27 Aug 2022

107

Kevin David Mitnick - The World's Most Famous Hacker

Format: APA

Academic level: College

Paper type: Assignment

Words: 843

Pages: 3

Downloads: 0

Hacking refers to the act of gaining unauthorized access into a computer system by identifying and exploiting system networks and vulnerabilities. An individual who engages in hacking activities is referred as a hacker. In most cases the objectives of hackers is malicious which end up in criminal activities such as money fraud, black mail, theft of confidential data amongst other evils. In addition, there is another group of hackers known as white hat hackers whose intentions are ethical and in most cases they are certified and credited to protect companies and governments against malicious hacking. This paper seeks to explore the life of the world most wanted hacker Kevin Mitnick. In the paper, I will discuss Kevin Mitnick’s beginnings as a hacker, his associations and descriptions of cybercrimes and I will conclude with his new life as an ethical hacker. 

Kevin Mitnick was born in August 1963 in Los Angeles, California. At a very early age of just 12 years old Mitnick ventured into hacking. With help of social engineering and dumpster diving, he was able to manipulate the punch card system used in Los Angeles bus system and could be able to board buses for free across the breadth of Los Angeles. It is through the social engineering skills that he learnt to obtain confidential information such as people’s user names, phone contacts among others. In 1979 at the age of 16 years old, Mitnick gained his first unauthorized computer access. With the aid of a friend, Mitnick hacked into Digital Equipment Corporation computer system and copied the company’s software ( Hafner,1995) . Following the crime he was arrested, prosecuted and convicted to 12 months in prison in the year 1988. In addition, upon his release he was to undergo a state-supervised computer use. Even before his supervised release elapsed, Mitnick hacked Pacific Bell voice mail prompting a warrant of arrest to be issued against him. He fled Los Angeles and was on the run for over two and half years. While on the run, it is believed that he committed a lot of cybercrimes that included altering computer networks, cloning cellular phones, hackled into confidential data from emails among others. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The chase of Mitnick came to an end in February 1995 when he was arrested by FBI while hiding at an apartment in Raleigh, North Carolina with allegation of cloning cellular phones, false identity and computer hacking fraud. He was charged and sentenced to 46 months and a further addition of 22 months in prison as a result of violating his supervised release of the 1989 when he hacked into Pacific Bell Voice email ( Shimomura & Markoff, 1996) . After serving is term in prison, Mitnick was released in January of 2000 on a one year supervised release. After the completion of the supervised release he was banned from using any communication technology apart from a telephone landline. He was against the ruling against his ban and challenged it in court which ruled in his favor by allowing him to access the internet but forbade him from profiteering from sell of movies, books or interviews that revolved around his past cybercrime activities. After completing a year of supervised release, a judge with the Family Case Conference ruled that David Mitnick was now sufficiently rehabilitated in 2001. 

Today, Mitnick is a well ranking security consultant with his own cyber security company called Mitnick Security that is involved with training people on the necessary skills on data protection and methods of combating cyber hackers ( Hafner, 1995) . The cyber security firm currently has clients in Fortune 500 companies and also government agencies such as the FBI, banks, insurance firms and others. The company also provides lessons on social engineering. Mitnick is also a celebrated public speaker and he has featured in renown public talk shows such as The Colbert Report where he had gone to publicize his book called the Ghost in the Wires. He has also featured in very many documentaries that discuss his life in crime and his works as a reformed member of the society. Further, Mitnick is an author several books on cyber security and motivational works. His books include; The Art of Invisibility published in 2003 amongst others. 

As an advocate of privacy in online platforms, Kevin Mitnick advises that emails should be encrypted end-to-end, he warns that if an application lacks the end-to-end encryption the, user should consider venturing into other platforms or apps that provide the service in order to ensure that data in your emails are safe from hacking. He also advises that online users should make sure to defend their anonymity by hiding their IP address ( Lindup,1995) . He proposes that the only way of achieving that one hides their identity is by using a certain unique service called remailer. With the use of a remailer, an individual can mask their identity online sine the remailer keeps switching the path between your email and that of the target website with malicious intention. He further advises that individuals should be careful with their passwords. He suggests that passwords should be held very confidential and in most cases users should consider have long and unpredictable passwords that cannot be easily be predictable. For those who use Tor, Kevin Mitnick warns that Tor should not be run with the same physical devices that an individual is using to browse. In a nutshell, there should be always be two devices when one is using Tor, one laptop for instance for browsing another device to handle Tor. 

References 

Hafner, K. (1995). A superhacker meets his match. Newsweek , 125 (9), 61-62. 

Lindup, K. (1995). The arrest of Kevin Mitnick. Network Security , 3 (1995), 16-19. 

Shimomura, T., & Markoff, J. (1996). Catching Kevin. WIRED

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Kevin David Mitnick - The World's Most Famous Hacker.
https://studybounty.com/kevin-david-mitnick-the-worlds-most-famous-hacker-assignment

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration