Ghost in the Wires Kevin Mitnick 2012 Heather Sliwoski CS408-03.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

Organized Crime: The role of the Federal Government Mike McCarry.
Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
Bill Gates ─10207 Ariel. Family & Early Childhood On October 28, 1955, shortly after 9:00 p.m., William Henry Gates III was born. He was born into a family.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Financial Fraud Examples Georgia CTAE Resource Network Curriculum Office, February 2009 To accompany curriculum for the Georgia Peach State Career Pathways.
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Hacking M***********s!!. Who is this guy? John Draper (aka Captain Crunch)
Frank Abagnale Jr. By Dakota Topf. Background One of 4 children, lived in New York City Father started a business on Madison Avenue Mother unexpectedly.
FRANK ABAGNALE CATCH ME IF YOU CAN. FIRST CRIMES When he was 15 he stole his fathers gasoline card and used it to buy tires and attempted to sell them.
HISTORY OF HACKING AND CYBERCRIME BY BRUCE PHILLIPS CRISSY HUGHES CARLOS BETETTA.
JOHN DRAPER AMERICAN COMPUTER PROGRAMMER AND “PHONE PHREAK” Presented by Macie Franklin.
Computer Security and Penetration Testing
ARE COMPUTER HACKER BREAK-INS ETHICAL?. Introduction Virus: –Attaches itself to a program or file so it can spread from one computer to another, leaving.
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
Author,Kevin Mitnick and William L. Simon Published by Back Bay Books (2012) Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker Presented.
Public Information Online. Timothy WhitneyCaroline Aaron.
Computer Hacking Cybercrime (1).
 Parole officers interact with recently-released prisoners and their families in order to help them become productive members of society.  They develop.
BY: JASMIN, PRABHJOT, BANDEEP, SUKHJIT, DAWINDER The Top 10 Most Prominent Hackers.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Viruses.
Chapter Six Laws: Civil vs. Criminal. Criminal & Civil Laws Substantive Laws: laws that define our rights and obligations Procedural Laws: laws that dictate.
CHILDREN DON’T BELONG IN JAIL! ●In Florida, a 17-year-old mildly retarded boy who was pleaded guilty to sexual battery was strangled by his 20-year-old.
Introduction to Computer Ethics
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Fraud By: Owen DeBalko. Explanation Identity fraud means the fraudulent use of an individual's identifying information to commit crimes, unlawfully.
Addiction Severity Index (ASI) Treatnet Training Volume A, Module 2, Workshop 3 - Updated: 1 January, 2007.
Computers and the Law Kyle Hammerschmidt. Crime  Is a “social harm that the law makes punishable; the breach of a legal duty treated as the subject-matter.
New York Criminal Defense Lawyer Phone: / Disclaimer: The tips in this.
CYBERCRIME a true to life story. WHO?! Kevin David Mitnick is an American computer security consultant, author, convicted criminal, and hacker. In the.
Juvenile Crimes. North Carolina In North Carolina, you are considered an adult at the age of 18, however you can still be charged as an adult at 16 and.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Lecture on Internet Issues and Laws. Topics What is Open source ? What is Open source ? What are the Copyright Issues? What are the Copyright Issues?
 Whitey Bulger was born James Joseph Bulger Jr. on September 3, 1929, in Dorchester, Massachusetts.  One of six children born to Roman Catholic Irish-American.
MORE MONEY FOR CYBER- SECURITY?. CYBER SECURITY: A TICKING TIME BOMB? Richie Sabu G/T Independent Research Howard High School Mr. Brian Price, Advisor.
The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon, Steve Wozniak Kevin D. MitnickWilliam L. SimonSteve.
Grade 11 Canadian Law Youth Criminal Justice Act.
Deviance and the Criminal Justice System 1.Illegitimate Opportunity Structures and perceptions of crime in our society 2.The Criminal Justice System 3.The.
Period 5.  People cannot be held responsible for their actions if they did not know what they were doing. This means that insanity can be a defense to.
Consequences of Uncontrolled Emotions #1 Legal: – Results in choosing behaviors that are against the law. (Going to jail, restitution for crime victims,
Criminal: Lawrence Bittaker – Serial Killer By Colton Winslow.
By Colby Beighey Period 9. About Ernesto Miranda  Born on March 9, 1941  Grew up in Mesa, Arizona  His mother died  His father remarried  Did not.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
Social Engineering The Greatest Security Risk to a Company.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
HACKING: THE GOOD AND BAD SIDES In this presentation, we will talk about the good and bad sides of hacking, and also the different points of view on this.
CRIMINAL & JUVENILE JUSTICE Officer Gary Kaufman Palm Beach County School Police.
The Art of Deception: Controlling the Human Element of Security
A Timeline of HACK TACTICS…
Social Engineering Dr. X.
Presented by: Kevin Regaldo Phillip Dai
Add video notes to lecture
Chapter 1 Crime and Justice in the US.
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
Threats By Dr. Shadi Masadeh.
Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
Crime and Punishment.
Chapter 11 crime and security in the networked economy
CE-Notes
The KGB the Computer and Me
The Art of Deception.
A Gift of Fire Third edition Sara Baase
Shellie Carnal Business Consultant - Texas
Consequences of Uncontrolled Emotions
Consequences of Uncontrolled Emotions
Laws Against Computer Hacking
Presentation transcript:

Ghost in the Wires Kevin Mitnick 2012 Heather Sliwoski CS408-03

Hacker

Kevin Mitnick

Early Years Raised by a single mom in California in the 1970s. First “hack” was to get free bus fares. –Dug through the dumpster at the bus depot and obtained discarded bus transfer tickets. –“Social engineered” a bus driver to give him information about his hole punch. –Purchased an exact replica of the hole punch, and had free bus fares for years.

Phone Phreaking

Criminal? Kevin quickly became addicted to phone phreaking and hacking. –He found entertainment in hacking into phone companies, and then later, tech companies. Kevin got caught hacking many times. –First time: probation –Second time: juvenile detention –Third time: went on the run!

Life on the Run Left California Spent time in Las Vegas with family Social Engineered new identities in North Dakota Joins the FBI Most Wanted List Moved to Denver –Feds started catching up Moved to Seattle –Feds started catching up

Arrested in Raleigh, NC in Held in various federal prisons for 4 years prior to his trial. –Why? “The Myth of Kevin Mitnick” Sentenced to 68 months in prison –When he was released he was forbidden to use ANY technology, including a land-line phone.

The Myth of Kevin Mitnick Because hacking was new and misunderstood, there were many rumors about the crimes Kevin had committed or could commit, including: –Whistling nuclear launch codes –Wiretapping the FBI and California DMV

Ethics No one was harmed as a result of Kevin’s hacking. Kevin did not financially profit from any of his hacking. His social engineering may have been unkind, but it was not illegal. The ethics of this situation are up to each of us to decide.

Where is he now?

Runs Mitnick Security, a computer security consulting firm. –He is contracted to find security flaws in corporate networks. –He still gets to hack, but has become a white- hat hacker. Does speaking engagements where he talks about the importance of computer security, and how to avoid hacks.

Questions?