Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Hackers

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Quick facts:

Also Known As: Kevin David


Mitnick, The Condor, The Darkside
Hacker

He also made it to the FBI’s most-wanted list of hackers

Kevin David Mitnick was born on August 6, 1963, in Van Nuys, California, U.S.
(59)

He studied at the James Monroe High School, located in Los Angeles, California.

He experimented with hacking since he was 12 and hacked into a computer


system for the first time at 16. He was jailed for hacking into DEC's computer
network. During his supervised release, he hacked into the voice-mail system
of Pacific Bell. An arrest warrant was issued against him, and he spent the next 3
years as a fugitive. During this time, he used fake identification to evade arrest
and never disclosed his location. He was eventually arrested on February 15,
1995, and convicted on multiple counts of wire fraud, possession of unauthorized
access devices, and other cybercrimes. He then spent 5 years in jail. After the
end of his supervised release in 2003, he focused on ethical hacking and
providing cyber-security solutions to corporates and the government.
Kevin is now a successful IT security consultant, an ethical hacking expert, a
public speaker, and an author. He established his own consulting
company, Mitnick Security Consulting, based in Las Vegas, Nevada, in January
2003. His LinkedIn profile describes him as the company’s “CEO and Chief White
Hat Hacker.” The company mainly offers testing solutions, security strategies,
and R&D consulting to various government and corporate clients. Some of his
clients are AT&T, Dell,
the FBI, FedEx, Harvard, IBM, MasterCard, Microsoft, Toshiba, Toyota,
and NASA.
Kevin has also co-written (with William L. Simon and Robert Vamosi) four
bestselling books: The Art of Deception: Controlling the Human Element of
Security (2003), The Art of Intrusion: The Real Stories Behind the Exploits of
Hackers, Intruders and Deceivers (2005), the autobiography Ghost in the Wires:
My Adventures as the World's Most Wanted Hacker (2011, a New York
Times bestseller), and The Art of Invisibility: The World's Most Famous Hacker
Teaches You How to Be Safe in the Age of Big Brother and Big Data (a book on
cyber privacy, released in 2017). All four books have been translated into 20
languages and are available in more than 50 countries.
As a public speaker, his presentations are informative and entertaining. They
include live demonstrations and elements of edutainment, including the latest
hacking trends.
2. Kevin Poulsen, also known as "Dark Dante," earned his 15 minutes of fame
by utilizing his intricate knowledge of telephone systems. At one point, he
hacked a radio station's phone lines and fixed himself as the winning caller,
earning him a brand new Porsche. The media dubbed him the "Hannibal
Lecter of computer crime."
Poulsen got himself onto the FBI's wanted list when he hacked into federal
systems and stole wiretap information. He was later captured in a
supermarket (of all places) and sentenced to 51 months in prison and a bill for
$56,000 in restitution.
Poulsen changed his ways after being released from prison in 1995. He
began working as a journalist and is now a contributing editor for Wired. In
2006, he even helped law enforcement to identify 744 sex offenders on
MySpace.
3. Loyd Blankenship, known as "The Mentor" in hacking circles, has been an
active hacker since the 1970s. He was a member of several hacking groups in
the past, most notably Legion of Doom (LOD).
Blankenship authored an essay called "Mentor's Last Words" (also called
"Conscience of a Hacker and Hacker Manifesto"), which he wrote after being
arrested in 1986. The essay has come to be seen as a kind of cornerstone for
hacking culture.
Blankenship was hired by Steve Jackson Games in 1989 to work on GURPS
Cyberpunk. The US Secret Service raided his home in 1990 and confiscated
the game's rulebook, calling it a "handbook for computer crime." He has since
given up on hacking and is now the head of product research and design at
McAfee.
Robert Morris

The Morris Worm, the first computer worm to be released on the World wide
web, was created by Robert Morris. The worm has the power to slow down
computers to the point where they are unusable. He was sentenced to three
years of probation, Four hundred hours of community service, and a
$10,500 fine due to his actions! Morris is currently employed at the MIT
Computer Science and Artificial Intelligence Lab as a university professor.

Charlie Miller

Charlie Miller spent five years as a computer hacker for the National
Security Agency after receiving his Ph.D. in Mathematics from the University
of Notre Dame. He's also worked as a consultant for Twitter and Uber ATC's
security teams. He won the Super Bowl of computer hacking four times in
the yearly Pwn2Own contest. When the iPhone and Android phones were
released, he was the first individual with permission to breach them
remotely. The ethical hacker, covered in various magazines and TV shows,
has also shown how Fiat Chrysler automobiles can be hacked to operate the
radio, brakes, and even the steering wheel! Miller is currently employed by
Cruise as a security professional for autonomous car security.

You might also like