“The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and education. Enacting policies and procedures simply won't suffice. Even with oversight the policies and procedures may not be effective: my access to Motorola, Nokia, ATT, Sun depended upon the willingness of people to bypass policies and procedures that were in place for years before I compromised them successfully”
Kevin Mitnick“Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause.”
Kevin Mitnick“I wasn't a hacker for the money, and it wasn't to cause damage.”
Kevin Mitnick“Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information.”
Kevin Mitnick“My actions constituted pure hacking that resulted in relatively trivial expenses for the companies involved, despite the government's false claims.”
Kevin Mitnick“The Patriot Act is ludicrous. Terrorists have proved that they are interested in total genocide, not subtle little hacks of the U.S. infrastructure, yet the government wants a blank search warrant to spy and snoop on everyone's communications.”
Kevin Mitnick“I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government.”
Kevin Mitnick“What I found personally to be true was that it's easier to manipulate people rather than technology.”
Kevin Mitnick“I got so passionate about technology. Hacking to me was like a video game. It was about getting trophies. I just kept going on and on, despite all the trouble I was getting into, because I was hooked.”
Kevin Mitnick“A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted.”
Kevin Mitnick“I trust online banking. You know why? Because if somebody hacks into my account and defrauds my credit card company, or my online bank account, guess who takes the loss? The bank, not me.”
Kevin Mitnick