Essay PreviewMore ↓
One of the world’s most notorious black hat hackers goes by the alias Condor, named after the Robert Redford movie, “Three Day’s of the Condor”. This is none other than the notorious, Kevin Mitnick. He has been a major thorn in the side of many companies computer networks since the beginning. His first major “crack” was in 1979, “. . .when a friend gave him the phone number for the Ark, the computer system at Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC's computer network and copied DEC's software. . .” This in turn gave him not only the ability to make free phone calls but also listen in and eavesdrop on anyone he pleased.
Kevin’s first run-in with the law was actually caused by an angry girlfriend of one of Mitnick’s associates. After physically breaking into the one of the U.S biggest Computer System for Mainframe Operations, “. . .a database used by many of the nation's phone companies for controlling the phone system's basic record keeping functions.” He stole lists of computer passwords, including the combinations to the door locks at nine Pacific Bell central offices and a series of operating manuals for the COSMOS system.
How to Cite this Page
"Kevin Mitnick." 123HelpMe.com. 31 Mar 2020
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Individual Presentation: Kevin Mitnick Introduction Originally, I had planned on researching George Lucas as my creative genius. I am in love with the Star Wars saga, but I really could not get interested in George Lucas. Then, late one night, I saw a movie called Takedown. It was based on a true story that dealt with the pursuit and capture of Kevin Mitnick, one of the most infamous computer hackers of all time. I was instantly amazed. As soon as the movie was over, I began scouring the internet looking for information concerning him.... [tags: Computers Technology Kevin Matnick Essays]
3140 words (9 pages)
- ... 3) Pgp is an encryption software which was first designed by Phil Zimmermann to encrypt data and secure it from predators while transferring the data, it is used in in email service to encrypt the messages. Pgp encryption works with two keys which are known as public and private keys which are generated by the pgp software randomly which may consists of series of alphabets and numbers and characters, one of the key which is public key is used to share with others and the other key which is private key is protected from others.... [tags: Pacific Bell's COSMOS phone, passwords]
1649 words (4.7 pages)
- Kevin Mitnick Hacking has been around since the birth of computers. When the term hacking was first used, its meaning was not that of how we think of it today. At the origins of computing, a hacker was considered to be just a "creative programmer (Baase, 2003)." Early forms of computer games as well as the beginnings of operating systems were discovered and created by these original hackers. These hackers plunged into systems as a way of an intellectual challenge and to aspire to gain knowledge (Baase, 2003).... [tags: Hacker Hackers Hacking Computers Essays]
979 words (2.8 pages)
- The word hacker in today’s society has many meaning, but the definition that I will be talking about in this paper is best described by dictionary.com as, "One who uses programming skills to gain illegal access to a computer network or file." According to wikipedia.com there are three different types of hackers, white hat hackers, grey hat hackers and black hat hackers. A white hat hackers is, “. . .a person who is ethically opposed to the abuse of computer systems. Realizing that the Internet now represents human voices from all around the world makes the defense of its integrity an important pastime for many.” A grey hat hacker is, “.... [tags: Biography]
1231 words (3.5 pages)
- Highlight the main ethical issues that this case brings to light and critically apply : Consequence based Duty based Character based Ethical theories to discuss whether the FBI were correct in attempting to capture and prosecute Mitnick. Introduction to ethics “Ethics”, in general, is nothing but a principle of conduct. Ethics can also be defined as moral philosophy which is used to answer questions related to morality. The word ‘Ethics’ has been derived from the Greek word ‘Ethos’ which simply meant “the state of being” or “to keep ones soul pure”.... [tags: Ethics]
2637 words (7.5 pages)
- Summary of the Current Situation Kevin Plank is the President, CEO, and Chairman of the Board, Wayne Marion is the Chief Operating Officer and Bard Dickerson is the Chief Financial Officer. Ninety-four percent of Under Armour’s revenue is generated from the U.S. and Canada. Under Armour employs 3000 non-unionized employees with eight executives being in top management. Under Armour sales in three different categories which include apparel, footwear, and accessories. Under Armour focus is to empower athletes everywhere.... [tags: Marketing, Retailing, Globalization, Kevin Plank]
798 words (2.3 pages)
- Kevin Smith and His Work Kevin Patrick Smith (born August 2, 1970) is a screenwriter, film director, and the creator of View Askew Productions. He is also known as a comic book writer and actor, although he has criticized his own acting ability on more than one occasion.... [tags: Producer Director Kevin Smith Mallrats]
929 words (2.7 pages)
- "Children of the Forest" by Kevin Duffy "Children of the Forest" is a narrative written by Kevin Duffy. This book is a written testament of an anthropologist's everyday dealings with an African tribe by the name of the Mbuti Pygmies. My purpose in this paper is to inform the reader of Kevin Duffy's findings while in the Ituri rainforest. Kevin Duffy is one of the first and only scientists to have ever been in close contact with the Mbuti. If an Mbuti tribesman does not want to be found, they simply won't be.... [tags: Children Forest Kevin Duffy Africa Essays]
1210 words (3.5 pages)
- The book that I chose to talk about is "Who's Gonna Take the Weight" by Kevin Powell. This book breaks down African Americans in society today in three different but very essential categories that is explained through essays about his life and what he went through. My reactions about each category were distinctive as I continued to read each section. For example, the section titled "The Breakdown," he talks about how after the Real World he went to work for Quincy Jones' Vibe magazine and he was surprised about the lack of African American editors or those that were in a head position.... [tags: Who's Gonna Take the Weight Kevin Powell Book Revi]
1480 words (4.2 pages)
- Black Leadership, Politics, and Culture in Uplifting the Race by Kevin Gaines Uplifting the Race is a rather confusing yet stimulating study that goes over the rising idea and interests in the evolution of "racial uplift" ideology from the turn and through the twentieth century. In the first part of the book, Gaines analyzes the black elite obsession with racial uplift ideology and the tensions it produced among black intellectuals. Gaines argues for the most part that during the nineteenth-century racial uplift ideology was part of a "liberation theology" as stated by Gaines, which stressed a group struggle for freedom and social advancement.... [tags: Kevin Gaines Uplifting Race]
1216 words (3.5 pages)
A few years later he was busted using one of the computers at the University of South California’s computers to hack into a computer at the pentagon using their ARPAnet. “The ARPANET (Advanced Research Projects Agency Network) developed by DARPA of the United States Department of Defense, was the world's first operational packet switching network, and the predecessor of the global Internet.” Before any major harm could be accomplished he was busted by the universities campus enforcement.
A third incident occurred in 1988 when, “Kevin and a friend, Lenny DiCicco, fought a pitched electronic battle against scientists at Digital Equipment's Palo Alto research laboratory. Mitnick had become obsessed with obtaining a copy of Digital's VMS minicomputer operating system, and was trying to do so by gaining entry to the company's corporate computer network, known as Easynet. The computers at Digital's Palo Alto laboratory looked easiest, so every night with remarkable persistence Mitnick and DiCicco would launch their modem attacks from a small Calabasas, California company where DiCicco had a computer support job. Although Reid discovered the attacks almost immediately, he didn't know where they were coming from, nor did the local police or FBI, because Mitnick was manipulating the telephone network's switches to disguise the source of the modem calls.” This being Kevin’s biggest crime to date he pulled off all the stops, by even hacking into the phone companies data base and scrambling the address given off by the modem this dumbfounded the FBI I and added a new charge to wrap sheet, “Evading The FBI”. This time it turns out that Mitnick was his own worst enemy, being cursed with a sense of humour and a big ego Mitnick decided to the prank DiCicco by continuously phoning his boss claiming that, “DiCicco was in trouble with the Internal Revenue Service.” This continuous harassment inevitably cause DiCicco to confess and in turn Mitnick was busted as well. Mitnick then found himself sitting in a court room facing serious charges of count of computer fraud and one count of possessing illegal long-distance access codes. But in an unlikely and controversial turn of events, Mitnick was let off again with what some especially DEC think of as another slap on the wrist and was sentenced to one year in prison and six months in a counselling program for his computer addiction.
After finishing his rehabilitation in 1990 he got a job through his father’s friend at Tel Tec Detective Agency. “Soon after he began, someone was discovered illegally using a commercial database system on the agency's behalf, and Kevin was once again the subject of an FBI investigation. In September the Bureau searched his apartment, as well as the home and workplace of another member of the original phone phreak gang. Two months later a federal judge issued a warrant for Mitnick's arrest for having violated the terms of his 1989 probation. There were two charges: illegally accessing a phone company computer, and associating with one of the people with whom he'd originally been arrested in 1981. His friends claimed Mitnick had been set up by the detective firm; whatever the truth, when the FBI came to arrest him, Kevin Mitnick had vanished.”
He then reappeared in 1992 by using hacked law enforcement requester codes to get licences photos of a certain police informer from the Los Angeles D.M.V. Suspicions arose and the F.B.I were called in. They traced the fax numbers and realized it they belonged to a local copy shop, they then staked out this copy shop where then involved in a foot-chase against Mitnick were he escaped. Soon after he was then arrested.
Today Kevin Mitnick, after all his run-ins with the law has turned his life around he now run’s a computer security company named, “Mitnick Security Consulting” and co-authored two books, “The Art of Deception (2002) (Co-authors William L. Simon and Steve Wozniak), which focuses on social engineering, and The Art of Intrusion (2005) (Co-author William L. Simon), focusing on real stories of security exploits.” He really shows you that anyone can turn their life around no matter how many mistakes they’ve made.