Ghost in the Wires : My Adventures As the World's Most Wanted Hacker
by Mitnick, Kevin; Simon, William L. (CON); Wozniak, Steve (FRW)







Forewordix
Steve Wozniak
Prologuexi
PART ONE The Making of a Hacker
1 Rough Start
3(4)
2 Just Visiting
7(13)
3 Original Sin
20(14)
4 Escape Artist
34(10)
5 All Your Phone Lines Belong to Me
44(9)
6 Will Hack for Love
53(9)
7 Hitched in Haste
62(10)
8 Lex Luthor
72(22)
9 The Kevin Mitnick Discount Plan
94(8)
10 Mystery Hacker
102(9)
PART TWO Eric
11 Foul Play
111(5)
12 You Can Never Hide
116(10)
13 The Wiretapper
126(5)
14 You Tap Me, I Tap You
131(12)
15 "How the Fuck Did You Get That?"
143(6)
16 Crashing Eric's Private Party
149(4)
17 Pulling Back the Curtain
153(10)
18 Traffic Analysis
163(6)
19 Revelations
169(5)
20 Reverse Sting
174(5)
21 Cat and Mouse
179(8)
22 Detective Work
187(11)
23 Raided
198(8)
24 Vanishing Act
206(11)
PART THREE On the Run
25 Harry Houdini
217(9)
26 Private Investigator
226(11)
27 Here Comes the Sun
237(12)
28 Trophy Hunter
249(15)
29 Departure
264(16)
30 Blindsided
280(9)
31 Eyes in the Sky
289(17)
32 Sleepless in Seattle
306(17)
PART FOUR An End and a Beginning
33 Hacking the Samurai
323(8)
34 Hiding in the Bible Belt
331(16)
35 Game Over
347(7)
36 An FBI Valentine
354(8)
37 Winning the Scapegoat Sweepstakes
362(22)
38 Aftermath: A Reversal of Fortune
384(11)
Acknowledgments395(8)
Index403


The world's most famous former computer hacker, now a security consultant, describes his life on the run from the FBI creating fake identities, finding jobs at a law firm and a hospital, and keeping tabs on his pursuers.





Kevin Mitnick, the world's most famous (former) computer hacker, has been the subject of countless news and magazine articles, the idol of thousands of would-be hackers, and a one-time "most wanted" criminal of cyberspace, on the run from the bewildered Feds. Now a security consultant, he has spoken to audiences at conventions around the world, been on dozens of major national TV and radio shows, and even testified in front of Congress. He is the author ofThe Art of Deception and The Art of Intrusion.

Co-author William Simon is a bestselling co-author of numerous books, including iCon (the biography of Steve Jobs) and Kevin Mitnick's previous two books. He has also written forUSA Today and The Washington Post and been interviewed on CNBC, CNN, NPR and byThe New York Times, The Wall Street Journal, BusinessWeek,Time, Newsweek, and many other publications.





*Starred Review* Mitnick was at one time the most wanted computer hacker in the country, perhaps the world. It was claimed that he could launch U.S. nuclear missiles simply by whistling into a phone. This was, of course, utter fabrication. In reality he was just a kid with a powerful curiosity and an innate knack for "social engineering" (or conning individuals into giving up deep secrets). Although he made free, untraceable phone calls at will, hacked his way into almost every major software company, and stole vast amounts of proprietary code, he never made monetary gain on any of it. His story reads like those of Frank Abagnale Jr. (Catch Me If You Can, 1980) and Steven Jay Russell (Steve McVicker's I Love You Phillip Morris, 2003), both con men and impostors who assumed multiple personalities. But Mitnick's has a high-tech twist. He impersonated high-level phone company and computer field specialists simply to satisfy his addiction to hacking. He reveals in minute detail how he obtained some of the most closely guarded secrets of the computer industry, how he eluded the F.B.I. for years by living complete lives under false identities, and how one corporate IT security manager ultimately beat him at his own game. Copyright 2011 Booklist Reviews.





A legendary hacker recalls his escapades and life on the run from the FBI.

Mitnick (The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers, 2005, etc.), who now works as a computer-security consultant, spent nearly five years in a federal prison for computer crimes. With the lifting of a court ban that prohibited him from writing about his exploits, he offers a whirlwind account of his thrill-seeking adventures stealing source code and other sensitive data from phone and computer companies while leading the FBI and other federal authorities on a cross-country chase that ended with his arrest in 1995. Now in his late 40s, Mitnick grew up in California and developed an early fascination for pranks, deception and technology. At age 17, he was arrested for stealing phone-company manuals. At 23, he writes, his hacking gave him control over phone systems in much of the United States. One judge, in denying bail, said Mitnick posed a threat to the community when "armed with a keyboard." In fact, his strongest suit was his ability to manipulate people; he learned the inside lingo of bureaucrats, won their trust and gained access to information. "People are just too trusting," writes the reformed con man. The author delights in recounting his celebrated hacks of Sun Microsystems and other corporations; his outwitting of FBI pursuers; his elaborate methods of creating new identities; and his obsessive search for still edgier challenges. "Hacking was my entertainment," he writes. He never gained financially from his "trophies" (source codes, passwords, credit-card and social-security numbers, etc.), but gathered them "purely for the thrill." His breezy, in-your-face, anti-establishment narrative will please many readers, but some may find the author's self-important attitude grating.

A lucid, brightly written tale for both techies and lay readers.

Copyright Kirkus 2011 Kirkus/BPI Communications.All rights reserved.






Terms of Use   ©Copyright 2018 Follett School Solutions