Kevin Mitnick
A knock sounded from the door of his apartment, Kevin Mitnick opened the door and found dozens of FBI agents and other law enforcement agencies have prepared for him. This is the end of the journey of a hacker who had to run to avoid imprisonment. Hackers during buronannya has legendary status, and even has grown into a myth that is greater than his own
A knock sounded from the door of his apartment, Kevin Mitnick opened the door and found dozens of FBI agents and other law enforcement agencies have prepared for him. This is the end of the journey of a hacker who had to run to avoid imprisonment. Hackers during buronannya has legendary status, and even has grown into a myth that is greater than his own
The arrest happened in 1995 that marked the beginning of the case's most controversial arrest of a perpetrator of cyber crime. Mitnick was an intruder on the computer system incarnated as America's Most Wanted Hacker.
Computer Addiction
Mitnick is easy to learn computer by hanging out in RadioShack stores or general diperpustakaan, his family was not wealthy enough to own their own computers. Fondness for developing computer until he reaches maturity.
In the period of the 1990s, Mitnick's easy to get out into the computer system. But in the late 1980s he actually wanted to leave hobynya and start looking for a legitimate job. Unfortunately, before he could do that, in 1987 he was arrested for breaking the company of Santa Cruz Organization, a software company that primarily moves in the field of the Unix operating system. When the lawyers succeeded in reducing mitnik crimes into acts that are less good, Mitnick was only in ganjar 3 years' probation.
Not until a year back tripped Mitnick case law. Because of a friend who garanya computer he used to break into another computer Mitnick reported to the authorities once it is broken Mitnick is owned Digital Equipment Corporation. Every time the computer break mitnik done is take code from the software authors. The code then he studied in earnest, sometimes found several weaknesses in it. In a chance Mitnick admitted only take the code from the software author that he liked or that interested him.
Mitnick in DEC cases of prisoners who get heavier. When the lawyers mentioned have Mitnick, 'addicted to the computer that can not be stopped'. He was rewarded 1-year sentence.
In prison Mitnick got a bad experience. At that time the legend of Kevin Mitnick or better known under the pseudonym 'the condor', is growing.
Mitnick is easy to learn computer by hanging out in RadioShack stores or general diperpustakaan, his family was not wealthy enough to own their own computers. Fondness for developing computer until he reaches maturity.
In the period of the 1990s, Mitnick's easy to get out into the computer system. But in the late 1980s he actually wanted to leave hobynya and start looking for a legitimate job. Unfortunately, before he could do that, in 1987 he was arrested for breaking the company of Santa Cruz Organization, a software company that primarily moves in the field of the Unix operating system. When the lawyers succeeded in reducing mitnik crimes into acts that are less good, Mitnick was only in ganjar 3 years' probation.
Not until a year back tripped Mitnick case law. Because of a friend who garanya computer he used to break into another computer Mitnick reported to the authorities once it is broken Mitnick is owned Digital Equipment Corporation. Every time the computer break mitnik done is take code from the software authors. The code then he studied in earnest, sometimes found several weaknesses in it. In a chance Mitnick admitted only take the code from the software author that he liked or that interested him.
Mitnick in DEC cases of prisoners who get heavier. When the lawyers mentioned have Mitnick, 'addicted to the computer that can not be stopped'. He was rewarded 1-year sentence.
In prison Mitnick got a bad experience. At that time the legend of Kevin Mitnick or better known under the pseudonym 'the condor', is growing.
His reputation as a Computer criminals are also increasingly rising beyond reality. Warden at Lompoc, is the prison where Mitnick, Mitnick thought could infiltrate into the computer armed only with voice and telephone. Result
Mitnick is not only not use the phone, he also spent months and months of isolation. No wonder then that he reportedly suffered a mental disorder while serving his sentence at Lompoc.
In 1989 Mitnick was released from prison.
Mitnick is not only not use the phone, he also spent months and months of isolation. No wonder then that he reportedly suffered a mental disorder while serving his sentence at Lompoc.
In 1989 Mitnick was released from prison.
He tried to find a formal job, but his status as an ex-con makes Mitnick is hard to keep a job. Eventually he worked as a miners of information for the office of private investigator's office. Of course, Mitnick was dragged back to the world of gray and black. In the early 1990s, Mitnickpun sought by the FBI again. This time the fear of isolation in space for years, Mitnick decided to run away.
Hacking The Human Side
Mitnick skills as a hacker is not limited to purely technical Traffic. He is the purely technical skills. He is a man who understands well that the security of computer systems consisting of both policy and organization, human resources, process involved and the technology used. If he seoarang main kemapuannya superheroes seoarang Mitnick is the practice of social science engginering aka social engineering. This is a technique to get important information, such as passwords, by exploiting human weakness.
Mitnick's ability is best illustrated in the following stories, stories told Mitnick himself on an online forum Slasdot.org
Mitnick skills as a hacker is not limited to purely technical Traffic. He is the purely technical skills. He is a man who understands well that the security of computer systems consisting of both policy and organization, human resources, process involved and the technology used. If he seoarang main kemapuannya superheroes seoarang Mitnick is the practice of social science engginering aka social engineering. This is a technique to get important information, such as passwords, by exploiting human weakness.
Mitnick's ability is best illustrated in the following stories, stories told Mitnick himself on an online forum Slasdot.org
"On one occasion, I was challenged by a friend to get the number (phone) Sprint Foncard her. He said he would buy dinner if I could get that number. I will not refuse to eat good, so I berusahan by contacting Customer Service and perpura act as one of the information technology section. I asked the officer who answered whether he had difficulty in system use. He said no, I ask that the system used to access customer data, I pretended to verify. He mentioned the name of the system. "
"After that I returned call Costumer Service and associated with a different officer. I said that my computer is broken and I want to see a customer's data. He said the data was berjibun questions. What is your name? You work for who? Your address, where? Well, something like that. Because of my lack of research, I made up names and places. Failed. He said he would report this phone call in security. "
"Because I noted his name, I brought sorang friend and informed him about the situation. I asked a friend to masquerade as 'investigator keamaman' to note the report from the Customer Service officers and spoke with this officer. As 'investigators' he says received reports of people trying to get customer personal information. When asked questions about the phone, 'investigation menyakan what information the caller had requested. The officer said the number Foncard. 'investigators' to ask, is what number? And the officer gave the number. Oops. Case closed "
"Because I noted his name, I brought sorang friend and informed him about the situation. I asked a friend to masquerade as 'investigator keamaman' to note the report from the Customer Service officers and spoke with this officer. As 'investigators' he says received reports of people trying to get customer personal information. When asked questions about the phone, 'investigation menyakan what information the caller had requested. The officer said the number Foncard. 'investigators' to ask, is what number? And the officer gave the number. Oops. Case closed "
At Large
I Sebaga fugitive Mitnick berusahan best to not get caught. He moved around a lot and always a place to stay off the habit. Various ways to do so he is not being tracked by the pursuers. But he could not leave the computer and hobby mengoprek its Internet network. Even some allegedly used his skills to get a new identity.
Mitnick legend during the run in less than two years, increasingly become-and so he menjelama as 'Cyber Ninja' who is said to be breaking into Pentagon computers with only a television remote, a rumor that exceeds any fiction.
Why Mitnick, a fugitive in the case of computer break-ins, can become the most wanted criminals? This could not be separated from the role of mass media. In particular is a series of sensational articles from John Markoff published in the New York Times.
I Sebaga fugitive Mitnick berusahan best to not get caught. He moved around a lot and always a place to stay off the habit. Various ways to do so he is not being tracked by the pursuers. But he could not leave the computer and hobby mengoprek its Internet network. Even some allegedly used his skills to get a new identity.
Mitnick legend during the run in less than two years, increasingly become-and so he menjelama as 'Cyber Ninja' who is said to be breaking into Pentagon computers with only a television remote, a rumor that exceeds any fiction.
Why Mitnick, a fugitive in the case of computer break-ins, can become the most wanted criminals? This could not be separated from the role of mass media. In particular is a series of sensational articles from John Markoff published in the New York Times.
Mitnick Markoff condemn as a terrorist. In a statement released after a long time, Mitnick calls himself the displayed image Markoff like seoarang terrorist who tried to control the nuclear world. "I was as if an Osama bin Mitnic," he joked.
Mitnick Markoff describes as a lethal, unstoppable and deserves to be fugitive from the FBI and ten other law enforcement agencies. Mafkoff articles, which sometimes appears on the front page, make the strongest candidate Mitnick pilot project on cyber crime. So the future of the prison Mitnick has written pretty much the same saati.
During a fugitive Mitnick also continued to run the action. He broke into the big computer companies. Including Sun Microsystems. He uses, and here is the break maksutnya an account on online storage service to store backups of the action. Actually Mitnick does not work alone but when caught he never expressed any colleague.
One of the victims was T. Mitnick Shimomura, a computer scientist who in some writings on the Internet doubtful cleanliness. There are allegations that Shimomura was also a hacker who often perform illegal acts. One thing that many agreed was the Shimomura have the arrogant attitude and seems to want to appear as a hero in the story of the hunt Mintick.
Shimomura, Markoff and the FBI hand in hand to catch the fugitive. Guidelines from Mafkoff sensational news, their ability hacking Shimomura and the FBI legal force eventually track Mitnick residence.
As usual story of the capture of fugitive seoarang, Mitnick did ketledoran. Storage service which he seems to have automated programs to check the contents of files stored. The owner of the account used Mitnick got a warning from the system of excess capacity. This is the beginning of the capture of Mitnick.
Mitnick admitted that he was reckless because it did not expect that the FBI, Shimomura, Markoff, and cellular phone service provider do the same work so closely and integrated.
"Cellular operators to search in their billing database of dial-up Internet service Netcom POP. This, as might be expected, making them able to identify areas of call and the number MIN (mobile identification number) that I use at the time. Since I often change the number, they watched any data calls happening at that location. Then, by means of Cellscope 2000 Shimomura, my phone signals to track down to the right location, "Mitnick tells.
Two weeks before the capture of Mitnick recently moved to Raleigh. The new location makes less aware and he forgot to track dial-up lines that digunakannnya. Several hours before the capture of new Mitnick something happens, tracking and monitoring was carried out on the path he used. As he was trying to track the extent to which surveillance has been undertaken to whom these tracking dilbalik, he heard a knock on the door. Mitnick opened the door and confronted by dozens of U.S. Marshall and the FBI.
Four Half Year Hanged
Mitnick was arrested after being caught with no possibility of bail. He also was submitted to the court. Approximately four years he spent without any certainty. This really makes Mitnick frustrating.
During the FBI in prison he did not get a chance in his case. Even Mitnick and his attorney could not see the data because there are cases in laptops and laptop access to Mitnick is considered dangerous. Mitnick accused can make missiles armed with only sliding laptop or phone. Larangn it remains valid even if the lawyer uses a modem and a laptop without any network capabilities.
Mitnick was arrested after being caught with no possibility of bail. He also was submitted to the court. Approximately four years he spent without any certainty. This really makes Mitnick frustrating.
During the FBI in prison he did not get a chance in his case. Even Mitnick and his attorney could not see the data because there are cases in laptops and laptop access to Mitnick is considered dangerous. Mitnick accused can make missiles armed with only sliding laptop or phone. Larangn it remains valid even if the lawyer uses a modem and a laptop without any network capabilities.
Mitnick eventually blamed for causing damage to hundreds of millions of dollars damage by Mitnick is not true, because the company that allegedly harmed even those not reporting losses in their annual reports.
The final agreement for the Mitnick is a guilty plea. Guilty in the case of computer break-ins and tapping phone lines. Mitnick gave up and followed it, in exchange for 4 years in more time in prison counts as mas prisoners. Total Mitnick was sentenced to 5 years in prison, 4 years in a prisoner in limbo and the remaining 1 more year.
He was released in 2000 on condition that must not touch the computer or telephone. In 2002 he could only use computers but not connected to the Internet. New in 2003 he used the Internet more for the first time.
Since the release Mitnic trying to improve his life. He wrote two books on hacking, but that he also founded his own security consulting company. "Hackers are the only crime whose expertise could be used again for something ethical. I never saw it the other fields, eg ethical robbery, "said Mitnick.
Tidak ada komentar:
Posting Komentar