote=... as a student at James Monroe High School in North Hills, he broke into the Los Angeles Unified School District’s computers. |archive-date=July 20, 2023 |archive-url=https://web.archive.org/web/20230720184808/https://www.latimes.com/archives/la-xpm-1996-10-01-me-49310-story.html |url-status=live}}</ref> during which time he became a licensed ] operator with callsign WA6VPS<ref>{{cite web |last=Mills |first=Elinor |title=Q&A: Kevin Mitnick, from ham operator to fugitive to consultant |url=https://www.cnet.com/news/q-a-kevin-mitnick-from-ham-operator-to-fugitive-to-consultant/ |website=cnet.com |publisher=] |access-date=December 18, 2017 |date=June 22, 2009 |archive-date=December 28, 2017 |archive-url=https://web.archive.org/web/20171228123941/https://www.cnet.com/news/q-a-kevin-mitnick-from-ham-operator-to-fugitive-to-consultant/ |url-status=live}}</ref> (his license was restored after imprisonment with callsign N6NHG<ref>{{cite web |title=Mitnick Granted Ham License |url=https://www.wired.com/2002/12/mitnick-granted-ham-license/ |magazine=] |agency=] |access-date=August 3, 2023 |date=December 27, 2002 |archive-date=July 20, 2023 |archive-url=https://web.archive.org/web/20230720153206/https://www.wired.com/2002/12/mitnick-granted-ham-license/ |url-status=live }}</ref>). He chose the nickname "Condor" after watching the movie '']''.<ref>{{Cite book |url=https://www.worldcat.org/oclc/62211803 |title=The Internet : a historical encyclopedia |date=2005 |first1=Hilary W.|last1=Poole | first2=Laura |last2=Lambert |first3=Chris |last3=Woodford |first4=Christos J. P. |last4=Moschovitis |author-link3=Chris Woodford (author) |isbn=1-85109-664-7 |publisher=] |location=Santa Barbara, California |oclc=62211803 |access-date=June 21, 2022 |archive-date=July 20, 2023 |archive-url=https://web.archive.org/web/20230720041358/https://www.worldcat.org/title/62211803 |url-status=live}}</ref> He was later enrolled at ] and ].<ref name="ghostinwiresmya00mitn_0" />
== Life and career ==


===Early life=== ==Career==
For a time, Mitnick worked as a receptionist for ] in Los Angeles.<ref name="ghostinwiresmya00mitn_0" />
Mitnick was born in ], ], on August 6, 1963.<ref>{{cite book |last=Merritt |first=Tom |date=2012 |title=Chronology of Tech History |url=https://books.google.com/books?id=hv3zAwAAQBAJ&q=kevin+mitnick+born&pg=PA87 |publisher=Lulu.com |page=87 |isbn=978-1-300-25307-5 }}{{self-published source|date=February 2020}}</ref>{{self-published inline|date=February 2020}} He grew up in Los Angeles and attended ] in Los Angeles, California,<ref name="ghost" /> during which time he became an ] operator.<ref name="CNET">{{cite web|last1=Mills|first1=Elinor|title=Q&A: Kevin Mitnick, from ham operator to fugitive to consultant|url=https://www.cnet.com/news/q-a-kevin-mitnick-from-ham-operator-to-fugitive-to-consultant/|website=cnet.com|publisher=]|access-date=18 December 2017}}</ref> He was later enrolled at ] and ].<ref name="ghost" /> For a time, he worked as a receptionist for ].<ref name="ghost">{{cite book|title=Ghost in the Wires: My Adventures as the World's Most Wanted Hacker|last=Mitnick|first=Kevin|year=2011|publisher=Little, Brown and Company|isbn=978-0-316-03770-9|url=https://archive.org/details/ghostinwiresmya00mitn_0}}</ref>


===Computer hacking=== ===Computer hacking===
Mitnick gained unauthorized access to a computer network in 1979, at 16, when a friend gave him the ] for the Ark, the computer system that ] (DEC) used for developing its ] operating system software.<ref>{{cite web|url=http://www.thememoryhole.org/lit/deception-ch1.htm |title= The Missing Chapter from The Art of Deception by Kevin Mitnick|website=thememoryhole.org|access-date=February 16, 2020|url-status=dead|archive-url= https://web.archive.org/web/20090317050834/http://www.thememoryhole.org/lit/deception-ch1.htm|archive-date=March 17, 2009}}</ref> He broke into DEC's ] and copied the company's software, a crime for which he was charged and convicted in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into ] voicemail computers. After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two-and-a-half years.<ref>{{Cite web|url=https://www.latimes.com/archives/la-xpm-1995-02-16-mn-32768-story.html|title=Fugitive North Hills Hacker Arrested in N. Carolina : Crime: Kevin Mitnick eluded authorities for two years. He is alleged to have cost victims millions.|first1=John|last1=Johnson|first2=Ronald J. |last2=Ostrow |first3=Josh| last3=Meyer |date=February 16, 1995|website=Los Angeles Times|access-date=July 20, 2023|archive-date=June 27, 2023|archive-url= https://web.archive.org/web/20230627002615/https://www.latimes.com/archives/la-xpm-1995-02-16-mn-32768-story.html|url-status=live}}</ref>
At age 12, Mitnick used ] and ]<ref>{{cite web|url=http://bigthink.com/think-tank/hacker-for-the-hell-of-it-the-adventures-of-kevin-mitnick|title=Hacker for the Hell of It: The Adventures of Kevin Mitnick|author=Jason Gots|work=Big Think}}</ref> to bypass the punch card system used in the Los Angeles bus system. After he convinced a bus driver to tell him where he could buy his own ticket punch for "a school project", he was able to ride any bus in the greater LA area using unused transfer slips he found in a dumpster next to the bus company garage. Social engineering later became his primary method of obtaining information, including usernames and passwords and modem phone numbers.<ref>{{cite web|url=https://www.theregister.co.uk/2003/01/13/chapter_one_kevin_mitnicks_story |title=Chapter One: Kevin Mitnick's story |website=The Register |date=January 13, 2003 |first=Thomas C. |last=Greene |archive-url=https://archive.is/20120912150528/http://www.theregister.co.uk/2003/01/13/chapter_one_kevin_mitnicks_story/ |archive-date=September 12, 2012 |url-status=live }}</ref>


According to the ], Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used ] to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies.<ref>{{Cite web |last=Tamaki |first=Julie |date=September 27, 1996 |title=Famed Hacker Is Indicted by U.S. Grand Jury |url=https://www.latimes.com/archives/la-xpm-1996-09-27-me-48189-story.html |access-date=July 22, 2023 |website=Los Angeles Times |language=en-US |archive-date=July 22, 2023 |archive-url=https://web.archive.org/web/20230722023900/https://www.latimes.com/archives/la-xpm-1996-09-27-me-48189-story.html |url-status=live }}</ref><ref name="rose">{{Cite book |last=Rose |first=E. Brian |url=https://books.google.com/books?id=RqrjCgAAQBAJ&dq=mitnick+altered+computer+networks&pg=PA22 |title=Millionaire Within: Untold Stories from the Internet Underworld |date=December 1, 2015 |publisher=Morgan James Publishing |isbn=978-1-63047-346-4 |pages=22 |language=en |access-date=July 22, 2023 |archive-date=July 22, 2023 |archive-url=https://web.archive.org/web/20230722183419/https://books.google.com/books?id=RqrjCgAAQBAJ&dq=mitnick+altered+computer+networks&pg=PA22 |url-status=live }}</ref> Mitnick also intercepted and stole computer ]s, altered computer networks, and broke into and read private emails.<ref name="rose" /><ref>{{Cite web |last=Byrne |first=Michael |date=September 27, 2014 |title=Kevin Mitnick Offers a Peek Inside the Cryptic Zero-Day Marketplace |url=https://www.vice.com/en/article/wnjpqw/kevin-mitnick-offers-a-peek-inside-the-bizarre-zero-day-exploit-market |access-date=July 22, 2023 |website=Vice |language=en |archive-date=July 22, 2023 |archive-url=https://web.archive.org/web/20230722024144/https://www.vice.com/en/article/wnjpqw/kevin-mitnick-offers-a-peek-inside-the-bizarre-zero-day-exploit-market |url-status=live }}</ref>
Mitnick first gained unauthorized access to a computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system that ] (DEC) used for developing its ] operating system software.<ref>{{cite web|url=http://www.thememoryhole.org/lit/deception-ch1.htm|title=The Missing Chapter from The Art of Deception by Kevin Mitnick|website=thememoryhole.org|access-date=February 16, 2020|url-status=dead|archive-url=https://web.archive.org/web/20090317050834/http://www.thememoryhole.org/lit/deception-ch1.htm|archive-date=March 17, 2009}}</ref> He broke into DEC's ] and copied the company's software, a crime for which he was charged and convicted in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into ] voice mail computers. After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two and a half years.

According to the ], Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used ] to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mails.


==== Arrest, conviction, and incarceration ==== ==== Arrest, conviction, and incarceration ====
]'' distributed "Free Kevin" bumper stickers.<ref name="Internet Archive 2016">{{cite web | title=Freedom Downtime - The Story of Kevin Mitnick : 2600 Films : Free Download, Borrow, and Streaming : Internet Archive | website=Internet Archive | date=2016-10-23 | url=https://archive.org/details/FreedomDowntime-TheStoryOfKevinMitnick | access-date=2019-05-14}}</ref>]] ]'' distributed "Free Kevin" ]s.<ref>{{cite web | title=Freedom Downtime - The Story of Kevin Mitnick | website= archive.org| date=October 23, 2016 | url=https://archive.org/details/FreedomDowntime-TheStoryOfKevinMitnick | access-date=May 14, 2019}}</ref>]]
After a well-publicized pursuit, the ] arrested Mitnick on February 15, 1995, at his apartment in ], on federal offenses related to a two and half year period of computer hacking which included computer and ].<ref>{{cite press release|url=http://www.usdoj.gov/opa/pr/Pre_96/February95/89.txt.html |title=Fugitive computer hacker arrested in North Carolina |date=February 15, 1995 |publisher=] |archive-url=https://archive.is/20120629/http://www.usdoj.gov/opa/pr/Pre_96/February95/89.txt.html |archive-date=June 29, 2012 |url-status=live }}</ref><ref>Colbert Report</ref> He was found with cloned cellular phones, more than 100 clone cellular phone codes, and multiple pieces of false identification.<ref>{{cite journal | url = http://www.justice.gov/sites/default/files/usao/legacy/2006/06/30/usab4902.pdf | title = Supervised Release and Probation Restrictions in Hacker Cases | first = Christopher M.E. | last = Pnter | journal = United States Attorneys' USA Bulletin | publisher = ] |date=March 2001 | volume = 49 | issue = 2}}</ref> After a well-publicized pursuit, the ] arrested Mitnick on February 15, 1995 at his apartment in ], on federal offenses related to a two-and-a-half-year period of computer hacking that included computer and ].<ref>{{cite press release|url=http://www.usdoj.gov/opa/pr/Pre_96/February95/89.txt.html |title=Fugitive computer hacker arrested in North Carolina |date=February 15, 1995 |publisher=] |website= usdoj.gov |archive-url= https://archive.today/20120629/http://www.usdoj.gov/opa/pr/Pre_96/February95/89.txt.html |archive-date=June 29, 2012 |url-status=live}}</ref><ref>'']''{{nonspecific|date=July 2023}}</ref> He was found with cloned cell phones, more than 100 cloned cellular phone codes, and multiple pieces of false identification.<ref>{{cite journal | url = http://www.justice.gov/sites/default/files/usao/legacy/2006/06/30/usab4902.pdf | title = Supervised Release and Probation Restrictions in Hacker Cases | first = Christopher M. E. | last = Painter | journal = United States Attorneys' USA Bulletin | publisher = ] | date = March 2001 | volume = 49 | issue = 2 | access-date = April 19, 2015 | archive-date = July 21, 2015 | archive-url = https://web.archive.org/web/20150721034020/http://www.justice.gov/sites/default/files/usao/legacy/2006/06/30/usab4902.pdf | url-status = live}}</ref>

In December 1997, the ] website was hacked, displaying a message calling for Mitnick's release. According to the message, all recent visitors of Yahoo!'s website had been infected with a ] that would wreak havoc on Christmas Day unless Mitnick were released. Yahoo! dismissed the claims as a hoax and said that the worm was nonexistent.<ref>{{Cite journal | url=https://www.wired.com/1997/12/yahoo-hack-heck-of-a-hoax/ |title = Yahoo Hack: Heck of a Hoax|journal = Wired|date = December 9, 1997}}</ref><ref>. </ref>


In December 1997, the ] Web site was hacked, displaying a message calling for Mitnick's release. According to the message, all recent visitors of Yahoo!'s site had been infected with a ] that would wreak havoc on Christmas Day unless Mitnick was released. Yahoo! dismissed the claims as a hoax and said that the worm was nonexistent.<ref>{{Cite magazine |url = https://www.wired.com/1997/12/yahoo-hack-heck-of-a-hoax/ |title = Yahoo Hack: Heck of a Hoax |magazine = ] |date = December 9, 1997 |access-date = February 6, 2019 |archive-date = June 28, 2024 |archive-url = https://web.archive.org/web/20240628045947/https://www.wired.com/1997/12/yahoo-hack-heck-of-a-hoax/ |url-status = live }}</ref><ref> at archive.org</ref>
Mitnick was charged with wire fraud (14 counts), possession of unauthorized access devices (8 counts), interception of wire or electronic communications, unauthorized access to a federal computer, and causing damage to a computer.<ref name="law.jrank.org">{{cite web|url=http://law.jrank.org/pages/3791/Kevin-Mitnick-Case-1999.html|title=Kevin Mitnick Case: 1999 - No Bail, No Computer, Hacker Pleads Guilty|work=jrank.org}}</ref>


In 1999, Mitnick pleaded guilty to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication, as part of a ] before the ] in Los Angeles. He was sentenced to 46 months in prison plus 22 months for violating the terms of his 1989 supervised release sentence for computer fraud. He admitted to violating the terms of supervised release by hacking into ] voicemail and other systems and to associating with known computer hackers, in this case co-defendant Lewis De Payne.<ref name="sciencedirect.com">{{cite journal|title=Super-hacker Kevin Mitnick takes a plea| doi=10.1016/S1361-3723(99)90141-0|volume=1999|issue=5|page=6|journal= Computer Fraud & Security|year=1999|last1=Gengler|first1=Barbara}}</ref><ref>{{cite web|url=https://fas.org/irp/news/1997/cac70627_1.html|title=Computer Hacker Kevin Mitnick Sentenced to Prison.|website=fas.org|date=June 27, 1997|access-date=February 16, 2020}}</ref> In 1998, Mitnick was charged in the ] with 14 counts of wire fraud, eight counts of possession of unauthorized access devices, interception of wire or electronic communications, unauthorized access to a federal computer, and causing damage to a computer.<ref>{{Cite magazine|url=https://www.wired.com/1998/09/hacker-cant-get-access/|title=Hacker Can't Get Access|first=Arik|last=Hesseldahl|magazine=]|via=wired.com|date=September 4, 1998|access-date=July 20, 2023|archive-date=July 20, 2023|archive-url=https://web.archive.org/web/20230720054608/https://www.wired.com/1998/09/hacker-cant-get-access/|url-status=live}}</ref> As part of a ], Mitnick pleaded guilty in 1999 to four counts of wire fraud, two counts of computer fraud, and one count of illegally intercepting a wire communication. U.S. district judge ] sentenced Mitnick to 46 months in federal prison plus 22 months for violating the terms of his 1989 supervised release sentence for computer fraud. He admitted to violating the terms of supervised release by hacking into ] voicemail and other systems and to associating with known computer hackers, in this case co-defendant Lewis De Payne.<ref name="sciencedirect.com">{{cite journal|title=Super-hacker Kevin Mitnick takes a plea| doi=10.1016/S1361-3723(99)90141-0|volume=1999|issue=5|page=6|journal= Computer Fraud & Security|year=1999|last=Gengler|first=Barbara}}</ref><ref>{{cite web|url=https://fas.org/irp/news/1997/cac70627_1.html|title=Computer Hacker Kevin Mitnick Sentenced to Prison |website=fas.org |publisher= Federation of American Scientists| date=June 27, 1997|access-date=February 16, 2020|archive-date=April 15, 2019|archive-url= https://web.archive.org/web/20190415034136/https://fas.org/irp/news/1997/cac70627_1.html|url-status=live}}</ref><ref>{{cite web |title=Kevin Mitnick sentenced to nearly four years in prison; computer hacker ordered to pay restitution to victim companies whose systems were compromised |url=http://www.usdoj.gov/criminal/cybercrime/mitnick.htm |publisher=United States Attorney's Office, Central District of California, U.S. Department of Justice |website= usdoj.gov |archive-url=https://web.archive.org/web/20090926231348/http://www.usdoj.gov/criminal/cybercrime/mitnick.htm |archive-date=September 26, 2009 |date=August 9, 1999 |url-status=dead}}</ref> He was diagnosed with ], but it was not used as evidence because he pleaded guilty before going to trial.<ref>{{cite web|url=https://www.zdnet.com/article/ghost-in-the-wires-the-kevin-mitnick-interview/|title=Ghost in the Wires: The Kevin Mitnick Interview|last=Hess|first=Ken|website=]|date=September 12, 2011|access-date=November 5, 2022|archive-date=November 5, 2022|archive-url=https://web.archive.org/web/20221105223338/https://www.zdnet.com/article/ghost-in-the-wires-the-kevin-mitnick-interview/|url-status=live}}</ref>


Mitnick served five years in prison—four and a half years pre-trial and eight months in ]—because, according to Mitnick, law enforcement officials convinced a judge that he had the ability to "start a nuclear war by whistling into a pay phone",<ref>{{cite news|url=http://news.cnet.com/8301-1009_3-9995253-83.html |title=Social Engineering 101: Mitnick and other hackers show how it's done |date=July 20, 2008 |first=Elinor |last=Mills |work=] |archive-url=https://archive.is/20120713/http://news.cnet.com/8301-1009_3-9995253-83.html |archive-date=July 13, 2012 |url-status=live }}</ref> implying that law enforcement told the judge that he could somehow dial into the NORAD modem via a payphone from prison and communicate with the modem by whistling to launch nuclear missiles.<ref>{{cite news | url = https://www.youtube.com/watch?v=Q1XsJW6X4pc&app=desktop/ | title = Famed hacker to Snowden: Watch out | work = ] }}</ref> In addition, a number of media outlets reported on the unavailability of ] meals at the prison where he was incarcerated.<ref name="kosher">{{cite news|url=https://www.wired.com/politics/law/news/1999/08/21322 |work=Wired |title=Life Not Kosher for Mitnick |date=August 18, 1999 |archive-url=https://archive.is/20120918/http://www.wired.com/politics/law/news/1999/08/21322 |archive-date=September 18, 2012 |url-status=live }}</ref> Mitnick served five years in prison—four-and-a-half years' pre-trial and eight months in ], because, according to Mitnick, law enforcement officials convinced a judge that he had the ability to "start a nuclear war by whistling into a pay phone",<ref>{{cite news|url=https://www.cnet.com/tech/services-and-software/social-engineering-101-mitnick-and-other-hackers-show-how-its-done/ |title=Social Engineering 101: Mitnick and other hackers show how it's done |date=July 20, 2008 |first=Elinor |last=Mills |work=] |archive-url=https://archive.today/20120713/http://news.cnet.com/8301-1009_3-9995253-83.html |archive-date=July 13, 2012 |url-status=live}}</ref> implying that law enforcement told the judge that he could somehow dial into the ] modem via a payphone from prison and ] to launch ].<ref>{{cite news | url = https://www.youtube.com/watch?v=Q1XsJW6X4pc&app=desktop/ | title = Famed hacker to Snowden: Watch out | work = ] | access-date = May 8, 2020 | archive-date = March 30, 2022 | archive-url = https://web.archive.org/web/20220330233351/https://www.youtube.com/watch?v=Q1XsJW6X4pc&app=desktop/ | url-status = live}}</ref> In addition, a number of media outlets reported on the unavailability of ] meals at the prison where he was incarcerated.<ref>{{cite magazine|url=https://www.wired.com/politics/law/news/1999/08/21322 |magazine=Wired |title=Life Not Kosher for Mitnick |date=August 18, 1999 |archive-url=https://archive.today/20120918/http://www.wired.com/politics/law/news/1999/08/21322 |archive-date=September 18, 2012 |url-status=live}}</ref>


He was released on January 21, 2000. During his supervised release, which ended on January 21, 2003, he was initially forbidden to use any communications technology other than a landline telephone.<ref>{{cite web |last1=Bowker |first1=Art |title=Hackers, Sex Offenders, and All the Rest |url=http://www.corrections.com/cybercrime/?p=365 |access-date=14 September 2018}}</ref> Mitnick fought this decision in court, eventually winning a ruling in his favor, allowing him to access the Internet. Under the plea deal, Mitnick was also prohibited from profiting from films or books based on his criminal activity for seven years, under a special judicial ] variation. Mitnick was released from prison on January 21, 2000. During his supervised release period, which ended on January 21, 2003, he was initially forbidden to use any communications technology other than a landline telephone.<ref>{{cite web |last=Bowker |first=Art |title=Hackers, Sex Offenders, and All the Rest |url=http://www.corrections.com/cybercrime/?p=365 |website= corrections.com| publisher= | access-date=September 14, 2018 |archive-date=September 14, 2018 |archive-url= https://web.archive.org/web/20180914061033/http://www.corrections.com/cybercrime/?p=365 |url-status=live}}</ref> Under the plea deal, Mitnick was also prohibited from profiting from films or books based on his criminal activity for seven years, under a variation of the ].<ref>{{Cite web |url= https://www.ulm.edu/news/2016/104-worlds-most-famous-hacker-kevin-mitnick-to-speak-ulm-business-symposium.html|title=World's most famous hacker Kevin Mitnick to speak at ULM Business Symposium|website= ulm.edu|access-date=July 20, 2023|archive-date=December 8, 2022|archive-url= https://web.archive.org/web/20221208100710/https://www.ulm.edu/news/2016/104-worlds-most-famous-hacker-kevin-mitnick-to-speak-ulm-business-symposium.html|url-status=live}}</ref>


In December 2001, an ] Judge ruled that Mitnick was sufficiently rehabilitated to possess a federally issued ] license.<ref>{{cite press release | url = https://www.nytimes.com/2002/12/27/technology/27HACK.html | title = F.C.C. Lets Convicted Hacker Go Back on Net | date = December 27, 2002 | work = New York Times}}</ref> Mitnick now runs Mitnick Security Consulting LLC, a computer security consultancy and is part owner of KnowBe4, provider of an integrated platform for security awareness training and ] testing.<ref name="CoastNoory2019-01-07">{{cite news|url=https://www.coasttocoastam.com/show/2019/01/07|title=Cybercrime & Security|date=January 7, 2019|work=]|last=Noory|first=George|author-link=George Noory|access-date=January 8, 2019}}</ref> In December 2001, a ] (FCC) judge ruled that Mitnick was sufficiently rehabilitated to possess a federally issued ] license.<ref>{{cite news | url = https://www.nytimes.com/2002/12/27/technology/27HACK.html | title = F.C.C. Lets Convicted Hacker Go Back on Net | date = December 27, 2002 | work = ] | access-date = February 19, 2017 | archive-date = March 6, 2016 | archive-url = https://web.archive.org/web/20160306102431/http://www.nytimes.com/2002/12/27/technology/27HACK.html | url-status = live }}</ref>


==== Controversy ==== ==== Controversy ====
Mitnick's criminal activities, arrest, and trial, along with the associated journalism, were all controversial.<ref name=kroll /> Though Mitnick has been convicted of copying software unlawfully,<ref>{{cite web|url=https://www.latimes.com/archives/la-xpm-1999-mar-27-fi-21393-story.html|title=Judge Accepts Mitnick's Guilty Plea on 7 Counts|last=Miller|first=Greg|date=March 27, 1999|work=]|access-date=February 16, 2020}}</ref> his supporters argue that his punishment was excessive and that many of the charges against him were fraudulent<ref>{{cite web | archive-url = https://web.archive.org/web/20060424153130/http://www.freekevin.com/about.html | url = http://www.freekevin.com/about.html | archive-date = April 24, 2006 | title = About Kevin's Case | work = Free Kevin Mitnick | first = Donald C. | last = Randolph}}</ref> and not based on actual losses.<ref>{{cite web | archive-url = https://web.archive.org/web/20051222124635/http://www.freekevin.com/060799defmot.html | url = http://www.freekevin.com/060799defmot.html | archive-date = December 22, 2005 | title = Defense consolidated motion for sanctions and for reconsideration of motion for discovery and application for expert fees based upon new facts | work = Free Kevin Mitnick | date =June 7, 1999}}</ref> Mitnick's criminal activities, arrest, and trial, along with the associated journalism, were all controversial.<ref name="kroll" /> Though Mitnick was convicted of copying software unlawfully,<ref>{{cite web|url=https://www.latimes.com/archives/la-xpm-1999-mar-27-fi-21393-story.html|title=Judge Accepts Mitnick's Guilty Plea on 7 Counts |last= Miller |first=Greg|date=March 27, 1999|work=]|access-date=February 16, 2020|archive-date=April 15, 2019|archive-url= https://web.archive.org/web/20190415034146/https://www.latimes.com/archives/la-xpm-1999-mar-27-fi-21393-story.html|url-status=live}}</ref> his supporters argue that his punishment was excessive and that many of the charges against him were fraudulent<ref>{{cite web | archive-url = https://web.archive.org/web/20060424153130/http://www.freekevin.com/about.html | url = http://www.freekevin.com/about.html | archive-date = April 24, 2006 | title = About Kevin's Case | work = Free Kevin Mitnick | first = Donald C. | last = Randolph}}</ref> and not based on actual losses.<ref>{{cite web | archive-url = https://web.archive.org/web/20051222124635/http://www.freekevin.com/060799defmot.html | url = http://www.freekevin.com/060799defmot.html | archive-date = December 22, 2005 | title = Defense consolidated motion for sanctions and for reconsideration of motion for discovery and application for expert fees based upon new facts | work = Free Kevin Mitnick | date =June 7, 1999}}</ref>


] and ], who had both been part of the pursuit of Mitnick, wrote the book ''Takedown'' about Mitnick's capture.<ref>{{Cite book |last= Shimomura |first=Tsutomo |title=Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw - By the Man Who Did It |last2=Markoff |first2=John |publisher=Hyperion |year=1996 |isbn=978-0786862108}}</ref>
In his 2002 book, ''The Art of Deception'', Mitnick states that he compromised computers solely by using passwords and codes that he gained by ]. He claims he did not use software programs or hacking tools for cracking passwords or otherwise exploiting computer or phone security.


The case against Mitnick tested the new laws that had been enacted for dealing with computer crime and it raised public awareness of security involving networked computers. The controversy remains and the Mitnick story is often cited today as an example of the ] personnel.<ref>{{cite web | url=http://edition.cnn.com/SPECIALS/1999/mitnick.background/ | title=The trials of Kevin Mitnick | date=March 18, 1999 | access-date=December 11, 2018 | first=John |last=Christensen | archive-date=December 8, 2018 | archive-url= https://web.archive.org/web/20181208015525/http://edition.cnn.com/SPECIALS/1999/mitnick.background/ | url-status=live}}</ref>
] and ], who had both been part of the pursuit of Mitnick, wrote the book ''Takedown'' about Mitnick's capture.

The case against Mitnick tested the new laws that had been enacted for dealing with computer crime, and it raised public awareness of security involving networked computers. The controversy remains, however, and the Mitnick story is often cited today as an example of the ].<ref name="John Christensen">{{cite web | url=http://edition.cnn.com/SPECIALS/1999/mitnick.background/ | title=The trials of Kevin Mitnick | date=18 March 1999 | access-date=11 December 2018 | author= John Christensen}}</ref>


=== Consulting === === Consulting ===
After his release in 2000, Mitnick became a paid security consultant, public speaker, and author. He carried out security consulting for, performed penetration testing services, and taught social engineering classes to companies and government agencies. He ran Mitnick Security Consulting LLC, a computer security consultancy and was part owner of ], provider of an integrated platform for security awareness training and ] testing,<ref>{{cite news|url=https://www.coasttocoastam.com/show/2019/01/07|title=Cybercrime & Security|date=January 7, 2019|work=]|last=Noory|first=George|author-link=George Noory|access-date=January 8, 2019|archive-date=January 8, 2019|archive-url=https://web.archive.org/web/20190108014033/https://www.coasttocoastam.com/show/2019/01/07|url-status=live}}</ref><ref>{{Cite press release|url=https://www.prnewswire.com/news-releases/kevin-mitnick-partners-with-knowbe4-159403195.html|title=Kevin Mitnick Partners With KnowBe4|last=KnowBe4|website=prnewswire.com|language=en|access-date=April 18, 2020|archive-date=May 10, 2021|archive-url=https://web.archive.org/web/20210510091105/https://www.prnewswire.com/news-releases/kevin-mitnick-partners-with-knowbe4-159403195.html|url-status=live}}</ref> as well as an active advisory board member at ],<ref>{{cite web|url=http://blogs.computerworld.com/security/20712/interview-worlds-most-famous-hacker-kevin-mitnick-mobile-security-zimperium|title=Interview: World's most famous hacker, Kevin Mitnick, on mobile security & Zimperium|author=Darlene Storm|date=July 19, 2012|work=Computerworld|url-status=dead|archive-url=https://web.archive.org/web/20131226121347/http://blogs.computerworld.com/security/20712/interview-worlds-most-famous-hacker-kevin-mitnick-mobile-security-zimperium|archive-date=December 26, 2013}}</ref> a firm that develops a mobile intrusion prevention system.<ref>{{cite web|url=https://techcrunch.com/2013/12/20/zimperium-raises-8m-for-mobile-security-that-turns-the-tables-on-attackers|title=Zimperium Raises $8M For Mobile Security That Turns The Tables On Attackers|author=Alex Williams|publisher=AOL|work=TechCrunch|date=December 20, 2013|access-date=June 25, 2017|archive-date=August 13, 2017|archive-url=https://web.archive.org/web/20170813060207/https://techcrunch.com/2013/12/20/zimperium-raises-8m-for-mobile-security-that-turns-the-tables-on-attackers/|url-status=live}}</ref>
Since 2000, Mitnick has been a paid security consultant, public speaker and author. He does security consulting for Fortune 500 companies and the FBI, performs penetration testing services for the world's largest companies and teaches Social Engineering classes to dozens of companies and government agencies. His company Mitnick Security Consulting, is based in Las Vegas, Nevada<ref>{{Cite web|title=Kevin Mitnick's Security Advice|url=https://www.wired.com/2006/11/kevin-mitnicks-security-advice/|website=Wired}}</ref> where he currently resides. His custom metal business cards also serve as lock picking kits.<ref>{{cite news |last1=Shellenbarger |first1=Sue |title=Business Cards Aren't Dead, They're Just Getting Weirder |url=https://www.wsj.com/articles/business-cards-arent-dead-theyre-just-getting-weirder-1516717378 |newspaper=The Wall Street Journal |access-date=24 September 2018}}</ref><ref>{{cite news |last1=Heber |first1=Alex |title=This hacker's business card has a built-in lock picking set |url=https://www.businessinsider.com.au/this-hackers-business-card-has-a-built-in-lock-picking-set-2015-5 |access-date=24 September 2018 |work=Business Insider Australia |date=5 May 2015}}</ref>
He resided in Las Vegas, Nevada.<ref>{{Cite magazine|title=Kevin Mitnick's Security Advice|url=https://www.wired.com/2006/11/kevin-mitnicks-security-advice/|magazine=]|date=November 15, 2006|access-date=July 20, 2020|archive-date=July 20, 2020|archive-url=https://web.archive.org/web/20200720232811/https://www.wired.com/2006/11/kevin-mitnicks-security-advice/|url-status=live}}</ref>

== Death ==
Kevin Mitnick died from ] on July 16, 2023, at the age of 59 at a Pittsburgh, Pennsylvania hospital.<ref name="nyt" /> At the time of his death, he was married and his wife, Kimberley Mitnick, was pregnant with their first child, a son.<ref name="WaPoObit">{{cite news |last=Cho |first=Kelly Kasulis |title=Kevin Mitnick, hacker and fugitive turned security consultant, dies at 59 |url=https://www.washingtonpost.com/obituaries/2023/07/20/kevin-mitnick-hacker-dies/ |access-date=July 20, 2023 |newspaper=] |date=July 20, 2023 |archive-date=July 20, 2023 |archive-url=https://web.archive.org/web/20230720120212/https://www.washingtonpost.com/obituaries/2023/07/20/kevin-mitnick-hacker-dies/ |url-status=live}}</ref><ref name="nyt" /><ref>{{cite web |title=Kevin David Mitnick |url=https://www.dignitymemorial.com/obituaries/las-vegas-nv/kevin-mitnick-11371668 |website=Dignity Memorial |access-date=July 20, 2023 |archive-date=July 20, 2023 |archive-url=https://web.archive.org/web/20230720015722/https://www.dignitymemorial.com/obituaries/las-vegas-nv/kevin-mitnick-11371668 |url-status=live}}</ref><ref>{{cite web |title=Famed Hacker Kevin Mitnick Dead at 59 |url=https://www.securityweek.com/famed-hacker-kevin-mitnick-dead-at-59/ |website=SecurityWeek News |date=July 20, 2023 |access-date=July 20, 2023 |archive-date=July 20, 2023 |archive-url=https://web.archive.org/web/20230720031415/https://www.securityweek.com/famed-hacker-kevin-mitnick-dead-at-59/ |url-status=live}}</ref><ref>{{Cite web |title=x.com |url=https://x.com/kminx/status/1682027234796924928 |archive-url=http://web.archive.org/web/20240809110404/https://x.com/kminx/status/1682027234796924928 |archive-date=2024-08-09 |access-date=2024-12-11 |website=X (formerly Twitter)}}</ref>


== Media == == Media ==
], Kevin Mitnick, and ] (photo ca. 2001)]] ] (arrested 2003), Kevin Mitnick, and reformed hacker ] (released from prison 1996) (photo {{c.}} 2001)]]


In 2000, ] and ] portrayed Kevin Mitnick and ] in the movie '']'' (known as ''Takedown'' outside the USA), which was based on the book '']'' by John Markoff and Tsutomu Shimomura. The DVD was released in September 2004.<ref>{{cite video | people = Skeet Ulrich, Russell Wong | title = Track Down | medium = DVD | publisher = Dimension Studios |date = 2004}}</ref> A documentary named '']'' was produced by '']'' in response to '']''. In 2000, ] and ] portrayed Mitnick and Tsutomu Shimomura, respectively, in the movie '']'' (known as ''Takedown'' outside the US), which was based on the book ''Takedown'' by John Markoff and Shimomura. The DVD was released in September 2004.<ref>{{Cite web|url=http://www.tcm.com/tcmdb/title/453847/takedown/|title=Takedown|website=tcm.com|access-date=July 20, 2023|archive-date=March 7, 2023|archive-url=https://web.archive.org/web/20230307100508/https://www.tcm.com/tcmdb/title/453847/takedown/|url-status=live}}</ref>


Mitnick also appeared in ]'s documentary '']'' (2016).<ref>{{Cite web|url=https://www.mitnicksecurity.com/in-the-news/lo-and-behold|title=Lo and Behold|first=Mitnick|last=Security|website=mitnicksecurity.com|access-date=July 20, 2023|archive-date=July 20, 2023|archive-url=https://web.archive.org/web/20230720184803/https://www.mitnicksecurity.com/in-the-news/lo-and-behold|url-status=live}}</ref>
On August 18, 2011, Mitnick appeared on '']'' to talk about his new book, ''Ghost in the Wires''.<ref>{{cite web|url=http://www.colbertnation.com/the-colbert-report-videos/395003/august-18-2011/kevin-mitnick |title=Kevin Mitnick – The Colbert Report |date=August 18, 2011 |work=The Colbert Report |publisher=Comedy Central |access-date=September 12, 2011 |location=video clip |archive-url=https://archive.is/20120723/http://www.colbertnation.com/the-colbert-report-videos/395003/august-18-2011/kevin-mitnick |archive-date=July 23, 2012 |url-status=live }}</ref> On August 23, Mitnick was interviewed on '']'' during the episode "Hacking & Technology".<ref>{{cite web|url=http://www.coasttocoastam.com/show/2011/08/23 |title=Hacking & Technology |date=August 23, 2011 |work=Coast To Coast AM With George Noory |access-date=September 12, 2011 |archive-url=https://archive.is/20120723/http://www.coasttocoastam.com/show/2011/08/23 |archive-date=July 23, 2012 |url-status=live }}</ref> On August 24, he appeared on the ] network's ''Triangulation'' episode.<ref>{{cite web|url=http://www.twit.tv/tri21 |title=Triangulation #21 |date=August 24, 2011 |publisher=TWiT |access-date=September 12, 2011 |archive-url=https://archive.is/20120918/http://www.twit.tv/tri21 |archive-date=September 18, 2012 |url-status=live }}</ref>

On September 12, 2011, Mitnick answered readers' questions on the technology news site '']''.<ref>{{cite news|url=http://news.slashdot.org/story/11/09/12/1234252/Kevin-Mitnick-Answers |title=Kevin Mitnick Answers |author=timothy |date=September 12, 2011 |work=Slashdot |publisher=Geeknet Inc. |access-date=September 12, 2011 |archive-url=https://archive.is/20120711/http://news.slashdot.org/story/11/09/12/1234252/Kevin-Mitnick-Answers |archive-date=July 11, 2012 |url-status=live }}</ref> This was the second time he was interviewed on ''Slashdot'', the first time being in February 2003.<ref>{{cite news|url=http://slashdot.org/story/03/02/04/2233250/Kevin-Mitnick-Answers |title=Kevin Mitnick Answers |author=Roblimo |date=February 5, 2011 |work=Slashdot |publisher=Geeknet Inc. |access-date=September 12, 2011 |archive-url=https://archive.is/20120718/http://slashdot.org/story/03/02/04/2233250/Kevin-Mitnick-Answers |archive-date=July 18, 2012 |url-status=live }}</ref>

Mitnick's story was a partial inspiration for '']'', ]'s ] about hackers.

Mitnick also appeared in ]'s documentary '']'' (2016).


==Books== ==Books==
===Written by Mitnick=== ===Written by Mitnick===
Mitnick is the co-author, with William L. Simon and Robert Vamosi, of four books, three on ] and his autobiography: Mitnick is the co-author, with William L. Simon and Robert Vamosi, of four books, three on ] and an autobiography:
* (2003) '']''<ref>{{cite book | last1 = Mitnick | first1 = Kevin | first2 = William L. | last2 = Simon | title = The Art of Deception: Controlling the Human Element of Security | publisher = Wiley Books | date = October 2003 | url = http://www.wiley.com/WileyCDA/WileyTitle/productCd-076454280X.html | isbn = 978-0-7645-4280-0}}</ref> * (2002) '']: Controlling the Human Element of Security''<ref>{{cite book | last1 = Mitnick | first1 = Kevin | first2 = William L. | last2 = Simon | title = The Art of Deception: Controlling the Human Element of Security | publisher = Wiley Books | date = October 2003 | url = http://www.wiley.com/WileyCDA/WileyTitle/productCd-076454280X.html | isbn = 978-0-7645-4280-0 | access-date = January 14, 2009 | archive-date = April 25, 2011 | archive-url = https://web.archive.org/web/20110425155520/http://www.wiley.com/WileyCDA/WileyTitle/productCd-076454280X.html | url-status = live}}</ref>
* (2005) ]<ref>{{cite book | last1 = Mitnick | first1 = Kevin | first2 = William L. | last2 = Simon | title = The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers | publisher = Wiley Books | date = December 27, 2005 | url = http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html | isbn = 978-0-7645-6959-3}}</ref> * (2005) '']: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers''<ref>{{cite book | last1 = Mitnick | first1 = Kevin | first2 = William L. | last2 = Simon | title = The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers | publisher = Wiley Books | date = December 27, 2005 | url = http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html | isbn = 978-0-7645-6959-3 | access-date = January 14, 2009 | archive-date = May 14, 2011 | archive-url = https://web.archive.org/web/20110514113820/http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html | url-status = live}}</ref>
* (2011) ''Ghost in the Wires: My Adventures as the World's Most Wanted Hacker''<ref>{{cite book | last1 = Mitnick | first1 = Kevin | first2 = William L. | last2 = Simon | title = Ghost in the Wires: My Adventures as the World's Most Wanted Hacker | publisher = Little, Brown and Company | year = 2011 | url = https://archive.org/details/ghostinwiresmya00mitn_0 | isbn = 978-0-316-03770-9 | url-status = dead | df = mdy-all | access-date = August 27, 2019 | archive-url = https://web.archive.org/web/20111104215522/http://www.hachettebookgroup.com/books_9780316037709.htm | archive-date = November 4, 2011 }}</ref> * (2011) ''Ghost in the Wires: My Adventures as the World's Most Wanted Hacker''<ref name="ghostinwiresmya00mitn_0">{{cite book | last1 = Mitnick | first1 = Kevin | first2 = William L. | last2 = Simon | title = Ghost in the Wires: My Adventures as the World's Most Wanted Hacker | url = https://archive.org/details/ghostinwiresmya00mitn_0 | publisher = Little, Brown and Company | year = 2011 | isbn = 978-0-316-03770-9 | url-status = dead | df = mdy-all | access-date = August 27, 2019 | archive-url = https://web.archive.org/web/20111104215522/http://www.hachettebookgroup.com/books_9780316037709.htm | archive-date = November 4, 2011}}</ref>
* (2017) '']''<ref>{{cite book | last1 = Mitnick | first1 = Kevin | first2 = Robert | last2 = Vamosi | title = The Art of Invisibility | publisher = Little, Brown and Company | date = February 2017 | url = https://www.littlebrown.com/titles/kevin-mitnick/the-art-of-invisibility/9780316380492/ | isbn = 978-0-3163-8049-2 }}</ref> * (2017) ''The Art of Invisibility''<ref>{{cite book | last1 = Mitnick | first1 = Kevin | first2 = Robert | last2 = Vamosi | title = The Art of Invisibility | publisher = Little, Brown and Company | date = February 2017 | url = https://www.littlebrown.com/titles/kevin-mitnick/the-art-of-invisibility/9780316380492/ | isbn = 978-0-3163-8049-2 | access-date = July 2, 2019 | archive-date = July 2, 2019 | archive-url = https://web.archive.org/web/20190702032805/https://www.littlebrown.com/titles/kevin-mitnick/the-art-of-invisibility/9780316380492/ | url-status = live}}</ref>


===Authorized by Mitnick=== ===Authorized by Mitnick===
*(1996) ''The Fugitive Game: Online with Kevin Mitnick'', ]<ref>{{Cite web|url=https://www.cnbc.com/2016/06/06/the-greed-report-these-white-collar-manhunts-will-make-your-head-spin.html|title=Greed Report: These White-Collar Manhunts Will Make Your Head Spin|first=Scott|last=Cohn|date=July 26, 2016|website=CNBC|access-date=July 20, 2023|archive-date=February 24, 2023|archive-url=https://web.archive.org/web/20230224204925/https://www.cnbc.com/2016/06/06/the-greed-report-these-white-collar-manhunts-will-make-your-head-spin.html|url-status=live}}</ref>
*(1996) ''The Fugitive Game: Online with Kevin Mitnick''. In this book author ] presented Mitnick's account of his story,<ref name="Hafner">{{cite web|last=Hafner |first=Katie |url=https://www.amazon.com/gp/product/0316528692 |title=The Fugitive Game: Online with Kevin Mitnick: Jonathan Littman: Books |access-date=2011-05-16}}</ref> as John Markoff's book "''Takedown''" (1996) and Jeff Goodell's "''Cyberthief and the Samurai''" (1996) presented Shimomura's side (when Mitnick was legally unable to publish and profit from his own story).


==See also== ==See also==
* ] * ]
* ]
* "]" * "]"
* ]
* '']'' * '']''


Line 103: Line 105:


==Bibliography== ==Bibliography==
===Movie=== ===Movies===
*{{imdb-title|0309614| Freedom Downtime}} *{{IMDb title|0309614| Freedom Downtime}}


===Books=== ===Books===
Line 122: Line 124:
{{Refbegin}} {{Refbegin}}
* {{cite news * {{cite news
|url = https://dl.dropboxusercontent.com/u/4689551/kevin-mitnick.pdf |url = https://dl.dropboxusercontent.com/u/4689551/kevin-mitnick.pdf
|last = Littman |last = Littman
|first = Jonathan |first = Jonathan
|title = The Invisible Digital Man |title = The Invisible Digital Man
|work = Playboy |work = Playboy
|date = June 2007 |date = June 2007
|url-status = dead |url-status = dead
|archive-url = https://web.archive.org/web/20160304023104/https://dl.dropboxusercontent.com/u/4689551/kevin-mitnick.pdf |archive-url = https://web.archive.org/web/20160304023104/https://dl.dropboxusercontent.com/u/4689551/kevin-mitnick.pdf
|archive-date = March 4, 2016 |archive-date = March 4, 2016
|df = mdy-all |df = mdy-all
}} }}
* {{cite news * {{cite news
Line 140: Line 142:
|url=http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2000/05/04/BU71498.DTL |url=http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2000/05/04/BU71498.DTL
|work=San Francisco Chronicle |work=San Francisco Chronicle
|access-date=April 24, 2007}} |access-date=April 24, 2007
|archive-date=May 25, 2011
|archive-url=https://web.archive.org/web/20110525043206/http://www.sfgate.com/cgi-bin/article.cgi?file=%2Fchronicle%2Farchive%2F2000%2F05%2F04%2FBU71498.DTL
|url-status=live
}}
* {{cite news * {{cite news
|title=From Being Hunted By The FBI To Working Alongside Them- Kevin Mitnick |title=From Being Hunted By The FBI To Working Alongside Them- Kevin Mitnick
Line 147: Line 153:
|url=https://blog.appknox.com/from-being-hunted-by-the-fbi-to-working-alongside-them-kevin-mitnick/ |url=https://blog.appknox.com/from-being-hunted-by-the-fbi-to-working-alongside-them-kevin-mitnick/
|work=Appknox |work=Appknox
|access-date=May 27, 2016}} |access-date=May 27, 2016
|archive-date=August 5, 2016
|archive-url=https://web.archive.org/web/20160805004757/https://blog.appknox.com/from-being-hunted-by-the-fbi-to-working-alongside-them-kevin-mitnick/
|url-status=live
}}
* {{cite news * {{cite news
|title=Renowned security expert Kevin Mitnick can steal your identity in 3 minutes |title=Renowned security expert Kevin Mitnick can steal your identity in 3 minutes
|first=Thomas |first=Thomas
|last=Ehrlich |last=Ehrlich
|url=https://www.forbes.com/sites/ehrlichfu/2014/08/15/renowned-security-expert-kevin-mitnick-can-steal-your-identity-in-3-minutes/ |url=https://www.forbes.com/sites/ehrlichfu/2014/08/15/renowned-security-expert-kevin-mitnick-can-steal-your-identity-in-3-minutes/
|work=Forbes |work=Forbes
|access-date=July 17, 2015}} |access-date=July 17, 2015
|archive-date=July 22, 2015
|archive-url=https://web.archive.org/web/20150722064416/http://www.forbes.com/sites/ehrlichfu/2014/08/15/renowned-security-expert-kevin-mitnick-can-steal-your-identity-in-3-minutes/
|url-status=live
}}
{{Refend}} {{Refend}}


Line 168: Line 182:
{{DEFAULTSORT:Mitnick, Kevin}} {{DEFAULTSORT:Mitnick, Kevin}}
] ]
] ]
] ]
] ]
] ]
] ]
] ]
] ]
] ]
]
]
]
]
]
]
]
]
]

Latest revision as of 06:10, 18 December 2024

American hacker (1963–2023)

Kevin Mitnick
Mitnick in 2010
BornKevin David Mitnick
(1963-08-06)August 6, 1963
Los Angeles, California, U.S.
DiedJuly 16, 2023(2023-07-16) (aged 59)
Pittsburgh, Pennsylvania, U.S.
Other namesThe Condor, The Darkside Hacker
Occupations
Organizations
  • Mitnick Security Consulting
  • Chief Hacking Officer at KnowBe4, Inc
Board member ofKnowBe4
Criminal charge(s)1995: Wire fraud (14 counts), possession of unauthorized access devices (8 counts), interception of wire or electronic communications, unauthorized access to a federal computer, and causing damage to a computer
Criminal penalty
  • 1998: One year prison
  • 1999: 46 months prison plus 3 years probation
Spouse Kimberley Mitnick ​(m. 2022)
Call signN6NHG
Websitewww.mitnicksecurity.com

Kevin David Mitnick (August 6, 1963 – July 16, 2023) was an American computer security consultant, author, and convicted hacker. He is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes. Mitnick's pursuit, arrest, trial and sentence were all controversial, as were the associated media coverage, books and films. After his release from prison, he ran his own security firm, Mitnick Security Consulting, LLC, and was also involved with other computer security businesses.

Early life and education

Mitnick was born on August 6, 1963, in Van Nuys, Los Angeles, California. His father was Alan Mitnick, his mother was Shelly Jaffe, and his maternal grandmother was Reba Vartanian. Mitnick was Jewish, and grew up in Los Angeles, California. At age 12, Mitnick convinced a bus driver to tell him where he could buy his own ticket punch for "a school project", and was then able to ride any bus in the greater Los Angeles area using unused transfer slips he found in a dumpster next to the bus company garage.

Mitnick attended James Monroe High School in North Hills, during which time he became a licensed amateur radio operator with callsign WA6VPS (his license was restored after imprisonment with callsign N6NHG). He chose the nickname "Condor" after watching the movie Three Days of the Condor. He was later enrolled at Los Angeles Pierce College and USC.

Career

For a time, Mitnick worked as a receptionist for Stephen S. Wise Temple in Los Angeles.

Computer hacking

Mitnick gained unauthorized access to a computer network in 1979, at 16, when a friend gave him the telephone number for the Ark, the computer system that Digital Equipment Corporation (DEC) used for developing its RSTS/E operating system software. He broke into DEC's computer network and copied the company's software, a crime for which he was charged and convicted in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into Pacific Bell voicemail computers. After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two-and-a-half years.

According to the United States Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private emails.

Arrest, conviction, and incarceration

Black sans serif text "FREE KEVIN" on a yellow background
Supporters from 2600 Magazine distributed "Free Kevin" bumper stickers.

After a well-publicized pursuit, the Federal Bureau of Investigation arrested Mitnick on February 15, 1995 at his apartment in Raleigh, North Carolina, on federal offenses related to a two-and-a-half-year period of computer hacking that included computer and wire fraud. He was found with cloned cell phones, more than 100 cloned cellular phone codes, and multiple pieces of false identification.

In December 1997, the Yahoo! Web site was hacked, displaying a message calling for Mitnick's release. According to the message, all recent visitors of Yahoo!'s site had been infected with a computer worm that would wreak havoc on Christmas Day unless Mitnick was released. Yahoo! dismissed the claims as a hoax and said that the worm was nonexistent.

In 1998, Mitnick was charged in the United States District Court for the Central District of California with 14 counts of wire fraud, eight counts of possession of unauthorized access devices, interception of wire or electronic communications, unauthorized access to a federal computer, and causing damage to a computer. As part of a plea bargain, Mitnick pleaded guilty in 1999 to four counts of wire fraud, two counts of computer fraud, and one count of illegally intercepting a wire communication. U.S. district judge Mariana Pfaelzer sentenced Mitnick to 46 months in federal prison plus 22 months for violating the terms of his 1989 supervised release sentence for computer fraud. He admitted to violating the terms of supervised release by hacking into Pacific Bell voicemail and other systems and to associating with known computer hackers, in this case co-defendant Lewis De Payne. He was diagnosed with Asperger syndrome, but it was not used as evidence because he pleaded guilty before going to trial.

Mitnick served five years in prison—four-and-a-half years' pre-trial and eight months in solitary confinement, because, according to Mitnick, law enforcement officials convinced a judge that he had the ability to "start a nuclear war by whistling into a pay phone", implying that law enforcement told the judge that he could somehow dial into the NORAD modem via a payphone from prison and communicate with the modem by whistling to launch nuclear missiles. In addition, a number of media outlets reported on the unavailability of kosher meals at the prison where he was incarcerated.

Mitnick was released from prison on January 21, 2000. During his supervised release period, which ended on January 21, 2003, he was initially forbidden to use any communications technology other than a landline telephone. Under the plea deal, Mitnick was also prohibited from profiting from films or books based on his criminal activity for seven years, under a variation of the Son of Sam law.

In December 2001, a Federal Communications Commission (FCC) judge ruled that Mitnick was sufficiently rehabilitated to possess a federally issued amateur radio license.

Controversy

Mitnick's criminal activities, arrest, and trial, along with the associated journalism, were all controversial. Though Mitnick was convicted of copying software unlawfully, his supporters argue that his punishment was excessive and that many of the charges against him were fraudulent and not based on actual losses.

John Markoff and Tsutomu Shimomura, who had both been part of the pursuit of Mitnick, wrote the book Takedown about Mitnick's capture.

The case against Mitnick tested the new laws that had been enacted for dealing with computer crime and it raised public awareness of security involving networked computers. The controversy remains and the Mitnick story is often cited today as an example of the influence of news media on law enforcement personnel.

Consulting

After his release in 2000, Mitnick became a paid security consultant, public speaker, and author. He carried out security consulting for, performed penetration testing services, and taught social engineering classes to companies and government agencies. He ran Mitnick Security Consulting LLC, a computer security consultancy and was part owner of KnowBe4, provider of an integrated platform for security awareness training and simulated phishing testing, as well as an active advisory board member at Zimperium, a firm that develops a mobile intrusion prevention system. He resided in Las Vegas, Nevada.

Death

Kevin Mitnick died from pancreatic cancer on July 16, 2023, at the age of 59 at a Pittsburgh, Pennsylvania hospital. At the time of his death, he was married and his wife, Kimberley Mitnick, was pregnant with their first child, a son.

Media

Hacker Adrian Lamo (arrested 2003), Kevin Mitnick, and reformed hacker Kevin Poulsen (released from prison 1996) (photo c. 2001)

In 2000, Skeet Ulrich and Russell Wong portrayed Mitnick and Tsutomu Shimomura, respectively, in the movie Track Down (known as Takedown outside the US), which was based on the book Takedown by John Markoff and Shimomura. The DVD was released in September 2004.

Mitnick also appeared in Werner Herzog's documentary Lo and Behold, Reveries of the Connected World (2016).

Books

Written by Mitnick

Mitnick is the co-author, with William L. Simon and Robert Vamosi, of four books, three on computer security and an autobiography:

  • (2002) The Art of Deception: Controlling the Human Element of Security
  • (2005) The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
  • (2011) Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
  • (2017) The Art of Invisibility

Authorized by Mitnick

See also

References

  1. ^ Gengler, Barbara (1999). "Super-hacker Kevin Mitnick takes a plea". Computer Fraud & Security. 1999 (5): 6. doi:10.1016/S1361-3723(99)90141-0.
  2. "Kevin Mitnick's Federal Indictment". sourcedns.com. Archived from the original on May 18, 2014. Retrieved September 13, 2014.
  3. "#089 Fugitive Computer Hacker Arrested in North Carolina". justice.gov. Archived from the original on June 13, 2013.
  4. "HEARING DESIGNATION ORDER (FCC 01-359)" (PDF). Federal Communications Commission. December 21, 2001. Archived (PDF) from the original on August 3, 2015. Retrieved December 3, 2015.
  5. "Kevin Mitnick sentenced to nearly four years in prison; computer hacker ordered to pay restitution to victim companies whose systems were compromised". justice.gov (Press release). United States Attorney's Office, Central District of California. August 9, 1999. Archived from the original on June 13, 2013.
  6. ^ Kroll, Jason (January 21, 2000). "Free Kevin, Kevin Freed". Linux Journal. Archived from the original on December 7, 2017.
  7. "Ex-hacker reveals tricks of the trade". AsiaOne Digital. Archived from the original on July 23, 2015.
  8. ^ Cho, Kelly Kasulis (July 20, 2023). "Kevin Mitnick, hacker and fugitive turned security consultant, dies at 59". The Washington Post. Archived from the original on July 20, 2023. Retrieved July 20, 2023.
  9. Hackers League (May 31, 2019). "Kevin Mitnick". Medium. Archived from the original on July 20, 2023. Retrieved July 20, 2023.
  10. ^ Albeck-Ripka, Livia; Mayorquin, Orlando (July 20, 2023). "Kevin Mitnick, Hacker Who Once Eluded Authorities, Is Dead at 59". The New York Times. Archived from the original on July 21, 2023. Retrieved July 21, 2023.
  11. "Freedom Downtime - The Story of Kevin Mitnick (2001)". CosmoLearning. August 20, 2009. Archived from the original on September 6, 2023. Retrieved September 6, 2023.
  12. Percival, Richard (July 21, 2023). "Famed US hacker Kevin Mitnick, once dubbed 'America's most wanted', dies aged 59". The Jewish Chronicle. Retrieved July 14, 2024. The Jewish cybercriminal...
  13. Bresky, Ben (July 24, 2012). ""Hacker" Kevin Mitnick's Dramatic Turnaround". Arutz Sheva. Retrieved July 14, 2024. In the book, released in 2011, Mitnick briefly describes his bar mitzvah and secular Jewish upbringing in California.
  14. Greene, Thomas C. (January 13, 2003). "Chapter One: Kevin Mitnick's story". The Register. Archived from the original on September 12, 2012.
  15. ^ Mitnick, Kevin; Simon, William L. (2011). Ghost in the Wires: My Adventures as the World's Most Wanted Hacker. Little, Brown and Company. ISBN 978-0-316-03770-9. Archived from the original on November 4, 2011. Retrieved August 27, 2019.
  16. "Hacker Arraigned in Computer Fraud Case". Los Angeles Times. October 1, 1996. Archived from the original on July 20, 2023. Retrieved July 20, 2023. ... as a student at James Monroe High School in North Hills, he broke into the Los Angeles Unified School District's computers.
  17. Mills, Elinor (June 22, 2009). "Q&A: Kevin Mitnick, from ham operator to fugitive to consultant". cnet.com. CNET. Archived from the original on December 28, 2017. Retrieved December 18, 2017.
  18. "Mitnick Granted Ham License". Wired. Associated Press. December 27, 2002. Archived from the original on July 20, 2023. Retrieved August 3, 2023.
  19. Poole, Hilary W.; Lambert, Laura; Woodford, Chris; Moschovitis, Christos J. P. (2005). The Internet : a historical encyclopedia. Santa Barbara, California: ABC-Clio. ISBN 1-85109-664-7. OCLC 62211803. Archived from the original on July 20, 2023. Retrieved June 21, 2022.
  20. "The Missing Chapter from The Art of Deception by Kevin Mitnick". thememoryhole.org. Archived from the original on March 17, 2009. Retrieved February 16, 2020.
  21. Johnson, John; Ostrow, Ronald J.; Meyer, Josh (February 16, 1995). "Fugitive North Hills Hacker Arrested in N. Carolina : Crime: Kevin Mitnick eluded authorities for two years. He is alleged to have cost victims millions". Los Angeles Times. Archived from the original on June 27, 2023. Retrieved July 20, 2023.
  22. Tamaki, Julie (September 27, 1996). "Famed Hacker Is Indicted by U.S. Grand Jury". Los Angeles Times. Archived from the original on July 22, 2023. Retrieved July 22, 2023.
  23. ^ Rose, E. Brian (December 1, 2015). Millionaire Within: Untold Stories from the Internet Underworld. Morgan James Publishing. p. 22. ISBN 978-1-63047-346-4. Archived from the original on July 22, 2023. Retrieved July 22, 2023.
  24. Byrne, Michael (September 27, 2014). "Kevin Mitnick Offers a Peek Inside the Cryptic Zero-Day Marketplace". Vice. Archived from the original on July 22, 2023. Retrieved July 22, 2023.
  25. "Freedom Downtime - The Story of Kevin Mitnick". archive.org. October 23, 2016. Retrieved May 14, 2019.
  26. "Fugitive computer hacker arrested in North Carolina". usdoj.gov (Press release). United States Department of Justice. February 15, 1995. Archived from the original on June 29, 2012.
  27. The Colbert Report
  28. Painter, Christopher M. E. (March 2001). "Supervised Release and Probation Restrictions in Hacker Cases" (PDF). United States Attorneys' USA Bulletin. 49 (2). Executive Office for United States Attorneys. Archived (PDF) from the original on July 21, 2015. Retrieved April 19, 2015.
  29. "Yahoo Hack: Heck of a Hoax". Wired. December 9, 1997. Archived from the original on June 28, 2024. Retrieved February 6, 2019.
  30. Original text posted to Yahoo's website at archive.org
  31. Hesseldahl, Arik (September 4, 1998). "Hacker Can't Get Access". Wired. Archived from the original on July 20, 2023. Retrieved July 20, 2023 – via wired.com.
  32. "Computer Hacker Kevin Mitnick Sentenced to Prison". fas.org. Federation of American Scientists. June 27, 1997. Archived from the original on April 15, 2019. Retrieved February 16, 2020.
  33. "Kevin Mitnick sentenced to nearly four years in prison; computer hacker ordered to pay restitution to victim companies whose systems were compromised". usdoj.gov. United States Attorney's Office, Central District of California, U.S. Department of Justice. August 9, 1999. Archived from the original on September 26, 2009.
  34. Hess, Ken (September 12, 2011). "Ghost in the Wires: The Kevin Mitnick Interview". ZDNET. Archived from the original on November 5, 2022. Retrieved November 5, 2022.
  35. Mills, Elinor (July 20, 2008). "Social Engineering 101: Mitnick and other hackers show how it's done". CNET. Archived from the original on July 13, 2012.
  36. "Famed hacker to Snowden: Watch out". CNN. Archived from the original on March 30, 2022. Retrieved May 8, 2020.
  37. "Life Not Kosher for Mitnick". Wired. August 18, 1999. Archived from the original on September 18, 2012.
  38. Bowker, Art. "Hackers, Sex Offenders, and All the Rest". corrections.com. Archived from the original on September 14, 2018. Retrieved September 14, 2018.
  39. "World's most famous hacker Kevin Mitnick to speak at ULM Business Symposium". ulm.edu. Archived from the original on December 8, 2022. Retrieved July 20, 2023.
  40. "F.C.C. Lets Convicted Hacker Go Back on Net". The New York Times. December 27, 2002. Archived from the original on March 6, 2016. Retrieved February 19, 2017.
  41. Miller, Greg (March 27, 1999). "Judge Accepts Mitnick's Guilty Plea on 7 Counts". Los Angeles Times. Archived from the original on April 15, 2019. Retrieved February 16, 2020.
  42. Randolph, Donald C. "About Kevin's Case". Free Kevin Mitnick. Archived from the original on April 24, 2006.
  43. "Defense consolidated motion for sanctions and for reconsideration of motion for discovery and application for expert fees based upon new facts". Free Kevin Mitnick. June 7, 1999. Archived from the original on December 22, 2005.
  44. Shimomura, Tsutomo; Markoff, John (1996). Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw - By the Man Who Did It. Hyperion. ISBN 978-0786862108.
  45. Christensen, John (March 18, 1999). "The trials of Kevin Mitnick". Archived from the original on December 8, 2018. Retrieved December 11, 2018.
  46. Noory, George (January 7, 2019). "Cybercrime & Security". Coast to Coast AM. Archived from the original on January 8, 2019. Retrieved January 8, 2019.
  47. KnowBe4. "Kevin Mitnick Partners With KnowBe4". prnewswire.com (Press release). Archived from the original on May 10, 2021. Retrieved April 18, 2020.{{cite press release}}: CS1 maint: numeric names: authors list (link)
  48. Darlene Storm (July 19, 2012). "Interview: World's most famous hacker, Kevin Mitnick, on mobile security & Zimperium". Computerworld. Archived from the original on December 26, 2013.
  49. Alex Williams (December 20, 2013). "Zimperium Raises $8M For Mobile Security That Turns The Tables On Attackers". TechCrunch. AOL. Archived from the original on August 13, 2017. Retrieved June 25, 2017.
  50. "Kevin Mitnick's Security Advice". Wired. November 15, 2006. Archived from the original on July 20, 2020. Retrieved July 20, 2020.
  51. "Kevin David Mitnick". Dignity Memorial. Archived from the original on July 20, 2023. Retrieved July 20, 2023.
  52. "Famed Hacker Kevin Mitnick Dead at 59". SecurityWeek News. July 20, 2023. Archived from the original on July 20, 2023. Retrieved July 20, 2023.
  53. "x.com". X (formerly Twitter). Archived from the original on August 9, 2024. Retrieved December 11, 2024.
  54. "Takedown". tcm.com. Archived from the original on March 7, 2023. Retrieved July 20, 2023.
  55. Security, Mitnick. "Lo and Behold". mitnicksecurity.com. Archived from the original on July 20, 2023. Retrieved July 20, 2023.
  56. Mitnick, Kevin; Simon, William L. (October 2003). The Art of Deception: Controlling the Human Element of Security. Wiley Books. ISBN 978-0-7645-4280-0. Archived from the original on April 25, 2011. Retrieved January 14, 2009.
  57. Mitnick, Kevin; Simon, William L. (December 27, 2005). The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers. Wiley Books. ISBN 978-0-7645-6959-3. Archived from the original on May 14, 2011. Retrieved January 14, 2009.
  58. Mitnick, Kevin; Vamosi, Robert (February 2017). The Art of Invisibility. Little, Brown and Company. ISBN 978-0-3163-8049-2. Archived from the original on July 2, 2019. Retrieved July 2, 2019.
  59. Cohn, Scott (July 26, 2016). "Greed Report: These White-Collar Manhunts Will Make Your Head Spin". CNBC. Archived from the original on February 24, 2023. Retrieved July 20, 2023.

Bibliography

Movies

Books

Articles

External links

Hacking in the 1990s
← 1980s Timeline 2000s →
Incidents
1990
1995
1998
Groups
Individuals
Malware
Categories: