kevin d. mitnick began his computer escapades at an early age when he joined a small group of local hackers in the suburbs of los angeles ca. he demonstrated his skills to piers by breaking into the monroe high school computer and altering the grade point averages. his legal troubles began when he hacked into the north american air defense computer system in colorado at age 17... the year was 1981. shortly after, he had advanced into phone phreaking with an insatiable appetite for telephone switching equipment. to obtain the classified information he needed on the telephone switching computers, mitnick broke into the corporate offices of pacific bell and obtained computer manuals, and software, on the cosmos and microport computer systems. because of his young age, he had avoided sentencing this time.
advancing his skills into the late 1980's, mitnick evaded authorities until 1989. fbi agents were collecting evidence that mitnick and a friend named dicicco, had stolen highly secret software programs, and research manuals, from digital equipment corp. also mentioned were 17 internal access codes owned by mci long distance network systems. mitnick and dicicco were arrested, and the u.s. magistrate in la ordered mitnick held without bail, stating that "when armed with a keyboard, he posed a threat to the community".
the assistant u.s. attorney said "this person is very dangerous, and needs to be kept away from a computer". detective james k. black, head of the l a police department's computer crime unit said of mitnick "he is several levels above what you would characterize as a computer hacker"
now at age 25, mitnick was sentenced to one year in a minimum security facility by judge mariana r. pfaelzer of the u. s. district court in los angeles ca. dicicco had turned witness against him... the year was 1989. judge pfaelzer also ordered mitnick to regularly attend rehabilitation sessions, relating his addiction to computer break-ins to that of a substance abuser. federal prosecutors also obtained a court order restricting mitnick's phone privileges while in jail, for fear that he might get access to an outside computer. harriet rosetto, the director of the rehabilitation facility said "hacking gives kevin a sense of self-esteem that he doesn't get in the real world, there was no greed or sabotage involved... he's like a big kid playing dungeons and dragons".
one year later, mitnick was released from the facility and assigned a probation officer. reportably, strange things began to happen... the probation officer's phone was suddenlydisconnected, and the phone company having no record of it. a judge's credit record at trw inc. was unexplainably altered. records of mitnick's arrest and conviction could not be found on the court's computers at santa cruz ca. mitnick jumped his probation and fled the country to visit hacker friends in israel... once again, a man in trouble.
returning to the u.s., fbi agents obtained a search warrant and closed in on his calabasas ca. residence in september of 1992. mitnick was suspected of violating his probation, and hacking into the computers of the california dept. of motor vehicles. authorities also believed that he was responsible for a cracking an army computer system, and gaining access to fbi records, another incident that coincided with mitnick's technique. by november of 1992, kevin mitnick had disappeared from the face of the earth... again, a wanted man by federal authorities. leaving a trail of clues close behind him for the next two years, the fbi believed that mitnick had simply created a series of false identities. armed with his knowledge and skills at cracking computer systems, this would be an easy task.
bits of his presence began to emerge again in mid 1994 when motorola's cellular division reported that copies of their cellular control software had been taken from a breached computer system. dan farmer, creator of the dreaded "satan" software program that searches for weaknesses in network computers, said that someone had broken into his computer system and stolen an early un-released version of the software. techniques of the break-in were typical of kevin mitnick.
on december 25th, christmas day, 1994, the news traveled fast to tsutomu shimomura, a security expert at the national supercomputer center in san diego ca., who was vacationing in nevada at the time. his personal computer system, linked via the internet, to the supercomputer center, had been altered. how could this have happened to one of the country's top experts on computer security?... the shame of it all!.
shimomura's personal voice mailbox was also compromised on dec. 27th, and an erie disguised voice said "damn you! my technique is the best... don't you know who i am?... me and my friends... we'll kill you!". almost sounding as if there were two people on the voice message, another voice said "ok boss, your kung-fu pretty good!" poking fun at shimomura's nationality.
newspapers worldwide were filled with stories of the newly discovered flaw in internet security called " protocol spoofing". once shimomura discovered how the intruder had broken in, he immediately notified others of the technique. the intruder, (kevin mitnick, of course) had first cracked a "trusted" computer at the layola university of chicago. "trusted" means that this particular computer was authorized to access files from shimomura's computer in california. file transfer commands were sent out from the "trusted" source to access hundreds of highly secretive security software files from shimomura's computer. once this had taken place, mitnick moved the files into a dormant account at "the well", a large internet provider for the san francisco bay area in california. also taken, and stored in "the well" account, were 20,000 + credit card accounts of netcom, inc., many belonging to silicon valley millionaires.
a systems operator at "the well", on january 27th, 1995, noticed an unusually large amount of data in an account that was normally almost empty. bruce koball, a programmer for the freedom and privacy group, one of the account's owners, was contacted to inspect the contents of the data. koball was shocked to find shimomura's files, and contacted him shortly after discovering the data. federal authorities were contacted when the credit card accounts were discovered, and shimomura was ready for revenge. the fbi's data base came up with a list of possible suspects, but kevin d. mitnick was one of a few at the top. since the break- in had seemed to be only a "power play", and not for financial gain, the fbi began to suspect mitnick over others on the list. one of mitnick's "rules of thumb" was never to keep incriminating data on his own machine. another clue that made mitnick a suspect, was the cellular phone control software files, also found in the account.
shimomura, personally insulted, and his reputation injured, began to set a trap for the prowler. first, the intruder's voice was posted as a sound file on the internet for all to hear... shimonura knew that by intimidating him, his ego would finally bring him out into the open. next, a 24 hour monitoring computer was set up to record any unusual activity at "the well". armed with a team of federal authorities from the fbi and national security agency, shimomura would patiently watch as the bandit returned again and again across the screen. the trap had worked and the bait was taken. another altered voice mail message was left on shimomura's mailbox mockingly saying... "ah tsutomu, my learned disciple, i see that you put my voice on the net... i am very disappointed my son...".
carefully tracing each attack, shimomura and his team of experts along with kent walker, the u.s. assistant district attorney from san francisco, obtained subpoenas to wiretap calls. the intruder seemed to be in colorado, but with skills of this type it was hard to tell. as experts watched each break-in, it became clear that the security of netcom and "the well" had seriously been compromised. "the well" has since updated it's server to a new sun sparc 100e because of the incident.
by feburary 14th, 1995, authorities had traced their suspect to raleigh, north carolina. with the assistance of sprint cellular technicians armed with cellular frequency monitors, a signal was traced to an apartment building at players court near the raleigh durham airport. a federal warrant was obtained for it's resident... an alias of course... but still, kevin d. mitnick.
mitnick was now a victim of his own ego. he was already wanted in california from previous charges of breaking into the california dept. of motor vehicles computer systems. surrendering peacefully to fbi agents in the middle of the night, mitnick was arrested on feburary 15th, 1995. his computers, software, books, notes, and cellular phone equipment, all seized for evidence. authorities awed in amazement as they uncovered the methods in which mitnick had slipped through their systems. a cellular modem was used to dial into a sprint cellular site on the reverse channels, these are the channels usually reserved for mobile to base communications. mitnick then dialed into a gte switching office and re-routed his call to colorado where he dialed into a netcom internet connection. this made tracing the calls almost impossible to even to best of experts in the field. on the internet, mitnick could then connect to thousands of computer networks world wide.
as shimonura and mitnick met for the first time in a raleigh north carolina federal courtroom, mitnick looked at shimomura and said "hello tsutomu, i respect your skills", to which shimomura reluctantly nodded his head.
at the fifth conference on computers, freedom, and privacy, held on march 28th, 1995, in burlingame, ca., kevin mitnick was a hot topic in discussions on high level network security. chairman carey heckman said "mitnick has created a sputnik like urgency for higher computer security. comparing mitnick's break-ins, and lack of better security, to the russians beating the u.s. in the 1958 space race with the sputnik satellite.
once called a "computer terrorist" by the dept. of justice, mitnick has been the subject of several books, articles, and movies including "war games" and "johnny mnemonic".
on july 10th, 1995, kevin mitnick was to be tried on a 23 count federal indictment charging him with crimes such as wire fraud, computer fraud, cellular phone fraud, and using illegal telephone access devices to divert toll costs. already wanted for previously violating his probation, mitnick's violations included other charges covering six jurisdictions, and facing a maximum of 20 years for each of the 23 counts.
update:infamous mitnick! browsing about the best business cards, i discover that mitnick stole one of the best designs ever: a little lockpicking set molded in the shape of a card. booo!
if this was an useful article, please help hirudo:holter getting out of trouble. [piko!] asks you only two or three more clicks: choose some of the ads in the right sidebar and visit them. [piko!] will be grateful.
se questo articolo ti è stato utile, sostieni hirudo:holter. [piko!] ti chiede solo due o tre click: visita un paio delle pubblicità che trovi nella barra laterale. [piko!] ringrazia.
<< Precedente .: wordpress tweak: customize your user registration email
Successivo >> flash + javascript & providing alternative content
|
vi parla [piko!], gestore tronico. lei non può commentare, così ho deciso in maniera insindacabile.
[piko!] ti ringrazia per esser arrivato fin quaggiù, la strada era lunga.
se non sai cosa fare, puoi visitare l'archivio o la galleria fotografica relativa ad hirudo:holter. oppure tornartene alla pagina iniziale del sito per vedere cosa bolle in pentola.
your attention makes [piko!] happy: there was a long way from the top of the page!
if you don't know what to do, try our archives or the photogallery from hirudo:holter. or you can click back to the global home page to see what's going on now on amolenuvolette.it.
steal all of this, steal my code, steal my graphics. use it to feel better.
this is copyrighted so you can really steal it.
eventually you will find some crap-pieces of code like "don't right-click" in my escaped! maze. this was only because if you read source code there's no play in gettin out of the maze, cheating about the right place to click.
so, uh: i'm a media pirate. i am a native in the media landscape.
|
|
<
|
novembre 2024
|
>
|
L |
M |
M |
G |
V |
S |
D |
| | | | 1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
|
|
|
|
|
|
|
|
_muy felìz :. (199)
ascolto :. (22)
io contro tutti (29)
kirlian aura (4)
ciao! marco infussi here, ready to serve you.
this is my personal notepad: i paste here all the stuff i am thinking about and working on, plus some weirdo and doodles.
if you are looking for serious work and official stuff, this is the wrong place.
amolenuvolette.it is such a disordered waste-bin, with something like 25+gbytes of stuff to browse.
here is a map to understand where you are...
trust me: it will be useful!
La pubblicità ha rotto le scatole, quindi non è più consentita.
hirudo:holter is technically based on some concepts:
a) a purposedly verbose interface
b) little isometric designs and typographical cameos
c) a fictitious character, website's engine [piko!], insulting the reader
but, what does hirudo mean? how about holter?! and what's the hidden message?
more about hirudo:holter...
InValid XHTML 1.0 / CSS
[piko!] scan rileva 357 utenti on line, tra i quali 969 + 1 cercano inutilmente di nascondersi nelle ultime file. forza, venite al primo banco per l'esame.
23/11/2024 @ 00:25:38
che velocità... [piko!] engine ha prontamente eseguito questo script in soli 47 ms
this section contains all the things that made my life what it is.
songs, books, films, artworks, fonts i love, written as lists.
read more...
questa funzione è talmente obsoleta che non ho più voglia di aggiustarla.
questa versione di hirudo:holter è in effetti chiusa al 31 dicembre 2011.
ingiuriare i mascalzoni con la satira e' cosa nobile, a ben vedere significa onorare gli onesti.
piko!
|