Did you like how we did? Rate your experience!

Rated 4.5 out of 5 stars by our customers 561

Video instructions and help with filling out and completing 944 Pr Irs Form

Instructions and Help about Who Form 944 Pr Debit

Alright let's let's get started want to welcome you on behalf of Stanford Law School and the Center for Internet and Society it's my great pleasure to introduce Kevin Poulsen he's going to tell you about his new book kingpin how one hacker took over the billion-dollar cyber crime underground I've read it I'm happy to say it's it's really a fantastic book I'm I'm not the first person to say so but one of the reasons I think it's such a great book is there is probably nobody more qualified in the world to tell the story Kevin for those of you who don't know is an award-winning journalists he is the co-founder of the threat level blog in Wired magazine and he's in that his past he's also been known to make a hacker to himself drawing the unwarranted unwanted attention of the FBI among others and even if for those of you who remember the television program unsolved mysteries he never made it onto America's Most Wanted I think he's still a little sore about that but fortunately he's putting his talent to good use here it's on full display in this book and without any further delay I want to introduce Kevin Poulsen so I'm gonna thank the Center for Internet Society for having me I am I am a former hacker in my thing was hacking the telephone company so in the late 80s in the early 90s I was very into two telephone companies systems and how they worked what got me in the most trouble in the end was I used my access to cheat at radio station phone in contests to ensure I was the right numbered caller to win prizes so I want a Porsche and some some cash and eventually I wound up doing some time behind that so why my hacking career ended in 1991 and when I got out of jail I did some other stuff for a while and then became a journalist and I've been doing that for about 12 years now I've covered a lot of computer hackers in that time and a lot of interesting hacks and interesting people but the the first hacker that I covered in detail that I thought I really need to write a book about this guy was this man max vision so max he kind of came out of nowhere in the computer security scene in the in the mid to late 1990s nobody had heard of him before but overnight he became a very well respected computer security researcher he he was what they called a white hat hacker which means he had a hacker mindset and he had hacker skills but he applied them or so we thought completely legally so he would do he would do computer security research he would analyze malicious software that appeared on the internet and what write research papers about it he did penetration testing so if you had a company and you you thought that you might become a hacker victim you could pay max around $100 an hour and he would try and hack your system for you and then when he succeeded and he boasted a 100% success rate he would tell you how he did it so to explain the white hat white hat concept white hat is a law-abiding hacker they blackhat hackers one who breaks the law and does it for malicious purposes like financial gain so max was a white hat Albert Gonzalez the TGX hacker is a classic black hat a gray hat hacker is somewhere in between so perhaps doesn't always get permission to break into something but isn't isn't super malicious that's not Julian Assange in the middle yeah that's that's me so Max's Nexus hat started looking a little grayer when in 1998 he became very concerned about a computer security vulnerability and a widespread piece of software called bind this is a name server software basically it does the lookup from a domain name like google.com to an Internet IP address and because it was so critical its installed everywhere the security hole would let anybody get control of this system remotely from anywhere in the world he became convinced that people particularly the US government weren't acting quickly enough to secure their systems against this hole so his solution was he wrote a program that automatically broke into ultimately thousands of government computers and fixed the security hole without their permission so that was it was kind of a white hat thing to do at the same time he his program installed a little backdoor and all of these machines in case he wanted to get back in I saw actually saw and it's in the book an email that he wrote for a joint administrator on one of the systems that I think was Lawrence Berkeley Laboratory he got into a lot of National Labs where he wrote wrote the system administrator from his own account and said hey I see you detected me don't don't judge me as a black hat I'm one of the good guys yes I have access to all these systems now but before everybody had access to them so I've actually made them safer it's a simple matter of numbers he got caught for this so at this point you see squarely a black hat great photoshopping job here you got caught the FBI tried to turn him into an informant they they wanted him to wear a wire and engage one of his hacker buddies in a kind of incriminated conversation max refused and that's when they wound up prosecuting him for this intrusion he was sent to FC ITF the privately run prison in central California for an 18-month term so this was this was the real turning point for him while he was in jail he he met more serious like white-collar career criminals so fraud.

If you believe that this page should be taken down, please follow our DMCA take down process here.