How the Greatest Hacker Manipulated Everyone

2.76M views4279 WordsCopy TextShare
Newsthink
How Kevin Mitnick hacked into the world's largest tech companies. Stop data brokers from exposing yo...
Video Transcript:
Kevin Mitnick hacked into the  largest tech companies on the planet. I’ve successfully compromised all systems that  I targeted for unauthorized access except one. Yet, his greatest skill lay not in his technical  ability but in his deep understanding of human behavior, enabling him to manipulate people  into doing things they wouldn’t normally do.
He’d walk into a building he was going to  target, pretending to drop off a letter for an employee at the front desk just so he  could take a good look at the staff IDs. Then, using Photoshop, he’d forge his own ID. Kevin explained in his memoir, Ghost in  the Wires, “.
. . it doesn’t even have to be all that authentic looking.
Ninety-nine percent  of the time, it won’t get more than a glance. ” Wearing his fake badge, he’d follow employees  back from smoke breaks through the back door, exploiting the common courtesy of holding  the door open for the person behind you. He’d then let in his hacking  buddy, who’d access the crawl space to get inside the locked office  of the company’s network engineers.
Once inside, he’d bypass the computer’s  existing operating system by installing a bootable version of the system loaded  with hacking tools, including malware that enabled him to access keystrokes,  steal passwords, even activate the webcam. He eventually finds his way to the  heart of the system , the servers responsible for handling customer transactions. And decrypts, “Millions and millions of  credit card numbers.
I can make purchases all day long using a different credit card  each time, and never run out of numbers. ” Yet, he never used any of the cards  or any of the information he accessed. Like a kid breaking into an abandoned  building, he hacked just for the fun of it.
He explained, “For us, the thrill lay  simply in knowing we had gained the power. ” His obsession with exploiting the  system started when he was young. At the age of 12, he found a way  to ride the bus in LA for free by buying a punch card and punching blank  tickets he fished out of a dumpster.
Kevin spent a lot of time alone. His dad left when he was three, and his mom  often worked double shifts as a waitress at various delis in Los Angeles to support them.  (Ventura Boulevard, one example is Fromin’s Deli) To pass the time, he liked  to perform magic tricks, influenced by the magician dad  of the girl he had a crush on.
He wrote: “. . .
the notion that people  enjoyed being taken in was a stunning revelation that influenced the course of my life. In high school, he became obsessed with  phone phreaking, manipulating telephone networks to make free long-distance calls. He loved using technology to play pranks.
He and his friend Lewis De Payne would modify an  amateur radio to make their voices come out of a McDonald’s drive-thru speaker and say things  like, “I’m sorry. We don’t serve cops here. ” But his antics were not always so innocent.
When he was 17, he targeted the critical  operating system of Pacific Bell, a major telephone provider in  California later known as AT&T. Posing as an employee who wanted to  show two friends around one night, the security guard simply said, “Sure.  Just sign in.
” without asking for ID. They walked out with piles of  manuals on how the system worked. But then one of his buddy’s  ex-girlfriends snitched, and he spent three months in juvenile detention.
That didn’t deter him. His obsession  with hacking overshadowed all else. He neglected high school, passed the GED exam,  and later enrolled in a technical school in LA, where he met the woman who would become his wife.
Even when he moved in with Bonnie, he spent  virtually every waking hour on his computer. One of his favorite targets was Digital Equipment  Corporation, a leading computer vendor. He really wanted the source  code - the recipe for how a product works - for DEC’s new operating  system VMS to identify security flaws.
He and his friend Lenny DiCicco remotely  infiltrated DEC to steal the prized source code. But then, Lenny betrayed him. When Lenny refused to fork over $150 after losing  a bet, Kevin started calling Lenny’s employer, pretending to be the IRS and claiming  Lenny was wanted for tax crimes.
Lenny was so angry that he told  his boss that he and Kevin were hacking into DEC late at night from the office. The FBI got involved, and Lenny started  secretly recording his conversations with Kevin. When the Feds arrested Kevin, Kevin said Lenny  was “.
. . dancing in a little circle of joy, as if he were celebrating  some kind of victory over me.
” This hack would haunt him. Prosecutor Leon Weidman painted Kevin  as a significant threat, claiming, “He can whistle into a telephone and  launch a nuclear missile from NORAD. ” That might seem ridiculous now, but in the 1980s, there was a lot of fear  over how technology worked.
Computers and the fledgling internet were not  that well understood by the general public. So, the judge threw Kevin into solitary  confinement, where he spent eight months. When he was getting ready  for release, Bonnie left him.
He suspected she was cheating. After hacking into her answering machine, he discovered that she was having an  affair with…his best friend, Lewis. Despite the betrayal, he remained  friends with Lewis because there were very few people who could  understand his predicament.
After serving a year in prison, Kevin  knew he had to tread more carefully. He needed to ensure his phone couldn’t be tracked. He had to find a way of changing the electronic  serial number of his Novatel PTR-825.
He called Novatel and posed as one of  their engineers, even calling from the noisy Consumer Electronics Show  in Las Vegas to sound credible. He spoke with an engineering  manager named Kumamoto, who revealed it was possible to change  the ESN from the phone’s keypad if you had a special computer chip containing  a special version of the firmware. Kevin convinced Kumamoto to ship a few chips to the Las Vegas hotel where  he claimed to be staying.
He then called up an electronics store and  obtained the ESNs of recently activated phones, allowing him to impersonate  those devices on the network. Around this time, Kevin was introduced to a  supposed star hacker named Eric through his half-brother’s ex-girlfriend. Eric was super secretive.
He wouldn’t give Kevin his phone number or pager number. They communicated  through an intermediary. ba After talking a few times, Kevin’s  gut told him something was off.
“Eric didn’t talk like other hackers; he sounded  more like Joe Friday, like a cop. He asked questions like, ‘What projects have you been up  to lately? Who are you talking with these days?
’” He decided to dig deeper into Eric’s background. Kevin’s friend Dave at Pacific  Bell set up a trap with a bait phone number. When Eric dialed in,  the call re-routed to Dave’s office, allowing them to capture Eric’s phone  number through the system’s caller ID.
Using Eric’s phone number,  he discovered his address. He called Pacific Bell, pretending  to be a technician named Terry. When asked for a tech code,  Kevin provided a random number.
“Terry, what’s your tech code? ” He recalled: “I knew she wasn’t going to  look it up - they never did. Any three-digit number would satisfy, so long as I sounded  confident and didn’t hesitate.
” (page 124) His ploy worked. Upon requesting the address linked to Eric’s  phone number, the employee didn’t bat an eye: 3636 South Sepulveda, unit 107B,  registered under the name Joseph Wernle. Kevin’s doubts deepened when he accessed  the call logs of Eric's phone line, and found calls to the Los  Angeles headquarters of the FBI.
Drven to unravel the full story, Kevin devised an elaborate scheme to  obtain Eric’s social security number. He posed as a member of the  Office of the Inspector General at the Social Security Administration,  responsible for investigating fraud. To gain credibility, he meticulously  researched the agency’s internal structure, the names of supervisors and managers,  and even learned the company lingo, including terms like “Mods” - short for  “Modules”, referring to teams handling claims.
A staff member named Ann ate up his  lies and gave him anything he wanted: social security numbers, birth  dates, benefits, and earnings. Ann’s information about an Eric  Heinz Sr. , likely Eric’s father, led to a shocking discovery.
When Kevin called Eric Heinz Sr. and said: “I’m trying to get hold of Eric. I’m  a friend of his from high school.
” Eric Heinz Sr. sounded annoyed and  replied: “My son died as an infant. ” Who really was the person  masquerading as Eric Heinz Jr.
? Kevin remembered Eric bragging about  collaborating with hacker Kevin Poulsen. He dug around and found an article about Poulsen  conspiring with two others to rig radio contests.
He recognized the name of one of the  co-conspirators but wasn’t familiar with the other, Justin Tanner Petersen. When he manipulated the Department of Motor Vehicles to read him Petersen’s physical  description, it was a match for Eric. Justin Tanner Petersen was  a hacker working as an FBI informant “to save his own ass,” in Kevin’s words.
The identity Joseph Wernle listed on the apartment was the made-up identity of an  FBI agent named Joseph Ways. Meanwhile, security at Pacific Bell had begun  wiretapping calls from his father’s house. In a lapse of judgment, Kevin had used  his dad's landline while staying there temporarily instead of his untraceable cell phone.
As the FBI pursued Kevin,  he was also pursuing them. He figured out the names and numbers  of the FBI agents Eric was talking to. Upon learning that the agents used the  cell provider PacTel in Los Angeles, Kevin infiltrated PacTel's system to track  their call records and pinpoint their locations.
He also installed a scanner in his office at  the private investigation firm where he worked to detect FBI cell phones, using software  programmed with numbers linked to Eric. In September 1992, Kevin’s scanner detected the  cell phone of FBI Special Agent Ken McGuire. He quickly cleaned up his apartment,  ensuring there wasn’t any evidence.
On the morning of September 30, 1992, police  knocked on his door, and he answered naked. The agents were also not pleased to find  a box of FBI DOUGHNUTS waiting for them. Although the FBI found no evidence, his  close calls with authorities were escalating When Kevin conned the Department of Motor Vehicles  into handing him a copy of Eric Heinz’s driver’s license, DMV investigators tracked him to a print  shop, where Kevin’s grandmother had driven him.
The investigators chased him through  the shop, where he barely escaped, all the while, his poor grandmother  waited in the parking lot for three hours, wondering what had happened to her grandson. Kevin later reflected, “I never felt guilty about  getting information I wasn’t supposed to have…But when I thought about my grandmother, who had  done so much for me and cared so much for me all my life, sitting there in her car for so long,  waiting and anxious, I was filled with remorse. ” It was hard to leave his beloved grandma and  mom, but he knew he had to go on the run.
A warrant was out for his arrest  for violating his probation by hacking and associating with other hackers. Kevin adopted a new identity: Eric  Weiss, the real name of his hero, the magician Harry Houdini. He planned to do his own disappearing act.
To solidify his persona, he infiltrated a credit reporting agency to find an Eric Weiss  with good credit and around his age. Then he got help from Ann, his  friendly contact at the Social Security Administration, to gather  other personal details about Eric. He moved to Denver with his new identity, drawn  by the allure of its natural beauty, and got a gig in the IT department of a prominent law  firm…where he worked by day and hacked by night.
The fun lay in hacking the world’s largest tech  companies with presumably the best security. He set his sights on obtaining the source  code for one of Motorola’s coolest phones, the MicroTAC Ultra Lite. He wanted to understand how the phone’s software worked to try to change the  ESN - just as he had done with his Novatel phone.
Posing as “Rick” from Motorola’s  Research and Development team inIllinois, he got Alisa on the phone, a stand-in for Pam,  an assistant to a VP in R&D who was on vacation. He deceived Alisa by saying that Pam was  supposed to send him the source code for the MicroTAC Ultra Lite but had directed him to  Alisa if she couldn’t send it before her holiday. When Alisa asked, “What version do byou want?
” Kevin had no clue what to ask for and  said: “How about the latest and greatest? ” Just like that, Alisa handed him one of  Motorola’s most protected trade secrets. Though…there was one little hiccup.
Kevin had forgotten to acquire the compiler to translate the source code  into machine-readable code. Still, it was a thrill. Next came Nokia.
He posed as an engineer from Nokia USA in San  Diego and contacted one of Nokia’s offices in Finland where a guy named Tapio transferred  the source code for the Nokia 121 via FTP. Surprised by how easy that was, Kevin  wondered if he could infiltrate Nokia’s internal network…to access more source  codes and information on upcoming releases. He deceived Nokia England’s IT  department into giving him the login details to connect to its operating system, which he exploited to gain full system access  and create a new user account for himself.
Then he set his sights on  a secretive digital phone under development internally called the HD760 He contacted the lead developer, Markku,  persuading him to share the latest source code. However, Nokia blocked outbound  file transfers for security reasons following alerts triggered when  Kevin created his new account. Unfazed, he persuaded Markku  to ship the source code via a tape drive to a Nokia office in Florida.
Largo His friend Lewis would impersonate  the senior vice-president of Nokia USA to retrieve the tape, as it  was too risky for Kevin to go. The package was arranged to be picked up  at a Ramada Inn near the Nokia office. But the FBI had already been alerted.
Kevin became suspicious when he  called the hotel to confirm the pickup and the receptionist seemed nervous  and put him on hold for several minutes. Kevin called back later,  pretending to be an FBI agent: “This is Special Agent Wilson with the  FBI. Are you familiar with the situation on your premises?
” The manager responded: “Of course I am! The police have  the whole place under surveillance! ” It was time to leave and become someone else.
He settled on Seattle because of its  tech scene, Thai food, and good coffee. He adopted the identity of a baby who died,  Brian Merrill, which he obtained by posing as a private investigator at South Dakota's  state registrar for vital statistics. He had to be extremely careful about hiding his  real identity.
The front page of the New York Times labeled him: “Cyberspace’s Most Wanted” Kevin felt journalist John Markoff had  wrongly turned him into a supervillain. The article was right about one  thing, Kevin was eluding the FBI. Special Agent Kathleen Carson confirmed as much in a letter to a British computer  expert Kevin had been in contact with.
The letter read, in part, “I do not believe  we will ever be able to find him via his telephone traces, telnet or FTP connections…Your  assistance is crucial to this investigation. ” The crucial assistance the FBI received  actually came from Tsutomu Shimomura, known as Shimmy, one of America’s most  skilled computer security experts. Shimmy joined the FBI manhunt because he was  furio us that Kevin had hacked into his computer.
At the time, Shimmy and hacker  Mark Lottor were working on a special project involving the OKI 900 cell phone. They had reverse-engineered it, allowing  them to change the ESN via the keypad. Eager to learn more, Kevin  hacked into Shimmy’s server and managed to steal files from his home computer.
Shimmy was FURIOUS when he discovered the  intrusion using network monitoring tools. Kevin wrote in his memoirs: “I had unleashed a hacker vigilante who would stop  at nothing to get even with me. ” The high of hacking into  Shimmy’s server was short-lived.
Police armed with a search warrant entered Kevin’s home when he wasn’t there  and seized his electronics. They were not the FBI but local cops who  were looking into his alias Brian Merrill. Still, it was only a matter of time  before the different agencies talked.
He fled Seattle for yet another fresh start,  relocating to Raleigh, North Carolina. He was now Michael David Stanfill - an identity  he acquired after infiltrating the admissions office of Portland State University and  accessing more than 13,000 student records. Remember when he hacked into  Motorola and obtained the source code without securing the needed compiler?
Kevin had forgotten to acquire the compiler  necessary to translate the source code into He now manipulated an engineer  named Marty from Motorola’s compiler supplier to FTP the file to him. Marty mentioned that the FBI was  tracking a superhacker that they figured would try to acquire the compiler. Little did he know he was  talking to that very superhacker.
High from this latest stunt, Kevin woke  up one day to find his cell phone dead. His service provider disconnected it because the  real Michael Stanfill had reported identity theft. The ruse unraveled when Kevin attempted to  avoid paying a $400 deposit for new electricity customers by requesting a reference  letter from Michael’s utility company.
Unfortunately for him, the letter was  also faxed to the real Michael’s address, exposing the fraud. Portland  General Electric, fax machine With his deception discovered,  Kevin chose another alias from the thousands he accessed from Portland  State University, G. Thomas Case.
The Feds were closing in on him, and  they were about to get a lucky break. Kevin had stored the files  he grabbed from Shimmy’s server on a community forum called The Well. However, The Well had an automated alert system that notified users when they used  a significant amount of disk space.
One day, Bruce Koball received an email indicating  that his account for an event he was organizing was using 150 MB of storage on The Well’s servers,  which was a substantial amount at the time. Bruce discovered that the stored  files didn’t belong to him. They contained emails addressed  to tsutomu’s work email.
They were the stash of files  stolen from Shimmy’s computer. When Kevin tried to figure out how much  the Feds knew about him by hacking into journalist John Markoff’s emails,  Shimmy was watching his every move. Internet service providers granted  Shimmy full access to their networks.
By cross-referencing instances of  unauthorized access to The Well with the login and logout records from the internet  service provider Netcom, Shimmy found a pattern. One account accessed The Well through  Netcom’s dial-up modems in Denver and Raleigh. Shimmy’s team traced the call in  real-time to Sprint’s cellular network.
However, Kevin had manipulated  the system to use a phone number that wasn’t assigned to any customer  but still appeared to be legitimate. So, a Spring engineer cleverly focused on  calls placed to the manipulated number rather than from it, leading to a Raleigh area code. These connection attempts consistently utilized the same cell phone tower, indicating  that the phone Kevin used to connect to the internet was in a fixed location.
Shimmy hopped on a plane to Raleigh. Kevin’s attempt to connect to Netcom through a different cell phone provider  as a precaution was in vain. All cell phone companies were on  the alert for any strange activity, immediately relaying it to Shimmy.
When a suspicious data call was underway, Shimmy and his team jumped into a vehicle and  used a radio direction-finding device to try to pinpoint the source of the cellular radio  signal, leading them to Kevin’s neighborhood. When they intercepted a conversation  between Kevin and another hacker, journalist John Markoff who joined the  pursuit, recognized his voice and shouted: “It’s him. It’s Mitnick!
” After finishing up at the gym, Kevin went home and logged onto his computer  a little after midnight on February 15, 1995. He noticed several of the  backdoors he had been using to access various systems  had unexpectedly vanished. He had “.
. . a sinking feeling in his stomach  that something bad was about to happen.
” So, he looked out into his apartment corridor, which gave a view of the parking  lot, to see if he was being watched. A U. S.
Marshal caught a glimpse of him. Door knock sound At 1:30 am, Kevin got a knock on the door. “Who is it,” he yelled.
“FBI” After nearly three years of  hiding, they finally caught him. When Kevin passed Shimmy in court, he  said: “I respect your skills. ” and nodded.
Shimmy returned the nod. Kevin was tossed into solitary  confinement, his greatest fear. He tried to get out on bail, but  the judge denied him a bail hearing.
Lawyer and client on computer might  be better, and then computer virus At first, he and his lawyer weren’t  allowed to examine the electronic evidence against him as the judge feared  he’d unleash a destructive computer virus. Due to the harshness of how he was being treated, a community of supporters banded together  and started the “Free Kevin” movement. When Kevin saw the outpouring  of support, it moved him.
“. . .
it meant the world to me that there  was an army of people working tirelessly to support me. It gave me more hope  and courage than they could ever know. ” Prosecutors alleged that he caused $300 million in damages based on the value of thee source  code, which included development costs.
Kevin thought that was ridiculous and likened  it to: “. . .
nabbing someone for stealing a can of Coke and demanding that he repay the cost  of developing Coca-Cola’s secret formula! ” He argued the damages should reflect  the value of the source code license, which he estimated to be under $10,000. Ultimately, he was ordered to pay  $4,125, factoring in his ability to pay.
He wasn’t exactly wealthy. He had never used or sold any  of the information he accessed. Kevin pleaded guilty to seven counts, including: Wire fraud Computer fraud Possession of access devices Interception of data communications He served five years in prison.
When he was released on January 21, 2000, he said: “My case is a case of curiosity. ” Kevin Mitnick, thank you for  being with us here today. After his release, his former adversary, the U.
S.  government, invited him to share his insights. The human side of computer security  is easily exploited and constantly overlooked.
Companies spend millions  of dollars on firewalls, encryption, and secure access devices, and  it’s money wasted because none of these measures address the weakest link  in the security chain. The people who use, administer, operate, and account for computer  systems that contain protected information. Kevin became hugely sought-after.
Kevin Mitnick is the world’s most famous hacker. Kevin Mitnick is the CEO of  Mitnick Security Consulting. He used his hacking skills ethically by advising  companies on strengthening their security.
And also shared helpful everyday advice. 0000000, and voila. Stay safe.
Don’t trust the safes. Kevin had created a new life for himself. And found love again, marrying Kimberley, whom he  met at a Cybersecurity conference in Singapore.
But his happiness would be cut short. In 2022, Kevin received the devastating  news that he had pancreatic cancer, which he battled for fourteen months. On July 16, 2023, Kevin Mitnick died peacefully.
He was 59 years old. At the time of his passing, his wife was pregnant. Kimberley later expressed, “Our son will know  you and I am convinced he will be a mini you.
” Kevin Mitnick went from being the world’s most wanted hacker to the world’s  most wanted security expert. His insights have changed how companies and  individuals protect their most sensitive data. As Kevin reflected on his remarkable  journey, he said it was “just like magic”.
While Kevin never used any of  the information he accessed, the reality is, not everyone  out there would do the same. In 2023, Americans lost $10 billion to fraud with imposter scams topping the  list, according to the FTC. And if you’ve ever Googled your name or email, as I have, you’ll be shocked at just how  much information is out there about you.
And unfortunately, data brokers  sell your information to scammers, spammers, and anyone looking to explo it you. That’s why I’m really excited to be partnering  with Aura, the sponsor of today’s video. Aura is on a mission to safeguard you online.
Aura shows you which data brokers  are selling your information and automatically submits opt-out requests for you. This doesn’t just cut down on spam but  protects you from hackers trying to access your social media, bank accounts,  or other sensitive information. Beyond safeguarding your information from data  brokers, Aura includes a credit monitoring service where you can monitor your credit and  get fraud alerts, as well as a password manager, antivirus protection, and a VPN - all without  having to download several different apps.
It’s the best of everything  at an affordable price. Aura is FREE for you to try out for  two weeks if you sign up with my custom link in the description: aura. com/NEWSTHINK That’s aura.
com/NEWSTHINK,  the link is in my description. Thanks for watching. For Newsthink, I’m Cindy Pom.
Copyright © 2024. Made with ♥ in London by YTScribe.com