February 17, 2019

Imet Kevin Mitnick for the first time in , during the filming of a Discovery Channel Kevin put me in touch with the agent who books his speeches. She. Kevin Mitnick, the world’s most wanted computer hacker, managed to hack into some of the country’s most powerful – and seemingly impenetrable – agencies. The world’s most famous hacker discusses his new book, his exploits, his imprisonment and his success. Meet the Ghost in the Wires, Kevin.

Author: Golkree Sagore
Country: Spain
Language: English (Spanish)
Genre: Personal Growth
Published (Last): 17 December 2006
Pages: 259
PDF File Size: 5.7 Mb
ePub File Size: 15.36 Mb
ISBN: 841-6-19980-490-4
Downloads: 76520
Price: Free* [*Free Regsitration Required]
Uploader: Mazugar

The cost must have been overwhelming. Jul 22, Elena Johansen rated it did not like it Shelves: I wanted to know how things worked, especially operating systems.

There are inn main problems with this book: Almost all online purchase fraud at the time was due to simple mail theft. In the end his ego, and his inability to stop breaking into computer systems proves to be his downfall.

Kevin Mitnick – IMDb

Mitnick repeatedly asserts that he wasn’t interested in committing any kind of criminal act so much as he enjoyed the thrill of seeing if he could do something and how it could be done. Dec 18, LeeAnne rated it it was ok Shelves: Many people here and elsewhere have remarked on the unintentional hilarity which is caused when Mitnick takes information he gains by betraying the trust of others and then shares it with like-minded individuals who — can you guess? I regret the fact that a portion of the cover price has gone to Mitnick as a royalty.

I could probably go on, but I think my opinion of this book and its author are pretty clear. Even when he crossed the line and his crimes delved into federal territory, he kept at it. Techies will appreciate the relative simplicity of the incredible hacks that Mitnick managed to pull off, while non-techies will gape in astonishment at the achievements and audacity wjres these hacks involved—and are also given quick, but understandable explanations of technical jargon whenever necessary which is actually not often, as this isn’t a technical manual.


But you really want to see how he gets away with the next hack, the next escape, the next confidence-gaming of some poor sap whose only fault is the impulse to be kind to strangers. No matter how hard he tries to give it up, he returns to it.

It would have made a great work of fiction, if only. Mitnick went on to say that part of his sentence was a gag order that prevented his specifically discussing his crimes and life as a hacker for the Year ago before Tech TV morphed into G4 and we were treated to endless repeats of Cops wirres CheatersI happened to tune in one afternoon to see an interview with notorious hacker Kevin Mitnick.

Ghost in the Wires: The Kevin Mitnick Interview

It relies heavily on knowledge of your targets security procedures and vulnerabilities. Now people hire me to do the same things I went to prison for, but in a legal and beneficial way. But, it’s not a normal passion, it’s an all-consuming passion that seeps from every pore of their being.

The ignorance of the law enforcement and judicial officials involved in this case is staggering. Mitnick’s ego and lingering resentments sometimes get in the way and the story also gets dry oevin repetitive at points. People who write malicious code want the greatest return on their investment, so they target Windows systems.

He repeats this so often, in fact, that it begins to feel like a case of “the lady doth protest too much. You can answer the questions by reading the book.

It may be interesting to those with a detailed knowledge of these things, but what I found more compelling was the human story Mitnick tells. Ghost in the Wires is that sweet spot of books about technology. The Art of Intrusion. As Mitnick points out several times in his own story, his escapades are remarkable enough without ghosy crazy rumors that grew around his legend over the years.

Book Review: Ghost in The Wires – Kevin Mitnick

Often time people are the weakest link in computer security. Needless to say, he’s a bit of a computer geek. The Art of Deception. Hacker steals 10 years worth of data from San Diego school district Officials said the hacker made off with the personal information of overstudent and staff.


It definitely makes me want to attend one of his talks. I will leave whatever social sickness the brilliant Kevin Mitnick has to the mental health professionals, but suffice it to say that his writing in Ghost in the Wires is a terrific nonfiction example of an “unreliable narrator.

This was the first book wlres read cover to cover since finishing law school so I did feel somewhat obligated to hgost it up. His purported love and concern never stop him from involving them in his various schemes to evade and outwit law enforcement. Virtualization Workspot ushers in the age of VDI 2.

He may not think so, but considering the fear he elicited in those pursuing and wies him, he was incredibly lucky to come away like he did, and now to have a successful business where people pay him to do the kinds of things he went to jail for.

That is nonsense and am glad that it never came up in his proceedings. There’s a lot of myth and false information about me out there.

Book Review: Ghost in The Wires – Kevin Mitnick

The book is very much a public service because it provides specific, well documented detail on the lengths to which law enforcement officials will go to frame someone, essentially, and put them in jail simply because they want, “feel” or “believe” they belong there, even when there is no evidence.

Once the actual novel started, there wasn’t another paragraph nearly as interesting as the prologue. Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.