0% found this document useful (0 votes)
109 views1 page

Kevin David Mitnick (Born On August 6, 1963) Is A Computer Security Consultant

Kevin Mitnick is a former computer criminal who is now a computer security consultant. In the late 20th century, he engaged in various computer- and communications-related crimes and was the most wanted computer criminal in the United States at the time of his arrest in 1995. Mitnick gained unauthorized access to computer networks from a young age and was eventually convicted of computer fraud and wire fraud in 1988 and 1999. He served prison time and is now known for his ability to hack into networks quickly and for leading the FBI on a three-year manhunt before his arrest.

Uploaded by

Harvey Pineda
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views1 page

Kevin David Mitnick (Born On August 6, 1963) Is A Computer Security Consultant

Kevin Mitnick is a former computer criminal who is now a computer security consultant. In the late 20th century, he engaged in various computer- and communications-related crimes and was the most wanted computer criminal in the United States at the time of his arrest in 1995. Mitnick gained unauthorized access to computer networks from a young age and was eventually convicted of computer fraud and wire fraud in 1988 and 1999. He served prison time and is now known for his ability to hack into networks quickly and for leading the FBI on a three-year manhunt before his arrest.

Uploaded by

Harvey Pineda
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

Kevin David Mitnick (born on August 6, 1963) is a computer security consultant, author, and hacker.

In the late 20th century, he was convicted of various computer- and communications-related crimes. At the time of his arrest, he was the most-wanted computer criminal in the United States. Mitnick gained unauthorized access to his first computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC's computer network and copied their software, a crime he was charged with and convicted of in 1988 After a well-publicized pursuit, the FBI arrested Mitnick on February 15, 1995, at his apartment in Raleigh, North Carolina, on federal offenses related to a 2year period of computer hacking. In 1999, Mitnick confessed to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication, as part of a plea agreement before the United States District Court for the Central District of California in Los Angeles. He was sentenced to 46 months in prison plus 22 months for violating the terms of his 1989 supervised release sentence for computer fraud. He admitted to violating the terms of supervised release by hacking into PacBell voicemail and other systems and to associating with known computer hackers, in this case co-defendant Lewis De Payne. He can find George Bush senior's social security number and Leonardo DiCaprio's mother's maiden name in under 15 seconds, and led the FBI on a three-year manhunt as he hacked his way into the world's biggest firms. "Computer terrorist" Kevin Mitnick is one of the world's most famous computer hackers and became a cause celebre after breaking into networks and stealing software at companies including Sun Microsystems (SUN) and Motorola (MOT). Now Mitnick, from the United States, travels the world teaching companies how to guard against people just like him. He argues that while sophisticated technology can help keep networks clean from viruses, it is useless if hackers can con a company's employees into handing over passwords by posing, for example, as colleagues.

You might also like