Imet Kevin Mitnick for the first time in , during the filming of a Discovery Channel Kevin put me in touch with the agent who books his speeches. She. Kevin Mitnick was the most elusive computer break-in artist in history. I know that many people love Ghost in the Wires, but this book really bothers me. Jim Nitterauer reviews master social engineer Kevin Mitnick’s book, Ghost in the Wires: My Adventures as the World’s Most Wanted.
|Published (Last):||17 April 2018|
|PDF File Size:||6.67 Mb|
|ePub File Size:||13.13 Mb|
|Price:||Free* [*Free Regsitration Required]|
It is much more difficult to create than it is to tear down, and instead of compromising these networks for “trophies,” one is left wondering what the incredibly talented Mitnick could have done if he had spent as much time and energy building systems instead wores breaking into and stealing information from them. At the time, Mitnick promoted his book The Art of Deception and discussion in general terms how he wasn’t necessarily a hacker so much as a social engineer.
There is just never a dull moment in the book. The book follows Mitnick as he starts his social-engineering career. In that aspect it’s fantastic.
Book Review: Ghost in The Wires – Kevin Mitnick
Some people may say it wasn’t the best written book, but somehow that didn’t even bother me. But since I’m still processing my affection for arrogant jerks that doesn’t really interfere with my enjoyment of his book. So, like a magician whose tricks are now common knowledge, Mitnick takes what pride he can in fact that he was the first to think up mean ways to trick people.
I’ve always been fascinated by the early days of computers and the internet, especially where computer cracking is involved. It does get it a bit wrong about how he was detected. Sep 21, Michael rated it it was amazing Shelves: Nov 09, Bookworm Smith rated it really liked it Shelves: All of his scams are fairly similar.
It’s breathtaking, really, the audacity of the impersonation he did. I’m soooo I had to read this book for school Cybercriminologyand opted to listen to it so I could get some school work done while commuting and going about my daily life.
I feel like I learnt something from reading this book and enjoyed being out of my comfort zone. If we lived in a society like that, everyday life might be less of a headache, with less two-step authentication and obligatory changing of passwords.
Kevin Mitnick – Wikipedia
We follow Mitnick through his experiences in Prison, his journey towards freedom and his current job of hack-proofing the security systems of some of the largest companies in America. Every big hack the FBI would suspect Mitnick. The true obsessive will try to justify and try to paint their activities in a positive light later in order to self-justify their sociopathic behavior. Page 1 of 1 Start over Page 1 of 1. It starts out with Kevin’s boyhood, which sounded pretty typical for a ‘tech-hall’ resident – learning the ins and outs of the telephone system to make free calls, modifying your HAM radio to jam the local McDonald’s drive thru speakers, driving your computer science teacher nuts by constantly breaking his passwords.
Or maybe it’s because he doesn’t seem to feel like what he did was all that wrong, and might self identify with the original definition. He talks at the end on how he’s brought in to speak on how to make organizations safer but he makes no reference to these recommendations. While on the run Mitnick takes great pains to steal and set up new identities in Las Vegas, Denver, Seattle, and Raleigh NC, but each time he goes back to his old hacking and cell phone tricks only to get discovered again and again.
No matter who you are, you will walk away from this book marveling at the extent of Mitnick’s escapades to give just one example: I just wanted to smack the guy. Mitnick went on to say that part of his sentence was a gag order that prevented his specifically discussing his crimes and life as a hacker for the next decade or so, but he promised that we’d eventually get a book detailing his early days. As Mitnick points out several times in his own story, his escapades are remarkable enough without the crazy rumors that grew around his legend over the years.
Average guy gets around “The Man” first as a “phone phreaker,” then adding computer hacking to the mix for years before they finally hunt him down and throw him in jail. Oct 25, Stephany Wilkes rated it really liked it. You keep using that word, I do not think it means what bopk think it means.
Takedown gave me the sense of a Hollywood-movie script, all blown up to make it more exciting, even before I read more on the real facts yes, it was obvious. Mitnick claims that was the equivalent of stealing a can of coke and having the company sue you for stealing the recipe.
I’m still a few pages from the end of thf, but I’ve been writing this review in my head for a couple of days now. I hack, You betray, He accelerates the collapse of society.
Mitnick served five years in prison—four and a half years pre-trial and eight months in solitary confinement —because, according to Mitnick, law enforcement officials ib a judge that he had the ability to “start a nuclear war by whistling into a pay phone”,  meaning that law enforcement told the judge that he could somehow dial into the NORAD modem via a payphone from prison and communicate with the modem by whistling to launch nuclear missiles.
More specifically, most of his hacking was phone “phreaking,” where he cons the phone company into giving him free long distance in various ways. Oct 16, Day rated it did not like it Shelves: This book is well written, entertaining, and nicely paced.