Kevin Mitnick the most famous hacker
Lazlo Takacs

Kevin Mitnick the most famous hacker

Lazlo Takacs

Where it all began

Kevin David Mitnick is one of the most famous hackers. At age 13 Mitnick used dumpster dicing and social engineering to bypass the bus ticketing system in Los Angeles, this way he was able to ride the LA area using unused transfer slips.

First big step

His first unauthorized access to a network was in 79’ , when he was only 16 years old. He broke into DEC’s ( Digital Equipment Corporation ) computer network and simply copied their software, later he was charged for this action in 1988,  got sentenced for 12 months in prison. The prison has been followed by a 3 years of supervised release, at the end of this release he hacked into Pacific Bell voice mail computers, as we would except a warrant was issued for his arrest. Mitnick fled and became a fugitive for almost 3 years.

According tot he USPDJ ( U.S. Department of Justice ) , Mitnick has gained unauthorized access to hundreds of computer networks, copied valuable propiertary software from telephone companies, stole computer passwords, altered computer networks and broke into private e-mails.

Forthe last time FBI arresthed him on February 15, 1995 at his apartment in Raleigh, Nort Carolina. He was charged with wire fraud ( 14 counts ) , possession of unauthoriyed access devices ( 8 counts ) , unautorized access to a federal computer, and causing damage to a computer.

In 1999 , Mitnick pleaded guilty and was sentenced for 46 months in prison plus 22 months for violating terms of his 1989 supervised release sentence for computer fraud.

His life nowadays

He was released on January 21, 2000. After his release he was initially forbidden to use any communications technology, this prohibition ended on January 21, 2003.

He rehabilitated succesfully, nowadays he is a computer security consultant and an author.

His company is Mitnick Security Consulting LLC, helps test companies security strenghts/weaknesses and potential lopholes. He is also a Hacking Officer of the security awareness training company known as KnowBe4, also advisory board member at Zimperium.

As you can see, to be a hacker is not a bad thing, however it is really depends on how you wish to use this "power". Any former hacking experience can be used for good.

If you wish to read more about his life, there is a chance as a few books has already been published by him:

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Share your ideas with us about this article

Previous posts

GDPR and BitNinja - Important updates
By now, you are likely aware that on May 25, 2018, a new data privacy law introduced in Europe called the General Data Protection Regulation (GDPR) will go into effect. GDPR govern how businesses collect, use and share personal data and it allows individuals to exercise their legal rights. Of course, we have taken the necessary steps to ensure that we are compliant with the GDPR. We updated our Privacy Policy and General Contract Terms and Conditions. Also, we created this separate section about the topic in order to keep you updated. The Data Processing Addendum ...
GPON routers – new elements of your botnet attacks?
People can never rest. We thought that after the last serious Drupal vulnerablity finally we can rest, but a new threat came up which is including GPON routers made by Dasan. GPON is a type of Passive Optical Network (PON) used to provide fiber connections. It is being used to provide short haul fiber connections for cellulas base stations, home access points, DAS. Primary regions with GPON devices include Vietnam, Mexico, Kazakhstan. Top countries Number of Devices Mexico 492,080 Kazak...