- Audible Audio Edition
- Listening Length: 13 hours and 59 minutes
- Program Type: Audiobook
- Version: Unabridged
- Publisher: Blackstone Audio, Inc.
- Audible.com Release Date: August 15, 2011
- Whispersync for Voice: Ready
- Language: English
- ASIN: B005HBO3BY
- Amazon Best Sellers Rank:
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker Audible – Unabridged
|New from||Used from|
|Free with your Audible trial|
Listen on your Kindle Fire or with the free Audible app on Apple, Android, and Windows devices.
Customers Who Bought This Item Also Bought
Top Customer Reviews
Ghost in the Wires doesn't reach the level of audacity of Catch Me if You Can - impersonating technicians over the phone doesn't rise to the sheer nerve of a teenager impersonating an airline pilot or a doctor, as Abagnale did, and getting away with it. But Ghost in the Wires goes well beyond the adolescent bragfest of phone hacks that it could have been.
I think this is largely due to the co-writer, William L. Simon. Kevin Mitnick describes in his acknowledgments, how he and Simon argued over how detailed and technical the book should be, and apparently Simon prevailed. There's enough detail to explain how the scams were possible, but not so specific as to send the non-programmer into a hexadecimal stupor.
Another big plus is that many of the hacks depended as much on what Mitnick calls "social engineering" as on specialist knowledge. Unlike the stereotypical computer nerd, Mitnick was as comfortable and proficient at schmoozing people as he was writing code - he could talk his way into places that were restricted and convince people he was entitled to classified information. These were scams anyone can understand.
Mitnick also succeeds at not crossing the line from confident to insufferable, which is another pitfall of true crime tell-alls. Perhaps we can once again thank William Simon for this achievement.
I expected to skim this 400-page book but ended up reading every word.Read more ›
I can't help but enjoy reading about someone who has the adept social engineering of a film noir gumshoe, or the undercover detective, who applied it growing up and getting into trouble. Like Kevin, I knew The Three Days of the Condor. I learned it was a favorite of his, and I clung to this fact which fell through the sieve of newspaper myth. Free Kevin!
Now read Kevin's story, where you'll find enough detail to keep any heart racing. Whether or not you have enough awareness for some of the bits, or rely on the plain language, the story can strike sheer terror in the hearts of those who don't know much of anything about bits and bytes. For those who do, this book contains updated method nomenclature and references to security protocol that it's valuable from that perspective.
Kevin possesses the kind of curiosity to dig and uncover gems of hidden info for esoteric purposes in order to unlock a power only a successful hacker knows about. Social engineering is akin to the confidence game, but different all the same when it involves computer networks. The best hackers are never caught, never known about. Kevin has a different distinction: The first and the grandest adventure story, ever.
You don't need to be a hacker or security professional to appreciate and learn from it. Today, security is serious business and hackers typically have bad or misguided intent.Read more ›
I will leave whatever social sickness the brilliant Kevin Mitnick has to the mental health professionals, but suffice it to say that his writing in Ghost in the Wires is a terrific nonfiction example of an "unreliable narrator." Throughout the book, Mitnick does the same things over and over again and is surprised when he repeatedly gets caught. He hurts his mother, grandmother, wife, and friends over and over again with his illegal hacking activities, says he regrets doing it each time, but then turns around and does it to them again. Mitnick is upset when he is blamed for things he "didn't do" and when he is "double crossed," but he freely admits to dozens of other computer break ins and instances where he compromises the trust of others using "social engineering" techniques, ridicules them for trusting him, and then betrays that trust. Mitnick says he never took money from hacking, but now of course he's making money from writing this and other books as well as from promoting his computer security company based on his (illegally obtained) skills. Mitnick is all over the place.
In one scene Mitnick is severely critical of prosecutors who use "dirty tactics" to put him behind bars, but then he continues to use his own dirty tactics while behind those bars.Read more ›
Most Recent Customer Reviews
Having read the Littman books and multiple articles about phreaking and hacking, I had a pretty good idea of Kevin's story. Read morePublished 2 days ago by Greg
This book is a fast easy read but at the same time as a tendency to get a little repetitive.Published 4 days ago by Marc2912
If you like Computers, Hacking and a good story all rolled into one, give this a read.Published 8 days ago by Amazon Customer
This book was an amazing read. It was like your classic cat and mouse but for technical nerds. Great for and reader.Published 20 days ago by Nicholas Dewey
When the book started I found it pretty interesting, and quickly got into the story. But as you continue the author's writing style becomes repetitive and quickly ventures into... Read morePublished 1 month ago by Matthew Guerra
In Ghost in the Wires, Kevin Mitnick tells the story of his hacking career, from the start in his teens, through becoming the FBI's most wanted hacker, to spending years in jail... Read morePublished 1 month ago by Henrik Warne
I really enjoyed this book, with one gripe. The author uses profanities quite freely, which I found offensive. Read morePublished 1 month ago by CareTech
Look for Similar Items by Category
- Books > Biographies & Memoirs > Memoirs
- Books > Biographies & Memoirs > Professionals & Academics > Scientists
- Books > Biographies & Memoirs > Specific Groups > Crime & Criminals
- Books > Computers & Technology > History & Culture > Biographies
- Books > Computers & Technology > Internet & Social Media > Hacking
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Security & Encryption