Kevin Mitnick
Essay by review • February 22, 2011 • Research Paper • 1,177 Words (5 Pages) • 1,486 Views
The word hacker in today’s society has many meaning, but the definition that I will be talking about in this paper is best described by dictionary.com as, “One who uses programming skills to gain illegal access to a computer network or file.”[1] According to wikipedia.com there are three different types of hackers, white hat hackers, grey hat hackers and black hat hackers. A white hat hackers is, “. . .a person who is ethically opposed to the abuse of computer systems. Realizing that the Internet now represents human voices from all around the world makes the defense of its integrity an important pastime for many.”[2] A grey hat hacker is, “. . .a skilled hacker who sometimes acts legally and in good will and sometimes not. They are a hybrid between white and black hat hackers. They hack for no personal gain and do not have malicious intentions, but occasionally may or may not commit crimes in their actions.”[3] And lastly a black hat hacker is, “a malicious or criminal person whose correct label is "cracker". . .Usually a Black Hat refers to a person that maintains knowledge of the vulnerabilities and exploits they find as secret for private advantage, not revealing them either to the general public or manufacturer for correction.”[4]
One of the world’s most notorious black hat hackers goes by the alias Condor, named after the Robert Redford movie, “Three Day’s of the Condor”[7]. This is none other than the notorious, Kevin Mitnick. He has been a major thorn in the side of many companies computer networks since the beginning. His first major “crack” was in 1979, “. . .when a friend gave him the phone number for the Ark, the computer system at Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC's computer network and copied DEC's software. . .”[5] This in turn gave him not only the ability to make free phone calls but also listen in and eavesdrop on anyone he pleased.[6]
Kevin’s first run-in with the law was actually caused by an angry girlfriend of one of Mitnick’s associates. After physically breaking into the one of the U.S biggest Computer System for Mainframe Operations, “. . .a database used by many of the nation's phone companies for controlling the phone system's basic record keeping functions.”[8] He stole lists of computer passwords, including the combinations to the door locks at nine Pacific Bell central offices and a series of operating manuals for the COSMOS system. Mitnick was sentenced to three months in a juvenile correction centre and a years probation.[8]
A few years later he was busted using one of the computers at the University of South California’s computers to hack into a computer at the pentagon using their ARPAnet. “The ARPANET (Advanced Research Projects Agency Network) developed by DARPA of the United States Department of Defense, was the world's first operational packet switching network, and the predecessor of the global Internet.”[9] Before any major harm could be accomplished he was busted by the universities campus enforcement.
A third incident occurred in 1988 when, “Kevin and a friend, Lenny DiCicco, fought a pitched electronic battle against scientists at Digital Equipment's Palo Alto research laboratory. Mitnick had become obsessed with obtaining a copy of Digital's VMS minicomputer operating system, and was trying to do so by gaining entry to the company's corporate computer network, known as Easynet. The computers at Digital's Palo Alto laboratory looked easiest, so every night with remarkable persistence Mitnick and DiCicco would launch their modem attacks from a small Calabasas, California company where DiCicco had a computer support job. Although Reid discovered the attacks almost immediately, he didn't know where they were coming from, nor did the local police or FBI, because Mitnick was manipulating the telephone network's switches to disguise the source of the modem calls.”[10] This being Kevin’s biggest crime to date he pulled off all the stops, by even hacking into the phone companies data base and scrambling the address given off by the modem this dumbfounded the FBI I and added a new charge to wrap sheet, “Evading The FBI”.[11] This time it turns out that Mitnick was his own worst enemy, being cursed with a sense of humour and a big ego Mitnick decided to the prank DiCicco by continuously phoning his boss claiming that, “DiCicco was in trouble with the Internal Revenue Service.”[12] This continuous harassment inevitably cause DiCicco to confess and in turn Mitnick was busted as well. Mitnick then found himself sitting in a court room facing serious charges of count of computer fraud and one count of possessing illegal long-distance access codes. But in an unlikely and controversial turn of events, Mitnick was let off again with what some especially DEC think of as another slap on the wrist and was sentenced to one year in prison and six months in a counselling program for his computer addiction.
After finishing his rehabilitation in 1990 he got
...
...