What is Big Think?  

We are Big Idea Hunters…

We live in a time of information abundance, which far too many of us see as information overload. With the sum total of human knowledge, past and present, at our fingertips, we’re faced with a crisis of attention: which ideas should we engage with, and why? Big Think is an evolving roadmap to the best thinking on the planet — the ideas that can help you think flexibly and act decisively in a multivariate world.

A word about Big Ideas and Themes — The architecture of Big Think

Big ideas are lenses for envisioning the future. Every article and video on bigthink.com and on our learning platforms is based on an emerging “big idea” that is significant, widely relevant, and actionable. We’re sifting the noise for the questions and insights that have the power to change all of our lives, for decades to come. For example, reverse-engineering is a big idea in that the concept is increasingly useful across multiple disciplines, from education to nanotechnology.

Themes are the seven broad umbrellas under which we organize the hundreds of big ideas that populate Big Think. They include New World Order, Earth and Beyond, 21st Century Living, Going Mental, Extreme Biology, Power and Influence, and Inventing the Future.

Big Think Features:

12,000+ Expert Videos


Browse videos featuring experts across a wide range of disciplines, from personal health to business leadership to neuroscience.

Watch videos

World Renowned Bloggers


Big Think’s contributors offer expert analysis of the big ideas behind the news.

Go to blogs

Big Think Edge


Big Think’s Edge learning platform for career mentorship and professional development provides engaging and actionable courses delivered by the people who are shaping our future.

Find out more

The Confessions of Cyber Public Enemy Number One

October 13, 2013, 12:00 AM

At the time of his arrest in 1995, Kevin Mitnick was the most wanted cyber criminal in the United States. The arrest marked the end of an intense two-and-a-half-year electronic manhunt, a game of cat and mouse that Mitnick likens to a video game. 

"I was a little bit insane," Mitnick admits. "Why I did this psychologically is I loved putting myself in dangerous situations and then trying to work my way out of them."

To evade the FBI, Mitnick meticulously developed cover stories for himself. He worked in a law firm in Denver and a hospital in Seattle. "I was so into creating my cover it was almost like I was living another life," he says.

This fantasy life was inspired by Hollywood. According to the Tsutomo Shimomura's book Takedown

Early on, after seeing the 1975 Robert Redford movie Three Days of the Condor, [Mitnick] had adopted Condor as his nom de guerre. In the film Redford plays the role of a hunted CIA researcher who uses his experience as an Army signal corpsman to manipulate the phone system and avoid capture. Mitnick seemed to view himself as the same kind of daring man on the run from the law.

Mitnik's ability to evade the authorities earned him considerable notoriety. In the video below, for instance, he tells the story of how he toyed with the FBI when he figured out they were close to catching him. 

Watch here:

What's the Big Idea?

Just as reformed cheaters have gone to work at casinos, Mitnik has made a second career as a security consultant. 

So what does the world's most notorious hacker have to say about secuirty? Mitnik describes security as a lifecycle. "When you develop operating systems, when you’re developing applications there are millions of lines of code in some cases," he says.

To think that a developer hasn’t made a mistake or development teams haven’t made mistakes is naïve and what I think really has to happen is either there has to be a liability attached to the companies that develop applications and operating systems and also secure coding practices.  There is a rush to get applications out into the marketplace, so they could have return on investment and sometimes they want to skip the security step because it’s much faster. Then what happens is you have applications that are internet-facing that are deployed and then unfortunately end up being exploited.

So what can be done to eliminate risk? You can't eliminate it, Mitnik says, but you can at least mitigate it, and that means teaching developers secure coding practices and also auditing that code. 

Image courtesy of Shutterstock


The Confessions of Cyber Pu...

Newsletter: Share: