Page 1:The Birth Of Hacking
Page 2:Famous Hackers
Page 3:Phreaking, The First Movement
Page 4:Blue Box, Phreaking For The Masses
Page 5:Hijacking Lines: Mitnick At Work
Page 6:Kevin Mitnick Enters The Pentagon
Page 7:The Appearance Of Scrambled Communications
Page 8:The Creation Of The First Worm
Page 9:A Game With The FBI And A 17-Month Pursuit
Page 10:The Biggest Virtual Case
Page 11:Mitnick's Capture: A Battle Between Hackers
Page 12:16 Years Old And Infiltrating NASA
Page 13:He Wanted To Know More About UFOs
Page 14:The Raid On The New York Times
Page 15:DVD Jon, The Anti-DRM Hacker
Page 16:The Theft Of Windows Source Code
Page 17:A $245 Million Theft Against Dassault
Page 18:Hacking Today
The Appearance Of Scrambled Communications
In 1987, Kevin Mitnick left his illegal activities behind. He was under probation following his last sentence, so he could not afford any transgressions. However, he would soon use his skills again for shady activities.
One evening, along with his fiend Lenny DiCicco, Mitnick gained access to the internal network of the research laboratory at Digital Equipment Corporation (DEC). This intrusion was not complicated for Mitnick, because DiCicco was an employee of the laboratory in question and served as an accomplice. EasyNet, DEC's internal network, did not withstand the hacker's attacks for long, and he quickly gained access to the whole system.
An Attack Carried Out with an Accomplice
As in his previous attacks, the intrusion was quickly discovered, but this time Mitnick had anticipated it. He scrambled the origin of the calls, rendering all attempts to trace him useless. And this time he was not infiltrating the network because of simple curiosity or as a challenge: he had a definite goal. He wanted to seize the source code of the VMS operating system, used by DEC on its VAX computers.
Our hacker had taken all precautions, but neglected one: his own friend. Mitnick loves games and practical jokes, so one day he called Lenny DiCicco's employer posing as a government agent. He said an employee (DiCicco) was in trouble with the IRS. This joke was not appreciated by DiCicco, who decided to get revenge in his own way.
DiCicco betrayed Mitnick, informing his employer about the latter's activities in the company network. He then contacted the FBI, telling them he could deliver the hacker that was regularly infiltrating the laboratory network. It was during a rendezvous that Mitnick fell for the trap set up by his friend, who was accompanied by two FBI agents for the arrest.
The case proceeded quickly, with DEC accusing the hacker of data theft and having cost the company upwards of $200,000 in security measures. He was sentenced to a year in prison, and had to enter a six-month program to treat his computer dependency.
- The Birth Of Hacking
- Famous Hackers
- Phreaking, The First Movement
- Blue Box, Phreaking For The Masses
- Hijacking Lines: Mitnick At Work
- Kevin Mitnick Enters The Pentagon
- The Appearance Of Scrambled Communications
- The Creation Of The First Worm
- A Game With The FBI And A 17-Month Pursuit
- The Biggest Virtual Case
- Mitnick's Capture: A Battle Between Hackers
- 16 Years Old And Infiltrating NASA
- He Wanted To Know More About UFOs
- The Raid On The New York Times
- DVD Jon, The Anti-DRM Hacker
- The Theft Of Windows Source Code
- A $245 Million Theft Against Dassault
- Hacking Today