Kevin Mitnick

From Wikipedia, the free encyclopedia

Jump to: navigation, search
Kevin David Mitnick

Adrian Lamo, Kevin Mitnick and Kevin Poulsen
Born August 6, 1963 (1963-08-06) (age 45)
Los Angeles, California
Occupation Computer Consultant, Mitnick Security Consulting
Author
Religious beliefs Jewish
Website
http://www.kevinmitnick.com

Kevin David Mitnick (born August 6, 1963) is a computer security consultant and author. He was a world-famous controversial computer hacker in the late 20th century, who was, at the time of his arrest, the most wanted computer criminal in United States history.[1]

Contents

[edit] Arrest, Conviction, and Incarceration

After a well-publicized pursuit, the FBI arrested Kevin Mitnick in February of 1995 at his apartment in Raleigh, North Carolina, on federal offenses related to a 2½-year computer hacking spree. [2]

In 1999, Mitnick admitted to the authorities to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication, as part of a plea agreement before the United States District Court for the Central District of California in Los Angeles. He was sentenced to 46 months in prison in addition to 22 months for violating the terms of his 1989 supervised release sentence for computer fraud. He admitted to violating the terms of supervised release by hacking into PacBell voicemail and other systems and to associating with known computer hackers, in this case codefendant Louis De Payne.

Mitnick served five years in prison, of which four and a half years were pre-trial and eight months were in solitary confinement.[citation needed] He was released on January 21, 2000. During his supervised release, which ended on January 21, 2003, he was initially restricted from using any communications technology other than a landline telephone. Mitnick fought this decision in court which ruled in his favor, allowing him to access the Internet.

In addition, as per the plea deal, Mitnick was prohibited from profiting from films or books that are based on his criminal activity for a period of seven years.

Mitnick now runs Mitnick Security Consulting, a computer security consultancy.

[edit] Early life

Kevin Mitnick began social engineering, or perhaps discovered his first engineerable situation at the age of 12. He realized he could bypass the punchcard system used for the Los Angeles bus system: by buying his own punch, he could get free bus rides anywhere in the greater LA area. Social engineering became his primary method of obtaining information, whether it be user names and passwords, modem phone numbers or any number of other pieces of data.

In high school, he was introduced by "Petronix" to phone phreaking, the activity of manipulating telephones, which he often used to evade long distance charges. Mitnick also became handy with amateur radios; using such equipment, Mitnick reportedly managed to gain unauthorized access to the speaker systems of nearby fast food restaurants.

[edit] Computer cracking

Mitnick gained unauthorized access to his first computer network in 1979, when a friend gave him the phone number for the Ark, the computer system at Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC's computer network and copied DEC's software, for which he was charged and convicted in 1988. He was sentenced to twelve months in prison followed by a three year period of supervised release. Near the end of his supervised release, Mitnick hacked into Pacific Bell voice mail computers. A warrant was issued for Mitnick’s arrest and he fled, becoming a fugitive for the next two and a half years. According to the U.S. Department of Justice, during this time, Mitnick gained unauthorized access to dozens of computer networks using cloned cellular phones to hide his location and, among other things, copying valuable proprietary software from some of the country’s largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail. Mitnick was apprehended in February 1995 in North Carolina. When arrested he was found with cloned cellular phones, over one hundred clone cellular phone codes, and multiple pieces of false identification. [3]

[edit] Acts by Kevin Mitnick

[edit] Alleged

[edit] Controversy

Kevin Mitnick's criminal activities, arrest, and trial were controversial, as was the journalism surrounding his conviction.

Though Mitnick has been convicted of copying software unlawfully and possession of several forged identification documents, his supporters argue that his punishment was excessive. In his 2002 book, The Art of Deception, Mitnick states that he compromised computers solely by using passwords and codes that he gained by social engineering. He claims he did not use software programs or hacking tools for cracking passwords or otherwise exploiting computer or phone security.

The controversy is highlighted by the differing views offered in two books: John Markoff and Tsutomu Shimomura's Takedown, and Jonathan Littman's The Fugitive Game. Littman made four notable allegations:

  • journalistic impropriety by Markoff, who had covered the case for the New York Times based on rumor and government claims, while never interviewing Kevin himself.
  • overzealous prosecution of Mitnick by the government
  • mainstream media over-hyping Mitnick's actual crimes
  • Shimomura's involvement in the matter being unclear or of dubious legality

The case against Mitnick tested the currently nascent laws that had been enacted for dealing with computer crime, and it raised public awareness of security issues involving networked computers. The controversy remains, however, and Mitnick is often used today as an example of the quintessential computer criminal.

Supporters of Mitnick have asserted that many of the charges against him were fraudulent[9] and not based on actual losses.[10]

[edit] Media

In 2000, Skeet Ulrich and Russell Wong portrayed Kevin Mitnick and Tsutomu Shimomura in the movie Track Down. The DVD was released in September of 2004, The movie is based on the book Takedown by John Markoff and Tsutomu Shimomura. [11]

Further controversy came over the release of the movie, with Littman alleging that portions of the film were taken from his book without permission.

Kevin is the author of two computer security books, The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers. [12] and The Art of Deception [13]

[edit] See also

[edit] References

  1. ^ http://www.usdoj.gov/criminal/cybercrime/mitnick.htm
  2. ^ http://www.usdoj.gov/opa/pr/Pre_96/February95/89.txt.html
  3. ^ http://www.usdoj.gov/criminal/cybercrime/usamarch2001_7.htm
  4. ^ a b c The Art of Deception: Controlling the Human Element of Security, by Kevin Mitnick (2002, Hardback ISBN 0-471-23712-4, Paperback ISBN 0-7645-4280-X)
  5. ^ a b c 2600 Live Mitnick interview, 2600 Magazine, Released January 2003, Run time: 1 hr 18 min 5 sec
  6. ^ a b c d A Most-Wanted Cyberthief Is Caught in His Own Web by John Markoff 1995 New York Times
  7. ^ Takedown (film) made in 2000 by Joe Chapelle and produced by Miramax
  8. ^ A convicted hacker debunks some myths. Retrieved August 27, 2008 from http://www.cnn.com/2005/TECH/internet/10/07/kevin.mitnick.cnna/
  9. ^ archived version of http://www.freekevin.com/about.html section II
  10. ^ archived version of http://www.freekevin.com/060799defmot.html section II - Statement of Facts
  11. ^ Skeet Ulrich, Russell Wong. (2004). Track Down [DVD]. Dimension Studios.
  12. ^ Mitnick, Kevin; William L. Simon (December 27, 2005). The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers. Wiley Books. pp. 270. ISBN 978-0-7645-6959-3. http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html. 
  13. ^ Mitnick, Kevin; William L. Simon (October 2003). The Art of Deception: Controlling the Human Element of Security. Wiley Books. pp. 368. ISBN 978-0-7645-4280-0. http://www.wiley.com/WileyCDA/WileyTitle/productCd-076454280X.html. 

[edit] External links

Personal tools