![]() ![]() Enthralled by the possibility of using computers to gain access and power, Mitnick began breaking into voice mail and computer systems, rifling through private files and taunting those who crossed him.īut another side of Mitnick became clear in his conversations with investigative journalist Jonathan Littman printed in in the mid-1990s in “The Fugitive Game: Online with Kevin Mitnick.” The hacker seems less a threat than a fearful, disturbed young man, more annoying than vindictive.Īnd though a computer file containing 20,000 credit card numbers copied from the internet service provider Netcom was found on Mitnick’s computer after a 1994 arrest, there is no evidence he ever used any of the accounts. Phones led to computers, and Mitnick showed himself to be a persistent, if not stellar, hacker. He was initially barred for three years from using computers, modems, cell phones or anything else that could give him internet access - and from public speaking - but those requirements were dropped six months later. Upon his January 2000 release from prison, Mitnick told reporters his “were simple crimes of trespass.” He said “I wanted to know as much as I could find out about how phone networks worked.” The government accused him of causing millions of dollars in damages to companies including Motorola, Novell, Nokia and Sun Microsystems by stealing software and altering computer code.īut federal prosecutors had difficulty gathering evidence of major crimes, and after being jailed for nearly four years, Mitnick reached a plea agreement in 1999 that credited him for time served. Much fanfare accompanied Mitnick’s high-profile arrest in 1995, three years after he’d skipped probation on a previous computer break-in charge. Related: Armed with a star hacker brand, Clearwater tech firm KnowBe4 eyes a future IPO
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |