Hacker Eludes Federal Authorities: Authorities Consider Man An Electronic Terrorist ------------------------------------------------ By John Johnson, Julie Tamaki Friday, July 15, 1994 Los Angeles Times LOS ANGELES - He's one of America's most wanted digital desperadoes. Kevin Mitnick, a legendary "dark side" hacker whose computer was, in the words of one investigator, an "umbilical cord . . . to his soul," is being sought by federal and state authorities for once again allegedly using his technical wizardry as a weapon. A warrant has been issued accusing him of violating the terms of his federal probation that he not enter a computer illegally. At the same time, the California Department of Motor Vehicles is accusing him of posing as a law-enforcement officer to gain classified information and to possibly create false identities for himself. Though they narrowly missed him at a Los Angeles copy shop where he was picking up some allegedly illegally obtained DMV information, authorities so far haven't been able to catch up with him since they visited the Calabasas, Calif., company he worked for in late 1992. For Mitnick, 30, a former computer nerd who dropped 100 pounds before going into hiding, these are just the latest accusations spanning a career of hacking that began at Monroe High School in North Hills, Calif., when he learned how to access the school district's main computers. Eventually, he was able to break into a North American Air Defense Command computer in Colorado Springs, Colo., several years before the movie "WarGames," about a hacker who nearly starts a war after entering a defense computer. Mitnick also became a skilled "phone phreak" who was able to manipulate the telephone system to pull pranks on friends and enemies, according to authorities. He disconnected service to Hollywood stars he admired, and a former probation officer said her phone service was terminated just as she was about to revoke his probation. "He's an electronic terrorist," said a onetime friend who turned him in to authorities in 1988. Showing the panic he can instill in others, after his arrest in 1988, he was denied bail by three federal judges, who feared what he could do once back on the streets. Much of the fear about Mitnick in law-enforcement quarters appears to stem not from what he has done in any one case but from what mayhem he could cause in our computer-dependent society if he put his mind to it. Mitnick eventually pleaded guilty to one computer crime and served a year in prison. Afterward, he spent almost a year in a Los Angeles residential treatment program, Gateways Beit T'Shuvah, during which time he was not allowed to touch a computer. Harriett Rossetto, the program director, said Mitnick suffered from an addictive-obsessive disorder. "I saw his hacking as an addiction," she said. Mitnick was a loner who was very vulnerable and did not open up easily. In appearance, he resembled the classic computer jockey, overweight, with clunky glasses and shirttail hanging out. At the keyboard of a computer, he felt strong and capable. Rossetto liked him but was not particularly impressed by his intelligence. This has been a recurring theme over the years. Some people see him as a genius with a terminal, while others say his technical abilities are not extraordinary. What is extraordinary, say friends, is his willingness to be consumed for as long as it takes by his appointed task, such as finding a way past a computer's security system. In June 1992, Mitnick went to work for Teltec Investigations Inc., in Calabasas. Company executive Michael Grant said Mitnick was training to be an investigator for the company, which does assets investigations, surveillance and research. Grant said he knew about some of Mitnick's past problems. "He told me he had gone straight." Grant said that while Mitnick was at the company, he did a good job. He lived with another company official, Mark Kasden, a friend of Mitnick's father, Alan. Then in late September of that year, FBI agents showed up and asked to search Mitnick's office. According to an affidavit for another search at the same time, the FBI was conducting a computer and wire fraud investigation into computer hacking and unauthorized entry into Pacific Bell Telephone Co. computers. Mitnick was named as a suspect. The FBI believed that Mitnick the "phone phreak" was back. According to the affidavit, Mitnick or others residing and working at three apartments and a Compton, Calif., company had tapped into telephone and electronic communications to obtain passwords belonging to security investigators, tampered with the computers, and intercepted company voice mail. Neither Grant nor Kasden sees him as destructive. "He's a gentle guy and nonviolent. He's never going to hurt anybody. But some of the stuff he does is irritating," said Grant. But others insist his activities go beyond curiosity and pranksterism to serious crime, such as posing as a law-enforcement officer to gain private information. The New York Times has reported that Mitnick is suspected of stealing software and data from half a dozen cellular phone manufacturers, compromising the security of the phone networks. The DMV has also requested a warrant for his arrest, claiming that in the fall of 1992 he began posing as a law-enforcement officer to obtain sensitive DMV information. "He would give a requesting officer's name and would basically use his identity and birth date," said Bill Madison, a DMV spokesman in Sacramento. Madison believes Mitnick could have gotten the secret law-enforcement PIN numbers he needed by tapping into DMV phone lines in Los Angeles and Sacramento. Authorities got wind of the scam after a DMV technician became suspicious when a man, who identified himself as an investigator for the fraud division of the Los Angeles County Welfare Department, requested DMV information and supplied a fax number the technician did not recognize. The number was traced to a Los Angeles copy shop. Other fax numbers were then traced to copy shops in Sacramento and Santa Monica. Investigators staked out the copy shop, but Mitnick got away. Madison said he believes Mitnick may be using the information to change identities, to wreak havoc on other's lives or possibly for some type of monetary gain. In one case, Mitnick allegedly gained access to a Bay Area man's records and used information in the file to try to change his health-care provider so that he could benefit from the man's medical coverage. He also used the information to take on the identity of the man's dead son in order to obtain a phony driver's license. "It's very scary," Madison said. "You don't want him in your records."