With George Noory
Live Nightly 1am - 5am EST / 10pm - 2am PST
Kevin Mitnick's U-turn - Articles

Coast Insider

Listen with Windows Player
High  Low
NOTE: We'll discontinue our Windows Media Audio in August 2015. Subscribers will still be able to listen to the show through our Coast Player in the link above.
Not a member? Become a Coast Insider and listen to the show 24/7
Advertisement

Coast Insider

Listen with Windows Player
High  Low
NOTE: We'll discontinue our Windows Media Audio in August 2015. Subscribers will still be able to listen to the show through our Coast Player in the link above.
Not a member? Become a Coast Insider and listen to the show 24/7
Advertisement

Last Show Recap

First Half: Independent researcher Peter A. Kirby has been a student of alternative media narratives which has opened his eyes to the possibility that outcomes can be engineered by vested interests to appear as natural and random. He claims that the epic drought in the West is probably the result of geo-engineering and chemtrails.

2nd Half: For 25 years Robert Perala has been researching metaphysics, the origin of the soul, Earth-based anomalies, extraterrestrial science, and NDEs. He'll discuss a variety of subjects including "The Strange Case of Mr. D," a man in Poland who has been receiving ET transmissions for over 10 years, and a photo of an ET figure taken by Jeff Grenshaw that closely resembles the beings he saw during his own abduction in 1977.

Upcoming Shows

Fri 05-29  Haunted Wisconsin/ Open Lines

CoastZone

Sign up for our free CoastZone e-newsletter to receive exclusive daily articles.

Kevin Mitnick's U-turn

 Kevin Mitnick's U-turn

Tonight's guest Kevin Mitnick was released from federal prison in 2000 after serving time for cyber crimes. Since then he has turned his life around and now seeks to help citizens and companies from becoming the victim of information thieves. In the book he co-wrote, The Art of Deception (1)he presents a variety of scenarios that con artists have used to swipe valuable facts.

Referring to such criminals as "social engineers," Mitnick details how they use inside company lingo to manipulate employees, often over the phone, into giving them safeguarded data. In one chapter he writes about "The Invisible Employee," a woman he calls Shirley who is one of the rapidly growing legion of identity thieves. Shirley poses as "Norma Todd from the Cleveland office," to a customer service employee and through a set of seemingly innocent circumstances is able to finagle the service worker into giving her a voice mailbox.

After that is achieved, she continues the deception by speaking with another company employee, this time saying she is with "Collections in the Cleveland office." By claiming that her computer is in the process of being fixed by tech support, she requests confidential information about a "client," i.e. mother's maiden name, card number, payment history etc. From there she requests that the info. once gathered be left on her voicemail number should she not answer. "Since the phone number Shirley provided was clearly an external extension, there was no reason for any suspicion," Mitnick writes.

1. http://www.amazon.com/exec/obidos/ASIN/0471237124/ctoc/

Advertisement