Kingpin has ratings and reviews. Kevin Poulsen, a former hacker himself, tells the story of Max Ray Vision, aka Max Butler, a self-taught computer. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground is a American novel written by Kevin Poulsen. Kevin Poulsen is a former computer hacker, whose best known hack involved penetrating telephone company computers in the early s to win radio station .

Author: Disho Kataxe
Country: Vietnam
Language: English (Spanish)
Genre: Automotive
Published (Last): 15 January 2014
Pages: 471
PDF File Size: 5.31 Mb
ePub File Size: 9.93 Mb
ISBN: 857-9-93364-132-3
Downloads: 43317
Price: Free* [*Free Regsitration Required]
Uploader: Fenrigis

He read the CERT advisory with amazement. Dozens of young men in T-shirts and shorts or jeans — the hacker’s uniform — were at the tables hunkered over a bank of computer workstations or standing on the sidelines, occasionally pointing at something on a screen. Writing reports for the bureau was one thing, and he’d had no qualms about getting the goods on the DarkCYDE phreaks, who were too young to get in real trouble.

Flanked by his own parents, Max beamed at the camera, while storm clouds gathered overhead in the Pacific Northwest sky. Norminton’s latest caper had required little more than a telephone and a fax machine. Their relationship was everything his parents’ hadn’t been. On October 30, Max told Amy he kingpin by kevin poulsen to talk to her in person. Corporations would pay his company, Microcosm Computer Resources, to levin their networks through a real hack attack, culminating in a detailed report kingpin by kevin poulsen pouslen client’s security strengths and weaknesses.

Thought you’d send me e-mail. This one was a quick and fascinating read – on that nearly made by blood boil to learn how easy software companies made it to hack our personal computers and gain our credit card numbers as far back as the s.

Now Ivanov and Gorshkov were surrounded by undercover FBI agents posing as company employees, along with a white-hat hacker from the nearby University of Washington who was playing the role of a computer geek named Ray. kingpin by kevin poulsen

Max shaved the sugary kingpkn off in slices and served it to his date with the schnapps. Looking for the technical challenges his day jobs denied him, Max returned to a network of kingpin by kevin poulsen rooms called IRC, Internet relay chat, a surviving vestige of the old Internet of his teenage years. When Max was finally paroled on April 26,he left kingpin by kevin poulsen that he’d served more than four years in the Idaho State Penitentiary for kignpin, by law, should have been a misdemeanor worth sixty days in the county jail.

Maybe the same could be said for Max Butler, only a few years older than Mark Zuckerberg.

John confessed the truth. He liked helping people. As a reading experience, it is utterly compelling and fascinating.

ArachNIDS was a hit and helped Snort surge to new levels of popularity in the security community, with Max Kingpin by kevin poulsen riding the swell to security stardom. This time, he’d be going to Vegas. So when Jeff Norminton showed up ;oulsen about ievin superhacker he’d met in Taft, Chris was ready to listen.

By using SQL injection, a technique that involves submitting database commands on free text fields in the hopes that the underlying system issues those commands, Butler was able to steal and drop entire databases of all these Eastern European carder websites. Poulsen left SecurityFocus in to freelance and pursue independent writing projects. The luckless salesman insisted on going with them, and when they cleared the town limit, Chris steered to the side of kingpin by kevin poulsen road, and Albert pulled the salesman from the car at gunpoint.

Now, instead of doing battle with ores poulsne building up their characters’ experience points, users talked, flirted, fought, and had virtual poulwen. A gang of phone phreaks had just hijacked the phone system at the networking company 3Com and were using it as their own private teleconferencing facility.

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

It was a strange sentencing hearing for a computer criminal. Kingpin by kevin poulsen that day, the four keys would stay in hiding, a burden borne in silence by the four of them. The key ring was returned to the darkness of the chem lab desk after being carefully wiped down for fingerprints. Before the raid, they hadn’t much planned for the future.

He only meant to help, he explained. The servers and laptops crammed into the space produced a swelter that pulsed through the room He’d brought in fans over the summer, but they provided scant kingpin by kevin poulsen and lofted the electric bill so high that the apartment manager suspected him of running a hydroponic dope farm.

Cyber security professionals might know the highlights of this cyber criminal underworld, but Poulsen is able to provide a lot of detail about how this world functions that is understood by mostly only the cyber criminals themselves and the keviin enforcement officials who kingpin by kevin poulsen them. Open Preview See a Problem?

Kingpin (book) – Wikipedia

But I don’t understand them any better for having bby this. The best kingpin by kevin poulsen of this book, at least in my opinion, was the subjects dual nature that seemed constantly at war with each other. For all of the grandeur of the house, Max’s room had the charm of a monk’s cell — no furniture but a futon on the floor, no comforts except a computer.

This book pou,sen be a real eye-opener for those who don’t understand the extent to which the Internet has been corrupted. By Rick Howard July 14, He is also tangentially associated with kingpin by kevin poulsen TJX data breach of