Searching...
English
EnglishEnglish
EspañolSpanish
简体中文Chinese
FrançaisFrench
DeutschGerman
日本語Japanese
PortuguêsPortuguese
ItalianoItalian
한국어Korean
РусскийRussian
NederlandsDutch
العربيةArabic
PolskiPolish
हिन्दीHindi
Tiếng ViệtVietnamese
SvenskaSwedish
ΕλληνικάGreek
TürkçeTurkish
ไทยThai
ČeštinaCzech
RomânăRomanian
MagyarHungarian
УкраїнськаUkrainian
Bahasa IndonesiaIndonesian
DanskDanish
SuomiFinnish
БългарскиBulgarian
עבריתHebrew
NorskNorwegian
HrvatskiCroatian
CatalàCatalan
SlovenčinaSlovak
LietuviųLithuanian
SlovenščinaSlovenian
СрпскиSerbian
EestiEstonian
LatviešuLatvian
فارسیPersian
മലയാളംMalayalam
தமிழ்Tamil
اردوUrdu
Kingpin

Kingpin

How One Hacker Took Over the Billion-Dollar Cybercrime Underground
by Kevin Poulsen 2011 288 pages
3.97
8.0K ratings
Listen
Try Full Access for 7 Days
Unlock listening & more!
Continue

Key Takeaways

1. Max Butler's Early Impulses and Dual Nature

When his manic side flared, the world was too slow to keep up; his brain moved at light speed and focused like a laser on whatever task was before him.

Early life. Max Butler grew up in Idaho, a computer prodigy with a restless, impulsive nature. His parents' divorce deeply affected him, seemingly splitting his personality into calm and intensely manic modes. This intensity, combined with a passion for computers inherited from his father, led him to explore the burgeoning online world and phone phreaking from a young age.

Trouble with authority. Max's disregard for rules manifested early. A Secret Service warning about his phone phreaking went unheeded. His impulsive side led him and friends to steal a master key to their high school, resulting in vandalism and chemical theft. This led to his first arrest, a bipolar diagnosis, and a five-year prison sentence for aggravated assault after a domestic dispute escalated, a charge later deemed legally questionable.

Lessons learned? Prison left Max bitter about the justice system but seemingly undeterred from pushing boundaries. Upon release, he adopted the name Max Ray Vision, aiming for a fresh start. However, his return to online activities quickly led to software piracy and another brush with the law, highlighting the persistent pull of his rebellious nature despite his aspirations for a legitimate life.

2. From White Hat to FBI Informant

Max liked the FBI agent, and the feeling seemed to be mutual.

A new identity. After his piracy bust, Max Vision moved to Silicon Valley, seeking work in the booming dot-com industry. He found a job and began building a reputation as a "white-hat" hacker, applying his skills to computer security. This era saw a shift in the hacking community, with many moving from intrusion to defense.

Working with the Feds. His past caught up when the Software Publishers Association sued him for piracy. This led to an introduction to FBI agent Chris Beeson, who recruited Max as a criminal informant. Max, code-named "Equalizer," provided intelligence on the computer underground, hoping to earn leniency for his past actions and build a bridge to a legitimate career.

Testing boundaries. Despite working for the FBI, Max couldn't resist the urge to hack. He discovered a critical vulnerability in BIND, a core Internet program, and impulsively decided to exploit it himself. He hacked into numerous U.S. government and military systems, not to cause harm, but to "fix" the vulnerability by installing backdoors only he controlled, believing he was doing a "greater good."

3. Disillusionment and the Lure of Cybercrime

Max began to wonder if he had a future in computer security at all.

Caught red-handed. Max's BIND attacks were traced back to him, leading to an FBI raid. Despite his claims of good intentions, his actions were illegal. The FBI offered him a deal: cooperate more deeply, specifically by trying to implicate his boss, Matt Harrigan. Max refused to betray his friend and hired a lawyer, Jennifer Granick, who advised him against cooperating further without a formal deal.

Facing consequences. The FBI dropped Max as an informant and pursued an indictment. Facing prison, Max struggled to find legitimate work due to his felony record. His attempts at penetration testing were met with resistance, and his skills, honed in prison, were becoming outdated compared to the rapidly evolving security landscape.

A tempting offer. Disillusioned and financially struggling, Max reconnected with Jeff Norminton, a con man he met in prison. Norminton offered to bankroll Max's return to hacking, this time for profit. Max, tired of trying to go straight and feeling unjustly punished, accepted, marking his full transition from white hat and informant back to the criminal underground.

4. Building a Criminal Empire: Carders Market

With one stroke, Max had undermined years of careful law enforcement work and revitalized a billion-dollar criminal underworld.

Partnering for profit. Max teamed up with Chris Aragon, a former bank robber and drug smuggler who had found success in credit card fraud. Chris, fascinated by the online carding world, saw the potential in Max's hacking skills. Max, in turn, saw Chris as a partner who could monetize stolen data and provide financial support.

Targeting criminals. Max began hacking carders themselves, seeing them as morally acceptable targets and easy prey. He used sophisticated client-side exploits, like a zero-day vulnerability in Internet Explorer disguised as a "Free Amex" offer, to compromise thousands of carders' computers and steal their dumps and other valuable information.

Creating a marketplace. Frustrated by existing crime forums, Max decided to create his own: Cardersmarket.com, operating under the handle "Iceman." He envisioned a secure, well-organized site. In a bold move, he hacked and wiped out several rival English and Russian carding forums, consolidating their users onto Carders Market and establishing it as the dominant platform, much to the dismay of law enforcement and rival criminals.

5. The Rise of Organized Cybercrime and Data Theft

Once the underground figured out that part of the equation, it would be an industry of its own.

The new frontier. The arrest of Russian hackers Alexey Ivanov and Vasiliy Gorshkov in 2000 revealed a new breed of profit-oriented cybercriminals, primarily from Eastern Europe. They were technically skilled and organized, engaging in extortion and large-scale data theft, signaling a major shift in the landscape of online crime.

Carding forums emerge. Sites like Counterfeit Library, CarderPlanet, and Shadowcrew provided centralized marketplaces and knowledge bases for this growing criminal economy. They facilitated the buying and selling of stolen credit card data ("dumps"), counterfeit IDs, hacking tools, and other illicit goods and services, creating a global network of cybercriminals.

Data becomes currency. The introduction of security features like CVV codes made raw credit card numbers less useful, driving demand for full magstripe data ("dumps"). Criminals developed new methods to steal this data, including:

  • Recruiting insiders (e.g., restaurant workers with skimmers)
  • Hacking point-of-sale systems
  • Exploiting vulnerabilities in corporate networks

This fueled a multi-billion dollar black market, with dumps selling for $20-$100 depending on the card type.

6. Law Enforcement's Undercover War

Who is Iceman?

Struggling to adapt. Law enforcement, initially focused on recreational hackers, faced a new challenge with organized, profit-driven cybercrime. Traditional methods were often ineffective against anonymous online actors operating across international borders.

Informants and stings. Agencies like the FBI and Secret Service began recruiting informants from within the underground. Albert Gonzalez ("Cumbajohnny"), a Shadowcrew administrator, became a key asset in "Operation Firewall," which used a wiretapped VPN to gather evidence and resulted in dozens of arrests, temporarily disrupting the scene. Dave Thomas ("El Mariachi") also worked as an FBI informant running a crime forum honeypot.

Infiltrating the forums. Recognizing the forums as central hubs, FBI agent Keith Mularski ("Master Splyntr") embarked on an ambitious undercover operation to infiltrate and eventually take over a major carding site. Operating from a civilian office in Pittsburgh, Mularski built a legend as a Polish spammer to gain credibility and access to the vouched forums that emerged after Operation Firewall.

7. The Cat-and-Mouse Game and Exposure

You are No Longer Anonymous!!

Post-Firewall chaos. Operation Firewall scattered carders, but they quickly regrouped on new, smaller forums. Max's hostile takeover of these sites, consolidating them into Carders Market, brought a temporary order but also drew significant attention and sparked rivalries.

Rivalries and paranoia. Max's actions ignited a public feud with Dave Thomas ("El Mariachi"), who suspected Iceman was law enforcement. Thomas relentlessly attacked Carders Market's hosting, eventually forcing Max to move the site to Iran. This public "carder war" drew media attention, exposing Iceman to a wider audience.

Master Splyntr's cover blown. Max's paranoia extended to his own administrators. Suspecting Master Splyntr was a mole, Max used his hacking skills to trace Splyntr's login IP address back to the NCFTA office in Pittsburgh, correctly identifying him as a federal agent. Despite Max's efforts to expose him, Mularski managed to maintain his cover by quickly moving DarkMarket's hosting and discrediting Max's claims.

8. The Net Closes: Arrest and Aftermath

Iceman’s identity had been hidden in the government’s computers all along.

Evidence accumulates. Law enforcement agencies, including the Secret Service and FBI, were independently tracking Max. Giannone's arrest for selling Max's dumps led to his cooperation, providing key details about Iceman and his partner Chris Aragon. This information, combined with old records from Norminton and Janer, finally linked Iceman to Max Ray Vision.

The final hunt. Physical surveillance and electronic monitoring confirmed Max's location at a corporate apartment in San Francisco. Aware of Max's use of strong encryption (DriveCrypt), law enforcement planned the raid carefully to capture his computers while they were running, allowing forensic experts from CERT to access the decryption key stored in RAM.

Capture and consequences. Max was arrested in September 2007. His encrypted hard drives, once thought impenetrable, were cracked. The evidence revealed the full scope of his crimes, including 1.8 million stolen credit card accounts and estimated losses of $86.4 million. Facing decades in prison, Max cooperated, leading to a plea deal and a thirteen-year sentence, the longest for a hacker at the time.

Legacy. Max's arrest, along with those of other major players like Maksik and Albert Gonzalez, significantly disrupted the carding underground. While cybercrime continues to evolve, the era of large, open English-speaking forums like Shadowcrew and Carders Market ended. The case also highlighted the ongoing challenges of encryption and the need for better security standards like chip-and-PIN, which the U.S. has been slow to adopt.

Last updated:

Want to read the full book?

FAQ

1. What is Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen about?

  • Chronicles Max Butler’s rise: The book follows Max Butler, a talented hacker who transitions from white-hat security work to masterminding a billion-dollar cybercrime empire.
  • Explores cybercrime evolution: It details the growth of online criminal marketplaces, the methods hackers use, and the law enforcement efforts to stop them.
  • Personal and historical narrative: The story is both a biography of Butler and a broader history of early 2000s cybercrime, highlighting the human side of hackers and the consequences of their actions.
  • Cat-and-mouse dynamic: The book illustrates the ongoing battle between hackers and authorities, showing both technical and psychological aspects of cybercrime.

2. Why should I read Kingpin by Kevin Poulsen?

  • Insider view of cybercrime: The book offers a rare, detailed look into the underground world of hackers, carders, and cybercriminals.
  • Thrilling true-crime narrative: It reads like a suspenseful thriller, with real-life stakes, betrayals, and high-tech intrigue.
  • Relevance to modern security: Understanding the origins and methods of cybercrime is crucial for anyone interested in cybersecurity, law enforcement, or digital privacy.
  • Humanizes complex issues: Poulsen presents hackers as multidimensional people, making the story accessible and thought-provoking for readers of all backgrounds.

3. Who is Max Butler (aka Iceman), and why is he central to Kingpin by Kevin Poulsen?

  • Protagonist and antihero: Max Butler, known as Iceman, is the main figure whose life and actions drive the narrative.
  • Dual identity: He started as a white-hat hacker and informant but became a notorious black-hat criminal, running the largest English-speaking carding forum.
  • Technical mastermind: Butler’s skills allowed him to hack thousands of systems, steal millions of credit card numbers, and orchestrate a hostile takeover of rival forums.
  • Complex personality: His struggles with bipolar disorder, need for control, and shifting loyalties illustrate the blurred lines between good and bad in the hacking world.

4. What are carding forums, and how do they function in the cybercrime underground described in Kingpin?

  • Definition and purpose: Carding forums are online marketplaces where criminals buy, sell, and trade stolen credit card data, hacking tools, and illicit services.
  • Social structure: These forums have admins, moderators, vendors, and buyers, with reputation systems to build trust and prevent scams.
  • Knowledge sharing: Forums host tutorials, scam reviews, and discussions, making them both marketplaces and knowledge centers for cybercrime.
  • Law enforcement targets: Their openness and reliance on trust make them vulnerable to infiltration by undercover agents and informants.

5. How did Max Butler execute the hostile takeover of competing carding forums in Kingpin?

  • Technical exploits: Butler used SQL injection, password reuse, and other vulnerabilities to gain admin access to rival forums.
  • Database consolidation: He merged user databases from multiple forums into Carders Market, forcing criminals to migrate to his platform.
  • Destruction of competitors: After copying data, he deleted the original forums’ databases, effectively shutting them down.
  • Impact on the underground: This move consolidated power but also angered many criminals and drew increased law enforcement attention.

6. What are the key cybercrime concepts and methods explained in Kingpin by Kevin Poulsen?

  • Carding and dumps: The book explains how stolen credit card data (“dumps”) are traded and used to create counterfeit cards.
  • Malware and exploits: Butler used custom Trojans and browser vulnerabilities to infect other criminals’ computers and steal data.
  • VPNs and operational security: Criminals used VPNs, proxy chains, and hacked Wi-Fi to evade detection and maintain anonymity.
  • Forum hierarchies: The structure of forums, with roles like “sgarrista” and “capo,” mirrors organized crime and facilitates illicit trade.

7. How did law enforcement, including the FBI and Secret Service, combat cybercrime in Kingpin?

  • Undercover operations: Agents infiltrated forums using fake identities, most notably Keith Mularski as “Master Splyntr” on DarkMarket.
  • Use of informants: Law enforcement relied on insiders like Brett “Gollumfun” Johnson, though informants sometimes complicated investigations.
  • Technical and legal challenges: Agencies faced encrypted data, international jurisdictions, and the need to balance undercover work with stopping ongoing crimes.
  • Major takedowns: Operations like Operation Firewall and the DarkMarket sting led to significant arrests and disruption of criminal networks.

8. How did Max Butler’s early life and personality influence his hacking career in Kingpin?

  • Troubled upbringing: Butler’s parents’ divorce and his bipolar disorder contributed to emotional instability and impulsive behavior.
  • Early fascination with hacking: He began programming and phone phreaking as a child, quickly developing advanced technical skills.
  • Encounters with law enforcement: Early brushes with authorities shaped his understanding of risk and authority, fueling both caution and defiance.
  • Obsessive and controlling nature: His need for control and intensity affected both his personal relationships and his approach to hacking.

9. How did Max Butler’s hacking techniques and operational security evolve in Kingpin?

  • Early exploits: Butler started with buffer overflows, social engineering, and spear-phishing to access networks.
  • Advanced intrusions: He later automated attacks, exploited zero-day vulnerabilities, and targeted point-of-sale systems using tools like RealVNC.
  • Encryption and anonymity: Butler used strong encryption (DriveCrypt), false identities, and Wi-Fi hopping to protect himself.
  • Forensic breakthroughs: Law enforcement eventually captured his encryption keys through live memory acquisition, overcoming his security measures.

10. What is the significance of characters like Tea and Chris Aragon in Kingpin by Kevin Poulsen?

  • Operational roles: Tea, a Russian-speaking translator, and Chris Aragon, a key accomplice, were essential to the day-to-day running of Carders Market.
  • Bridging communities: Tea’s language skills helped connect Western and Eastern European cybercrime networks, expanding the operation’s reach.
  • Personal dynamics: Their relationships with Max and each other highlight the human side and personal costs of life in the cyber underground.
  • Illustration of diversity: Their involvement shows that cybercrime operations require a range of skills and personalities, not just technical expertise.

11. What are the key takeaways and lessons from Kingpin by Kevin Poulsen about cybercrime and law enforcement?

  • Cybercrime is complex and global: It involves technical skill, social engineering, and organized communities with hierarchies and rivalries.
  • Undercover work is crucial: Deep infiltration and informant use are essential for successful investigations, despite ethical and operational risks.
  • Technology is a double-edged sword: Encryption and anonymization protect criminals but also drive law enforcement innovation and adaptation.
  • Human consequences: The book highlights the personal costs, betrayals, and blurred ethical lines faced by both criminals and investigators.

12. What are the best quotes from Kingpin by Kevin Poulsen and what do they mean?

  • “Who is Iceman?” This question, posed in the prologue, encapsulates the mystery and fear surrounding Max Butler’s alter ego, setting the tone for the book’s exploration of identity and anonymity.
  • “I am innocent until proven guilty.” Butler’s statement after his arrest reflects his self-perception as a misunderstood figure and the tension between hacker culture and law enforcement.
  • Quotes on loyalty and betrayal: The book features numerous exchanges highlighting the fragile trust and frequent betrayals in the cybercrime world.
  • Reflections on ethics: Butler’s shifting justifications for his actions illustrate the blurred lines between white-hat and black-hat hacking, a central theme of the narrative.

Review Summary

3.97 out of 5
Average of 8.0K ratings from Goodreads and Amazon.

Kingpin receives mostly positive reviews, praised for its engaging narrative and insights into cybercrime. Readers appreciate the accessible explanations of technical concepts and the compelling portrayal of hacker Max Butler's rise and fall. Many find the book eye-opening regarding credit card fraud and internet security vulnerabilities. Some critics note disorganization and bias, while others commend the author's expertise. The book is described as a fast-paced, informative read that appeals to those interested in hacking, cybersecurity, and true crime.

Your rating:
4.4
55 ratings

About the Author

Kevin Poulsen is a former hacker turned technology journalist specializing in computer security. After serving time in prison, he reinvented himself as a respected journalist, starting at SecurityFocus in 2000. His work there gained recognition, leading to the company's acquisition by Symantec. Poulsen's investigative reporting often garnered mainstream media attention. In 2005, he became a senior editor at Wired News, where he maintained a blog initially called 27BStroke6, later renamed Threat Level. Poulsen's transition from hacker to journalist demonstrates his expertise in the field of cybersecurity and his ability to provide unique insights into the world of hacking.

Download PDF

To save this Kingpin summary for later, download the free PDF. You can print it out, or read offline at your convenience.
Download PDF
File size: 0.22 MB     Pages: 12

Download EPUB

To read this Kingpin summary on your e-reader device or app, download the free EPUB. The .epub digital book format is ideal for reading ebooks on phones, tablets, and e-readers.
Download EPUB
File size: 2.96 MB     Pages: 11
Listen
Now playing
Kingpin
0:00
-0:00
Now playing
Kingpin
0:00
-0:00
1x
Voice
Speed
Dan
Andrew
Michelle
Lauren
1.0×
+
200 words per minute
Queue
Home
Swipe
Library
Get App
Create a free account to unlock:
Recommendations: Personalized for you
Requests: Request new book summaries
Bookmarks: Save your favorite books
History: Revisit books later
Ratings: Rate books & see your ratings
200,000+ readers
Try Full Access for 7 Days
Listen, bookmark, and more
Compare Features Free Pro
📖 Read Summaries
Read unlimited summaries. Free users get 3 per month
🎧 Listen to Summaries
Listen to unlimited summaries in 40 languages
❤️ Unlimited Bookmarks
Free users are limited to 4
📜 Unlimited History
Free users are limited to 4
📥 Unlimited Downloads
Free users are limited to 1
Risk-Free Timeline
Today: Get Instant Access
Listen to full summaries of 73,530 books. That's 12,000+ hours of audio!
Day 4: Trial Reminder
We'll send you a notification that your trial is ending soon.
Day 7: Your subscription begins
You'll be charged on Oct 3,
cancel anytime before.
Consume 2.8x More Books
2.8x more books Listening Reading
Our users love us
200,000+ readers
"...I can 10x the number of books I can read..."
"...exceptionally accurate, engaging, and beautifully presented..."
"...better than any amazon review when I'm making a book-buying decision..."
Save 62%
Yearly
$119.88 $44.99/year
$3.75/mo
Monthly
$9.99/mo
Start a 7-Day Free Trial
7 days free, then $44.99/year. Cancel anytime.
Scanner
Find a barcode to scan

Settings
General
Widget
Loading...