177 lines
8.7 KiB
Plaintext
177 lines
8.7 KiB
Plaintext
Slippery cybervandal caught in his own electronic web
|
||
-----------------------------------------------------
|
||
|
||
(c) Copyright the News & Observer Publishing Co.
|
||
How a computer sleuth traced a digital trail
|
||
|
||
New York Times
|
||
|
||
RALEIGH, N.C. (9:05 p.m.) -- After a search of more than two years, a team
|
||
of FBI agents early Wednesday morning captured a 31-year-old computer
|
||
expert accused of a long crime spree that includes the theft of thousands
|
||
of data files and at least 20,000 credit card numbers from computer
|
||
systems around the nation.
|
||
|
||
The arrest of Kevin D. Mitnick, one of the most wanted computer criminals,
|
||
followed a 24-hour stakeout of a Raleigh apartment building here.
|
||
|
||
A convicted computer felon on the run from federal law enforcement
|
||
officials since November 1992, Mitnick has used his sophisticated skills
|
||
over the years to worm his way into many of the nation's telephone and
|
||
cellular telephone networks and vandalize government, corporate and
|
||
university computer systems. Most recently, he had become a suspect in a
|
||
rash of break-ins on the global Internet computer network.
|
||
|
||
"He was clearly the most wanted computer hacker in the world," said Kent
|
||
Walker, an assistant U.S. attorney in San Francisco who helped coordinate
|
||
the investigation. "He allegedly had access to corporate trade secrets
|
||
worth billions of dollars. He was a very big threat."
|
||
|
||
But federal officials say Mitnick's confidence in his hacking skills may
|
||
have been his undoing. On Christmas Day, he broke into the home computer
|
||
of a computer security expert, Tsutomu Shimomura, a researcher at the
|
||
federally financed San Diego Supercomputer Center.
|
||
|
||
Shimomura then made a crusade of tracking down the intruder, an obsession
|
||
that led to Wednesday's arrest.
|
||
|
||
It was Shimomura, working from a monitoring post in San Jose, Calif., who
|
||
determined last Saturday that Mitnick was operating through a computer
|
||
modem connected to a cellular telephone somewhere near Raleigh, N.C.
|
||
|
||
Sunday morning, Shimomura flew to Raleigh, where he helped telephone
|
||
company technicians and federal investigators use cellular-frequency
|
||
scanners to home in on Mitnick.
|
||
|
||
Mitnick was arrested at 2 o'clock Wednesday morning in his apartment in
|
||
the Duraleigh Hills neighborhood of northwest Raleigh, after FBI agents used
|
||
their scanners to determine that Mitnick, in keeping with his nocturnal
|
||
habits, had connected once again to the Internet.
|
||
|
||
Shimomura was present Wednesday at Mitnick's pre-arraignment hearing at
|
||
the
|
||
federal courthouse in Raleigh. At the end of the hearing, Mitnick, who now
|
||
has shoulder-length brown hair and was wearing a black sweat suit and
|
||
handcuffs, turned to Shimomura, whom he had never met face to face.
|
||
|
||
"Hello, Tsutomu," Mitnick said. "I respect your skills."
|
||
|
||
Shimomura, who is 30 and also has shoulder-length hair, nodded solemnly.
|
||
|
||
|
||
Mitnick, already wanted in California for a federal parole violation, was
|
||
charged Wednesday with two federal crimes. The first, illegal use of a
|
||
telephone access device, is punishable by up to 15 years in prison and a
|
||
$250,000 fine.
|
||
|
||
The second charge, computer fraud, carries potential penalties of 20 years
|
||
in prison and a $250,000 fine. Federal prosecutors said they were
|
||
considering additional charges related to Mitnick's reported Internet
|
||
spree.
|
||
|
||
Federal officials say Mitnick's motives have always been murky. He was
|
||
recently found to have stashed thousands of credit card numbers on
|
||
computers in the San Francisco Bay area -- including the card numbers of
|
||
some of the best-known millionaires in Silicon Valley. But there is no
|
||
evidence yet that Mitnick had attempted to use those credit card accounts.
|
||
|
||
Indeed, frequently ignoring the possibility of straightforward financial
|
||
gain from the information he has stolen, Mitnick has often seemed more
|
||
concerned with proving that his technical skills are better than those
|
||
whose job it is to protect the computer networks he has attacked.
|
||
|
||
Federal officials say the arrest of Mitnick does not necessarily solve all
|
||
the recent Internet crimes, because his trail of electronic mail has
|
||
indicated that he may have accomplices. One of them is an unknown computer
|
||
operator, thought to be in Israel, with whom Mitnick has corresponded
|
||
electronically and boasted of his Internet exploits, investigators said.
|
||
|
||
Still, the capture of Mitnick gives the FBI custody of a notoriously
|
||
persistent and elusive computer break-in expert. Raised in the San
|
||
Fernando Valley near Los Angeles by his mother, Mitnick has been in and out of
|
||
trouble with the law since 1981.
|
||
|
||
It was then, as a 17-year-old, that he was placed on probation for
|
||
stealing computer manuals from a Pacific Bell telephone switching center in Los
|
||
Angeles.
|
||
<EFBFBD> <20>' 0*0*0*<2A> <20> <20> Those who know Mitnick paint a picture of a man obsessed with the power
|
||
inherent in controlling the nation's computer and telephone networks.
|
||
|
||
The recent break-ins he is accused of conducting include forays into
|
||
computer systems at Apple Computer Inc. and Motorola Inc. and attacks on
|
||
commercial services that provide computer users with access to the
|
||
Internet, including the Well in Sausalito, Calif., Netcom in San Jose,
|
||
Calif., and the Colorado Supernet, in Boulder, Colo.
|
||
|
||
To make it difficult for investigators to determine where the attacks were
|
||
coming from, Mitnick is said to have used his computer and modem to
|
||
manipulate a local telephone company switch in Raleigh to disguise his
|
||
whereabouts.
|
||
|
||
In recent weeks, as an elite team of computer security experts tightened
|
||
an invisible electronic net around the fugitive, Mitnick continued to taunt
|
||
his pursuers, apparently unaware of how close they were to capturing him.
|
||
|
||
About 10 days ago, for example, someone whom investigators believe to have
|
||
been Mitnick left a voice-mail message for Shimomura, a Japanese citizen.
|
||
The message reprimanded Shimomura for converting the intruder's earlier
|
||
voice-mail messages into computer audio files and making them available on
|
||
the Internet.
|
||
|
||
"Ah Tsutomu, my learned disciple," the taunting voice said. "I see that
|
||
you put my voice on the Net. I'm very disappointed, my son."
|
||
|
||
But the continued attempts at one-upmanship simply gave the pursuers more
|
||
electronic evidence.
|
||
|
||
"He was a challenge for law enforcement, but in the end he was caught by
|
||
his own obsession," said Kathleen Cunningham, a deputy marshal for the
|
||
U.S. Marshals Service who has pursued Mitnick for several years.
|
||
|
||
Mitnick first came to national attention in 1982 when, as a teen-age
|
||
prank, he used a computer and a modem to break into a North American Air Defense
|
||
Command computer.
|
||
|
||
He subsequently gained temporary control of three central offices of
|
||
telephone companies in New York City and all the phone switching centers
|
||
in California.
|
||
|
||
This gave him the ability to listen in on calls and pull pranks like
|
||
reprogramming the home phone of someone he did not like so that each time
|
||
the phone was picked up, a recording asked for a deposit of a coin.
|
||
|
||
But the break-ins escalated beyond sophomoric pranks. For months in 1988,
|
||
Mitnick secretly read the electronic mail of computer security officials
|
||
at MCI Communications and Digital Equipment Corp., learning how their
|
||
computers and phone equipment were protected.
|
||
Officials at Digital later accused him of causing $4 million in damage to
|
||
computer operations at the company and stealing $1 million of software. He
|
||
was convicted in July 1989 and sentenced to a year in a low-security
|
||
federal prison in Lompoc, Calif.
|
||
|
||
One of his lawyers convinced the court that Mitnick had an addiction to
|
||
computers. In July 1989, after his release from prison, he was placed in a
|
||
treatment program for compulsive disorders, the Beit T'Shuvah center in
|
||
Los Angeles. During his six months there, he was prohibited from touching a
|
||
computer or modem.
|
||
|
||
That restriction was a condition of his probation when he was released in
|
||
mid-1990, and it was for reportedly violating this condition that federal
|
||
officials were pursuing him when he dropped out of sight in November 1992.
|
||
|
||
In September 1993, the California Department of Motor Vehicles also issued
|
||
a warrant for his arrest. The warrant stated that Mitnick had wiretapped
|
||
calls from FBI agents. He then used law-enforcement access codes obtained
|
||
by eavesdropping on the agents to illegally gain access the drivers'
|
||
license data base in California.
|
||
|
||
Federal law enforcement officials believe that Mitnick has conducted a
|
||
long string of computer and phone telephone network break-ins during more than
|
||
two years on the run.
|
||
|
||
And they say his ability to remain at large until now illustrates the new
|
||
challenges that law enforcement officials face in apprehending criminals
|
||
who can cloak themselves behind a curtain of forged electronic data.
|
||
|
||
|