Logo
    Search

    Podcast Summary

    • A hacker's desperate bid for power leads to identity fraud and a dangerous game of cat and mouse with the FBIIn the early 1990s, hackers like Kevin Mitnick, also known as the Condor, used their skills to steal identities and cause chaos on the Internet. Mitnick's actions, including committing identity fraud to regain power, led to a dangerous game of cat and mouse with the FBI and could have even resulted in nuclear war.

      The Internet, in the early 1990s, was a wild frontier where identities could be stolen and hacking was a dangerous game. The story of Kevin Mitnick, aka the Condor, illustrates this perfectly. A notorious hacker, Mitnick grew up fascinated by magic and technology. In 1994, he found himself in a desperate situation when he lost power to his apartment, which contained all his electronics. To regain access, he committed identity fraud, using someone else's name to get power restored. However, this was a trap, and the real Michael Stanfill was already reported as a hacker and identity thief. Mitnick, now on the run from the FBI, had to create a new identity and evade capture. His actions could have led to nuclear war, highlighting the potential dangers of hacking. This episode of "Modem Mischief" explores the darkest reaches of the Internet and the lives affected by notorious hackers.

    • From Shy Child to Elite Hacker: Kevin Mitnick's Journey into the World of Technology and ManipulationKevin Mitnick, a shy child, found solace in magic and ham radios, honing skills in manipulation and social engineering. As a teenager, he became an expert at obtaining sensitive info through phone technicians using charm and charisma. Early experiences set stage for future hacking career.

      Kevin Mitnick, a shy and traumatized child, found solace in the world of magic and later, ham radios. He was drawn to the control and deception these hobbies offered, and as he grew older, he honed his skills in manipulating phone systems through social engineering. By the time he was a teenager, Kevin was an expert at obtaining sensitive information from phone technicians and linemen, using his charm and charisma to gain their trust. This technique, later known as social engineering, allowed him to access a world of information and power, leading him to become a phone freak and part of an elite group of geeks. However, even with this knowledge, Kevin used it in juvenile ways, such as pranking people through drive-thru speakers with overpowered radios. This early experience with technology and manipulation set the stage for Kevin's future as a renowned hacker.

    • Exploiting Fear for Gain in HackingFear of losing data can be used as a tool for hackers to gain unauthorized access. Relationships can also play a role in hacking, leading to betrayals and stolen access.

      Kevin, a mischievous prankster, started his hacking career by exploiting people's fear of losing data. At the age of 17, he gained admin access to an early operating system and used it to hack into various secure networks, including US Leasing's. He posed as DEC support to scare system administrators into giving him passwords. However, his relationship with his girlfriend, Susie Thunder, who was also interested in hacking, turned sour when he spent more time with his hacking partner, Lewis. Susie eventually stole the backdoor access to US Leasing from Lewis. The story illustrates how fear and curiosity can be used to gain unauthorized access to secure systems.

    • Jealousy and revenge lead to law enforcement involvementPersonal vendettas can result in serious consequences, including false accusations and imprisonment. Always ensure information is accurate before reporting to law enforcement.

      The actions of Susan Thunder, fueled by jealousy and a desire for revenge, led to the involvement of law enforcement in the activities of Kevin Mitnick and Lewis De Paine. Susan's accusations of child molestation and harassment, as well as her claims of stolen computer manuals and potential access to sensitive information, ultimately resulted in the two being investigated and charged for their hacking exploits. The consequences of Susan's actions not only put an end to the hacking duo's activities but also led to their eventual imprisonment. This incident serves as a reminder of the potential consequences of personal vendettas and the importance of accurate information when dealing with law enforcement.

    • A young hacker's obsession leads him to break into secure government systemsUnchecked curiosity and the desire for control in the digital world can lead to dangerous consequences, including hacking secure systems and betraying trust.

      The actions of a young hacker named Kevin, who was sent to a juvenile facility after being caught hacking, led him to further explore the world of hacking upon his release. With the help of Lenny, a computer operator at Hughes Aircraft, they gained access to secure government systems, including the National Security Agency's Dockmaster. Despite the risks and consequences, Kevin continued his hacking activities, even betraying the trust of his girlfriend, Bonnie. The thrill of gaining unauthorized access and control fueled his obsession, leading to a series of hacking incidents throughout the 1980s. This story serves as a reminder of the potential dangers and consequences of unchecked curiosity and the desire for control in the digital world.

    • Obsession with hacking led to dangerous situations and high price to payKevin Mitnick's obsession with hacking led him to dangerous situations, causing him to lose all his savings when he married to protect himself, and ultimately resulting in his arrest.

      Kevin Mitnick's obsession with hacking led him into dangerous situations, including a close call with criminal charges and a falling out with a friend. Marriage was a way for him to protect himself and Bonnie from potential incrimination, but the price was high as they lost all their savings. Despite the risks and consequences, Kevin's love for hacking only grew stronger, pushing him to collaborate on larger jobs and pushing relationships to the brink. The line between friendship and rivalry was blurred, leading to betrayal and ultimately, his arrest. Kevin's inability to walk away from challenges and his penchant for pushing boundaries ultimately led to his downfall.

    • The Importance of Technological Understanding in Cybercrime CasesTechnological illiteracy in the legal system can lead to wrongful accusations and unfair trials. Cybersecurity expertise is crucial for investigating and prosecuting cybercrimes effectively.

      The lack of technological understanding during the late 1980s led to a wrongful accusation and imprisonment of a hacker named Kevin Mitnick. Despite his innocence, the judge and prosecutor were unable to make sense of the complex information, resulting in an unfair trial. This incident highlights the importance of technological literacy and understanding in the legal system. In a different case, a cybersecurity expert named Tsutomu Shimomura faced a similar challenge when his computer was hacked, but he was able to use his expertise to track down the hacker and bring them to justice. These events underscore the need for individuals and the legal system to be technologically savvy in order to effectively address cybercrimes.

    • Hacking mistake leads to Kevin Mitnick's captureA hacker's mistake in targeting the wrong person led to the discovery of his location and ultimately his capture, highlighting the importance of maintaining a low profile in the digital world.

      The elusive hacker Kevin Mitnick, who had managed to evade law enforcement for years, made a fatal mistake when he hacked Tsutsomu Shimomura's computer. Mitnick, who was known for his hacking and social engineering skills, had stayed one step ahead of authorities for years, but his actions against Tsutsomu triggered a series of events that ultimately led to his capture. The hack on Tsutsomu's computer led to the discovery of a trap and trace on Mitnick's modem, which alerted law enforcement to his activities. Despite his attempts to cover his tracks and mislead authorities, Mitnick's paranoia grew as he realized he was losing control of his carefully constructed digital life. Tsutsomu, with the help of a Sprint technician, was able to determine the location of Mitnick based on his cell phone activity, leading to his eventual capture. This incident serves as a reminder of the consequences of underestimating the reach and power of law enforcement and the importance of maintaining a low profile in the digital world.

    • FBI's Determination to Capture Notorious Hacker Kevin MitnickThe FBI's advanced capabilities to track and apprehend cybercriminals, despite their attempts to cover their tracks, highlights the importance of robust security measures and the potential consequences of illegal online activities.

      No matter how careful and elusive a person may be in the digital world, law enforcement agencies have advanced capabilities to track and apprehend them. In this case, the FBI used various methods to locate and identify Kevin Mitnick, a notorious hacker, despite his attempts to cover his tracks and evade capture. The incident underscores the importance of security measures and the potential consequences of engaging in illegal activities online. Kevin Mitnick's story serves as a reminder that no one is invulnerable to the long arm of the law in the digital age.

    • The Unjust Punishment of Hacker Kevin MitnickDespite never physically harming or financially gaining from hacking, Kevin Mitnick spent over five years in prison. Post-release, he faced restrictions on computer use and profit from his crimes, but eventually found a career in cybersecurity consulting after testifying before a senate committee.

      The story of Kevin Mitnick, a hacker who spent over five years in prison despite never physically harming anyone or hacking for financial gain, highlights the extreme consequences of the justice system's response to cybercrimes in the late 20th century. The grassroots movement "Free Kevin" formed in response to what activists saw as an unjust punishment, with Kevin eventually pleading guilty to some charges to end his imprisonment. Post-release, Kevin was barred from using computers or profiting from media related to his crimes, making it difficult for him to earn a living. However, a turning point came when Kevin was invited to testify before a senate committee on cyberattacks, leading to a career in consulting and advising organizations on cybersecurity. Today, Kevin uses his hacking skills for good, demonstrating that even those with a criminal past can contribute positively to society. The story underscores the importance of balancing harsh penalties for cybercrimes with opportunities for redemption and rehabilitation.

    Recent Episodes from Modem Mischief

    Colonial Pipeline Hack

    Colonial Pipeline Hack

    The savange ransomware attack of Colonial Pipeline was close to bringing travel in the United States to a standstill.

    Created, Produced & Hosted by Keith Korneluk

    Written & Researched by John Phillips

    Mixed & Mastered by David Swope

    Theme Song You Are Digital by Computerbandit

    Modem Mischief
    enJune 10, 2024

    Vault 7 Hack

    Vault 7 Hack

    Workplace bullying, the Nuclear Option, and why you should never write your passwords down in a notebook. This is the story of Josh Schlute and the Vault 7 Hack. 

    Created, Produced & Hosted by Keith Korneluk

    Written & Researched by Katie Fedigan-Linton

    Mixed & Mastered by David Swope

    Theme Song You Are Digital by Computerbandit

    Modem Mischief
    enMay 27, 2024

    Ransomware Attacks

    Ransomware Attacks

    Digital extortion. Hackers sieze your data and a ransom is paid to retrieve it. But this time, it turned deadly...

    Created, Produced & Hosted by Keith Korneluk

    Written & Researched by Lauren Minkoff

    Mixed & Mastered by David Swope

    Theme Song You Are Digital by Computerbandit

    Modem Mischief
    enMay 20, 2024

    Hector Monsegur (aka Sabu) & Lulzsec

    Hector Monsegur (aka Sabu) & Lulzsec

    We delve into the story of Hector Monsegur, also known as 'Sabu', a central figure in the hacktivist group Lulzsec. Explore his rise to infamy in the cyber world, his pivotal role in high-profile cyber attacks, and the dramatic turn of events that led him to collaborate with law enforcement. Join us for a gripping narrative on the complexities of cyber ethics, activism, and the thin line between right and wrong.

    Created, Produced & Hosted by Keith Korneluk

    Written & Researched by Ed Leer

    Edited, Mixed & Mastered by Greg Bernhard

    Theme Song "You Are Digital" by Computerbandit

    Modem Mischief
    enMay 13, 2024

    ILOVEYOU Computer Worm

    ILOVEYOU Computer Worm

    It infected over 10 million computers and caused millions of dollars of damage world wide. The ILOVEYOU computer worm compromised passwords through a bug in Microsoft Outlook. This is the story of ILOVEYOU and the creator, Onel de Guzman. 

    Created, Produced & Hosted by Keith Korneluk

    Written & Researched by Jim Rowley

    Mixed and Mastered by David Swope

    Theme Song You Are Digital by Computerbandit

    Related Episodes

    Part 1 - Rise of The Silk Road & Ross Ulbricht

    Part 1 - Rise of The Silk Road & Ross Ulbricht

    When Ross Ulbricht decided to go into business for himself, he had no idea that he was going to make history as an international darknet kingpin. This is the story of The Silk Road and Dread Pirate Roberts.

    Created, Hosted and Produced by Keith Korneluk

    Written and Researched by Lauren Minkoff

    Mixed and Mastered by David Swope.

    Theme Song, You Are Digital composed by Computerbandit.

    Support us on Patreon

    BONUS: Max Headroom Signal HiJack

    BONUS: Max Headroom Signal HiJack

    The year was 1987. A Chicago television station's broadcast was eerily interrupted by someone in a Max Headroom mask. Things were said. Bare bottoms were spanked. Viewers were left in shock.  And it all happened on live television.

    This is a special bonus episode of Modem Mischief. Further bonus episodes will be released on the first Friday of every month to our subscribers on Patreon. Support us there to get the next ones!

    Support us on Patreon

    Created, Produced and Hosted by Keith Korneluk

    Written and Researched by Lauren Minkoff

    Mixed and Mastered by David Swope

    Theme Song, You Are Digital, composed by Computerbandit

     

    John McAfee. Drugs, Women and Computer Viruses

    John McAfee. Drugs, Women and Computer Viruses
    The man loved drugs, women and dogs (not necessarily in that order). He also created anti-virus software that ran on practically every computer. He lived hard and  he partied even harder. This is the story of John McAfee.

    Support us on Patreon

    Giveaway! Win a $50 gift card to Amazon. All you have to do is rate us 5 stars on Apple Podcasts and write us a review. Then screenshot the review and email it to keith@modemmischief.com. You'll be automatically entered. This giveaway closes February 1, 2022.

    Created, Produced & Hosted by Keith Korneluk

    Written & Researched by Lauren Minkoff

    Edited, Mixed & Mastered by Greg Bernhard

    Theme Song “You Are Digital” by Computerbandit

    Part 2 - Fall of The Silk Road & Dread Pirate Roberts

    Part 2 - Fall of The Silk Road & Dread Pirate Roberts

    Despite the popularity of The Silk Road, life for Ross Ulbricht aka Dread Pirate Roberts is spiraling out of control and law enforcement is at his heels. This is the story of the downfall of The Silk Road.

    Created, Produced and Hosted by Keith Korneluk

    Written and Researched by Lauren Minkoff

    Mixed and Mastered by David Swope

    Theme Song, You Are Digital, composed by Computerbandit

    Support us on Patreon