Who's Kevin Mitnick?

Kevin Mitnick

KevinDavidMitnick, born on August 6th, 1963, was the first hacker wanted by the FBI. Some critics call him the "number one computer hacker" in the world, and his legendary hacking experience is enough to shock the whole world. Now he is a network security consultant and has published The Art of Anti-Deception, The Art of Anti-Invasion, The Ghost of the Internet: The Autobiography of mitnick, the world's number one hacker.

Chinese name: Kevin Mitnick.

Mbth: KevinDavidMitnick

Alias: Hell Hacker

Nationality: USA

Ethnic group: None

Place of birth: Los Angeles

Date of birth:1August 6, 963

Occupation: network security consultant

Representative works: The Art of Anti-Deception, The Art of Anti-Invasion and Online Ghost.

Character experience

Mitnick's parents divorced when he was very young. He lives with his mother and has developed a withdrawn and stubborn character since he was a child. At the end of 1970s, mitnick became fascinated with radio technology when he was still in primary school, and soon became a master in this field. Later, he quickly fell in love with a computer in the community "Pupils' Club", where he learned superb computer professional knowledge and operation skills, until one day, the teachers found that he used his own computer to invade the network systems of other schools, so he had to drop out of school. Some communities in the United States provide computer network services. In mitnick's community network, home computers are not only connected with enterprises and universities, but also with government departments. Of course, these computer domain doors will all have passwords. At this time, an unusually bold plan was formed in mitnick's mind. Since then, he has tried to crack the advanced military codes of the United States with patience and perseverance far beyond his age.

After successfully breaking into the "North American Air Defense Command System", mitnick turned to other websites. Soon after, he entered the communication network system of the famous American Pacific telephone company. He changed the computer users of this company, including the numbers and mailing addresses of some celebrities. As a result, Pacific Company had to make compensation. At first, Pacific Computer Company thought there was something wrong with the computer. After a long time, it found that there was nothing wrong with the computer itself, and finally let them know that their system had been invaded.

At this point, mitnick has no interest in Pacific Company. He began to attack the FBI's network system, and soon succeeded in entering it. Once, mitnick found that the FBI was investigating a "hacker" and opened it, which surprised him-the "hacker" was himself. Later, mitnick fired them, and because of this, mitnick was arrested unexpectedly. Because cyber crime was a very new thing at that time, and there was no legal precedent, the court had to put mitnick in a juvenile delinquency institution. So mitnick became the first person in the world to be imprisoned for cyber crime. But before long, mitnick was released on bail. Of course he can't get rid of the old bad habits. The fragile network system has brought him great challenges. He began to attack big companies. In a short period of time, he successively entered the networks of five major American companies, constantly destroying their network systems and causing huge losses to these companies. 1988 He went to prison again for illegally invading other people's systems. Because he is a recidivist, there is no chance of bail this time. Mitt was sentenced to one year's imprisonment and banned from working in computer networks. After he was released from prison, the FBI bribed one of mitnick's best friends to induce mitnick to attack the website again in order to catch him again. As a result, mitnick actually took the bait, but after all, it was very skillful. After breaking into the FBI, he found the trap set by them and fled before the arrest warrant was issued. Through superb technology, mitnick also controlled the local computer system during his escape, so that he could know all the information that followed him.

Later, the FBI invited Tsutomu Shimomura, a Japanese-American computer expert known as "the best computer security expert in America". Tsutomu Shimomura began a long and difficult operation to arrest Mitt. He went through all kinds of hardships and non-stop, and finally found the whereabouts of mitnick at 1995, and informed the FBI to arrest him. 1February 1995, mitnick was brought to court again. In court, mitnick, who was handcuffed, looked at Tsutomu Shimomura who met for the first time and said sincerely, "Hello, Xia Cun, I admire your skills." This time, mitnick was sentenced to four years in prison. During mitnick's imprisonment, hackers from all over the world joined forces to demand the release of mitnick, and expressed their demands by constantly attacking major government websites. This group of hackers even made a website called "Release Kevin". 1999 mitnick finally got out of prison. After he was released from prison, he has been giving lectures on network security all over the world.

genius

Kevin Mitnick 1963 was born in a lower-middle class family in Los Angeles, USA. His parents divorced when he was 3 years old, and he lived with his mother Shirley. Due to the change of family environment, his personality is very withdrawn and his academic performance is not good. But in fact, he is a very clever boy, who likes learning and appreciates his ability.

When mitnick first came into contact with computers, he knew that his life would be inseparable from computers. He has a special affection for computers. The knowledge of mathematical logic contained in the computer language "0, 1" naturally coincides with his way of thinking. In the process of learning computer, mitnick hardly encountered any big obstacles. The program he wrote was concise and practical, and the aesthetic feeling he showed fascinated computer teachers. His computer knowledge and skills are completely out of proportion to his age. /kloc-at the age of 0/5, mitnick broke into the computer system mainframe of the North American Air Defense Command with only one computer and one modem.

Be arrested for the first time

In the early 1980s, it was the time when the American telephone industry began to turn digital. Mitnick can easily access the computer of the telephone company by controlling the converter of the digital central console by remote control, so that he can make free calls at will and eavesdrop on anyone's phone at will. 198 1 year, mitnick and his associates stole a batch of user passwords during a holiday, destroyed some files in their central control computer, and planted a batch of phone numbers for them to use under pseudonyms. The incident was very serious, and the telephone company soon found out and called the police. The police conducted a thorough investigation, but there was no result. The truth didn't come out until one day, when the girlfriend of a mitnick accomplice called the police. Perhaps because mitnick was still young, mitnick, aged 17, was only sentenced to three months' imprisonment plus one year's residential surveillance.

Teachers admire him as a computer genius and think that he is a talented teenager with a bright future. However, the first prison life not only didn't make him turn over a new leaf, but made him go further and further on the road of cyber hacking.

Wanted by the FBI

1983, he was found to have used a university computer to access the ARPA network, the predecessor of today's internet, without authorization, and accessed the computer of the Pentagon in the United States through this network, and was sentenced to six months' detention in a juvenile correctional institution in California. After his release, mitnick simply applied for a car license plate with the number "XHACKER" or "former HACKER" and hung it on his Nissan car. Then, mitnick continued to run amok on the Internet, sometimes sneaking into software companies to steal their software illegally, and sometimes entering the laboratories of computer research institutions to make trouble and continue to cause trouble to telephone companies.

1988, he was arrested again by law enforcement agencies, because DEC accused him of stealing software worth 1 10,000 dollars from the company network, and caused a loss of 4 million dollars. This time, he was not even allowed to bail. The frightened police authorities believe that as long as he has a keyboard, he will pose a threat to society. Mitnick was sentenced to one year's imprisonment. A year later, he immediately performed stunts and successfully invaded the computer systems of many world-renowned high-tech companies. According to the information reported by these companies, the FBI calculated that their losses amounted to $300 million. Just as the police were about to arrest him again, mitnick suddenly disappeared from his residence and lived an underground life of escape.

Waterloo (Belgian town)

1995 February 15, Tsutomu Shimomura finally discovered mitnick's whereabouts-hiding in a small town in North Carolina, and quickly informed the FBI to arrest mitnick, known as the "best cyber thief" and "hell hacker". 1February 1995, mitnick was finally brought to court. In court, mitnick, handcuffed, turned to Tsutomu Shimomura, who met for the first time and testified in court, and sincerely said, "Hello, go to the village. I admire your skills." .

This time, he was charged with 23 counts, and then 25 counts were added.

bail

1997 65438+On February 8th, mitnick's network supporters demanded that the US government release mitnick, otherwise, they would start the virus that has been implanted in many computers around the world through the network! They claimed that once mitnick was released, they would provide a way to crack the virus. For a time, the internet fell into a new panic.

The experiment lasted until1June 65438+March 65438+June 6, 999. Mitnick pleaded guilty to five charges and two additional charges and was sentenced to 68 months' imprisonment plus three years' residential surveillance. The FBI also accused him of causing hundreds of millions of dollars in losses, and the amount of compensation demanded by the prosecution was $65.438+$0.5 million. According to mitnick's invasion, they suffered a loss of about $290 million. These victims include high-tech companies, such as Sun Systems, Novell Computer, NEC America and Nokia Mobile Phone.

The lawyer said in the defense: "Hacking is like taking drugs, and it can never be changed because of the reasons of the parties." Mitnick is so obsessed with computers that he is excited about hacking.

On June 65438+1October 2 1, 2000, the American court announced that he was released on parole. At this time, mitnick's figure is slightly thinner than in the past, but he looks leaner. The news of his release was widely reported by the media, mentioning that he intended to "go to college first, then study computer". However, his wish may not come true, and the authorities will give mitnick (36 years old) a suspended sentence in the next three years. During this period, he is not allowed to touch any digital equipment, including program-controlled telephones, mobile phones and any computers. Because the authorities concerned are worried that once this famous hacker touches the computer, it will bring trouble to the Internet again. When he was still in prison, mitnick once got a small radio from somewhere, and even used it to monitor the conversations of prison administrators after modification. To this end, he was transferred from the ordinary cell to the isolation cell by the prison authorities, and he was supervised 24 hours a day.

come/get out of prison

Shortly after his release from prison, mitnick got a job: writing a column for an Internet magazine. But the judge thought the job was "not suitable for him" and was afraid that he would create technology that would destroy the computer and network system. Mitnick doesn't think he doesn't even have the right to write articles. To this end, he filed a lawsuit again and asked to be allowed to become a columnist of an Internet magazine. If he gets the job as he wishes, he will get a basic salary of about $5,000 a month, an extra $750 for each article he writes, and 50% of the profits from publications.

But his lawyer Randolph said that mitnick planned to study computer science at university, so he planned to apply to the authorities for permission to use the computer.

What mitnick did was different from the crimes that people are usually familiar with. It seems that everything he does is not for money, and of course it is not just to get back at others or society. As a freelance computer programmer, he drives an old car and lives in his mother's old apartment. He didn't use his recognized computer genius or superhuman skills to make money, although it was not very difficult for him. At the same time, he doesn't want to decrypt the important information he stole into some systems and sell it for money. Regarding the accusation of DEC (1998 was acquired by Compaq), he said: "I never wanted to make money by selling their software." It seems that he can gain great power only by playing computer and invading the network. He is obsessed with all the secret things and deciphering the invading computer system, so he can give up everything.

He has an unusual special feeling about computers. He even shed tears when the prosecutor in Los Angeles accused him of destroying the computer he entered. A case handler said, "There seems to be an umbilical cord between the computer and his soul. This is why as long as he is in front of the computer, he will become a giant. "

Personality achievement

He was the first hacker to appear on the FBI's "reward for capture" poster. Because he is only a teenager, but he keeps committing cyber crimes, he is called "a little boy lost in the online world".

First contact with computer: When he was a teenager, mitnick couldn't afford his own computer, so he had to rely on a small shop selling radios to dial other computers with samples and modems there.

Own unique tools: During the three years of absconding, mitnick mainly relied on the Internet Relay Chat Tool (IRC) to publish news and contact friends.

Little-known fact: mitnick was sentenced to one year in a community treatment center. During this time, in order to quit his computer addiction, he once registered a 12 step program specially prepared for all kinds of addicts.

In 2002, Christmas came early for Kevin Mitnick, a once notorious computer hacker. This year is really a happy year for KevinMitnick. Not only did you get complete freedom (you can surf the Internet freely from now on, but for hackers, this is another kind of prison life). In addition, he has just published a best-selling book, The Art of Deception: Human Factors in Controlling Safety. The book was a great success and became the first shot that KevinMitnick once again attracted people's attention.

publish a book

The art of anti-aggression

Title: The Art of Anti-invasion-The True Story Behind Hackers.

Author: (America) mitnick (K.D.)/ (America) Simon (W.L.)

Publishing House: Tsinghua University Publishing House

Original title: TheartofIntrusion: There are also reasons behind the explosion of hackers, intruders and receivers.

Translator: Yuan Yueyang/Xie Heng

Publication year: 20 14-8- 1

Page count: 260

Pricing: 49.80 yuan

ISBN:9787302373582

Content introduction:

Four like-minded partners make money with pocket computers in Las Vegas. A boring young Canadian can visit a bank in the south illegally and smoothly. Several little boys were bewitched by bin Laden's terrorists and recruited to attack Lockheed Martin!

These are true stories! After interviewing hackers, the author KevinD. Mitnick wrote it based on their real experience. In fact, the protagonists of many stories in "The Art of Anti-invasion-The True Story Behind Hackers" worship the legendary master mitnick as an idol and hero, so they are willing to confide in their hearts and tell the secret stories buried in their hearts for many years.

Attacks can actually be prevented! Mitnick made a professional analysis after each story. Mitnick is the best person to recommend safety measures. Mitnick has a deep understanding of the genius and tenacious spirit of hackers. In "The Art of Anti-Invasion-The True Story Behind Hacking", he will tell the whole story of his rich skills accumulated in his life, guide you to find out the means of intruders and help you build an impregnable security line.

If the reader is the head of security in his own unit, the story in The Art of Anti-Invasion-the true story behind the hacker may take place in your jurisdiction. Afraid of late-night visits by national security officials? Are you interested in the story of fighting hackers in real life? Please read this book carefully and take preventive measures within your jurisdiction!

The art of anti-deception

Title: The Art of Anti-Deception —— Experience Sharing of World Legendary Hackers

Author: (America) mitnick (Mitnick, K.D.)

Publishing House: Tsinghua University Publishing House

Original title: artistic deception: humanization of control safety

Translator: Pan Aimin

Publication year: 20 14-7- 1

Page count: 336

Pricing: 49.80 yuan

ISBN: 9787302369738

Content introduction:

Kevin. Mitnick was once one of the most troublesome computer nerds in the history of the FBI. He has finished a lot of articles, books, movies and records. Since his release from federal prison in 2000, mitnick has changed his lifestyle and become one of the most popular computer security experts in the world. The most famous hacker in the world gave a new meaning to the Buddhist proverb "Put down the butcher's knife and become a Buddha" in his first work.

In "The Art of Anti-Deception —— Experience Sharing of World Legendary Hackers", mitnick invited readers to enter the complicated thinking of hackers. He described a large number of actual deception scenarios, as well as social engineering attacks and consequences against enterprises. He focused on the human factors involved in information security, explaining why firewalls and encryption protocols are not enough to prevent a clever attacker from invading the database system of an enterprise or an angry employee from bringing down the computer system of the company. For example, he illustrates that even the most tightly protected information system will become vulnerable to attacks by determined swindlers disguised as IRS employees or other seemingly innocent roles. The art of anti-deception-sharing the experience of world legendary hackers, starting from the attacker and the victim, analyzes the reasons why each attack can succeed and how to prevent these attacks. The narrative of this book is very attractive and readable, as if it were a detective novel introducing a real criminal case.

Most importantly, in order to make up for his past crimes, mitnick has provided many guiding rules in the art of anti-cheating-the experience sharing of legendary hackers in the world, so that enterprises can refer to them when formulating safety codes of conduct, training plans and safety manuals, so as to ensure that the high-tech security barrier established by the company will not exist in name only. According to his own experience, he put forward many suggestions to prevent security loopholes, hoping that people will not forget to guard against the most serious security danger-human nature.

Security advice

During a turnaround, he wrote down the following ten experiences to share with you:

● Backup data. Remember, your system will never be flawless, and catastrophic data loss will happen to you-just a worm or Trojan horse is enough.

Choose a password that is difficult to guess. Don't fill in a few numbers related to you without thinking. Anyway, change the default password in time.

● Install anti-virus software to update and upgrade it every day.

● Update the operating system in time, always pay attention to various patches released by software vendors, and install applications in time.

When not using the computer, don't forget to disconnect the network cable and power supply.

●IE or other browsers will have some hackers fishing. Stay awake, refuse to click, and turn off the automatic scripting function of the mail client.

● Use encryption software when sending sensitive mail, and you can also use encryption software to protect the data on the hard disk.

● Install one or more anti-spyware programs and run checks frequently.

● Use a personal firewall and set it correctly to prevent other computers, networks and websites from connecting with your computer, and specify which programs can automatically connect to the network.

● Turn off all system services you don't use, especially those that allow others to remotely control your computer, such as RemoteDesktop, RealVNC and NetBIOS.

● Ensure the security of wireless connection. At home, you can use wireless protection to access WPA and passwords with at least 20 characters. Set up your laptop correctly and don't join any network unless it uses WPA. It is not easy to protect yourself in a hostile internet world. You should always think that somewhere on the other side of the earth, one or some unscrupulous people are spying on your system vulnerabilities and using these vulnerabilities to steal your most sensitive secrets. I hope you won't be the next victim of these network intruders.

People's news

Today, Kevin Mitnick is a professional network security consultant. On June 27th, 2065438+0/KLOC-0, a piece of news-LulzSec, a hacker group that invaded the CIA, broke up. It was mentioned in the news that LulzSec, a computer network hacker group, was "famous" for invading the websites of the CIA, the Senate, Sony Corporation of Japan and other governments and enterprises. He told the Associated Press that LulzSec hopes to "inspire" more hackers around the world to launch similar attacks with amazing actions. "They can watch (others) destroy without starting work, without risking being caught."