ACM JU Magazine 16th Issue is out Now!
Kevin Mitnick
The Rise, Fall, and Redemption of Kevin Mitnick
image1
Ayat Abu Eid
CYS Student at JU

“To Some People, I’ll Always Be the Bad Guy.”

Kevin Mitnick, the fabled figure whose mere mention strikes fear into the hearts of network administrators everywhere! His journey from teenage hacker to cybersecurity guru is nothing short of legendary. His preferred weapon? Social engineering. Why bother with complex code when you can just sweet-talk your way into confidential systems?

This is a story about passion, unauthorized access and very pissed off federal agents. Suffice to say that the man's antics in the late 1980s and early 1990s caused fears that Mitnick might break into NORAD and whistle to the phone to fire a nuclear attack.

Buckle up, as we delve into the electrifying life of the man who made fun of the FBI and emerged as a cybersecurity legend.
The Bus Ticket Hack: Kevin Mitnick's Ingenious Beginning
At the age of 12, Kevin pulled off a clever feat. He convinced a bus driver to reveal where he could buy his own ticket punch for a supposed “school project”.

Kevin sat next to the bus driver and said: “I’m working on a school project and I need to punch interesting shapes on pieces of cardboard. The punch you use on the transfers would be great for me. Is there someplace I can buy one?”. The unsuspecting bus driver, blissfully unaware that he was about to become a footnote in hacker lore, spilled the beans.

But Keven’s adventure had just begun. Armed with this knowledge, he discovered unused transfer slips in a dumpster near the bus company garage. Using these slips, he rode a random bus in the greater Los Angeles area for free.
The Ark: A Tale of Hacking, Backstabbing, and Irony
In 1979, when floppy disks ruled and modems screeched like caffeinated cats, Kevin Mitnick was dared by a group of fellow hackers to hack into a computer system named "The Ark" at Digital Equipment Corporation (DEC). His mission: to unlock the secrets of the RSTS/E operating system software.

After finding out the name and phone number of The Ark’s system administrator, Mr. Mitnick gave him a call. The cunning Mitnick didn't stop there. No, no! He donned the disguise of Anton Chernoff, a lead developer in DEC, and sweet-talked the unsuspecting system administrator. "I can't log in," he lamented. And what did the administrator do? Bam! Created an account and password faster than you can say "buffoon."

Mitnick smiled showing off his newly gained access to other hackers. They were amazed and shocked. “Mitnick, you clever trickster!” they shouted. But that’s not all. One bold hacker stole Mitnick’s login details, entered The Ark, and copied DEC’s valuable source code.

And here's the cherry on top: they called DEC’s corporate security hotline after their hack. "Good day, gentlemen," they said, very politely. "Did you know? Kevin Mitnick just did the most amazing hack ever!". How ironic! They left the Ark’s guardians, confused and embarrassed. DEC initially charged Mr. Mitnick with $4 million in damages related to the crime, but U.S. Attorney James Sanders later admitted the real cost of fixing the security holes was closer to $160,000.
Lines Crossed: Mitnick’s System Manipulation at Pacific Bell
In the year 1981, our 17-year-old protagonist, Kevin Mitnick, teamed up with a friend to hack a Computer System for Mainframe Operations (COSMOS) exchange that belonged to Pacific Bell in Los Angeles.

Once they infiltrated COSMOS, Kevin pulled off a nifty maneuver: he diverted the lines and intercepted all calls going through the exchange. Subscribers scratched their heads, wondering if the operators were playing elaborate pranks. However, Mitnick didn't stop there. He persistently targeted Pacific Bell and its COSMOS system, infiltrating the system's database and pilfering sensitive data from multiple subscribers. His unauthorized access extended to billing records, passwords, gateway combinations, and even a comprehensive system manual. Notably, he exploited this access to reroute lines for his own benefit.
Mitnick’s Bold Foray: HE HIT THE PENTAGON!
In 1983, Kevin Mitnick orchestrated a remarkable feat—an audacious hack. As a student at the University of Southern California, he leveraged a university machine, likely a TRS-80 equipped with a Zilog processor running at 1.77 MHz. Mitnick's target? ARPANet, the ancestor of the Internet, which, at the time, was exclusively accessible to the Army, large corporations, and universities.

By penetrating this network, he managed to breach the most secure computers of the time, those belonging to the Pentagon. His access extended to all files within the US Department of Defense. Notably, there was no evidence of data theft or any form of degradation during this period. Kevin Mitnick's actions were driven purely by curiosity and a desire to test his abilities.

The intrusion did not go unnoticed. A vigilant systems administrator detected the breach and promptly raised the alarm. Subsequent investigation efforts led directly to the perpetrator behind the exploit. As a result, Kevin Mitnick found himself arrested within the confines of the university campus. His trial marked the beginning of his real-world consequences for illicitly infiltrating a computer system, resulting in a six-month stint in a young adult detention center.
“I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses.” – Kevin Mitnick
The Infamous Hacker on the Run: WANTED!
In 1992, Kevin Mitnick gained notoriety as one of the most infamous hackers in the United States. He was among America’s most sought-after criminals, leading him to live life on the run. Under a fake name, Mitnick tried to evade government surveillance.

Mitnick wanted to buy an awesome phone called Motorola MicroTAC Ultralite it’s the “The iPhone 15 of the 1990s”. To avoid detection by the United States government, He decided to modify the phone’s identifying data or disabling its connection to cellphone towers, thereby preventing authorities from pinpointing his location. Mitnick made the decision to steal the phone’s source code. shockingly, he was able to do that by phone calling Motorola’s own staff while faking his true identity.
“There's no patch for human stupidity" –Kevin Mitnick
Behind Bars and Beyond: Mitnick’s Journey as a Security Professional
In 1999, Kevin Mitnick received a five-year prison sentence after pleading guilty to multiple charges. During his legal proceedings, the prosecutor raised alarming scenarios. They argued that Mitnick’s telecommunications expertise posed a significant threat. Specifically, they claimed that he could potentially hack into NORAD (the North American Aerospace Defense Command) from a prison phone. The fear was that he might initiate a nuclear attack using this access, highlighting the scale of fear and general paranoia surrounding Mitnick’s capabilities.

During his incarceration, Mitnick had a change of heart. He resolved to utilize his expertise for positive purposes upon his release. Immersing himself in studying computer security, he pledged to reform his life. This period of reflection allowed him to grasp the impact of his actions and recognize the critical importance of ethical conduct within the cybersecurity domain.

Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. As the CEO and chief “white hat” hacker at one of the most advanced boutique security firms globally, Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering.

Recommended from this issue