Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Ask Kevin Mitnick

timothy posted about 3 years ago | from the do-you-still-hear-the-screaming dept.

Security 285

The hacker with perhaps the most famous first name around, Kevin Mitnick, has gone from computer hacking of the sort that gets one on the FBI's Most Wanted list (and into years of solitary confinement) to respected security consultant and author, helping people minimize the sort of security holes he once exploited for fun. His new book is called Ghost in the Wires: My Adventures as the World's Most Wanted Hacker; it's his first since the expiration of an agreement that he could not profit from books written about his criminal activity. Kevin's agreed to answer your questions; we'll pass the best ones on to him, and print his answers when they're ready. Note: Kevin also answered Slashdot questions most of a decade ago; that's a good place to start. Please observe the Slashdot interview guidelines: ask as many questions as you want, but please keep them to one per comment.

cancel ×

285 comments

Sorry! There are no comments related to the filter you selected.

Hey Kevin (-1)

Anonymous Coward | about 3 years ago | (#37244608)

What's a moocow?

Re:Hey Kevin (-1)

Anonymous Coward | about 3 years ago | (#37244836)

Hi Kevin, how are you today?

What has changed (2)

Superken7 (893292) | about 3 years ago | (#37244624)

What and how much has changed nowadays? In other words, how would a (hacker) Kevin Mitnick getting started in 2011 hack and exploit?

Re:What has changed (1)

Dyinobal (1427207) | about 3 years ago | (#37244658)

He would start by putting in an application for the CIA, NSA, FBI and Facebook.

Re:What has changed (1)

insufflate10mg (1711356) | about 3 years ago | (#37245266)

Kevin Mitnick would not hack and exploit in 2011 - it was easier back when security breaches were unheard of, but now that a decade has passed I guarantee he couldn't hack anything.

So my question to Kevin Mitnick: Can you compromise a brand new PC running updated Windows 7 and a decent antivirus?

I am nearly 100% positive you can't even come close.

Re:What has changed (2, Insightful)

Anonymous Coward | about 3 years ago | (#37245366)

You still don't know Microsoft. With more two decades of history behind them, you'd think people like you would learn.

The fact that you still think it's normal for an operating system to need an anti-virus program on top of it just shows how bad it is.

Dear Kevin (0)

Anonymous Coward | about 3 years ago | (#37244626)

How can I get First Post on Slashdot?

Women (-1)

Anonymous Coward | about 3 years ago | (#37244644)

On average, how many more women have your hacking abilities allowed to you sleep with on a regular basis? I would assume at least 17 per night.

Do you own a Guy Fawkes Mask? (3, Interesting)

blair1q (305137) | about 3 years ago | (#37244662)

Do you own a Guy Fawkes mask, or have an opinion of Anonymous' activities?

Re:Do you own a Guy Fawkes Mask? (1)

notKevinJohn (2218940) | about 3 years ago | (#37245236)

Regardless of whether you approve or disapprove of Anonymous' activities, do you think that the "genie could be put back into the bottle" even if we wanted to? Is Hacktivism here to stay?

Is it cool any more? (4, Interesting)

Hazel Bergeron (2015538) | about 3 years ago | (#37244666)

You have gone from hacker/cracker to security consultant via quite a difficult route. If you just wanted the money, there would have been far easier ways.

Today, the most well-known kiddies tend to do something high profile but requiring little technical brilliance and move quickly to "legitimate" jobs. The majority of "security consultants" don't really have much technical knowledge at all, being more public relations/ass-covering types.

With this in mind, what advice do you have to people who like to study security for its own sake? Should they keep quiet about what they do, developing an academic career so they can research to their heart's content without commercial pressures?

Or does everyone clever sell out in the end?

Re:Is it cool any more? (1)

synthesizerpatel (1210598) | about 3 years ago | (#37244814)

While I'm not a big fan, one of the mustache guys from Metallica put it the best:

"Yes, we do sell out, every single time, everywhere we play."

Re:Is it cool any more? (0)

Anonymous Coward | about 3 years ago | (#37245018)

Or from the movie "They live" [youtube.com] : "What's wrong about selling out?"

Re:Is it cool any more? (0)

Anonymous Coward | about 3 years ago | (#37245122)

Mitnick was never technical, he was using good old fashioned social engineering. Never read anything he wrote?

What if they had not cought you? (5, Interesting)

Superken7 (893292) | about 3 years ago | (#37244678)

How do you think would have happened in a scenario where you managed to escape the FBI and the hackers that helped them?

Re:What if they had not cought you? (-1)

Anonymous Coward | about 3 years ago | (#37244940)

Nice question, you doofus.

Re:What if they had not cought you? (0)

Anonymous Coward | about 3 years ago | (#37245142)

Not everyone can language.

Re:What if they had not cought you? (1)

Bucky24 (1943328) | about 3 years ago | (#37245354)

What's wrong with it?

Re:What if they had not cought you? (0)

Anonymous Coward | about 3 years ago | (#37245260)

But is. Having this be known not after, although not before. Where lies hidden in the details. The question and answer begging to be asked.

Remember, kids... (0)

Anonymous Coward | about 3 years ago | (#37244680)

Mitnick made his way by stealing the personal identification of *dead infants*. He's a sociopath.

Think about that the next time the Mitnick circlejerk comes to town. Mitnick is NOT a role model. He's a bottom-feeder who got caught.

Re:Remember, kids... (2)

somersault (912633) | about 3 years ago | (#37244772)

Huh? If they're dead, what's the problem? It would be much more evil to steal the identities of living people. If he killed the infants to steal their identities, then I think you'd have a point.

(Note: I don't actually know anything about this guy or what he did)

Re:Remember, kids... (-1, Offtopic)

omnichad (1198475) | about 3 years ago | (#37245322)

Oops - replying to remove stupid accidental mod

Re:Remember, kids... (2)

surgen (1145449) | about 3 years ago | (#37244998)

Mitnick made his way by stealing the personal identification of *dead infants*. He's a sociopath.

Maybe if he stole them for shits and giggles, but the identities of dead infants have two significant properties: They're real identities and they're not in use. If there was another class of people with the same or better potential for clean identity theft, he probably would have stolen their identities too.

10 years later .... (0)

Anonymous Coward | about 3 years ago | (#37244690)

Considering that you were starting a consulting business 10 years ago, how has that come along? I would assume that many companies might be a bit reticent about hiring a company that was founded by a convicted criminal.

anonymous from home? (1)

hvm2hvm (1208954) | about 3 years ago | (#37244696)

Is it possible to be completely anonymous from home? I.e. launch an attack from home and get away with it?

Re:anonymous from home? (2)

gshegosh (1587463) | about 3 years ago | (#37245064)

For you, after posting this question - it's not possible ;-)

Re:anonymous from home? (2)

hvm2hvm (1208954) | about 3 years ago | (#37245494)

everyone was posting as AC and I wanted to be special :D

As a professional white hat... (3, Interesting)

Dino (9081) | about 3 years ago | (#37244698)

What would you recommend to organizations to curtail the sort of social engineering break-ins for gaining unauthorized entry?

Re:As a professional white hat... (2)

jhoegl (638955) | about 3 years ago | (#37245382)

Training....

Just curiousity (-1)

Anonymous Coward | about 3 years ago | (#37244708)

Are you a top or a bottom?

Will the authorities ever understand (0)

Anonymous Coward | about 3 years ago | (#37244714)

Will the authorities ever understand, that curiosity must not be a crime?

Re:Will the authorities ever understand (3, Informative)

Tubal-Cain (1289912) | about 3 years ago | (#37245116)

It isn't. The crime is the digital equivalents of Breaking & Entering, Trespassing, Vandalism, Industrial Espionage/Sabotage...

Colbert Report (3, Informative)

Warlord88 (1065794) | about 3 years ago | (#37244718)

Kevin Mitnick was recently on Colbert Report to promote his book. Here is the link [colbertnation.com] if anyone's interested.

Re:Colbert Report (5, Interesting)

vlm (69642) | about 3 years ago | (#37245222)

Kevin Mitnick was recently on Colbert Report to promote his book. Here is the link [colbertnation.com] if anyone's interested.

Yeah, thats the "7 digit UID new school /."

The old school 5 digit UID and below /. crowd would have reported that Kevin was on 2600 / off the hook "recently" to promote the book. Which show was it? I donno, probably one of these:

http://www.2600.com/offthehook/2011/0811.html [2600.com]

I listened; it was a fairly interesting interview.

Somewhere in between old school and new school, he was on some TWIT network show recently too, apparently this one:

http://www.twit.tv/show/triangulation/21 [www.twit.tv]

The twit network is generally a little too non-technical / mass market for me, although they certainly easily are more interesting than TV. I think it would be hilarious if Leo purchased the "tech tv" trademark from whoever owns it using his apparently voluminous petty cash fund (if you've seen his new studio, you'd know what I mean)

Now someone else chime in with his Dr. Phil episode for that / newbie tone. thats what the 8 digit UIDs watch, or so I hear.

How did you guys make up? (1)

Anonymous Coward | about 3 years ago | (#37244728)

How on Earth did Kevin and Lewis make-up? How could Kevin forgive Lewis all that?...

1) Taking his wife and

2) [wearing a wire/leading him into a trap] to get arrested?

W.T.F.... how???

Responsible Disclosure? (4, Interesting)

gcnaddict (841664) | about 3 years ago | (#37244734)

Should you find a security vulnerability (either in an open source project, a commercial product, or a company's hosted systems), what procedure would you consider "responsible disclosure" to the parties who are considered owners of the product? I recognize that each of the three cases listed above could vary significantly.

cybersecurity (4, Interesting)

Anonymous Coward | about 3 years ago | (#37244750)

What cybersecurity threats do you see as the most dangerous to the Internet now?

Re:cybersecurity (1)

zero0ne (1309517) | about 3 years ago | (#37244842)

What threat do you see as the most dangerous in 2, 5 and 10 years?

In the end... (4, Interesting)

NabisOne (2426710) | about 3 years ago | (#37244754)

Was it worth it? Is there an upside to your experiences the last ten years?

Re:In the end... (1)

vlm (69642) | about 3 years ago | (#37245234)

Was it worth it? Is there an upside to your experiences the last ten years?

Groupies? gifs or it didn't happen...

Linux (0)

Anonymous Coward | about 3 years ago | (#37244760)

What's your favorite Linux distro and why?

Are you hiring? (-1)

Anonymous Coward | about 3 years ago | (#37244804)

I'd love to live in Las Vegas.

Cyberwar (1)

mewsenews (251487) | about 3 years ago | (#37244820)

The minor political movement surrounding your incarceration would likely not happen today. Hacking has become a state-sponsored activity, with China attacking Google and America/Israel attacking Iran.

Do you think your life would be a lot different if you were born 10 years later?

Security-Convenience tradeoff (4, Interesting)

Superken7 (893292) | about 3 years ago | (#37244844)

Would you agree that mostly there exists a tradeoff between security and convenience? If so, how much security (or convenience) do you think is worth sacrificing for the other?

Hi Kevin (1)

wiedzmin (1269816) | about 3 years ago | (#37244848)

Do you lead by example, as in encourage hackers to do what you did, so that they can end-up as famous and well-paid security consultants? Or are you more of a "do as I say not as I do" type of role models? Thanks.

hymenology council; read the teepeeleaks etchings (0)

Anonymous Coward | about 3 years ago | (#37244862)

surgical experiments performed by ordained 'doctors'. unrepentant (now a major motion picture) to this day. it's all in there, & according to the native elders, it's happening again all over the wwworld.

disarm. tell the truth. the only mathematically & spiritually correct options.

catch me, if you can (0)

Anonymous Coward | about 3 years ago | (#37244884)

Is it really possible to hide your online activity, keeping in mind that the enemy has the most advanced tools and computers to filter the traffic, and pinpoint your exact physical location?

Re:catch me, if you can (1)

zero0ne (1309517) | about 3 years ago | (#37245042)

Is it really possible to hide your online activity, keeping in mind that the enemy has the most advanced tools and computers to filter the traffic, and pinpoint your exact physical location?

To expand slightly on the above question, I think the "enemy" in this case needs to be properly defined. Is it a Corporation or the Government? If Government, which Government? (IE I don't think China would give the NSA / CIA access to their backbone routers to start monitoring traffic).

With that change, How do you suggest we as citizens of the net go about to protect ourselves properly? How can a whistle-blower be safe in today's connected world?

How did you choose your targets? (2)

Rizimar (1986164) | about 3 years ago | (#37244888)

When you were hacking and breaking into systems, how did you decide which ones to break into? Was it because of the difficulty/ease of doing it with different security setups? Or was it because of the actual people/corporations/entities behind the servers and what they stood for?

Anon & Lulzsec (5, Interesting)

zero0ne (1309517) | about 3 years ago | (#37244904)

What are your opinions on the actions of groups like Lulzsec & Anon? Do you feel that they will, in the end, expand freedom on the net or just help government tighten the noose on internet restrictions?

Hi, Kevin. I'm one of your victims. (4, Interesting)

Remus Shepherd (32833) | about 3 years ago | (#37244908)

Hi, Kevin. I was told that my credit card information was among the thousands you stole from Netcom, way back in the day.

I won't ask you what you did with the credit card info you stole, that might cause problems with self-incrimination. I wouldn't want that, oh no.

So let me ask this: How does it feel to be a 'respected' member of the security community now, after having frightened and hurt so many people back then? How does it feel to have the hacker community regard you as a hero when you've done some of the most amoral and harmful acts in modern computing history? I guess what I'm really asking is, how well do you sleep at night? Honestly.

Re:Hi, Kevin. I'm one of your victims. (0)

Anonymous Coward | about 3 years ago | (#37245396)

> how well do you sleep at night? Honestly.

My guess is he sleeps rather well. If you have the money to spend, which he does, you can afford a very comfortable bed, sheets and soothing sound makers.

Re:Hi, Kevin. I'm one of your victims. (0)

Anonymous Coward | about 3 years ago | (#37245468)

Care to perhaps be more specific as to what the "most amoral and harmful acts in modern computing history" are? I'm hard pressed to understand how anything Mitnick did holds a candle to the criminal mischief of botnets, extortion, and spam that now happens on a daily basis.

What is the most common security issue? (1)

Rizimar (1986164) | about 3 years ago | (#37244910)

What has been the most common security issue that you have come across that has helped you get into more systems? Poor passwords, gullible people, or something else?

Computer Setup (5, Interesting)

Anonymous Coward | about 3 years ago | (#37244914)

What is your computer setup? I mean hardware, OS, software you use to work.

Current opportunities in software (1)

TheSpoom (715771) | about 3 years ago | (#37244918)

What do you think the biggest opportunities for software businesses will be in the next five to ten years?

SSA (5, Funny)

Anonymous Coward | about 3 years ago | (#37244944)

Has the gal from the Social Security Administration claimed her kiss? if so, was she hot?

Re:SSA (1)

Superken7 (893292) | about 3 years ago | (#37245002)

LOL, please someone mod this up

Re:SSA (1)

Dryanta (978861) | about 3 years ago | (#37245226)

Lol if I had mod points I would totally mod it up.

What would you do to yourself? (1)

Superken7 (893292) | about 3 years ago | (#37244946)

How would you proceed if someone broke into your company and managed to download your company's most sensitive information, and what (if anything) would you tell your clients if, for example, their sensitive info got leaked?

ham radio license? (1)

vlm (69642) | about 3 years ago | (#37244952)

Are you going to fight to get back your ham radio license or is that all water under the bridge now?

Cybersecurity Companies (1)

bigredradio (631970) | about 3 years ago | (#37244966)

Kevin, do you suspect any collusion on the part of cybersecurity companies such as Kapersky Labs or Avast! and virus creators? If there were not so many exploits in the wild, would there be a billion-dollar anti-virus industry?

Re:Cybersecurity Companies (4, Insightful)

frank_adrian314159 (469671) | about 3 years ago | (#37245102)

I've worked for two of the major AV companies. In both cases, there were enough controls in place that, if it was financially happening, it would have become known. Even if you could have hidden the financials, if there was any sort of "collusion", someone would have leaked hard evidence by now, if only for the notoriety. Your paranoid imagination is just that.

The bottom line is that malware writers don't need the help. Think of it as information pollution. A manufacturer "saving" a few thousands per years in dump fees can cause a mess that costs millions to clean up. The malware writers' desires to get their botnets up and running to provide themselves collectively with a few million dollars per year are all of the incentive needed to produce the mess that requires billions in prevention and cleanup.

A question & follow-up (3, Interesting)

Pollux (102520) | about 3 years ago | (#37244968)

What is the primary purpose of hacking? Has this purpose remained constant over the decades, or has it changed from your rise as a hacker up to today?

Do you ever miss it? (0)

Anonymous Coward | about 3 years ago | (#37244970)

Being in prison, that is, where it's not at all gay to engage in otherwise extremely gay behaviour. Like rimming, sucking, topping, and, of course, being bottom.

Tightening the net (0)

Anonymous Coward | about 3 years ago | (#37244988)

Do you think in this day in age it is possible to compleatly drop off the grid and still retain regular contact with the outside world?

Why wait? (5, Interesting)

jeffmeden (135043) | about 3 years ago | (#37244990)

TFA Asserts that "Mitnick has agreed that any profits he makes on films or books that are based on his criminal activity will be assigned to the victims of his crimes for a period of seven years following his release from prison." The summary asserts that this is the reason you chose to wait before arranging for the publishing of a personal autobiography.

Given you had the opportunity to publish a copyrighted work and sell it for a profit prior to the release of your "official autobiography" under the pretense that the profits would be sent to the victims of your crimes (a number of which included theft of trade secrets and violation of copyright), why have you chosen to wait until the end of the agreement so that you could personally profit from this? And in a related question (unless you have answered it in the first), do you believe all of your crimes were vitcimless, some were, or perhaps none were?

I keep hearing this rumor and need clarification (0)

Anonymous Coward | about 3 years ago | (#37245008)

Do you have to fight someone in jail or become somebody's bitch plus what did you do, Mr. Mitnick?

Thank you

Treatment of Hackers (0)

Anonymous Coward | about 3 years ago | (#37245022)

Do you feel that the violent, threatening tactics of the police agencies and United States government against non-violent hackers is correct or justifiable and do you think they have improved since your experiences with them ?

Infinite diversity in infinite Kevins (1)

hantarto (2421914) | about 3 years ago | (#37245030)

Hi Kevin, nice to be please to meet you haha,

If infinite Kevins exist on probability axis, it is possible that you are free Kevin and still in jail being buttsexed in parallel buttsex reality configuration. Therefore if you were to encounter alterno-Kevin from some other plane on 5th or 6th dimension, what steps would you take in order to socially engineer him into giving you access to phone company supermegacomputer?

DNA hacking (1)

gshegosh (1587463) | about 3 years ago | (#37245038)

With all the advancements in bioengineering, do you think that at some time "biohackers" will emerge that will divert animal or human genomes to do what they want? Do you think that "social engineering" will one day be helpful in making someone share his/her genetic material so it can be hacked?

"Justice"... (1)

capnkr (1153623) | about 3 years ago | (#37245048)

Having experienced "justice" of a rather harsh sort (IMO, & possibly yours, too :) ) given that what you did was relatively inconsequential despite the claims otherwise, do you now do any work towards helping keep the sort of experience you had from happening again to other hackers (note: *not* 'crackers')?

Looking forward to reading your book.

How? (1)

Chaseshaw (1486811) | about 3 years ago | (#37245058)

In what area of technology did you find had the most holes for your exploitation? Was it mostly bad programming? Bad hardware? Bad protocols? Cheap companies (i.e. the security flaws were known but not addressed)?

Re:How? (1)

gshegosh (1587463) | about 3 years ago | (#37245156)

The most holes where in people's minds -- it was usually enough to make a few phone calls, I believe.

Did you meet other hackers in prison (1)

G3ckoG33k (647276) | about 3 years ago | (#37245078)

Did you meet and hang out with other hackers in prison? I mean others who served time for computer related crimes similar to your own? Or did you make friends with any sort of people? Even non-nerds?

Re:Did you meet other hackers in prison (1)

vlm (69642) | about 3 years ago | (#37245370)

Did you meet and hang out with other hackers in prison? I mean others who served time for computer related crimes similar to your own? Or did you make friends with any sort of people? Even non-nerds?

Do lower security prisons have 2600 meetings? Obviously not the 23-hours-per-day-lockup prisons but more like the "office space" "country club" minimum sec places?

Kevin's Cooking Tips (0)

Anonymous Coward | about 3 years ago | (#37245128)

Kevin - do you find its better to roast chicken at a higher temperature for a shorter time? Or for a lower temperature for a longer time?

Hacking as an Educational Tool (0)

Anonymous Coward | about 3 years ago | (#37245138)

In what ways do you think Hacking (old known vulnerabilities, in out of date test systems) could be used to teach proper security in the University setting. (or even high school to promote CS,etc) -MAW

government in my company computer systems (0)

Anonymous Coward | about 3 years ago | (#37245140)

Not only is the government/sbdy spying through sw like LotusNotes (with dedicated NSA access) but other vectors of attack seem plausible too: BIOS is closed, we buy closed sourced hw with a lot of onboard memory, god knows what's the status with AES implementations in modern CPUs etc. As a consultant, what are your thoughts to companies wanting to protect themselves from government economical / tech espionage?

Harassment (1)

Anonymous Coward | about 3 years ago | (#37245190)

At last year's Defcon, you crashed the EFF Summit party, having waited until they were backed up at the door and very busy to force your way through the door and into the party. Shortly thereafter you were escorted out and you stuck around the front of the party where they had not the privileged to force you to vacate the area. Afterwards you engaged many involved in the charity event on twitter where you claimed to have been "in" the party for over two hours, were called out and subsequently harassed those that did so. Initially you seemed to just block those that had negative things to say about you, but it quickly turned into you calling some at work and harassing them.

My question for you; As a felon, do you sometimes worry that playing games with other hackers will get you into trouble?

Mitnick is a creation of the media.. (1)

Paracelcus (151056) | about 3 years ago | (#37245210)

Nothing more, what he did was worth (at most) one year in minimum security and a ruinous fine! The fact that the posturing, corrupt little villains in law enforcement chose to exploit this for their own personal aggrandizement just highlights the failings of the (so called) "Justice" system!

current government internets strategy (0)

Anonymous Coward | about 3 years ago | (#37245262)

What would you suggest to the government about coming internets wars? Should all the internets go through the NSA supercomputers to profile ppl/organizations or should we encrypt all the communication streams and continue the anarchy of the internets?

Volte face (1)

sirdude (578412) | about 3 years ago | (#37245272)

In your last interview you mentioned that one of your primary goals was to change your much-maligned image as the most notorious hacker in the world into something more reputable. Have you succeeded? How has the journey been?

Do or have you ever owned a Guitar? (1)

freaxeh (1962440) | about 3 years ago | (#37245278)

If so, I've been thinking about buying a guitar and wanted to know whats your preferred Make and wood finish.

Hey, you seem eager to answer every question, I thought you might enjoy a break from the norm.

Lets just say that it would help boost my spirits when I'm running from the law, and I would get to know something about you on a personal level, that would then make me interested in reading your books more.

Oh my, Look at the time. Excetera. Excetera.

-Freax.

ask kevin? (0)

Anonymous Coward | about 3 years ago | (#37245284)

just give him a call yourself. he has already been dox'd multiple times and several of his machines (including his health) have been exploited.

Kevin (0)

Anonymous Coward | about 3 years ago | (#37245290)

What is your /. UID? Must be like 1337 or something.

Have you ever... (3, Funny)

sdguero (1112795) | about 3 years ago | (#37245300)

hacked your way into a girl's panties?

Morality and Ethics and stuff (1)

vlm (69642) | about 3 years ago | (#37245348)

A good friend of mine insists that your past behavior was due to a lack of certain ethical / moral regions in your psyche, in comparison, I think its more like a different orientation of ethical / moral beliefs rather than an outright lack of certain areas. So what is your philosophical reflection on why you did what you did?

In simpler terms, were you naughty because you didn't stop to consider if it was naughty or not, or were you naughty because in your judgement at that time it was overall the right thing to do?

1994 Colorado SuperNet - Was It You? (0)

Anonymous Coward | about 3 years ago | (#37245376)

In early 1994, I was a young, inexperienced sysadmin doing contract work for Colorado SuperNet. One day, Federal Marshals and corporate attorneys from a cell phone manufacturer (who shall remain unnamed) descended on us with search warrants and shut down the place for four days while they searched for stolen files. The gist of it was that _someone_ had used social engineering to convince an employee of the cell phone company to upload a phone ROM to a public FTP site, from whence it was then stolen. The FTP logs led them to an account at SuperNet.

Copies of the stolen files were indeed found on one of our servers, and I quit the job in a panic, convinced we were going to be shut down, and/or that I might somehow be liable. Quite honestly, our security had more holes than a Swiss cheese back then, and there were probably many "hackers" going in and out of the place on a daily basis.

I have always suspected that the person responsible was you, Kevin Mitnick, Was it you, and do you have any regrets for the collateral damage your actions may have caused over the years?

(Signed Anonymous due to a court order over this incident.)

"Most famous first name"? (1)

Anonymous Freak (16973) | about 3 years ago | (#37245392)

Wow, some /. writer has a bit of a man-crush on Mr. Mitnick...

Even if you mean just "most famous first name in the computer security field", I would argue that the only reason his first name is famous is because people know what it is. There are many more (current) computer security hacktivists whose online pseudonyms are well known: GeoHot, comex, etc.

I work at a computer security company, yet if I were to say "Kevin" to someone, Mr. Mitnick would *NOT* instantly spring to mind.

And as timothy does not specify "computer security", only "most famous first name", we have to include *MANY* more people. Madonna, Cher, Pele, even Adolf. (Yup, it was bound to happen - I just invoked Godwin - although Godwin is a last name...)

Nothing to see here, please move along... (1)

g051051 (71145) | about 3 years ago | (#37245400)

CmdrTaco is only gone a few days and here's Mitnick again. Why should this particular criminal get any play on slashdot? He wasn't even a particularly good hacker.

Here's an easy one Kevin... (1)

GeneralEmergency (240687) | about 3 years ago | (#37245412)

.

Who am I and where is my car?

.

government supported hacking (0)

Anonymous Coward | about 3 years ago | (#37245418)

So what are your thoughts on stuxnet and government supported hacking? How would you do it with today's tools?

Easy question (0)

Yvan256 (722131) | about 3 years ago | (#37245424)

Which operating system do you use, and why?

Breach of Rights (1)

merky1 (83978) | about 3 years ago | (#37245428)

Did you / have you brought any legal actions for the breach of rights committed in the pursuit and eventual arrest of you? Do you feel the violations were similar to ones now being taken against "terrorists"?

Anonymity (& privacy) (1)

sirdude (578412) | about 3 years ago | (#37245444)

What is your opinion on anonymity - one of the Internet's greatest attributes - being attacked from all directions off late? On the one hand, governments are gunning against it citing national security and "protecting the children" as excuses, ISPs are being forced to retain activity logs thanks to the RIAA & other mobs, and the advent of Facebook, Google+, and other "people registers", are eroding privacy across the board. On the other hand, entire governments are being overthrown thanks to social revolutions with the Internet fostering freedom of speech without fear of repercussion. What is your opinion on all this and where do you see things ending up?

Why did you never go after Microsoft? (2)

lednik (792193) | about 3 years ago | (#37245470)

I read the book and absolutely loved it. Best non-fiction I've read in a looong time. As I read it I kept wondering when you'd get to the part where you got into Microsoft's network and snagged the source code to NT or Excel. But you never did. Why not?

Biggest threat (0)

Anonymous Coward | about 3 years ago | (#37245476)

I've often wondered if the biggest threat to security at a company is people or software. Do you think it's possible for a company to setup a reasonably secure network or is it doomed by the weakest link in the chain, users? What about OS vendors, is there anything we (i work on a BSD project) can do to prevent attacks beyond responding to security vulnerabilities and trying to offer help documents to educate users about possible dangers?

Public perception of cracking systems (0)

Anonymous Coward | about 3 years ago | (#37245488)

15-20 Years ago People used to abuse of external system for having the possibility to learn new technology or just curiosity. Abusing IT Platform was not considered by the ordinary man in the street as a serious crime. Now things changed and you can buy a for 2k, a server to create an IT labs with all the technology if can imagine. What differences do you see in the actual people perception of ICT abuse/crime? Do you see difference in the perception by IT people?

Still got the fire? (1)

sirdude (578412) | about 3 years ago | (#37245490)

I see that you are now 48 years old. Do you still enjoy getting your hands dirty digging into code or do you find yourself becoming comfortable moving towards management & other roles? Where do you see yourself five years from now?
Load More Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>