25 Quotes & Sayings By Kevin Mitnick

Born in New York City in 1963, Kevin Mitnick is a computer security pioneer and author of The Art of Deception: Controlling the Human Element of Security (Random House, 1998). He was one of the first hackers to break into computer systems around the world. He broke into the computer systems of over 300 companies and institutions using sophisticated hacking techniques, including the phone phreaking techniques taught to him by his father. Since his arrest in 1995, Mitnick has become an advocate for computer security Read more

He has spoken at more than 150 colleges, universities, and corporations on issues related to legal liability for information theft.

1
The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and education. Enacting policies and procedures simply won't suffice. Even with oversight the policies and procedures may not be effective: my access to Motorola, Nokia, ATT, Sun depended upon the willingness of people to bypass policies and procedures that were in place for years before I compromised them successfully . Kevin Mitnick
2
Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business. Kevin Mitnick
3
As a young boy, I was taught in high school that hacking was cool. Kevin Mitnick
4
Any type of operating system that I wanted to be able to hack, I basically compromised the source code, copied it over to the university because I didn't have enough space on my 200 megabyte hard drive. Kevin Mitnick
5
I get hired to hack into computers now and sometimes it's actually easier than it was years ago. Kevin Mitnick
6
I started with CB radio, ham radio, and eventually went into computers. And I was just fascinated with it. And back then, when I was in school, computer hacking was encouraged. It was an encouraged activity. In fact, I remember one of the projects my teacher gave me was writing a log-in simulator. Kevin Mitnick
7
Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically. Kevin Mitnick
8
Steve Wozniak and Steve Jobs founded Apple Inc, which set the computing world on its ear with the Macintosh in 1984. Kevin Mitnick
9
It was used for decades to describe talented computer enthusiasts, people whose skill at using computers to solve technical problems and puzzles was - and is - respected and admired by others possessing similar technical skills. Kevin Mitnick
10
I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A. Kevin Mitnick
11
The first programming assignment I had in high school was to find the first 100 Fibonacci numbers. Instead, I thought it would be cooler to write a program to get the teacher's password and all the other students' passwords. And the teacher gave me an A and told the class how smart I was. Kevin Mitnick
12
At the end of the day, my goal was to be the best hacker. Kevin Mitnick
13
People are prone to taking mental shortcuts. They may know that they shouldn't give out certain information, but the fear of not being nice, the fear of appearing ignorant, the fear of a perceived authority figure - all these are triggers, which can be used by a social engineer to convince a person to override established security procedures. Kevin Mitnick
14
Should we fear hackers? Intention is at the heart of this discussion. Kevin Mitnick
15
I trust online banking. You know why? Because if somebody hacks into my account and defrauds my credit card company, or my online bank account, guess who takes the loss? The bank, not me. Kevin Mitnick
16
A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted. Kevin Mitnick
17
I got so passionate about technology. Hacking to me was like a video game. It was about getting trophies. I just kept going on and on, despite all the trouble I was getting into, because I was hooked. Kevin Mitnick
18
What I found personally to be true was that it's easier to manipulate people rather than technology. Kevin Mitnick
19
I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government. Kevin Mitnick
20
The Patriot Act is ludicrous. Terrorists have proved that they are interested in total genocide, not subtle little hacks of the U.S. infrastructure, yet the government wants a blank search warrant to spy and snoop on everyone's communications. Kevin Mitnick
21
My actions constituted pure hacking that resulted in relatively trivial expenses for the companies involved, despite the government's false claims. Kevin Mitnick
22
Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information. Kevin Mitnick
23
I wasn't a hacker for the money, and it wasn't to cause damage. Kevin Mitnick
24
Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause. Kevin Mitnick