The Cyberthief and the Samurai: The True Story of Kevin Mitnick - and the Man Who Hunted Him Down

Overview

Kevin Mitnick was the most wanted hacker in the world.

He was called "The Condor," and "Mr. Cyberpunk." He was a rebel. A loner. A poor kid from California thumbing his nose at society as he hacked into phone companies, international corporations—and possibly even the U.S. Military Command.

The FBI ...
See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (12) from $1.99   
  • New (1) from $215.00   
  • Used (11) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$215.00
Seller since 2014

Feedback rating:

(146)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Kevin Mitnick was the most wanted hacker in the world.

He was called "The Condor," and "Mr. Cyberpunk." He was a rebel. A loner. A poor kid from California thumbing his nose at society as he hacked into phone companies, international corporations—and possibly even the U.S. Military Command.

The FBI couldn't stop him. And they sure as hell couldn't catch him.

Then Kevin Mitnick did the "impossible." He got into the personal home computer of the man considered by many a master of cybersecurity, Tsutomu Shimomura. That computer held data for advanced security systems and top secret intrusion and surveillance tools.

Shimomura—a modern-day intellectual samurai—decided Mitnick had to be stopped. He had the high-tech gadgets and the brains to do it.

Now the leading expert on computer crime made it a matter of honor to bring America's most notorious computer criminal to justice. But the Information Highway is the perfect place to run, hide and get away with dirty tricks...

Let the battle begin.

By the age of 30, Mitnick has become the ultimate hacker--and the world's most wanted computer criminal. No systems are safe. The FBI can't stop him. But Mitnick has met his match when he does the impossible by breaking into the home computer of the master of cyber-security, Tsutomu Shimomura. As an act of honor, Shimomura dedicates himself to stopping Mitnick. Original.

Read More Show Less

Editorial Reviews

Publishers Weekly - Publisher's Weekly
Goodell, a journalist who first wrote about Mitnick for Rolling Stone, here describes how computer hacker Kevin Mitnick was tracked down and finally caught with the help of computer security agent Tsutomu Shimomura. But this is not just a high-speed chase along the information superhighway; it is also the story of how the media hyped the concepts of the hacker and the high tech theft. There is enough accurate technical information to intrigue and educate readers (especially about cellular phones), and Goodell provides a good, clear look at the people, egos, companies and agencies involved in the search for this troubled man. But the mass of details and personalities threatens to overwhelm the book, and the plot plods slowly until the end of the final chase and capture. (Mar.)
Read More Show Less

Product Details

  • ISBN-13: 9780440222057
  • Publisher: Random House Publishing Group
  • Publication date: 2/1/1996
  • Format: Mass Market Paperback
  • Pages: 328
  • Product dimensions: 4.23 (w) x 6.94 (h) x 1.00 (d)

Read an Excerpt

INTRODUCTION

February 16, 1995, cyberspace went Hollywood. That morning, on the front page of The New York Times, in a box in the top left comer--the spot traditionally reserved by the Times' editors for the second most important story of the day--was the headline: "A Most-Wanted Cyberthief Is Caught in His Own Web." Beside it was a photo of the cyberthief himself, Kevin Mitnick. He looked fat and bloated. Glasses. Dark hair. The picture of a nerd gone bad.

By contrast, the man who captured him, Tsutomu Shimomura, whose photo appeared inside the paper, looked impish and exotic. Long, dark hair flowing over his slender shoulders. Bright, slightly buggy eyes. Asian. The picture of a samurai warrior.

The dramatic opposition of these two characters played out in the story too. It was written by Jon Markoff, the Times' ace technology reporter, in classic Times style: cool, factual, authoritative. But the story had the shape and feel of a Hollywood western. It was a cyberduel between two archetypical characters, a tale of pursuit and cell phones, of mysterious computer break-ins and complex digital sleuthing.

It was more than just a great yarn. The story also tapped into rising fears about high-tech crime and computer espionage. Over the last decade or so, the engine that runs the American economy has gone digital: from Wall Street to Wal-Mart, businesses are relying more and more on computers and electronic networks to track and control daily transactions. Banks are rushing to set up shop on the Internet, medical records are forwarded over phone lines, corporate computers have become prized information vaults. As more and more valuable information goes on-line, the risk that it will be misused or stolen skyrockets. Fifteen years ago, a wayward hacker couldn't do much more than inconvenience a few university researchers. Today, he could conceivably shut down an entire country.

That's the fear, anyway. In fact, the days of the digital desperado riding free and easy on the electronic frontier were about over. By the winter of 1995, cyberspace had become a fairly civilized place: there was digicash and cyberbabes, web star and pet chat, electronic AIDS quilts and digital family trees. More and more, the electronic frontier was starting to look like real life. It was a stubbornly democratic world, to be sure. Computer networks took the power of the media out of the hands of the few and delivered it into the hands of the many. But it didn't show any signs of altering the human spirit. On-line, people had the same desires and emotions, the same social problems and cultural battles. And the same thirst for heroes and villains.

Kevin and Tsutomu fit the bill nicely. All you had to do was look at the pictures and you could see that Kevin was the bad guy. In the first paragraph of the Times story, he was identified as a "31 year-old computer expert accused of a long crime spree that includes the theft of thousands of data files and at least 20,000 credit card numbers from Computer systems around the nation." (About ten 'paragraphs later, the Times pointed out that there was no evidence Kevin ever profited from those credit card numbers.) Besides having swiped--thousands of megabytes of proprietary software, according to the Times, Kevin had broken into a North American Air Defense (command computer in 1982. There was no mention of how he got into this military computer, or what his intentions might have been--was he showing off to friends, or was he trying to launch a missile?--but still, the implication was there. He was a dangerous virus in the system, an evil genius who could roam the world via the global Internet. "He was arguably the most wanted computer hacker in the world," a United States Attorney in San Francisco was quoted as saying. "He allegedly had access to trade secrets worth millions of dollars. He was a very big threat."

And Tsutomu, well, he was straight out of central casting. At the San Diego Supercomputer Center, where Tsutomu worked as a computational physicist, the halls were abuzz with speculation about who would play him in the movie. "Maybe Keanu Reeves, if he grew his hair long? Or maybe Tsutomu will insist on an Asian actor," one administrator mused the day after the story appeared. Plopped there in the sleepy pages of the Times, Tsutomu reeked of hipness and heroism. He was a wizard's wizard, a mild-mannered scientist who had been living a mild-mannered life in his beach cottage near San Diego until someone was foolish enough to break into his home computers. Then Tsutomu was forced to defend his personal honor and the public good. Over a period of several weeks, with the help of a pocketful of gizmos and home-brewed hacker-tracking software, Tsutomu accomplished what law enforcement couldn't: he finally put Kevin Mitnick behind bars where he belonged.

It was a compelling story, one that played off our deepest fears and anxieties about the technological revolution that was unsettling our lives and changing the way we work and live.

But was it really all so simple?
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)