Matthew Cox | Inside True Crime Podcast - PAYPAL SCAMMER REVEALS HIS SECRETS (Millions Stolen)

Episode Date: April 10, 2024

PAYPAL SCAMMER REVEALS HIS SECRETS (Millions Stolen) ...

Transcript
Discussion (0)
Starting point is 00:00:00 Book club on Monday. Gym on Tuesday. Date night on Wednesday. Out on the town on Thursday. Quiet night in on Friday. It's good to have a routine. And it's good for your eyes too. Because with regular comprehensive eye exams at Specsavers,
Starting point is 00:00:22 you'll know just how healthy they are. Visit Spexsavers.cavers.cai to book your next eye exam. Eye exams provided by independent optometrists. I created this email, and it looked like it came from PayPal. It said, you owe processing fees for your PayPal transactions. It submit to pay them. It charged them $9.99. It sounds like a legit processing fee.
Starting point is 00:00:42 Then I send the email blast out to these accounts. The way I looked at it was like, they're willingly sending me this money. They're not willing. How much? Never forget this. Yeah, I was born in Southeast Missouri, town called Farmington, Missouri. Okay. parents, I mean, were they, you know, into tech or?
Starting point is 00:01:05 No. I'm assuming you're, how old are you? I am, I just turned 50. Okay. Yeah, no, my parents were and still are not into tech at all. It's, it's sort of frightening how not into tech they are. But my, my parents, they divorced when I was a year old. Um, it was, and I guess for a divorced kid, it was a pretty typical childhood, but, you know, my dad, when I was young, he went to college. Um, he worked construction during the day and went to college at night. Um, and my mom, she, um, she worked in a factory most of her life, you know, both of them worked hard, you know, um, so no, they were not technical at all.
Starting point is 00:01:54 okay and was your dad kind of still in your in your life now no even then growing up actually yeah I lived with my dad when my parents divorced my dad fought my mom for custody and won custody somehow back then yeah so any so you were an only child or were your their brothers or sisters so I was an only child until I was about 21 and I found out that my dad had had another two children with someone else. So, but growing up, I was basically an only child. But you had no idea growing up that there were no idea, no. So was he seeing them or was he keeping it from you or just kind of?
Starting point is 00:02:42 He, when I was, I guess, three or four, he had a relationship with this person. And I somewhat remember her, but I didn't know that, you know, know that they had kids together. So she was in my life a very short time, and then they broke up. And then I didn't really, you know, I didn't hear anything about it until I about turned 18, I guess. And I remember my dad getting the phone call from her. And I guess she was going to take him to court for child support at that point.
Starting point is 00:03:16 And, you know, so he was really angry. I just remember the explosion of anger. And, you know, then subsequently eventually I met her or met one of the sisters. The other one I still haven't met. Okay. That's kind of an interesting side note, you know? Yeah. So, so you went to, you were, were you a good student in high school?
Starting point is 00:03:44 High school, no. I was, throughout elementary school and all that, I guess I was, I was pretty good kids. I got to very little trouble. When I got into high school, so living with my dad was, I had a great deal of freedom because, like I said, he worked construction through the day, went to college in the evening, and then studied when he got home. And so, you know, construction workers, they go to work at like 4 a.m. And, you know, so he would work till, you know, four or five in the afternoon, then go to college. And so I'm there. My whole childhood by myself had to get myself up, get myself ready for school, feed myself, do all that stuff. And so naturally, there's, he's never there. I had a ton of freedom. So, you know, you get into those rebellious years. And, you know, you start taking things in your own hands. And I start skipping school. I, I actually start. stealing my dad's cars and driving them before I had my license, which is a funny story in
Starting point is 00:04:58 itself. But yeah. How old was this? I was 15. My dad had, he had a van and he had a Porsche. And he loved the Porsche. I'm sure. And so, yeah, one time I decided to take that Porsche to school and I was backing it out of the driveway. And we had on each side of the driveway was this culvert that dropped off. And I cut the the turn too sharp when I was backing out and the axle went over that culvert and stuck right there on the edge. And I freaked out, right? I mean, who wouldn't? And so I try everything. I get out and I'm like trying to get this thing unstuck because he's going to kill me, you know? And I did everything I could. And the funny part of this is that my principal lived right across the street. And so I try everything. I can't get
Starting point is 00:05:58 this thing unstuck. And so I literally, I finally get a hold of a friend of mine who is leaving for school just then. And so he comes down and we ended up missing the first half of the day pulling my dad's Porsche off in a way that doesn't damage it, you know, and doesn't, you know. So we had to be very careful we spent several hours doing this we finally get the thing back in the garage and i'm like crisis averted but there's still i've torn up part of the part of the driveway where the axle got stuck so i got to fix that luckily my dad was in construction so there was you know sealer in the in the garage and so i spent time fixing that i missed pretty much the whole day of school but i got the car back in there and i fixed the driveway to where you couldn't tell i
Starting point is 00:06:48 For some reason, the principal never called, you know, to ask why I wasn't in school. And I think I get away with this. Right. Well, fast forward to graduation. I'm sitting in graduation. I'm in my chair. I'm like daydreaming. And all of a sudden, my principal goes into this story about how when I stole my dad's car and get it stuck in my driveway.
Starting point is 00:07:15 And I start freaking out because my dad's in the back. And I'm like, oh shit. Like, I've got to do something. I'm like, I got to get out of here. Like my flight or fight mode, just like I'm freaking out. I'm losing it. And he continues telling the story. And he finally gets to the part to where he called my dad that night and had told him what I did.
Starting point is 00:07:41 And I was like, oh, shit, wait, he knew? and so my dad apparently he told him and my dad got mad at first i guess and he was so impressed that i i had handled a situation and put it back and fixed the driveway he never said a word and so yeah it was interesting that's pretty good yeah i never stole his cars after that again though yeah it was it was pretty weird but yeah in high school is when i really got interested in technology we um i don't know how old you are but if you were old bro i'm 54 okay so you remember we had party lines back in the day right so i used to dial into party lines and they the ones that i connected to had techie kind of guys and at the same time i had been taking these computer
Starting point is 00:08:36 science courses at our vocational school and our high school they weren't really computer science It was like word processing and, you know, there were some educational games and stuff, but I learned a lot from it. And I, through that, it taught you things like directory structure and computers and everything. And so rather than doing this in the game, I'm like, I'm on a computer. I'm just going to fuck with it. So I start messing with the computer based on what the thing's teaching me. And so I start real, I realize that I. I could mess with the games.
Starting point is 00:09:13 I could actually alter the programs. And I could, what I thought was cool was replacing the names and the games with people I knew. And at the time, I actually, there was a girl that took a class, the same class, right after I did. And so I would change the names to her name and my name and everything. I was flirting with her. But so, you know, I'm basically editing these games, changing them. And I realized, and that really got me interesting because I'm like, I'm breaking them down and making changes that, you know, I really shouldn't be. And at the same time, I'm, you know, at home, I'm dialing into these party lines and there was something called phone freaking at the time.
Starting point is 00:09:56 And you could, phone freaking was a way to basically hack a phone system. So a lot of people don't know, especially our old phone, analog phone systems. when you dialed numbers, it would make tones. Right. And so your numbers sent you to, you know, specific locations, you had area codes. With those tones are what told the phone switches where to send your call, how to route it. There are also codes in there, sequences and numbers and the little pound sign and star that you could use to, like, get free long distance or whatever, you know. you could, it's basically hacking the phone system because you're manipulating its ability to
Starting point is 00:10:38 do something. So I'm, these guys are teaching me how to do this and I start utilizing it. And so at same time, I'm learning how to edit games at school and I'm also hacking a phone system. And that's really what got me interested in this. So, you know, that time, we all. always referred to it as computers, you know, you're going into computers or whatever. But that was kind of what, where I saw my trajectory going from early on. Oddly enough, at the time I was a big jock, though, I ran track and cross country. So my primary focus was running. Whenever I get interested in something, I'd dive 200% into it. And at that time, it was running. It wasn't technology. I was going to go to college for technology, but that was just, you know, what I was
Starting point is 00:11:32 going to go to school for whenever I was running, basically. Right. So you graduated, you graduated high school, and, I mean, did you, were your grades good enough to get, like, a scholarship or? So I got offered track scholarships, and I went to college. I started school, and that didn't last very long because. Where'd you go? I went to the University of Miami.
Starting point is 00:12:02 Oh, okay. And. Oh, that's a trek? Yeah. And so I got, you know, here's a kid from southeast Missouri and going to Florida for the first time ever. And there's a lot of partying going on. Right. And so I did more partying than I did running.
Starting point is 00:12:25 That didn't last very long. So I came home, basically. and I got kicked out, you know, so I partied too much, got kicked out. I had to come home and tell the family, but lost my scholarship, can't do that anymore. I need to figure something else out. Well, my dad, when I was a kid, whenever he needed to talk to me, he always took me on a drive. We would go basically get in his vehicle, we'd go grab a soda, and we would drive around, you know, the countryside in southeast Missouri, and we'd talk.
Starting point is 00:13:03 And I remember this so, so vividly because I was still in the mind that I was going to go to another college or something like that. And I grabbed some of my music, and it was the first time I ever did this. And we had tapes back then, I remember cassettes. So I grabbed a couple of cassettes. And I wanted to play this one song for him because my dad loved the Beatles. And there was this one band that they covered a Beatles song. So we get in there and we're driving down the road and he starts talking to me about my future and what I'm going to do.
Starting point is 00:13:38 And he's getting real serious and I'm like, you know, not there mentally. I pop this cassette in and it was Winger. She's only 17. And so my dad immediately gets mad because I'm not taking the conversation seriously. He ejects that tape, throws it out the window. know as we're going and right and he's and he gets mad and immediately just starts you know going into this you know you you you've got to change your your your thinking and that was always his thing you've got to change your thinking and you know think about what you're going to do next and
Starting point is 00:14:15 everything because you know you're not coming home and and staying here now after you know not trying you're given an opportunity and and you you lost that opportunity and so I realized after we're talking for some time, and I had shut up at that point, that we had passed the Air Force Recruiter's Office a few times. And so I got the hint at that point. And within a week, I had signed up for the Air Force. So, yeah, it changed my trajectory altogether. But looking back on it, it really kind of put me in the path now to where I am now. Because I went in and ultimately ended up in intelligence after, you know, I tried a few things and then ended up there and really got put into technology, you know, and that's, you know, where it really started taking off. Right. So what is it? You take an aptitude test when you first go in, right? Yeah. So what I did, I chose a specific.
Starting point is 00:15:28 job when I signed up and I, that job in particular, it did end up working out. So things didn't work out for me, and they put me in this other position that I didn't like at first, and then, you know, I end up getting out. And you're right, they have you take the, it's the ASBAB, Armed Forces Vocational Battery Test, I think is what it's called. the idea is that they can measure your skills what you're good at and they put you in a job that matches those those skills and so ultimately i'm you know i'm working with computers at the end and so i at that point i left the military um how long how long were you in the military a few years what were you working on nothing important i mean you know at i that time yeah i i didn't
Starting point is 00:16:28 even have a really a high, high security clearance or anything. It was nothing, just average stuff. They, so after I get out, I messed around for a little while and realized that those skills that I learned, the computer skills and what I knew there could be useful. And so I I answered an ad for a contractor agency, and ultimately I got a job within. Actually, I think I went to, I got a, yeah, I got a job, a three-month contract at first doing open-source intelligence, which is, so there's different kinds of intelligence. You've got human intelligence, which is humint, Ocent is open-source intelligence, it's gathering information, gathering data. there's signals intelligence which is the you know intelligence gathering through a computer through information systems that sort of thing these days anyway used to back in the old days they used
Starting point is 00:17:36 flags but it's passing data right okay um passing information is what it is um so i had found this job that introduced me to the civilian world of you know, intelligence with computers. And so though I had worked a little bit in the military, honestly, I had not had this sort of access, you know, until now. And so I worked a short contract and then what were they asking you to do? At the time, I actually don't remember a lot about that one in particular because it, it was just a three-month contract.
Starting point is 00:18:25 It was gathering information. Seems like I was putting information in databases. Yeah. And it was just you pull information, you put them in databases, and basically validate the data, and you pass it on. Okay. That one wasn't that important. But it, together with, you know, what I had done before,
Starting point is 00:18:47 then I had these skills that made me a little bit marketable. So even though it was a three-month, contract another opportunity came along and that ended up being the defense intelligence agency the DIA and that was so that one required a security clearance a heavy security clearance so I that I ended up getting that I I went to the what was at the joint military intelligence training center I think is what it was called you learn intelligence collection and analysis what year was this uh roughly you know late 90s okay yeah um okay so there's all kinds of things going on in the uh in the world in the
Starting point is 00:19:43 late 90s right like they're still trying to put together the fragments of the uh Soviet or the old Soviet Union and there's all kinds of upheavals and at the time there was a shift between the Soviet era to Middle East so we were starting to
Starting point is 00:20:03 pay a lot more attention to Middle Eastern activities yeah so but we we had a great deal of emphasis on that area of the world so Middle East Russia
Starting point is 00:20:18 just starting to get a little bit of China and then France of oddly enough. France has been an intelligence powerhouse for some time and that was another one. But yeah. I don't think of them as particularly adept at. Actually, you would be surprised. I would be. But then again, I was going to say, well, that's probably because they don't make movies about it. Right.
Starting point is 00:20:48 There's no James Bond. There's no, you know, Jason Bourne. So, you know, if you're not, if it's, there's not movies about it, then I'm not sure why I would know anything. Or periodically like the, gosh, the, uh, Musad, you know, getting caught. Right. Executing somebody or breaking into, you know, going through a, was that hotel where they, didn't they kill the guy in the hotel and they were changing mustaches and hats and disguises and got caught. the video camera and still amazing right you know um but so maybe there's just that good you're not supposed to know they are yeah so you were so you were that's what you were uh you went into the um
Starting point is 00:21:35 uh was it the defense department what was it d i a yeah the i a yeah yeah so i a stand for i'm sorry i'm sorry defense intelligence agency yeah okay cool sorry sorry Yeah, when I explain it to people, I always explain it as sort of the military side of the CIA, but it's technically not. It has its own, you know, they collect intelligence for the Defense Department that filters down to the military. Sounds like, yeah, I was going to say, sounds like the, you know, sounds like you're doing it for the defense department. Yeah, just not the same mission of CIA. CIA is more overt. And they do more clandestine and, you know, they have much broader without talking bad about CIA.
Starting point is 00:22:27 They have a much broader mission. Yeah, I interviewed Andrew Bustamante. I've heard of him, yeah. Yeah, he's an interesting guy. He's been on a bunch of podcasts and stuff. I've known him for a few years. Actually, I interviewed him for a book that I wrote. And I mean, I also interviewed him on the podcast.
Starting point is 00:22:47 podcast. But so what were you doing? What were you doing for the, you know, so I managed the privileged accounts and a lot of applications. So in the intelligence and technical intelligence, what we do, it's sort of a thing everywhere you go. You manage their information systems or information security applications. So you'll be assigned to a group of programs that, that you manage. I specifically had this special type of access from early on, and I'm not sure how it happened because it's a very rare. You're very young.
Starting point is 00:23:29 It sounds like you don't have a lot of experience and you're super young. Yeah. And yeah. So I was I was put in charge of privileged accounts. And privileged accounts are your administrators of any network. So the guys that hold the highest access, there has to be. somebody that manages their accounts. And so that was me. I sort of happened upon it. I don't know how it happened, but since then, everywhere I've gone, I've managed privileged accounts. To this day,
Starting point is 00:24:00 I still have an expertise in privileged accounts. So, and it just sort of happened by accident there, and that's where it started. But so I was managing their access. And with that, you have an extraordinary amount of clearance and access. You have access to everything. So, you can technically look at everything on the network, you know, and, you know, because you're managing these people, their access. That's incidentally what Edward Snowden had, you know, at the NSA, which we, we worked there at the same time. But, yeah. Do you recall him or? I'm sorry?
Starting point is 00:24:39 Do you recall meeting Snowden or you just have to be? No, we worked in different locations. We had the same job at the same time. He was in Hawaii. I was here in Missouri. Didn't meet him. I just, I'm very aware of the, you know, the whole situation. Right.
Starting point is 00:24:56 You can see how he had access to that privileged information. Yeah, I see how he had access. What he did was, yeah, not right. So what happened? I mean, so this is the, the end of the story. You've worked there. You've been working there ever since. that's it. We're done. No. So. So at the same time, you know, I'm, I'm learning all
Starting point is 00:25:22 these, these, I'm gathering all this information skills. And I'm starting to learn how to really, well, we gathered information and it was whatever means necessary at the time. So you learn how to get information, whether it's legal or not. quite honestly. And when it, when it's on behalf of the Defense Department, it's however you need to get it. So I remember specifically them asking us to do something, you know, whether you hack, borrow, steal, whatever, we need this. And so that we're learning these skills. And at the same time, you know, this is the internet boom. Everybody's on AOL and, you know, the you've got mail. you know it's in its infancy and I would go home at night and I would spend a lot of time on the internet on AOL and I would get in these chat rooms there were Yahoo chat rooms and AOL chat rooms and you like with the party lines you can meet like minded individuals and so with learning this stuff at work and going home and spending most nights, you know, up till 3 a.m. learning more because I'm talking to other techies. I gained an immense amount of knowledge, you know, learning different things. And it, you know, it just, I really grew my, my abilities, you know, quite a bit. My skills just grew
Starting point is 00:27:09 immensely more so in the chat rooms than actually on-job training is that what you're yeah yeah so there was a there was a group that I spoke with probably every night we got on and we we hung out traded secrets and everything and they would some of those guys would eventually go on to be a very popular hacktivist group later in time and but we there was at the time they called themselves alt 2,600. And so there were a group of guys, and there were these, there's a program called IRC as Internet Relay Chat, I believe is what it means. And it was a text-based chat program where we would all meet.
Starting point is 00:27:52 It was, I would say it was kind of precursor to the dark web now, because we could get on there, we could all chat, we could share information. And they created channels to where you could share things like software, you know, licensed software that you weren't supposed to share, obviously. Right. um you know pirated stuff we'd share movies we'd share music all kinds of things um along with hacking abilities you know they had channels for learning how to hacking learn how to hack databases learn how to hack websites um hacking phone systems all that stuff
Starting point is 00:28:26 and so i spent my time my evenings on that and that's so you know great big nerd i'd work go home do that. And so at the same time, I had, I had injured my back previously. And so I started taking painkillers for my back. And over time, you know, you get addicted to that stuff. So I'm working during the day, hacking at night, taking painkillers. And I start developing this immense, you know, addiction. And I started at that point moonlighting and developing my skills. So I was doing things on the side. And I started selling things on eBay.
Starting point is 00:29:21 And it started with selling software licensing. And believe it or not, back in the day, that was pretty lucrative because you could get a hold of software licenses pretty easy. people didn't know the value of it. They would throw it away. They'd just buy a software, throw the license away once they installed it, and here you have a fresh license that's worth quite a bit because people who actually went by the law would want to buy that license. So I would take that stuff, sell it on eBay,
Starting point is 00:29:55 and we used PayPal to pay for it. PayPal was in its infancy. well I figured out or got this bright idea and I created this fake account for PayPal and I created an email address and it was online processing fee at gmail.com and I created the PayPal account with the same name. Nowadays you couldn't do that. had, you know, validation, or they have validation now that won't let you do this sort of thing. But at the time, it was, it was pretty early. Right.
Starting point is 00:30:38 They'll still work. They're still working out the kinks at that time. Yeah. Yeah. It was very, they hadn't been bought yet. And I believe, I can't remember what year it was, but they got bought by a bigger organization. And at that time, then PayPal became huge. And they were a lot more secure at that point. But so. I had created this account and I went and got a secure card, like a secure bank card, debit card. Back then you could get those in pretty much anybody's name. You know, you'd get these offers in the mail, and all you have to do is fill it out,
Starting point is 00:31:17 send it in, and they'd send you a card back with whoever's name that you put on the application and an account. And so I linked that account to the PayPal account. And I created this email to bulk send, and it looked like it came from PayPal. And it said, you know, hey, this PayPal, you know, your PayPal account, you're something about, you owe processing fees for your PayPal transactions, you know, hit submit to pay them. And I set it up, I wrote a little script in the background so that it, it charged in $9.99, which, you know, everything ends in $0.99. So, like, it sounds like a legit processing fee. Well, and this is in at this point, it's, you know, the internet is so new and, and, you know, PayPal is so new. Like, nobody has any idea. Right. Of these types of scams. Because, you know, obviously, I get these every day. Uh-huh. Yeah.
Starting point is 00:32:19 So, yeah. And so I'm the last piece of it was, well, not the last piece, but the next piece, I went on Google. And so you can, there are things called Google Dorks. I know it sounds funny, but they are commands that you can use to manipulate the search engine to bring you more specific information. So I would point, basically I would focus on eBay.com. com because that's where most people use PayPal, right? And I was looking for any email address that had a PayPal account attached to it on eBay. So I would run through the search and it comes up with all these results and it's about filtering out the information that you get. So I copy all of it out. I filtered out to just get the email addresses and that pretty much consists of, you know, writing some scripts that just pull out the email address or the phone number or whatever you
Starting point is 00:33:23 need. And so I did that for a good month or so until I had like 500,000 accounts. And it was an enormous amount. And so here I've got I've got the account set up. I've got the email ready to go. I've got all these accounts that have PayPal accounts that I know. Right. So then I send the email blast out to these accounts and so all they have to do is get this email and click on the button to submit and they've paid me $9.99. The way I looked at it was like, you know, they're willingly sending me this money. They're not willing. Right. But it's also it's it's $9.99. Like nobody's going to lose it. You're not you're not pulling money out of people's retirement funds here you know right right so by now obviously i've grown some skills um you know and i'm
Starting point is 00:34:26 starting to think of more nefarious ways to use this and so at the time i'm like okay i need to wait a while i need to give this time to see how many people actually click on this it was kind of it was half an experiment and half fundraising you know so Let's be honest. So it was really early form of fishing is basically what it was. And I waited and it killed me to wait because it was driving me crazy. I'm like wanting to check this thing every day. But I'm like, first of all, the security aspect of it, I know that I can't, I got to be
Starting point is 00:35:08 careful as far as accessing that account. So if PayPal caught it, you know, I'm going to be given my IP address away the next time I logged back in, but I didn't realize at the time I wasn't thinking was it probably already had it anyway if they caught this. But I rationalize it like, you know, these people are, they voluntarily sent me the money, so I can't get in too much trouble, right? And so. Yes, you can. And the worst part is it's funny because based on the federal sentencing guidelines, well, one, of course, that should be federal. I'm assuming. And the second thing is, is that every one of those people, you know, people will say, oh, well, that's just one person for $10.
Starting point is 00:35:58 You know, every one of those people is a victim. Right. And what's so funny, so you're, so you end up getting, you know, more than 25 victims, more than 50, more than 500, more than a thousand victims. And you're like, I have a thousand victims for $10 a pop. Like that's, that's a joke. But if I had stolen, you know, a million dollars. from one person that'd be one victim and you'd have you get less time really than you would yeah because the more victims the more you're you get enhanced you get more and more points added
Starting point is 00:36:31 on to your um onto your your sentencing calculation based on the more you know oh more than 10 victims well that might be one extra level oh wait more than 25 well that's two more than 50 more than 200 more than 500 more and you know very quick and the thing is you're sitting here thinking i've done no damage these people you could hardly even consider them victims yeah and the funny part was that at the time you know computer crimes were in their infancy the feds had they had stiff computer crime laws obviously but a lot of the local jurisdictions didn't and they right so they and so a lot of them, if this still wasn't picked up by the FBI, then it, you know, that would rely on the other jurisdictions. So I'm like, I was thinking that, you know, I'm probably going to get away with this and, you know.
Starting point is 00:37:31 And who's technical, who locally has the, the, you know, the skill set to even track this type of a crime down? Well, they did. Yeah. So, well, it gets better. So I waited and I waited. And the plan was going to be to wait 30 days. And it was. You weren't even going to check the account for 30 days?
Starting point is 00:37:57 No, no. I didn't. I didn't tell 28 days. I couldn't wait another day. And so I logged in on the 28th day. And, you know, I was going to be. thrilled with like 20 grand like right i couldn't believe i i i wasn't prepared for what i've logged into how much never forget this one million seven hundred ninety five thousand
Starting point is 00:38:33 three hundred twenty three dollars and sixty nine cents so you had to know you're in trouble yeah well it's it it's a combination of excitement and fear at the same time i'm sure you can relate yeah it's like holy cow what what and and then my mind goes to what am i going to do with this because you can't just withdraw what it you know and so i'm like oh my god what do i do and so now it's there and so now my rationale is well I haven't stolen it yet because I haven't put it in an account you know and so I'm so naive yeah so I had to formulate a plan and how to get this money out of there and so I spent a great deal of time researching how much money I can transfer how I can do
Starting point is 00:39:38 this and obviously this account that I had set up was not going to work because it was a prepaid account you can't transfer a million dollars to right 1.7 million dollars to and so it's I really I spent a great deal of time just researching and trying to figure out if if I should you know at this point and so on so many levels I mean am I going to get caught you know should I do this? You know, and I wrestle with the morality of it, believe it or not, even still at that point, I'm still wrestling with the morality. And it's a little late. Yeah, I know, right.
Starting point is 00:40:19 These are all, you know, these are all internal discussions you should have had before the money was sitting in that account. So I, for good three months, I'm trying to figure it because I just, you know, I miss a lot of money. It's hard to walk away from. at the same time it's also hard to do because the prison time the fact I'm stealing all this money I'm you know I wrestle with all of it and so at one point I like I gave up I'm like I can't I can't do this you know I'm going to get I'm going to go to prison for a very long time and at the time I was married and I had told my wife and you know she thought it was fucking crazy you know and i showed her and to this day she still
Starting point is 00:41:11 remembers that she's the x now but she remembers the amount too very vividly and it just you know but you have to remember i had a serious addiction at this point too i mean it had grown to the point to where it was a job every day finding painkillers and you know this said consume my life. So, you know, this is a dangerous thing to have for an addict, some, but they can pull money out of the internet like that, right? Those kind of skills. And, you know, $1.7 million is going to go a long way.
Starting point is 00:41:50 So I have a question. Yeah. Did PayPal at that time, I mean, you weren't you thinking maybe an open additional account, slowly move the money because I doubt anybody's contacted PayPal or they're even looking into it anything for $10 like it's you know maybe slow and if you don't hit all these people again maybe you've slipped through the through the cracks and you can slowly start removing this money yeah there were so many ideas so many ideas I thought of that but finding accounts because you have to, you have to create an account. You have to create an email address to assign it to. You have to attach it to a bank account. My problem was that I was too afraid to go put a bank account in my name and attach it to this. And I didn't, you know, I didn't know any criminal masterminds to help me, you know. So it was, it was all just me trying to figure this out. And listen, I got you. Here's what we're going to do. You and I would have been dangerous together.
Starting point is 00:43:02 We're getting that money. We're not leaving that money. Okay. Right. That's kind of how I felt about it. And I kept, you know, I kept going back to it. I would quit and then, you know, I'm like, no, no, no. I can't leave it.
Starting point is 00:43:17 And then ultimately, I was like, you know, I just, I can't do that much time as what I decided. And but at that point, I had queued this money up to transfer it. And I was like, I got to a point where I'm trying to convince myself to do it, but ultimately talk myself out of it. I walked away. Problem was, I left that money set up to transfer. Okay. So that was a very bad move. To transfer where, though? To an account, to a bank account.
Starting point is 00:43:58 at bank account the same one you opened the yeah i was just going to try a lower increment okay um you know something that wouldn't be so obvious um so i i queued it up and all i had to do is press submit but you know i ended up talking myself out of it and that night i had probably sat and looked at that computer screen for a good five hours you know working doing things and and kept going back to it. And ultimately, I'm just like, I can't. I just cannot do this. And so I left it.
Starting point is 00:44:32 I walked away. And about a month later, I get this email in the, so when you create these accounts, you have to create a recovery email, which is a backup email in case like you lose your password or whatever. Right. So the account that I set up as the recovery email, I got a message that says, your account needs to be verified or something like that and made it out like I hadn't verified that that PayPal account. And I'm like, crap, I got to make sure that that doesn't, you know, something doesn't have in the account or I lose access to it, so I need to go verify it.
Starting point is 00:45:13 Obviously, that was a bad idea. I logged in, and as soon as I verified it, I got that sinking feeling, you know, and I knew that I was sort of caught. right there and a couple days later the PayPal fraud department reaches out to me personally which you know I wasn't attached to this this account and so they had tracked me right right and basically laid it out they wanted proof of the services that I had provided to you know get the the money obviously you mean for that that for the process that I work for Google? I don't. I can't provide that. I... Right. So, obviously, I'm in trouble there. And I get off the phone with them and I remember my mind racing and I'm like, okay, I figured out how to
Starting point is 00:46:10 do this. Surely I can figure out how to come up with some kind of BS story of how I can provide services. And about an hour later, there was a knock on the door and it's the police. And I'm like, oh my God. And so they had, it was a detective who had, he had instructions to call PayPal fraud department. And I guess PayPal fraud department was intending on having them arrest me, right? So they were, I don't know what the deal was, what there, but the thing was was there's that jurisdictional issue, right? So locally, we didn't have any computer crime laws on the books. And so he gets on the phone, the detective gets on the phone with PayPal, and they're talking back and forth. And so I remember hearing him say, so he didn't actually take any money.
Starting point is 00:47:04 And I'm like, no way, you know, he's, he's actually, I'm like, holy cow. And I can literally hear them arguing back and forth. And they're explaining the whole situation and what, you know, what, what, what, what transpired. Right. And so I'm like going to charge him with. And then he says, so he. was thinking about stealing one point seven million dollars but he didn't and and then and then all a sudden he goes well if he didn't take anything then no crime was committed and I'm just like
Starting point is 00:47:37 like is this real like holy cow and I'm shaking I'll never forget that feeling man like I'm like sweating on the inside and cold on the outside like just about to pass out because I think I'm going to jail forever and they left and I'm like holy cow and so that afternoon I get emails that said my PayPal accounts had all been shut down and that was it that was it I never heard from the police again and or PayPal and it just sort of went away but I'm sure they were able to just reverse all those charges and give everybody their money back. They did. Yeah. It was, it was essentially a refund. And I had thought about doing that, too, especially whenever, you know, I knew I was caught. I'm like, oh, I'm just going to go in there and fucking send it all back to everybody and refund it. Because I thought, well, if I could send it, you know, then they can't get me for taking money. I don't have. Right. Or at least they would take that. Even if they, you know, you'd been charged, they're certainly going to take that into consideration saying, you know, your honor. Look, I was saying I was going to get a few thousand dollars.
Starting point is 00:48:52 $1.7 shows up, you know, I returned it immediately. That was never my intention. So I'm sure that they may or may not have taken that into consideration. At the very least, the problem is in the federal system, there's something called potential fraud, which is, you know, potentially the victims could have lost this much money. And they'll charge you with that. You're like, yeah, but they didn't. Yeah, but potentially they could have.
Starting point is 00:49:17 Potentially. You know, that's like you go into the bank and you go up to the teller. You say, you know, give me $2,000 and she gives you $2,000. And they go, yeah, but potentially you could have gone in the vault and gotten $2 million. But I didn't. Right. You could have. You know, that makes sense.
Starting point is 00:49:34 That's how I felt about it. Yeah. Right. So what ends up happening after this? Is your employer notified? No. I am. It just sort of went away.
Starting point is 00:49:49 And, you know, for a while, I, like, I didn't touch my computer, like, after work. You know, I was like, I'm just going to do my job and, and, you know, forget this. But, you know, again, I had an addiction. And when you, when you have these skills and it's like, all that you know, it's what you come back to. Right. And so right about then, I had gotten an idea to start. port scanning bulk IP addresses and so not sure how much you know about it but each
Starting point is 00:50:29 connection you know to the internet has an IP address everybody has an IP address right and I got really interested in how your IP address correlates to your location it's called IP Geo location and so when you're assigned an IP address from your internet service provider you know that IP address has something to do with where you're at. And I got interested in how that that all worked. And I started scanning ports. Back then, we had to, if you wanted to hack a system, you had to actually get, you know, find the IP address and then you physically scanned everything on that IP address to find open ports. And ports are services. So if I run a web server,
Starting point is 00:51:21 from that IP address you're going to have port 80 and port 443 open you know if I run an email server it's going to have port 25 open because it's it sends emails so when you find open ports you know what they're doing right right and so based on that it gives you a head start on finding the vulnerability that you can use to get access into that that network and so So at the same time, you know, we used lime wire and bear share and all those to share files back in the day. Right. And so there's this tool called NMAP.
Starting point is 00:52:02 And I still use it to this day, actually. But you can use it to scan, find open ports, and help find the vulnerabilities because it will give you information back like what operating system they're running, what, you know, what just all kinds of details about this device. and then you take that information and you have to find the vulnerabilities. But I would scan the ports a lot of times, and I would find those specific applications. The ports were open because they were sharing files. And now that wasn't illegal, really, because once I found they were running it, I would focus on searching that IP address in that application,
Starting point is 00:52:45 basically take all the files that I wanted. They're sharing them. So, you know, that's not illegal. But then I got the idea that at the time there was something called file transfer protocol. We still use it today, just not very much. It ran on port 21. And used to, it's how people transferred files back and forth. Nowadays, we have much easier methods.
Starting point is 00:53:10 But web servers specifically use them, like if you wanted to update your website and upload the updates. like a new web page or something, to the web server you used FTP. And so most web servers had an FTP server. So I would scan for Port 21 and find all these web servers or all these file transfer protocols servers that housed all this information. A lot of people would store their information on these servers and they had access them remotely from somewhere else. and I started finding that there was information there that was worth money.
Starting point is 00:53:52 You know, I found, oh, my gosh, you could find all kinds of stuff. You could find things like birth certificates. You could find passports, you know, all digitally scan because this time everybody's getting scanners and they scanned everything. Credit cards, application, social security number. All kinds of stuff. And so, yeah, then I start finding. And so then it's all about getting into the. FTP server pulling this information down.
Starting point is 00:54:18 And so at the same time, I had run back into some of the guys from the old Alt-2,600 group. And a couple of them wanted to start their own hacktivist group. And they, at the time, they were saying, you're saying, you're saying hacktivist. Hactivist, yeah. Okay. So first I thought that's what you said. And then I thought you said, And I thought, no, I don't think that's what he said.
Starting point is 00:54:48 Okay. Well, it's, it's a activist hacker. So a hacktivist is what we call it. So a good example of a hacktivist group is anonymous. I'm sure you've heard of anonymous. Okay. So it's a group of hackers that are working towards kind of a common goal. Supposedly.
Starting point is 00:55:05 Yeah. So. Okay. And so the guys that are talking about from back in the day that created the group I was talking about, that's anonymous. Okay. Right. So the few guys I was talking to at the time, they wanted to create one and they were focusing on, this one person was really mad at Catholic priests. I think he had been abused when he was younger. So he was focusing on, you know, the whole that subject. And I was just sort of, I'm always there for the skills, you know, the actual action of doing this. and so after you know messed around with that for a little while they realized that there was this other group called anonymous out there and they were specifically at the time they were just getting ready to go after Scientology and so they were they were you know planning all this and so they had met on 4chan and they were doing all that stuff. So we started talking and I learned something called SQL Injection,
Starting point is 00:56:23 which SQL injection is where you take SQL as a, it's a programming language. And so when you look at a website that has form fields in it where you fill out information like your name, so that connects to a database, right? Because you're putting information into a database for a website. Well, SQL is a database, SQL. And so the computer language using SQL, you can take that and using SQL injection, you can use that programming language inside the fields, the form fields. And if you do it right, you can manipulate and pull out information. Okay. Um, so I had, at that point, I had been, you know, pulling information and, and doing all this stuff.
Starting point is 00:57:20 And I, for whatever, I think it was my birthday, actually, that year. And I'm like, I'm going to get a cell phone because cell phones are starting to become increasingly popular. And, you know, everybody wants one, right? And so I went and I. I applied for one online and for some reason I got declined and I was not happy about it. And it probably had something to the fact that I was an addict at that time. Probably had depleted all my accounts and didn't have very good credit. Right.
Starting point is 00:57:54 I'm not somebody that usually, you know, if somebody like that told me no, I stop at the no, right? So I was looking for other ways around it. So I get declined and I'm looking at this. And someone from one of those groups had just taught me some of this, the SQL injection. And I'm like, oh, I'm going to try this. And I start playing with it. I play with it and play with it. And all of a sudden, I start getting information back.
Starting point is 00:58:25 And, you know, it's never a lot of information. It's just tidbits. But so much about what we do is about collecting information. one of the most common misconceptions about hacking is that you do this quickly. You know, in the movies, they're like, they sit down and you, you dig into a server and... Swordfish. Yeah. Like the movie Swordfish.
Starting point is 00:58:51 Exactly. So crazy. And but so what it, what it's actually like is collecting little pieces of information that you save. And eventually you, you store enough information that you can do something with it. And so a good example is, PII, personal identifiable information, right? So your name, your social security number, your address, birth date, all that stuff. So, you know, a hacker, it can take them sometimes months to pull enough information
Starting point is 00:59:24 to be able to use that stuff, you know. And so that's what I was doing. I'm pulling information out of the mobile phone provider database on the website. And, but there are other means that you can use to get that kind of information once you get a little bit of it. So if you take part of a phone number, you know, then you can go to another site. And if you figure out somebody's like name, then you got part of their phone number. And then you can do a search and get the rest of the phone number, you know. Right.
Starting point is 01:00:01 And so it's, like I said, it's about piecing that information together. So eventually I piece it enough information together that I, I input it in this form field, and it says success, and I'm like, in order complete. I'm like, did that just work? And like, it didn't email me. It didn't do anything like normally when you buy a phone, you know, you get all this activation information. Nothing happened. So I was like, oh, it looks like I did something, but I don't think I did. And so I'm like, well, all this work, it didn't, you know, it didn't pan out like I thought. it would two days later I get a cell phone in the mail right and I'm like oh wow okay so I've
Starting point is 01:00:45 stumbled on to something here and so I repeated it and another one comes who is the carrier is this like AT&T oh AT&T okay and so I've repeated it several times and I start getting them over and over problem is you know obviously you're using other people's accounts. So when they figure out... Thinking those people are probably getting notified on their email saying you just got a phone, it was mailed. I think what happened.
Starting point is 01:01:19 I don't think they were notified by email yet. I don't think it was that mature yet. But I think... So maybe something in the mail. They get their bill and there's another account attached to it. And they're like, what's this for? You know, so I would get a phone and it would work. You know, you got free service for like...
Starting point is 01:01:38 a month or two and then all of a sudden they get shut off. So either the customers figuring around or AT&T. And so if anybody knows me and they wondered why I was switching phone numbers like every couple months back there, I told everybody it was because of security, but that's actually not true. Right. It was because I was getting a different phone and the others were getting shut off. The phone number I have now is actually, this is the longest I've ever had a phone number because of that but so yeah i mean it it and of course again i go back to having this addiction and you you have a you have something that's worth something to somebody
Starting point is 01:02:21 and just say did you go on to these uh these forums or and share this information or you did you provide a service i provided a service okay yeah i got you a phone for 45 days right well i didn't tell them how long i just said look you know it could be active for a couple days it could be for you know months i don't know i don't know it's going to happen this because it really you know it all depended on the the person that you know the account right tied to so you had no idea you know um but yeah so i did that for a while um and that eventually stopped working um but you know Again, it was one of those situations where nothing came of it.
Starting point is 01:03:13 And I'm quite certain because of the computer crimes laws at the time. Right. So I'm really kind of getting away with this. And you're becoming, I would, I would assume, I mean, just from personal experience, every time you get away with something, you just become more and more emboldened by it. Yeah. So, you know, your risk, you're, you're. aversion to risk is you know getting it's smaller and smaller so you're becoming you're taking
Starting point is 01:03:44 bigger and bigger risk because I keep getting away with it and I you know in my personal experience I just started thinking well I'm just that good that's what it is that does feel it catches up with you um I did I developed an attitude where I was invincible and I did not think I could be caught at all um back to school when you can thrive by creating a space that does it all for you, no matter the size. Whether you're taking over your parents' basement or moving to campus,
Starting point is 01:04:17 IKEA has hundreds of design ideas and affordable options to complement any budget. After all, you're in your small space era. It's time to own it. Shop now at at IKEA.ca. And I'm not a very boisterous
Starting point is 01:04:35 person, but I was bragging, you know. I was, you know, here I am. The people close to me knew me, knew that I could do a lot of this stuff. They didn't know exactly what I was doing, but, you know, I thought I was the best there was at hacking, not realizing there are other people out there in the world that were pretty much doing the same thing. But, you know, so yeah, but that security flaw actually gave me an idea. So I got it in my head that I. I could make extra money by finding flaws in other networks and notifying the organization about it.
Starting point is 01:05:15 And so there was a certain bank that was starting to use an imaging system with their checks. So when somebody deposited checks, they scanned the check. So there's a picture of it. And then they put that in a storage. It was basically a big hard drive. So they stored it away. And I started doing some research on one, one, that one bank in specific. And I would, I'd rather not go into which one that was because I don't think anybody still knows the deep, the entire details of this yet.
Starting point is 01:05:56 But yeah, so I gained, I found out that they, they stored these checks, these images on what they're called EMC. sand storage devices and it's basically a big computer that has a huge hard drive on it and that's all it does it just stores information and so i again you scan it you find vulnerabilities and i realized that this device in particular it it has a database on it it's a user database that provides the access, the permissions, and everything managed it. That database was in plain text, which means it has a file somewhere that has all the information that you need to get into it. I worked on that for a while, gained access to it. And I'm like, great. I've got access to all these checks, millions of them. I mean, imagine having a check. You know, you've got their personal
Starting point is 01:07:02 information account number routing number all that stuff i i can't imagine what you would do with it i was going to say that's another paypal event right so i'm like okay i reach out to the information security team for that particular bank and they didn't believe me they literally denied the possibility until i provided them you know a couple redacted checks and then of course then they got very hostile. So I was like, I was trying to be helpful in the way that, you know, because ultimately my plan was to get paid from this, right? Yeah. I mean, I'm trying to fix an issue for you for 10 grand, for 20 grand. I could, I could make a hundred grand easily just dump it on the, by going and selling it to this group of guys that I know that would, you know,
Starting point is 01:07:59 whatever, one of these credit card forums or, you know, the different forums that are out there, these fraud forums, I can make a ton of money selling people's checking information. Yeah. Then you'd have a problem. Then you'd be, you'd be begging to pay 10 or 20 grand. Yeah. That's, that's exactly what I thought too. But they weren't interested.
Starting point is 01:08:20 They, so at that point, then again, you get, you know, the scenario where, uh, you get visited by detective and everything. And it comes down to the fact that I hadn't stolen anything. And I'm trying to explain it to him, you know, like I'm trying to help. And ultimately, after, you know, this one lasted much longer as far as negotiating what's going to happen. But again, no computer crime laws in my jurisdiction there. And, you know, the detectives were getting to know me. for this right you know and so eventually i had to sign an india and it had a time period where i
Starting point is 01:09:09 couldn't discuss what i did and how i did it of course that was a really interesting scenario were you eventually caught for any of these things well yeah again the police came and i mean caught and prosecuted no no oh okay that's that's the the stupid luck about this whole, you know, my entire career was that somehow each, each and every time I'm caught doing this stuff, there was some little thing, you know, whether it was the jurisdictional laws or whatever, the lack thereof, you know, they didn't charge me. And I I hadn't taken anything in the detective's eyes. So, you know, a detective takes it and refers it to a prosecutor.
Starting point is 01:10:03 They're like, well, he didn't steal anything. So we, you know, we can't. Right. Well, especially in that, in that situation. So how do you eventually turn this into, you know, a business? Well, to be honest with you, I didn't. So at that point, I realize in penetration testing, there really is no money.
Starting point is 01:10:26 I mean, so the way, you know, the way it works with penetration testing is you get a company that hires you that says, we want you to come and test our network and show us the vulnerabilities. Well, by that time, they've already secured their network, and you're sort of coming in and doing due diligence. This isn't real, real world vulnerabilities, you know, from an actual threat. so I mean I'm like I found that I still find that boring like you know for myself you know I know I know people that love doing it and you know I'll refer to those people all day long right but going out and finding something that's real out there you know where you have to actually go find that vulnerability that's the fun part I was always one thing that when I worked intelligence for the intelligence agency it taught us was the gathering of information so there's and when you hack there's several stages of what we call the attack life cycle and in the very
Starting point is 01:11:38 beginning it's gathering the information and it's called footprinting so it's you know gathering the intelligence on your target and that was the part that i always loved and i still do um so going out getting that information finding it to where it's useful that's that's the amazing part of it to me it's it's exciting and so that's that's called open source intelligence i was talking about that earlier um so that's what i started doing really um i also realize at that time that i could make more money contracting because contractors, they work, especially when you contract for the government, they don't pay you benefits. They don't pay you sick time or any of that stuff. You don't get, you know, paid vacation. If you work, you get paid. If you don't, you don't.
Starting point is 01:12:41 There's no requirement, no government retirement you're paying into. Exactly. So right then, I basically went back to contract. contracting, and that's whenever I took the job at the NSA. It was a position that was listed as being intelligence in intelligence, but it was ultimately a system administrator position. This was the one that I mentioned was, you know, when basically the same time that Snowden was working there. In fact, it was the same timing. But, and I had that, privileged access again, you know, so I'm managing privileged accounts, which was really interesting to me. You have an immense amount of access. And to say I didn't like look up things that I
Starting point is 01:13:39 probably shouldn't, you know, obviously I did. You know, I wanted to know who killed JFK. I want to know there are aliens that kind of thing you know and you know there aren't but yeah no true story but i am yeah so it i started working there and by this time i'm really really unhappy with myself and the way i was living because you know i got this addiction that has been going on for some time now. And the way I see it, I'm taking food from my children and I'm putting poison in my body and I couldn't stop. I, every time I tried, you know, you go through the withdrawal and you get sick and it's just easier to give up and go back to it than to keep fighting it. Not to mention I was a miserable human being when I was going through withdrawal and doing that to the family
Starting point is 01:14:42 was you know it just it was easier to go back but i was at work one day and i was in a meeting with my boss and i remember catching him look at me really funny and it struck me funny at the time i still remember it and then afterwards he pulled me aside and asked me if i was okay and it was became really clear right then that the addiction was really taking it's total on me. And so, like, and I look at pictures of myself back then now, man, I looked horrible. But were you dozing off at a meeting or what were you, or nodding out or what do they call it, you know, when you start to. Yeah. Yeah. In fact, that's, that's what he noticed. He noticed signs like that. And I would, man, by that time I graduated to fentanyl, you know, there was fentanyl patches that
Starting point is 01:15:38 you could get and we would cut those up and suck on them of all things which is sounds disgusting but it did the trick right and i would there were a couple of times driving home that i fell asleep and would wake up driving through an intersection running over a sign or something you know just ridiculous stuff i mean it it i'm so lucky that between the hacking i didn't didn't go to prison and the drug abuse, I didn't like kill somebody, you know, because I don't know how that didn't happen. But so now I'm starting to get to where I'm, I need to get help. I know I need to get help. And it didn't help that at the time, you know, my mother-in-law was also an addict and my wife at the time had become an addict because, you know, she was around her mom and myself. And so she's
Starting point is 01:16:37 developed this, you know, addiction. And right about that time, I think I, or well, it was about the time I finished the contract at the NSA. The agency that I've been working with basically put me on the bench, which means that they kept me working doing other contracts back to back, just short term. um and i i was deciding to get treatment looking it up doing some research and i'm sitting there one night and all sudden my internet just starts fluctuating and it goes up and down and knowing the signs of someone a hacker getting in your network it i i started doing some you know looking in my logs and everything and so i had said up what we call a honey pot, which was a server that lures other hackers in.
Starting point is 01:17:35 Right. So, you know, whenever they scan my network, they look for certain ports. And they're like, oh, I'm going to go after that, that server. And I had set something up that was really obvious. And so this guy, this kid, um, had got caught in my honey pot. And he basically got mad because he. he was trying to get root on this Linux server, which is root is the highest level of administrator access. He's trying to basically compromise my server, and then he gets locked out.
Starting point is 01:18:13 So when he got locked out, and I had set all that up that way, he got mad. And when he got mad, he starts flooding my network with packets of data. It's called denial of service. And it literally does that. You can send packets of data at a certain. connection and it overwhelms it right right that's why my internet connection was fluctuating and so i obviously i've got his information in my logs and i go after him i'm not going to let that slide by any means and so i figure out that he's a gamer very quickly i am one of the things i realize is that he i scanned his IP address i find an open port I realize he's got a certain type of router.
Starting point is 01:19:03 And so a good, just a little lesson for everybody is that when you go to your ISP and you ask them to set up a connection, they come out or they hand you the equipment and they say plug it in, right? They set it up. They walk away. Your ISP does not secure that network equipment. Okay. so I probably better not name the one I use but it's one of the biggest in the United States and they still do this to this day if you hire them they'll come out plug it up and it's ready to go it works great but that means that anybody that can connect to your can fit your router or
Starting point is 01:19:48 your firewall they can see what model it is and if they can see what model it is by the login page, which is what I did. I connected to him. There was a certain port open on his IP address, and I could see the login page to his router. So I get there. It's got, you know, username password, and then it says what brand it was and what model. So I go to Google and I look up the branded model of that, knowing that ISPs never secure their equipment. And in the manual, it has the default username and password. So I tried it. Log work. right on in. So now I've got control of his network. I can literally create access for myself strictly into his network or anybody else if I wanted to. So I did, you know, and I taught him a lesson.
Starting point is 01:20:39 Problem was he was the son of a mayor of some town in Pennsylvania. And that mayor got pretty angry with what I did. And so now this gets reported. So his son doesn't explain that he had started the process of... Well, I told them, obviously.
Starting point is 01:21:03 So I get visited again by a detective again. And I explained the situation to them and like, you know, I was just retaliating. He connected to me and I even showed them how. You know, like this is
Starting point is 01:21:18 this is what he did this is evidence he did this to me first you can see it in the logs the time stands they didn't care obviously and but he's what he does have is he's got computer crime laws on the books and he's got me dead to rights he's got evidence showing me he's showing me printouts everything i did and right i'm starting to get scared again. I'm starting to get that feeling, the sweating on the inside, the cold, wanting to pass out, thinking about jail time. And then, you know, I'm like, my God, I was just, I'm at the same time, I'm like, I need to quit, you know, I need to clean my life up and I need to stop doing all this. And, you know, that was a very profound moment. But at the same time, I don't. know what made me think of it but i was like well how do you know it was me and he's like what do you mean you just said of it i said yeah but you can't prove in court that that was me anybody could have used my connection and and he so but i basically told him just now because i'm showing him
Starting point is 01:22:38 everything right but i didn't really say i actually connected and so i'm like you know anybody could connect to my Wi-Fi and do this. You don't know that it was me. Obviously, he knows it's me. I know he knows it's me, but he can't prove that in court. So again, I'm sort of skating that line of getting caught, you know, but now I had to be really careful because I'm, you know, this one is very close. There's a good possibility that he could make a jury believe that I did this fair because I did. And so they filed the charges. And so now, now I'm scared.
Starting point is 01:23:30 And I'm starting to be convinced that I can't beat this. And I've got to do something. And so at the same time, I'm like, you know, I got to do something about the addiction, if not for me, just for my kids, you know, because still I feel like I'm spending all this money on painkillers that I should be spinning on my children. And they're starting to get to an age where, you know, they're going to realize what's going on pretty soon. right and it just um it you know so ultimately the charges were dropped basically because they couldn't prove that it was me that did it um but that that was enough the scare was enough for me to step away from the hacking and i realized you know i'm you know this stuff's really, it was sort of fueling the addiction and the addiction was fueling the hacking at the same
Starting point is 01:24:43 time. And I, you know, so I remember that day really well because I had a few hurdles to overcome. I mean, I was working contracting work. So again, I had no benefits. So getting treatment was going to be hard because, you know, no insurance. And I couldn't take time off and go to like an inpatient treatment place because I had to work. I had to pay bills. And at the same time, while I was an addict, I had got myself banned from a couple of the medical facilities in that area because when, you know, pain pill addicts, they go to the doctor a lot or go to the ER, to try to get stuff often, right? Right.
Starting point is 01:25:35 And one of the things about that is you sit in those rooms for a long period of time, and it's maddening. For a limited time at McDonald's, enjoy the tasty breakfast trio. Your choice of chicken or sausage McMuffin or McGrittles with a hash brown and a small iced coffee for five bucks plus tax. Available until 11 a.m. at participating McDonald's restaurants. Price excludes flavored iced coffee and delivery. Well, you ever been to an ER, you get my... one of those rooms. There's always a computer on the side of the wall. So I took it upon myself to, you know, move myself up in the queue a few times. And then I got caught doing that. So I got
Starting point is 01:26:15 banned from a couple of facilities because I had manipulated myself my place in line to get, you know, it's not have to wait very long. And so again, you know, I'm messing with things I shouldn't be. And so I had that problem, no insurance. I couldn't take time off. Some of those facilities wouldn't allow me to even walk in the front door because I had, you know, basically got myself trespassed from the property. But, yeah, it just ultimately, I found, I got online, I believe is what I ended up doing because I didn't have any other choice. And I reached out to a group. at that point in time
Starting point is 01:27:02 we were my wife and I were consuming enough oxycontin and Xanax to kill a small elephant every day and there shoot there are even things to this day I don't remember from that time because of that those are two
Starting point is 01:27:18 things you just don't mix but I found a group that invited me to a meeting narcotics Anonymous and my intentions were to go and check it out and then by myself and then come back. And then if I liked it, I was going to tell my wife. And I went. I came back that night and I was going to tell her and she was gone and didn't come back to like 3 a.m. And I found that really suspicious. But
Starting point is 01:27:55 keep in mind that I spent a lot of my nights hacking. So for the previous several years or the whole time we were married, I rarely went to bed with her because I was on the computer, right? I was hacking. Right. And that she wasn't happy with that. So eventually, obviously she started going out with her friends and, you know, long story short, she was cheating that night. And you, you, You know, I've got a broad skill set, and I started checking cell phone records and things like that and figured it out. And so I never told her that I went to the meeting. I went back the next week to that meeting, and, you know, basically they assigned me a sponsor, and I started, you know, the painstaking road of getting clean, and I basically confided in them. And that person told me, basically, I had to cut myself off from all these people that, you know, in my life, that I influenced the use of pills, right?
Starting point is 01:29:07 And even the hacking, because the hacking was an addiction also. And so at that point, I'm trying to figure out how to do that. well my wife at the time had a problem of shoplifting and i hated it even though it benefited us at times you know with the addiction um it drove me nuts because you couldn't go anywhere with her everywhere she went she had to steal something it drove me crazy and so she got caught right about then and got arrested and went to jail and so that was my my aha moment i've got opportunity here i can quit i can quit pills i can quit hacking and quit breaking the law and you know i can clean my life up for both me and my children and the way i looked at it was like you know
Starting point is 01:30:03 i've got this these skills and i've got this education that i can you know i can get a job making really good money and so i did i started the the process of getting clean at that point And, you know, I ended up getting custody of my kids not long after that because they wanted to be in an environment where, you know, obviously where somebody wasn't using drugs and and all that stuff. Yeah, it just, it started snowballing from there. So when did you leave the NSA? I had already at that point. I got really bored there. The NSA, at least the job that I had, it was, so it was a system administrator job, and it was something that was created for somebody probably decades before that.
Starting point is 01:31:10 So all the duties that we had, the thing, that your job responsibilities were, were, were written 10 years prior to me working there, all the things that we had to do could be automated at this point. And so being someone who is always looking for a better way or a different way, you know, outside the box thinking, I scripted things and I automated it. So the manual processes that they used to do we had I had shortcuts for so it created a great deal of free time for me which was detrimental because I'm a hacker right I'm somebody that's got to be learning all the time and though it was great for that because I could get online and I could learn new stuff I've also you know I'm starting to stop the hacking because
Starting point is 01:32:09 you know i i needed to and so i i couldn't do that i couldn't do it at work because if i'd done it at work i'd have been arrested at that point but um yeah so there's i got bored long and short of it i got really bored and that that's what took snowdon down actually but you know it it's he was doing word searches on the network he called them dirty word searches so part of your system administrators job is to um you know you know we look for files that aren't supposed to be there on the network or whatnot and i can't tell you how many people i found with porn on their laptops or you know things that weren't supposed to be there and so he claims that he was doing dirty word searches on the network and he found these programs
Starting point is 01:33:03 that um that were intrusive on the privacy of the average citizen which is somewhat true, but I would argue what were you doing looking through the network in the first place? I mean, he had privileged access like I did. And when you do that, you're managing the people with the most amount of access, but just because you're managing their access doesn't give you the right to go digging through everything that's on the network. And that's pretty much what he did, you know?
Starting point is 01:33:37 So, yeah. So he got bored. I got bored. That's why I left. And at that point, I was working. I had got a contract job with just a regular company. It was a telecommunications company at that point and was just doing my thing and living the way I should. I got clean, got custody of my kids, and started growing as a human, you know, finally.
Starting point is 01:34:06 So, okay. And that it, so what are you doing now? Right now? Yeah, for work. I mean, I actually can't talk about what I do right now. I can't in a few years. I'll leave it at that. I've written a book most recently on AI and cybersecurity.
Starting point is 01:34:35 AI is both scary and exciting at the same time. A lot of people don't use or realize how much we use AI every day, just in the things, you know, you got Siri on your, your iPhone. You use it in your navigation with, you know, your maps on your phone or in your car. It's in medical devices at the hospital. It's in your manufacturing. We use AI so much already, and people don't really realize it. It's exciting in that aspect, but it's also dangerous because depending on what data set that you pointed at, so when I say that, I mean like, so it pulls, for instance, chat GPT, if you get on chat GPT and you look something up using chat GPT, it's pulling information from the internet. And as you well know, you don't, you don't have, you could put anything on the internet.
Starting point is 01:35:39 That doesn't mean it's true, right? So the data set is the internet as far as chat GPT is concerned. And it does very little data validation whenever it's pulling the information. So it could, if you asked it who won the last election, it may or may not tell you who actually won the last election. Maybe because somebody had said they want it, you know, it can pull that information. So there's, you know, so it's dangerous in that aspect. And there's a lot greater concerns as far as that goes. That's just an example.
Starting point is 01:36:20 But yeah, it's, it's really interesting. But it's also at the same time not going to cause the apocalypse, you know, it's that we call that artificial. general intelligence, which is AI would become like a human being, you know, knowledgeable. And it can't do that. It's not going to do that. That'll never happen. It's not going to turn into sky net. No, no. If that happened, okay, if something like that happened, it was programmed to do so and therefore not AI, right? Somebody programmed it to do so. But yeah, it can't develop emotions and decide that human beings are its enemy because it doesn't know what a human being is.
Starting point is 01:37:09 And, you know, it just, I could get in, go so far into the computer programming. But if anybody's ever written like a basic computer programming class or basic program and like a programming class in college, they would understand why AI can't do that. You have to tell a computer everything you want it to do. And so for it to be able to accumulate enough knowledge to decide to, you know, do something to humans, it's just ridiculous. So why did you write this book? Well, for one, AI, there's, it's a powerful tool. And you can use it for hacking.
Starting point is 01:37:58 So it's starting to be used in that fashion. And if you've noticed in the news, there's this thing called vishing that they use, much like fishing, which is what the emails, like bulk emails that are sent out, like what I did to the PayPal users, right? So, vishing is voice fishing using AI. And AI will, you can have it mimic your voice. So an attacker will call you. and as soon as you say hello, they get a sample of your voice, and then they'll, they can actually infiltrate your phone, they can call your contacts, and pretend it's you, you know, like you've been on a car accident or something, and that you need money right away, they'll have you send it to
Starting point is 01:38:48 them. And they mostly prey on, you know, elderly because they're the most susceptible to that now. But, yeah, it's a very dangerous tool. So in cybersecurity, there are things that we can do to help mitigate those risks. And that's basically what the book is about. Okay. Yeah, I had a guy on the podcast like a month or two ago, and we were talking about exactly that. How using AI, they're able to take these old scams that.
Starting point is 01:39:24 You know, these old Facebook scams where they, they text you on Messenger and say, Oh, gosh, you know, Jennifer, I'm in, you know, whatever. I'm currently in Budapest and we lost our passport and we need $500, you know, sent immediately. I'll give it back as soon as we get back to the States. And, you know, can you Western Union it or can you, you know, whatever the case may be, you know, Venmo or whatever. And so, you know, you think it, you know, if you're, you know, if you're,
Starting point is 01:39:54 you're 70 years old and you think it's your friend you know Jennifer you send it but you know but then it was questionable you know it's questionable because I don't remember she was going there or I haven't spoken with this person in six months why would they contact me but now if now you know Jennifer calls you or you know whatever teresa or whatever name is now she can actually same same scenario but she calls you on the phone you know and it's like and you recognize her voice immediately and she's asking for money and she's in trouble and I don't have anybody's contacts. I just happened to have you on Messenger and I was able to dial.
Starting point is 01:40:30 You're the only person that answered and I'm in a real bind. And for you, it's 300 bucks or 500 bucks. And that's not a big deal here. But if you're living in Nigeria, that's a ton of money. Yep. You know, and you only have to get a couple of people a week. If you can get one or two a day, it's even better. You get two or three of those people a week.
Starting point is 01:40:51 You're living like a multi-millionaire. right so you know for us it's not that huge of a deal but for them it's it's a lot yeah um so okay so what how long ago so when did you come up with it when did you release the book um it's actually not released yet we're getting we're working on the release date at the moment um what's the name of it um so it's safeguarding AI um and in the cybersecurity world um it's I want to say March April I ran into just one issue with releasing because I mentioned a certain software in it and had to get their approval but yeah that was otherwise it would have been out by now is there a publisher did you self publish or Elsevier yeah is the publisher yeah okay well is there anything else you feel like you want to go over uh we're getting ready to i'm looking at the plan is to um start a podcast basically what i call it a podcast but it's actually
Starting point is 01:42:16 a YouTube channel. It's a podcast. It's, I had, in the last few years, I volunteered with the Innocent Lives Foundation on human trafficking. So those open source intelligence skills that I mentioned, we used,
Starting point is 01:42:31 that we used an intelligence work. It's, it's very useful in the investigation of human trafficking and missing persons. And so I did some work with the Innocent Lives Foundation in the past. And we're looking at, launching a YouTube channel to both highlight the need for human trafficking investigations and also share tools on how you can do that. There are tons of cyber sleuths out there who get involved in that sort of thing.
Starting point is 01:43:07 And so that's one of the things that we're doing with the YouTube channel. But yeah, and then as well, there's going to be a section on there. for hacking tools and everything, showing people how to use them. Yeah, you should talk to, I think I mentioned this, Brett Johnson. Did you ever look him up? I did, yeah, I hadn't heard of him, but yeah, that was interesting. I hadn't heard of him specifically. I heard of the godfather, was it godfather of cybercrime, I believe.
Starting point is 01:43:41 Right. Yeah, I had heard of that. I had actually gone to, there's all kinds of conferences, cybersecurity conferences all over the United States. And some years back, I had went to one in Las Vegas, and I met a guy named Kevin Mittnick. He was, you probably heard of him. Yeah, of course.
Starting point is 01:44:04 Good guy just passed away a few months ago. But I remember the godfather of cyber crime. and I think that's what he went by back then because Kevin talked about him. So I hadn't actually, I didn't know who he was until you mentioned his name. Yeah, he's got a podcast. I'm sure he'd be very interested in talking with you. Yeah. I was actually on hit.
Starting point is 01:44:27 He just started it again because he had started a podcast and it was doing well. And then he was interviewing a woman who had run an escort service, an online escort service. and he was as he's talking to her and they're talking about her story he started going through you know he pulled up on the screen the um the different sites and he's going through it not realizing a naked pick naked pictures were on the side so the algorithm like it released maybe four hours later the algorithm caught it and realized like oh no removed took the entire channel down oh didn't take the video down didn't give him a warning just boom your chance channel's done. And, you know, which was really not what they should have done. They should have just taken the video down. He clearly, anybody who had watched the video, knew that he had no idea. He wasn't even paying attention, didn't realize it was there. But regardless, so he had to restart his channel months and months later, and he just started again. I was actually just did an interview with him, gosh, a couple days ago. I don't even think he's, he hasn't even put
Starting point is 01:45:39 it up yet, but I'm sure he'd be interested in talking with it. Yeah, I'll write his thing down again. Yeah, I'll, I'll shoot you his contact information too. Yeah, thank you. Sure. Yeah. But, hey, are you, we're good? You want to wrap this up?
Starting point is 01:45:58 Yeah. All right, well, listen, I appreciate you coming on and talking to me. Yeah, thanks for having me. I appreciate it. Yeah, I will, I'll put your, the link to your book. in the description and the YouTube you know if you you know if you start you know if you when you start the YouTube channel or you get the link for the book or whatever I'll put the all of those okay in the in the description box okay yeah I can I can go I can
Starting point is 01:46:24 give you the YouTube channel I don't have the link for the book just yet it's going to be a couple months but yeah I just got to get to work that's what we're doing now is between the interviews you know that they're starting to set up, which I just after, after you called me, I started getting more, you know, request. But finding time to do, I got to, I still have the day job that I can't mention, of course. And then the, you know, between the interviews and trying to film content for the YouTube channel, I got to find time to do that. But yeah.
Starting point is 01:47:04 Hey, you guys. I really appreciate you watching. I hope you enjoyed the interview. do me a favor if you liked it please share the video please subscribe to the channel if you haven't already hit the bell so you get notified of videos like this check the description box for the books and the youtube channel that we were just talking about really appreciate it also please consider joining my patreon it's ten dollars a month and it really does help and i do appreciate it thank you very much see you

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.