Suport Highway Term Paper

The Free essays given on our site were donated by anonymous users and should not be viewed as samples of our custom writing service. You are welcome to use them to inspire yourself for writing your own term paper. If you need a custom term paper related to the subject of Internet or Suport Highway , you can hire a professional writer here in just a few clicks.

The textbook, Management of Information Technology, defines the information super highway as, “An installed intelligent workstation for office and professional workers in most organizations to connect via the local area network (LAN) or to other nets or to large computer data stores through servers that function as message-switching and message processing systems.” (Frenzel, 1999, p.14). The books continues and identifies a subject by the name of Kevin Mitnick who was arrested on February 15, 1995, for sleuthing on the information highway. This paper will portray the events leading up to the arrest of Kevin Mitnick.

Mitnick, 31, described by the Federal Bureau of Investigations, (FBI), as the “Nations Most Wanted Computer Hacker”, was arrested in his home on February 15, 1995. Mitnick, as described by Forbes Magazine is, “A recreational hacker with a compulsive-obsessive relationship to information. He hoarded information, never sold it, and wouldn’t even share it with his friends.”(published in 1999). What lead up to the arrest and incarceration of Mitnick is described below.

Kevin David Mitnick was cyberspace's most wanted hacker. Mitnick could launch missiles or cripple the world's financial markets with a single phone call - or so went the myth. The FBI, phone companies, bounty hunters, even fellow hackers pursued him over the Internet and through cellular airways. Tsutomo Shimomura, a computational physicist was on vacation when he discovered that someone infiltrated the computers near San Diego, California, and stole several intelligence files. Shimomura became even more involved with the case when the infiltrator tapped into Shimomura’s voice mail system and left him a computer-altered message. Companies. “The attack clearly infuriated the wrong person.” (Frenzel, 199, p.441). Throughout the month of January 1995 and into February 1995, Shimomura and his team of “computer sleuths” monitored the hackers every move—still uncertain who the infiltrator was. “On February 9th, the team moved to Netcom where they set up equipment to capture the hackers every move.” (p.441). On February 13th, 1995, telephone technicians and Shimomura followed the hackers telephone signals and identified an apartment complex near the airport. The following day, investigators had tracked the calls to an actual address and obtained a warrant to search the residence. FBI agents arrested Mitnick who was charged with computer fraud and illegal use of a telephone access device. “Mitnick was charged in North Carolina with 23 counts of access device fraud for his activities shortly before his arrest. In order to expedite his return to California, he agreed to plead guilty to one count and have his case consolidated in Los Angeles. In California, he was charged with an additional 25 counts of access device, wire, and computer fraud. On March 16, 1999, Mitnick plead guilty to five of these counts and two additional counts from the Northern District of California. He was sentenced to 46 months and three years probation, to be served in addition to eight months for his North Carolina plea and 14 months for his probation violation. He was released from prison on January 21, 2000, being eligible for early release after serving almost 60 months of his 68 month sentence.” (http://www.takedown.com/).

.

WORKS CITED

http://www.takedown.com/

Frenzel, Carol., Management Information Technology, International Tompson Publishing, Cambridge, 1999.

Forbes Magazine, 1991.

Bibliography

WORKS CITED

http://www.takedown.com/

Frenzel, Carol., Management Information Technology, International Tompson Publishing, Cambridge, 1999.

Forbes Magazine, 1991.

Word Count: 533

Related Essays on Internet