391 lines
26 KiB
Plaintext
391 lines
26 KiB
Plaintext
Õ018ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ018¸
|
||
³ The Phone Losers Of America Present ³
|
||
³ The Kevin Mitnick Saga Continues... - RedBoxChiliPepper ³
|
||
ÆÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͵
|
||
³ Written On February 1, 1995 Last Revision on February 2, 1995 ³
|
||
Ô018ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ018¾
|
||
|
||
I kind of assumed that the Kevin Mitnick story was over back in 1990 after they
|
||
published the book "Cyberpunk." It seemed that he was reformed and his
|
||
computer shenanagens were forever behind him but each day it seems like the
|
||
Mitnick saga gets better and better. So this is the Mitnick file. Everything
|
||
I've ever owned on Mitnick is here so enjoy it.
|
||
|
||
I know there's a lot more Mitnick articles floating around. A LOT. I used to
|
||
have all of them (more or less) but I seem to have misplaced a few so until I
|
||
get my ass over to the university to use their computers, the following is all
|
||
you get. If you have any to contribute, please do so.
|
||
______________________________________________________________________________
|
||
The following memo is from Pacific Bell Security concerning Kevin Mitnck.
|
||
|
||
On May 14, 1987, Electronic Operations received a court order directing Pacific
|
||
Bell to place traps on the telephone numbers assigned to a company known as
|
||
"Santa Cruz Operations." The court order was issued in order to identify the
|
||
telephone number being used by an individual who was illegally entering Santa
|
||
Cruz Operations' computer and stealing information.
|
||
|
||
On May 28, 1987, a telephone number was identified five separate times making
|
||
illegal entry into Santa Cruz Operations' computer. The originating telephone
|
||
number was 805-495-6191, which is listed to Bonnie Vitello, 1378 E. Hillcrest
|
||
Drive, Apartment 404, Thousand Oaks, California.
|
||
|
||
On June 3, 1987, a search warrant was served at 1378 E. Hillcrest Drive, Apt.
|
||
404, Thousand Oaks, California. The residents of the apartment, who were not
|
||
at home, were identified as Bonnie Vitello, a programmer for General Telephone
|
||
and Kevin Mitnick, a known computer hacker. Found inside the apartment were
|
||
three computers, numerous floppy disks and a number of General Telephone
|
||
computer manuals.
|
||
|
||
Kevin Mitnick was arrested several years ago for hacking Pacific Bell, UCLA
|
||
and Huhes Aircraft company compouters. Mitnick was a minor at the time of his
|
||
arrest. Kevin Mitnick was recently arrested for compromising the data base of
|
||
Santa Cruz Operations.
|
||
|
||
The floppy disks that were seized pursuant to the search warrant revealed
|
||
Mitnick's involvement in compromising the Pacific Bell UNIX operation systems
|
||
and other data bases. The disks documented the following:
|
||
|
||
o Mitnick's compromise of all southern California SCC/ESAC computers. On file
|
||
were the names, log-ins, passwords, and home telephone numbers for
|
||
northern and southern ESAC employees.
|
||
o The dial-up numbers and circuit identification documents for SCC computers
|
||
and data kits.
|
||
o The commands for testing and seizing trunk testing lines and channels.
|
||
o The commands and log-ins for COSMOS wire centers for northern and southern
|
||
California.
|
||
o The commands for line monitoring and the seizure of dial tone.
|
||
o References to the impersonation of southern California security agents and
|
||
ESAC employees to obtain information.
|
||
o The commands for placing terminating and originating traps.
|
||
o The addresses of Pacific Bell locations and the electronic door lock access
|
||
codes for the following southern California central offices ELSG12, LSAN06,
|
||
LSAN12, LSAN15, LSAN56, AVLN11, HLWD01, HWTH01, IGWD01, LOMT11 and SNPD01.
|
||
o Inter-company electronic mail detailing new login/password proceedures and
|
||
safeguards.
|
||
o The work sheet of an UNIX encryption reader hacker file. If successful, this
|
||
program could break into any UNIX system at will.
|
||
______________________________________________________________________________
|
||
"Ex-Computer Whiz Kid Held on New Fraud Counts"
|
||
by Kim Murphy (Los Angeles Times) December 16, 1988
|
||
|
||
Kevin Mitnick was 17 when he first cracked Pacific Bell's computer system,
|
||
secretly channeling his computer through a pay phone to alter telephone bills,
|
||
penetrate other computers and steal $200,000 worth of data from a San
|
||
Francisco corporation. A juvenile court judge at the time sentenced Mitnick to
|
||
six months in a youth facility.
|
||
[After his release,] his probation officer found that her phone had been
|
||
disconnected and the phone company had no record of it. A judge's credit record
|
||
at TRW Inc. was inexplicably altered. Police computer files on the case were
|
||
accessed from outside... Mitnick fled to Israel. Upon his return, there were
|
||
new charges filed in Santa Cruz, accusing Mitnick of stealing software under
|
||
development by Microport Systems, and federal prosecutors have a judgement
|
||
showing Mitnick was convicted on the charge. There is, however, no record of
|
||
the conviction in Santa Cruz's computer files.
|
||
On Thursday, Mitnick, now 25, was charged in two new criminal complaints
|
||
accusing him of causing $4 million damage to a DEC computer, stealing a highly
|
||
secret computer security system and gaining access to unauthorized MCI long-
|
||
distance codes through university comoputers in Los Angeles, CA, and England.
|
||
A United States magistrate took the unusual step of ordering Mitnick held
|
||
without bail, ruling that when armed with a keyboard he posed a danger to the
|
||
community. "This thing is so massive, we're just running around trying to
|
||
figure out what he did," said the prosecutor, an assistant United States
|
||
attorney. "This person, we believe, is very, very dangerous, and he needs to
|
||
be detained and kept away from a computer."
|
||
Los Angeles Police Department and FBI investigators say they are only now
|
||
beginning to put together a picture of Mitnick and his alleged high-tech
|
||
escapades. "He's several levels above what you would characterize as a computer
|
||
hacker," said detective James K. Black, head of the Los Angeles police dept's
|
||
computer crime unit. "He started our with a real driving curiousity for
|
||
computers that went beyond personal compouters...He grew with the technology."
|
||
Mitnick is to be arraigned on two counts of computer fraud. The case is
|
||
believed to be the first in the nation under a federal law that makes it a
|
||
crime to gain access to an interstate computer network for criminal purposes.
|
||
Federal prosecutors also obtained a court order restricting Mitnick's phone
|
||
calls from jail, fearing he might gain access to a computer over phone lines.
|
||
______________________________________________________________________________
|
||
|
||
______________________________________________________________________________
|
||
"Dark Side Hacker..." From The Los Angeles Times...
|
||
Dammit, what's the date on this article???
|
||
|
||
When computer hacker Kevin Mitnick arrived at a Calabases parking garage for
|
||
a meeting with his friend Lenny DiCicco four weeks ago, DiCicco reached up and
|
||
casually scratched his head, a pre-arranged signal to federal agents hiding
|
||
nearby.
|
||
Quickly, with the sound of screeching tires and shouted commands, a half
|
||
dozen men closed in and handcuffed Mitnick. "Len, why did you do this to me?",
|
||
Mitnick asked as he was being led away, DiCicco recalled later.
|
||
"Because you're a menace to society," DiCicco replied.
|
||
Law enforcement authorities couldn't agree more. Mitnick, 25, an overweight,
|
||
bespectacled San Fernando Vally computer junkie known as a "dark side" hacker
|
||
for his willingness to use the computer as a weapon, has been accused of
|
||
causing $4 million in damage to computer giant Digital Equipment Corp in
|
||
Massachusetts.
|
||
Described by one investigator as a sophisticated criminal whose computer was
|
||
an "umbilical cord to his soul," he also is charged by a federal grand jury
|
||
with illegally copying Digital software valued at $1 million.
|
||
But those are just the latest in a decade-long series of accusations against
|
||
Mitnick, whose high school computer hobby turned into a lasting obsession.
|
||
He roved Los Angeles, allegedly using computers at schools and businesses to
|
||
break into Defense Department computer systems, sabotage business computers
|
||
and electronically harass anyone-including a probation officer and FBI agents
|
||
who got in his way. He also learned how to disrupt telephone company
|
||
operations and disconnected the phones of Hollywood celebrities such as
|
||
Kristy McNichol, authorities said.
|
||
So determined was Mitnick, according to friends, that when he suspected his
|
||
home phone was being monitored, he carried his hand-held keyboard to a pay
|
||
phone in front of a 7-Eleven store, where he hooked it up and continued to
|
||
break into computers around the country.
|
||
"He's an electronic terrorist," said DiCicco. "He can ruin someone's life
|
||
just using his fingers."
|
||
Over the last month, three federal court judges have refused at seperate
|
||
hearings to set bail for Mitnick, contending there would be no way to protect
|
||
society from him if he were freed from his cell at the Metropolitan Detention
|
||
Center in Los Angeles, where he is awaiting a February 21 trial date.
|
||
Although there is a subculture of "whiz kids" around the country who break
|
||
into computers for fun, and they occasionally are caught by local authorities,
|
||
they traditionally wind up with no more than a slap on the wrist or a short
|
||
term in jail or juvenile detention facilities, according to Jay Bloom Becker
|
||
of the National Center for Computer Data, an information firm in Los Angeles.
|
||
But Mitnick is being treated as anything but a prankster. Prosecutors say he
|
||
is the first person to be charged under a tough federal interstate computer
|
||
crime law. He faces up to 30 years in prison if convicted of three counts.
|
||
Mitnick's lack of conscience, authorities say, makes him even more dangerous
|
||
than hackers such as Robert Morris Jr.
|
||
Mitnick's motive for a decade of hacking?
|
||
Not money, apparently. An unemployed computer programmer, he drove a used
|
||
car and was living with his wife in his mother's modest Panorama City
|
||
apartment at the time of his arrest.
|
||
"He's gotten nothing out of it except jail," said DiCicco.
|
||
Mitnick's family and attorney however, accuse federal prosecutors of
|
||
blowinng the case out of proportion, either out of fear or misunderstanding of
|
||
the technology. Mitnick's wife, Bonnie, a clerk who met her future husband
|
||
when he sent a message to her computer asking for a date, said prosecutors are
|
||
portraying her husband as a technological magician who "could turn dogs into
|
||
chickens."
|
||
His mother, Shelly Jaffee, a Panorama City waitress, said her son never even
|
||
owned a computer and is not smart enough to pull off such sopisticated crimes.
|
||
She acknowledged that he once won a $300 prize at a fair for cracking a
|
||
display computer's security code, but she attributed that more to luck than
|
||
anything else.
|
||
By all acounts, Mitnick was a bright but indistinguished boy in school,
|
||
said Jaffee, who was divorced when Kevin was 3. "He was just a normal, typical kid. He was not a whiz kid," she said.
|
||
In fact, Mitnick disliked school, where he was unpopular, friends said.
|
||
Aloof and a loner, his appearance didn't help. He acquired the much-satirized
|
||
look of the computer fanatic: shirt tail hanging out, horn-rimmed glasses and
|
||
pens in his breast pocket.
|
||
"There was always something slightly out of place," said one educator who
|
||
knew Mitnick as a student in a computer class.
|
||
His interest in computers blossomed at Monroe High School in Sepulveda,
|
||
where he took a programming course taught by John Christin 1979. But Mitnick
|
||
was not interested in writing simple programs, he wanted to learn how to
|
||
manipulate the fundamental codes that made the computer work, Christ said.
|
||
Soon, he was using the classroom computers, furnished by Digital Equipment
|
||
Corp., the world's largest maker of networked computers with $11 billion in
|
||
annual sales, to gain access to files in the Los Angeles Unified School
|
||
District's main computers in downtown Los Angeles, Christ said. The two
|
||
systems were linked and Mitnick was able to discover codes that, when typed
|
||
into the classroom system, would allow entry into the main computers.
|
||
He didn't try to alter grades, but caused enough trouble that administrators
|
||
asked Christ to watch him closely. When Mitnick was caught breaking in again,
|
||
Christ said, he showed no remorse.
|
||
"He has no conscience as far as I can tell," the instructor said.
|
||
DiCicco said Mitnick was already a schoolyard legend for misusing the
|
||
computer terminal when they met. DiCicco, who became a disciple, said
|
||
watching Mitnick find ways into computer systems "was thrilling. I was
|
||
learning a lot from him."
|
||
He may not have been on the football team, but within the subculture of
|
||
computer hackers, Mitnick was a colorful figure, using the name "Condor," for
|
||
a Robert Redford movie character who outwits the government. The final digits
|
||
of his unlisted home phone number were 007.
|
||
Mitnick had such a special feeling for the computer that when an
|
||
investigator for the Los Angeles County district attorney's office accused him
|
||
of harming a computer he entered, he got tears in his eyes. "The computer to
|
||
him was more of an animate thing," said the investigator, Robert Ewen, "There
|
||
was an umbilical cord from it to his soul. That's why when he got behind a
|
||
computer he became a giant."
|
||
Although some teen-agers consider hacking glamorous, it atually can be a
|
||
grinding process. A hacker may spend hours, even days, on a home terminal,
|
||
connected by phone to another system the hacker wants to enter. The target
|
||
system is usually protected by security designed to keep out unauthorized
|
||
intruders, so the hacker often has to deduce or discover by tedious trial and
|
||
error the secret passwords given to people authorized to use the system.
|
||
What made Mitnick "the best," said Steven Rhoades, a fellow hacker and
|
||
friend, was his ability to talk people into giving him privilleged
|
||
information. He would call an official with a company he wanted to penetrate
|
||
and say he was in the maintenance department and needed a computer password.
|
||
He was so convincing, they gave him the neccessary names or numbers, Rhoades
|
||
said.
|
||
Rhoades said he and Mitnick broke into a North American Air Defense Command
|
||
computer in Colorado Springs, CO in 1979. The 1983 movie "Wargames" is based
|
||
upon a similar incident, in which a young hacker nearly starts World War III
|
||
when he sends a message to a defense computer that is mistaken for a Soviet
|
||
missile attack.
|
||
But Rhoades said they did not interfere with any defense operations. "We
|
||
just got in, looked around and got out," he said.
|
||
At the time he was getting interested in computers, Mitnick also developed a
|
||
fascination for the telephone system, becoming what is known as a "phone
|
||
phreak." In 1981, when he was just 17, Mitnick and three others were arrested
|
||
for stealing manuals while pretending to be on a guided tour of Pacific Bell's
|
||
computer center in Los Angeles, which controlled service and repair operations
|
||
and other functions for Southern California's phone system.
|
||
He was prosecuted as a juvenile and placed on probation. He violated it a
|
||
short time later, however, by using USC computers. He was sent to a youth
|
||
detention facility for six months, records show.
|
||
Pacific Bell officials refuse to talk about Mitnick. But he eventually
|
||
learned so much that he could create phone numbers, tap into telephone calls,
|
||
and disconnect service without leaving a trace, according to DiCicco and
|
||
Rhoades. He did this, according to DiCicco, by impersonating phone company
|
||
officials, or by playing certian tones over the phone to the Pacific Bell
|
||
computer, which then carried out pre-programmed orders.
|
||
Ewen said Mitnick "had the ability to do anything the telephone company
|
||
could do. Our belief was, he could have taken the system down."
|
||
One thing he did repeatedly, according to authorities, was disconnect phone
|
||
service to entertainers he admired, especially McNichol, then a star of the
|
||
television show "Family."
|
||
Ridgeway said Mitnick once bragged to her that he had tampered with the
|
||
credit records of FBI agents who investigated him.
|
||
"He had a very vindictive streak," she said. "A whole bunch of people were
|
||
harassed. They call me all the time."
|
||
Even friends were not safe. Rhoades said he once picked up his phone at
|
||
home and heard a recorded message telling him to "please deposit 25 cents."
|
||
DiCicco said he once found that all his company's calls were being forwarded
|
||
to his home phone, a prank he was sure Mitnick was behind.
|
||
Mitnick met his wife two years ago in a class at Computer Learning Center in
|
||
Los Angeles, where he was helping to write a security program to protect the
|
||
school's computer system against hackers. A message suddenly appeared on her
|
||
computer screen asking for a date. Auburn-haired and petite, she looked over
|
||
at him, then typed, "Sure."
|
||
Chivalrous, he walked her to class and even carried her books.
|
||
Mitnick's attorney, Alan Rubin, said everything he can learn about his
|
||
client shows him to be a decent, hard-working man. "We have a picture of him
|
||
that is so out of line with what the government is saying," he said, shaking
|
||
his head.
|
||
In 1987, Mitnick broke into the systems of computer firms in Santa Cruz,
|
||
authorities said. He was so confident, he continued to enter The Santa Cruz
|
||
Operation computers after officials there detected him and electronically sent
|
||
him his own password, "hacker," so they could keep close watch on what he was
|
||
doing.
|
||
The company agreed not to sue him if he would tell them how he had broken
|
||
through the security, and Computer Services Manager Steph Marr said he flew
|
||
down to Los Angeles to meet Mitnick. Marr said he complimented Mitnick's
|
||
abilities with a respectful greeting.
|
||
"Well met, well played," Marr said. But Mitnick shrugged off the praise,
|
||
the executive said.
|
||
"He sort of came across as I was not fully qualified to ask him these
|
||
things."
|
||
Associates said Mitnick believed he was too clever to be caught. He had
|
||
penetrated the DEC network in Massachusetts so effectively, DiCicco said, that
|
||
he could read the personal electronic mail of security people working on the
|
||
case of the mysterious hacker and discover just how close they were getting to
|
||
him.
|
||
But caught he was, again and again, often by authorities tracing the long
|
||
distance calls needed for an outsider to tie in to acomputer. After each
|
||
brush with authorities, however, the lure to return to hacking was too great
|
||
to resist, according to his friends. His mastery of the computer, after all,
|
||
was his "source of self esteem," said Rhoades.
|
||
Friends say Mitnick thought of using his unusual abilities to make a living.
|
||
He and DiCicco were planning to start a business that would advise companies
|
||
how to keep out hackers.
|
||
But strains developed in their relationship, according to DiCicco, when he
|
||
tired of the "dark side" hacking. He said he tried to get away from Mitnick,
|
||
but his friend would search him out.
|
||
Mitnick began visiting DiCicco at night at Voluntary Plan Administrators
|
||
(VPA), a Calabasas firm where DiCicco worked, to use the company's computers.
|
||
DiCicco said that when he grew sick of Mitnick's demands and finally turned
|
||
him down, Mitnick called his boss, impersonated an IRS agent and said DiCicco
|
||
was be investigated.
|
||
It was one malicious prank too many. Confronted by his boss, DiCicco
|
||
"spilled the beans," he said.
|
||
The FBI was called in and watched Mitnick's every move the day before his
|
||
arrest, once recording him after he signed on the computer system at VPA.
|
||
Mitnick dialed into Digital and into a computer system in Leeds, England,
|
||
according to DiCicco and law enforcement officials. DiCicco said Mitnick
|
||
talked British professors into giving him passwords and was already halfway
|
||
into the system when he quit after six hours of hacking.
|
||
He had no second thoughts about turning in his former mentor. "He always
|
||
thought he had his thumb on me," DiCicco said.
|
||
Friends said Mitnick did it all simply for the challenge, what one computer
|
||
expert called finding "a worthy opponent."
|
||
The lack of a profit motive in Mitnick's hacking makes the move to hold him
|
||
without bail repugnant to some defense attorneys. "It's crazy," said Leslie
|
||
Abramson, president of California Attorneys for Criminal Justice in Los
|
||
Angeles.
|
||
"It speaks of the vast power of prosecutors."
|
||
But prosecutors say Mitnick is a new kind of criminal, one who can do as
|
||
much harm with a computer terminal as a bank robber with a gun. They say
|
||
there is evidence he broke into the super-secret National Security Agency
|
||
computers and that other federal charges could be filed soon.
|
||
In addition, county authorities are reviewing evidence against both Mitnick
|
||
and DiCicco of a possible theft of computer software at Pierce College.
|
||
"There is a tendency to look on these things as pranks," said Deputy Dist.
|
||
Atty. Stephen Plafker.
|
||
"Mitnick has got enough of a history now that we can look on him as being
|
||
really dangerous."
|
||
______________________________________________________________________________
|
||
Feds pull plug on most wanted computer hacker - February 17, 1995
|
||
Electronic Hunt nets Mitnick, 31 - From Corpus Cristi Caller Times
|
||
|
||
RALEIGH, N.C. - Federal authorities see him as the world's most wanted
|
||
computer hacker. But to his former therapist, Kevin Mitnick is just "a sad,
|
||
lonely, angry, isolated boy" who spent more time with computers that people.
|
||
Culminating a search that began in November 1992, federal agents arrested
|
||
Mitnick early Wednesday at his Raleigh apartment. Mitnick, who once broke into
|
||
a top secret military defense system as a teen-age prank, allegedly pilfered
|
||
thousands of data files and at least 20,000 credit card number, worming his way
|
||
into ever the most sophisticated systems.
|
||
A detention hearing was scheduled for this morning before a federal
|
||
magistrate. Mitnick, 31, was charged with computer fraud, punishable by 20 years
|
||
in prison, and illegal use of a telephone access device, which carries a
|
||
maximum 15-year sentence. Both crimes also are punishable by $250,000 fines.
|
||
In addition, he was wanted in California for allegedly violating probation on
|
||
a previous hacing conviction.
|
||
"It was an intensive, two-week-long electronic manhunt that involved several
|
||
dozen law enforcement agents around the country," Assistant U.S. Attorney Kent
|
||
Walker in San Fransisco said Thursday.
|
||
But others pooh-poohed the depiction of Mitnick as the cyberthief to beat
|
||
all cyberthieves. "That's what I see, a sad, lonely, angry, isolated boy,"
|
||
Harriet Rosetto, Mitnick's former therapist, told the Daily News of Los
|
||
Angeles after learning of his arrest. "I don't think he's that important a
|
||
person. I think he's become mythical," said said. "That he's become public
|
||
enemy No. 1 is kind of laughable.
|
||
"I think that had he found a way to be accepted in the mainstream, he would
|
||
have joined the mainstream," Rosetto said. "He already had this reputation as
|
||
this Svengali character. Nobody wanted to go near him."
|
||
One of the first indicted under the Computer Security Act of 1987, Mitnick
|
||
was convicted of getting into MCI telephone computers and accessing long-
|
||
distance codes, and of causing $4 million damage to Digital Equipment Corp.
|
||
The $4 million actually represented computer down-time, not damage, said
|
||
attorney Alan Rubin who defended Mitnick. But it was Mitnick's third conviction
|
||
and he served one year in prison. At the 1989 sentencing, U.S. District Judge
|
||
Mariana Pfaelzer ruled that Mitnick's hacing was an addiction, like drugs,
|
||
alcohol or the junk food he lived on. She agreed that he was dangerous when
|
||
armed with a computer and phone line, and ordered him to get therapy and go
|
||
to prison.
|
||
In therapy, Mitnick lost 100 of his nearly 300 pounds and worked on his
|
||
self-esteem, Rosetto said. Tom Perrine, who used to develop software to
|
||
protect classified information for the federal government, said authorities
|
||
are behind when it comes to computer hacking investigations.
|
||
And in the end, it took someone with the skills of Tsutomu Shimomura, a 30
|
||
year old computer security soecialist at the San Diego Supercomputer Center,
|
||
to help the federal agents track Mitnick. Shimomura's own computer at his
|
||
California beach house, which was linked to the system at the center, was hit
|
||
by the hacker on Christmas Day, said center spokeswoman Stephanie Sides.
|
||
Incensed, Shimomura canceled a ski vacation and assembled a team of computer
|
||
experts to hunt down the intruder. They traced Mitnick to Netcom, a nationwide
|
||
Internet access provider, and with the help of federally subpoenated phone
|
||
records determined that he was placing calls from a cellular phone near
|
||
Raleigh-Durham International Airport.
|
||
Early Monday morning, Shimomura drove around Raleigh with a telephone
|
||
company technician. They used a cellular frequency direction-finding antenna
|
||
hooked to a laptop to narrow the search to an apartment complex. The FBI
|
||
arrested Mitnick after a 24-hour stakeout.
|
||
______________________________________________________________________________
|
||
|
||
ÕÍÍÍÍÍÍÍÍÍÍÍÍÍContactÍTheÍPhoneÍLosersÍOfÍAmericaÍNearestÍYou!ÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸
|
||
³ 512-370-4680 PLA Voice Mailbox And PLEASE Don't Pay ³
|
||
³ 512-851-8317 Sonic Youth Systems For Your Fone Calls! ³
|
||
³ 512-883-7543 PLA WHQ Texas Line ³
|
||
³ 618-797-2339 PLA WHQ Illinois Line ³
|
||
ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ;
|