#Mitnick

Top 10 Hacker Movies You’ve Missed

Who Am I? (2014)

Introduction

Yeah, I’m doing one of these.

I’m going to list and rank ten movies that feature hackers as major characters or hacking itself as a major plot point and discuss what makes them good or bad.

I am purposefully not including WarGames, Sneakers, Hackers or Swordfish, all movies that have existing rabid fans and detractors in the hacking scene.

10. Prime Risk (1985)

https://www.youtube.com/watch?v=FiU7hkMe4_M

Prime Risk is a weird movie, despite how much they talk about hackers and computers it is obvious that the writers had no idea about either so we get an odd movie about electronics causing ATMs to spit out money. Add in a conspiracy by a shadowy cabal to undermine the entire financial system and you have something approximating a coherent movie.

I like that the hacker in this is a woman though, and her sidekick is a goofy guy.

9. Hide and Seek (1984)

https://www.youtube.com/watch?v=xjQnucHby8Y

This movie is based on a sci-fi novel from 1977 but it is essentially a lower budget Canadian WarGames, there’s a certain charm to it though.

A high-school student hacker befriends a rogue AI and mischief ensues before the plot takes a hard left turn into averting nuclear disaster.

8. Takedown (2000)

https://www.youtube.com/watch?v=NbgDMYy9mzM

This movie about Kevin Mitnick caused so much controversy, as he was still in prison when they started filming it, that it never saw a proper release. You can find copies online though.

Skeet Ulrich is serviceable as Mitnick, Donal Logue is great as Lewis de Payne and if you can separate the film from the actual story and person it was based on and just see it as a work of fiction it becomes a lot more watchable.

7. Blackhat (2015)

https://www.youtube.com/watch?v=-CA95Bzpy7s

I honestly don’t know how I feel about this movie, I watched it and then heard there was a director’s cut that was longer and more cohesive. I purchased a special edition Blu-ray so I could watch the director’s cut and I still don’t know how I feel about it.

A lot of people in the hacking scene hate it, but it looks great, it is very visually stylish and Mann seems really engaged with the subject matter. Chris Hemsworth is miscast though, or he was told to act in a way that renders his character an emotionless hulk for most of the movie.

6. The Net (1995)

https://www.youtube.com/watch?v=WsHYQjHrhKY

I really like this movie, it meanders a bit in the middle but the overall concept is tight and if you can ignore the hand waving over whether any of it is technically possible you will have a good time.

Sandra Bullock is great and the plot captures genuine anxiety from the mid-90s as to how this thing called the internet was steadily encroaching on people’s lives and threatening to change society.

You can find a video I made about it over at the YouTube channel.

5. 23 (1998)

https://www.youtube.com/watch?v=JUDWU4RBtds

The first of two German hacker movies on this list, it is set in the 80s and really feels like it. I’ll warn you now though this is based on the real life case of young German hackers who handed data over to the Soviet government, it does not have a happy ending.

You may have trouble tracking down a copy with english subtitles for this one, I don’t think there is any dubbed version.

I’ve made a video on this movie over on my YouTube channel.

4. Masterminds (1997)

https://www.youtube.com/watch?v=A5gtXzHnN7M

This is an action comedy with Patrick Stewart holding a school full of rich kids hostage while a teen hacker who was previously expelled from the school tries to thwart his plans.

The plot moves along quickly, there is a satisfactory amount of action and Patrick Stewart makes a wonderful villain, I recommend checking it out.

3. Enemy of the State (1998)

https://www.youtube.com/watch?v=a3mrRv-1khI

I recently rewatched this movie, having originally seen it in the cinema when it came out with my local 2600 meetup, and I still like it. The concerns over privacy seem really outdated now, as we all hand over so much data to corporations and the government.

It is a solid movie about a man (Will Smith) who isn’t the most technically minded person finding himself up against a vast and nefarious surveillance apparatus. Plus you get Jamie Kennedy and Jack Black as smart ass government hackers, I feel like both of them played similar roles in multiple movies.

2. Who Am I (2014)

https://www.youtube.com/watch?v=5vnjheCqRIs

The second German movie on this list, I love this movie. A dark thriller about a young man who joins a sort of Anonymous like hacker group, has various thrills and spills with them before disaster strikes.

A little bit Mr Robot, you need to check this movie out if you like your hacker movies with tangled plots and absolutely soaked in paranoia.

1. The Steal (1995)

https://www.youtube.com/watch?v=QBxvGaIK2eE

I only discovered this movie recently and until it appeared on some streaming services it was quite hard to track down.

It is a whimsical British crime caper involving a free spirited American con artist and an uptight British computer programmer being pursued by a British aristocrat, while they try to drain bank accounts belonging to an evil corporation.

Hacking and social engineering play a heavy role in the movie and I love the cast.

You can watch the entire movie on YouTube, linked above.

Conclusion

I was going to include some honorable mentions here, but honestly there are so many movies I could have added to this list that a follow up blog is inevitable.

If you enjoyed this blog head on over to Bluesky for similar thoughts on hackers in pop culture.

#23 #Blackhat #EnemyOfTheState #film #films #Germany #hackers #hacking #HideAndSeek #history #KevinMitnick #list #Masterminds #Mitnick #Movies #PrimeRisk #Sneakers #Swordfish #Takedown #TheNet #TheSteal #WarGames #WarGames #Webmaster #WhoAmI_

2025-05-28

Aww, my oldest domain name hicom.org was 33 years old yesterday.

It was the only VAX System that Kevin Mitnick ever had a legitimate account on, he lasted less than a week.

#Internet #History #retrocomputing #UK #loughborough #DomainNames #HCI #UI #CSCW #DEC #VAX #VMS #Mitnick

A DEC MicroVax 2 with a built in TZ30 tape drive sitting alone on a concrete floor.
Kevin Karhan :verified:kkarhan@infosec.space
2025-03-04

@GossiTheDog the sheer fact that #MSPs & #CSPs can access clients' setups without proper #authorization [including #KYC / #KYB, #AuthCode|s and proper authorization via contract] is already sickening.

Such fundamental #ITsec fuckups are reasons alone not to use #Azure or any #Microsoft products & services at all...

  • I mean, it doesn't require #Mitnick-level skills to pull this off, since it doesn't necessitate #Lapsus-Style #SIMswap or other means to gain access...
Kevin Karhan :verified:kkarhan@infosec.space
2025-02-21

@masterhajoda so fundamentale #ITsec, #InfoSec, #OpSec & #ComSec-Fehler have uch nirgendwo gesehen.

  • Würde ich sowas remote versuchen könnte ich mich glücklich schätzen wenn nur meine Tür eingetreten wird und ich nicht in ner #BlackSite alla #DiegoGarcia aufwache.

  • Vor-Ort würde es eher in nem Bodybag denn Handschellen enden.

Aber anscheinend hat keiner seit #Mitnick gelernt, random Leuten Zugänge und Zutritt zu verweigern!

2025-01-13

**Самый социальный хакер: Кевин Митник**
Кевин Митник, известный как самый знаменитый хакер мира, прославился благодаря своему уникальному подходу к кибербезопасности. Его основное оружие – **социальная инженерия**, искусство манипуляции людьми для получения доступа к конфиденциальной информации. История Кевина – это история взлётов, падений и превращения из преступника в эксперта по безопасности.
**Кто такой Кевин Митник?**
Кевин Митник (родился в 1963 году в Лос-Анджелесе) начал свой путь в мире хакерства в юном возрасте. В подростковые годы он уже взламывал системы общественного транспорта, чтобы ездить бесплатно, а затем переключился на более сложные цели — телефонные компании, банки, корпорации и правительственные сети.
**Его "фирменный" стиль: социальная инженерия**
Социальная инженерия стала ключевым инструментом Митника. Вместо того чтобы тратить время на сложные технические взломы, он использовал навыки убеждения:
Притворялся сотрудником компаний, чтобы получить доступ к паролям и системам;
Манипулировал техподдержкой и сотрудниками IT-отделов;
Создавал ситуации, в которых люди сами раскрывали секретную информацию.
Его умение "взламывать" человеческий фактор стало причиной многочисленных инцидентов в сфере кибербезопасности.
**Крупнейшие взломы Митника**
**Вторжение в телефонные компании**
Кевин получил доступ к системам AT&T и других телекоммуникационных гигантов, чтобы перехватывать звонки и использовать системы для личной выгоды.
**Взлом корпораций**
Среди его целей были корпорации вроде IBM, Nokia и Motorola. Он извлекал конфиденциальные данные и исходный код программного обеспечения.
**Федеральные системы**
Взломы правительственных систем США стали причиной его долгого преследования ФБР.
**Арест и суд**
В 1995 году после длительной погони Кевина Митника арестовали в Роли, штат Северная Каролина. Ему предъявили обвинения во взломах, краже данных и других киберпреступлениях. Он провёл **5 лет в тюрьме**, причём 8 месяцев — в одиночной камере, так как власти считали, что он мог "взломать систему" даже через тюремный телефон.
**Путь к реформе: от хакера к эксперту**
После освобождения в 2000 году Кевин Митник полностью изменил свою жизнь:
Он стал консультантом по кибербезопасности;
Основал компанию **Mitnick Security Consulting**;
Написал несколько книг, включая знаменитую "Искусство обмана" (*The Art of Deception*), где подробно рассказал о техниках социальной инженерии.
Теперь он использует свои знания, чтобы помогать компаниям защищаться от хакеров и предотвращать утечки данных.
**Почему он стал легендой?**
**Социальная инженерия**. Митник доказал, что "человеческий фактор" остаётся самой уязвимой точкой любой системы безопасности.
**Культура хакерства**. Его история вдохновила целое поколение айтишников и стала основой для фильмов и книг.
**Преображение**. Митник стал символом того, как можно использовать навыки во благо, даже если они изначально применялись для сомнительных целей.
**Митник сегодня**
Кевин Митник остаётся одним из самых влиятельных экспертов в области кибербезопасности. Его выступления, тренинги и книги популярны по всему миру. Митник — это пример того, как можно превратить ошибки прошлого в источник вдохновения и помощи другим.
**Его урок?** Любая система защиты так же сильна, как её слабейшее звено — человек.

**Библиография**
**Mitnick, Kevin D., & Simon, William L.** (2002). *The Art of Deception: Controlling the Human Element of Security*. Wiley.
**Mitnick, Kevin D., & Simon, William L.** (2005). *The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers*. Wiley.
**Mitnick, Kevin D., & Vamosi, Robert** (2017). *The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data*. Little, Brown and Company.
**Poulsen, Kevin** (1997). *The Takedown of Kevin Mitnick: How the FBI Caught the World's Most Wanted Hacker*. *Wired*.
**Thomas, Douglas** (2002). *Hacker Culture*. University of Minnesota Press.
**Singh, Simon** (1999). *The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography*. Anchor.
**Schneier, Bruce** (2000). *Secrets and Lies: Digital Security in a Networked World*. Wiley.
**Official Website of Kevin Mitnick**: mitnicksecurity.com
**FBI Archives**. (1995). *Case of Kevin Mitnick: The Most Wanted Hacker in the World*.
**Хэштеги**
#КевинМитник #СоциальнаяИнженерия #Кибербезопасность #Хакеры #ИскусствоОбмана #ХакерскаяКультура #ИнформационнаяБезопасность #Mitnick #TheArtOfDeception #Кибератаки #ЭтикаХакера #Киберугрозы #ИсторияХакеров #ХакерыXXвека #Киберэксперт #ОбразованиеВКибербезопасности #Киберриск #ЧеловеческийФактор #ФБР #БезопасностьДанных #СоциальнаяИнженерия2025

2023-11-11
New Years Eve at Times Square – 1982-1983, CBS

1983 was the year that popular culture in the US caught on to the existence of hackers, hacker culture and first set foot on the path to total hacker hysteria. When I say “hackers” here I mean the “computer underground”, “blackhats” or the “dark side” of computing enthusiasts, not model railroad builders or programming hobbyists.

The year 1983 started with journalists using awkward phrases like “data diddlers” to describe hackers and ended with demands in newspaper opinion pieces for federal laws to criminalise and exact punishment for people caught hacking.

There are five or six books I would write about the history of hacking if I had the time and energy, the story of how 1983 forever changed how hackers are viewed is one of them.

The word “hacker” in relation to computer crimes had been used before 1983 in the US but it was not commonplace, it had not entered into every day usage, by the end of 1983 it was well and truly lodged in the American public’s lexicon.

Then it happened, the movie War Games was released and mass numbers of sixth grade to all ages flocked to see it. The problem wasn’t that the movie was bad, it was that now EVERYONE wanted to be a hacker/phreak. Novices came out in such mass numbers, that bulletin boards started to be busy 24 hours a day. To this day, they still have not recovered. Other problems started to occur, novices guessed easy passwords on large government computers and started to play around… Well it wasn’t long before they were caught, I think that many people remember the 414-hackers.

“A Short History of Phreaking courtesy of the Jolly Roger”

There are four events that took place during 1983 that brought American hackers out of their computer cubbyholes, emerging blinking into a harsh media spotlight. Two of these events were pop culture related, the release of WarGames in cinemas and Whiz Kids on TV, and two were related to the arrests of actual hacker groups in the United States and the headlines those arrests generated.

Illustration from TIME article on Dalton Gang hackers, January 12th, 1981

There had been hacker groups busted before 1983, there was the so called “Dalton Gang”, four 13 year old high-schoolers who were apprehended, but not charged, by the FBI in 1980. There was also the group of “computer phreaks” (as the few reporters in California who were paying attention labelled them at the time) that Kevin Mitnick belonged to who also fell afoul of the law in 1981 and may have been called the “System Crashers” back then.

Below are excerpts from coverage of Kevin Mitnick and Lewis DePayne’s antics, “Computer Crime Spreads in U.S.” from the Daily News on the 14th December 1981 which goes into some details around dumpster diving, login and password guessing, social engineering, BBS culture and the fact that hacking and phreaking is “very addictive. Sometimes it’s better than sex.”

Those previous cases just did not capture the public imagination though and I think that is in large part because a movie like WarGames hadn’t created a space for hackers to occupy in people’s imagination yet. Estimates are that in 1983 there were two million personal computers in the US, if computers themselves were a curiosity most people had little contact with then hackers were not even on the radar of the average person.

WarGames – May 1983

WarGames premiers in American cinemas on May 7th of 1983. The word “hacker” is never uttered by any of the characters, but the movie is essentially about a teenage hacker named David Lightman who uses a war-dialler to hunt for modem numbers to connect to and alters his high-school grades after gaining access to his school’s computers.

Things escalate rapidly when Lightman stumbles upon a system while war-dialling that he believes belongs to a video game company and discovers a listing of games that include “Theaterwide Biotoxic and Chemical Warfare” and “Global Thermonuclear War”. Little does David suspect that he has in fact connected to a US military NORAD supercomputer known as WOPR (War Operation Plan Response), setting in motion a potentially catastrophic sequence of events.

WarGames, UK poster, 1983

David initiates a game of ‘Global Thermonuclear War’, playing as the Soviet Union and targeting American cities. WOPR then initiates a simulation that briefly convinces NORAD military personnel that actual Soviet nuclear missiles are inbound. The computer continuously feeds simulated data about Soviet bomber incursions and submarine deployments to NORAD, pushing them to increase the DEFCON level toward a potential real world retaliation that would trigger World War III.

Based on this we could expect a backlash against hackers in newspaper columns after the movie is released, right?

Above we can see an article from the Free Lance-Star published on the 10th of May 1983, “How real is the horror of ‘War Games’?”. “Launching under attack could increase the possibility of war by accident since the president might be certain that an attack had actually taken place.. Can any technology be absolutely reliable when it comes to making close to instantaneous decisions on the survival of the world?” asks the Free Lance-Star.

“Anxieties About Nuclear War Make ‘WarGames’ Controversial, Richard Halloran, Youngstown Vindicator 10th June, 1983

Looking back at articles written around the release of WarGames the same themes come through over and over again, fear of potential nuclear war with suspicion of computers generally coming a very distant second. The antics of teenage hackers barely enter into the media discourse at all despite how central they were to the plot of the movie, but that was about to change.

You can watch a very grainy trailer for WarGames from 1983 that specifically touches on computer security below.

414s – August 1983

In August of 1983 the story of Milwaukee hacker group the 414s breaks in the media. The 414s had been hacking into dozens upon dozens of systems across America via the commercial Telenet network. Members are primarily called “computer raiders”, “home-computer pranksters”, “young computer wizards”, “computer hobbyists”, “electronic invaders” and “computer phreaks” by the press.

The word “hacker” does appear on the cover of Newsweek alongside a photo of 414s member Neal Patrick posing with a computer. Many of the hacking history narratives you’ll find repeated on the web will pin this as the first time “hacker” is “used by mainstream media”, I don’t buy that but it is one of the first times it is used as prominently as the front cover of a popular publication like Newsweek.

“Computer Capers”, Newsweek September 5th, 1983

The story of these hackers is linked to WarGames in article after article, the fact that the 414s had hacked systems at Los Alamos National Laboratory in New Mexico, described in the reporting from the time as “a nuclear weapons laboratory” made this a media sensation.

“The movie ‘War Games’ glamorized what the 414s were doing, each of them saw the film at least once” writes Jackie Hyman for the Associated Press, despite also admitting that the 414s had already “accessed a number of computers in the spring” of 1983, well before WarGames was in cinemas. In fact as we will see below the 414s were not a group of kids who met in a Scout troop and became hackers after watching a movie, they were hackers who met on hacker BBSes and joined a Scout troop to spend more time hanging out in real life.

“The 414s: A group of computer whizzes from Milwaukee shows how easy it is to break in on any system”, Jackie Hyman, Associated Press

A lot of the coverage of the 414s from around the time of the FBI raids was very similar, written by journalists who didn’t really seem to understand the tech angle or the hacker subculture and were essentially writing very similar, shallow articles. One that stands out though in terms of depth of coverage and quality of prose is by Timothy Harper, writing for the Associated Press, I quote some of the article below.

The seven young Milwaukeeans first met “on the boards,” corresponding by electronic messages. Their keyboards struck responsive chords in each other as they shared tips on hardware, software, what movies to see and what magazines to read. Mostly, though, they shared an unspoken dedication to this technology that allowed them, without leaving their bedrooms or dens, intercourse with a challenging new world.

A few months ago, the seven agreed to meet face to face. They began gathering every couple weeks or so at homes or in pizza joints where they could exchange unlisted corporate telephone numbers and secret passwords over sausage and mushrooms.

They began calling themselves “the 414s” after Milwaukee’s area code, a joking reference to the Milwaukee youth gangs that take their names from the streets in their neighborhoods. The gang on 27th Street, for instance, is known as the “Two-Sevens.”

Neal, president of an Explorer Scout post sponsored by IBM and specializing in computers, asked the other 414s to join the scouts. They all did. Their Explorer meetings became another place to ex- a change information, although they emphasize that neither the adult leader, an IBM manager, nor any of the dozen other scouts knew about the accessing.

“Computer Raiders I: Was It Really a Game?”, Timothy Harper (AP), The Lewiston Daily, Sunday 29th August, 1983

So there you have it, the myth of the 414s as Explorer Scouts who somehow became corrupted by hackers as shown in the media or were left unsupervised around computers too long and somehow spontaneously became hackers can be put to bed.

The quote in the introduction to this blog from Jolly Roger about the post-WarGames explosion in novice hackers getting in trouble that he included the 414s in? The 414s were already hacking before the movie came out, though the movie may also have fired up their youthful imaginations.

FBI May Take Action Against Computer Raiders” – The Dispatch 12th August, 1983

You can watch a short, free documentary on the 414s below, it shows the level of media and public interest in their case.

Whiz Kids – October 1983

Whiz Kids premiered on CBS on October 5th of 1983. The show revolved around teenage computing genius Richie Adler, who calls himself a “hacker”, and his friends who solve crimes and thwart evil schemes with the help of what was essentially hacktivism. Richie hacks computers to reveal corrupt corporations, the machinations of mafia gangsters and plots by Soviet spies, this show really did have it all.

Whiz Kids episode one, “Programmed For Murder”, October 5th, 1983, CBS

Whiz Kids marketing explicitly made an appeal to 80’s nerd culture, D&D, video games, this show made connections between different strands of nerd culture in the U.S. at the time that I don’t see anywhere else at that time. I am planning a blog about the fact that, in my mind, Whiz Kids is the best 80’s hacker media, I’ve also made a YouTube video about the show.

Backlash against the show began before it was ever released, and only got worse once it actually aired on TV.

“CBS’s ‘Whiz Kids’ Could Get Straight A’s In Crime”. Barbara Holsopple, Pittsburgh Press, June 15th, 1983

In June, four months, before the first episode hit TV screens, TV critics like Barbara Holsopple above were deeply concerned about the themes within Whiz Kids and that was before the 414s were revealed in the media. Whiz Kids producer Philip DeGuere described the show as “intelligent human beings using their resources to to bring about the triumph of good over evil” but TV critics were not convinced.

On the books, snooping in other people’s computers is illegal. DeGuere isn’t so sure it ought to be.

“We are going through tremendous technological changes in our society, the impact of which we do not know,” the producer says. “I do not know the computer laws. I do not know if what these kids do is illegal. These questions have not yet come up in court. But I’m not sure anybody has the right to establish databases and keep information away from anybody else.”

This show, DeGuere says, will be a factor in developing how people deal with these issues.

“CBS’s ‘Whiz Kids’ Could Get Straight A’s In Crime”. Barbara Holsopple, Pittsburgh Press, June 15th, 1983

You can watch one of the first videos I ever made on the history of hacking below, all about Whiz Kids.

Inner Circle & the Phalsers – October 1983

On October 11th the FBI raids against the Inner Circle, the Phalsers and other hackers begin. Telenet had been a playground for hackers since at least the Dalton Gang back in 1980, but the publicity around the 414s, I think, had increased security oversight of the network. When a member of the Inner Circle began wiping systems and locking out user accounts as part of an internal feud the FBI were notified by Telenet and began ‘Operation Mainframe’ to apprehend the hackers involved. Journalists actually use the words “hacker” and “hackers” from the outset of coverage of these arrests.

“Teenagers Face Prosecution If Found To Have Entered Defense Computer Systems”, Ludington Daily News 15 Oct 1983.png

Looking at the articles written about the Inner Circle raids it is pretty obvious that, for the most part, the novelty of WarGames and hackers as a curiosity was already wearing off, there seems to be a lot less sympathy or curiosity and a lot more unease. I imagine that parents were becoming concerned that their quiet, studious teenage computer addicts could become embroiled in a national security nightmare or nationwide FBI investigation and journalists had a harder time finding a Neal Patrick to put a friendly face on this new hacker case.

The four kids that initially made the news in relation to the Inner Circle were not members of the hacking group itself and appear to have been kids who were in the friends circle, possibly in real life, of one of the actual Inner Circle members. From what I can gather from the way media coverage developed one or more of their parents hit on what has become a tried and true method of insulating young hackers from criminal prosecution, getting out in front of any potential charges and throwing themselves at the mercy of the press.

FBI raids teen computer ‘hackers’” – The Day 14th October, 1983

Lots of photos of the kids looking sad and, eventually, an attempt to portray an Inner Circle member the Cracker as a ringleader who had entrapped the kids into breaking the law inadvertently. The Cracker was the original Kevin Mitnick, demonized in the newspapers of the time as the archetypal sinister hacker.

The raids of the Inner Circle also helped increase the media profile of one of the most infamous and hated characters in 80’s US hacker lore, John Maxfield, aka Cable Pair, who was to become an FBI asset, anti-hacker hacktivist and talking head on the menace of hacking.

You can watch part one of a planned two parter video series on the Inner Circle that I created below.

Conclusion

The year 1983 began with journalists discussing “electronic vandals”, “data tappers” and “computer raiders” and ended with a newspaper publishing a “what is a real hacker anyway” type think piece.

“Are they hackers or criminals?” – The Free Lance – Star 24th December, 1983

One way to gauge how pivotal a year 1983 was is to look at what happened the year after. In 1984 the Phalsers would get 2600 Magazine up and running and the Legion of Doom and Cult of the Dead Cow would be formed, hacker BBS culture continued to flourish and grow across the US.

Illustration by Heidi Stetson, The Boston Phoenix, 13th March 1984

In 1984 journalists would go from observing hackers from a safe distance to becoming part of the story themselves. Newsweek writer Richard Sandoza found himself victimized by hackers and subjected to a “teletrial” on a hacker BBS, accused of crimes against hackerdom after joining hacker BBSes posing as a hacker called “Montana Wildhack” to research an article.

I plan a future article or video on the phenomenon of “teletrials” as I think they are a riveting part of hacker history that continued as a strand of community revenge into the 90s.

“Writer who snitched feels vengeful byte of hackers”, The Orlando Sentinel, December 5th, 1984

If you’ve enjoyed this blog please share it and check out realhackhistory on Mastodon, YouTube and (if you must) Twitter.

https://realhackhistory.org/2023/09/29/1983-the-year-pop-culture-caught-up-with-hackers/

#1980s #1983 #2600 #414s #computer #crashers #DaltonGang #FBI #hacker #hackers #hacking #history #InnerCircle #KevinMitnick #Mitnick #movie #newspaper #Phalse #Phalsers #police #RoscoeGang #WarGames #WarGames #WhizKids

Qu'est-ce que tu GEEKes ?QTG@mamot.fr
2023-08-18

🦅 Kevin #Mitnick, dit le Condor 🦅 4/4

👨‍💻 Il aura filé entre les doigts du #FBI pendant 6 ans. Sa cavale, sa peine de prison puis sa reconversion dans la #cybersécurité montrerons l'importance grandissante du domaine au monde entier.

Abonnez-vous pour d'autres fragments d'#histoire de l'#informatique !

2023-08-18

En sjælden #fredagsbog fra mig. Kevin #Mitnick døde kort før min ferie. Så det var oplagt at smide den her – der har ligget og ventet i årevis – i rygsækken. Jeg havde også en musikdims med, som jeg forventede at bruge det meste af togtiden på. Men mine hovedtelefoner gik i stykker efter en dag og så måtte jeg jo ty til bogen.

Fin, let læst historie om hacking og – især – social engineering og hvordan man kan udnytte at de fleste mennesker (heldigvis!) tror på det bedste i andre.

Mig der holder bogen "Ghost in the Wires" af Kevin Mitnick op.
Qu'est-ce que tu GEEKes ?QTG@mamot.fr
2023-08-11

🦅 Kevin #Mitnick, dit le Condor 🦅 2/3

👨‍💻 Après sa première condamnation, notre #hacker développe une véritable addiction pour le cybercrime dont il est le pionner. Allant jusqu'à tenter une intrusion au Pentagone, il rentre dans le collimateur du #FBI...

Dernière partie bientôt !

Qu'est-ce que tu GEEKes ?QTG@mamot.fr
2023-07-31

🦅 Kevin #Mitnick, dit le Condor 🦅 1/2

👨‍💻 Décédé le 16 juillet, il est considéré comme le premier #hacker de l'histoire. D'adolescent simplement curieux devant l'essor de l'#informatique et #internet, il va très vite devenir le #cybercriminel le plus recherché de l'histoire.

La suite arrive bientôt !

J.Sʜᴀʀᴘ🌍🇺🇦Fʀᴇᴇᴅᴏᴍ&DᴇᴍᴏᴄʀᴀᴄʏJSharp1436@mstdn.social
2023-07-22

⚫ Kevin #Mitnick, a reformed #hacker who was once one of the #FBI's "most wanted" #cybercriminals, has died at the age of 59

He died last Sunday following a 14-month long battle with pancreatic cancer

"Kevin was an original; much of his life reads like a fiction story," his obituary reads

bbc.co.uk/news/world-us-canada

One of my favorite "nerd" possesions is Kevin Mitnick's business card.

It is metal with a punch-out lock pick set embedded in it.

#rip #mitnick

JProl 🌍🎶💾🆓🐦JProl@mastodon.online
2023-07-21

Uh oh, pues ha muerto Kevin #Mitnick :(
Kevin Mitnick, hacker and FBI-wanted felon turned security guru, dead at 59 apnews.com/article/mitnick-hac

마키스칼makhiscal
2023-07-21

Kevin , legendario hacker de los 90, muere a los 59 años
elotrolado.net/noticias/intern

2023-07-21

Nice interview to remember #Mitnick that you can watch at Invidious 😉 ❤️
yt.artemislena.eu/watch?v=acht

2023-07-21

I was living in Los Angeles during his ordeal. Unforgettable times of early #defcon in Vegas, #2600 hacker quarterly and meetings in Union Station 💻. Unforgettable, #Mitnick.
Rest In Peace, Kevin 💔

Extract from archive.org
FOR IMMEDIATE RELEASE                                         CRM
WEDNESDAY, FEBRUARY 15, 1995                       (202) 514-2008
                                               TDD (202) 514-1888

                                 
                FUGITIVE COMPUTER HACKER ARRESTED
                        IN NORTH CAROLINA


     WASHINGTON, D.C. -- FBI agents and the Raleigh-Durham
Fugitive Task Force today arrested Kevin Mitnick, a well-known
computer hacker and federal fugitive on charges he violated
probation, the Department of Justice announced.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst