Paper Details  
 
   

Has Bibliography
2 Pages
533 Words

 
   
   
    Filter Topics  
 
     
   
 

None Provided6

omura and his team of “computer sleuths” monitored the hackers every move—still uncertain who the infiltrator was. “On February 9th, the team moved to Netcom where they set up equipment to capture the hackers every move.” (p.441). On February 13th, 1995, telephone technicians and Shimomura followed the hackers telephone signals and identified an apartment complex near the airport. The following day, investigators had tracked the calls to an actual address and obtained a warrant to search the residence. FBI agents arrested Mitnick who was charged with computer fraud and illegal use of a telephone access device. “Mitnick was charged in North Carolina with 23 counts of access device fraud for his activities shortly before his arrest. In order to expedite his return to California, he agreed to plead guilty to one count and have his case consolidated in Los Angeles. In California, he was charged with an additional 25 counts of access device, wire, and computer fraud. On March 16, 1999, Mitnick plead guilty to five of these counts and two additional counts from the Northern District of California. He was sentenced to 46 months and three years probation, to be served in addition to eight months for his North Carolina plea and 14 months for his probation violation. He was released from prison on January 21, 2000, being eligible for early release after serving almost 60 months of his 68 month sentence.” (http://www.takedown.com/). . WORKS CITEDhttp://www.takedown.com/Frenzel, Carol., Management Information Technology, International Tompson Publishing, Cambridge, 1999.Forbes Magazine, 1991. ...

< Prev Page 2 of 2 Next >

    More on None Provided6...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA