Rating: Summary: Facts distorted Review: The book was entertaining, but just after the release Kevin Poulsen did several interviews about the book. During those interviews Kevin P. mentioned that the author made it look like Kevin was doing most of the "crimes", while in fact the other people involved had more of a role than the book gave them "credit" for. Old newpaper articles show this also.
Rating: Summary: Phreaking Out the Phone Company Review: The telephone companies have more power than the CIA, the NSA, or the FBI - they can wiretap anyone at anytime, without oversight (Title 18, Section 2511). The power of communication attracts "hackers" who seek to arrogate this power for their personal satisfaction. One example is Kevin Poulsen, who really learned how the system worked. Wiretaps are the secret weapon of the FBI, used to ensnare gangsters, and to control Presidents and political enemies (the function of every secret police). In describing Kevin's phone tapping, the author also tells quite a bit about the wiretapping of politically-oriented individuals by Federal agencies. This is not an innocent game (see COINTELPRO). Pages 183-186 tell how "facts" are presented to a Grand Jury to get an indictment. Dante's "Inferno" is a trip to the lowest depths of hell. Kevin starts out innocently (?), then travels downward from free calls, wiretapping, contest scams, aiding prostitution, finally looking into wire transfers of funds to the Cayman Islands. Didn't Kevin see what was happening?In November 1989 an LAPD detective got a tip on illegal phone use (p.198). He and PAC BELL investigators went through hundreds of pages of "Escort" ads in the LA phone books to find the lines that had no billing statements, but worked. The phone company accepted ads (cash up front), then terminated service upon police complaint. They first sought a dishonest PAC BELL employee, not a hacker. Eventually someone talked and named the person who could arrange this. Then the trap was baited and they hooked a lead. Page 174 tells how Kevin's "oil-leaking clunker" died on the highway. Cars over 7 years old often need new oil pan gaskets; its cheaper than another car. Was it a coincidence that Poulsen, Gilligan, and Lottor were indicted after the AT&T long distance network crashed on 01-15-1990 (p.209)? As a scapegoat for system nonfeasance? Kevin's crew seemed to assume that since they were never caught they never would be (pp.230-9). I wonder if General Custer felt the same way on that Sunday in June 176? Perhaps Kevin's biggest crime was getting caught so the powers he used were exposed to public scrutiny (the Digital Telephony Act of 1994 on page 280). The telephone companies can wiretap anyone's phone call without court authorization (p.281). I suspect this allows "plausible denial" for Government agencies. This surveillance can be done without any Congressional funding or oversight. Page 250 tells of the personal calls made to the police searching for Kevin, and their threats. This made the police more committed to Kevin's capture. The food supply for Kevin's hide-out had no fresh vegetables or fruit (p.251)! This book lacks an index, but is very readable.
Rating: Summary: This book had potential, but ended up being "fluff." Review: This book had some good potential, but the author instead decide to write a tabloid story. Any technical details that made it into the final edit seem to be there purely by accident. Cliff Stoll proved in "The Cuckoo's Egg" that you can write a good, technically accurate, "fun" story. If someone unfamiliar with Poulson's reputation were to read this book, they would think he was a burgler, not a hacker.
There also doesn't seem to be any description of Poulson's personality or drive, other than a vaguely described "Hacker Ethic".
Don't bother with this book if you are looking for anything similar "The Cuckoo's Egg" or "Takedown".
On a positive note: This book flows smoothly along, making a quick read that doesn't require too much concentration.
Rating: Summary: very interesting character, and a well written book. Review: This book kept me interested till the end. The book was well written, and I suggest U 2 read this book. bla-bla-read it ok...
Rating: Summary: Entertaining True Crime Story Review: This book was the most entertaining of the many books I've read on the subject of Hacking. Not only does it describe a wide range of hacking techniques, but it also tells a very compelling personal story - the gradual transformation of Kevin Poulsen from an "ethical hacker" who explored the wonders of the telephone system to enhance his knowledge, into a highly successful and unabashedly mercenary cybercriminal. It also introduces perhaps the fascinating character to emerge from the hacking scene - Justin Petersen, the weird and completely amoral "Agent Steal", an elaborately coifed serial seducer whose inferior technical skills were more than compensated by his complete willingess to betray anyone, friend or foe, when it served his purposes. If you are tired of reading books which take pains to portray hackers as simply selfless seekers of wisdom and truth, this story of a "cyberpunk" who clearly was in it for the money - and the power - will provide a refreshing change of pace.
Rating: Summary: This book should only be read by people who really care. Review: This book, although very well written, should only be read the people that really care hackers or high computer technology. This book delves into a lot of weird stuff that even I, a UNIX systems guru, had time grasping a hold of. There were a lot of what seemed like made-up terms in this book. I would advise, however, to read this book if you are interested in computer technology, though some of it is not completely true, and a high paced, suspenseful book.
Rating: Summary: Littman is Great Review: This is one of the best books by Littman I have ever read.Kevin Poulsen is however I think one of the least recognized hackers/phreaks of our time. I suggest you buy this book It is great
Rating: Summary: An excellent book! Review: This is one of the best books I read about
hacking, phreaking and breaking the LAW.
That also shows that the other side is doing
the same (FBI, NSA, CIA & etc).
This a true story (the books says so...) and
its written in a persons' view, that of Kevin (the anti-hero).
This is a very recommanded book! for computer
phreaks and wanna-be-phreaks :)
Rating: Summary: Big Letdown Review: Tough read--! This book, while informative, is very slow reading and not at all like the Fugitive Game. I should've been clued in when I read the back cover and instead of a real synopsis, I get to read two reviews of "The Watchman" and THREE REVIEWS of "The Fugitive Game!" It's pretty sad when you buy a book and there are more reviews for another book than the one you're purchasing. The dialogue of this book is good enough, but Litman bores us with too much in-depth technical information on phone switches and the internal setups of California telco buildings. I think more insight into Poulsen's personal life would've made this book a much better read.
Rating: Summary: A Real-Life Cyberpunk Adventure Review: Who needs Neil Stephenson's novels when real-life can be this exciting? Read it- love it- and, if you dare to take the sword of Xaos in one hand and your lineman's handset in the other- live it...
|