Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Kevin Poulsen

From Wikipedia, the free encyclopedia
American computer hacker

Kevin Poulsen
Poulsen in 2014
Born
Kevin Lee Poulsen

(1965-11-30)November 30, 1965 (age 59)
Other namesDark Dante
OccupationContributing editor atThe Daily Beast
Children2
Criminal information
Criminal statusreleased
Convictionsseven counts of conspiracy, fraud, and intercepting wire communications
Criminal penalty51 months in federal prison, banned from using computers without permission from his probation officer

Kevin Lee Poulsen (born November 30, 1965) is an American contributing editor atThe Daily Beast, a formerblack-hathacker, and convicted fraudster.

Biography

[edit]

He was born inPasadena,California, on November 30, 1965.[1]

On June 1, 1990, Poulsen took over all of the telephone lines forLos Angelesradio stationKIIS-FM, guaranteeing that he would be the 102nd caller and win the prize of aPorsche 944 S2.[2][3][4]

When theFederal Bureau of Investigation started pursuing Poulsen, he went underground as a fugitive. A storage company cleared out a storage shed in Poulsen's name due to non-payment of rent, where computer equipment was discovered which was furnished to the FBI for evidence. When he was featured on NBC'sUnsolved Mysteries, the show's1-800 telephone lines mysteriously crashed.[2][5] Poulsen was arrested in April 1991[6] following an investigation led in part byJohn McClurg.[7][8]

In June 1994, Poulsen pleaded guilty to seven counts of conspiracy, fraud, and wiretapping.[6] He was sentenced to five years in a federal penitentiary and banned from using computers or the internet for three years after his release. He was the first American to be released from prison with a court sentence that banned him from using computers and the internet after his prison sentence. AlthoughChris Lamprecht was sentenced first with an internet ban on May 5, 1995, Poulsen was released from prison before Lamprecht and began serving his ban sentence earlier. (Poulsen's parole officer later allowed him to use the Internet in 2004, with certain monitoring restrictions).[9]

Journalism

[edit]

Poulsen reinvented himself as ajournalist after his release from prison and sought to distance himself from his criminal past. Poulsen served in a number of journalistic capacities at California-based security research firmSecurityFocus, where he began writing security and hacking news in early 2000. Despite a late arrival to a market saturated with technology media,SecurityFocus News became a well-known name in the tech news world during Poulsen's tenure with the company and was acquired bySymantec. Moreover, his original investigative reporting was frequently picked up by the mainstream press. Poulsen left SecurityFocus in 2005 to freelance and pursue independent writing projects. In June 2005, he became a senior editor forWired News, which hosted his blog, 27BStroke6,[10] later renamed Threat Level.[11]

In October 2006, Poulsen released information detailing his successful search for registeredsex offenders usingMySpace to solicit sex from children. His work identified 744 registered people with MySpace profiles and led to the arrest of one, Andrew Lubrano.[12]

In June 2010, Poulsen broke the initial story of the arrest of U.S. service memberChelsea Manning and published the logs of Manning's chats withAdrian Lamo regardingWikiLeaks.[13][14]

In June 2019, Poulsen was accused ofdoxing Shawn Brooks, a 34-year-oldTrump supporter living inThe Bronx, when Poulsen revealed Brooks' identity in an article published inThe Daily Beast on June 1, 2019 as the alleged creator and disseminator of a fake video which showedNancy Pelosi speaking in a slurred manner.[15][16][17]

SecureDrop

[edit]

Poulsen,Aaron Swartz, andJames Dolan designed and developedSecureDrop, anopen-source software platform forsecure communication betweenjournalists andsources. It was originally developed under the nameDeadDrop.[18][19] After Swartz's death Poulsen launched the first instance of the platform atThe New Yorker, on 15 May 2013.[20] Poulsen later turned over development of SecureDrop to theFreedom of the Press Foundation, and joined the foundation's technical advisory board.[21][22]

Personal life

[edit]

Kevin Poulsen lives in San Francisco with his wife and two children.[23]

Awards

[edit]

Books

[edit]

See also

[edit]

References

[edit]
  1. ^Gissel, Richard (2005).Digital Underworld (August 23, 2005 ed.). Lulu.com. p. 222.ISBN 1-4116-4423-9.Kevin Lee Poulsen was born in Pasadena, California in 1965. It was claimed that when he was 17 he used his radio shack TRS-80 to attack Arpanet, the predecessor of the Internet.
  2. ^ab"Kevin Poulsen".livinginternet. 2007.Archived from the original on January 2, 2016. RetrievedAugust 23, 2008.
  3. ^"A Crime By Any Other Name..."FREEDOM Magazine. Vol. 27, no. 4. Archived fromthe original on January 16, 1999. RetrievedAugust 24, 2008.
  4. ^Littman, Jonathan (September 12, 1993)."The Last Hacker : He Called Himself Dark Dante. His Compulsion Led Him to Secret Files and, Eventually, the Bar of Justice".Archived from the original on December 5, 2015. RetrievedJuly 15, 2016 – via LA Times.
  5. ^"Top 10 Most Famous Hackers of All Time".ITsecurity. 2007.Archived from the original on December 11, 2015. RetrievedAugust 24, 2008.
  6. ^abDeSantis, Jeannette (April 11, 1995)."Man Gets Longest Term for Hacker : Computers: Kevin Lee Poulsen, 29, of North Hollywood is ordered jailed for 51 months for rigging telephone lines during radio call-in contests".Los Angeles Times.Archived from the original on July 3, 2022. RetrievedJune 3, 2019.
  7. ^"Former FBI agent creates system to predict insider threats at Dell | IT Business". October 31, 2014.Archived from the original on July 3, 2022. RetrievedOctober 9, 2019.
  8. ^"Turns out Wargames' nuclear scenario is real".Archived from the original on July 3, 2022. RetrievedOctober 9, 2019.
  9. ^"exile.com".Wired. 2004.Archived from the original on November 5, 2011. RetrievedFebruary 26, 2014.
  10. ^"Wired.com".Wired. Archived fromthe original on June 2, 2006. RetrievedJanuary 27, 2012.
  11. ^Kravets, David (January 23, 2012)."Threat Level - Privacy, Crime and Security Online".Wired.Archived from the original on March 30, 2014. RetrievedJanuary 27, 2012.
  12. ^"MySpace Predator Caught by Code".Wired News. October 16, 2006.Archived from the original on February 27, 2007. RetrievedAugust 24, 2008.
  13. ^"U.S. Intelligence Analyst Arrested in Wikileaks Video Probe".Wired. June 10, 2010.Archived from the original on October 27, 2013. RetrievedJune 28, 2011.
  14. ^"Suspected Wikileaks Source Described Crisis of Conscience Leading to Leaks".Wired. June 10, 2010.Archived from the original on March 27, 2014. RetrievedJune 28, 2011.
  15. ^Miles, Frank (June 2, 2019)."Daily Beast accused of 'doxxing' alleged creator of 'Drunk Pelosi' video". Fox News.Archived from the original on July 4, 2022. RetrievedJune 3, 2019.
  16. ^Ingram, Mathew (June 3, 2019)."Should The Daily Beast have exposed the man behind 'drunk Pelosi' video?".Columbia Journalism Review.Archived from the original on July 4, 2022. RetrievedJune 5, 2019.
  17. ^Conradis, Brandon (June 3, 2019)."Man accused of creating fake Pelosi video plans to sue Daily Beast".The Hill.Archived from the original on June 5, 2019. RetrievedJune 5, 2019.
  18. ^Kassner, Michael (May 20, 2013)."Aaron Swartz legacy lives on with New Yorker's Strongbox: How it works".TechRepublic. Archived fromthe original on July 29, 2013. RetrievedMay 20, 2013.
  19. ^Paulsen, Kevin (May 15, 2013)."Strongbox and Aaron Swartz".The New Yorker.Archived from the original on June 5, 2013. RetrievedJune 17, 2013.
  20. ^Davidson, Amy (May 15, 2013)."Introducing Strongbox".The New Yorker.Archived from the original on June 29, 2013. RetrievedMay 20, 2013.
  21. ^"Freedom of the Press Foundation Launches SecureDrop, an Open-Source Submission Platform for Whistleblowers".PressFreedomFoundation.org. October 15, 2013.Archived from the original on August 2, 2014. RetrievedMarch 22, 2014.
  22. ^"Renowned Technologists, Journalists Join Freedom of the Press Foundation Technical Advisory Board".PressFreedomFoundation.org. March 12, 2014.Archived from the original on March 23, 2014. RetrievedMarch 22, 2014.
  23. ^"KINGPIN: How One Hacker Took Over the Billion-Dollar Cybercrime Underground".kingpin.cc.Archived from the original on November 4, 2020.
  24. ^ab"Webby Nominees".Webbyawards.com. October 28, 2011. Archived fromthe original on January 26, 2012. RetrievedJanuary 27, 2012.
  25. ^"2010 Top Cyber Security Journalist Award Winners". SANS. July 24, 2009.Archived from the original on November 14, 2011. RetrievedJanuary 27, 2012.
  26. ^"min's 2010 Best of the Web Awards". MinOnline. Archived fromthe original on February 6, 2012. RetrievedJanuary 27, 2012.
  27. ^"Digital Hall of Fame: Kevin Poulsen, Senior Editor, Wired.com". MinOnline. December 8, 2011. Archived fromthe original on January 29, 2012. RetrievedJanuary 27, 2012.
  28. ^"Knight-Batten 2008 Winners » Projects » J-Lab".J-lab.org. July 20, 2011.Archived from the original on December 15, 2015. RetrievedJanuary 27, 2012.
  29. ^"Knight-Batten 2007 Winners » Projects » J-Lab".J-lab.org. July 20, 2011.Archived from the original on December 15, 2015. RetrievedJanuary 27, 2012.

Further reading

[edit]
  • Jonathan Littman,The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen, 1997, publisher: Little, Brown.ISBN 0-316-52857-9

External links

[edit]
Wikimedia Commons has media related toKevin Lee Poulsen.
International
National
Academics
Retrieved from "https://en.wikipedia.org/w/index.php?title=Kevin_Poulsen&oldid=1280361045"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp