Revision as of 06:59, 14 March 2022 editVolten001 (talk | contribs)Extended confirmed users, Pending changes reviewers, Rollbackers6,873 edits Reverted 1 edit by Junior Kevin98 (talk): UnconstructiveTags: Twinkle Undo← Previous edit | Revision as of 14:12, 30 March 2022 edit undo38.146.204.196 (talk) →Computer hackingTags: Reverted section blanking blankingNext edit → | ||
Line 33: | Line 33: | ||
==Career== | ==Career== | ||
===Computer hacking=== | |||
At age 12, Mitnick got a bus driver to tell him where he could buy his own ticket punch for "a school project", and was then able to ride any bus in the greater LA area using unused transfer slips he found in a dumpster next to the bus company garage.<ref>{{cite web|url=https://www.theregister.co.uk/2003/01/13/chapter_one_kevin_mitnicks_story |title=Chapter One: Kevin Mitnick's story |website=The Register |date=January 13, 2003 |first=Thomas C. |last=Greene |archive-url=https://archive.today/20120912150528/http://www.theregister.co.uk/2003/01/13/chapter_one_kevin_mitnicks_story/ |archive-date=September 12, 2012 |url-status=live }}</ref> | |||
Mitnick first gained unauthorized access to a computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system that ] (DEC) used for developing its ] operating system software.<ref>{{cite web|url=http://www.thememoryhole.org/lit/deception-ch1.htm|title=The Missing Chapter from The Art of Deception by Kevin Mitnick|website=thememoryhole.org|access-date=February 16, 2020|url-status=dead|archive-url=https://web.archive.org/web/20090317050834/http://www.thememoryhole.org/lit/deception-ch1.htm|archive-date=March 17, 2009}}</ref> He broke into DEC's ] and copied the company's software, a crime for which he was charged and convicted in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into ] voicemail computers. After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two-and-a-half years.{{cn|date=November 2021}} | |||
According to the ], Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used ] to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mails.{{cn|date=November 2021}} | |||
==== Arrest, conviction, and incarceration ==== | |||
]'' distributed "Free Kevin" bumper stickers.<ref name="Internet Archive 2016">{{cite web | title=Freedom Downtime - The Story of Kevin Mitnick : 2600 Films : Free Download, Borrow, and Streaming : Internet Archive | website=Internet Archive | date=2016-10-23 | url=https://archive.org/details/FreedomDowntime-TheStoryOfKevinMitnick | access-date=2019-05-14}}</ref>]] | |||
After a well-publicized pursuit, the ] arrested Mitnick on February 15, 1995, at his apartment in ], on federal offenses related to a two-and-a-half-year period of computer hacking which included computer and ].<ref>{{cite press release|url=http://www.usdoj.gov/opa/pr/Pre_96/February95/89.txt.html |title=Fugitive computer hacker arrested in North Carolina |date=February 15, 1995 |publisher=] |archive-url=https://archive.today/20120629/http://www.usdoj.gov/opa/pr/Pre_96/February95/89.txt.html |archive-date=June 29, 2012 |url-status=live }}</ref><ref>Colbert Report</ref> He was found with cloned cellular phones, more than 100 cloned cellular phone codes, and multiple pieces of false identification.<ref>{{cite journal | url = http://www.justice.gov/sites/default/files/usao/legacy/2006/06/30/usab4902.pdf | title = Supervised Release and Probation Restrictions in Hacker Cases | first = Christopher M.E. | last = Pnter | journal = United States Attorneys' USA Bulletin | publisher = ] |date=March 2001 | volume = 49 | issue = 2}}</ref> | |||
In December 1997, the ] website was hacked, displaying a message calling for Mitnick's release. According to the message, all recent visitors of Yahoo!'s website had been infected with a ] that would wreak havoc on Christmas Day unless Mitnick was released. Yahoo! dismissed the claims as a hoax and said that the worm was nonexistent.<ref>{{Cite journal | url=https://www.wired.com/1997/12/yahoo-hack-heck-of-a-hoax/ |title = Yahoo Hack: Heck of a Hoax|journal = Wired|date = December 9, 1997}}</ref><ref>.</ref> | |||
Mitnick was charged with wire fraud (14 counts), possession of unauthorized access devices (8 counts), interception of wire or electronic communications, unauthorized access to a federal computer, and causing damage to a computer.<ref name="law.jrank.org">{{cite web|url=http://law.jrank.org/pages/3791/Kevin-Mitnick-Case-1999.html|title=Kevin Mitnick Case: 1999 - No Bail, No Computer, Hacker Pleads Guilty|work=jrank.org}}</ref> | |||
In 1999, Mitnick pleaded guilty to four counts of wire fraud, two counts of computer fraud, and one count of illegally intercepting a wire communication, as part of a ] before the ] in Los Angeles. He was sentenced to 46 months in prison plus 22 months for violating the terms of his 1989 supervised release sentence for computer fraud. He admitted to violating the terms of supervised release by hacking into ] voicemail and other systems and to associating with known computer hackers, in this case co-defendant Lewis De Payne.<ref name="sciencedirect.com">{{cite journal|title=Super-hacker Kevin Mitnick takes a plea| doi=10.1016/S1361-3723(99)90141-0|volume=1999|issue=5|page=6|journal= Computer Fraud & Security|year=1999|last1=Gengler|first1=Barbara}}</ref><ref>{{cite web|url=https://fas.org/irp/news/1997/cac70627_1.html|title=Computer Hacker Kevin Mitnick Sentenced to Prison.|website=fas.org|date=June 27, 1997|access-date=February 16, 2020}}</ref> | |||
Mitnick served five years in prison—four-and-a-half years' pre-trial and eight months in ]—because, according to Mitnick, law enforcement officials convinced a judge that he had the ability to "start a nuclear war by whistling into a pay phone",<ref>{{cite news|url=https://www.cnet.com/tech/services-and-software/social-engineering-101-mitnick-and-other-hackers-show-how-its-done/ |title=Social Engineering 101: Mitnick and other hackers show how it's done |date=July 20, 2008 |first=Elinor |last=Mills |work=] |archive-url=https://archive.today/20120713/http://news.cnet.com/8301-1009_3-9995253-83.html |archive-date=July 13, 2012 |url-status=live }}</ref> implying that law enforcement told the judge that he could somehow dial into the NORAD modem via a payphone from prison and communicate with the modem by whistling to launch nuclear missiles.<ref>{{cite news | url = https://www.youtube.com/watch?v=Q1XsJW6X4pc&app=desktop/ | title = Famed hacker to Snowden: Watch out | work = ] }}</ref> In addition, a number of media outlets reported on the unavailability of ] meals at the prison where he was incarcerated.<ref name="kosher">{{cite news|url=https://www.wired.com/politics/law/news/1999/08/21322 |work=Wired |title=Life Not Kosher for Mitnick |date=August 18, 1999 |archive-url=https://archive.today/20120918/http://www.wired.com/politics/law/news/1999/08/21322 |archive-date=September 18, 2012 |url-status=live }}</ref> | |||
He was released on January 21, 2000. During his supervised release, which ended on January 21, 2003, he was initially forbidden to use any communications technology other than a landline telephone.<ref>{{cite web |last1=Bowker |first1=Art |title=Hackers, Sex Offenders, and All the Rest |url=http://www.corrections.com/cybercrime/?p=365 |access-date=14 September 2018}}</ref> Mitnick fought this decision in court, eventually winning a ruling in his favor, allowing him to access the Internet. Under the plea deal, Mitnick was also prohibited from profiting from films or books based on his criminal activity for seven years, under a special judicial ] variation. | |||
In December 2001, an ] judge ruled that Mitnick was sufficiently rehabilitated to possess a federally issued ] license.<ref>{{cite press release | url = https://www.nytimes.com/2002/12/27/technology/27HACK.html | title = F.C.C. Lets Convicted Hacker Go Back on Net | date = December 27, 2002 | work = ]}}</ref> Mitnick now runs Mitnick Security Consulting LLC, a computer security consultancy and is part owner of KnowBe4, provider of an integrated platform for security awareness training and ] testing.<ref name="CoastNoory2019-01-07">{{cite news|url=https://www.coasttocoastam.com/show/2019/01/07|title=Cybercrime & Security|date=January 7, 2019|work=]|last=Noory|first=George|author-link=George Noory|access-date=January 8, 2019}}</ref> | |||
==== Controversy ==== | |||
Mitnick's criminal activities, arrest, and trial, along with the associated journalism, were all controversial.<ref name=kroll/> Though Mitnick has been convicted of copying software unlawfully,<ref>{{cite web|url=https://www.latimes.com/archives/la-xpm-1999-mar-27-fi-21393-story.html|title=Judge Accepts Mitnick's Guilty Plea on 7 Counts|last=Miller|first=Greg|date=March 27, 1999|work=]|access-date=February 16, 2020}}</ref> his supporters argue that his punishment was excessive and that many of the charges against him were fraudulent<ref>{{cite web | archive-url = https://web.archive.org/web/20060424153130/http://www.freekevin.com/about.html | url = http://www.freekevin.com/about.html | archive-date = April 24, 2006 | title = About Kevin's Case | work = Free Kevin Mitnick | first = Donald C. | last = Randolph}}</ref> and not based on actual losses.<ref>{{cite web | archive-url = https://web.archive.org/web/20051222124635/http://www.freekevin.com/060799defmot.html | url = http://www.freekevin.com/060799defmot.html | archive-date = December 22, 2005 | title = Defense consolidated motion for sanctions and for reconsideration of motion for discovery and application for expert fees based upon new facts | work = Free Kevin Mitnick | date =June 7, 1999}}</ref> | |||
In his 2002 book, ''The Art of Deception'', Mitnick states that he compromised computers solely by using passwords and codes that he gained by ]. He claims he did not use software programs or hacking tools for cracking passwords or otherwise exploiting computer or phone security.{{cn|date=November 2021}} | |||
] and ], who had both been part of the pursuit of Mitnick, wrote the book ''Takedown'' about Mitnick's capture.<ref>{{Cite book |last=Shimomura |first=Tsutomo |title=Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw - By the Man Who Did It |last2=Markoff |first2=John |publisher=Hyperion |year=1996 |isbn=978-0786862108}}</ref>{{cn|date=November 2021}} | |||
The case against Mitnick tested the new laws that had been enacted for dealing with computer crime, and it raised public awareness of security involving networked computers. The controversy remains, however, and the Mitnick story is often cited today as an example of the ].<ref name="John Christensen">{{cite web | url=http://edition.cnn.com/SPECIALS/1999/mitnick.background/ | title=The trials of Kevin Mitnick | date=18 March 1999 | access-date=11 December 2018 | author= John Christensen}}</ref> | |||
=== Consulting === | === Consulting === | ||
Since 2000, Mitnick has been a paid security consultant, public speaker, and author. He does security consulting for, performs penetration testing services, and teaches Social Engineering classes to companies and government agencies. His company Mitnick Security Consulting is based in Las Vegas, Nevada<ref>{{Cite web|title=Kevin Mitnick's Security Advice|url=https://www.wired.com/2006/11/kevin-mitnicks-security-advice/|website=Wired}}</ref> where he currently resides. | Since 2000, Mitnick has been a paid security consultant, public speaker, and author. He does security consulting for, performs penetration testing services, and teaches Social Engineering classes to companies and government agencies. His company Mitnick Security Consulting is based in Las Vegas, Nevada<ref>{{Cite web|title=Kevin Mitnick's Security Advice|url=https://www.wired.com/2006/11/kevin-mitnicks-security-advice/|website=Wired}}</ref> where he currently resides. |
Revision as of 14:12, 30 March 2022
American computer security consultant, author, convicted criminal, and hacker
Kevin Mitnick | |
---|---|
Kevin Mitnick speaking at Cyber Incursion event 2018. He spoke about social engineering and its risks for users. | |
Born | Kevin David Mitnick (1963-08-06) August 6, 1963 (age 61) Van Nuys, California, U.S. |
Nationality | American |
Other names | The Condor, The Darkside Hacker |
Occupations | |
Organization(s) | Mitnick Security Consulting Chief Hacking Officer at KnowBe4 |
Board member of | KnowBe4 |
Criminal charge(s) | 1995: Wire fraud (14 counts), possession of unauthorized access devices (8 counts), interception of wire or electronic communications, unauthorized access to a federal computer, and causing damage to a computer. |
Criminal penalty | 1988: One year prison. 1999: 46 months prison plus 3 years' probation |
Call sign | N6NHG |
Website | https://www.mitnicksecurity.com |
Kevin David Mitnick (born August 6, 1963) is an American computer security consultant, author, and convicted hacker. He is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes.
Mitnick's pursuit, arrest, trial, and sentence along with the associated journalism, books, and films were all controversial.
He now runs the security firm Mitnick Security Consulting, LLC. He is also the Chief Hacking Officer and part owner of the security awareness training company KnowBe4, as well as an active advisory board member at Zimperium, a firm that develops a mobile intrusion prevention system.
Early life and education
Mitnick was born in Van Nuys, California, on August 6, 1963. He grew up in Los Angeles and attended James Monroe High School in Los Angeles, California, during which time he became an amateur radio operator. He was later enrolled at Los Angeles Pierce College and USC. For a time, he worked as a receptionist for Stephen S. Wise Temple.
Career
Consulting
Since 2000, Mitnick has been a paid security consultant, public speaker, and author. He does security consulting for, performs penetration testing services, and teaches Social Engineering classes to companies and government agencies. His company Mitnick Security Consulting is based in Las Vegas, Nevada where he currently resides.
Media
In 2000, Skeet Ulrich and Russell Wong portrayed Kevin Mitnick and Tsutomu Shimomura, respectively, in the movie Track Down (known as Takedown outside the US), which was based on the book Takedown by John Markoff and Tsutomu Shimomura. The DVD was released in September 2004. A 2001 documentary named Freedom Downtime was produced by 2600: The Hacker Quarterly in response to Takedown.
Mitnick's story was a partial inspiration for Wizzywig, Ed Piskor's graphic novel about hackers.
Mitnick also appeared in Werner Herzog's documentary Lo and Behold, Reveries of the Connected World (2016).
Books
Written by Mitnick
Mitnick is the co-author, with William L. Simon and Robert Vamosi, of four books, three on computer security and his autobiography:
- (2003) The Art of Deception: Controlling the Human Element of Security
- (2005) The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
- (2011) Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
- (2017) The Art of Invisibility
Authorized by Mitnick
- (1996) The Fugitive Game: Online with Kevin Mitnick. In this book author Jonathan Littman presented Mitnick's account of his story, as John Markoff's book Takedown (1996) and Jeff Goodell's Cyberthief and the Samurai (1996) presented Shimomura's side (when Mitnick was legally unable to publish and profit from his own story).
See also
- Kevin Poulsen
- "My kung fu is stronger than yours"
- List of computer criminals
- The Secret History of Hacking
References
- Cite error: The named reference
sciencedirect.com
was invoked but never defined (see the help page). - "Kevin Mitnick's Federal Indictment". Archived from the original on May 18, 2014. Retrieved September 13, 2014.
- "#089 Fugitive Computer Hacker Arrested in North Carolina". justice.gov. Archived from the original on June 13, 2013.
- Cite error: The named reference
law.jrank.org
was invoked but never defined (see the help page). - "HEARING DESIGNATION ORDER (FCC 01-359)" (PDF). Federal Communications Commission. December 21, 2001. Retrieved December 3, 2015.
- "Kevin Mitnick sentenced to nearly four years in prison; computer hacker ordered to pay restitution to victim companies whose systems were compromised" (Press release). United States Attorney's Office, Central District of California. August 9, 1999. Archived from the original on June 13, 2013.
- "Free Kevin, Kevin Freed", Jan 21, 2000, Jason Kroll, Linux Journal
- "Ex-hacker reveals tricks of the trade". AsiaOne Digital. Archived from the original on July 23, 2015.
- KnowBe4. "Kevin Mitnick Partners With KnowBe4". www.prnewswire.com. Retrieved April 18, 2020.
{{cite web}}
: CS1 maint: numeric names: authors list (link) - Darlene Storm (July 19, 2012). "Interview: World's most famous hacker, Kevin Mitnick, on mobile security & Zimperium". Computerworld. Archived from the original on December 26, 2013.
- Alex Williams. "Zimperium Raises $8M For Mobile Security That Turns The Tables On Attackers". TechCrunch. AOL.
- Merritt, Tom (2012). Chronology of Tech History. Lulu.com. p. 87. ISBN 978-1-300-25307-5.
- ^ Mitnick, Kevin (2011). Ghost in the Wires: My Adventures as the World's Most Wanted Hacker. Little, Brown and Company. ISBN 978-0-316-03770-9.
- Mills, Elinor. "Q&A: Kevin Mitnick, from ham operator to fugitive to consultant". cnet.com. CNET. Retrieved December 18, 2017.
- "Kevin Mitnick's Security Advice". Wired.
- Skeet Ulrich, Russell Wong (2004). Track Down (DVD). Dimension Studios.
- Mitnick, Kevin; Simon, William L. (October 2003). The Art of Deception: Controlling the Human Element of Security. Wiley Books. ISBN 978-0-7645-4280-0.
- Mitnick, Kevin; Simon, William L. (December 27, 2005). The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers. Wiley Books. ISBN 978-0-7645-6959-3.
- Mitnick, Kevin; Simon, William L. (2011). Ghost in the Wires: My Adventures as the World's Most Wanted Hacker. Little, Brown and Company. ISBN 978-0-316-03770-9. Archived from the original on November 4, 2011. Retrieved August 27, 2019.
- Mitnick, Kevin; Vamosi, Robert (February 2017). The Art of Invisibility. Little, Brown and Company. ISBN 978-0-3163-8049-2.
- Hafner, Katie. "The Fugitive Game: Online with Kevin Mitnick: Jonathan Littman: Books". Retrieved May 16, 2011.
Bibliography
Movies
Books
- Kevin Mitnick with Robert Vamosi, The Art of Invisibility, 2017, Hardback ISBN 978-0-316-38049-2
- Kevin Mitnick and William L. Simon, Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, 2011, Hardback ISBN 978-0-316-03770-9
- Kevin Mitnick and William L. Simon, The Art of Intrusion: The Real Stories Behind The Exploits Of Hackers, Intruders, And Deceivers, 2005, Hardback ISBN 0-471-78266-1
- Kevin Mitnick, The Art of Deception: Controlling the Human Element of Security, 2002, Paperback ISBN 0-471-23712-4
- Jeff Goodell, The Cyberthief and the Samurai: The True Story of Kevin Mitnick-And the Man Who Hunted Him Down, 1996, ISBN 978-0-440-22205-7
- Tsutomu Shimomura, Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw-By the Man Who Did It, 1996, ISBN 0-7868-8913-6
- Jonathan Littman, The Fugitive Game: Online with Kevin Mitnick, 1996, ISBN 0-316-52858-7
- Katie Hafner and John Markoff, CYBERPUNK – Outlaws and Hackers on the Computer Frontier, 1995, ISBN 1-872180-94-9
Articles
- Littman, Jonathan (June 2007). "The Invisible Digital Man" (PDF). Playboy. Archived from the original (PDF) on March 4, 2016.
- Fost, Dan (May 4, 2000). "Movie About Notorious Hacker Inspires a Tangle of Suits and Subplots". San Francisco Chronicle. Retrieved April 24, 2007.
- Darell, Khin. "From Being Hunted By The FBI To Working Alongside Them- Kevin Mitnick". Appknox. Retrieved May 27, 2016.
- Ehrlich, Thomas. "Renowned security expert Kevin Mitnick can steal your identity in 3 minutes". Forbes. Retrieved July 17, 2015.
External links
- Official website
- Kevin Mitnick interviewed on the TV show Triangulation on the TWiT.tv network
Hacking in the 1990s | |||||||
---|---|---|---|---|---|---|---|
| |||||||
Incidents |
| ||||||
Groups | |||||||
Individuals | |||||||
Malware |