11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

314 Mitnick, Kevin D.———. “The Media Lab’s New Pilot.” <strong>Technology</strong> Review. Availableonline. URL: http://www.technologyreview.com/article/16851/. Accessed October 2, 2007.Maeda, John. Maeda @ Media. New York: Universe Publications,2001.The Media Lab: Inventing a Better Future. Available online. URL:http://www.media.mit.edu/. Accessed October 2, 2007.Negroponte, Nicholas. Being Digital. New York: Vintage Books,1996.Mitnick, Kevin D.(1963– )American<strong>Computer</strong> Cracker/Hacker, ConsultantThe MIT Media Lab has devised a variety <strong>of</strong> new ways for peopleto use computers. This is an innovative laptop sketchbook that createsanimations directly from drawings. (Sam Ogden / PhotoResearchers, Inc.)Emphases <strong>and</strong> ProjectsThe focus <strong>of</strong> most <strong>of</strong> the lab’s diverse projects is on findinginnovative <strong>and</strong> productive new ways for people to usecomputers <strong>and</strong> related technology. Recently there has beenan emphasis on more practical applications such as aiding“disabled, disadvantaged, [<strong>and</strong>] disenfranchised” peoplein becoming pioneers in using technology that everyonemay use someday. The “One Laptop per Child” project todevelop inexpensive computers for developing countries isalso a part <strong>of</strong> this effort.As <strong>of</strong> 2007 there were 27 separate research groups at thelab, including the following:• Object-Based Media—objects that can “underst<strong>and</strong>”<strong>and</strong> describe their environment• Personal Robots—robots that interact with peoplesocially (see Breazeal, Cynthia)• Computing Culture—relationships among art, technology,<strong>and</strong> culture• molecular Machines—logical <strong>and</strong> mechanical devicesusing molecular-scale parts• S<strong>of</strong>tware Agents—programs that can serve as assistantsfor human activities• Ambient Intelligence—interfaces that are “pervasive,intuitive, <strong>and</strong> intelligent” (see Maes, Pattie)• Society <strong>of</strong> Mind—applying models <strong>of</strong> human cognitiveprocessing to machines (see Minsky, Marvin)• Affective Computing—developing computers that canrecognize <strong>and</strong> respond intelligently to human emotionFurther ReadingBourzac, Katherine. “Media Lab Courts Corporate Funding.”<strong>Technology</strong> Review, February 21, 2006. Available online.URL: http://www.technologyreview.com/Biztech/16383/?a=f.Accessed October 2, 2007.Once notorious for breaking into computers <strong>and</strong> stealinginformation, Kevin Mitnick later became a consultant <strong>and</strong>author on computer security.Mitnick was born October 6, 1963, in Van Nuys, California.With little parental supervision <strong>and</strong> few otherfriends, Mitnick became involved with “phone phreaks,”people who had learned to manipulate the long-distancephone system. However, Mitnick soon turned his attentionto breaking into computer systems. Mitnick first got introuble in high school for breaking into the school district’scomputer system. He also allegedly broke into the NorthAmerican Air Defense Comm<strong>and</strong> computer, though fortunatelywithout starting a nuclear war as in the movie WarGames. Despite being caught stealing Bell System technicalmanuals <strong>and</strong> put on probation, Mitnick continued breakinginto computers. In 1989 he received a one-year prisonsentence for breaking into computers at MCI <strong>and</strong> DigitalEquipment Corporation. After getting out he violated hisprobation by stealing more Bell documents, <strong>and</strong> a warrantwas issued for his arrest.Mitnick then went underground, eluding authoritiesfor two years <strong>and</strong> using a variety <strong>of</strong> fake identities. However,when Mitnick broke into the computer <strong>of</strong> physicist<strong>and</strong> computer security expert Tsutomu Shimomura <strong>and</strong>stole a large number <strong>of</strong> documents <strong>and</strong> programs, <strong>and</strong>later taunted him on the phone, Shimomura resolved totrack down the intruder. Shimomura <strong>and</strong> several otherexperts set up a tracking program at The Well (a computerconferencing system where Mitnick had stashed the stolenmaterial). Mitnick attempted to disguise his location byrouting calls through a phone company switching <strong>of</strong>ficein Raleigh, North Carolina, but when Shimomura figuredout that Mitnick was calling from Raleigh, he <strong>and</strong> a Sprintphone technician drove around Raleigh scanning for thecalls from Mitnick’s cellular modem, tracking him to hisapartment building. They then called federal agents, whoarrested Mitnick.Mitnick became a cause célèbre in the hacker community.The controversy was heightened by two books writtenabout the case, one by Shimomura <strong>and</strong> New York Timesjournalist John Markh<strong>of</strong>f <strong>and</strong> the other by Jonathan Littman,who argued that the charges against Mitnick wereoverinflated <strong>and</strong> government prosecutors overzealous.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!