Searching...
English
EnglishEnglish
EspañolSpanish
简体中文Chinese
FrançaisFrench
DeutschGerman
日本語Japanese
PortuguêsPortuguese
ItalianoItalian
한국어Korean
РусскийRussian
NederlandsDutch
العربيةArabic
PolskiPolish
हिन्दीHindi
Tiếng ViệtVietnamese
SvenskaSwedish
ΕλληνικάGreek
TürkçeTurkish
ไทยThai
ČeštinaCzech
RomânăRomanian
MagyarHungarian
УкраїнськаUkrainian
Bahasa IndonesiaIndonesian
DanskDanish
SuomiFinnish
БългарскиBulgarian
עבריתHebrew
NorskNorwegian
HrvatskiCroatian
CatalàCatalan
SlovenčinaSlovak
LietuviųLithuanian
SlovenščinaSlovenian
СрпскиSerbian
EestiEstonian
LatviešuLatvian
فارسیPersian
മലയാളംMalayalam
தமிழ்Tamil
اردوUrdu
Kingpin

Kingpin

How One Hacker Took Over the Billion-Dollar Cybercrime Underground
by Kevin Poulsen 2011 288 pages
3.97
7k+ ratings
Listen
Try Full Access for 7 Days
Unlock listening & more!
Continue

Key Takeaways

1. Max Butler's Early Impulses and Dual Nature

When his manic side flared, the world was too slow to keep up; his brain moved at light speed and focused like a laser on whatever task was before him.

Early life. Max Butler grew up in Idaho, a computer prodigy with a restless, impulsive nature. His parents' divorce deeply affected him, seemingly splitting his personality into calm and intensely manic modes. This intensity, combined with a passion for computers inherited from his father, led him to explore the burgeoning online world and phone phreaking from a young age.

Trouble with authority. Max's disregard for rules manifested early. A Secret Service warning about his phone phreaking went unheeded. His impulsive side led him and friends to steal a master key to their high school, resulting in vandalism and chemical theft. This led to his first arrest, a bipolar diagnosis, and a five-year prison sentence for aggravated assault after a domestic dispute escalated, a charge later deemed legally questionable.

Lessons learned? Prison left Max bitter about the justice system but seemingly undeterred from pushing boundaries. Upon release, he adopted the name Max Ray Vision, aiming for a fresh start. However, his return to online activities quickly led to software piracy and another brush with the law, highlighting the persistent pull of his rebellious nature despite his aspirations for a legitimate life.

2. From White Hat to FBI Informant

Max liked the FBI agent, and the feeling seemed to be mutual.

A new identity. After his piracy bust, Max Vision moved to Silicon Valley, seeking work in the booming dot-com industry. He found a job and began building a reputation as a "white-hat" hacker, applying his skills to computer security. This era saw a shift in the hacking community, with many moving from intrusion to defense.

Working with the Feds. His past caught up when the Software Publishers Association sued him for piracy. This led to an introduction to FBI agent Chris Beeson, who recruited Max as a criminal informant. Max, code-named "Equalizer," provided intelligence on the computer underground, hoping to earn leniency for his past actions and build a bridge to a legitimate career.

Testing boundaries. Despite working for the FBI, Max couldn't resist the urge to hack. He discovered a critical vulnerability in BIND, a core Internet program, and impulsively decided to exploit it himself. He hacked into numerous U.S. government and military systems, not to cause harm, but to "fix" the vulnerability by installing backdoors only he controlled, believing he was doing a "greater good."

3. Disillusionment and the Lure of Cybercrime

Max began to wonder if he had a future in computer security at all.

Caught red-handed. Max's BIND attacks were traced back to him, leading to an FBI raid. Despite his claims of good intentions, his actions were illegal. The FBI offered him a deal: cooperate more deeply, specifically by trying to implicate his boss, Matt Harrigan. Max refused to betray his friend and hired a lawyer, Jennifer Granick, who advised him against cooperating further without a formal deal.

Facing consequences. The FBI dropped Max as an informant and pursued an indictment. Facing prison, Max struggled to find legitimate work due to his felony record. His attempts at penetration testing were met with resistance, and his skills, honed in prison, were becoming outdated compared to the rapidly evolving security landscape.

A tempting offer. Disillusioned and financially struggling, Max reconnected with Jeff Norminton, a con man he met in prison. Norminton offered to bankroll Max's return to hacking, this time for profit. Max, tired of trying to go straight and feeling unjustly punished, accepted, marking his full transition from white hat and informant back to the criminal underground.

4. Building a Criminal Empire: Carders Market

With one stroke, Max had undermined years of careful law enforcement work and revitalized a billion-dollar criminal underworld.

Partnering for profit. Max teamed up with Chris Aragon, a former bank robber and drug smuggler who had found success in credit card fraud. Chris, fascinated by the online carding world, saw the potential in Max's hacking skills. Max, in turn, saw Chris as a partner who could monetize stolen data and provide financial support.

Targeting criminals. Max began hacking carders themselves, seeing them as morally acceptable targets and easy prey. He used sophisticated client-side exploits, like a zero-day vulnerability in Internet Explorer disguised as a "Free Amex" offer, to compromise thousands of carders' computers and steal their dumps and other valuable information.

Creating a marketplace. Frustrated by existing crime forums, Max decided to create his own: Cardersmarket.com, operating under the handle "Iceman." He envisioned a secure, well-organized site. In a bold move, he hacked and wiped out several rival English and Russian carding forums, consolidating their users onto Carders Market and establishing it as the dominant platform, much to the dismay of law enforcement and rival criminals.

5. The Rise of Organized Cybercrime and Data Theft

Once the underground figured out that part of the equation, it would be an industry of its own.

The new frontier. The arrest of Russian hackers Alexey Ivanov and Vasiliy Gorshkov in 2000 revealed a new breed of profit-oriented cybercriminals, primarily from Eastern Europe. They were technically skilled and organized, engaging in extortion and large-scale data theft, signaling a major shift in the landscape of online crime.

Carding forums emerge. Sites like Counterfeit Library, CarderPlanet, and Shadowcrew provided centralized marketplaces and knowledge bases for this growing criminal economy. They facilitated the buying and selling of stolen credit card data ("dumps"), counterfeit IDs, hacking tools, and other illicit goods and services, creating a global network of cybercriminals.

Data becomes currency. The introduction of security features like CVV codes made raw credit card numbers less useful, driving demand for full magstripe data ("dumps"). Criminals developed new methods to steal this data, including:

  • Recruiting insiders (e.g., restaurant workers with skimmers)
  • Hacking point-of-sale systems
  • Exploiting vulnerabilities in corporate networks

This fueled a multi-billion dollar black market, with dumps selling for $20-$100 depending on the card type.

6. Law Enforcement's Undercover War

Who is Iceman?

Struggling to adapt. Law enforcement, initially focused on recreational hackers, faced a new challenge with organized, profit-driven cybercrime. Traditional methods were often ineffective against anonymous online actors operating across international borders.

Informants and stings. Agencies like the FBI and Secret Service began recruiting informants from within the underground. Albert Gonzalez ("Cumbajohnny"), a Shadowcrew administrator, became a key asset in "Operation Firewall," which used a wiretapped VPN to gather evidence and resulted in dozens of arrests, temporarily disrupting the scene. Dave Thomas ("El Mariachi") also worked as an FBI informant running a crime forum honeypot.

Infiltrating the forums. Recognizing the forums as central hubs, FBI agent Keith Mularski ("Master Splyntr") embarked on an ambitious undercover operation to infiltrate and eventually take over a major carding site. Operating from a civilian office in Pittsburgh, Mularski built a legend as a Polish spammer to gain credibility and access to the vouched forums that emerged after Operation Firewall.

7. The Cat-and-Mouse Game and Exposure

You are No Longer Anonymous!!

Post-Firewall chaos. Operation Firewall scattered carders, but they quickly regrouped on new, smaller forums. Max's hostile takeover of these sites, consolidating them into Carders Market, brought a temporary order but also drew significant attention and sparked rivalries.

Rivalries and paranoia. Max's actions ignited a public feud with Dave Thomas ("El Mariachi"), who suspected Iceman was law enforcement. Thomas relentlessly attacked Carders Market's hosting, eventually forcing Max to move the site to Iran. This public "carder war" drew media attention, exposing Iceman to a wider audience.

Master Splyntr's cover blown. Max's paranoia extended to his own administrators. Suspecting Master Splyntr was a mole, Max used his hacking skills to trace Splyntr's login IP address back to the NCFTA office in Pittsburgh, correctly identifying him as a federal agent. Despite Max's efforts to expose him, Mularski managed to maintain his cover by quickly moving DarkMarket's hosting and discrediting Max's claims.

8. The Net Closes: Arrest and Aftermath

Iceman’s identity had been hidden in the government’s computers all along.

Evidence accumulates. Law enforcement agencies, including the Secret Service and FBI, were independently tracking Max. Giannone's arrest for selling Max's dumps led to his cooperation, providing key details about Iceman and his partner Chris Aragon. This information, combined with old records from Norminton and Janer, finally linked Iceman to Max Ray Vision.

The final hunt. Physical surveillance and electronic monitoring confirmed Max's location at a corporate apartment in San Francisco. Aware of Max's use of strong encryption (DriveCrypt), law enforcement planned the raid carefully to capture his computers while they were running, allowing forensic experts from CERT to access the decryption key stored in RAM.

Capture and consequences. Max was arrested in September 2007. His encrypted hard drives, once thought impenetrable, were cracked. The evidence revealed the full scope of his crimes, including 1.8 million stolen credit card accounts and estimated losses of $86.4 million. Facing decades in prison, Max cooperated, leading to a plea deal and a thirteen-year sentence, the longest for a hacker at the time.

Legacy. Max's arrest, along with those of other major players like Maksik and Albert Gonzalez, significantly disrupted the carding underground. While cybercrime continues to evolve, the era of large, open English-speaking forums like Shadowcrew and Carders Market ended. The case also highlighted the ongoing challenges of encryption and the need for better security standards like chip-and-PIN, which the U.S. has been slow to adopt.

Last updated:

Review Summary

3.97 out of 5
Average of 7k+ ratings from Goodreads and Amazon.

Kingpin receives mostly positive reviews, praised for its engaging narrative and insights into cybercrime. Readers appreciate the accessible explanations of technical concepts and the compelling portrayal of hacker Max Butler's rise and fall. Many find the book eye-opening regarding credit card fraud and internet security vulnerabilities. Some critics note disorganization and bias, while others commend the author's expertise. The book is described as a fast-paced, informative read that appeals to those interested in hacking, cybersecurity, and true crime.

Your rating:
4.46
1 ratings

About the Author

Kevin Poulsen is a former hacker turned technology journalist specializing in computer security. After serving time in prison, he reinvented himself as a respected journalist, starting at SecurityFocus in 2000. His work there gained recognition, leading to the company's acquisition by Symantec. Poulsen's investigative reporting often garnered mainstream media attention. In 2005, he became a senior editor at Wired News, where he maintained a blog initially called 27BStroke6, later renamed Threat Level. Poulsen's transition from hacker to journalist demonstrates his expertise in the field of cybersecurity and his ability to provide unique insights into the world of hacking.

Listen to Summary
0:00
-0:00
1x
Dan
Andrew
Michelle
Lauren
Select Speed
1.0×
+
200 words per minute
Home
Library
Get App
Create a free account to unlock:
Requests: Request new book summaries
Bookmarks: Save your favorite books
History: Revisit books later
Recommendations: Personalized for you
Ratings: Rate books & see your ratings
100,000+ readers
Try Full Access for 7 Days
Listen, bookmark, and more
Compare Features Free Pro
📖 Read Summaries
All summaries are free to read in 40 languages
🎧 Listen to Summaries
Listen to unlimited summaries in 40 languages
❤️ Unlimited Bookmarks
Free users are limited to 10
📜 Unlimited History
Free users are limited to 10
Risk-Free Timeline
Today: Get Instant Access
Listen to full summaries of 73,530 books. That's 12,000+ hours of audio!
Day 4: Trial Reminder
We'll send you a notification that your trial is ending soon.
Day 7: Your subscription begins
You'll be charged on May 15,
cancel anytime before.
Consume 2.8x More Books
2.8x more books Listening Reading
Our users love us
100,000+ readers
"...I can 10x the number of books I can read..."
"...exceptionally accurate, engaging, and beautifully presented..."
"...better than any amazon review when I'm making a book-buying decision..."
Save 62%
Yearly
$119.88 $44.99/year
$3.75/mo
Monthly
$9.99/mo
Try Free & Unlock
7 days free, then $44.99/year. Cancel anytime.
Scanner
Find a barcode to scan

Settings
General
Widget
Loading...