How One Hacker Took Over the Billion-dollar Cybercrime Underground

Book - 2011
Average Rating:
Rate this:
Poulsen explores in this page-turning tale the criminal exploits of a hacker of breathtaking ambition, Max Butler, who stole access to 1.8 million credit card accounts.
Publisher: New York : Crown Publishers, c2011
Edition: 1st ed
ISBN: 9780307588685
Characteristics: xiii, 266 p. ; 25 cm


From the critics

Community Activity


Add a Comment
Dec 16, 2018

Pity it took this year before American credit card company instituted change because they won't accept massive losses any longer creating hodge-podge upgrade among US retailers & bankers.

Apr 24, 2018

Given that Poulsen is a known sociopath, just like Kevin Mitnick, it's likely this book covers up more than it reveals, because if he gave away the secret, then even a nobody like me could hack NASA, which I did in the 1990s.

A great piece of faux fact and lots of white lies is what this book is.


Jun 07, 2014

This book, written by a past life hacker, tells the story of Max Vision and his computer underworld exploits. I liked this book. Easy to understand and read. A full review can be read here:

Aug 12, 2013

This is a book by a real hacker, about hacking in the illegitimate sense of the word, which admittedly is difficult to ascertain when one exists in a completely fraud-based society such as America presently is. A real hacker, as opposed to some grandstanding neophyte such as Kevin Mitnick, who, to those who didn't know him, was more the credit card thief, than hacker, and incompetent at his job in tech support at Group Health which he once held (and his prediction that Microsoft - - and I'm NO MS fan - - would be a goner by 2001 was as on target as his other stuff). Update: The author of this book, now an editor at "Wired" magazine, was the only person and/or reporter, to file FOIA requests for information files from the Secret Service on Aaron Swartz and his persecution.) [Order of best books on subject: 1) "This Machine Kills Secrets" 2) "Kingpin" 3) "Anonymous"]

Sep 06, 2011

This is a really interesting case study of a modern hacker (i.e. financially motivated), their modus operandi, and their associates.

Kevin Poulsen knows his stuff. He keeps the technical description to a minimum, but still manages to describe how hacks work. He also does a good exploring the motivations of Max Butler.

The most interesting part of the book is hidden away in the epilogue, when Poulsen writes "Underlying all these breaches is a single systemic security flaw exactly 3.375 inches long. Credit card magstripes are a technological anachronism, a throwback to the age of the eight-track tape, and today the United States is virtually alone in nurturing this security hole. [...] American banks and credit card companies have rejected [better security] because of the enormous cost of replacing hundreds of thousands of point-of-sale terminals with new gear. In the end, the financial institutions have decided their fraud losses are acceptable, even with the like sof Iceman prowling their networks."

Aug 15, 2011

This is a fine and fast-paced book that paints a detailed portrait of the computer-hacking underworld. Everything you always wanted to know about how credit card theft is accomplished and how it works. Very readable. There's detail there that people who really understand computers might get more from than I did, but it is not obtrustive--you don't feel like you are getting lost in the weeks. The personalities come out pretty clearly and that's what makes it enjoyable. I wouldn't be surprised to see a movie from it--plenty of action. All in all, a very enjoyable read.


Add Age Suitability
Apr 24, 2018

sageb1 thinks this title is suitable for 10 years and over


Add a Summary

There are no summaries for this title yet.


Add Notices

There are no notices for this title yet.


Add a Quote

There are no quotes for this title yet.

Explore Further

Browse by Call Number

Subject Headings


Find it at SSFPL

To Top