[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Mitnick #3: Markoff responds again to Platt
Topic 1119 [media]: Media Appearances of WELLperns VI, S.F.Bay Area Division
#212 of 296: john markoff (johnm) Wed Jan 3 '96 (16:58) 256 lines
<hidden>
My response to Charles Platt's rebuttal.....
JM Writes: "The darkside hacker label was created during the late
1980s by the Southern California press. It is a label that I noted,
but I didn't create. However, he's right I don't regret using it. And
also for the record, Kevin Mitnick used to drive around in Las Vegas
with a stack of copies of Cyberpunk in the trunk of his car to give
away to admirers. He is on record as saying the book is '20 percent
inaccurate.'"
>JM is confusing the issue. I never suggested he invented the "darkside
>hacker" term. This is totally irrelevant. I said, very specifically, that
>he was the first to *apply* this label to Mitnick. JM does not actually
>deny this, and I believe it is true.
Sorry, you're wrong. The "darkside hacker" label was used in the headlines
of Southern California press coverage of Mitnick in 1987-8, in particular by
John Johnson, an LA Times metro reporter. I was not the first one to use the
term with respect to Mitnick.
Re my description of his initial article about Mitnick for the NY
Times, JM writes: "This is really inaccurate. Kevin Mitnick had become
notorious nationally in the late 1980s as a result of his being
arrested for attacks on Digital Equipment Computers. A menacing mug
shot? It was the only photo available. No actual news? Not the way I
remember it. The news was that he was being pursued by the FBI (three
agents full time), the California DMV, US Marshalls, telco security,
local police, etc. The further news was that the FBI had told cellular
telephone companies that they believed the fugitive had stolen
software from at least six cellular phone manufacturers. I thought
then, and still think, this merited a story. I also think the story
was a good yarn. Mitnick had succeeded in evading law enforcement for
more than a year - again."
>"Notorious" in what sense? This is another of those vague terms that JM
>throws around without limiting or defining it. Mitnick may have been
>"notorious" in hacker circles, but not in the eyes of the general public.
>My point was, and is, that JM converted Mitnick from a relatively obscure
>hacker into a public figure. JM tries to evade this point but cannot
>specifically deny it. As for Mitnick being "actively pursued," I believe
>this is a vast overstatement. As I understand it, law enforcement had
>largely lost interest until JM's news item embarrassed them. Even after
>that, according to JM's own book _Takedown,_ law enforcement had to be
>prodded into taking action. They seemed not to share JM's perception of
>Mitnick as a severe threat. They certainly didn't characterize him as one
>of "America's most wanted."
Since when is "notorious" a vague term? The dictionary def. of notorious is
"generally known and talked of." Kevin Mitnick had national press attention
in at least two cases (Los Angeles 1981 and Los Angeles 1987) and there were
a number of articles in the Los Angeles Times, which the last time I checked
was not a hacker quarterly, before Katie and I wrote about him in Cyberpunk.
He was notorious.
Charles is just plain wrong about the issue of pursuit: There was a US
Marshalls search for him for a parole violation, a team of FBI agents in LA
was detailed to finding Mitnick, telecommunications companies in Seattle and
Southern California were pursuing him, California DMV had a special
investigator looking for him. I could go on....Law enforcement did not have
to be prodded into action. The first thing Tsutomu did when he was invited
to the Well was meet with a US attorney and FBI agents who had an open case.
In response to my statement that Kevin Mitnick has never been accused
of intentionally damaging a computer, JM writes: "Wrong again. He was
accused of doing more than $100,000 damage at US Leasing, a SF time
sharing company in 1980. Their system was trashed by a group that
Mitnick was a member of. After that, at various other times he cost
companies tens of thousands of dollars trying to close the door on his
attacks.
>With all due respect, this is not fair or accurate journalism. Was Mitnick
>*active* in the group that caused the alleged damage? Did he play a
>personal role? Does JM know? If not, he's just slinging mud. This is a
>smear and should not be presented as if it is a fact. On the other hand,
>if there is evidence that Mitnick was indeed actively responsible, I will
>gladly admit that I didn't know of this.
Kevin was convicted in this case in the Spring of 1982. He spent 90 days in
juvenile detention, he was given a year's probation.
>As for the money that companies spent fixing the security weaknesses that
>allowed Mitnick to gain access, it is grossly unfair and misleading for
>JM to throw this into a paragraph discussing "intentional damage." This
>is exactly the kind of deliberate blurring of different kinds of computer
>misuse that I complained about in my review.
I'm afraid that Charles has confused me here. I simply gave an example
where intentional damage was done for which Kevin was convicted. I didn't
say that he always damaged machines, I simply object to the portrayal of him
as an innocent
Regarding Mitnick's "most wanted" status, JM writes: "Sorry, but I
didn't create the character, Kevin did. He has now been arrested six
times in fifteen years. Each time, except for this last time, he was
given a second chance to get his act together. He chose not too. It
seems to me that he is an adult and makes choices. He chose to keep
breaking in to computers. He knew what the penalty was. So what's the
problem?"
>Of course Mitnick is responsible for his actions. I never disputed this,
>and never suggested he was innocent of the crimes for which he was
>convicted. I merely suggested that the crimes were relatively trivial and
>were exaggerated out of all proportion by JM's extravagant prose.
>Exaggeration, imprecision, and innuendo: *that's* the problem, JM.
In a passage above Charles accuses me of being vague, now he says that
exaggeration, imprecision and innuendo are the problem. Boy, talk about
being vague. But I guess we've descended to the nyah, nyah level.... 8)
JM writes: "A witch hunt? Give me a break. It was an article
describing a law enforcement hunt for a fugitive, who had been
arrested five times previously, convicted at least three times, and
was known to be attacking the computers of the nation's cellular
telephone companies."
>My review complained that JM throws around words such as "attack" without
>ever defining them in computer terms. He's still doing it here in his
>rebuttal. Kevin Mitnick never attacked any computer, by my understanding
>of the word.
Mitnick was persistent and frequently arrogant in his break-ins into dozens
of different computers. Attack is not an exaggeration.
Re Mitnick's dangerousness, JM writes: "This is just not true. Kevin
Mitnick was actively sharing system vulnerabilities with other people
on the net. That is about the most damaging thing that could be done
to the Internet community."
>Is JM aware that some highly respected security experts believe that
>sharing news of vulnerabilities is the best way to encourage better
>security? True, this is a controversial subject; but certainly the
>sharing of vulnerabilities is NOT "the most damaging thing that could be
>done to the Internet community." That's just another of those wildly
>exaggerated phrases that JM throws out for emotional effect. I can think
>of many politicians--and even a few journalists--who pose a far greater
>danger to the future of the net than Kevin Mitnick ever did.
Charles probably missed the followup discussion on this point, but I think
there is a dramatic difference between distributing information publicly and
sharing it in a clandestine fashion with a small gang of crackers the way
Mitnick was doing it. I assume from his comments that Charles thinks that
issues like Internet privacy and security are trivial and don't really
matter very much. I disagree with him here.
Re the petty gossip in _Takedown,_ JM writes: "The reason we described
what happened at Toad Hall on Xmas was that the attacks first came
from toad.com while Tsutomu and Julia were there. If we hadn't have
been complete in our description someone would have charged us with a
cover up. Please remember that David Bank, a San Jose Mercury
reporter, spent several weeks pursuing the hypothesis that Tsutomu had
attack his own computers."
>Uh-huh. And I suppose the rest of the sordid, relentlessly personal thread
>in _Takedown,_ describing every little nuance of Shimomura's campaign to
>steal someone's long-term girlfriend, was merely included so that no one
>could complain that the account was incomplete? Really!
Sharon Fisher had a good response to the notion of girlfriend as property.
Charles is being viciously innaccurate here.
In my review, I complained about pejorative terms (such as "attack")
that JM uses repeatedly. His response: "Perjorative?? Yikes! I mean we
could go to the dictionary....."
>Well, I guess JM *should* go to the dictionary. If he does, he will find
>that pejorative is a perfectly good word which I spelled correctly. It's
>ironic that he seems unaware of it, since it so aptly describes his
>own journalistic technique.
This is getting weird again. I still don't have any problem with using the
word "attack" and would use it again. I think Charles has sort of run out of
gas trying to mount a defense against something that is basicly
indefensible. It's just not ok to read other people's mail, steal commercial
software, leave trojan horses scattered around, and systematically alter
system software. No matter how you dress it up, its criminal activity.
Re my assertion that all charges but one against Mitnick have been
dropped, JM replies: "Wrong. Kevin Mitnick is in jail in Los Angeles
facing charges from more than six United States Federal Districts. He
may go on trial or he may plea bargain."
>I tried to contact Mitnick's attorney before I wrote my review. He did
>not return my calls. I based my statement on information from three other
>sources. If it's incorrect, obviously I stand corrected. As I understand
>it, though, those charges from other federal districts may not have been
>actually filed. Is "facing charges" another of those slightly misleading
>terms that makes the situation sound worse than it really is? Are the
>charges actual, or potential?
Why didn't Charles think to give any of half a dozen US District Attorney's
a call and chat with them about the charges that are being brought against
Kevin Mitncik. For those who are curious there is a plea bargaining process
going on now and Mitnick has a scheduled court date for January 29.
Finally JM writes: "Myth and reality? I have been writing about Kevin
Mitnick for a long time, since 1981 to be precise, but I didn't create
a myth, he created his own story."
>In his own rebuttal, JM has already referred to the Mitnick story as a
>"good yarn." A yarn, of course, is a richly embroidered, sometimes
>fictionalized version of the truth. This is precisely what I believe he
>concocted, and it isn't my idea of decent journalism.
Please Charles, which part is concocted? The part about Kevin being a
criminal who was a fugitive and who was caught while he was breaking in to
computers?
>Would JM like to explain how Dan Farmer's perception of "the Mitnick
>threat" can be so different from Shimomura's? To the outside observer, it
>almost looks as if there wasn't a significant security threat, and
>Shimomura must have been motivated by wounded vanity, while John Markoff
>was motivated by his desire to tell a "good yarn" and make a lot of money.
>Am I wrong?
Yes you're wrong. I can't speak for Dan, but Tsutomu was invited by both
the Well and Netcom to help them solve a persistent computer security
problem. His advice to the Well was that they would never be secure unless
the person who was attacking their computers was apprehended. The Well had
no viable way to lock Kevin Mitnick out. Tsutomu's solution to actively
pursue Mitnick was the only reasonable option, one which the Well management
agreed with. There are several philosophies in the computer security world.
One view is that rather than hiding in your shell it is necessary to track
down offenders who have broken the law. I really don't see what's wrong with
that approach. Do you Charles?