Skip to comments.World's Greatest Hacker Says Obama's BlackBerry Can Be Breached
Posted on 02/13/2009 3:27:55 PM PST by Joiseydude
There's a new "holy grail" for hackers President Obama's super-secure BlackBerry.
Despite warnings from his advisers, the president insisted on keeping his beloved PDA, which now has specially designed superencrypting security software.
But that just makes cracking into it more challenging and, yes, it can be done, says the world's most famous hacker.
"It's a long shot, but it's possible," Kevin Mitnick told FOXNews.com. "You'd probably need to be pretty sophisticated, but there's people out there who are."
(Excerpt) Read more at foxnews.com ...
Im sure all our enemies are already at work on it
Then again, Obama probably gives the Chinese full access, so belay my last.
I’d think that anything that isn’t hard-wired can be breached.
I don’t think I could give up my Instinct either. Have to cut him slack there.
Mitnick is not a “Hacker” in the sense that he figures out software and the weaknesses in it. Rather, he is a proponent of “social engineering”, whereby passwords and other critical data are searched out by other means such as lax security, phishing, and the like. He could no sooner crack Obama’s blackberry than I could. He could, however, perhaps find a way to steal the password, which is a hazard all secure networks must contend with.
What does he have to worry about? He is already friends with all of America’s enemies.
A honeypot for the technically adept but super-stupid.
He just wants to talk to Ayers and the rest of his commie pals,. since the white house logs calls you know..
To Nazi Pelosi - AYSOS? IM BBMFIC!!!!
To Pinky Reid - NIMJD!!!!!
To Chillary - UR A PIAPS!!!
Putin already has Obama’s PIN number.
Social Engineering is a well respected form of hacking.
You aren't Commander in Chief.
A good starting point would be his two little skullsful of mush.
PIAPS? Prick In A PantSuit?
...YOU MAY BE RIGHT ON THAT.....
That would be Commander in Thief. He's the biggest thief in the country right now.
What could they learn?
The pager number of his coke supplier? His mister(ess)’s number?
Could be some very actionable blackmail materials on bammy’s crackberry.
Pig In A PantSuit LOL!
Y 02! ;)
I always sort of categorize hacking as literally breaking into a system, getting it to do things it wasn’t meant to do, rather than simply stealing a password or the like, but I will grant one as a subset of another. Still, I think it takes a real quality caliber of thief to crawl through an air conditioning duct into a building, as opposed to simply stealing a key.
Your entitled to your opinion, but it’s a lot more sublime to steal the key. ;-)
Mitnick is not a Hacker in the sense that he figures out software and the weaknesses in it. Rather, he is a proponent of social engineering, whereby passwords and other critical data are searched out by other means such as lax security, phishing, and the like.Thank you. Mitnick the "World's Greatest Hacker?" Puh-leeze. Erik, Phiber, and Corrupt might have a differing opinion on that.
Mitnick is a script kiddie. Nothing more.
He is great for a laugh when he opens his mouth, though.
I can’t wait to see the email exchanges that Obama and Ayers are having.
Yeah, but the biggest gun salesman!
Mitnick is a script kiddie. Nothing more.Heck, Mitnick was a dumpster diver, nothing more. Leave it to the MSM to promote him to "Hacker" status. I know the guy, couldn't write a driver to save his a**.
but but but the great says he “neeeeeeeeeeeeeeds” it
Speaking of which....
It’s Federal law that all companies keep all emails and IMs on company computers for an indefinite period of time for future lawsuits.
Does this apply to FedGov itself?
If so, do they have to keep a call log and IMs from his Blackberry?
If not, why does the law not apply to him?
THAT would be some interesting reading....
“Despite warnings from his advisers, the president insisted on keeping his beloved PDA, which now has specially designed superencrypting security software.”
Well, DUHHH. The encryption only protects what is on the blackberry. As soon as he brings up text on his screen or sends an email it has to be decrypted unless the person receiving the email has the same encryption.
When encryption isn’t enough, resort to superencryption.
Old Eagle’s first rule of security “If somebody can build it, somebody can break it”.
“If so, do they have to keep a call log and IMs from his Blackberry?”
Interesting point. I haven’t used a blackberry in a while, but I am fairly certain a Blackberry does nothing more than collect emails from a server where they are stored. I know with my IPHONE my mail is kept in “the cloud” which is my mac mail account (or any other email app I use). I assume that is in control of the government in terms of storage for the record.
If one wanted to hack his blackberry the place to go would be his email app, and not directly to his blackberry.