Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Buy

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first century’s signature form of organized crime.
 
The word spread through the hacking underground like some unstoppable new virus: Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.
 
The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin; other agencies around the world deployed dozens of moles and double agents. Together, the cybercops lured numerous unsuspecting hackers into their clutches. . . . Yet at every turn, their main quarry displayed an uncanny ability to sniff out their snitches and see through their plots.
 
The culprit they sought was the most unlikely of criminals: a brilliant programmer with a hippie ethic and a supervillain’s double identity. As prominent “white-hat” hacker Max “Vision” Butler, he was a celebrity throughout the programming world, even serving as a consultant to the FBI. But as the black-hat “Iceman,” he found in the world of data theft an irresistible opportunity to test his outsized abilities. He infiltrated thousands of computers around the country, sucking down millions of credit card numbers at will. He effortlessly hacked his fellow hackers, stealing their ill-gotten gains from under their noses. Together with a smooth-talking con artist, he ran a massive real-world crime ring.
 
And for years, he did it all with seeming impunity, even as countless rivals ran afoul of police.
 
Yet as he watched the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, he began to see in their dysfunction the ultimate challenge: He would stage his coup and fix what was broken, run things as they should be run—even if it meant painting a bull’s-eye on his forehead.
 
Through the story of this criminal’s remarkable rise, and of law enforcement’s quest to track him down, Kingpin lays bare the workings of a silent crime wave still affecting millions of Americans. In these pages, we are ushered into vast online-fraud supermarkets stocked with credit card numbers, counterfeit checks, hacked bank accounts, dead drops, and fake passports. We learn the workings of the numerous hacks—browser exploits, phishing attacks, Trojan horses, and much more—these fraudsters use to ply their trade, and trace the complex routes by which they turn stolen data into millions of dollars. And thanks to Poulsen’s remarkable access to both cops and criminals, we step inside the quiet, desperate arms race that law enforcement continues to fight with these scammers today. 
 
Ultimately, Kingpin is a journey into an underworld of startling scope and power, one in which ordinary American teenagers work hand in hand with murderous Russian mobsters and where a simple Wi-Fi connection can unleash a torrent of gold worth millions.


From the Hardcover edition.

(HTML tags aren't allowed.)

Databases for Small Business: Essentials of Database Management, Data Analysis, and Staff Training for Entrepreneurs and Professionals
Databases for Small Business: Essentials of Database Management, Data Analysis, and Staff Training for Entrepreneurs and Professionals

This book covers the practical aspects of database design, data cleansing, data analysis, and data protection, among others. The focus is on what you really need to know to create the right database for your small business and to leverage it most effectively to spur growth and revenue.

Databases for Small Business...

Thou Shall Not Use Comic Sans: 365 Graphic Design Sins and Virtues: A Designer's Almanac of Dos and Don'ts
Thou Shall Not Use Comic Sans: 365 Graphic Design Sins and Virtues: A Designer's Almanac of Dos and Don'ts

Ask any graphic designer the world over about their preferred approach to setting type, choosing a color, or beginning a new layout, and you will rarely get exactly the same answer twice. All designers have their own way of working and their own combinations of the thousands of techniques one can apply when planning a new...

A+ Technician's On-the-Job Guide to Windows XP
A+ Technician's On-the-Job Guide to Windows XP

Designed for the IT professional with 1-3 years of experience who needs to put their experience to work quickly and effectively in an XP environment, this practical guide offers readers skill-building as well as troubleshooting information on Windows XP.

If you’re working as an...


Cloud Computing Best Practices for Managing and Measuring Processes for On-demand Computing, Applications and Data Centers in the Cloud with SLAs
Cloud Computing Best Practices for Managing and Measuring Processes for On-demand Computing, Applications and Data Centers in the Cloud with SLAs
The evolution of managing Cloud Computing Services in principles and practices provided by the best practices IT Service Management framework provides the more holistic guidance needed for an industry that continues to mature and develop at a rapid pace.

Many organizations and individuals who had previously struggled
...
Windows 8.1 Step by Step
Windows 8.1 Step by Step

The smart way to learn Windows 8.1—one step at a time!

Experience learning made easy—and quickly teach yourself how to navigate and use Windows 8.1. With Step by Step, you set the pace—building and practicing the skills you need, just when you need them!

Cognitive Radio Communications and Networks: Principles and Practice
Cognitive Radio Communications and Networks: Principles and Practice

This book gives comprehensive and balanced coverage of the principles of cognitive radio communications, cognitive networks, and details of their implementation, including the latest developments in the standards and spectrum policy. Case studies, end-of-chapter questions, and descriptions of various platforms and test beds, together with...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy