Q & A / Kevin Mitnick - “I had a Motorola cell phone and wanted to pull it apart and see if there were any vulnerabilities. I decided to get the source code. Companies consider that code very valuable. You can’t just buy it. It’s proprietary. As I walked home, I called the Motorola 1-800 number, and by the time I finished my 20 minute walk home, I had the source code by simply using the telephone and gift of gab. You have to think about how much money and high tech security that Motorola had used to protect that code.”