Settings

Theme

Kevin Mitnik FOIA Final

vault.fbi.gov

200 points by thembones a year ago · 98 comments

Reader

LorenDB a year ago

This will pair well with Mitnick's autobiography Ghost in the Wires, in which you get to read Mitnick's side of the story.

  • fabiensanglard a year ago

    If you are into this topic, read as many point of view as possible and take a look at http://www.takedown.com/ (Tsutomu Shimomura's side of the story).

    • daghamm a year ago

      I've far more respect for Tsutomu. In the end he turned out to be the better hacker.

      Reading Mitnicks book I sometimes get the impression that the he is making up half of it.

      • tptacek a year ago

        To the best of my knowledge, Mitnick didn't really code at all. There are (let's call them) intrusion specialists whose skillsets don't really involve systems programming, but rather intuition and tenacity, and there are others who write exploits. My understanding is that Mitnick was the former, and was using tools he got from friends and peers.

        • vasco a year ago

          In the book he spends a lot of time on the social engineering parts of it to be honest. It's been a few years but I remember him mostly bragging about that rather than developing custom exploits.

          • tptacek a year ago

            He also comes from an era of intrusions where systems were so bad you didn't really need to code to get into them. For an alarmingly long time, the most effective tool you could use to pop a network was simply `showmount`.

            • ASalazarMX a year ago

              That time is still today, as people are still the weakest link. A talented scammer can convince people to give them access to their WhatsApp account despite the E2EE, 2FA, and SMS verification codes.

              In Mitnik's version, he RTFMs, learned the technical lingo, procedures, and even the names of telco employees.

              • devmor a year ago

                100%

                The majority of corporate breaches are a combination of poor Least Privilege practices and phishing/smishing.

                Even with well secured, alert personnel, you often see ISPs and Telcos socially engineered to gain access to an employee account.

            • d1sxeyes a year ago

              Yeah I think Mitnik’s abilities were mostly around thinking about doing stuff that no-one had considered that you could do. It’s still a big skill, but nowadays, there’s less stuff that no-one has thought about before.

        • ajsnigrutin a year ago

          He didn't really code in the book either... maybe 5% of the book... he did some script kiddie type exploits, some copying of proof of concepts, and some minor modifications (like modifying the "logon" program to save passwords somewhere in cleartext).

          75% of the book is spent social engineering over the phone and 20% doing stuff on phone switches and other equipment.

        • jasonfarnon a year ago

          the steve jobs of hacking

        • giancarlostoro a year ago

          I have met the type on my time on the internet. All it takes is having the guts to push through with what others give you, things they themselves know would get them in legal hell.

      • sidewndr46 a year ago

        He's also on the winning side, so I imagine it'd be in his best interest to make himself look better.

      • 29athrowaway a year ago

        John Markoff was the one that made everything up.

        Freedom Downtime is a documentary that explains it.

      • indrora a year ago

        Anyone who has studied the later parts of the phone system know that at least a few of his stories are actually bullshit.

        It wouldn't be until much later (in the 90s at least, while he was in prison) that the advent of pure digital switching would enable the random reassignment of phone lines like he describes in the story about turning his friend's home phone into a payphone.

        The lines were separated and had differences in sender frames just for payphones, plus typical phones weren't too happy when 130VDC was applied to them for very long.

        The fact of the matter is that Mitnick went around and shook doorhandles until something opened and occasionally convinced someone to open a door for him her and there, and the fact that the emperor had no clothes was too politically inconvenient for the kinds of companies that Mitnick hit up.

        • kevin_thibedeau a year ago

          The 4ESS was a pure digital switch starting in 1976.

        • quesera a year ago

          Medium-sized US exchanges were being converted to ESS in the 1980s.

          I remember the day my busy signal changed from a buzz (350+440 Hz) to a tone (480+620 Hz).

      • jazz9k a year ago

        I heard him on Art Bell multiple times talking about it. I many cases, someone else did the ground work and he just used it.

      • MG9991ep545a1l3 a year ago

        Kevin hasn’t hacked anything at all. He ran with a few other characters who never received anywhere near the amount of attention that Mitnick did. For example, no one ever figured out who “jsz” was.

      • jamal-kumar a year ago

        After hearing his voice messages in a fake asian voice trying to mess with Shimomura, I kinda lost all respect for Mitnick.

  • freedomben a year ago

    Ghost in the Wires[1] is a really phenomenal and entertaining book btw. If you go audiobook, Ray Porter does the narration and absolutely crushes it.

    [1] Available DRM-free at Downpour (https://www.downpour.com/ghost-in-the-wires?sp=19991) and at Libro.fm (https://libro.fm/audiobooks/9781483067216-ghost-in-the-wires)

486sx33 a year ago

I think a lot of this was social engineering, but at one time the fbi considered mitnik some kind of super hacker. How did that disconnect happen? I imagine because his targets didn’t want to admit to the fbi how crappy their security was, so they would just say omg! We got hacked!

Big moments I remember from his book.

1. Gaining access to a telco C/O and social engineering his way out after being caught

2. Ultimately being caught by sloppy practices himself, logging into systems he was comfortable with and getting traced, and then forgetting some sort of identification in a ski jacket he hadn’t used in a long time, which was in his closet in a place he was living under a new identity.

It’s been awhile so I could be partly off on those details. But I’d say at least those pieces are very believable.

rglover a year ago

It should be illegal for the government to keep redactions in anything made public/declassified. It's a slap in the face to see entire sections of text (that most certainly contain important context) blocked out with a white blob.

  • Latty a year ago

    Seems like a great way to ensure nothing gets declassified, as any tiny part that is still relevant then blocks the whole document.

  • toast0 a year ago

    If that were the requirement, documents would not be made public/declassified unless the entire document was considered safe to release.

    In many cases, a partial public document is better than no public document.

    • taurknaut a year ago

      A) a lot of what is censored ends up being publicly-known information already, so it's not a matter of safety but rather public image (imo), and B) this creates a perverse incentive to associate national security (...or other sources of unsafety) with unrelated topics to avoid having to hold yourself accountable for your work.

      Plus, there's little way of knowing for the documents for which we haven't seen the uncensored version if they aren't just censoring arbitrary things.

      It may be reality, but it's still pretty bad for any government that pretends to value transparency.

    • timewizard a year ago

      The people who generate the documents /cannot/ be the people who decide if they're safe to release. There needs to be independent oversight. These are not agency documents they belong to the public. They may be classified but the moment they're no longer _objectively_ worth classifying they are absolutely public domain material.

      It's also extremely offensive to see the names of AUSA's (Assistant US Attourneys) and SA's (FBI Special Agents) redacted. They had personal involvement in this case so I genuinely don't understand why their names cannot or should not be a part of this document. They're public figures in a public role.

      • dkga a year ago

        I completely disagree. In this case, it is clear there wouldn‘t be a reprisal but in many case law enforcement agents and prosecution teams get involved in might involve serious reprisal threat for them or their loved ones. Their names should never be revealed.

        • timewizard a year ago

          I think you possibly haven't read very many court documents. When these cases actually get tried much of this becomes public anyways. In particular this document details agents Mitnick _himself_ spoke with. Are you really suggesting their redactions here are to prevent reprisals? How could that possibly work?

          • Muromec a year ago

            It's one thing if Kevin Motnick knows and the other if all of the internet knows and it's indexable

            • timewizard a year ago

              So he goes on a blog and types it.

              Are we not at square one again?

              And did Mitnick ever know Motnick? Am I experiencing the Mandala effect here?

  • palijer a year ago

    Why do we need to have the names of people like a random security guard that was duped by social engineering? To make sure he pays for a mistake or something? What is the reason for not reacting his name?

    • rglover a year ago

      I'm not concerned with names. It's entire paragraphs that may have names in them that are redacted. If it's just a name or address, redact that, sure.

      "Called -------- on July 1st, 1983 to get access to a router"

      Is much better than

      "----------------------------------------------------------"

      • some_random a year ago

        Unless we get an unredacted version leaked in the future it's impossible to say what the redacted paragraphs say, but this document has a ton of the former style of redaction which makes me trust that the larger redactions (ie page 42) were in fact necessary to protect PII as labeled.

    • palmotea a year ago

      > What is the reason for not reacting his name?

      The reason is GP doesn't understand the reason, so there is no reason, so it must be made public. /s

  • ocschwar a year ago

    The Mitnick files contain information about innocent people who are alive and whose privacy rights remain paramount.

    • vasco a year ago

      Perhaps too naive a question, but if they are innocent what is there to protect? I get it in the case of informants or agents that operate undercover or in plains clothes but if just a bystander how is it different than some news article?

      • some_random a year ago

        Their privacy, which has value to them and should be respected. You can argue it on a case by case basis but the default is (and should be) to not disclose. As for comparisons to news articles, well maybe this is a place where the government is doing better than some news agencies (reasoning as to why is left to the reader).

      • itishappy a year ago

        What's your name and address? (Rhetorical question, please don't answer.) Is that info you'd be comfortable sharing on a public forum? I presume you're not doing anything particularly wrong.

        This also assumes that we can all agree on a definition for "innocent."

        > what is there to protect?

        Their privacy. Some people have strong opinions on 3 letter agencies and poor reading comprehension. Some people are just mean spirited. Best way to prevent dumb stuff from happening is to not create a situation where dumb stuff could happen.

        • genewitch a year ago

          Licensed ham radio operators give their address every 15 minutes by law. And their full name. Sometimes it's a PO box, but mostly a home address's.

          I can't think of anything more public than airwaves.

          • some_random a year ago

            There are many things you're allowed to disclose about yourself that are considered unacceptable to disclose about others without their consent.

          • jagged-chisel a year ago

            That regulation is known before one signs up to be a ham. So the disclosure is voluntary.

          • verandaguy a year ago

            This is a bad take. Plenty of licenses involve essentially exchanging a right for a privilege (in simple terms). People who aren't comfortable with this compromise have the choice to not get a certain type of license (and many don't, HAM radio licenses aren't held by anywhere near a sizeable chunk of the population).

            Is the underlying assumption that everyone redacted in that report is a licensed HAM radio user deprived of their right to have a private name and address?

          • ajsnigrutin a year ago

            Sure, they know what they're doing and they're doing it on purpose.

            If you rented out a room (or even a hotel room) to Eric Weiss (mitnicks alias, one of many), do you really want everyone here to see your full name and address?

            Or if someone hacked some database of users and used your name/surname to socially engineer someone else.

            or worse!

      • yieldcrv a year ago

        maybe you told someone you were going to be some place else

        maybe you were with your other family and this unwarranted disclosure revealed that to a scorned spouse and friend group that are always looking for holes in the story 40 years later

        not criminal issues, not an FBI problem, and yet can alter your private life

      • chgs a year ago

        Nothing to hide, nothing to fear?

      • dgacmu a year ago

        Details about victims whose release might cause them further harm is the obvious one.

  • runjake a year ago

    I completely disagree. Nothing would get declassified.

    Anyway, each redaction has a usually-legible Exemption code next to it that tells you why it's redacted. You can find out what those are here:

    https://foia.wiki/wiki/Exemptions

    For example, you see 7c/b7c in the document a lot:

    "could reasonably be expected to constitute an unwarranted invasion of personal privacy"

  • gmueckl a year ago

    There may be a middle ground where, with some effort effort, a watered down summary of the redacted information could be given (e.g. if a name of a person is redacted, replace it with some sort of unique handle). As long as this is done as an annotations for the visibly marked redaction, I see no problem. The reader may choose to trust those annotations or not.

    • rglover a year ago

      This would be fair (I hadn't considered names in my original comment). Whether truly sensitive or not, protecting names/addresses/numbers/etc. would make sense (especially if there was a footnote to a "why" something was redacted).

    • Muromec a year ago

      Ukrainian court rulings do this -- it's always person_1 meeting person_2 at address_1, so only the parties have an unredacted ruling, while redacted one is publicly searchable

    • cgriswald a year ago

      Plain redactions require the same amount of trust in the redacter but are less likely to leak information.

  • DamnInteresting a year ago

    I write a lot about history, and as part of that work I occasionally file FOIA requests. There was one occasion where the FBI's response contained dozens of pages that were typewritten memos consisting of:

    To: [recipient name]

    From: [sender name]

    Date: [date]

    [Multiple paragraphs of redacted text]

    ...and that was basically it. It was funny, but frustrating (funstrating?).

    Example: https://www.damninteresting.com/temp/memo.jpg

  • londons_explore a year ago

    Also, the human effort required to make the redactions is high.

    That means records cannot be automatically declassified after N years because the effort to redact every document created N years ago would be extreme.

jamal-kumar a year ago

This is pretty damn interesting, it's definitely the earliest example of a computer intrusion incident response report that I've ever seen. These reports detail stuff he was doing in 1980/1981 at the earliest I can see just skimming the top few pages. His own side of this particular chapter of his history is maybe worth a read, maybe not - he was known for embellishments:

https://web.archive.org/web/20090317050834/http://www.themem...

Helithumper a year ago

Surprised that personal info such as Kevin’s SSN wasn’t removed prior to release.

  • klodolph a year ago

    Other people have mentioned this… but it’s been established in policy that the SSN of a deceased person is not PII. There are a ton of different ways to get the SSN of someone who is deceased.

    • userbinator a year ago

      If anything, having it public could dissuade others from trying to use it.

      • wildzzz a year ago

        They aren't "public" but if you have a good reason, the govt will let you see the list of dead people SSNs. It's one of the first things checked when you're trying to open a line of credit because it's so easy to verify.

  • dgacmu a year ago

    Er, what risk does the release of an SSN pose to someone two years deceased?

    • hinkley a year ago

      TIL.

      Now I’m wondering how many other people in this thread don’t know he died (pancreatic cancer). 59 isn’t that old. And he was expecting a baby at the time, which suggests maybe they didnt think so either.

  • joering2 a year ago

    Steve's Job SSN is 549-94-3295. How can this release harm a dead person?

    • jfengel a year ago

      Him, probably not. His estate, however, potentially. Perhaps one could get a loan, using his SSN, and his estate gets the bill and subsequent harassment.

      SSNs make terrible secrets and it's insane that you could harm a live person by knowing their SSN. I doubt that insanity stops just because you're dead.

      • klodolph a year ago

        > I doubt that insanity stops just because you're dead.

        It really does stop. What can you do with someone’s SSN? Get loans, open bank accounts, receive government benefits, set up utilities, etc. It harms someone because creditors falsely believe that the SSN’s holder owes the debt, or the government believes that the SSN’s holder received benefits, etc.

        People who are falsely reported as dead have a difficult time doing anything… certainly a hard time getting loans. It’s certainly going to be hard to make a claim against an estate that’s been closed for a couple years, with a debt that is dated after that person’s death.

        • sidewndr46 a year ago

          It's worse if you share a name and birth date with someone, doubly worse if they die before you.

          In general, identity verification is a joke in the US. At best its a racket.

        • colechristensen a year ago

          If someone is asking for an SSN they’ll be doing a credit report which will show if you’ve died.

          • kmoser a year ago

            Well, it might show if you've been reported to have died. It's possible you were reported as dead but you're still alive. It's possible you weren't reported dead but are. And it's also possible that regardless of how you were reported, the credit agency will botch the lookup and report your dead-or-alive status wrong.

            Given the amount of erroneous information in credit files, I wouldn't be surprised if the above scenarios happen regularly.

      • dgacmu a year ago

        Estates are issued their own, fresh TIN (taxpayer id). Once established they don't operate under the SSN of the deceased.

      • gosub100 a year ago

        Creditors have access to the death index too.

    • spydum a year ago

      Didn't you read Elon's post? SSNs database isn't deduplicated!

  • cap11235 a year ago

    On top of that, he'd be super popular as a target for anything because tons of folks, including non-technical, know the name "Mitnick" very well.

  • dylan604 a year ago

    But they clearly left the year visible so blocking out the AUSA's name seems dumb too as it wouldn't be hard to look up who were the AUSAs to narrow down who was named in the file.

    The entire redacting seems just so superficial

toomuchtodo a year ago

https://web.archive.org/web/20250206232604/https://vault.fbi...

jonstewart a year ago

s/Mitnik/Mitnick/

CodeWriter23 a year ago

1981? Security mostly was knowing which phone number to dial in, according to a deceased friend of mine.

  • SJC_Hacker a year ago

    I guess thats why Matthew Broderick's character had a script which dialed random numbers in a target area code (I think he used Sunnyvale, CA in the movie)

    I wonder if anyone did that back in the day. Not sure how much the telco would have appreciated it ...

    • CodeWriter23 a year ago

      Never used an auto-dialer myself, but it would be trivial to code one. Just send ATDT<number> out the serial port and see if "CONNECT" comes back before timing out.

      Back in that time, I think a good rate was $0.01/minute for a local call on a consumer landline. Unlimited calling plans came later. Not attributing any intent to the telco, just saying, there would be no cost issue to motivate an investigation.

      • SJC_Hacker a year ago

        It definitely wasn't local - he was in Washington but dialed into Sunnyvale, CA.

        I can't remember charges for local exchanges (same area code), but I only remember as far back as the late 80s. It was something like 10 cents a minute. I remember all the adds about "friends and family" special rates/etc. Metering on voice calls persisted into the 2000s.

        But the calls were very brief (if they did pick up) unless he got a "hit". So thousands of calls could have no charge

        Or maybe he spliced into his neighbors line :-)

taylorbuley a year ago

The password to the system was "BRIS," the name of the vendor.

  • TimC123456 a year ago

    I laughed when I read that, too. Like locking up that “$2MM dollars of information” in a vault secured with a piece of string.

Peacefulz a year ago

I have read Ghost in the Wires many times. I'm excited to see the other side of the tale. Thanks for sharing!

daft_pink a year ago

Do they have a processing step where they add in random dots everywhere?

  • gwbas1c a year ago

    It's called noise. It's clearly typewritten text scanned at black and white.

  • NikolaNovak a year ago

    I get a dismissable dialogue box upon viewing the document, explaining the context and quality (i.e. scanning noise), including fairly explicit:

    "The image quality contained within this site is subject to the condition of the original documents and original scanning efforts."

    Hope that helps! :)

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection