Podcast appearances and mentions of Kevin Poulsen

  • 25PODCASTS
  • 31EPISODES
  • 51mAVG DURATION
  • ?INFREQUENT EPISODES
  • Oct 12, 2024LATEST
Kevin Poulsen

POPULARITY

20172018201920202021202220232024


Best podcasts about Kevin Poulsen

Latest podcast episodes about Kevin Poulsen

Mysterious Radio
Wrong Numbers

Mysterious Radio

Play Episode Listen Later Oct 12, 2024 57:02


My special guest tonight is a former TV investigative reporter and current part-time private investigator Glen Meeks to discuss his book called 'Wrong Numbers'.   "Wrong Numbers is an intriguing and well-researched crime story detailing the intersection of big money and quick sex in the city that contains a lot of both." - Jack Sheehan, author of Skin City   Was a hacker diverting phone calls meant for Las Vegas escort services? The FBI wanted to know, and so did associates of a New York Mafia family.  In one of the most unusual undercover operations ever, the FBI had an agent acting as a manager in a real Las Vegas escort service.  Federal agents expected to find prostitution and drugs in the Las Vegas escort industry. What their investigation uncovered was even more serious.     "Wiseguys and wannabes are on the hunt for a shadowy hacker who may hold the keys to control of Las Vegas' multi-million dollar call girl racket, while FBI agents are hunting them. The result is a gripping true-life crime story that reads like a collaboration between Elmore Leonard and Williams Gibson told with the knowing savvy of two longtime chroniclers of Sin City's hidden underbelly." - Kevin Poulsen, author of KINGPIN: How One Hacker Took Over the Billion-Dollar Cybercrime Underground"In '90s Vegas, call girls worked for “entertainment” services that were little more than phone numbers, dispatchers, and drop safes. When a mystery hacker started diverting customer's calls to one service's number, it launched a series of dangerous events that involved the Mob, feds, hackers, service owners, and the phone system itself. This slice of Sin City history is as little-known as it is thrilling, and it's well-told by investigative journalist Glen Meek and crime writer Dennis Griffin." - Deke Castleman, author of Whale Hunt in the Desert: Secrets of a Vegas SuperhostFollow Our Other ShowsFollow UFO WitnessesFollow Crime Watch WeeklyFollow Paranormal FearsFollow Seven: Disturbing Chronicle StoriesJoin our Patreon for ad-free listening and more bonus content.Follow us on Instagram @mysteriousradioFollow us on TikTok mysteriousradioTikTok Follow us on Twitter @mysteriousradio Follow us on Pinterest pinterest.com/mysteriousradio Like us on Facebook Facebook.com/mysteriousradio]

WTFrick LIVE
#66 The Original Internet Godfather of Crime ~ Brett Johnson

WTFrick LIVE

Play Episode Listen Later Nov 21, 2023 68:08


WTFrick LIVE Emily Menshouse and Will Martinez WELCOME Brett Johnson to the show!!!Brett Johnson, formerly listed as the United States Most Wanted and acknowledged by the United States Secret Service as the "Original Internet Godfather," has been prominently featured in Kevin Poulsen's book "Kingpin" and has made appearances across various media platforms, including the New York Times, NBC, CNN Money, Wired Magazine, Vice, RT TV, ArsTechnica, The Independent, and more. Currently, he is showcased in Netflix's "Web of Make Believe: Death, Lies, and the Internet."A key figure in the cybercrime world for over two decades, Mr. Johnson played a pivotal role in the formation of ShadowCrew, a precursor to contemporary darknet markets. He contributed significantly to the development of various aspects of online fraud, playing a role in shaping and refining modern Identity Theft, Account TakeOver Fraud, Card Not Present Fraud, IRS Tax Fraud, and numerous other social engineering attacks, breaches, and hacking operations.After his apprehension, the United States Secret Service enlisted Mr. Brett Johnson as a consultant and informant. Johnson collaborated with the Secret Service for several months before embarking on a nationwide crime spree. This led to his placement on the US Most Wanted List, subsequent capture, imprisonment, escape, another capture, and ultimately accepting responsibility for his actions.Check out Brett's website:https://www.anglerphish.com/Subscribe on YouTube:https://www.youtube.com/@brettjohnsonshowWill Martinez ~ Dark Fringe Radio:Check out DFR Website: https://darkfringeradio.com/Follow on FB: https://www.facebook.com/darkfringeradioGet all of WTFrick LIVE's podcasts, where to watch, and merchandise:https://beacons.ai/wtfrickliveSubscribe on Rumble: https://www.rumble.com/user/WTFrickLIVE#netflixandchill #truecrime #truecrimecommunity #cybersecurity #cyberattack #technology #documentary #anglerphish #wtfrickliveThis show is part of the Spreaker Prime Network, if you are interested in advertising on this podcast, contact us at https://www.spreaker.com/show/5653755/advertisement

UFO Paranormal Radio & United Public Radio
WTFrick LIVE The Internet Godfather Brett Johnson

UFO Paranormal Radio & United Public Radio

Play Episode Listen Later Nov 18, 2023 68:09


WTFrick LIVE Emily Menshouse and Will Martinez WELCOMES Brett Johnson to the show!!! Brett Johnson, formerly listed as the United States Most Wanted and acknowledged by the United States Secret Service as the "Original Internet Godfather," has been prominently featured in Kevin Poulsen's book "Kingpin" and has made appearances across various media platforms, including the New York Times, NBC, CNN Money, Wired Magazine, Vice, RT TV, ArsTechnica, The Independent, and more. Currently, he is showcased in Netflix's "Web of Make Believe: Death, Lies, and the Internet." A key figure in the cybercrime world for over two decades, Mr. Johnson played a pivotal role in the formation of ShadowCrew, a precursor to contemporary darknet markets. He contributed significantly to the development of various aspects of online fraud, playing a role in shaping and refining modern Identity Theft, Account Take Over Fraud, Card Not Present Fraud, IRS Tax Fraud, and numerous other social engineering attacks, breaches, and hacking operations. After his apprehension, the United States Secret Service enlisted Mr. Brett Johnson as a consultant and informant. Johnson collaborated with the Secret Service for several months before embarking on a nationwide crime spree. This led to his placement on the US Most Wanted List, subsequent capture, imprisonment, escape, another capture, and ultimately accepting responsibility for his actions. Check out Brett's website: https://www.anglerphish.com/ Subscribe on YouTube: https://www.youtube.com/@brettjohnsonshow Will Martinez ~ Dark Fringe Radio: Check out DFR Website: https://darkfringeradio.com/ Follow on FB: https://www.facebook.com/darkfringeradio Get all of WTFrick LIVE's podcasts, where to watch, and merchandise: https://beacons.ai/wtfricklive Subscribe on Rumble: https://www.rumble.com/user/WTFrickLIVE #netflixandchill #truecrime #truecrimecommunity #cybersecurity #cyberattack #technology #documentary #anglerphish #wtfricklive

United Public Radio
WTFrick LIVE The Internet Godfather Brett Johnson

United Public Radio

Play Episode Listen Later Nov 18, 2023 68:09


WTFrick LIVE Emily Menshouse and Will Martinez WELCOMES Brett Johnson to the show!!! Brett Johnson, formerly listed as the United States Most Wanted and acknowledged by the United States Secret Service as the "Original Internet Godfather," has been prominently featured in Kevin Poulsen's book "Kingpin" and has made appearances across various media platforms, including the New York Times, NBC, CNN Money, Wired Magazine, Vice, RT TV, ArsTechnica, The Independent, and more. Currently, he is showcased in Netflix's "Web of Make Believe: Death, Lies, and the Internet." A key figure in the cybercrime world for over two decades, Mr. Johnson played a pivotal role in the formation of ShadowCrew, a precursor to contemporary darknet markets. He contributed significantly to the development of various aspects of online fraud, playing a role in shaping and refining modern Identity Theft, Account Take Over Fraud, Card Not Present Fraud, IRS Tax Fraud, and numerous other social engineering attacks, breaches, and hacking operations. After his apprehension, the United States Secret Service enlisted Mr. Brett Johnson as a consultant and informant. Johnson collaborated with the Secret Service for several months before embarking on a nationwide crime spree. This led to his placement on the US Most Wanted List, subsequent capture, imprisonment, escape, another capture, and ultimately accepting responsibility for his actions. Check out Brett's website: https://www.anglerphish.com/ Subscribe on YouTube: https://www.youtube.com/@brettjohnsonshow Will Martinez ~ Dark Fringe Radio: Check out DFR Website: https://darkfringeradio.com/ Follow on FB: https://www.facebook.com/darkfringeradio Get all of WTFrick LIVE's podcasts, where to watch, and merchandise: https://beacons.ai/wtfricklive Subscribe on Rumble: https://www.rumble.com/user/WTFrickLIVE #netflixandchill #truecrime #truecrimecommunity #cybersecurity #cyberattack #technology #documentary #anglerphish #wtfricklive

WTFrick LIVE
Episode 6 - Brett Johnson "The Original Internet Godfather" Part 2

WTFrick LIVE

Play Episode Listen Later Sep 7, 2022 65:25


WTFrick LIVE Emily Menshouse and Marianne Estridge Welcomes "The Internet Godfather" Brett Johnson to the show!!!Special Host: Ryder Lee from 'Raised by Giants; Check out is podcast on YouTube, Odysee, Rokfin, and all other podcast applications.Brett has been featured in the book, “Kingpin” by Kevin Poulsen and on numerous media outlets, including the New York Times, NBC, CNN Money, Wired Magazine, Vice, RT TV, ArsTechnica, The Independent, and more. Currently featured in Netflix's "Web of Make Believe: Death, Lies, and the Internet"Former United States Most Wanted, Brett Johnson, referred to by the United States Secret Service as “The Original Internet Godfather” has been a central figure in the cybercrime world for over 20 years. Mr. Johnson built and was the leader of ShadowCrew, the precursor to today's darknet markets. He was instrumental in developing many areas of online fraud while helping design, implement, and refine modern Identity Theft, Account Take Over Fraud, Card Not Present Fraud, IRS Tax Fraud, and countless other social engineering attacks, breaches, and hacking operations.Upon his capture, the United States Secret Service hired Mr. Brett Johnson to work as a consultant and informant. Johnson worked with the Secret Service for several months before going on a cross-country crime spree, being placed on the US Most Wanted List, being captured again, sent to prison, escaping prison, being captured yet again, and finally accepting responsibility for hisactions.Check out Brett's website:https://www.anglerphish.com/Raised by Giants:https://www.youtube.com/c/RaisedByGiantsIf you would like to be a guest on the show, please message us at RU Media Network Facebook Page! Link is below!Further LINKS and Contacts for WTFrick LIVE:Website:https://www.emilymenshouse.org/WTFrickLIVERumble:https://rumble.com/user/WTFrickLIVENOW ON ODYSEE:https://www.odysee.com/@wtfrickliveJoin our NEW group on Facebook:https://www.facebook.com/groups/450021966898437Follow RU Media Network:https://www.facebook.com/RUMediaNetwork

WTFrick LIVE
Episode 5 - Government Surveillance - Stingray Technology - Web of Make Believe

WTFrick LIVE

Play Episode Listen Later Sep 7, 2022 64:40


WTFrick LIVE Emily Menshouse and Special Co-Host Ryder Lee from @RaisedbyGiants Welcomes "The Internet Godfather" Brett Johnson to the show!!!You MUST WATCH Netflix's "Web of Make Believe: Death, Lies, and the Internet," episodes 5 and 6!!!!Brett has been featured in the book, “Kingpin” by Kevin Poulsen and on numerous media outlets, including the New York Times, NBC, CNN Money, Wired Magazine, Vice, RT TV, ArsTechnica, The Independent, and more. Currently featured in Netflix's "Web of Make Believe: Death, Lies, and the Internet"Former United States Most Wanted, Brett Johnson, referred to by the United States Secret Service as “The Original Internet Godfather” has been a central figure in the cybercrime world for over 20 years. Mr. Johnson built and was the leader of ShadowCrew, the precursor to today's darknet markets. He was instrumental in developing many areas of online fraud while helping design, implement, and refine modern Identity Theft, Account Take Over Fraud, Card Not Present Fraud, IRS Tax Fraud, and countless other social engineering attacks, breaches, and hacking operations.Upon his capture, the United States Secret Service hired Mr. Brett Johnson to work as a consultant and informant. Johnson worked with the Secret Service for several months before going on a cross-country crime spree, being placed on the US Most Wanted List, being captured again, sent to prison, escaping prison, being captured yet again, and finally accepting responsibility for his actions.Check out Brett's website:https://www.anglerphish.com/If you would like to be a guest on the show, please message us at RU Media Network Facebook Page! Link is below!Further LINKS and Contacts for WTFrick LIVE:Website:https://www.emilymenshouse.org/WTFrickLIVERumble:https://rumble.com/user/WTFrickLIVENOW ON ODYSEE:https://www.odysee.com/@wtfrickliveJoin our NEW group on Facebook:https://www.facebook.com/groups/450021966898437Follow RU Media Network:https://www.facebook.com/RUMediaNetwork

Modem Mischief
Kevin Poulsen aka Dark Dante

Modem Mischief

Play Episode Listen Later Feb 9, 2022 33:57


He lived his early hacker life on the run. The man known as Dark Dante hacked mobsters, the government and even a radio station to win himself a free Porsche. This is the story of Kevin Poulsen. Support us on Patreon Listen to the Starfleet Leadership Academy Created, Produced & Hosted by Keith Korneluk Written & Researched by Lauren Minkoff Edited, Mixed & Mastered by Greg Bernhard Theme Song You Are Digital by Computerbandit

Criminal Hijinks
Bonus Episode - Movie Review of Hackers

Criminal Hijinks

Play Episode Listen Later Jun 23, 2021 47:44


We try our hand at a movie review. We mentioned Hackers in the Kevin Poulsen episode, time to find out if Jason was correct? Is it like Kevin's life... Come find out!Email: criminalhijinks@gmail.comInstagram: @criminalhijinks Special thanks to Spooky Room Productions (@ripleystonebrook on Instagram) for our logo.

The Journal.
The Ruthless Group Behind Ransomware Attacks on Hospitals

The Journal.

Play Episode Listen Later Jun 15, 2021 17:11


A Wall Street Journal investigation has found that one hacking group - called Ryuk - is behind hundreds of attacks on U.S. health care facilities. WSJ's Kevin Poulsen details the rise of Ryuk, and one hospital administrator shares what it's like to be a victim of one of their attacks.

Criminal Hijinks
Episode 4 - Kevin Poulsen

Criminal Hijinks

Play Episode Listen Later Jun 7, 2021 43:55


In this episode we talk about a hacker who is responsible for some of the craziest hacks of all time, including controlling one of the largest phone systems on the planet and hacking into anything at will. As well as a few speculated activities such as military espionage and bringing down an entire phone system for unsolved mysteries, poor Robert Stack. In the end he turned his life around and helped out a lot of people in the process, listen and find out how. Email: criminalhijinks@gmail.comInstagram: @criminalhijinks Special thanks to Spooky Room Productions (@ripleystonebrook on Instagram) for our logo.

FraudCAST
"The Original Internet Godfather"

FraudCAST

Play Episode Listen Later May 13, 2021 34:01


In this episode Sam Piccolotti from ToolCASE sits down with Brett Johnson. Brett Johnson was formerly on the United States Most Wanted list and was referred to by the United States Secret Service as "The Original Internet Godfather". Brett has been a central figure in the cybercrime world for over 20 years. He was instrumental in developing many areas of online fraud while helping design, implement, and refine modern Identity Theft, Account Take Over Fraud, Card Not Present Fraud, IRS Tax Fraud, and countless other social engineering attacks, breaches, and hacking operations. Upon his capture, the United States Secret Service hired Johnson to work as a consultant and informant. Johnson worked with the Secret Service for several months before going on a cross country crime spree, being placed on the US Most Wanted List, being captured again, sent to prison, escaping prison, being captured yet again, and finally accepting responsibility for his actions. Today, Johnson works as a security consultant and public speaker. He is one of the world's foremost authorities on cybercrime and identity theft. During 2017, He has been featured in the book, "Kingpin" by Kevin Poulsen and on numerous media outlets, including the New York Times, NBC, CNN Money, Wired Magazine, Vice, RT TV, ArsTechnica, The Independent, and more.

Mysterious Radio
Wrong Numbers

Mysterious Radio

Play Episode Listen Later Oct 7, 2020 65:46


The AD-FREE version of this episode and all of our others is available right now on Patreon. My special guest tonight is a former TV investigative reporter and current part-time private investigator Glen Meeks to discuss his book called 'Wrong Numbers'. Wanna listen to the shows without the ads? Become a 'Mysterious Radio Truther' to enjoy every podcast "AD-FREE" right now! Follow us on Instagram @mysteriousradio Follow us on TikTok mysteriousradioTikTok Follow us on Twitter @mysteriousradio Follow us on Pinterest pinterest.com/mysteriousradio Like us on Facebook Facebook.com/mysteriousradio Visit our website: https://www.mysteriousradio.com Check Out Mysterious Radio! (copy the link to share with your friends and family via text) "Wrong Numbers is an intriguing and well-researched crime story detailing the intersection of big money and quick sex in the city that contains a lot of both." - Jack Sheehan, author of Skin City Was a hacker diverting phone calls meant for Las Vegas escort services? The FBI wanted to know, and so did associates of a New York Mafia family.  In one of the most unusual undercover operations ever, the FBI had an agent acting as a manager in a real Las Vegas escort service.  Federal agents expected to find prostitution and drugs in the Las Vegas escort industry. What their investigation uncovered was even more serious. "Wiseguys and wannabes are on the hunt for a shadowy hacker who may hold the keys to control of Las Vegas' multi-million dollar call girl racket, while FBI agents are hunting them. The result is a gripping true-life crime story that reads like a collaboration between Elmore Leonard and Williams Gibson told with the knowing savvy of two longtime chroniclers of Sin City's hidden underbelly." - Kevin Poulsen, author of KINGPIN: How One Hacker Took Over the Billion-Dollar Cybercrime Underground"In '90s Vegas, call girls worked for “entertainment” services that were little more than phone numbers, dispatchers, and drop safes. When a mystery hacker started diverting customer's calls to one service's number, it launched a series of dangerous events that involved the Mob, feds, hackers, service owners, and the phone system itself. This slice of Sin City history is as little-known as it is thrilling, and it's well-told by investigative journalist Glen Meek and crime writer Dennis Griffin." - Deke Castleman, author of Whale Hunt in the Desert: Secrets of a Vegas Superhost Learn more about your ad choices. Visit megaphone.fm/adchoices

Fraud Not Frog Podcast with Matt Christensen
Previewing CyberCraft Summit w/ Keynote John McClurg

Fraud Not Frog Podcast with Matt Christensen

Play Episode Listen Later Sep 26, 2020 5:47


There aren’t many security professionals who’ve had the breadth of experience reflected in John McClurg’s resume. The BlackBerry SVP and CISO spent his early career with the United States government, serving as both a supervisory special agent and branch chief for the FBI as well as a deputy branch chief for the CIA. In these roles, McClurg was involved in the capture of both Kevin Poulsen, the former black-hat hacker, and the CIA double-agent Harold James Nicholson. Following his public service, he served as a vice-president and Chief Security Officer for Lucent, Honeywell, and Dell before coming to Cylance and now BlackBerry.Keynote: The New Reality: Bringing Order to Chaos with Unified Endpoint SecurityWe’re poised to deliver a new reality across devices, networks, apps, and people leveraging AI, machine learning and automation.Fireside chat: “Of Cabbages & Kings”: The New Security & How AI is Liberating UsReactive Detection & Perimeter Trust. We’ll review one CISO’s journey, the forces that presaged this revolution, and what it portends for the future.If listening to this before 10/1/2020, register for the CyberCraft summit for free here. If listening to this after 10/2/2020, you can gain full access to the event recordings and CPE credits and get a huge discount on the VIP pass. EXCLUSIVE CPE PASS PRICING FOR FNF LISTENERSClick here for the Exclusive Fraud Not Frog CPE & Presentation Pass for up to 35 CPE credits and 1 full year access to redeem for self-study CPE if purchased by 10/2/2020. This link and offer is only good here for Fraud Not Frog fans.Here's what you get with the VIP CPE & Presentation Pass:Full access to the live virtual event, vendor booths, hiring eventFull access to earn up to 35 CPE self-study credits w/ 1 year Full access to the recorded presentations at the summit to access as much as you wantAll online, self-study, take at your own pace, 30 day money back 100% satisfaction guaranteeA portion of proceeds will fund two Cybersecurity and Anti-Fraud scholarships. 30-day money back guarantee. CPE honored based on standards generally accepted by professional certification bodies for live and self-study delivery methods.>>>>>> Click here for the Exclusive Fraud Not Frog CPE & Presentation Pass

Re-Solved Mysteries: An Unsolved Mysteries Podcast

Alison covers the unexplained death of Stanley Gryziec. Karlin tells us all about Kevin Poulsen, AKA Dark Dante and Eliza gives us all of the feels with the story of Charita Harding. This episode is sponsored by Raycon Wireless Earbuds. Go to buyraycon.com/resolvethepod for 15% off Raycon wireless earbuds. Promos: Murderific @MurderificBPC Get exclusive and early access to Short Stacks on Patreon: https://www.patreon.com/resolvedmysteriespodcast Support us: https://resolvedmysteriespodcast.com/advertising-support Oooooh get that sweeeeeeeet RM merch, honeys! https://resolvedmysteriespodcast.com/merch Follow us! IG @re_solvedmysteries Facebook @resolvethepod Twitter @resolvethepod Have a favorite unsolved mystery of your own? Contact us! resolvedmysteriespodcast@gmail.com Learn more about your ad choices. Visit megaphone.fm/adchoices

Community Signal
Trump’s Executive Order is a Danger to Online Communities

Community Signal

Play Episode Listen Later Jun 8, 2020 33:30


Black Lives Matter. As community professionals and hosts, we have the power to cultivate thoughtful spaces online. We serve communities and, if you’re a regular listener of this show, I doubt you’re serving racists. Systemic problems can feel overwhelming, but small things make a difference. Your community and how you manage it, regardless of the size of it, can be a part of the solution. I encourage you to think about that as you make choices that shape these platforms. On May 28, a couple of days after Twitter added a fact-checking notice to one of his tweets, Donald Trump signed an executive order targeting online communities and platforms. I believe that holding Trump accountable for his rhetoric and fighting white supremacy are the same fight. This executive order is designed to stop you, me, and big platforms from doing exactly that. On this episode, we’re talking with attorney Anette Beebe about the resulting fallout and answering some of your questions. Among our topics: What damage has Trump’s executive order done already? How does this impact community moderation right now? The publisher vs. platform “debate” Does adding notices to content make you liable? Our Podcast is Made Possible By… If you enjoy our show, please know that it’s only possible with the generous support of our sponsor: Vanilla, a one-stop shop for online community. Big Quotes The importance of being able to hold Trump accountable for his tweets (1:13): “I believe that holding Trump accountable for his rhetoric and fighting white supremacy are the same fight.” –@patrickokeefe Content moderation is hard (9:37): “It’s very tough to get content moderation right 100% of the time. It’s very subjective. We have to remember that these platforms, a lot of the big ones especially, aren’t just operating here in the U.S. They’re global. Global norms may be very different from what we’re used to here in the United States.” –@anette_beebe Fact-checking notices don’t impact Section 230 (21:02): “Section 230 has always been about reducing liability or immunizing platforms from putting stuff up or taking stuff down. Adding more speech, [like Twitter did with its fact-checking notices], takes it away from Section 230 and starts getting into your First Amendment. … Obviously, what the president tweeted out, talking about mail-in ballots, that’s where it started. [Twitter can] have a different opinion that, ‘No, this isn’t likely to cause fraud.’ What would someone sue for? Having a difference of opinion? That’s their First Amendment right. They can have a difference of opinion against the president. Thank you for living in the U.S. This is what we can do here.” –@anette_beebe Editing content can cause issues (23:32): “Editing can [open you up to liability] if it’s materially contributing to the content or materially altering it. Removing a link isn’t materially altering it necessarily. I haven’t seen any cases where that has been an issue. There may be a Section 230 case that I’m just unaware of, but I’ve never seen that be an issue or fixing capitalization, some of those basic editorial things that one would do. Those have always been fine. It’s when you change ‘is a bad guy’ to ‘is not a bad guy.’ That would be materially contributing.” –@anette_beebe Study is needed prior to legislation (31:35): “I have not seen any empirical studies done that would suggest, one way or another, that the [Section 230] harms we hear about, they’re so big that this is actually a huge issue. We’re on a 24-hour news cycle and people love dirty laundry. … How many issues are there really? Versus how much we’re perceiving it’s a big issue because we’re hearing about it all the time? I would love to see some studies done that actually weigh these types of issues out so we can make better-informed decisions before we just put pen to paper and start legislating things without really having a full understanding.” –@anette_beebe About Shana Sumers Shana Sumers is a black, queer womxn, who is the head of community for HER App, the largest social and dating app for LGBTQ+ womxn and queer people. With a community of over five million users worldwide, Shana has worked from the ground up to launch and grow a community that supports the wants and needs for this rainbow-filled group. Online communities, in-person events, social media, content creation, email marketing and customer support are just scratching the surface of skills utilized by Shana on a day to day basis. Related Links Sponsor: Vanilla, a one-stop shop for online community Twitter labels Trump tweets with a fact check for the first time Executive Order on Preventing Online Censorship Previous Community Signal episodes discussing Section 230: perspectives from community pros and hosts, Patrick and Scott Moore, David Greene, and Eric Goldman Anette Beebe Community Signal’s call out for questions for this episode Amanda Petersen’s response to the call out Eric Goldman, law professor at Santa Clara University and previous guest on the show Eric Goldman’s deep dive into the executive order The text of Section 230 Ravelry bans pro-Trump content Details about FOSTA-SESTA, legislation aimed at sex trafficking The first Trump tweet to receive Twitter’s fact-checking notice Tweet from Kevin Poulsen about how Twitter wouldn’t be able to host Trump without Section 230 Joe Biden and Trump saying they want to revoke 230 Breakdown of Herrick v. Grindr ruling Transcript View transcript on our website Your Thoughts If you have any thoughts on this episode that you’d like to share, please leave me a comment, send me an email or a tweet. If you enjoy the show, we would be so grateful if you spread the word and supported Community Signal on Patreon.

Tevora Talks Info-Sec Podcast
Tevora Talks Hacker History – Kevin Poulsen aka Dark Dante

Tevora Talks Info-Sec Podcast

Play Episode Listen Later May 13, 2020 29:24


This week, Matt Mosley and Kash Izadseta talk Hacker History and Kevin Paulson aka Dark Dante. Kevin Paulson made his debut in the hacking world in the good ol' days of phone freaking. At a young age, Poulsen aka Dark Dante, successfully "freaked" Los Angels based hit radio station 102.7 KIIS FM and won himself a brand new Porsche. His victory was short lived but paved the way for the rest of his hacking journey. Listen in to hear the story of how this California teen made it to the hacker wall of fame! Links mentioned in this episode: https://www.hackerscrackersandthieves.com/kevin-poulsen/ https://youtu.be/MAFFjZn8f70?t=1258 http://tevoratalks.com Instagram, Twitter, Facbook: @TevoraTalks

Graphic Novel Explorers Club

EPISODE 60Greetings, Explorers! For our sixtieth episode, the gang takes a look at Wizzywig. Ed Piskor wrote and illustrated the story. Top Shelf Comics published the story in 2011. Wizzywig tells the story of phone phreak-turned-hacker Kevin “Boingthump” Phenicle. Starting as a child prodigy with a curious mind, he spends his life fascinated with finding ways to game the system. Eventually his activities draw the attention of the FBI, leading Phenicle to becoming a fugitive from the law. Finally, “Boingthump” is a blend of legendary real-life hackers Kevin Mitnick, Kevin Poulsen, and Joe Engressia.Dennis, Johnny, and special guest Brian begin the episode by chatting about Ed Piskor's YouTube Channel, Cartoonist Kayfabe. Furthermore, they compare how the story parallels to the lives of Chelsea Manning and Edward Snowden. Also, they discuss the overall character design of Kevin “Boingthump” Phenicle by Ed Piskor compared to the other more “realistic” characters in the story. Is the character's design made to reflect innocence, the world around him, or both?The gang discusses the history of hacking, including its origins in phone phreaking. This would include the likes of Steve Jobs and Steve Wozniak, who sold Blue Boxes from the trunks of their cars. Further topics include if justice was actually served or not by the prosecution of Phenicle; the way “Boingthump” finally realizes the consequences of his actions; and last, but not least, the storytelling and art of Wizzywig.--- Send in a voice message: https://anchor.fm/graphicnovelexplorersclub/message See acast.com/privacy for privacy and opt-out information.

Paul's Security Weekly (Video-Only)
Security History - Lessons from the past - PSW #632

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Jan 3, 2020 73:31


The history of security can be traced back to a variety of different sources. The amount of articles on the topic is dizzying. Most will cite names of early phone phreaks, Kevin Mitnick, Kevin Poulsen, Steve Jobs, Steve Wozniak and quickly transition to many other more recent "hacks" or breaches. Our goal is to not review the history of hacking. This is the history of security. We've carefully chosen key events and research to discuss the very beginnings of security, and their impact and lessons for today's ever-evolving security landscape. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/PSWEpisode632

Paul's Security Weekly TV
Security History - Lessons from the past - PSW #632

Paul's Security Weekly TV

Play Episode Listen Later Jan 2, 2020 73:31


The history of security can be traced back to a variety of different sources. The amount of articles on the topic is dizzying. Most will cite names of early phone phreaks, Kevin Mitnick, Kevin Poulsen, Steve Jobs, Steve Wozniak and quickly transition to many other more recent "hacks" or breaches. Our goal is to not review the history of hacking. This is the history of security. We've carefully chosen key events and research to discuss the very beginnings of security, and their impact and lessons for today's ever-evolving security landscape. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/PSWEpisode632

InSecurity
John McClurg: The Most Interesting Man in Cybersecurity

InSecurity

Play Episode Listen Later Nov 4, 2019 99:46


John McClurg: The Most Interesting Man in Cybersecurity The police often question him just because they find him interesting Mosquitos refuse to bite him purely out of respect In museums, he is allowed to touch the art Once while sailing around the world, he discovered a short cut He has won the lifetime achievement award, twice His business card simply says “I’ll call you”   When you’ve traveled the globe and seen and done it all… what in the cybersecurity world gets you out of bed in the morning? How about taking down legendary hackers like Kevin Poulsen or Harlod James Nicholson? Too ordinary… okay… Imagine your first day as CSO at Dell and it starts in Baghdad. Maybe taking on the Mexican drug cartels with their IT budgets that are comparable to G7 countries… Maybe it’s something like studying the intersection of linguistics, philosophy, religion, law and interpretation… you know… Hermeneutics.   Now… about being the Most Interesting Man in Cybersecurity…   This week on Insecurity, Matt Stephenson sits down with one of those rare, been-there-done-that cybersecurity legends, John McClurg. John has tackeld cybersecurity for the FBI, the CIA, private enterprise and everywhere in between. He’s forgotten more amazing stories about security than most of us will be lucky enough to witness. Pull up a chair and enjoy!   About John McClurg John McClurg is an American security professional. He spent his early career with the US government, serving as both a supervisory special agent and branch chief for the FBI as well as a deputy branch chief for the CIA. In these roles, McClurg was involved in the capturing of both Kevin Poulsen and Harold James Nicholson.   Following his public service, John has served as a vice-president and Chief Security Officer for Lucent, Honeywell, Dell, and currently BlackBerry|Cylance.   About Matt Stephenson   Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV   Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come   Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.   Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!   Make sure you Subscribe, Rate and Review!

Synthetic Snake Oil: Online Security Tips
DP29 Kevin Poulsen hacks phones to win a Porsche

Synthetic Snake Oil: Online Security Tips

Play Episode Listen Later Nov 1, 2019 3:21


Hackers over the years change after a while. They aren’t always hellbent on causing chaos and destruction. In fact, in a lot of cases, most hackers tend to change dramatically once they have been arrested. One example is Kevin Poulsen. It only took one time for Poulsen to change his ways. The instance involved him hacking into all of the phone lines that were going to a Los Angeles radio show. The reason? In 1990, the radio show KIIS-FM held a contest where the 102nd caller would win a Porsche 944 S2. Though Kevin technically won said Porsche, police were suspicious and found that he won the prize illegitimately. When they went to capture Poulsen, he fled and went underground as a fugitive. Eventually, police captured him in April 1991. It wasn’t until 1994 though when Poulsen was sentenced for his crime. There were seven counts of conspiracy, fraud, and wiretapping which caused him to spend five years in a federal penitentiary, and was banned from using a computer or the internet for 3 years after his release. This was the first person in United States history to be banned from the internet for a period of time and to serve it. Chris Lamprecht received the same punishment, but he was still in jail while Poulsen was free and serving his ban sentence. What happened after Poulsen was done prison was reform entirely. He moved away from hacking entirely to now being a journalist. He first found work at SecurityFocus where he started to write news on hacking and security in the early 2000s. Despite this news being late to the market, SecurityFocus News became well-known within the industry. So much so that Symantec acquired that section later on. Even the mainstream press picked up Poulsen’s articles and research. Because of this, this solidified Poulsen as a quality writer. This amongst other things helped Poulsen jump into freelance writing and worked for various companies. Of note was his work with Wired News and now The Daily Beast. Since then, Poulsen has been crucial in revealing information about particular people. Some of his work has led to captures of various criminals as well. In October 2006, Poulsen’s work on MySpace managed to capture 744 users on MySpace who were registered as sex offenders. In June 2010, Poulsen reported the initial story of Chelsea Manning being arrested. He also published the logs of Manning’s chats with Adrian Lamo pertaining to WikiLeaks. Poulsen’s work and his life story to this point echoes similar themes to various hackers I’ve talked about before. Not all hackers resort to a life of crime after they’ve been caught and released. In many cases, hackers use their strengths to do good and to contribute to the society as a whole. Remember this moving forward with the many hackers out there in the world. Sometimes they need guidance and maybe a rude wake-up call.

Radio Entrepreneurs
“Transitioning Your Business To Market” with Kevin Poulsen of AlphaEquity Builder

Radio Entrepreneurs

Play Episode Listen Later Sep 18, 2019 8:45


Entrepreneurial leader. Impassioned champion of business/market innovation, well-versed in alternative energy, technology, consumer, and software sectors. Track record of profitability, funding product introductions through early customer adoption. Networking devotee who evangelizes product marketing and development processes from concept to market introduction. Enjoys building exceptional teams and lucrative alliances. The post “Transitioning Your Business To Market” with Kevin Poulsen of AlphaEquity Builder appeared first on Radio Entrepreneurs.

The History of Computing
DEF CON: A Brief History Of The Worlds Largest Gathering Of Hackers

The History of Computing

Play Episode Listen Later Aug 27, 2019 9:51


The History of DEF CON Welcome to the History of Computing Podcast, where we explore the history of information technology. Because understanding the past prepares us for the innovations of the future! Todays episode is on the history of DEF CON. I have probably learned more about technology in my years attending Blackhat and DEF CON than from any other source other than reading and writing books. But DEF CON specifically expanded my outlook on the technology industry and made me think of how others might consider various innovations, and sometimes how they might break them. DEF CON also gave me an insight into the hacker culture that I might not have gotten otherwise. Not the hacker culture many think of, but the desire to just straight up tinkerate with everything. And I do mean everything, sometimes much to the chagrin of the Vegas casino or hotel hosting the event. The thing that I have always loved about DEF CON is that, while there is a little shaming of vendors here and there, there's also a general desire to see security research push the envelope of what's possible, making vendors better and making the world a more secure place. Not actually trying to back things in a criminal way. In fact, there's an ethos that surrounds the culture. Yes, you want to find sweet, sweet o days. But when you do, you disclose the vulnerability before you tell the world that you can bring down any Cisco firewall. DEF CON has played a critical role in the development and remediation of rootlets, trojans, viruses, forensics, threat hunting research, social engineering, botnet detection and defeat, keystroke logging, DoS attacks, application security, network security, and privacy. In 2018, nearly 28,000 people attended Def Con. And the conference shows no signs of slowing down. In fact, the number of people with tattoos of Jack, the skull and crossbones-esque logo, only seems to be growing. As does the number of people who have black badges, which give them free access to DEF CON for life. But where did it get its start? The name is derived from WarGames, a 1983 movie that saw Matthew Broderick almost start World War III by playing a simulation of a nuclear strike with a computer. This was obviously before his freewheeling days as Ferris Bueller. Over the next decade, Bulletin Board Networks had become a prime target for hackers in it for the lolz. Back then, Bullet Boards were kinda' like what Reddit is today. But you dialed a network and then routed through a hierarchical system, with each site having a coordinator. A lot of Fido hacking was trying to become an admin of each board. If this sounds a lot like the Internet of today, the response would be “ish”. So Jeff Moss, also known as Dark Tangent, was a member of a group of hackers that liked to try to take over these bulletin boards called “Platinum Net”. He started planning a party for a network that was shut down. He had graduated from Gonzaga University with a degree in Criminal Justice a few years earlier, and invited #hack to join him in Vegas. Moss had graduated from Gonzaga University in Criminal Justice and so why not have 100 criminals join him in Vegas at the Sands Hotel and Casino! He got a little help from Dead Addict, and the event was a huge success. The next year, Artimage, Pappy Ozendorph, Stealth, Zac Franken, and Noid threw in to help coordinate things and the attendees at the conference doubled to around 200. They knew they had something special cookie' up. Def Con two, which was held at the Sahara, got mentions by Business Week and the New York Times, as well as PC Magazine, which was big at the time. DEF CON 3 happened right after the Hackers movie at the Tropicana, and DEF CON 4 actually had the FBI show up to to tell the hackers all the things at the Monte Carlo. DEF CON 4 also saw the introduction of Black Hat, a conference that runs before DEF CON. DEF CON 5 though, saw ABC News ZDNet, Computer World, and saw people show up to the Aladdin from all over the world, which is how I heard of the conference. The conference continued to grow. People actually started waiting to release tools until DEF CON. DEF CON 6 was held at the Plaza and then it went to the Alexis Park Resort from DEF CON 7 to DEF CON 13. DEF CON 7 will always be remembered for the release of Back Orifice 2000, a plugin based remote admin tool (or RAT) that I regrettably had to remove from many a device throughout my career. Of course it had an option for IRC-based command and control, as did all the best stuff on the Silk Road. Over the next few years the conference grew and law enforcement agents started to show up. I mean, easy pickings, right? This led to a “spot the fed” contest. People would of course try to hack each other, which led to maybe the most well-known contest, the scavenger hunt. I am obviously a history nerd so I always loved the Hacker Jeapoardy contest. You can also go out to the desert to shoot automatic weapons, participate in scavenger hunts, pick all the locks, buy some shirts, and of course, enjoy all the types of beverages with all the types of humans. All of these mini-events associated with DEF CON have certainly helped make the event what it is today. I've met people from the Homebrew Computer Club, Anonymous, the Legion of Doom, ShadowCrew, the Cult of the Dead Cow, and other groups there. I also met legends like Captain Crunch, Kevin Poulsen, Kevin Mitnick, L0pht (of L0phtcrack, and many others. By DEF CON 7 in 2000, the conference was getting too big to manage. So the Goons started to take over various portions of the con. People like Cjunky, Agent X, CHS, Code24, flea, Acronym, cyber, Gattaca, Froggy, Lockheed, Londo, Major Malfunction, Mattrix, G Mark, JustaBill, helped me keep from getting by eyebrows shaved off and were joined by other goons over the years. Keep in mind there are a lot of younger script kiddies who show up and this crew helps keep them safe. My favorite goon might be Noid. This was around the time the wall of sheep appeared, showing passwords picked up on the network. DEF CON 11 saw a bit of hacktivism when the conference started raising money for the Electronic Frontier Foundation. By 2005 the conferences had grown enough that Cisco even tried to shut down a talk from Michael Lynn that could basically shut down the Internet as we know it. Those pages mentioning the talk had to be torn out of the books. In one of the funner moments I've seen Michell Madigan was run out of the con for trying to secretly record one of the most privacy oriented groups I've ever been a part of. Dan Kaminsky rose to prominence in 2008 when he found some serious flaws in DNS. He was one of the inaugural speakers at Def Con China 1 in 2018. 2008 also saw a judge order a subway card hacking talk be cancelled, preventing three MIT students from talking about how they hacked the Boston subway. 2012 saw Keith Alexander, then director of the NSA give the keynote. Will Smith dropped by in 2013, although it was just to prepare for a movie. Probably not Suicide Squad. He didn't stay log. Probably because Dark Tangent asked the feds to stay away for awhile. DARPA came to play in 2016 giving out a 2 million dollar prize to the team that could build an autonomous AI bot that could handle offense and defense in a Capture the Flag style competition. 2017 made the news because they hosted a voting machine hacking village. Cambridge Global Advisors was a sponsor. They have no connection with Cambridge Analytica. No matter how you feel about politics, the hallmark of any democracy is certifying a fair and, um, democratic election. Jimmy Carter knows. He was 92 then. 2019 saw 30,000 people show up in Vegas for DEF CON 27. At this point, DEF CON has been on the X-Files, Mr. Robot, and given a node in the movie Jason Bourne. It is a special event. Being surrounded by so many people with unbridled curiosity is truly inspiring. I doubt I would ever have written my first book on security if not for the opportunity they gave me to speak at DEF CON and Blackhat. Oh, recording this episode just reminded me - I need to go book my room for next year! If you want to learn more about DEF CON, we'll include a link to the documentary from 2013 about it in the show notes. https://www.youtube.com/watch?v=3ctQOmjQyYg

The Unofficial Shopify Podcast
How to Prevent Fraud & Chargebacks

The Unofficial Shopify Podcast

Play Episode Listen Later Nov 13, 2018 47:50


Get a glimpse into the silent crime wave that cost the US economy $16 billion last year: credit card fraud. We'll find out: How fraudsters get ahold of your customers' personal info The various fraud schemes criminals use (this is fascinating) How chargebacks work How to protect yourself Tune in for more details! Resources NoFraud NoFraud in the App Store SPECIAL OFFER: 20% off for your first three months of service when you mention The Unofficial Shopify Podcast at the end of your trial Recommended Reading: Kingpin by Kevin Poulsen - "How One Hacker Took Over the Billion-Dollar Cybercrime Underground" App: Fraud Filter by Shopify Share your thoughts Ask a question in The Unofficial Shopify Podcast Facebook Group Share this show on Twitter Never miss an episode Subscribe on iTunes Join Kurt's newsletter Help the show Leave an honest review on iTunes. Your ratings & reviews help, and I read each one. Subscribe on iTunes What's Kurt up to? See our recent work at Ethercycle Take a ride with Kurt on YouTube Grow Your Store in 2018 Apply to work with Kurt to grow your store. Prefer to DIY? Read a free sample chapter of Kurt's book Ecommerce Bootcamp, absolutely free. Tell me where to send your sample at ecommerce-bootcamp.com Learn what's Shopify Plus got that regular Shopify doesn't?” Special Offers from our Sponsors Try Bold Product Upsell free for 90 days Improve your shop's search engine ranking with Venntov SEO Meta Manager Save 20% on Turbo, a blazing fast Shopify theme Recapture: Shopify's best abandoned cart recovery, over $65,000,000 recovered for stores just like yours.

Uncovering Unexplained Mysteries
Ep. 43: Dexter Stefonek (Murder), Kevin Poulsen (Hacker) & Josh chats with Susan Kelsay!

Uncovering Unexplained Mysteries

Play Episode Listen Later Apr 21, 2017 142:43


Like us on Facebook: www.facebook.com/UncoveringUnexplainedMysteries Support us on Patreon: www.patreon.com/UncoveringUnexplainedMysteries - Dexter Stefonek originally aired on April 12, 1989 - Kevin Poulsen originally aired on October 10, 1990 - The Kelsay House Haunting originally aired on January 23, 1991 (We also originally discussed this segment on episode number 6 of our podcast) Who murdered poor Dexter Stefonek? The man had already seen enough tragedy in his own life then the unspeakable happened at a rest stop in Montana. Later on the kid genius known as Kevin Poulsen is discussed. When it comes to computer hacking there are plenty of grey areas for what is right and what is wrong. Kevin started to go down a “dark” path but later turned his life around in this fascinating tale. Finally we end on an exclusive interview with Susan Kelsay. Her and her husband owned the “Kelsay House” which was featured on Unsolved Mysteries as a “ghosts” segment. A very Interesting conversation where we learn even more on what happened in that ghostly dwelling. For more Josh & Mike, but separate, chek them out on YouTube: Josh: www.youtube.com/DancingWithGhosts Mike: www.youtube.com/OCPCommunications

Skylight Books Author Reading Series

Exploding the Phone (Grove Press) In EXPLODING THE PHONE, Phil Lapsley illuminates the forgotten history of the proto-hackers, tinkerers, and pranksters who turned AT&T's telephone system into their electronic playground. Before smartphones and iPads, before the Internet or the personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world's largest machine: the telephone system. By the middle of the twentieth century the telephone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same. Phil Lapsley's EXPLODING THE PHONE traces the birth of long-distance communication and the telephone, the rise of AT&T's monopoly, the creation of the sophisticated machines that made it all work, and the discovery of Ma Bell's Achilles' heel. Lapsley expertly weaves together the clandestine network of “phone phreaks” who broke into the system to satisfy their curiosity, the mobsters who exploited its flaws to avoid the feds, and the counterculture movement that argued you should rip off the phone company to fight against the war in Vietnam. AT&T responded with “Greenstar,” an unprecedented project that would ultimately tap some thirty-three million telephone calls and record 1.5 million of them. The FBI fought back, too, especially when a phone phreak showed a confidential informant how he could remotely eavesdrop on FBI calls. Phone phreaking exploded into the popular culture, with famous actors, musicians, and investors caught with “blue boxes,” many of them built by two young phone phreaks named Steve Jobs and Steve Wozniak. Soon, the phone phreaks, the feds, and the phone company were at war. Based on original interviews and declassified documents, and featuring a forward by phone phreak turned Apple Computers co-founder Steve Wozniak, EXPLODING THE PHONE is a captivating, ground-breaking work about an important part of our cultural and technological history. "The definitive account of the first generation of network hackers – the scruffy rebels who first plumbed the secrets of the global telephone network, and accidentally earned the wrath of everyone from AT&T to the FBI. At turns a technological love story, a counter cultural history and a generation-spanning epic, Exploding the Phone is obsessively researched and told with wit and clarity. It captures a moment in time that might otherwise have been lost forever." —Kevin Poulsen, news editor of Wired.com and author of Kingpin Phil Lapsley is a cofounder of two high-tech companies, and a former consultant at McKinsey & Company. He holds a masters degree in electrical engineering from U. C. Berkeley and an MBA from the MIT Sloan School of Management. THIS EVENT WAS RECORDED LIVE AT SKYLIGHT BOOKS FEBRUARY 11, 2013. COPIES OF THE BOOK FROM THIS EVENT CAN BE PURCHASED HERE: http://www.skylightbooks.com/book/9780802120618

Center for Internet and Society
Pamela Long - Hearsay Culture Show #138 - KZSU-FM (Stanford)

Center for Internet and Society

Play Episode Listen Later May 11, 2011 56:06


A talk show on KZSU-FM, Stanford, 90.1 FM, hosted by Center for Internet & Society Resident Fellow David S. Levine. The show includes guests and focuses on the intersection of technology and society. How is our world impacted by the great technological changes taking place? Each week, a different sphere is explored. This week, David interviews Kevin Poulsen of Wired Magazine, author of Kingpin: How One Hacker Took Over the Billion Dollar Cyber Crime Underground. For more information, please go to http://hearsayculture.com.

Center for Internet and Society
Kevin Poulsen - Hearsay Culture Show #137 - KZSU-FM (Stanford)

Center for Internet and Society

Play Episode Listen Later Apr 19, 2011 55:55


A talk show on KZSU-FM, Stanford, 90.1 FM, hosted by Center for Internet & Society Resident Fellow David S. Levine. The show includes guests and focuses on the intersection of technology and society. How is our world impacted by the great technological changes taking place? Each week, a different sphere is explored. This week, David interviews Kevin Poulsen of Wired Magazine, author of Kingpin: How One Hacker Took Over the Billion Dollar Cyber Crime Underground. For more information, please go to http://hearsayculture.com.

Rick Kleffel:Agony Column
1047: A 2011 Interview with Kevin Poulsen

Rick Kleffel:Agony Column

Play Episode Listen Later Mar 20, 2011


"Max was pretty good at sussing out snitches...He wasn't perfect, if he'd been perfect, he wouldn't be in jail now."

kevin poulsen
Center for Internet and Society
Kevin Poulsen- CIS Speaker Series 2011

Center for Internet and Society

Play Episode Listen Later Mar 15, 2011 67:54


Talks from the Center for Internet and Society's Speaker Series. The topics span a variety of topics relating to civil rights and technological innovation. CIS is housed at the Stanford Law School.

Outriders
Hacking

Outriders

Play Episode Listen Later Feb 21, 2011 20:26


This week Jamillah turns to the murky world of computer hacking. Kevin Poulsen is no stranger to hacking and has a new book out called 'Kingpin'. He explains what it's all about.

hacking jamillah kevin poulsen