|Ghost in the Wires : My Adventures As the World's Most Wanted Hacker
|by Mitnick, Kevin; Simon, William L. (CON); Wozniak, Steve (FRW)
|PART ONE The Making of a Hacker|
|5 All Your Phone Lines Belong to Me||44||(9)|
|9 The Kevin Mitnick Discount Plan||94||(8)|
|15 "How the Fuck Did You Get That?"||143||(6)|
|16 Crashing Eric's Private Party||149||(4)|
|17 Pulling Back the Curtain||153||(10)|
|PART FOUR An End and a Beginning|
|34 Hiding in the Bible Belt||331||(16)|
|37 Winning the Scapegoat Sweepstakes||362||(22)|
|38 Aftermath: A Reversal of Fortune||384||(11)|
The world's most famous former computer hacker, now a security consultant, describes his life on the run from the FBI creating fake identities, finding jobs at a law firm and a hospital, and keeping tabs on his pursuers.
Kevin Mitnick, the world's most famous (former) computer hacker, has been the subject of countless news and magazine articles, the idol of thousands of would-be hackers, and a one-time "most wanted" criminal of cyberspace, on the run from the bewildered Feds. Now a security consultant, he has spoken to audiences at conventions around the world, been on dozens of major national TV and radio shows, and even testified in front of Congress. He is the author ofThe Art of Deception and The Art of Intrusion.
Co-author William Simon is a bestselling co-author of numerous books, including iCon (the biography of Steve Jobs) and Kevin Mitnick's previous two books. He has also written forUSA Today and The Washington Post and been interviewed on CNBC, CNN, NPR and byThe New York Times, The Wall Street Journal, BusinessWeek,Time, Newsweek, and many other publications.
*Starred Review* Mitnick was at one time the most wanted computer hacker in the country, perhaps the world. It was claimed that he could launch U.S. nuclear missiles simply by whistling into a phone. This was, of course, utter fabrication. In reality he was just a kid with a powerful curiosity and an innate knack for "social engineering" (or conning individuals into giving up deep secrets). Although he made free, untraceable phone calls at will, hacked his way into almost every major software company, and stole vast amounts of proprietary code, he never made monetary gain on any of it. His story reads like those of Frank Abagnale Jr. (Catch Me If You Can, 1980) and Steven Jay Russell (Steve McVicker's I Love You Phillip Morris, 2003), both con men and impostors who assumed multiple personalities. But Mitnick's has a high-tech twist. He impersonated high-level phone company and computer field specialists simply to satisfy his addiction to hacking. He reveals in minute detail how he obtained some of the most closely guarded secrets of the computer industry, how he eluded the F.B.I. for years by living complete lives under false identities, and how one corporate IT security manager ultimately beat him at his own game. Copyright 2011 Booklist Reviews.
A legendary hacker recalls his escapades and life on the run from the FBI.
Mitnick (The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers, 2005, etc.), who now works as a computer-security consultant, spent nearly five years in a federal prison for computer crimes. With the lifting of a court ban that prohibited him from writing about his exploits, he offers a whirlwind account of his thrill-seeking adventures stealing source code and other sensitive data from phone and computer companies while leading the FBI and other federal authorities on a cross-country chase that ended with his arrest in 1995. Now in his late 40s, Mitnick grew up in California and developed an early fascination for pranks, deception and technology. At age 17, he was arrested for stealing phone-company manuals. At 23, he writes, his hacking gave him control over phone systems in much of the United States. One judge, in denying bail, said Mitnick posed a threat to the community when "armed with a keyboard." In fact, his strongest suit was his ability to manipulate people; he learned the inside lingo of bureaucrats, won their trust and gained access to information. "People are just too trusting," writes the reformed con man. The author delights in recounting his celebrated hacks of Sun Microsystems and other corporations; his outwitting of FBI pursuers; his elaborate methods of creating new identities; and his obsessive search for still edgier challenges. "Hacking was my entertainment," he writes. He never gained financially from his "trophies" (source codes, passwords, credit-card and social-security numbers, etc.), but gathered them "purely for the thrill." His breezy, in-your-face, anti-establishment narrative will please many readers, but some may find the author's self-important attitude grating.
A lucid, brightly written tale for both techies and lay readers. Copyright Kirkus 2011 Kirkus/BPI Communications.All rights reserved.