Support from readers like you keeps The Journal open.
You are visiting us because we have something you value. Independent, unbiased news that tells the truth. Advertising revenue goes some way to support our mission, but this year it has not been enough.
If you've seen value in our reporting, please contribute what you can, so we can continue to produce accurate and meaningful journalism. For everyone who needs it.
I was once the world’s most notorious hacker, now I do the same thing I did years ago – but I do it with my client’s permission.
IN THE SPACE of 10 years, hacker Kevin Mitnick went from being on the run from the FBI, to spending five years in prison, to spearheading his own Fortune 500 company that probes online security, and ironically, hired by some of the companies that he had attacked himself a decade previously.
Since his teenage years, he had been using tricks to game the system, starting with free bus rides and working out his teacher’s password; eventually evolving to stealing powerful people’s passwords and emails by probing the defences of both corporate and federal websites.
Now, after spending several years in prison for those crimes, he’s hired by companies to test their defences against the increasing barrage of cyberattacks.
Ahead of his appearance at the BT Mindshare tomorrow, which takes place during the BT Young Scientist & Technology Exhibition at the RDS, Mitnick spoke to TheJournal.ie about the greatest threat to companies’ security – its employees.
He also spoke about the major security risks in an increasingly-automated world, how he’s not angry about the “harsh sentencing” he received for his past crimes, and how he became involved in hacking in the first place – it all started with a magic trick on a mobile phone, and a teacher who encouraged his mischief.
Now you see it, now you don’t
When we think of what the internet and other technologies of the Digital Age have been able to make possible in such a short space of time, it’s quite extraordinary.
A video pinged across the world in seconds, huge amounts of money disappears in one account and appears in another; voice controlled-activations, driverless cars, and the prospect of machine-learning.
Similarly, 13-year-old Mitnick was awestruck in high school by the tricks his friend was able to do with a mobile phone.
Tolga Katas
Tolga Katas
“What drew me into hacking was my love for magic.” he said. “So as a young boy, I used to ride my bicycle over to the magic store after school to watch the salespeople perform these tricks over and over and over again.
“And then when I ended up in high school, I met this kid who could work magic with a telephone and he did all these tricks – he was able to get my mom’s unlisted telephone number.
He did all this crazy stuff where he’d call another number, he’d get your tone, he’d put in the secret code and you could dial anywhere in the world for free.
This art of manipulating or experimenting with phones or other communication devices is called ‘phreaking’, and gained popularity in the 1960s and ‘70s. As phones became more digitised, the often illegal practice of phreaking became closely associated with hacking.
In the early 1970s, Apple co-founder Steve Wozniak invented a device that allowed them to make free calls anywhere in the world by using certain tones in the telephone system. After a series of pranks, Wozniak’s friend and the famous co-founder of Apple Steve Jobs started thinking of ways to monetise the illegal devices, and invented the ‘blue box’, which were sold during the 1970s. It was from the proceeds of this ‘phreaking’ phone device that Jobs and Wozniak were able to fund their first creation – the Apple One.
“So Apple computers started from the phone phreaking stuff, and me I was also a prankster. I used to use my phone phreaking skills to change the [messaging service] on a friend’s home phone to a pay phone. So I remember when he or his parents tried to make a call it said ‘please make a deposit of 25 cents’.”
He says that as phones became more computerised in the 1970s, he upskilled in order “to pull pranks on friends and family”. So he decided he wanted to take a computer class, which had just become an option in his high school. But because he didn’t have the required prerequisites, he wouldn’t be allowed to take the class. So his friend suggested Mitnick should “show him what you can do with the phone”.
After obtaining the teacher’s wife’s number from the classroom phone, connected through the dial-up modem, and a few other tricks, the teacher allowed Mitnick to take the class.
His teacher continued to encourage Mitnick; even after he neglected the first task he was given in favour of creating a code that revealed the passwords of his classmates and teacher.
So the first programme that I ever wrote in my life was a log-in simulator, similar to a modern-day phishing programme.
Kid’s stuff.
Advertisement
FBI Most Wanted
Between the age of 16 and 32 (the age at which he was arrested by the FBI) Mitnick had copied software at the Digital Equipment Corporation, had hacked into the Pacific Bell voicemail computers, had gained access to dozens of computer networks for access to passwords, emails, and private information.
But despite Mitnick’s desire to keep a low-profile, and who hacked systems “for the pursuit of knowledge and adventure” and not for personal profit, he was labelled as the bad guy. In a book published in 1995, Cyberpunk: Outlaws and Hackers on the Computer Frontier, authors Hafner and Markoff labelled Mitnick as a ‘darkside hacker’. Afterwards, USA Today published a picture of Mitnick’s face superimposed over an image of Darth Vader.
This came just before his arrest in February 1995 after a high-profile pursuit by the FBI. He was charged with and pleaded guilty to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication, and served five years in prison.
Eight months of that sentence were served in solitary confinement, Mitnick says, because a prosecuting lawyer told the judge that he could use a prison payphone to communicate with a NORAD modem by whistling, which would launch nuclear missiles.
Mitnick says he responded by laughing, but the judge seemed to take the suggestion seriously, and agreed to putting him in solitary confinement, a decision that Mitnick cites as an example of the depth of their misunderstanding.
I perfected whistling the ICBM launch codes from anywhere in the world when you were still in diapers! Can you top that one Kim? pic.twitter.com/fMZVx1GzsB
While on the run from the FBI, he repeatedly tricked agents using cloned cellular phones to hide his location, which Mitnick told TheJournal.ie is the reason he received such a hard sentence.
“They had egg on their face,” he said, adding that former FBI agents who he’s met since have agreed with him that he got a harsh sentence.
Today’s threats
Today, Mitnick says that although there are more ways of hacking into people’s accounts, and accessing private information, the number one way in which “the bad guys get in” has stayed the same since the ’70s – through talking people into giving up private information.
He calls this technique ‘social engineering’ (think Leo DiCaprio in Catch Me If You Can).
“Social engineering is using manipulation, deception and influence to get a target to comply with the request, usually to give information or to click on an attachment in an email. And once the victim opens up the attachment and follows the instructions of the attacker, the computer is compromised.”
He says that some nationalities are more skeptical to these types of approaches by phone – Russia and China, for example, while in countries like Japan and Australia people are more likely to trust a caller and accidentally give away security information.
He also expressed concern about how the Internet of Things (IOT) might increase the number of cyber attacks over the next few years because of the increasingly interlinked systems and weak passwords.
“What hackers do is find flaws in code. So developers make flaws in their code, or they don’t think ahead, and what hackers do is find these flaws and exploit them. As complexity is built into operating systems and applications, it usually breeds vulnerabilities.
“The big threat of today is the Internet of Things, so you can buy a toaster today that’s built into the internet, and so an attacker could compromise your toaster for example, and even install malware onto it so that they could break into other systems and devices.
A still from the 2016 TV series Westworld. YouTube / ScreenshotYouTube / Screenshot / Screenshot
The Internet of Things is like the Wild Wild West. A lot of the IOT devices out there have default passwords like ‘adminadmin’, or ‘password’; or some of them you can’t update, so if there’s a security flaw you have to throw it away.”
He’s also concerned about the fanfare around artificial intelligence and the limitations with that: yes you can use machine-learning to build ‘smarter’ products, but those with more nefarious intentions can also use them as attacking systems.
“It’s kind of like a hammer, you can use a hammer to build a house, or you can use a hammer to destroy a house.”
On his first visit to Ireland, Kevin Mitnick will appear in the RDS at 5pm tomorrow to perform a ‘live hack’ – or a demonstration of how easy it is to gain access to private information as part of the BT Mindshare event.
If you’d like to register for the event, click here.
Readers like you are keeping these stories free for everyone...
A mix of advertising and supporting contributions helps keep paywalls away from valuable information like this article.
Over 5,000 readers like you have already stepped up and support us with a monthly payment or a once-off donation.
To embed this post, copy the code below on your site
Close
21 Comments
This is YOUR comments community. Stay civil, stay constructive, stay on topic.
Please familiarise yourself with our comments policy
here
before taking part.
This is not a one size fits all situation. The world is trying to get itself back to as normal as possible. If certain kids can go back to school safely let them. If it is a thing that some can’t for whatever reason come up with solutions… instead of moaning about it!! Just get on with it. All these bloody whinge bags. I’m sick and tired of it. Life isn’t fair in general. Get on with it.
@Caoimhín O’Cheallacháin: why can’t the look at Cambodia or Vietnam and bring half in the morning and half in the afternoon ah silly the teachers won’t agree to that
@Eileen Downing: You can’t compare us to Vietnam, huge man power, huge contact tracing, a military dictatorship. Also your comment on teachers is uncalled for, any proof teachers have said no to split classes, timetables? I’ll answer for you. No you don’t have proof, you just have issues with teachers. Teachers have said time and again they would do what’s needed. Some schools have already planned for split timetables, without any guidance from the department. So shove your snide cynical remark.
@Eileen Downing: this bullshit again ” the teachers” like they are some kind of enemy .like the title of a horror movie…The teachers!!!. Teaching staff give a shit about kids that arent theirs…and then go home and give a shit about their own kids.
@Eileen Downing: Eileen no disrespect but I’d prefer just to concentrate on Ireland. We have produced highly educated graduates in the last 50 years even before the advent of technology. We can adapt and change and get on with things as Irish people. I have my gripes about technology and my main one is it has prevented people thinking freely for themselves. We nearly need to get permission from Google to do things these days. But that’s another story…. We just need to put our heads down work hard and everything will come out ok the other side. I’m just really tired of living in a society that has no resilience and wants everything handed to them just because it was handed to Johnny up the road!
@Caoimhín O’Cheallacháin do you have kids yourself Caoimhín, I do and I’m very weary of advice from a constant stream of contradicted advise from a bunch of scapegoats giving advise in fairness on c19 but full portfolio in an economic society with the Dr’s safest advice doesn’t work
@Agenda21: yes I am a parent… We don’t need advice. We need people to make decisions for the best interests of the people. I would be happy personally if we had a leader who was strong enough to make decisions going against possibly the “best advice” of it was explained his reasoning and why. But I feel mob rule wouldn’t allow for that and would offend too many snowflakes
@a politicians promise is as good as a lie: according to our constitution I am free to associate with whomever I choose, travel freely, worship publicly etc. Extraordinary times and emergency measures and all that jazz.
@Tony Humphreys: no rights are absolue, even the right to life can be superceeded by self defense…most clauses end with ‘save n accordance with law’…. eg Article 40(4)(1) No citizen shall be deprived of his personal liberty save in accordance with law. Article 40(5) The dwelling of every citizen is inviolable and shall not be forcibly entered save in accordance with law… Article 40(6) The State guarantees liberty for the exercise of the following rights, subject to public order and morality…(ii) The right of the citizens to assemble peaceably and without arms…Laws, however, may be enacted for the regulation and control in the public interest of the exercise of the foregoing right. etc etc
Not discrimination… this is a health and safety issue, ….. If your child is not allowed to attend school for their own Health & Safety and you are a parent that feels your child is being discriminated against then, you would be an I.D.I.O.T
Open the schools earlier so. Everyone gets a decent amount of school time while still leaving some room for shutdowns in winter due to second wave/flu season. Safer in summer anyway cos kids can spend more time outdoors.
@Thomas O’ Donnell: Would be something but the government doesn’t consider allowing something on a smaller scale yet..
On another hand… if you are removing the summer holidays you don’t have to open the tourist sector ever again. They depend on people staying in the country and still visiting it. That won’t be possible otherwise.
@Thomas O’ Donnell: You presume that schools have the outside space to do so. The DES went on record today to say that there isn’t any provision for extra funding for PPE or extra cleaning , who pays for it ?
Such a confusing statement and article. Saying that it is discrimination if some children get to go back and others don’t makes some sense. Then says that some children need to come back earlier? Seems to be two contradictory statements! When the schools are open parents will make their own choices about returning or using their right to teach their own children. It’s not’ discrimination’ if parents choose not to bring them to school.
In order to protect a child with for example very frail health and susceptibility to complications related to Covid-19 that child is asked to stay away from school a little longer when it reopens than children in more robust health until we have a better handle on the public health situation.
It may be more complicated and it may take a bit more time to come up with solutions for children who due to circumstances beyond their control need more assistance with dealing with the probably temporary new realities.
How is that discrimination ? To me it appears to be the simple fact that one solution will not fit all and it will simply take a bit more time to solve more complex needs and associated practicalities. As long as solutions are being worked on and implemented as soon as possible I do not believe there would be a case to argue that this amounts to discrimination.
Planning permission refused for proposed six-storey hotel on Baggot Street
50 mins ago
1.5k
3
Not happy
Civil servants' review of Budget 2026 shows poverty will rise next year
56 mins ago
1.8k
9
the tenant
Jim Gavin's lawyers reach out to former tenant as ex-candidate commits to repaying €3,300
Updated
9 hrs ago
81.5k
Your Cookies. Your Choice.
Cookies help provide our news service while also enabling the advertising needed to fund this work.
We categorise cookies as Necessary, Performance (used to analyse the site performance) and Targeting (used to target advertising which helps us keep this service free).
We and our 241 partners store and access personal data, like browsing data or unique identifiers, on your device. Selecting Accept All enables tracking technologies to support the purposes shown under we and our partners process data to provide. If trackers are disabled, some content and ads you see may not be as relevant to you. You can resurface this menu to change your choices or withdraw consent at any time by clicking the Cookie Preferences link on the bottom of the webpage . Your choices will have effect within our Website. For more details, refer to our Privacy Policy.
We and our vendors process data for the following purposes:
Use precise geolocation data. Actively scan device characteristics for identification. Store and/or access information on a device. Personalised advertising and content, advertising and content measurement, audience research and services development.
Cookies Preference Centre
We process your data to deliver content or advertisements and measure the delivery of such content or advertisements to extract insights about our website. We share this information with our partners on the basis of consent. You may exercise your right to consent, based on a specific purpose below or at a partner level in the link under each purpose. Some vendors may process your data based on their legitimate interests, which does not require your consent. You cannot object to tracking technologies placed to ensure security, prevent fraud, fix errors, or deliver and present advertising and content, and precise geolocation data and active scanning of device characteristics for identification may be used to support this purpose. This exception does not apply to targeted advertising. These choices will be signaled to our vendors participating in the Transparency and Consent Framework. The choices you make regarding the purposes and vendors listed in this notice are saved and stored locally on your device for a maximum duration of 1 year.
Manage Consent Preferences
Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
Social Media Cookies
These cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.
Targeting Cookies
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then these services may not function properly.
Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not be able to monitor our performance.
Store and/or access information on a device 172 partners can use this purpose
Cookies, device or similar online identifiers (e.g. login-based identifiers, randomly assigned identifiers, network based identifiers) together with other information (e.g. browser type and information, language, screen size, supported technologies etc.) can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here.
Personalised advertising and content, advertising and content measurement, audience research and services development 220 partners can use this purpose
Use limited data to select advertising 180 partners can use this purpose
Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are (or have been) interacting with (for example, to limit the number of times an ad is presented to you).
Create profiles for personalised advertising 137 partners can use this purpose
Information about your activity on this service (such as forms you submit, content you look at) can be stored and combined with other information about you (for example, information from your previous activity on this service and other websites or apps) or similar users. This is then used to build or improve a profile about you (that might include possible interests and personal aspects). Your profile can be used (also later) to present advertising that appears more relevant based on your possible interests by this and other entities.
Use profiles to select personalised advertising 139 partners can use this purpose
Advertising presented to you on this service can be based on your advertising profiles, which can reflect your activity on this service or other websites or apps (like the forms you submit, content you look at), possible interests and personal aspects.
Create profiles to personalise content 54 partners can use this purpose
Information about your activity on this service (for instance, forms you submit, non-advertising content you look at) can be stored and combined with other information about you (such as your previous activity on this service or other websites or apps) or similar users. This is then used to build or improve a profile about you (which might for example include possible interests and personal aspects). Your profile can be used (also later) to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests.
Use profiles to select personalised content 51 partners can use this purpose
Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services (for instance, the forms you submit, content you look at), possible interests and personal aspects. This can for example be used to adapt the order in which content is shown to you, so that it is even easier for you to find (non-advertising) content that matches your interests.
Measure advertising performance 195 partners can use this purpose
Information regarding which advertising is presented to you and how you interact with it can be used to determine how well an advert has worked for you or other users and whether the goals of the advertising were reached. For instance, whether you saw an ad, whether you clicked on it, whether it led you to buy a product or visit a website, etc. This is very helpful to understand the relevance of advertising campaigns.
Measure content performance 80 partners can use this purpose
Information regarding which content is presented to you and how you interact with it can be used to determine whether the (non-advertising) content e.g. reached its intended audience and matched your interests. For instance, whether you read an article, watch a video, listen to a podcast or look at a product description, how long you spent on this service and the web pages you visit etc. This is very helpful to understand the relevance of (non-advertising) content that is shown to you.
Understand audiences through statistics or combinations of data from different sources 124 partners can use this purpose
Reports can be generated based on the combination of data sets (like user profiles, statistics, market research, analytics data) regarding your interactions and those of other users with advertising or (non-advertising) content to identify common characteristics (for instance, to determine which target audiences are more receptive to an ad campaign or to certain contents).
Develop and improve services 130 partners can use this purpose
Information about your activity on this service, such as your interaction with ads or content, can be very helpful to improve products and services and to build new products and services based on user interactions, the type of audience, etc. This specific purpose does not include the development or improvement of user profiles and identifiers.
Use limited data to select content 54 partners can use this purpose
Content presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type, or which content you are (or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Use precise geolocation data 68 partners can use this special feature
With your acceptance, your precise location (within a radius of less than 500 metres) may be used in support of the purposes explained in this notice.
Actively scan device characteristics for identification 40 partners can use this special feature
With your acceptance, certain characteristics specific to your device might be requested and used to distinguish it from other devices (such as the installed fonts or plugins, the resolution of your screen) in support of the purposes explained in this notice.
Ensure security, prevent and detect fraud, and fix errors 135 partners can use this special purpose
Always Active
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example, regarding advertising, ad clicks by bots), and ensure systems and processes work properly and securely. It can also be used to correct any problems you, the publisher or the advertiser may encounter in the delivery of content and ads and in your interaction with them.
Deliver and present advertising and content 138 partners can use this special purpose
Always Active
Certain information (like an IP address or device capabilities) is used to ensure the technical compatibility of the content or advertising, and to facilitate the transmission of the content or ad to your device.
Match and combine data from other data sources 107 partners can use this feature
Always Active
Information about your activity on this service may be matched and combined with other information relating to you and originating from various sources (for instance your activity on a separate online service, your use of a loyalty card in-store, or your answers to a survey), in support of the purposes explained in this notice.
Link different devices 73 partners can use this feature
Always Active
In support of the purposes explained in this notice, your device might be considered as likely linked to other devices that belong to you or your household (for instance because you are logged in to the same service on both your phone and your computer, or because you may use the same Internet connection on both devices).
Identify devices based on information transmitted automatically 131 partners can use this feature
Always Active
Your device might be distinguished from other devices based on information it automatically sends when accessing the Internet (for instance, the IP address of your Internet connection or the type of browser you are using) in support of the purposes exposed in this notice.
Save and communicate privacy choices 119 partners can use this special purpose
Always Active
The choices you make regarding the purposes and entities listed in this notice are saved and made available to those entities in the form of digital signals (such as a string of characters). This is necessary in order to enable both this service and those entities to respect such choices.
have your say