![]() |
![]()
The first, most clearly stated by Shimomura and Markoff themselves in their book Takedown, is that Mitnick was an evil, "dark side" hacker, with unsavory international connections and a bag of tricks that was a threat to the Internet. In this version of events, Mitnick was rightly "taken down" by a superior intellect who was working for the forces of good and the American way.
WHERE DOES THE TRUTH
LIE?
ANSWER: "I believe he left his system(s) open intentionally to attract potential attackers -- leaving him with the option of following the attackers or learning from any of the few interesting techniques he might find," says Capt. Kevin J. Ziese, chief of Countermeasures Development with the U.S. Air Force�s Information Warfare Center in San Antonio, Texas.
"Maybe in wartime the Air Force will want to inflict evil on an opponent. Or maybe instead they�ll pass it to a latter-day J. Edgar Hoover. Either way, it�s evil," Gilmore noted. The second program was software designed to reverse-engineer Shimomura�s Oki 900 cellular telephone. The software, co-developed by Shimomura and Bay Area hacker Mark Lottor, could turn a phone into a cellular scanner. By some readings of the Electronic Communications Privacy Act, mere possession of this software is a crime. According to Takedown, Mitnick allegedly wanted the software because he thought he could use it to make a cellular phone that couldn�t be traced.
ANSWER: It depends on who you are. "Kevin Mitnick was systematically attacking the machines belonging to Internet computer security experts (Dan Framer, Eric Allman, Shimomura etc.) looking for non-public security flaws and sharing them with a loosely connected group of computer outlaws," Markoff wrote me in an e-mail message. "To my mind, he was a public menace who was doing more to damage personal privacy and security in the information age than almost anything I can think of."
In The Fugitive Game, Littman paints a decidedly more sympathetic view of Mitnick. One reason he did so, we are told, is that he did not rely on Markoff�s press accounts of Mitnick�s past exploits. Instead, he tried to verify them and in many cases failed. For example, says Littman, there is no evidence to indicate that Mitnick ever broke into the U.S. military�s computers at NORAD, the North American Aerospace Defense Command computer, even though this supposed stunt is now reported as truth and was even used as the basis for the movie War Games. Transcripts that are published in Takedown (and available on Shimomura�s Web site, http://www.takedown.com/) make it clear that it was a hacker in Israel who was the brains behind Mitnick�s attacks. There isn�t even any proof that ties Mitnick to the Christmas Day attack on Shimomura�s machine. On the other hand, in The Fugitive Game, Littman makes it very clear that Mitnick had detailed, inside knowledge of the attack shortly after it took place. If Mitnick wasn�t the perpetrator, he was definitely close to the source.
ANSWER: That�s Shimomura�s Web site, built for the dual purpose of publicizing his book and telling the world his version of the "facts." Probe further, and you�ll learn that Shimomura�s Web site gets its network service from Shimomura�s erstwhile employer, San Diego Supercomputing Center. Now, you may wonder what a Web site advertising a book (and soon-to-be major motion picture) is doing getting its network service from a federally funded lab. Ann Redelfs, a spokesperson for the lab, says that she doesn�t know if Shimomura�s use of lab resources for personal gain violates any rules. Neither does the federal government�s Inspector General office, although the IG did take an interest in the matter when Internet Underground telephoned asking for an opinion.
ANSWER: Perhaps because that title would have been a little too close to the truth. According to Goodell, Shimomura and Markoff had actually considered putting together a trap for Mitnick in October 1994, two months before the Christmas Day break-in. "Shimomura and [SDSC�s network manager] had planned a Cuckoo�s Egg kind of sting," says Goodell, referring to Cliff Stoll�s best-selling book. "They were going to do the same thing. They even contacted Kathleen Cunningham at the U.S. Marshall�s Office and offered their help."
ANSWER: Eric Corley thinks so. In the attention-grabbing opening scene of Takedown, Shimomura, Markoff and a Sprint Cellular engineer sit in a van with listening equipment, homing in on the elusive Mitnick by tracing the signals from his cellular telephone, listening to Mitnick�s calls in the process. Nearly 300 pages later, when the scene is repeated, Shimomura quotes Markoff as saying, "I recognize that voice! That�s Eric Corley!" Corley, better known as Emmanuel Goldstein, is the editor of the quarterly hacker magazine 2600. He�s upset that Markoff and Shimomura listened in on his conversation -- and angry that the conversation itself is reported in their book. "I feel that they violated my privacy," says Corley. Corley is no fan of the Electronic Communications Privacy Act, the law which prohibits the tapping of cellular telephone calls. Nevertheless, he says, the law specifically forbids tapping people without a warrant and the public release of information obtained from a wiretap. Now, it turns out that the FBI had a wiretap order for Mitnick. But did that order cover Markoff? That depends on whether Markoff was sitting in the van as a "Kevin expert," working on behalf of the FBI, or whether he was there as a reporter for The New York Times. "To the best of my knowledge, John Markoff did not do anything illegal. His role in the investigation was as a source of information about Kevin Mitnick," says John Ken Walker, Jr., a former Assistant U.S. Attorney who worked on the case.
Caught somewhere in the middle of all of this is Sprint Cellular. "I did speak with one of the technicians and the technician�s supervisor," says Sal Cinquegrani, a spokesperson for Sprint Cellular. "We did receive the court order. We were told we were to meet a computer expert. That turned out to be Shimomura. Later some of the local FBI agents met [Sprint�s technicians at] the mobile switching center. Subsequent to that is when Mr. Markoff appeared on the scene. Because there was a lot of interaction between Shimomura and Markoff and others, the assumption was that they all knew each other and worked together. Afterward we learned that he was a reporter. We learned it at the same time that the agents did. The agents requested that Mr. Markoff leave because they were getting into some sensitive areas of the investigation, and Mr. Markoff did in fact leave." Markoff has taken a lot of flak in the press for his back-seat view of the chase and capture. The truth, though, is that there isn�t a journalist alive who wouldn�t have gladly traded places with him. Anybody who says otherwise just has a bad case of sour grapes.
ANSWER: According to The Times, Markoff didn�t have any ethical lapses because he took a leave of absence from The Times to write the book with Shimomura.
One of the reasons that Markoff�s journalistic ethics have been subject to such scrutiny is that he, Shimomura and The New York Times itself have done such a poor job responding to the criticism. For example, although Nielsen says that Markoff followed The Times� conflict-of-interest policy, she and her office refused more than seven formal requests to provide a copy of that policy to Internet Underground. Markoff has said on numerous occasions that his "editors" approved of his writing Takedown. How does that look when it is revealed that Markoff�s editor, Tim Race, was flown to San Francisco during the summer of 1995 and compensated for his role in editing the Takedown manuscript? (Only upon further questioning does one learn that the project was approved not by Race, but by a Times assistant managing editor.) Markoff, meanwhile, questions why everyone is ignoring Littman�s supposed ethical lapse: not telling The Well that it was the subject of a break-in, when Littman knew that Mitnick was running wild on the Internet service. In The Fugitive Game, Littman does say that he called The Well and told them that a hacker had broken in but the person that he spoke to refused to believe the report.
![]() ![]()
|
![]() |