Status
Call number
Publication
Description
Business. Computer Technology. True Crime. Nonfiction. HTML:Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative�??and an unprecedented view into the twenty-first century�??s signature form of organized crime. The word spread through the hacking underground like some unstoppable new virus: Someone�??some brilliant, audacious crook�??had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin; other agencies around the world deployed dozens of moles and double agents. Together, the cybercops lured numerous unsuspecting hackers into their clutches. . . . Yet at every turn, their main quarry displayed an uncanny ability to sniff out their snitches and see through their plots. The culprit they sought was the most unlikely of criminals: a brilliant programmer with a hippie ethic and a supervillain�??s double identity. As prominent �??white-hat�?� hacker Max �??Vision�?� Butler, he was a celebrity throughout the programming world, even serving as a consultant to the FBI. But as the black-hat �??Iceman,�?� he found in the world of data theft an irresistible opportunity to test his outsized abilities. He infiltrated thousands of computers around the country, sucking down millions of credit card numbers at will. He effortlessly hacked his fellow hackers, stealing their ill-gotten gains from under their noses. Together with a smooth-talking con artist, he ran a massive real-world crime ring. And for years, he did it all with seeming impunity, even as countless rivals ran afoul of police. Yet as he watched the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, he began to see in their dysfunction the ultimate challenge: He would stage his coup and fix what was broken, run things as they should be run�??even if it meant painting a bull�??s-eye on his forehead. Through the story of this criminal�??s remarkable rise, and of law enforcement�??s quest to track him down, Kingpin lays bare the workings of a silent crime wave still affecting millions of Americans. In these pages, we are ushered into vast online-fraud supermarkets stocked with credit card numbers, counterfeit checks, hacked bank accounts, dead drops, and fake passports. We learn the workings of the numerous hacks�??browser exploits, phishing attacks, Trojan horses, and much more�??these fraudsters use to ply their trade, and trace the complex routes by which they turn stolen data into millions of dollars. And thanks to Poulsen�??s remarkable access to both cops and criminals, we step inside the quiet, desperate arms race that law enforcement continues to fight with these scammers today. Ultimately, Kingpin is a journey into an underworld of startling scope and power, one in which ordinary American teenagers work hand in hand with murderous Russian mobsters and where a simple Wi-Fi co… (more)
User reviews
The pace of the book is fast, and with the wide variety of characters it is hard to keep track of who is linked to who and all of the backstabbing that goes on. It is an easy read, even for those without a deep technical background (and you'll pick up an understanding of the techie bits through some well-written prose).
This book is especially good because it's well written and written with authority, as the author, Kevin Poulsen is a well known former "dark hat" hacker from before Iceman's time, and is now a Wired editor. He writes quite well and while explaining technical things like Sequel hack attacks in Internet Explorer, it never feels like he's talking down to you. Indeed, he even shows some lines of code at various places in the book so you get a feel of what some of the hacks looked like. I've got to say, though, that I'm damn glad I use a Mac. Virtually all of the hacking/carding is done to and with Windows machines and can't be done on Macs. And since 95% of all computers and servers are running Windows commercially, it's scary as hell, but at least I don't have to worry about anything here at home. I hope. Still, the scary thing to learn was that online transactions are actually much more secure than live credit card transactions and that restaurants are the absolute worst. Followed by retail stores and gas stations, etc. The primary reason it's so bad in America, and trust me, we're not told just how bad it is, is because our credit cards still use those magnetic strips, which are completely hackable. The rest of the world has gone to unhackable chips and while some banks in America are making that transition -- I have two credit cards with chips -- most places won't because of the expense. They'd rather pay for stolen money and credit than to upgrade their systems. How screwed up is that? People's lives are totally ruined. Their social security numbers are stolen and sold, their driver's licenses are stolen and sold, their credit and debit cards and PINS are stolen and sold and the banks and companies don't want to make changes cause it's easier and cheaper to reimburse people. Great. Makes me want to never use a credit card again. And of course, that's impossible. Oh, never use a credit card via public wi fi. Never.
So I wasn't sure if this was actually a five star book or not, but I can't think of any reason not to give it five stars, so I am. Definitely recommended.
This is the true story of the Hacker Max Butler and how he took over the "carding" scene (trading of stolen / fake credit cards, IDs, and so on). It is, as I said, based on a real
I, as a computer science student with an interest in computer security, found this book to be well written and interesting. For my taste, it was not technical enough, but it still features some technical details that may confuse people without prior knowledge of the topic (although they are usually explained very well).
If you have an interest in the world of carding or computer security, this book provides an interesting story with some few technical details, easily understood or ignored. I like it, but would recommend it only to people interested in the topic.
This book reads like an in-depth newspaper article, which makes sense since the author is a senior editor at Wired.com. While certainly embellished a little for drama, the writing sticks mainly to the facts and to interviews. Well-researched, it documents holes in the financial system that are now plugged. Max Vision and his compatriots exposed these holes through their crimes.
So how was the crime ring done? The credit card industry seemed secure before online transactions took over. Then, hacking into insecure databases and re-grafting that information into new magnetic stripes could produce a bevy of illegal credit cards. These credit cards could be converted into cash by buying expensive items from chains and re-selling them on eBay. Since thousands, if not millions, of credit cards are used, there is no one easy way to shut down the operation.
The feds ended up shutting down the operation by arresting the co-conspirators and thus decimating the human network. After that, chip technology has by-and-large replaced magnetic stripes as the communicative agent of credit cards. Through better encryption and randomization, this new technology, though slightly slower, makes replication of purchasing agents much harder.
An engaging story, this work successfully conveys a story that is not well-known to the public. I wonder whether the tale would translate well into a movie. Perhaps there is not enough drama and too much technological theory. Nonetheless, such fast-paced action is part and parcel of this work. A good read from a book club for me!