Skip to content
From the High Desert book cover

From the High Desert

A Cultural History of Art Bell

Thumbnail for March 26, 2005: Real Hacking Stories - Kevin Mitnick

March 26, 2005: Real Hacking Stories - Kevin Mitnick

Mar 26, 2005
2h 54m
0:00 / 0:00
Art Bell opens with discussion of the energy crisis ahead, noting that CNN ran a feature on Willie Nelson's biodiesel following the show's earlier coverage. He reflects on the national trauma of the Terri Schiavo case and reports on bird flu concerns in the Netherlands, genetically modified corn accidentally entering the food supply, and the remarkable discovery of soft tissue inside a T-Rex fossil. A cat named Kane survives 44 days sealed inside a dresser during a cross-country move.

Security consultant and former hacker Kevin Mitnick joins to share real stories from the world of computer intrusion. He recounts his journey from teenage phone phreaking and high school pranks to stealing source code from major corporations, becoming a fugitive for three years under assumed identities, and ultimately being arrested by the FBI. Mitnick explains how social engineering attacks exploit human trust, describing scenarios where an attacker gains building access through simple psychological manipulation.

Mitnick details the growing threat of identity theft, explaining how readily available public records containing mothers' maiden names and social security numbers make it simple for criminals to assume someone's identity. He discusses the vulnerabilities of wireless networks, noting that war drivers can access unsecured corporate systems from parking lots, and reveals that contest participants at the DEFCON hacker conference communicated with a wireless access point from 51 miles away. He warns that convenience consistently wins over security in the modern digital landscape.

Key Moments

  1. From CB radio to stealing the teacher's password: Mitnick traces his origin: as a kid he loved CB and amateur radio, drifted into phone phreaking and exploring the switching network, then in his first high school computer class - assigned to write a Fibonacci program - he instead wrote a fake login that captured his teacher's username and password.

  2. Whistling into a phone to start a nuclear war: Mitnick recounts his 1988 case in which a federal prosecutor told a judge that Mitnick could start a nuclear war by simply whistling into a telephone - a claim Mitnick says was so detached from reality that he panicked, expecting to be held in solitary, and went on the run.

  3. Three years on the run as Eric Weiss: Mitnick describes three years as a fugitive from the FBI, working as a system administrator in a law firm, then a Seattle hospital IT department, then in Raleigh, under the assumed name Eric Weiss - the real birth name of Harry Houdini.

  4. Social engineering: the five-dollar bill at the front desk: Mitnick defines social engineering and walks through a textbook attack: a man in a suit hands a busy receptionist a five-dollar bill claiming he found it on the floor, builds rapport, then later returns to ask a small favor that gives him a foothold inside the company - or, in another scenario, plants a wireless access point behind the corporate firewall and walks out.

  5. DEFCON: hijacking a wireless network from 51 miles away: Mitnick tells Art about an annual DEFCON contest in Las Vegas where contestants build their own antennas and try to associate with a wireless access point at extreme distance. The winners hitchhiked to Vegas and pulled off a connection from 51 miles away.