Preview

Kevin Poulsen Report

Good Essays
Open Document
Open Document
1849 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Kevin Poulsen Report
Introduction

Kevin Poulsen is a news editor at wired.com, and is co-author of Kingpin — How One Hacker Took Over the Billion Dollar Cyber Crime Underground (Crown, 2010). However, Poulsen did not start out as a journalist. Kevin Poulsen began his “career” as a hacker, and thanks to media attention, became rather notorious for his exploits. In this report I will attempt to highlight what Kevin Poulsen is famous for, what techniques he used, the criminal charges faced and the possible punishments, the social and ethical issues surrounding the case, and what countermeasures could have been used to prevent Poulsen's attacks.

What he is Famous for?

Kevin, like many hackers, began his hacking at a very early age. At age 13 he was hacking into telephone systems to impress friends, so that he and they were able to make free calls to long distance numbers. This activity is known as ‘phreaking’, and at the time was largely used for fun, although malicious uses could be made. By age 17 Kevin and a friend, Ronald Austin, hacked into the ARPANET, (Advanced Research Projects Agency Network), which was the world’s first operational packet switching network and the core network of a set that came to compose the internet. They were both caught, but “Because Poulsen was a juvenile, he wasn’t charged, but Austin was convicted of several of the 14 charges against him…” (Doug Fine for Spin Magazine, Jan 1994, page 64).

It would be three years later that Kevin Poulsen was to make his mark. Kevin hacked into the telephone and computer systems of Pacific Bell, as well as gaining entry to their buildings. He was caught again but it took the court nearly 18 moths to decide on what charges to impose on him. During this time, Kevin allegedly went on the run. Whilst waiting on the indictment, Kevin engaged in more hacking and phreaking activities. He and some friends hacked into the telephone system of KIIS-FM radio station in order to win the phone in competitions.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    All names in this book have been changed to protect everyone’s privacy. This book was not intended to cause drama, arguments or disagreements in any way.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Us Vs Arabo Case Study

    • 459 Words
    • 2 Pages

    In 2004, 18 year old Jason Salah Arabo from Michigan was arrested and pleaded guilty with conspiracy to order destructive computer attacks on business competitor’s websites from his home by remotely controlling them with a computer program called, “Bot”. Bots can be easily disguised as MP3 music files or pictures that unaware users download from public websites. Once they are downloaded, Bots will cause the virus to overload the website’s hosting computer server that result in crashing the entire system. Arabo wasn’t alone in this process. He and former 16 year old “Jasmine” Signh from New Jersey, creator of the Bot, had met Arabo on an instant messenger chat, and had agreed to help takedown Arabo’s competitor websites in exchange for Arabo’s merchandise, including designer sneakers. Arabo was running two business companies that sold throwback sports apparel such as team jerseys over the internet. Together, Arabo and Signh had designed the program in what they thought would help Arabo’s business by stopping customers from visiting and using other services.…

    • 459 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Timken Report

    • 10664 Words
    • 38 Pages

    Investment Thesis The Timken Company is the largest tapered roller bearings manufacturer in the world and one of the largest manufacturers of alloy and specialized steel in the world. The company reports revenues in three business segments: Steel (31% of 2005 revenue), Automotive (32%), and Industrial (37%). I feel that Timken is capable of delivering solid EPS and top-line revenue growth over the next two years, driven largely by demand for industrial bearings and steel products in key end-markets, including aerospace & defense, energy, rail, mining, and construction. Timken’s Industrial and Steel margins have been expanding since 2004, and with strong demand for the company’s products and global capacity constraints, I forecast margin expansion through 2008.…

    • 10664 Words
    • 38 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Take Home Midterm

    • 1653 Words
    • 7 Pages

    Another hacker wrongfully accused was named Jonathan James, or c0mrade. He was convicted and sent to prison for hacking in the United States–all while he was still a minor. At only fifteen years of age, he managed to hack into a number of networks, including those belonging to Bell South, Miami-Dade, the U.S. Department of Defense, and NASA.…

    • 1653 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Bendelladj Research Paper

    • 614 Words
    • 3 Pages

    Latterly, while scrolling through my Facebook newsfeed, I stumbled across a very interesting photo – shared by one of my friends. It claimed that Hamza Bendelladj, a 27-year-old, Algerian hacker had been sentenced to death by a US judge after allegedly co-creating a banking Trojan horse known as “SpyEye”. The Trojan has reportedly infected more than 1.4 million computers across the globe. It was used to steal millions of dollars from more than 200 American banks and financial institutions after obtaining sensitive information from computer systems, which the hacker had then apparently, donated to several Palestinian charities.…

    • 614 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    20142321 SIYIWANG TACC403

    • 2051 Words
    • 7 Pages

    4. K. Himma. (2004). The Ethics of Tracing Hacker Attacks Through the Machines of Innocent Persons. International Journal of Information Ethics. vol. 2, pp. (4), p1-13.…

    • 2051 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Olson, Parmy. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York: Little, Brown and Company, .…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Timothy McVeigh

    • 708 Words
    • 3 Pages

    Timothy was the only son out of 3 siblings (middle child). His parents divorced when Timothy was 10 years old. Raised by his father in Pendleton, NY; Timothy was bullied as a child throughout his elementary school days. He believed that the U.S government was the ultimate bully. Some saw Timothy as very shy and withdrawn, whereas others saw him as outgoing and playful. Throughout his childhood he only managed to have one girlfriend; he stated, “I don’t know how to impress girls.”…

    • 708 Words
    • 3 Pages
    Good Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    This paper was prepared and submitted for CJ360 Cybercrime Fall 2014, taught by Professor Alecia Schmidt.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Best Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays