Ghost
in the Wires
Ghost in the Wires
entails Kevin
Mitnick ’s story and his struggle
with law enforcement agents. The book reflects on successive events of the
early 1990s when Kevin was on the run.
He was regarded as a menace to the society. As such, the government employed
security professionals and investigative agents to track him down. At the time,
the media sought out individuals that had an angle on the planet’s most
dangerous computer hacker.
Ghost in the Wires
is a personal account on Kevin
Mitnick ’s lifestyle as a criminal
hacker. In the early chapters, he clarifies that multiple accounts of his
‘invincible’ character were mostly mythical. Therefore, the successive chapters
are dedicated to distinguishing facts from myths and setting records straight
on the author’s true identity. The
shrugs off his responsibility for Christy McNichol ’s
phone disconnection. In addition, he disowns his ability to whistle into a
phone to launch NORAD missiles (Mitnick et al., 2012). He expressed his
dissatisfaction that the later myth resulted in his year-long solitary
confinement. In fact, in the second chapter, he speculates that the federal
prosecutor borrowed the idea of War Games
movie. The validity of this accusation is still open for discussion.
Chapter
5
In
chapter 5, the author is convinced that nobody had an in-depth understanding of
who he really was. Mitnick claims that if left on his own, he pose no threat to
the society. His main aim was to gain an access into corporate sites and to
download code. Thereafter, he played with the downloaded information before
proceeding to the next target. While it
is true that Kevin
Mitnick committed crimes, FBI’s
obsession with him cannot be justified. It is perplexing to note that the
bureau singled him out as a top priority and most wanted criminal.
Chapter 7 and 9
The author's profession as a social engineer
lacking adequate technical skills is one of the most pronounced myth
reverberating even in the modern times. It is undeniable that Mitnick's social
engineering gift aided his ability to extract data from unsuspecting targets.
Chapter 7, 9, and others in the book clarify that indeed, Mitnick possessed
deep technical experience and skills necessary in the execution of
illicitly-obtained information (Mitnick et al., 2012).
Rough
Start
The
first chapter titled Rough Start entails
the Author’s early days as he grew up in the Los Angeles .
The book is mostly about the human side of the writer though it is
dotted with multiple sections of technical details. Kevin Mitnick
was a hyperactive child brought up single-handedly by his mother. Her
boyfriends abused him. In fact, he narrates an extreme case when his mother’s
lover who was a law enforcement officer molested him. Therefore, the evil deeds
prompted him to search for a solace behind a keyboard.
Chapter
11
Mitnick
narrates how his initial hack earned him an access to the dumpster diving
systems. His plan was to manipulate bus transfers to enable him to ride around Los Angeles . The idea was
a pass-time. In chapter 11 and 13, he lamented subjecting pain to his grandmother,
aunt, mother, and wife.
The
author admits on several occasions that he has bad luck. In chapter 15, he
expounded his problems in coordinating with probation officers and attribution
of mysterious technological failures to him. In one instance, he bore a burden
of being a mastermind behind the probation officer’s dead phone. In reality, Kevin Mitnick
the world was unaware of how to handle or what to do with him. The writer's
accounts in subsequent chapters clarify that he had no intention of making
financial gains through hacking. He set his eyes on gaining root access and
nothing more. This notion perplexed Ivan Boesky
(whom he met while serving time in prison) and the law enforcement agents.
Chapter
31
Chapter
31details how Mitnick’s dreams were overturned as myth took hold after a
release of 1994 New York Times article “Hacker Eludes FBI Pursuit.” He writes
that this article not only propelled his invincibility into overdrive but also,
it embarrassed the FBI. Furthermore, it incubated a fictional image to later
influence judges in his treatment as a national security threat.
Chapter
35
In
chapter 35s Game Over, the book
expounds on the turn of events during Mitnick’s capture. Kent Walker —an
assistant US Attorney—arranged for a provision of trap-and-trace confidential
information to Shimomura from Kevin ’s
FBI file. The strategy enabled Shimomura to monitor Mitnick’s activities
illegally. The author reveals that he was never charged with gaining
unauthorized entry to Shimomura because it would expose FBI’s misconduct.
Ghost in the Wires is a book about
Mitnick’s redemption. He acknowledges that he was a wrongdoer and has already
paid his dues. His current mission is to open a new chapter in life. His
inability to downplay guilt or make excuses is admirable. The last pages of the book outline his
release (Mitnick et al., 2012). At the same time, the book is hailed for
providing the reader with an interesting story of recognizable information
security professionals. The flow of information and succession of vital events
in the author’s life culminates an interesting account of the most publicized
IT personality in the early 1990s.
No comments:
Post a Comment