HOME

TheInfoList



OR:

Kevin David Mitnick (born August 6, 1963) is an American
computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
consultant, author, and convicted
hacker A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
. He is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes. Mitnick's pursuit, arrest, trial, and sentence along with the associated journalism, books, and films were all controversial."Free Kevin, Kevin Freed"
Jan 21, 2000, Jason Kroll, Linux Journal
He now runs the security firm Mitnick Security Consulting, LLC. He is also the Chief Hacking Officer and part owner of the security awareness training company KnowBe4, as well as an active advisory board member at
Zimperium Zimperium, Inc. is a privately owned mobile security company based in the United States and headquartered in Dallas, Texas. Zimperium provides a mobile security platform purpose-built for enterprise environments. History Zimperium, Ltd. was fo ...
, a firm that develops a mobile intrusion prevention system.


Early life and education

Mitnick was born in
Van Nuys Van Nuys () is a neighborhood in the central San Fernando Valley region of Los Angeles, California. Home to Van Nuys Airport and the Valley Municipal Building, it is the most populous neighborhood in the San Fernando Valley. History In 1909, ...
,
California California is a state in the Western United States, located along the Pacific Coast. With nearly 39.2million residents across a total area of approximately , it is the most populous U.S. state and the 3rd largest by area. It is also the m ...
, on August 6, 1963. He grew up in Los Angeles and attended James Monroe High School in Los Angeles, California, during which time he became an
amateur radio Amateur radio, also known as ham radio, is the use of the radio frequency spectrum for purposes of non-commercial exchange of messages, wireless experimentation, self-training, private recreation, radiosport, contesting, and emergency commu ...
operator and chose the nickname "Condor" after watching the movie ''
Three Days of the Condor ''Three Days of the Condor'' is a 1975 American political thriller film directed by Sydney Pollack and starring Robert Redford, Faye Dunaway, Cliff Robertson, and Max von Sydow. The screenplay by Lorenzo Semple Jr. and David Rayfiel was based ...
''. He was later enrolled at Los Angeles Pierce College and
USC USC most often refers to: * University of South Carolina, a public research university ** University of South Carolina System, the main university and its satellite campuses ** South Carolina Gamecocks, the school athletic program * University of ...
. For a time, he worked as a receptionist for
Stephen S. Wise Temple Stephen Wise Temple is a large Reform Jewish congregation in the Bel Air neighborhood of Los Angeles, California. Founded in 1964 by the late Rabbi Isaiah Zeldin, with 35 families, the congregation grew rapidly. At various times in its histo ...
.


Career


Computer hacking

At age 12, Mitnick got a bus driver to tell him where he could buy his own ticket punch for "a school project", and was then able to ride any bus in the greater LA area using unused transfer slips he found in a dumpster next to the bus company garage. Mitnick first gained unauthorized access to a computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system that
Digital Equipment Corporation Digital Equipment Corporation (DEC ), using the trademark Digital, was a major American company in the computer industry from the 1960s to the 1990s. The company was co-founded by Ken Olsen and Harlan Anderson in 1957. Olsen was president un ...
(DEC) used for developing its RSTS/E operating system software. He broke into DEC's
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
and copied the company's software, a crime for which he was charged and convicted in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into
Pacific Bell The Pacific Bell Telephone Company (Pacific Bell or Pac Bell) is a telephone company that provides telephone service in California. The company is owned by AT&T through AT&T Teleholdings, and, though separate, is now marketed as “AT&T”. The ...
voicemail computers. After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two-and-a-half years. According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mails.


Arrest, conviction, and incarceration

After a well-publicized pursuit, the FBI arrested Mitnick on February 15, 1995, at his apartment in
Raleigh, North Carolina Raleigh (; ) is the capital city of the state of North Carolina and the seat of Wake County in the United States. It is the second-most populous city in North Carolina, after Charlotte. Raleigh is the tenth-most populous city in the Sout ...
, on federal offenses related to a two-and-a-half-year period of computer hacking which included computer and
wire fraud Mail fraud and wire fraud are terms used in the United States to describe the use of a physical or electronic mail system to defraud another, and are federal crimes there. Jurisdiction is claimed by the federal government if the illegal activity ...
. He was found with cloned cellular phones, more than 100 cloned cellular phone codes, and multiple pieces of false identification. In December 1997, the
Yahoo! Yahoo! (, styled yahoo''!'' in its logo) is an American web services provider. It is headquartered in Sunnyvale, California and operated by the namesake company Yahoo Inc., which is 90% owned by investment funds managed by Apollo Global Mana ...
website was hacked, displaying a message calling for Mitnick's release. According to the message, all recent visitors of Yahoo!'s website had been infected with a
computer worm A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It wil ...
that would wreak havoc on Christmas Day unless Mitnick was released. Yahoo! dismissed the claims as a hoax and said that the worm was nonexistent. Mitnick was charged with wire fraud (14 counts), possession of unauthorized access devices (8 counts), interception of wire or electronic communications, unauthorized access to a federal computer, and causing damage to a computer. Mitnick was diagnosed with
Asperger syndrome Asperger syndrome (AS), also known as Asperger's, is a former neurodevelopmental disorder characterized by significant difficulties in social interaction and nonverbal communication, along with restricted and repetitive patterns of beha ...
, but it was not used as evidence at his trial. In 1999, Mitnick pleaded guilty to four counts of wire fraud, two counts of computer fraud, and one count of illegally intercepting a wire communication, as part of a
plea agreement A plea bargain (also plea agreement or plea deal) is an agreement in criminal law proceedings, whereby the prosecutor provides a concession to the defendant in exchange for a plea of guilt or '' nolo contendere.'' This may mean that the defenda ...
before the
United States District Court for the Central District of California The United States District Court for the Central District of California (in case citations, C.D. Cal.; commonly referred to as the CDCA or CACD) is a Federal trial court that serves over 19 million people in Southern and Central California, ...
in Los Angeles. He was sentenced to 46 months in prison plus 22 months for violating the terms of his 1989 supervised release sentence for computer fraud. He admitted to violating the terms of supervised release by hacking into
Pacific Bell The Pacific Bell Telephone Company (Pacific Bell or Pac Bell) is a telephone company that provides telephone service in California. The company is owned by AT&T through AT&T Teleholdings, and, though separate, is now marketed as “AT&T”. The ...
voicemail and other systems and to associating with known computer hackers, in this case co-defendant Lewis De Payne. Mitnick served five years in prison—four-and-a-half years' pre-trial and eight months in
solitary confinement Solitary confinement is a form of imprisonment in which the inmate lives in a single cell with little or no meaningful contact with other people. A prison may enforce stricter measures to control contraband on a solitary prisoner and use additi ...
—because, according to Mitnick, law enforcement officials convinced a judge that he had the ability to "start a nuclear war by whistling into a pay phone", implying that law enforcement told the judge that he could somehow dial into the
NORAD North American Aerospace Defense Command (NORAD ), known until March 1981 as the North American Air Defense Command, is a combined organization of the United States and Canada that provides aerospace warning, air sovereignty, and protection ...
modem via a payphone from prison and communicate with the modem by whistling to launch nuclear missiles. In addition, a number of media outlets reported on the unavailability of
kosher (also or , ) is a set of dietary laws dealing with the foods that Jewish people are permitted to eat and how those foods must be prepared according to Jewish law. Food that may be consumed is deemed kosher ( in English, yi, כּשר), fro ...
meals at the prison where he was incarcerated. He was released on January 21, 2000. During his supervised release, which ended on January 21, 2003, he was initially forbidden to use any communications technology other than a landline telephone. Under the plea deal, Mitnick was also prohibited from profiting from films or books based on his criminal activity for seven years, under a special judicial Son of Sam law variation. In December 2001, an FCC judge ruled that Mitnick was sufficiently rehabilitated to possess a federally issued
amateur radio Amateur radio, also known as ham radio, is the use of the radio frequency spectrum for purposes of non-commercial exchange of messages, wireless experimentation, self-training, private recreation, radiosport, contesting, and emergency commu ...
license. Mitnick now runs Mitnick Security Consulting LLC, a computer security consultancy and is part owner of KnowBe4, provider of an integrated platform for security awareness training and
simulated phishing Simulated phishing or a phishing test is where deceptive emails, similar to malicious emails, are sent by an organization to their own staff to gauge their response to phishing and similar email attacks. The emails themselves are often a form of tr ...
testing.


Controversy

Mitnick's criminal activities, arrest, and trial, along with the associated journalism, were all controversial. Though Mitnick has been convicted of copying software unlawfully, his supporters argue that his punishment was excessive and that many of the charges against him were fraudulent and not based on actual losses. In his 2002 book, ''The Art of Deception'', Mitnick states that he compromised computers solely by using passwords and codes that he gained by social engineering. He claims he did not use software programs or hacking tools for cracking passwords or otherwise exploiting computer or phone security.
John Markoff John Gregory Markoff (born October 24, 1949) is a journalist best known for his work covering technology at '' The New York Times'' for 28 years until his retirement in 2016, and a book and series of articles about the 1990s pursuit and captur ...
and Tsutomu Shimomura, who had both been part of the pursuit of Mitnick, wrote the book ''Takedown'' about Mitnick's capture. The case against Mitnick tested the new laws that had been enacted for dealing with computer crime, and it raised public awareness of security involving networked computers. The controversy remains, however, and the Mitnick story is often cited today as an example of the influence that newspapers and other media outlets can have on law enforcement personnel.


Consulting

Since 2000, Mitnick has been a paid security consultant, public speaker, and author. He does security consulting for, performs penetration testing services, and teaches social engineering classes to companies and government agencies. His company Mitnick Security Consulting is based in Las Vegas, Nevada where he currently resides.


Media

In 2000, Skeet Ulrich and
Russell Wong Russell Wong (; born March 1, 1963) is an American actor of film and television. He was one of the first actors of Chinese descent to hold a leading role in a primetime American television series, portraying Jian-Wa with Chi Muoi Lo portraying ...
portrayed Kevin Mitnick and Tsutomu Shimomura, respectively, in the movie ''
Track Down ''Track Down'' (also known as ''Takedown'' outside the United States) is a 2000 American crime thriller film based on the non-fiction book ''Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw—By the Man ...
'' (known as ''Takedown'' outside the US), which was based on the book ''Takedown'' by
John Markoff John Gregory Markoff (born October 24, 1949) is a journalist best known for his work covering technology at '' The New York Times'' for 28 years until his retirement in 2016, and a book and series of articles about the 1990s pursuit and captur ...
and Tsutomu Shimomura. The DVD was released in September 2004. Mitnick also appeared in
Werner Herzog Werner Herzog (; born 5 September 1942) is a German film director, screenwriter, author, actor, and opera director, regarded as a pioneer of New German Cinema. His films often feature ambitious protagonists with impossible dreams, people with u ...
's documentary '' Lo and Behold, Reveries of the Connected World'' (2016).


Books


Written by Mitnick

Mitnick is the co-author, with William L. Simon and Robert Vamosi, of four books, three on
computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
and his autobiography: * (2003) ''
The Art of Deception ''The Art of Deception'' is a book by Kevin Mitnick that covers the art of social engineering. Part of the book is composed of real stories and examples of how social engineering can be combined with hacking. All, or nearly all, of the exampl ...
: Controlling the Human Element of Security'' * (2005) ''
The Art of Intrusion ''The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers'' is a book by Kevin Mitnick that is a collection of stories about social engineering as performed by other hackers. Each story ends by summarizing ...
: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers'' * (2011) ''Ghost in the Wires: My Adventures as the World's Most Wanted Hacker'' * (2017) '' The Art of Invisibility''


Authorized by Mitnick

*(1996) ''The Fugitive Game: Online with Kevin Mitnick'', Jonathan Littman


See also

* Kevin Poulsen * List of computer criminals * '' The Secret History of Hacking''


References


Bibliography


Movies

*


Books

*Kevin Mitnick with Robert Vamosi, ''The Art of Invisibility'', 2017, Hardback *Kevin Mitnick and William L. Simon, ''Ghost in the Wires: My Adventures as the World's Most Wanted Hacker'', 2011, Hardback *Kevin Mitnick and William L. Simon, ''
The Art of Intrusion ''The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers'' is a book by Kevin Mitnick that is a collection of stories about social engineering as performed by other hackers. Each story ends by summarizing ...
: The Real Stories Behind The Exploits Of Hackers, Intruders, And Deceivers'', 2005, Hardback *Kevin Mitnick, ''
The Art of Deception ''The Art of Deception'' is a book by Kevin Mitnick that covers the art of social engineering. Part of the book is composed of real stories and examples of how social engineering can be combined with hacking. All, or nearly all, of the exampl ...
: Controlling the Human Element of Security'', 2002, Paperback *
Jeff Goodell Jeff Goodell is an American author and contributing editor to ''Rolling Stone'' magazine. Goodell's writings are known for a focus on energy and environmental issues. He is Senior Fellow at the Atlantic Council and a 2020 Guggenheim Fellow. ...
, ''The Cyberthief and the Samurai: The True Story of Kevin Mitnick-And the Man Who Hunted Him Down'', 1996, * Tsutomu Shimomura, ''Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw-By the Man Who Did It'', 1996, *Jonathan Littman, ''The Fugitive Game: Online with Kevin Mitnick'', 1996, *
Katie Hafner Katie Hafner (born December 5, 1957) is an American journalist and author. She is a former staff member of '' The New York Times'', and has written articles about technology, healthcare, and society, and books about the computer underground, the ...
and
John Markoff John Gregory Markoff (born October 24, 1949) is a journalist best known for his work covering technology at '' The New York Times'' for 28 years until his retirement in 2016, and a book and series of articles about the 1990s pursuit and captur ...
, ''CYBERPUNK – Outlaws and Hackers on the Computer Frontier'', 1995,


Articles

* * * *


External links

* * {{DEFAULTSORT:Mitnick, Kevin 1963 births Living people 2600: The Hacker Quarterly American computer criminals People from Los Angeles Hackers Amateur radio people 20th-century American Jews Los Angeles Pierce College people 21st-century American Jews 20th-century American criminals People with Asperger syndrome American people convicted of fraud Criminals from California People from Van Nuys, Los Angeles