Kevin Mitnick | |
---|---|
Born | Kevin David Mitnick August 6, 1963 Los Angeles, California, U.S. |
Died | July 16, 2023 59) Pittsburgh, Pennsylvania, U.S. | (aged
Other names | The Condor, The Darkside Hacker |
Occupations | |
Organizations |
|
Board member of | KnowBe4 |
Criminal charge(s) | 1995: Wire fraud (14 counts), possession of unauthorized access devices (8 counts), interception of wire or electronic communications, unauthorized access to a federal computer, and causing damage to a computer [1] [2] |
Criminal penalty |
|
Spouse | Kimberley Mitnick (m. 2022) |
Call sign | N6NHG [4] |
Website | www |
Kevin David Mitnick (August 6, 1963 – July 16, 2023) was an American computer security consultant, author, and convicted hacker. He is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes. [5] Mitnick's pursuit, arrest, trial and sentence were all controversial, as were the associated media coverage, books and films. [6] [7] After his release from prison, he ran his own security firm, Mitnick Security Consulting, LLC, and was also involved with other computer security businesses.
Mitnick was born on August 6, 1963, [8] in Van Nuys, Los Angeles, California. [9] His father was Alan Mitnick, his mother was Shelly Jaffe, and his maternal grandmother was Reba Vartanian. [10] [11] Mitnick was Jewish, [12] [13] and grew up in Los Angeles, California. [8] At age 12, Mitnick convinced a bus driver to tell him where he could buy his own ticket punch for "a school project", and was then able to ride any bus in the greater Los Angeles area using unused transfer slips he found in a dumpster next to the bus company garage. [14]
Mitnick attended James Monroe High School in North Hills, [15] [16] during which time he became a licensed amateur radio operator with callsign WA6VPS [17] (his license was restored after imprisonment with callsign N6NHG [18] ). He chose the nickname "Condor" after watching the movie Three Days of the Condor . [19] He was later enrolled at Los Angeles Pierce College and USC. [15]
For a time, Mitnick worked as a receptionist for Stephen S. Wise Temple in Los Angeles. [15]
Mitnick gained unauthorized access to a computer network in 1979, at 16, when a friend gave him the telephone number for the Ark, the computer system that Digital Equipment Corporation (DEC) used for developing its RSTS/E operating system software. [20] He broke into DEC's computer network and copied the company's software, a crime for which he was charged and convicted in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into Pacific Bell voicemail computers. After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two-and-a-half years. [21]
According to the United States Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies. [22] [23] Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private emails. [23] [24]
After a well-publicized pursuit, the Federal Bureau of Investigation arrested Mitnick on February 15, 1995 at his apartment in Raleigh, North Carolina, on federal offenses related to a two-and-a-half-year period of computer hacking that included computer and wire fraud. [26] [27] He was found with cloned cell phones, more than 100 cloned cellular phone codes, and multiple pieces of false identification. [28]
In December 1997, the Yahoo! Web site was hacked, displaying a message calling for Mitnick's release. According to the message, all recent visitors of Yahoo!'s site had been infected with a computer worm that would wreak havoc on Christmas Day unless Mitnick was released. Yahoo! dismissed the claims as a hoax and said that the worm was nonexistent. [29] [30]
In 1998, Mitnick was charged in the United States District Court for the Central District of California with 14 counts of wire fraud, eight counts of possession of unauthorized access devices, interception of wire or electronic communications, unauthorized access to a federal computer, and causing damage to a computer. [31] As part of a plea bargain, Mitnick pleaded guilty in 1999 to four counts of wire fraud, two counts of computer fraud, and one count of illegally intercepting a wire communication. U.S. district judge Mariana Pfaelzer sentenced Mitnick to 46 months in federal prison plus 22 months for violating the terms of his 1989 supervised release sentence for computer fraud. He admitted to violating the terms of supervised release by hacking into Pacific Bell voicemail and other systems and to associating with known computer hackers, in this case co-defendant Lewis De Payne. [1] [32] [33] He was diagnosed with Asperger syndrome, but it was not used as evidence because he pleaded guilty before going to trial. [34]
Mitnick served five years in prison—four-and-a-half years' pre-trial and eight months in solitary confinement, because, according to Mitnick, law enforcement officials convinced a judge that he had the ability to "start a nuclear war by whistling into a pay phone", [35] implying that law enforcement told the judge that he could somehow dial into the NORAD modem via a payphone from prison and communicate with the modem by whistling to launch nuclear missiles. [36] In addition, a number of media outlets reported on the unavailability of kosher meals at the prison where he was incarcerated. [37]
Mitnick was released from prison on January 21, 2000. During his supervised release period, which ended on January 21, 2003, he was initially forbidden to use any communications technology other than a landline telephone. [38] Under the plea deal, Mitnick was also prohibited from profiting from films or books based on his criminal activity for seven years, under a variation of the Son of Sam law. [39]
In December 2001, a Federal Communications Commission (FCC) judge ruled that Mitnick was sufficiently rehabilitated to possess a federally issued amateur radio license. [40]
Mitnick's criminal activities, arrest, and trial, along with the associated journalism, were all controversial. [6] Though Mitnick was convicted of copying software unlawfully, [41] his supporters argue that his punishment was excessive and that many of the charges against him were fraudulent [42] and not based on actual losses. [43]
John Markoff and Tsutomu Shimomura, who had both been part of the pursuit of Mitnick, wrote the book Takedown about Mitnick's capture. [44]
The case against Mitnick tested the new laws that had been enacted for dealing with computer crime and it raised public awareness of security involving networked computers. The controversy remains and the Mitnick story is often cited today as an example of the influence of news media on law enforcement personnel. [45]
After his release in 2000, Mitnick became a paid security consultant, public speaker, and author. He carried out security consulting for, performed penetration testing services, and taught social engineering classes to companies and government agencies. He ran Mitnick Security Consulting LLC, a computer security consultancy and was part owner of KnowBe4, provider of an integrated platform for security awareness training and simulated phishing testing, [46] [47] as well as an active advisory board member at Zimperium, [48] a firm that develops a mobile intrusion prevention system. [49] He resided in Las Vegas, Nevada. [50]
Kevin Mitnick died from pancreatic cancer on July 16, 2023, at the age of 59 at a Pittsburgh, Pennsylvania hospital. [10] At the time of his death, he was married and his wife, Kimberley Mitnick, was pregnant with their first child, a son. [8] [10] [51] [52] [53]
In 2000, Skeet Ulrich and Russell Wong portrayed Mitnick and Tsutomu Shimomura, respectively, in the movie Track Down (known as Takedown outside the US), which was based on the book Takedown by John Markoff and Shimomura. The DVD was released in September 2004. [54]
Mitnick also appeared in Werner Herzog's documentary Lo and Behold, Reveries of the Connected World (2016). [55]
Mitnick is the co-author, with William L. Simon and Robert Vamosi, of four books, three on computer security and an autobiography:
John Thomas Draper, also known as Captain Crunch, Crunch, or Crunchman, is an American computer programmer and former phone phreak. He is a widely known figure within the computer programming world and the hacker and security community, and generally lives a nomadic lifestyle.
Tsutomu Shimomura is a Japanese-born physicist and computer security expert. He is known for helping the FBI track and arrest hacker Kevin Mitnick. Takedown, his 1996 book on the subject with journalist John Markoff, was later adapted for the screen in Track Down in 2000.
John Gregory Markoff is a journalist best known for his work covering technology at The New York Times for 28 years until his retirement in 2016, and a book and series of articles about the 1990s pursuit and capture of hacker Kevin Mitnick.
In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in the sense that it is often one of the many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take an action that may or may not be in their best interests."
Freedom Downtime is a 2001 documentary film sympathetic to the convicted computer hacker Kevin Mitnick, directed by Emmanuel Goldstein and produced by 2600 Films.
Kevin Lee Poulsen is an American convicted fraudster, former black-hat hacker and a contributing editor at The Daily Beast.
A security hacker or security researcher is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.
Track Down is a 2000 American crime thriller film based on the non-fiction book Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw—By the Man Who Did It by Tsutomu Shimomura and John Markoff, about the manhunt for computer hacker Kevin Mitnick. It is directed by Joe Chappelle, with a screenplay by Howard A. Rodman, John Danza, and David & Leslie Newman. The film stars Skeet Ulrich as Mitnick and Russell Wong as Shimomura, with Angela Featherstone, Donal Logue, Christopher McDonald, Master P, and Tom Berenger.
globalHell was an American hacker group. They were one of the first hacking groups who gained notoriety for website defacements and breaches. The combined losses caused by the group were estimated to be ranged between $1.5m and $2.5m. The group was called a "cyber gang" as it had many of the same characteristics of a gang and carried out the same activities as a gang, including trafficking in stolen credit card numbers.
Jeremy Alexander Hammond, also known by his online moniker sup_g, is an American anarchist activist and former computer hacker from Chicago. He founded the computer security training website HackThisSite in 2003. He was first imprisoned over the Protest Warrior hack in 2005 and was later convicted of computer fraud in 2013 for hacking the private intelligence firm Stratfor and releasing data to WikiLeaks, and sentenced to 10 years in prison.
Ehud "Udi" Tenenbaum, also known as The Analyzer, is an Israeli hacker.
Justin Tanner Petersen was an American hacker, concert promoter, sound engineer, private investigator and an informant for the Federal Bureau of Investigation. While tasked with helping to catch other hackers and fugitives wanted by the FBI, he continued to commit serious crimes.
Cameron LaCroix, aka camo, cam0, camZero, cmuNNY, is an American computer hacker best known for the hacking of Paris Hilton's cellular phone, accessing LexisNexis, and defacing Burger King's Twitter account. He has also been convicted of intentionally causing damage to a protected computer system, obtaining information from a protected computer system, wire fraud, and aggravated identity fraud. Prosecutors said victims of the teen's actions have suffered about $1 million in damages. Pursuant to a plea agreement signed by the juvenile in August 2005, he received 11 months in a federal juvenile detention facility. In January 2007 his supervised release was revoked due to possession of a cell phone.
Andrew Alan Escher Auernheimer, best known by his pseudonym weev, is an American computer hacker and professional Internet troll. Affiliated with the alt-right, he has been described as a neo-Nazi, white supremacist, and antisemitic conspiracy theorist. He has used many aliases when he has contacted the media, but most sources state that his real first name is Andrew.
Max Ray Vision is a former computer security consultant and hacker who served a 13-year prison sentence, the longest sentence ever given at the time for hacking charges in the United States. He was convicted of two counts of wire fraud, including stealing nearly 2 million credit card numbers and running up about $86 million in fraudulent charges.
The Federal Correctional Institution, Fort Dix is a low-security United States federal prison for male offenders in New Jersey. It is operated by the Federal Bureau of Prisons. A satellite prison camp houses minimum-security male inmates.
"My kung fu is stronger than yours", or "wǒ de gōng fū bǐ nǐ de gōng fū gèng qiáng", is a popular cultural trope and catchphrase, originally referring to the clichéd plots of martial arts films. The phrase is also rendered as "My kung fu is better than yours", "My kung fu is stronger than your kung fu", "My kung fu is the best", etc.
Carding is a term of the trafficking and unauthorized use of credit cards. The stolen credit cards or credit card numbers are then used to buy prepaid gift cards to cover up the tracks. Activities also encompass exploitation of personal data, and money laundering techniques. Modern carding sites have been described as full-service commercial entities.
The Jewish cybercriminal...
In the book, released in 2011, Mitnick briefly describes his bar mitzvah and secular Jewish upbringing in California.
... as a student at James Monroe High School in North Hills, he broke into the Los Angeles Unified School District's computers.
{{cite press release}}
: CS1 maint: numeric names: authors list (link)