This website uses cookies to ensure you have the best experience. Learn more

The Computer Criminal Computer Crimes And A Brief Story Of Kevin David Mitnick. Include Details Of His Parole And Intermediate Punishment Sentence. Fully Cited. Includes References.

4223 words - 17 pages

As a poor and neglected child from the suburbs of California, Kevin Mitnick would later become the most famous computer criminal in the history of the United States. He was quiet, overweight, wore glasses and resembled the stereotypical look of your everyday computer nerd. His problem was that his curiosities lead him into an area of crime, which at the time, was yet to be taken seriously. His crime was that of "hacking." Mitnick was responsible for numerous illegal computer break-ins to many information databases including phone companies, large corporations, and even the United States government. Throughout his career he was a dangerous threat to not only the privacy of the lives of thousands of innocent people, but also he posed a threat to the overall infrastructure of the United States. Following his initial violation of probation, Mitnick began on a criminal journey as he ran from the authorities for years without being able to be caught. The longer he was a fugitive, the more he became a criminal.As a teenager, Mitnick was fascinated with the telephone system. It was this curiosity with technology that drove him to his criminal life. Along with his group of friends, Mitnick would play tricks on the phone company as he discovered ways to cheat the system and manipulate phone companies. Most of these crimes went unnoticed as he frequently made long distance phone calls for free and racked up several thousand dollars of phone bills without anyone ever knowing. "It was the computer equivalent of sending your friend 14 pizzas" stated Mitnick's lawyer Alan Rubin (Klein, 1989). This infatuation with technology increased with the development and availability of computers. By the early eighties Mitnick was only a seventeen-year-old kid when he was finally caught.Mitnick would often spend hours of the night crawling around in dumpsters located outside of phone and computer corporations searching for discarded papers containing anything from employee lists to system usernames and passwords. In this case, he'd got his hands on pass codes for the COSMOS (Computer System for Mainframe Operations) System which was responsible for keeping records and carrying out service orders for major telephone companies (Hafner and Markoff, 1990). He used the names of the employees to pose as a service worker for the system and make his way into the building and access one of the COSMOS computers. Here he used the pass codes to break into the computer system and browse the confidential files. Unfortunately, Mitnick's presence in the system did not go unnoticed. He was caught that same night and later charged with one count of burglary and one count of computer fraud. Facing a prison term at the California Youth Authority prison, Mitnick pled guilty to both counts and was sentenced to probation. He received a ninety-day psychological evaluation and received one year's probation in which he was not allowed to operate a computer or a telephone.Less than a year later,...

Find Another Essay On THE COMPUTER CRIMINAL - Computer crimes and a brief story of Kevin David Mitnick. Include details of his parole and intermediate punishment sentence. Fully cited. Includes references.

Computer Crimes Essay

779 words - 3 pages The computer has evolved a great deal since its creation over a third of a century ago. The uses of the computer now seem endless. Unfortunately some of those uses include computer crimes. This paper will explore some recent crimes that have occurred and the laws that apply to them.The first such incident took place in Russia between June and October 1994. Six people were arrested in the scheme, in which $10 million was allegedly shifted from

Computer Forensics and Criminal Justice Essay

745 words - 3 pages A good and clear understanding of the relationship between the criminal justice system and computer crimes is a key factor in the investigation of those crimes. It is important for the investigator to know how to work his/her investigation within the system and not to overlook an element that might hinder or terminate the investigation. Paying attention to the criminal justice system when, dealing with computer crimes results in success in

Title: Muhammads Life and his Teachings. This paper is a chronological detail of the great Prophet Muhammad. It includes the details of the Islamic faith

1123 words - 4 pages The third most important religion of the western world is considered to be Islam. It is the youngest of all religions and began in 610 A.D. by a gentleman named Muhammad, after being visited by the Archangel Gabriel. The angle recited verses to Muhammad that changed his life. He then became a prophet and began preaching about ideas that were very different from the beliefs of the people who lived around him. One of the most important ideas was

Computer Crimes Speech

664 words - 3 pages Computer crimes are on the rise 1 in 10 Americans experience some form of a malicious attack on their computer system. If you pay attention to the rest of this speech you will understand how a Hackers mind works and how to defend yourself from them. In this speech I will tell you why and how people break into computers, what sorts of trouble they cause, and what kind of punishment lie ahead for them if caught.Hackers and Crackers break into

Johann Sebastian Bach: This details his life and studies from his brith to his death. Also includes famous works of his

687 words - 3 pages . From 1723 to 1750, he was Hofkomponist in the city of Leipzig. He would remain in Leipzig composing various fugues, cantatas, and masses until his death on July 28, 1750 at the age of 65 as a result of a stroke. Johann Sebastian Bach affected the Baroque era so greatly, that musical historians mark the end of the Baroque period with his death.Famous WorksHis famous compositions include the Brandenburg Concertos, The St. Matthew Passion, Chorale

Asian Gangs in North America. Fully cited. References included

3033 words - 12 pages The on-going problem with violent crimes committed by Asian gangs in North America has escalated over the past decade. When people hear of the term Asian gang, most people associate it to organized crime, which isn't completely correct. When using the term Asian, this includes many ethnic groups such as Korean, Chinese, Japanese, and Vietnamese to just name a few. According to "Asian Gangs: A Bibliography" by Bihn P. Le (1999), Asian gangs are a

Early and Later Writings of Karl Marx. Compares the classical works of Karl Marx and looks at some of his most well known theories. Includes works cited

2110 words - 8 pages The Early and Later Writings of Karl MarxClassical Marxism has had an influence in a number of areas. One may first think of economics, but Karl Marx's theories have also affected ideas about history, society, ideology, culture, and politics, just to name a few. From his early writings in liberal newspapers to his later ones such as Capital, Marx remained true to his revolutionary ideas and Communist thinking. As most writers, his style may have

The philosophy of Thoreau as potrayed in "Walden"--two main quotes the depict the central idea of his philosophy and trancedentalism and specific details to back it up. Includes a bibliography

1070 words - 4 pages "Philosophy of Thoreau""Why should we be in such desperate haste to succeed, and in such desperate enterprises? If a man does not keep pace with his companions, perhaps it is because he hears a different drummer. Let him step to the music which he hears, however measured or far away" (Thoreau 345). In Walden, Henry David Thoreau bases his philosophy of the true meaning of life on the importance of self-reliance to gain self-fulfillment, the

This is a college essay on Gandi, his life and his works. Includes works cited and parenthetical documentation

1918 words - 8 pages passive resistance to, and non-cooperation with, the South African authorities. Part of the inspiration for this policy came from the Russian writer Leo Tolstoy, whose influence on Gandhi was profound. Gandhi also acknowledged his debt to the teachings of Christ and to the 19th-century American writer Henry David Thoreau, especially to Thoreau's famous essay "Civil Disobedience" (1) Gandhi considered the terms passive resistance and civil

Computer crimes need to be prevented and halted through increased computer network security measures as well as tougher laws and enforcement of those laws in cyberspace

3335 words - 13 pages the lawful use of data or denies access to data to any person who is entitled to accessthereto.These Canadian are already outdated, and they are only eleven years old. They need to be amended to include stiffer penalties. At the time of the creation of the laws in 1985, they were deemed adequate, because computers crimes were not looked upon as a serious issue with far-reaching effects. In 1996, computer crime has become a damaging and dangerous

Michael Dell and his Computer Manufacturing Company

1515 words - 7 pages Michael Dell had steered his company through many phases and obstacles, making it one of the first computer manufacturers in the world. Basing the company on a direct sales model, with Dell being the only company in the beginning to do so, he grew the business many fold and simultaneously kept cost and inventory levels at a minimum (Days of inventory at 6 days, the lowest amongst peers). This formula worked well for the company till the market

Similar Essays

And Indepth Look At The Trial Of Kevin Mitnick. Fully Cited. References Included

3297 words - 13 pages government bent out of line in order to unconstitutionally bleed a guilty plea out of Kevin Mitnick. Their desire to get Mitnick back for humiliating them in their never-ending pursuit to find him and to send a message to other would-be hackers served as the driving forces behind the illegitimate trial. The American court system turned a minor computer criminal in to a victim of excessive prosecutorial zeal.REFERENCESAdair, David N. Jr.1988Jail time

Categories Of Computer Crimes Essay

1277 words - 5 pages instrument of a crime, computers as incidental to crime, and crimes associated with the prevalence of computers.The first computer crime category is computers as the target. During this crime, the attacker attempts to deny a computer's authorized user and/or owner from services which the user would typically freely have access to. Another aspect of this crime category is when a cyber criminal alters data the computer's owner feels is privately

Mark Twain And His Influence Of Religion, Includes Works Cited

2340 words - 9 pages Throughout his writings and his life, Mark Twain earned a reputation as a cynical critic of Christianity, as illustrated by observation that "if Christ were here, there is one thing he would not be, a Christian." (Twain, Mark Twain s Notebook 328). In Twain's collection of letters and essays contained in Letters from the Earth, his writings include several letters which interpret different religions and the Bible. Excerpts from Adam's, Eve's and

Computer Crimes Essay

1101 words - 4 pages Computer Crimes Computer crimes are a major issue in the world today. They are taken place in people’s home, office, and in lots of places. A person should be very cautious about the type of personal information that they enter on there someone else’s computer as well as there own. These things could come back to haunt you in the future. Criminal activity where a computer or network is the source, target, place or tool of a crime is what we