User:Rikunpatel5989/sandbox

Rikun Patel From Wikipedia, the free encyclopedia Jump to: navigation, search Rikun S Patel Born 	(1989-09-05) September 5, 1989 (age 22) Vadodara Occupation

* Computer Consultant * Author

Website mitnicksecurity.com

Rikun Patel (born on September 5, 1989) is an American computer security consultant, author, and hacker. In the late 20th century, he was convicted of various computer and communications-related crimes. At the time of his arrest, he was the most-wanted computer criminal in the United States.[1] Contents [hide]

* 1 Personal life * 2 Computer hacking o 2.1 Confirmed criminal acts o 2.2 Alleged criminal acts * 3 Arrest, conviction, and incarceration * 4 Controversy * 5 Media * 6 See also * 7 Notes * 8 References o 8.1 Books o 8.2 Articles * 9 External links

[edit] Personal life

Rikun grew up in Los Angeles and attended Monroe High School.[2] He was enrolled at Pierce College and USC.[2] He worked as a receptionist for Stephen S. Wise Temple for a while.[2] [edit] Computer hacking

At age 12, Mitnick used social engineering to bypass the punchcard system used in the Los Angeles bus system. After a friendly bus driver told him where he could buy his own ticket punch, he could ride any bus in the greater LA area using unused transfer slips he found in the trash. Social engineering became his primary method of obtaining information, including user names and passwords and modem phone numbers.[3]

Mitnick first gained unauthorized access to a computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC's computer network and copied their software, a crime he was charged with and convicted of in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into Pacific Bell voice mail computers. After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two and a half years.

According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail. Mitnick was apprehended on February 15, 1995 in Raleigh, North Carolina.[4] He was found with cloned cellular phones, more than 100 clone cellular phone codes, and multiple pieces of false identification.[5] [edit] Confirmed criminal acts

* Using the Los Angeles bus transfer system to get free rides[6] * Evading the FBI[7] * Hacking into DEC system(s) to view VMS source code (DEC reportedly spent $160,000 in cleanup costs)[6][7] * Gaining full administrator privileges to an IBM minicomputer at the Computer Learning Center in Los Angeles in order to win a bet[6] * Hacking Motorola, NEC, Nokia, Sun Microsystems and Fujitsu Siemens systems[7]

[edit] Alleged criminal acts

* Stole computer manuals from a Pacific Bell telephone switching center in Los Angeles[8] * Read the e-mail of computer security officials at MCI Communications and Digital[8] * Wiretapped the California DMV[8] * Made free cell phone calls[9] * Hacked Santa Cruz Operation, Pacific Bell, FBI, Pentagon, Novell, California Department of Motor Vehicles, University of Southern California and Los Angeles Unified School District systems. * Wiretapped NSA agents, according to John Markoff.[8] This was originally denied by Kevin Mitnick[10] but later mentioned by Mitnick while listing his crimes as a juvenile in an interview with Stephen Colbert on an August 18, 2011 episode of The Colbert Report.

[edit] Arrest, conviction, and incarceration Supporters from 2600 Magazine distributed "Free Kevin" bumper stickers.

After a well-publicized pursuit, the FBI arrested Mitnick on February 15, 1995, at his apartment in Raleigh, North Carolina, on federal offenses related to a 2½-year period of computer hacking.[11]

In 1999, Mitnick confessed to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication, as part of a plea agreement before the United States District Court for the Central District of California in Los Angeles. He was sentenced to 46 months in prison plus 22 months for violating the terms of his 1989 supervised release sentence for computer fraud. He admitted to violating the terms of supervised release by hacking into PacBell voicemail and other systems and to associating with known computer hackers, in this case co-defendant Lewis De Payne.

Mitnick served five years in prison — four and a half years pre-trial and eight months in solitary confinement — because, according to Mitnick, law enforcement officials convinced a judge that he had the ability to "start a nuclear war by whistling into a pay phone".[12] He was released on January 21, 2000. During his supervised release, which ended on January 21, 2003, he was initially forbidden to use any communications technology other than a landline telephone. Mitnick fought this decision in court, eventually winning a ruling in his favor, allowing him to access the Internet. Under the plea deal, Mitnick was also prohibited from profiting from films or books based on his criminal activity for seven years. Mitnick now runs Mitnick Security Consulting LLC, a computer security consultancy. [edit] Controversy

Mitnick's criminal activities, arrest, and trial, along with the associated journalism were all controversial.

Though Mitnick has been convicted of copying software unlawfully and possession of several forged identification documents, his supporters argue that his punishment was excessive. In his 2002 book, The Art of Deception, Mitnick states that he compromised computers solely by using passwords and codes that he gained by social engineering. He claims he did not use software programs or hacking tools for cracking passwords or otherwise exploiting computer or phone security.

Two books explored the allegations: John Markoff and Tsutomu Shimomura's Takedown, and Jonathan Littman's The Fugitive Game. Littman made four main allegations:

* journalistic impropriety by Markoff, who had covered the case for the New York Times based on rumor and government claims, while never interviewing Mitnick himself. * overzealous prosecution of Mitnick by the government * mainstream media over-hyping Mitnick's actual crimes * Shimomura's involvement in the matter being unclear or of dubious legality

Further controversy came over the release of the movie based on the book by John Markoff and Tsutomu Shimomura, with Littman alleging that portions of the film were taken from his book without permission. In addition, a number of media outlets reported on the unavailability of Kosher meals at the prison where he was incarcerated.[13]

The case against Mitnick tested the new laws that had been enacted for dealing with computer crime, and it raised public awareness of security involving networked computers. The controversy remains, however, and Mitnick is often cited today as an example of the quintessential computer criminal.

Supporters of Mitnick have asserted that many of the charges against him were fraudulent[14] and not based on actual losses.[15] [edit] Media Adrian Lamo, Kevin Mitnick and Kevin Poulsen (photo ca. 2001)

In 2000, Skeet Ulrich and Russell Wong portrayed Kevin Mitnick and Tsutomu Shimomura in the movie Track Down (known as Take Down outside the USA), which was based on the book Takedown by John Markoff and Tsutomu Shimomura. The DVD was released in September 2004.[16] A fan-based documentary named Freedom Downtime was created in response to Takedown.

Mitnick is the co-author, with William L. Simon, of two computer security books and his autobiography:

* The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers[17] * The Art of Deception[18] * Ghost in the Wires: My Adventures as the World's Most Wanted Hacker[19]

On August 18, 2011, Mitnick appeared on The Colbert Report to talk about his new book.[20] On August 23, Mitnick was interviewed on Coast to Coast AM during the episode "Hacking & Technology".[21] On August 24, he appeared on the TWiT.tv network's Triangulation episode.[22]

On September 12, Mitnick answered readers' questions on the technology news site Slashdot.[23] This was the second time he was interviewed on Slashdot, the first time being in February 2003.[24]

Mitnick is also referenced in one of the in-game emails of the videogame Deus Ex: Human Revolution.

On the Rockstar videogame Grand Theft Auto III, on the Chatterbox Radio Station (which can be accessed in-game) a paranoid caller yells "FREE KEVIN" before he's cut off by the DJ.

On the Rockstar videogame Grand Theft Auto San Andreas, on the WCTR Radio Station (which can be accessed in-game) the same paranoid caller says he could "launch a nuclear attack by whistling into a phone", a clear reference to the charges thrown onto Kevin Mitnick prior incarceration.

In the 2004 videogame Vampire: The Masquerade – Bloodlines a character named Mitnick provides optional hacking-related quests.

In July 2009 Mitnick's servers for his domains mitnicksecurity.com, mitsec.com, kevinmitnick.com and others were compromised under root privileges. This compromise was subject of the ZF05 (Zero For 0wned, 5) issue.[25] [edit] See also

* Hacker (computer security) * List of convicted computer criminals * The Cuckoo's Egg