“To Some People, I’ll Always Be the Bad Guy.”
Kevin Mitnick, the fabled figure whose mere mention strikes fear into the hearts of network
administrators everywhere! His journey from teenage hacker to cybersecurity guru is nothing short of
legendary. His preferred weapon? Social engineering. Why bother with complex code when you can just
sweet-talk your way into confidential systems?
This is a story about passion, unauthorized access and very pissed off federal agents. Suffice to
say that the man's antics in the late 1980s and early 1990s caused fears that Mitnick might break
into NORAD and whistle to the phone to fire a nuclear attack.
Buckle up, as we delve into the electrifying life of the man who made fun of the FBI and emerged as
a cybersecurity legend.
The Bus Ticket Hack: Kevin Mitnick's Ingenious Beginning
At the age of 12, Kevin pulled off a clever feat. He convinced a bus driver to reveal where he
could buy his own ticket punch for a supposed “school project”.
Kevin sat next to the bus driver and said: “I’m working on a school project and I need to punch
interesting shapes on pieces of cardboard. The punch you use on the transfers would be great for
me. Is there someplace I can buy one?”. The unsuspecting bus driver, blissfully unaware that he
was about to become a footnote in hacker lore, spilled the beans.
But Keven’s adventure had just begun. Armed with this knowledge, he discovered unused transfer
slips in a dumpster near the bus company garage. Using these slips, he rode a random bus in the
greater Los Angeles area for free.
The Ark: A Tale of Hacking, Backstabbing, and Irony
In 1979, when floppy disks ruled and modems screeched like caffeinated cats, Kevin Mitnick was dared
by a group of fellow hackers to hack into a computer system named "The Ark" at Digital Equipment
Corporation (DEC). His mission: to unlock the secrets of the RSTS/E operating system software.
After finding out the name and phone number of The Ark’s system administrator, Mr. Mitnick gave him
a call. The cunning Mitnick didn't stop there. No, no! He donned the disguise of Anton Chernoff, a
lead developer in DEC, and sweet-talked the unsuspecting system administrator. "I can't log in," he
lamented. And what did the administrator do? Bam! Created an account and password faster than you
can say "buffoon."
Mitnick smiled showing off his newly gained access to other hackers. They were amazed and shocked.
“Mitnick, you clever trickster!” they shouted. But that’s not all. One bold hacker stole Mitnick’s
login details, entered The Ark, and copied DEC’s valuable source code.
And here's the cherry on top: they called DEC’s corporate security hotline after their hack. "Good
day, gentlemen," they said, very politely. "Did you know? Kevin Mitnick just did the most amazing
hack ever!". How ironic! They left the Ark’s guardians, confused and embarrassed. DEC initially
charged Mr. Mitnick with $4 million in damages related to the crime, but U.S. Attorney James Sanders
later admitted the real cost of fixing the security holes was closer to $160,000.
Lines Crossed: Mitnick’s System Manipulation at Pacific Bell
In the year 1981, our 17-year-old protagonist, Kevin Mitnick, teamed up with a friend to hack a
Computer System for Mainframe Operations (COSMOS) exchange that belonged to Pacific Bell in Los
Angeles.
Once they infiltrated COSMOS, Kevin pulled off a nifty maneuver: he diverted the lines and
intercepted all calls going through the exchange. Subscribers scratched their heads, wondering if
the operators were playing elaborate pranks. However, Mitnick didn't stop there. He persistently
targeted Pacific Bell and its COSMOS system, infiltrating the system's database and pilfering
sensitive data from multiple subscribers. His unauthorized access extended to billing records,
passwords, gateway combinations, and even a comprehensive system manual. Notably, he exploited this
access to reroute lines for his own benefit.
Mitnick’s Bold Foray: HE HIT THE PENTAGON!
In 1983, Kevin Mitnick orchestrated a remarkable feat—an audacious hack. As a student at the
University of Southern California, he leveraged a university machine, likely a TRS-80 equipped with
a Zilog processor running at 1.77 MHz. Mitnick's target? ARPANet, the ancestor of the Internet,
which, at the time, was exclusively accessible to the Army, large corporations, and universities.
By penetrating this network, he managed to breach the most secure computers of the time, those
belonging to the Pentagon. His access extended to all files within the US Department of Defense.
Notably, there was no evidence of data theft or any form of degradation during this period. Kevin
Mitnick's actions were driven purely by curiosity and a desire to test his abilities.
The intrusion did not go unnoticed. A vigilant systems administrator detected the breach and
promptly raised the alarm. Subsequent investigation efforts led directly to the perpetrator behind
the exploit. As a result, Kevin Mitnick found himself arrested within the confines of the university
campus. His trial marked the beginning of his real-world consequences for illicitly infiltrating a
computer system, resulting in a six-month stint in a young adult detention center.
“I was addicted to hacking, more for the intellectual challenge, the curiosity, the
seduction of
adventure; not for stealing, or causing damage or writing computer viruses.” –
Kevin Mitnick
The Infamous Hacker on the Run: WANTED!
In 1992, Kevin Mitnick gained notoriety as one of the most infamous hackers in the United States. He
was among America’s most sought-after criminals, leading him to live life on the run. Under a fake
name, Mitnick tried to evade government surveillance.
Mitnick wanted to buy an awesome phone called Motorola MicroTAC Ultralite it’s the “The iPhone 15 of
the 1990s”. To avoid detection by the United States government, He decided to modify the phone’s
identifying data or disabling its connection to cellphone towers, thereby preventing authorities
from pinpointing his location. Mitnick made the decision to steal the phone’s source code.
shockingly, he was able to do that by phone calling Motorola’s own staff while faking his true
identity.
“There's no patch for human stupidity" –Kevin Mitnick
Behind Bars and Beyond: Mitnick’s Journey as a Security Professional
In 1999, Kevin Mitnick received a five-year prison sentence after pleading guilty to multiple
charges. During his legal proceedings, the prosecutor raised alarming scenarios. They argued that
Mitnick’s telecommunications expertise posed a significant threat. Specifically, they claimed that
he could potentially hack into NORAD (the North American Aerospace Defense Command) from a prison
phone. The fear was that he might initiate a nuclear attack using this access, highlighting the
scale of fear and general paranoia surrounding Mitnick’s capabilities.
During his incarceration, Mitnick had a change of heart. He resolved to utilize his
expertise for positive purposes upon his release. Immersing himself in studying computer security,
he pledged to reform his life. This period of reflection allowed him to grasp the impact of his
actions and recognize the critical importance of ethical conduct within the cybersecurity domain.
Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the
challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide.
As the CEO and chief “white hat” hacker at one of the most advanced boutique security firms
globally, Kevin mentors leaders, executives, and staff on both the theory and practice of social
engineering.