Tuesday 10 May 2016

Ghost in the Wires

Ghost in the Wires
Ghost in the Wires entails Kevin Mitnick’s story and his struggle with law enforcement agents. The book reflects on successive events of the early 1990s when Kevin was on the run. He was regarded as a menace to the society. As such, the government employed security professionals and investigative agents to track him down. At the time, the media sought out individuals that had an angle on the planet’s most dangerous computer hacker.
Ghost in the Wires is a personal account on Kevin Mitnick’s lifestyle as a criminal hacker. In the early chapters, he clarifies that multiple accounts of his ‘invincible’ character were mostly mythical. Therefore, the successive chapters are dedicated to distinguishing facts from myths and setting records straight on the author’s true identity.  The shrugs off his responsibility for Christy McNichol’s phone disconnection. In addition, he disowns his ability to whistle into a phone to launch NORAD missiles (Mitnick et al., 2012). He expressed his dissatisfaction that the later myth resulted in his year-long solitary confinement. In fact, in the second chapter, he speculates that the federal prosecutor borrowed the idea of War Games movie. The validity of this accusation is still open for discussion.
Chapter 5
In chapter 5, the author is convinced that nobody had an in-depth understanding of who he really was. Mitnick claims that if left on his own, he pose no threat to the society. His main aim was to gain an access into corporate sites and to download code. Thereafter, he played with the downloaded information before proceeding to the next target.  While it is true that Kevin Mitnick committed crimes, FBI’s obsession with him cannot be justified. It is perplexing to note that the bureau singled him out as a top priority and most wanted criminal.
Chapter 7 and 9
 The author's profession as a social engineer lacking adequate technical skills is one of the most pronounced myth reverberating even in the modern times. It is undeniable that Mitnick's social engineering gift aided his ability to extract data from unsuspecting targets. Chapter 7, 9, and others in the book clarify that indeed, Mitnick possessed deep technical experience and skills necessary in the execution of illicitly-obtained information (Mitnick et al., 2012).
Rough Start
The first chapter titled Rough Start entails the Author’s early days as he grew up in the Los Angeles.  The book is mostly about the human side of the writer though it is dotted with multiple sections of technical details. Kevin Mitnick was a hyperactive child brought up single-handedly by his mother. Her boyfriends abused him. In fact, he narrates an extreme case when his mother’s lover who was a law enforcement officer molested him. Therefore, the evil deeds prompted him to search for a solace behind a keyboard.
Chapter 11
Mitnick narrates how his initial hack earned him an access to the dumpster diving systems. His plan was to manipulate bus transfers to enable him to ride around Los Angeles. The idea was a pass-time. In chapter 11 and 13, he lamented subjecting pain to his grandmother, aunt, mother, and wife.
The author admits on several occasions that he has bad luck. In chapter 15, he expounded his problems in coordinating with probation officers and attribution of mysterious technological failures to him. In one instance, he bore a burden of being a mastermind behind the probation officer’s dead phone. In reality, Kevin Mitnick the world was unaware of how to handle or what to do with him. The writer's accounts in subsequent chapters clarify that he had no intention of making financial gains through hacking. He set his eyes on gaining root access and nothing more. This notion perplexed Ivan Boesky (whom he met while serving time in prison) and the law enforcement agents.
Chapter 31
Chapter 31details how Mitnick’s dreams were overturned as myth took hold after a release of 1994 New York Times article “Hacker Eludes FBI Pursuit.” He writes that this article not only propelled his invincibility into overdrive but also, it embarrassed the FBI. Furthermore, it incubated a fictional image to later influence judges in his treatment as a national security threat.
Chapter 35
In chapter 35s Game Over, the book expounds on the turn of events during Mitnick’s capture. Kent Walker—an assistant US Attorney—arranged for a provision of trap-and-trace confidential information to Shimomura from Kevin’s FBI file. The strategy enabled Shimomura to monitor Mitnick’s activities illegally. The author reveals that he was never charged with gaining unauthorized entry to Shimomura because it would expose FBI’s misconduct.

            Ghost in the Wires is a book about Mitnick’s redemption. He acknowledges that he was a wrongdoer and has already paid his dues. His current mission is to open a new chapter in life. His inability to downplay guilt or make excuses is admirable.  The last pages of the book outline his release (Mitnick et al., 2012). At the same time, the book is hailed for providing the reader with an interesting story of recognizable information security professionals. The flow of information and succession of vital events in the author’s life culminates an interesting account of the most publicized IT personality in the early 1990s.  

No comments:

Post a Comment