Home > Computing > Q&A: The notorious Kevin Mitnick on hacking…

Q&A: The notorious Kevin Mitnick on hacking, ethics, and the future of tech


Today, Kevin Mitnick is a security expert who infiltrates his clients’ companies to expose their weaknesses. He’s also the author of several books, including Ghost in the Wires. But he’s most known as the hacker who eluded the FBI for years, and was eventually imprisoned for his ways. We had a chance to talk to him about his time in solitary confinement, hacking McDonald’s, and what he thinks about Anonymous.

Digital Trends: When did you first become interested in hacking?

Kevin Mitnick: Actually what started me in hacking was this hobby I had call phone phreaking. When I was a junior in high school I was fascinated with magic, and I met this other student who was able to do magic with a telephone. He could do all these tricks: I could call in on a number he told me and he’d call on another, and we’d be joined together, and this is called a loop-around. It was a phone company test circuit. He showed me he had this secret number at the phone company, he could dial a number, and it’d give a weird tone, and then put in a five digit code and he could call anywhere for free.

He had secret numbers in the phone company where he could call and he didn’t have to identify himself, what would happen is if he had a phone number, he could find the name and address of that number even if it was unpublished. He could break through call forwarding. He could do magic with the phone, and I became really fascinated with the phone company. And I was a prankster. I loved pranks. My foot in the door into hacking was pulling pranks on friends.

One of my first pranks was I would change my friends’ home phone to a pay phone. So whenever he or his parents’ tried to make a call it would say “please deposit a quarter.”

So my entry into hacking was my fascination with the phone company and wanting to pull pranks.

DT: Where did you get the technical knowledge to start pulling these things off?

KM: I was interested in technology myself, and he wouldn’t actually tell me how he did things. Sometimes I would overhear what he was doing, and I knew he was using social engineering, but he was like the magician who did the tricks but wouldn’t tell me how they were done, so I would have to work it out myself.

Prior to meeting this guy, I was already an amateur radio operator. I passed my HAM radio test when I was 13, and I was already into electronics and radio so I had that technical background.

This was back in the 70s, and I couldn’t get a C.B. license because you had to be 18 years old, and I was 11 or 12. So I met this bus driver when I was riding the bus one day, and this driver introduced me to HAM radio. He showed me how he could make phone calls using his handheld radio, which I thought was super cool because it was before cell phones and I thought “Wow this is so cool, I have to learn about it.” I picked up some books, took some courses, and at 13 passed the exam.

Then I learned about phones. After that, another student in high school introduced me to the computer instructor to take a computer class. At first the instructor wouldn’t let me in because I didn’t meet the prerequisites, and then I showed him all the tricks I could do with the telephone, and he was thoroughly impressed and allowed me into the class.

DT: Do you have a favorite hack, or one that you were particularly proud of?

KM: The hack I’m most attached to was hacking McDonald’s. What I worked out — you remember I had my HAM radio license — I could take over the drive-up windows. I would sit across the street and take them over. You can imagine at 16, 17 years old, what fun you could have. So the person in McDonald’s could hear everything going on, but they couldn’t overpower me, I would overpower them.

Customers would drive up and I would take their order and say “Okay, you’re the 50th customer today, your order is free please drive forward.” Or cops would come up and sometimes I’d say “I’m sorry sir we don’t have any donuts for you today, and for police officers we only serve Dunkin Donuts.” Either that or I’d go, “Hide the cocaine! Hide the cocaine!”

It got to the point where the manager would come out into the parking lot, look at the lot, look in the cars, and of course no one’s around. So he’d go up to the drive-up speaker and actually look inside like there was a man hidden inside, and then I’d go “What the hell are you looking at!”

DT: Will you talk a little about the difference between social engineering your way into a network and actually hacking into one?

KM: The truth of the matter is most hacks are hybrid. You could get into a network through network exploitation – you know, finding a pure technical way. You could do it through manipulating people who have access to computers, to reveal information or to do an “action item” like open a PDF file. Or you can gain physical access to where their computers or servers are and do it this way. But it’s not really one or the other, it’s really based on the target and the situation, and that’s where the hacker decides which skill to use, which avenue they’re going to use to breach the system.

Now today, social engineering is a substantial threat because RSA [Security] and Google were hacked, and these were through a technique called spear phishing. With the RSA attacks, which were substantial because the attackers stole the token seeds which defense contractors used for authentication, the hackers booby-trapped an Excel document with a Flash object. They found a target within RSA that would have access to information they wanted, and sent this booby-trapped document to the victim, and when they opened the Excel document (which was probably sent from what looked like a legitimate source, a customer, business partner) it invisibly exploited a vulnerability within Adobe Flash and the hacker then had access to this employee’s workstation and RSA’s internal network.

Spear phishing uses two components: Social networking to get the person to open up the Excel doc, and the second part is the technical exploitation of a bug or security flaw in Adobe that gave the attacker full control of the computer. And that’s how it works in the real world. You don’t just call somebody up on the phone and ask for a password; attacks are usually hybrid and combine technical and social engineering.

In Ghost in the Wires, I describe how I used both techniques.

DT: Part of the reason you wrote Ghost in the Wires was to address some of the fabrications about yourself.

ghost-in-the-wiresKM: Oh yeah, there were three books written about me, there was a motion picture called Take Down which I ended up settling a lawsuit out of court over, and they agreed to script changes and it never was theatrically released in the United States. I had a New York Times reporter who wrote a story that I hacked into NORAD in 1983 and nearly started WWIII or something ridiculous like this — stated it as fact, which was a completely unsourced allegation.

There’s a lot of stuff out there in the public eye that was just simply not true, and a lot of stuff that people really didn’t know. And I thought it was important to get my book to really tell my story and basically set the record straight. I also thought my story was like Catch Me if You Can, I had a two-decade-long cat and mouse game with the FBI. And I wasn’t out to make money. In fact, when I was on the run I worked 9-to-5 jobs to support myself and was hacking at night. I had the skills that if I wanted to, I could have stolen credit card details and bank account information, but my moral compass wouldn’t let me do that. And my primary reason for hacking was really the challenge: Like climbing Mt. Everest. But the primary reason was my pursuit of knowledge. As a kid interested in magic and HAM radio, I loved taking things apart and finding out how they worked. In my day there were no avenues to learned hacking ethically, it was a different world.

Even when I was in high school, I felt encouraged to hack. One of my first assignments was to write a program to find the first 100 Gnocchi numbers. Instead I wrote a program that could capture peoples’ passwords. And I worked so hard on this because I thought it was cool and fun, so I didn’t have time to do the actual assignment and turned this one in instead – and I got an A and a lot of “Atta boys.” I started in a different world.

DT: And you were even landed in solitary confinement while you were in prison because of things people thought you were able to do.

KM: Oh yeah, yeah. Years ago back in the mid 80s I hacked into a company called Digital Equipment Corporation, and what I was interested in was my long-term goal of becoming the best hacker possible. I had no goal except to get into the system. What I did was that I made a regrettable decision, and decided to go after the source code, which is like the secret recipe to Orange Julius for the VMS operating system, a very popular operating system back in the day.

So I basically took a copy of the source code and a friend of mine informed on me. When I ended up in court after the FBI arrested me, a federal prosecutor had told a judge that not only do we have to detain Mr. Mitnick as a national security threat, we have to make sure he can’t get near a telephone, because he could simply pick up a payphone, connect to a modem at NORAD, whistle the launch code and possibly start a nuclear war. And as the prosecutor said this, I started laughing because I’d never heard of something so ridiculous in my life. But the judge, unbelievably, bought it hook line and sinker, and I ended up being held in a federal detention center in solitary confinement for nearly a year. You don’t get to associate with anybody, you’re locked into a small room probably the size of your bathroom and you’re just sitting in there in a concrete coffin. It was kind of like psychological torture, and I think the maximum time a person is supposed to be in solitary confinement is something like 19 days, and they held me there for a year. And it was based on a ridiculous notion that I could whistle the launch codes.

DT: And how long after that were you not allowed to use basic electronics, or at least those that could enable communication?

KM: Well what happened is I ended up getting into trouble a couple times after I was released. A couple years later, the FBI sent an informant who was a real and criminally oriented hacker – meaning someone who steals credit card information to steal money – to set me up. And I realized quickly what the informant was doing so I began doing counter-intelligence against the FBI and started hacking again. This story is really focused on in the book: how I was breaking the FBI’s operation against me and found out the agents who were working against me and their cell phone numbers. I took their numbers and programmed them into a device I had as an early warning system. If they came close to my physical location I would know about it. Eventually after this case was over in 1999, I had very stringent conditions. I couldn’t touch anything with a transistor in it without the permission of the government. They treated me like I was a MacGyver, give Kevin Mitnick a nine-volt battery and duct tape and he’s a danger to society.

I couldn’t use a fax machine, a cell phone, a computer, anything that had anything to do with communications. And then eventually after two years they relaxed those conditions because I was commission to write a book called The Art of Deception, and they secretly gave me permission to use a laptop as long as I didn’t tell the media and didn’t connect to the Internet.

DT: I’d assume this wasn’t just incredibly inconvenient but also personally difficult.

kevin_wantedKM: Yeah because imagine… I was arrested in 1995 and released in 2000. And in those five years the Internet went through a dramatic change, so in this time it was like I was Rip Van Wrinkle. I went to sleep and woke up and the world has changed. So it was kind of difficult to be forbidden to touch technology. And the government, I believe, just wanted to make it extremely hard on me, or they actually believed I was a national security threat. I really don’t know which one it is, but I got through it. Today I’m able to take all this background and my hacking career and now I get paid for doing it. Companies hire me from all around the world to break into their systems, to find their vulnerabilities so they can fix them before the real bad guys get in. I travel the world speaking about computer security and raise awareness about it, so I’m extremely lucky to be doing this today.

I think that people know about my case, and that I did break the law, but that I wasn’t out to do it for money or to harm anybody. I just had the skills. I had nothing to lose, I was on the run from the FBI, I could have taken money, but it was against my moral compass. I regret the actions that harmed others, but I don’t really regret the hacking because to me that was like a video game.

1 of 2