Running head: INFORMATION TECHNOLOGY, SECURITY AND ETHICS 1. Kevin Mitnick: How His Story Affected Information Technology, Security and Ethics



Similar documents
Juan Manuel Esteban Urbano. Rafael Escribano Zaldivar 2ºC

Frank Abagnale Jr.: The Real Story Behind Catch Me If You Can

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

STUDENT LEGAL SERVICES THEFT, FRAUD AND POSSESSION OF STOLEN PROPERTY A GUIDE TO THE LAW IN ALBERTA REGARDING OF EDMONTON COPYRIGHT AND DISCLAIMER

Glossary of Terms Acquittal Affidavit Allegation Appeal Arraignment Arrest Warrant Assistant District Attorney General Attachment Bail Bailiff Bench

Did the Punishment Fit the Crime?

The Shawshank Redemption. In The Shawshank Redemption, our main character is Andy Dufresne who has just been

CRIMINAL DEFENSE FAQ. QUESTION: Am I required to allow law enforcement be allowed to search my house or my car?

FREQUENTLY ASKED QUESTIONS ABOUT THE SECOND CHANCE ACT (SCA)

Juvenile Court Mock Trial

Hacker Perspectives. Advanced Computer Networks SS 2007 Franz Sommerauer. ACN SS 07 - Hacker Perspectives

Security Culture: to learn MORE

Tax Return Preparer Fraud

Criminal Law Lesson #3: Theories of Crime and Punishment Justifications for Punishment and Plea Bargaining/Negotiation Exercise

Of Mice and Men Unit Test Matching: **Please match the description of the character to each character below. Please use all capital letters!

SPECIALIST 24 HR CRIMINAL DEFENCE

a threat made in school

Cis1 Chapter 15 Computer Crime and Ethics

Bail in Rape Cases. CONFERENCE ROOM 3 o clock. I need to take this phone call. I will return in a few minutes. AT THE SAME TIME...

United States Attorney Robert E. O Neill Middle District of Florida

2012 Bulletin 23 Would Your Staff Spot these Frauds?

Morgan County Prosecuting Attorney Debra MH McLaughlin

CONSTITUTIONAL RIGHTS

HELP AVAILABLE TO VICTIMS OF CRIME IN PENNSYLVANIA

Orders of Protection

101 IELTS Speaking Part Two Topic cards about sports, hobbies and free time A- Z

An Introduction to the Federal Public Defender=s Office and the Federal Court System

תילגנאב תורגבה תניחב ןורתפ

Information for Crime Victims and Witnesses

High School Law Project This program is funded by the Law Foundation of Ontario. Youth Criminal Justice Act. Table of Contents

Viruses, Worms, and Trojan Horses

RULES OF SUPREME COURT OF VIRGINIA PART THREE A CRIMINAL PRACTICE AND PROCEDURE APPENDIX

Petty Theft, Grand Theft, Robbery, Burglary Petty Theft

ALTERNATIVES TO INCARCERATION IN A NUTSHELL

Making a Victim Personal Statement. You have a voice in the criminal justice system and have a right to explain how the crime has affected you

What you don t know can hurt you.

An edited version of this article was published in the London Review of Books 37 (10), 21 May 2015, p.38 (

English as a Second Language Podcast ESL Podcast 292 Business Insurance

smartest guys in the room or would it depend on the room? shutting down power plants and next generation ideas (on- demand with blockbuster) was

JUVENILE COMPETENCY HANDBOOK

Courtroom Terminology

YOU AND THE JUVENILE JUSTICE SYSTEM A GUIDE FOR YOUTHS, PARENTS AND VICTIMS

Reading On The Move. What s The Story? Elements of Fiction: Plot

Restitution Basics for Victims of Crimes by Adults

SOCIAL STUDIES 11 CANADA S LEGAL SYSTEM CH. 11

MONROE COUNTY PUBLIC DEFENDER MONROE COUNTY COURTHOUSE 610 MONROE STREET, SUITE 21 STROUDSBURG, PENNSYLVANIA 18360

CyberbullyNOT Student Guide to Cyberbullying

VICTIM IMPACT STATEMENT WHAT IS A VICTIM IMPACT STATEMENT AND HOW IS IT USED? SUGGESTIONS FOR COMPLETING YOUR VICTIM IMPACT STATEMENT

Contents TWENTY-ONE TRUE CASES OF TEEN CRIME

The Pillars of the Earth

Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions:

SERIAL RAPE: OFFENDER PROFILING

2014 Chelsea s Law Impact Report A 12-Month Review of San Diego, Los Angeles, Orange, Riverside, and Sacramento Counties

Catch Me If You Can is a movie based on a true story about a man named

JUVENILES AND THE LAW

Ethical Hacking

Community Legal Information Association of PEI. Prince Edward Island, Inc.

Posting Bail. First Court Appearance

INTRODUCTION TO CRIMINAL PSYCHOLOGY

Maricopa County Attorney s Office Adult Criminal Case Process


Running head: A CLOSER LOOK AT ETHICAL HACKING AND HACKERS

Glossary of Court-related Terms

INTEGRATED SKILLS TEACHER S NOTES

Chapter 3. Justice Process at the County Level. Brooks County Courthouse

AN OVERVIEW OF THE JUVENILE JUSTICE SYSTEM

IS IT A SIN TO GAMBLE? Colossians 3:1-7

Youth and the Law. Presented by The Crime Prevention Unit

The HIDDEN COST Of Proving Your Innocence

NON-PRECEDENTIAL DECISION - SEE SUPERIOR COURT I.O.P Appellant No. 193 MDA 2014

CITIZENS AND BUSINESSES OF ST. CHARLES COUNTY:

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy

Sophia s War: a Tale of the Revolution Teaching Guide

OFFICE OF THE UNITED STATES ATTORNEY SOUTHERN DISTRICT OF CALIFORNIA San Diego, California. United States Attorney Laura E. Duffy

JUVENILE JUSTICE SYSTEM

AIRPORT CONSTRUCTION FRAUD and CORRUPTION INVESTIGATION at the Reading Pennsylvania Regional Airport-RDG

Criminal Justice System Commonly Used Terms & Definitions

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Maggie Romaniello SL Field Area Manger

7. MY RIGHTS IN DEALING WITH CRIMINAL LAW AND THE GARDAÍ

How To Understand The Legal System

GETTING TO KNOW THE CRIMINAL JUSTICE SYSTEM

U.S. Department of Justice

What can I expect when facing a court martial?

Hacking: Information Gathering and Countermeasures

Tax Planning Within The Law Not Enough For Some

Chapter 15 Criminal Law and Procedures

Student Fraud Project: Forensic Analysis of Personal and Corporate Bank Statements

Sexual Assault & The Juvenile Court Process A Guide for Victims/Survivors & Their Families

To convince my audience by proposition of policy that juveniles who commit murder should be tried as adults.

STATE OF MICHIGAN DEPARTMENT OF CONSUMER AND INDUSTRY SERVICES BUREAU OF HEARINGS

Transcription:

Running head: INFORMATION TECHNOLOGY, SECURITY AND ETHICS 1 Kevin Mitnick: How His Story Affected Information Technology, Security and Ethics Robert Olson The College of St. Scholastica

INFORMATION TECHNOLOGY, SECURITY AND ETHICS 2 Abstract Kevin Mitnick was one of the first people to hack into computer systems thus forcing information technology to create new security rules and regulations. How Kevin Mitnick had a more lasting impression is on the ethics surrounding information technology. The story of Kevin Mitnick explains how these changes came about. Keywords: Kevin Mitnick, information technology, security, ethics

INFORMATION TECHNOLOGY, SECURITY AND ETHICS 3 Kevin Mitnick: How His Story Affected Information Technology, Security and Ethics Kevin Mitnick could have been my friend except for the facts that he is slightly older than I am, grew up in California, and was interested in breaking the law. Mitnick started out as a phone phreak, or someone who could take over a telephone company s digital central office and play pranks through the phone. He was first arrested in 1981 for breaking into Pacific Bell Telephone Company and stealing technical manuals. He then moved up to breaking into a Pentagon computer and the military s NORAD air-defense computers and spent his first stint in jail for six months in a juvenile prison in 1983. In 1989, he illegally downloaded source code from Digital Equipment Corporation and this is where rumors started saying that he was capable of launching nuclear missiles simply by whistling into a telephone. Because of the fear of his power, he spent one year in federal custody, eight months of which were in solitary confinement so he could not have the opportunity to whistle into a phone. After being released, he also spent six months in a halfway house for his addiction. He was to then have three years of supervised release, but he violated this probation and went underground in 1992. (Freeman et al., 2008) During the next three years, Mitnick broke into many large companies computer security systems and stole software, product plans, and other data. These companies included Motorola, Sun Microsystems, Nokia, and Novell. According to prosecutors, these cost the companies $80 million in damages. He was listed on the FBI s most wanted list. Finally on February 15, 1995, he was captured at his hideout in Raleigh, North Carolina. He was held without bail for five years and again spent eight months in solitary confinement. He was not allowed to use a radio, telephone or even the electric typewriter in the prison library. In March 1999, Mitnick pleaded guilty to wire and computer fraud costing he feels $5 to $10 million in damages. He was sentenced to another ten months in prison and had to pay $4000 in restitution. He was released

INFORMATION TECHNOLOGY, SECURITY AND ETHICS 4 on January 21, 2000, and was on parole for three years during which he was not allowed to even touch a computer, use a cellular or cordless telephone without permission from his probation officer, or write, speak or profit from his experiences. These terms have since been relaxed so he can write, lecture, and consult. (Freeman et al., 2008; Huang & Wu, 2005) This sordid tale has inspired the movie War Games, and Mitnick is the subject in the movie Takedown. Three books have also been written including Takedown: The Pursuit and Capture of Kevin Mitnick, America s Most Wanted Computer Outlaw By the Man Who Did It by Tsutomo Shimomura and John Markoff, The Fugitive Game by Jonathan Littman, and The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick himself. Mitnick has also made a guest appearance on the TV show Alias and was interviewed on Sixty Minutes. (Accadi, 2002; Flynn, 2002; Freeman et al., 2008; Meyer, 1995) This all begs the questions as to what does Kevin Mitnick have to do with IT security and ethics, why was everyone enamored with his story, and would you want him to work for you? First, Mitnick in his own words says, Hacking is a skill set how you use it is up to your ethics and morals (Huang & Wu, 2005, p. 21). Mitnick used his abilities to the detriment of society and was punished for that; he now is using his abilities to help against hackers. Next, why was Mitnick so popular? No one disagrees with the fact that he was very good at what he did and he was breaking the law meaning that he was breaking and entering and stealing. That being said, hacking is a different kind of crime in that what is being broken into is not a physical place and what is being stolen still exists at the place from which it was taken thus leaving an air of ambiguity as to what was actually stolen and how or if it is being used. According to Meyer (1995), Mitnick claims that he hacked to gain information and power rather than for money and malice. Does this make the crime any less? Did Mitnick receive an unusually

INFORMATION TECHNOLOGY, SECURITY AND ETHICS 5 harsh punishment due to the hype that surrounded his alleged abilities? In one article, it says that people are fascinated with the Robin Hood type drama as long as no one is injured, there is an element of cleverness and originality in the crime, and the victims are wealthy individuals, pompous politicians or large, impersonal corporations (Freeman et al., 2008, p. 5). This describes Mitnick and his hacking activities to a tea and explains his notoriety. Finally, Mitnick is currently a highly sought after consultant for companies and governments where he tests their security systems. Hacking is still a very common crime. One test Mitnick conducted in 2009 recorded 1,300 attacks per hour on machines without an active firewall. He believes that Computer systems are complex. There will always be ways to break in leaving the authors Huang and Wu to comment, Which means that no matter which side he is on let s hope it s ours Mitnick will always be in demand (2005, p. 21). Would I want to hire him as a security consultant for my company? I am of two minds on this. While I believe his skills would be useful, I am not sure that I trust his new found morality. Letting him in to know the secrets of my company would require a level of confidence that might be too high. That being said, I believe he could break into my company anyway if he wanted to so that issue is moot. Hiring someone like Kevin Mitnick, who knows the backdoors, would be helpful to point the loopholes in the security system. Hopefully he will continue to use his skills to aid in the fight against hackers and support security systems to the betterment of society.

INFORMATION TECHNOLOGY, SECURITY AND ETHICS 6 References Accadi, J. (2002). The art of deception (book). Library Journal, 127(13), 128. doi:10/789651sdf1898156575657 Flynn, M. K. (2002). It takes a hacker. PC Magazine, 21(18), 26. Retrieved from www.pcmag.com/ Freeman, E. H., Johnson, R., Anderson, P. Q., Smith, E., Quele, I. G., Reele, B., Yellow, O. (2008). The legend and legacy of Kevin Mitnick. Information Systems Security, 10(2), 5-9. doi:98129872621//droks21981 Huang, G. T., & Wu, A. (2005). The talented Mr. Mitnick. Technology Review, 108(3), 21. doi:107832/fds12699512 Meyer, M. (1995). Is this hacker evil or merely misunderstood? Newsweek, 126(23), 60. Retrieved from www.newsweek.com/