Settings

Theme

Kevin Mitnik FOIA Final

vault.fbi.gov

200 points by thembones 10 months ago · 98 comments

Reader

LorenDB 10 months ago

This will pair well with Mitnick's autobiography Ghost in the Wires, in which you get to read Mitnick's side of the story.

  • fabiensanglard 10 months ago

    If you are into this topic, read as many point of view as possible and take a look at http://www.takedown.com/ (Tsutomu Shimomura's side of the story).

    • daghamm 10 months ago

      I've far more respect for Tsutomu. In the end he turned out to be the better hacker.

      Reading Mitnicks book I sometimes get the impression that the he is making up half of it.

      • tptacek 10 months ago

        To the best of my knowledge, Mitnick didn't really code at all. There are (let's call them) intrusion specialists whose skillsets don't really involve systems programming, but rather intuition and tenacity, and there are others who write exploits. My understanding is that Mitnick was the former, and was using tools he got from friends and peers.

        • vasco 10 months ago

          In the book he spends a lot of time on the social engineering parts of it to be honest. It's been a few years but I remember him mostly bragging about that rather than developing custom exploits.

          • tptacek 10 months ago

            He also comes from an era of intrusions where systems were so bad you didn't really need to code to get into them. For an alarmingly long time, the most effective tool you could use to pop a network was simply `showmount`.

            • ASalazarMX 10 months ago

              That time is still today, as people are still the weakest link. A talented scammer can convince people to give them access to their WhatsApp account despite the E2EE, 2FA, and SMS verification codes.

              In Mitnik's version, he RTFMs, learned the technical lingo, procedures, and even the names of telco employees.

              • devmor 10 months ago

                100%

                The majority of corporate breaches are a combination of poor Least Privilege practices and phishing/smishing.

                Even with well secured, alert personnel, you often see ISPs and Telcos socially engineered to gain access to an employee account.

            • d1sxeyes 10 months ago

              Yeah I think Mitnik’s abilities were mostly around thinking about doing stuff that no-one had considered that you could do. It’s still a big skill, but nowadays, there’s less stuff that no-one has thought about before.

        • ajsnigrutin 10 months ago

          He didn't really code in the book either... maybe 5% of the book... he did some script kiddie type exploits, some copying of proof of concepts, and some minor modifications (like modifying the "logon" program to save passwords somewhere in cleartext).

          75% of the book is spent social engineering over the phone and 20% doing stuff on phone switches and other equipment.

        • jasonfarnon 10 months ago

          the steve jobs of hacking

        • giancarlostoro 10 months ago

          I have met the type on my time on the internet. All it takes is having the guts to push through with what others give you, things they themselves know would get them in legal hell.

      • sidewndr46 10 months ago

        He's also on the winning side, so I imagine it'd be in his best interest to make himself look better.

      • 29athrowaway 10 months ago

        John Markoff was the one that made everything up.

        Freedom Downtime is a documentary that explains it.

      • indrora 10 months ago

        Anyone who has studied the later parts of the phone system know that at least a few of his stories are actually bullshit.

        It wouldn't be until much later (in the 90s at least, while he was in prison) that the advent of pure digital switching would enable the random reassignment of phone lines like he describes in the story about turning his friend's home phone into a payphone.

        The lines were separated and had differences in sender frames just for payphones, plus typical phones weren't too happy when 130VDC was applied to them for very long.

        The fact of the matter is that Mitnick went around and shook doorhandles until something opened and occasionally convinced someone to open a door for him her and there, and the fact that the emperor had no clothes was too politically inconvenient for the kinds of companies that Mitnick hit up.

        • kevin_thibedeau 10 months ago

          The 4ESS was a pure digital switch starting in 1976.

        • quesera 10 months ago

          Medium-sized US exchanges were being converted to ESS in the 1980s.

          I remember the day my busy signal changed from a buzz (350+440 Hz) to a tone (480+620 Hz).

      • jazz9k 10 months ago

        I heard him on Art Bell multiple times talking about it. I many cases, someone else did the ground work and he just used it.

      • MG9991ep545a1l3 10 months ago

        Kevin hasn’t hacked anything at all. He ran with a few other characters who never received anywhere near the amount of attention that Mitnick did. For example, no one ever figured out who “jsz” was.

      • jamal-kumar 10 months ago

        After hearing his voice messages in a fake asian voice trying to mess with Shimomura, I kinda lost all respect for Mitnick.

  • freedomben 10 months ago

    Ghost in the Wires[1] is a really phenomenal and entertaining book btw. If you go audiobook, Ray Porter does the narration and absolutely crushes it.

    [1] Available DRM-free at Downpour (https://www.downpour.com/ghost-in-the-wires?sp=19991) and at Libro.fm (https://libro.fm/audiobooks/9781483067216-ghost-in-the-wires)

486sx33 10 months ago

I think a lot of this was social engineering, but at one time the fbi considered mitnik some kind of super hacker. How did that disconnect happen? I imagine because his targets didn’t want to admit to the fbi how crappy their security was, so they would just say omg! We got hacked!

Big moments I remember from his book.

1. Gaining access to a telco C/O and social engineering his way out after being caught

2. Ultimately being caught by sloppy practices himself, logging into systems he was comfortable with and getting traced, and then forgetting some sort of identification in a ski jacket he hadn’t used in a long time, which was in his closet in a place he was living under a new identity.

It’s been awhile so I could be partly off on those details. But I’d say at least those pieces are very believable.

rglover 10 months ago

It should be illegal for the government to keep redactions in anything made public/declassified. It's a slap in the face to see entire sections of text (that most certainly contain important context) blocked out with a white blob.

  • Latty 10 months ago

    Seems like a great way to ensure nothing gets declassified, as any tiny part that is still relevant then blocks the whole document.

  • toast0 10 months ago

    If that were the requirement, documents would not be made public/declassified unless the entire document was considered safe to release.

    In many cases, a partial public document is better than no public document.

    • taurknaut 10 months ago

      A) a lot of what is censored ends up being publicly-known information already, so it's not a matter of safety but rather public image (imo), and B) this creates a perverse incentive to associate national security (...or other sources of unsafety) with unrelated topics to avoid having to hold yourself accountable for your work.

      Plus, there's little way of knowing for the documents for which we haven't seen the uncensored version if they aren't just censoring arbitrary things.

      It may be reality, but it's still pretty bad for any government that pretends to value transparency.

    • timewizard 10 months ago

      The people who generate the documents /cannot/ be the people who decide if they're safe to release. There needs to be independent oversight. These are not agency documents they belong to the public. They may be classified but the moment they're no longer _objectively_ worth classifying they are absolutely public domain material.

      It's also extremely offensive to see the names of AUSA's (Assistant US Attourneys) and SA's (FBI Special Agents) redacted. They had personal involvement in this case so I genuinely don't understand why their names cannot or should not be a part of this document. They're public figures in a public role.

      • dkga 10 months ago

        I completely disagree. In this case, it is clear there wouldn‘t be a reprisal but in many case law enforcement agents and prosecution teams get involved in might involve serious reprisal threat for them or their loved ones. Their names should never be revealed.

        • timewizard 10 months ago

          I think you possibly haven't read very many court documents. When these cases actually get tried much of this becomes public anyways. In particular this document details agents Mitnick _himself_ spoke with. Are you really suggesting their redactions here are to prevent reprisals? How could that possibly work?

          • Muromec 10 months ago

            It's one thing if Kevin Motnick knows and the other if all of the internet knows and it's indexable

            • timewizard 10 months ago

              So he goes on a blog and types it.

              Are we not at square one again?

              And did Mitnick ever know Motnick? Am I experiencing the Mandala effect here?

  • palijer 10 months ago

    Why do we need to have the names of people like a random security guard that was duped by social engineering? To make sure he pays for a mistake or something? What is the reason for not reacting his name?

    • rglover 10 months ago

      I'm not concerned with names. It's entire paragraphs that may have names in them that are redacted. If it's just a name or address, redact that, sure.

      "Called -------- on July 1st, 1983 to get access to a router"

      Is much better than

      "----------------------------------------------------------"

      • some_random 10 months ago

        Unless we get an unredacted version leaked in the future it's impossible to say what the redacted paragraphs say, but this document has a ton of the former style of redaction which makes me trust that the larger redactions (ie page 42) were in fact necessary to protect PII as labeled.

    • palmotea 10 months ago

      > What is the reason for not reacting his name?

      The reason is GP doesn't understand the reason, so there is no reason, so it must be made public. /s

  • ocschwar 10 months ago

    The Mitnick files contain information about innocent people who are alive and whose privacy rights remain paramount.

    • vasco 10 months ago

      Perhaps too naive a question, but if they are innocent what is there to protect? I get it in the case of informants or agents that operate undercover or in plains clothes but if just a bystander how is it different than some news article?

      • some_random 10 months ago

        Their privacy, which has value to them and should be respected. You can argue it on a case by case basis but the default is (and should be) to not disclose. As for comparisons to news articles, well maybe this is a place where the government is doing better than some news agencies (reasoning as to why is left to the reader).

      • itishappy 10 months ago

        What's your name and address? (Rhetorical question, please don't answer.) Is that info you'd be comfortable sharing on a public forum? I presume you're not doing anything particularly wrong.

        This also assumes that we can all agree on a definition for "innocent."

        > what is there to protect?

        Their privacy. Some people have strong opinions on 3 letter agencies and poor reading comprehension. Some people are just mean spirited. Best way to prevent dumb stuff from happening is to not create a situation where dumb stuff could happen.

        • genewitch 10 months ago

          Licensed ham radio operators give their address every 15 minutes by law. And their full name. Sometimes it's a PO box, but mostly a home address's.

          I can't think of anything more public than airwaves.

          • some_random 10 months ago

            There are many things you're allowed to disclose about yourself that are considered unacceptable to disclose about others without their consent.

          • jagged-chisel 10 months ago

            That regulation is known before one signs up to be a ham. So the disclosure is voluntary.

          • verandaguy 10 months ago

            This is a bad take. Plenty of licenses involve essentially exchanging a right for a privilege (in simple terms). People who aren't comfortable with this compromise have the choice to not get a certain type of license (and many don't, HAM radio licenses aren't held by anywhere near a sizeable chunk of the population).

            Is the underlying assumption that everyone redacted in that report is a licensed HAM radio user deprived of their right to have a private name and address?

          • ajsnigrutin 10 months ago

            Sure, they know what they're doing and they're doing it on purpose.

            If you rented out a room (or even a hotel room) to Eric Weiss (mitnicks alias, one of many), do you really want everyone here to see your full name and address?

            Or if someone hacked some database of users and used your name/surname to socially engineer someone else.

            or worse!

      • yieldcrv 10 months ago

        maybe you told someone you were going to be some place else

        maybe you were with your other family and this unwarranted disclosure revealed that to a scorned spouse and friend group that are always looking for holes in the story 40 years later

        not criminal issues, not an FBI problem, and yet can alter your private life

      • chgs 10 months ago

        Nothing to hide, nothing to fear?

      • dgacmu 10 months ago

        Details about victims whose release might cause them further harm is the obvious one.

  • runjake 10 months ago

    I completely disagree. Nothing would get declassified.

    Anyway, each redaction has a usually-legible Exemption code next to it that tells you why it's redacted. You can find out what those are here:

    https://foia.wiki/wiki/Exemptions

    For example, you see 7c/b7c in the document a lot:

    "could reasonably be expected to constitute an unwarranted invasion of personal privacy"

  • gmueckl 10 months ago

    There may be a middle ground where, with some effort effort, a watered down summary of the redacted information could be given (e.g. if a name of a person is redacted, replace it with some sort of unique handle). As long as this is done as an annotations for the visibly marked redaction, I see no problem. The reader may choose to trust those annotations or not.

    • rglover 10 months ago

      This would be fair (I hadn't considered names in my original comment). Whether truly sensitive or not, protecting names/addresses/numbers/etc. would make sense (especially if there was a footnote to a "why" something was redacted).

    • Muromec 10 months ago

      Ukrainian court rulings do this -- it's always person_1 meeting person_2 at address_1, so only the parties have an unredacted ruling, while redacted one is publicly searchable

    • cgriswald 10 months ago

      Plain redactions require the same amount of trust in the redacter but are less likely to leak information.

  • DamnInteresting 10 months ago

    I write a lot about history, and as part of that work I occasionally file FOIA requests. There was one occasion where the FBI's response contained dozens of pages that were typewritten memos consisting of:

    To: [recipient name]

    From: [sender name]

    Date: [date]

    [Multiple paragraphs of redacted text]

    ...and that was basically it. It was funny, but frustrating (funstrating?).

    Example: https://www.damninteresting.com/temp/memo.jpg

  • londons_explore 10 months ago

    Also, the human effort required to make the redactions is high.

    That means records cannot be automatically declassified after N years because the effort to redact every document created N years ago would be extreme.

jamal-kumar 10 months ago

This is pretty damn interesting, it's definitely the earliest example of a computer intrusion incident response report that I've ever seen. These reports detail stuff he was doing in 1980/1981 at the earliest I can see just skimming the top few pages. His own side of this particular chapter of his history is maybe worth a read, maybe not - he was known for embellishments:

https://web.archive.org/web/20090317050834/http://www.themem...

Helithumper 10 months ago

Surprised that personal info such as Kevin’s SSN wasn’t removed prior to release.

  • klodolph 10 months ago

    Other people have mentioned this… but it’s been established in policy that the SSN of a deceased person is not PII. There are a ton of different ways to get the SSN of someone who is deceased.

    • userbinator 10 months ago

      If anything, having it public could dissuade others from trying to use it.

      • wildzzz 10 months ago

        They aren't "public" but if you have a good reason, the govt will let you see the list of dead people SSNs. It's one of the first things checked when you're trying to open a line of credit because it's so easy to verify.

  • dgacmu 10 months ago

    Er, what risk does the release of an SSN pose to someone two years deceased?

  • joering2 10 months ago

    Steve's Job SSN is 549-94-3295. How can this release harm a dead person?

    • jfengel 10 months ago

      Him, probably not. His estate, however, potentially. Perhaps one could get a loan, using his SSN, and his estate gets the bill and subsequent harassment.

      SSNs make terrible secrets and it's insane that you could harm a live person by knowing their SSN. I doubt that insanity stops just because you're dead.

      • klodolph 10 months ago

        > I doubt that insanity stops just because you're dead.

        It really does stop. What can you do with someone’s SSN? Get loans, open bank accounts, receive government benefits, set up utilities, etc. It harms someone because creditors falsely believe that the SSN’s holder owes the debt, or the government believes that the SSN’s holder received benefits, etc.

        People who are falsely reported as dead have a difficult time doing anything… certainly a hard time getting loans. It’s certainly going to be hard to make a claim against an estate that’s been closed for a couple years, with a debt that is dated after that person’s death.

        • sidewndr46 10 months ago

          It's worse if you share a name and birth date with someone, doubly worse if they die before you.

          In general, identity verification is a joke in the US. At best its a racket.

        • colechristensen 10 months ago

          If someone is asking for an SSN they’ll be doing a credit report which will show if you’ve died.

          • kmoser 10 months ago

            Well, it might show if you've been reported to have died. It's possible you were reported as dead but you're still alive. It's possible you weren't reported dead but are. And it's also possible that regardless of how you were reported, the credit agency will botch the lookup and report your dead-or-alive status wrong.

            Given the amount of erroneous information in credit files, I wouldn't be surprised if the above scenarios happen regularly.

      • dgacmu 10 months ago

        Estates are issued their own, fresh TIN (taxpayer id). Once established they don't operate under the SSN of the deceased.

      • gosub100 10 months ago

        Creditors have access to the death index too.

    • spydum 10 months ago

      Didn't you read Elon's post? SSNs database isn't deduplicated!

  • cap11235 10 months ago

    On top of that, he'd be super popular as a target for anything because tons of folks, including non-technical, know the name "Mitnick" very well.

  • dylan604 10 months ago

    But they clearly left the year visible so blocking out the AUSA's name seems dumb too as it wouldn't be hard to look up who were the AUSAs to narrow down who was named in the file.

    The entire redacting seems just so superficial

toomuchtodo 10 months ago

https://web.archive.org/web/20250206232604/https://vault.fbi...

jonstewart 10 months ago

s/Mitnik/Mitnick/

CodeWriter23 10 months ago

1981? Security mostly was knowing which phone number to dial in, according to a deceased friend of mine.

  • SJC_Hacker 10 months ago

    I guess thats why Matthew Broderick's character had a script which dialed random numbers in a target area code (I think he used Sunnyvale, CA in the movie)

    I wonder if anyone did that back in the day. Not sure how much the telco would have appreciated it ...

    • CodeWriter23 10 months ago

      Never used an auto-dialer myself, but it would be trivial to code one. Just send ATDT<number> out the serial port and see if "CONNECT" comes back before timing out.

      Back in that time, I think a good rate was $0.01/minute for a local call on a consumer landline. Unlimited calling plans came later. Not attributing any intent to the telco, just saying, there would be no cost issue to motivate an investigation.

      • SJC_Hacker 10 months ago

        It definitely wasn't local - he was in Washington but dialed into Sunnyvale, CA.

        I can't remember charges for local exchanges (same area code), but I only remember as far back as the late 80s. It was something like 10 cents a minute. I remember all the adds about "friends and family" special rates/etc. Metering on voice calls persisted into the 2000s.

        But the calls were very brief (if they did pick up) unless he got a "hit". So thousands of calls could have no charge

        Or maybe he spliced into his neighbors line :-)

taylorbuley 10 months ago

The password to the system was "BRIS," the name of the vendor.

  • TimC123456 10 months ago

    I laughed when I read that, too. Like locking up that “$2MM dollars of information” in a vault secured with a piece of string.

Peacefulz 10 months ago

I have read Ghost in the Wires many times. I'm excited to see the other side of the tale. Thanks for sharing!

daft_pink 10 months ago

Do they have a processing step where they add in random dots everywhere?

  • gwbas1c 10 months ago

    It's called noise. It's clearly typewritten text scanned at black and white.

  • NikolaNovak 10 months ago

    I get a dismissable dialogue box upon viewing the document, explaining the context and quality (i.e. scanning noise), including fairly explicit:

    "The image quality contained within this site is subject to the condition of the original documents and original scanning efforts."

    Hope that helps! :)

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection