Preview

Kevin Mitnick: Infamous Hacker

Satisfactory Essays
Open Document
Open Document
358 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Kevin Mitnick: Infamous Hacker
Alexander Kogl
CIT160 – Brim
Kevin Mitnick: inFAMOUS Hacker In the 1990’s, Kevin Mitnick, aka Condor, was the most-wanted hacker in America. He got his start at the early age of 12, using a workaround to the L.A. transit punch card system. Condor’s notoriety increased after gaining his first successful unauthorized access to a computer network in 1979. His actions give him the title of hacker as defined in the course textbook because he has intentionally entered computer systems to which he would otherwise not have access. After spending time on the run for his crimes and in prison, he is now one of the most sought-after consultants in the industry. While no one knows for sure how many systems were breached during Mitnick’s heyday, there are some confirmed hacks that made the list. In order to stay on the run, he had to hack into every resource available at the time. Major companies such as Motorola, Siemens, Fujitsu, and Nokia all fell victims to Kevin Mitnick. Valuable, proprietary software was copied and used against them, their networks altered, accounts stolen and changed, and phones cloned. The final total in damages Condor caused may never be fully known. Interestingly, Mitnick’s last mistake was hacking into a fellow hacker’s computer system. This hacker, Tsutomu Shimomura, was so incensed that he made it a personal vendetta to find Mitnick. Joining forces with the FBI and forming a task force, Tsutomu spent two years hunting Condor down and eventually pinpointing his whereabouts in North Carolina. Kevin Mitnick’s actions forced companies to rethink the security of their infrastructures. Any student studying computer security should study his methods. Why? Knowing about the history and precedents set by these early hackers can help prevent the same things from happening again in the future. While technology has made many advances, many of the tools and techniques Kevin Mitnick used back in the 1990s are still quite prominent today. References



References: Kevin Mitnick - http://en.wikipedia.org/wiki/Kevin_Mitnick Most Famous Hackers & Crackers in the World - http://homesecurity.net/hackers-crackers/ Security Awareness: Applying Practical Security in Your World 2nd Ed., Mark Ciampa, 2007

You May Also Find These Documents Helpful

  • Better Essays

    Oriyano, S.-P., & Gregg, M. (2011). Hacking Techniques, Tools, and Incident Handeling . Burlington: Jones & Bartelle Learning .…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    After coming across Mat’s account, the hackers did some background research. His Twitter account linked to his personal website, where they found his Gmail address. Guessing that this was also the e-mail address he used for Twitter, Phobia went to Google’s account recovery page. He didn’t even have to actually attempt a recovery. This was just a recon mission.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Max finds any ‘loop-holes’ in websites and uses unauthorized access to gain data. Hackers utilized carefully planned strategies to commit their crime such as, “Take advantage of the enemy’s unreadiness, make your way by unexpected routes, and attack unguarded spots” (Poulsen, p. 159). Max obtained unauthorized access to vulnerable websites, and used this as an advantage to easily increase his gain in stolen information.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Chewy 123 Case Study

    • 371 Words
    • 2 Pages

    He'd been working with a subgroup of the loose-knit hacking movement "Anonymous" to disrupt the networks of Sony Pictures,…

    • 371 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In April 2011, hackers obtained person information from over 100 million PlayStation Network users and Sony Online Entertainment users including credit, debit, and bank account information. This breach cost Sony and credit card issuers up to a total of $2 billion dollars (Laudon, 2013). During the time of the breach, security and control were not top priority. According to this case study Sony was using an older version of Apache Web Server software that was known for its security issues and compromised the security of Sony’s firewall, allowing hacker easy access. As for control, Sony obviously did not have appropriate policies or organizational procedures…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Monsegur Research Papers

    • 303 Words
    • 2 Pages

    The FBI immediately put Hector X. Monsegur to work for three years to bring down the other top hackers in his group. 300 cyber-attacks were stopped and charges were given to six alleged hackers. Some of Monsegur’s crimes consisted of “three counts of conspiracy to engage in computer hacking, computer hacking in furtherance of fraud, conspiracy to commit access device fraud, conspiracy to commit bank fraud and aggravated identity theft” (Chad Bray). Most black hats should be dealt with in this manner; use their talents to catch other hackers first and then decide if he’s worthy of a pardon. He helped bring down a big threat, but that is no reason to set him loose. If the authorities hired more white and gray hats instead of jailing them and used captured black hats as a counter offense they could all prove very beneficial.…

    • 303 Words
    • 2 Pages
    Good Essays
  • Better Essays

    References: Conklin, A., Williams, G., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (3rd ed.). New York, NY: McGraw-Hill/Osborne Media.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Take Home Midterm

    • 1653 Words
    • 7 Pages

    Another hacker wrongfully accused was named Jonathan James, or c0mrade. He was convicted and sent to prison for hacking in the United States–all while he was still a minor. At only fifteen years of age, he managed to hack into a number of networks, including those belonging to Bell South, Miami-Dade, the U.S. Department of Defense, and NASA.…

    • 1653 Words
    • 7 Pages
    Good Essays
  • Good Essays

    This program allowed him to rebuild hacker chat messages by listening to network information. Other times Max would use hacking for bad. He would find vulnerable Wi-Fi sites that he could use to hide his hacking activity, this is called wardriving. Max created a virus to gain entry into other hackers’ networks, in order to see what they were doing and to steal their credit card information…

    • 1177 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays

Related Topics