Kevin Mitnick, the hacker Lagenda

Bookmark and Share
A knock sounded from the door of his apartment, Kevin Mitnick opened the door and found dozens of FBI agents and other law enforcement agencies are preparing to arrest him. This is the final journey of a hacker who was forced to run in order to avoid a prison sentence. Hackers who during the buronannya it has gained legendary status, has grown into an even bigger myth than himself
The arrest happened in 1995 that marked the beginning of the most controversial cases of detention of a cyber criminals. Mitnick is an intruder on a computer system emerged as America's Most Wanted Hacker.
Computer Addiction
Mitnick is easy to learn computer by hanging out at RadioShack store or diperpustakaan general, his family was not rich enough to own a computer. His fondness for developing computer until he is mature.
In the period of the 1990s, Mitnick is easy to get out into the computer system. But in the late 1980s he had wanted to leave hobynya and began looking for a legitimate job.Unfortunately, before he could do that, in 1987 he was arrested for infiltrating a company Santa Cruz Organization, a software company that mainly engaged in the Unix operating system. When the lawyers succeeded in reducing crimes mitnik into action that is not good, Mitnick was only in Ganjar 3 years probation.
Less than a year Mitnick's return trip lawsuits. Because of garanya a friend whose computer he uses to break into other computers Mitnick reported to the authorities once it is burglarized Mitnick is owned by Digital Equipment Corporation. Every time breaking into computers that do mitnik is to take code from the software compiler. The code was then he learned with earnest, sometimes found several weaknesses in it. In a chance Mitnick admitted only take the code of the software compiler that he liked or that interested him.
In the case of DEC Mitnick get a heavier prison term. When the lawyers mentioned have Mitnick, 'addiction to the computer that can not be stopped'. He was rewarded a year in prison.
In prison Mitnick get a bad experience. At that time the legend Kevin Mitnick or better known under the pseudonym 'The Condor', is getting bigger. His reputation as a
Computer criminals are also increasingly soar beyond reality. Warden at Lompoc, the prison where Mitnick was, thinking that Mitnick could sneak into the sound armed with only a computer and telephone. As a result
Mitnick is not only not allowed to use the phone, he also spent many months in isolation.No wonder then if he is rumored to be a little mental disorders while serving his sentence at Lompoc.
In 1989 Mitnick was released from prison. He tried to find a formal job, but his status as former prisoners make Mitnick is difficult to maintain employment. Eventually he worked as
miners office information for the private investigator's office. Surely this is dragging Mitnick's return to the world that the gray and black. In the early 1990s, the Mitnickpun searched again by the FBI. This time the fear will enter isolation rooms for years, Mitnick decides to run away.
Hacking The Human Side
Skills as a hacker Mitnick is not limited to mere technical Traffic. He is the sheer technical ability. He is someone who understands very well that the security of computer systems consisting of both policy and organization, human resources, process involved and the technology used. If he seoarang superheroes main kemapuannya seoarang Mitnick is the practice of social science engginering aka social engineering. This is a technique to get vital information, such as passwords, by exploiting human weakness.
Ability Mitnick is best illustrated in the following story, story told Mitnick himself on an online forum Slasdot.org
"On one occasion, I was challenged by a friend to get the number (phone) Sprint Foncard her. He said he would buy dinner if I could get that number. I will not refuse to eat well, so I berusahan by contacting Customer Service and perpura off as one of the information technology. I ask the officer who answered whether he had difficulty in systems that are used. He said no, I ask the system used to access customer data, I pretended to want to verify. He mentioned the name of the system. "
"After that I again called Customer Service and was associated with a different officer. I said that my computer is broken and I would like to view data for a customer. He said the data had been lots of questions. What is your name? You work for whom? What is your address? Well, something like that. Because of my lack of research, I made up names and places. Failed. He said he would report this phone call in security. "
"Since I recorded the name, I take alone and tell friends about the situation. I ask that friend to masquerade as 'investigator keamaman' to record the statements of officials Customer Service and speak with officers earlier. As the 'investigator' he said that he received reports of people trying to obtain personal information of customers. After the questions and answers about the phone, 'investigation menyakan what the caller had requested information. The officer said the number Foncard.' investigators' to ask, is how the number? And the officer gave the number. Oops. The case is finished "
Fugitive
I Sebaga fugitive Mitnick berusahan best not to get caught. He moved around a lot and always took shelter habits. Various ways he did so as not tracked by the pursuers. But he could not abandon his hobby mengoprek computer and its Internet network. Even some supposedly used his skills to get a new identity.
Legend Mitnick during the run in less than two years, he became increasingly menjelama as 'Cyber ​​Ninja' who supposedly could break into Pentagon computers only with the television remote, a rumor that exceeds any fictional story.
Why Mitnick, a fugitive in the case of computer break-ins, could become the most wanted criminals? It could not be separated from the role of mass media. In particular is a series of sensational articles from John Markoff that was published in the New York Times.
Mitnick Markoff condemn as a terrorist. In a statement released after a long time, Mitnick calls his self-image that is displayed Markoff seoarang like a terrorist who tried to control the nuclear world. "I seemed to be an Osama bin Mitnic," he joked.
Markoff describes Mitnick as a deadly, unstoppable and deserves to be wanted by the FBI and the big ten other law enforcement agencies. Articles Mafkoff, who sometimes appeared on the front page, make the strongest candidate Mitnick pilot project on cyber crime. So the future of Mitnick in prison saati arguably already written it, too.
During a fugitive Mitnick also continue to carry out the action. He broke into the various computer companies. Including Sun Microsystems. He uses, and maksutnya here is to break into an account at an online storage service to store backups of the action.Actually Mitnick does not work alone but when caught he never revealed who his partner.
Mitnick is one of the victims T. Shimomura, a computer scientist who in some writings on the Internet doubtful cleanliness. There are allegations that Shimomura was also a hacker who often perform illegal acts. One thing that many agreed was Shimomura has an arrogant attitude and seems to want to appear as a hero in the story of the hunt Mintick.
Shimomura, Markoff and the FBI hand in hand to catch the fugitive. Guidance from sensational news Mafkoff, hacking ability Shimomura and the FBI legal force eventually track down Mitnick's residence.
As usual story seoarang capture of a fugitive, Mitnick did ketledoran. Storage service that he uses seems to have automated programs to check the contents of files stored.Mitnick used the account owners get a warning from the system of excess capacity. This is the beginning of the capture of Mitnick.
Mitnick admitted that he was reckless because they do not suspect that the FBI, Shimomura, Markoff, and cellular telephone service providers working together so closely and integrated.
"Mobile operators do a search in their billing database of dial-up connection to Internet service Netcom POP. This, as might be expected, making them able to identify areas of calls and number MIN (mobile identification number) that I use at the time. Since I am often switching numbers They oversee any data calls happening at the site. Then, by means Cellscope 2000 Shimomura, my phone signals to track down to the exact location, "Mitnick said.
Two weeks before the capture of Mitnick recently moved to Raleigh. The new location makes it less alert and he forgot to keep track of dial-up lines that digunakannnya.Several hours before the capture of Mitnick's new something was going on, tracking and surveillance is being carried out on the path he used. As he was trying to track the extent to which surveillance has been conducted up to tracing those who dilbalik, he heard a knock at the door. Mitnick opened the door and confronted with dozens of U.S. Marshall and the FBI.
Four Half Year Hanged
Once caught Mitnick detained without possibility of bail. He also was submitted to the court. Approximately four years he spent without any certainty. This really makes Mitnick frustrating.
During the FBI prison he did not get a chance in his case. Even Mitnick and his attorney could not see the case as there are data on laptops and laptop access to Mitnick is considered dangerous. Mitnick was accused can make a missile armed with a laptop or just slide the phone. Larangn it remains valid even if his lawyers are using a laptop without a modem and the ability of any network.
Mitnick eventually accused of causing harm to hundreds of millions of dollars of losses by Mitnick is not true, because the company that allegedly harmed even those not reported losses in their annual reports.
Mitnick is the final agreement for the admission of guilt. Guilty in the case of computer break-ins and tapping phone lines. Mitnick gave up and followed it, in exchange for more time in 4 years in prison are treated as prisoners mas. Total Mitnick was sentenced to 5 years in prison, 4 years in prison hanging and 1 more year remaining.
He was released in 2000 on condition must not touch a computer or telephone. In 2002 he was allowed to use a new computer but not connected to the Internet. New in 2003 he used the Internet again for the first time.
Since the release Mitnic trying to fix his life. He wrote two books on hacking, he also founded his own security consulting company. "Hackers are the only crime whose expertise could be used again for something that is unethical. I never saw it the other field, eg ethical robbery," said Mitnick.
Author: Antonius Fran Setiawan
Product Manager IT Books, Design, and Multimedia a Company Publishers



source: BeritaNET
FREE DOWNLOAD

{ 0 komentar... Views All / Send Comment! }

Posting Komentar