Matthew Cox | Inside True Crime Podcast - PAYPAL SCAMMER REVEALS HIS SECRETS (Millions Stolen)
Episode Date: April 10, 2024PAYPAL SCAMMER REVEALS HIS SECRETS (Millions Stolen) ...
Transcript
Discussion (0)
Book club on Monday.
Gym on Tuesday.
Date night on Wednesday.
Out on the town on Thursday.
Quiet night in on Friday.
It's good to have a routine.
And it's good for your eyes too.
Because with regular comprehensive eye exams at Specsavers,
you'll know just how healthy they are.
Visit Spexsavers.cavers.cai to book your next eye exam.
Eye exams provided by independent optometrists.
I created this email, and it looked like it came from PayPal.
It said, you owe processing fees for your PayPal transactions.
It submit to pay them.
It charged them $9.99.
It sounds like a legit processing fee.
Then I send the email blast out to these accounts.
The way I looked at it was like, they're willingly sending me this money.
They're not willing.
How much?
Never forget this.
Yeah, I was born in Southeast Missouri, town called Farmington, Missouri.
Okay.
parents, I mean, were they, you know, into tech or?
No.
I'm assuming you're, how old are you?
I am, I just turned 50.
Okay.
Yeah, no, my parents were and still are not into tech at all.
It's, it's sort of frightening how not into tech they are.
But my, my parents, they divorced when I was a year old.
Um, it was, and I guess for a divorced kid, it was a pretty typical childhood, but, you know, my dad, when I was young, he went to college. Um, he worked construction during the day and went to college at night. Um, and my mom, she, um, she worked in a factory most of her life, you know, both of them worked hard, you know, um, so no, they were not technical at all.
okay and was your dad kind of still in your in your life now no even then growing up actually yeah
I lived with my dad when my parents divorced my dad fought my mom for custody and won custody
somehow back then yeah so any so you were an only child or were your their brothers or sisters
so I was an only child until I was about 21 and I found out that
my dad had had another two children with someone else.
So, but growing up, I was basically an only child.
But you had no idea growing up that there were no idea, no.
So was he seeing them or was he keeping it from you or just kind of?
He, when I was, I guess, three or four, he had a relationship with this person.
And I somewhat remember her, but I didn't know that, you know,
know that they had kids together.
So she was in my life a very short time, and then they broke up.
And then I didn't really, you know, I didn't hear anything about it until I
about turned 18, I guess.
And I remember my dad getting the phone call from her.
And I guess she was going to take him to court for child support at that point.
And, you know, so he was really angry.
I just remember the explosion of anger.
And, you know, then subsequently eventually I met her or met one of the sisters.
The other one I still haven't met.
Okay.
That's kind of an interesting side note, you know?
Yeah.
So, so you went to, you were, were you a good student in high school?
High school, no.
I was, throughout elementary school and all that, I guess I was, I was pretty good kids.
I got to very little trouble.
When I got into high school, so living with my dad was, I had a great deal of freedom because, like I said, he worked construction through the day, went to college in the evening, and then studied when he got home.
And so, you know, construction workers, they go to work at like 4 a.m.
And, you know, so he would work till, you know, four or five in the afternoon, then go to college.
And so I'm there. My whole childhood by myself had to get myself up, get myself ready for school, feed myself, do all that stuff. And so naturally, there's, he's never there. I had a ton of freedom. So, you know, you get into those rebellious years. And, you know, you start taking things in your own hands. And I start skipping school. I, I actually start.
stealing my dad's cars and driving them before I had my license, which is a funny story in
itself. But yeah. How old was this? I was 15. My dad had, he had a van and he had a
Porsche. And he loved the Porsche. I'm sure. And so, yeah, one time I decided to take that
Porsche to school and I was backing it out of the driveway. And we had on each side of the
driveway was this culvert that dropped off. And I cut the the turn too sharp when I was backing
out and the axle went over that culvert and stuck right there on the edge. And I freaked out,
right? I mean, who wouldn't? And so I try everything. I get out and I'm like trying to get this
thing unstuck because he's going to kill me, you know? And I did everything I could. And the funny
part of this is that my principal lived right across the street. And so I try everything. I can't get
this thing unstuck. And so I literally, I finally get a hold of a friend of mine who is leaving for
school just then. And so he comes down and we ended up missing the first half of the day pulling
my dad's Porsche off in a way that doesn't damage it, you know, and doesn't, you know. So we had to be
very careful we spent several hours doing this we finally get the thing back in the garage and i'm
like crisis averted but there's still i've torn up part of the part of the driveway where the axle got
stuck so i got to fix that luckily my dad was in construction so there was you know sealer in the
in the garage and so i spent time fixing that i missed pretty much the whole day of school but i got
the car back in there and i fixed the driveway to where you couldn't tell i
For some reason, the principal never called, you know, to ask why I wasn't in school.
And I think I get away with this.
Right.
Well, fast forward to graduation.
I'm sitting in graduation.
I'm in my chair.
I'm like daydreaming.
And all of a sudden, my principal goes into this story about how when I stole my dad's car and get it stuck in my driveway.
And I start freaking out because my dad's in the back.
And I'm like, oh shit.
Like, I've got to do something.
I'm like, I got to get out of here.
Like my flight or fight mode, just like I'm freaking out.
I'm losing it.
And he continues telling the story.
And he finally gets to the part to where he called my dad that night and had told him what I did.
And I was like, oh, shit, wait, he knew?
and so my dad apparently he told him and my dad got mad at first i guess and he was so impressed
that i i had handled a situation and put it back and fixed the driveway he never said a word
and so yeah it was interesting that's pretty good yeah i never stole his cars after that again
though yeah it was it was pretty weird but yeah in high school is when i really got interested
in technology we um i don't know how old you are but if you were old bro i'm 54 okay so you remember
we had party lines back in the day right so i used to dial into party lines and they the ones that
i connected to had techie kind of guys and at the same time i had been taking these computer
science courses at our vocational school and our high school they weren't really computer science
It was like word processing and, you know, there were some educational games and stuff, but I learned a lot from it.
And I, through that, it taught you things like directory structure and computers and everything.
And so rather than doing this in the game, I'm like, I'm on a computer.
I'm just going to fuck with it.
So I start messing with the computer based on what the thing's teaching me.
And so I start real, I realize that I.
I could mess with the games.
I could actually alter the programs.
And I could, what I thought was cool was replacing the names and the games with people I knew.
And at the time, I actually, there was a girl that took a class, the same class, right after I did.
And so I would change the names to her name and my name and everything.
I was flirting with her.
But so, you know, I'm basically editing these games, changing them.
And I realized, and that really got me interesting because I'm like, I'm breaking them down and making changes that, you know, I really shouldn't be.
And at the same time, I'm, you know, at home, I'm dialing into these party lines and there was something called phone freaking at the time.
And you could, phone freaking was a way to basically hack a phone system.
So a lot of people don't know, especially our old phone, analog phone systems.
when you dialed numbers, it would make tones.
Right.
And so your numbers sent you to, you know, specific locations, you had area codes.
With those tones are what told the phone switches where to send your call, how to route it.
There are also codes in there, sequences and numbers and the little pound sign and star that you could use to, like, get free long distance or whatever, you know.
you could, it's basically hacking the phone system because you're manipulating its ability to
do something. So I'm, these guys are teaching me how to do this and I start utilizing it. And so at
same time, I'm learning how to edit games at school and I'm also hacking a phone system. And that's
really what got me interested in this. So, you know, that time, we all.
always referred to it as computers, you know, you're going into computers or whatever. But that was
kind of what, where I saw my trajectory going from early on. Oddly enough, at the time I was a
big jock, though, I ran track and cross country. So my primary focus was running. Whenever I get
interested in something, I'd dive 200% into it. And at that time, it was running. It wasn't
technology. I was going to go to college for technology, but that was just, you know, what I was
going to go to school for whenever I was running, basically.
Right.
So you graduated, you graduated high school, and, I mean, did you, were your grades good enough
to get, like, a scholarship or?
So I got offered track scholarships, and I went to college.
I started school, and that didn't last very long because.
Where'd you go?
I went to the University of Miami.
Oh, okay.
And.
Oh, that's a trek?
Yeah.
And so I got, you know, here's a kid from southeast Missouri and going to Florida for the first time ever.
And there's a lot of partying going on.
Right.
And so I did more partying than I did running.
That didn't last very long.
So I came home, basically.
and I got kicked out, you know, so I partied too much, got kicked out.
I had to come home and tell the family, but lost my scholarship, can't do that anymore.
I need to figure something else out.
Well, my dad, when I was a kid, whenever he needed to talk to me, he always took me on a drive.
We would go basically get in his vehicle, we'd go grab a soda, and we would drive around, you know,
the countryside in southeast Missouri, and we'd talk.
And I remember this so, so vividly because I was still in the mind that I was going to go to
another college or something like that.
And I grabbed some of my music, and it was the first time I ever did this.
And we had tapes back then, I remember cassettes.
So I grabbed a couple of cassettes.
And I wanted to play this one song for him because my dad loved the Beatles.
And there was this one band that they covered a Beatles song.
So we get in there and we're driving down the road and he starts talking to me about my future and what I'm going to do.
And he's getting real serious and I'm like, you know, not there mentally.
I pop this cassette in and it was Winger.
She's only 17.
And so my dad immediately gets mad because I'm not taking the conversation seriously.
He ejects that tape, throws it out the window.
know as we're going and right and he's and he gets mad and immediately just starts you know going into
this you know you you you've got to change your your your thinking and that was always his thing
you've got to change your thinking and you know think about what you're going to do next and
everything because you know you're not coming home and and staying here now after you know
not trying you're given an opportunity and and you you lost that opportunity and so I
realized after we're talking for some time, and I had shut up at that point, that we had passed the Air Force Recruiter's Office a few times.
And so I got the hint at that point. And within a week, I had signed up for the Air Force.
So, yeah, it changed my trajectory altogether. But looking back on it, it really kind of put me in the path now to where I am now.
Because I went in and ultimately ended up in intelligence after, you know, I tried a few things and then ended up there and really got put into technology, you know, and that's, you know, where it really started taking off.
Right. So what is it? You take an aptitude test when you first go in, right?
Yeah. So what I did, I chose a specific.
job when I signed up and I, that job in particular, it did end up working out.
So things didn't work out for me, and they put me in this other position that I didn't like
at first, and then, you know, I end up getting out. And you're right, they have you take the,
it's the ASBAB, Armed Forces Vocational Battery Test, I think is what it's called.
the idea is that they can measure your skills what you're good at and they put you in a job that
matches those those skills and so ultimately i'm you know i'm working with computers at the end
and so i at that point i left the military um how long how long were you in the military
a few years what were you working on nothing important i mean you know at i that time yeah i i didn't
even have a really a high, high security clearance or anything. It was nothing, just average
stuff. They, so after I get out, I messed around for a little while and realized that those
skills that I learned, the computer skills and what I knew there could be useful. And so I
I answered an ad for a contractor agency, and ultimately I got a job within.
Actually, I think I went to, I got a, yeah, I got a job, a three-month contract at first doing open-source intelligence, which is, so there's different kinds of intelligence.
You've got human intelligence, which is humint, Ocent is open-source intelligence, it's gathering information, gathering data.
there's signals intelligence which is the you know intelligence gathering through a computer through
information systems that sort of thing these days anyway used to back in the old days they used
flags but it's passing data right okay um passing information is what it is um so i had found
this job that introduced me to the civilian world of
you know, intelligence with computers.
And so though I had worked a little bit in the military, honestly, I had not had this sort of
access, you know, until now.
And so I worked a short contract and then what were they asking you to do?
At the time, I actually don't remember a lot about that one in particular because it,
it was just a three-month contract.
It was gathering information.
Seems like I was putting information in databases.
Yeah.
And it was just you pull information, you put them in databases,
and basically validate the data, and you pass it on.
Okay.
That one wasn't that important.
But it, together with, you know, what I had done before,
then I had these skills that made me a little bit marketable.
So even though it was a three-month,
contract another opportunity came along and that ended up being the defense intelligence agency
the DIA and that was so that one required a security clearance a heavy security clearance
so I that I ended up getting that I I went to the what was at the joint military intelligence
training center I think is what it was called you
learn intelligence collection and analysis what year was this uh roughly you know
late 90s okay yeah um okay so there's all kinds of things going on in the uh in the world in the
late 90s right like they're still trying to put together the fragments of the uh Soviet or the old
Soviet Union and
there's all kinds of
upheavals and
at the time there was a shift between
the
Soviet era to
Middle East so we were starting to
pay a lot more attention to Middle Eastern
activities
yeah so but we
we had a
great deal of emphasis
on that
area of the world so Middle East
Russia
just starting to get a little bit of China and then France of oddly enough.
France has been an intelligence powerhouse for some time and that was another one.
But yeah.
I don't think of them as particularly adept at.
Actually, you would be surprised.
I would be.
But then again, I was going to say, well, that's probably because they don't make movies about it.
Right.
There's no James Bond.
There's no, you know, Jason Bourne.
So, you know, if you're not, if it's, there's not movies about it, then I'm not sure why I would know anything.
Or periodically like the, gosh, the, uh, Musad, you know, getting caught.
Right.
Executing somebody or breaking into, you know, going through a, was that hotel where they, didn't they kill the guy in the hotel and they were changing mustaches and hats and disguises and got caught.
the video camera and still amazing right you know um but so maybe there's just that good you're not
supposed to know they are yeah so you were so you were that's what you were uh you went into the um
uh was it the defense department what was it d i a yeah the i a yeah yeah so i a stand for i'm sorry
i'm sorry defense intelligence agency yeah okay cool sorry sorry
Yeah, when I explain it to people, I always explain it as sort of the military side of the CIA, but it's technically not.
It has its own, you know, they collect intelligence for the Defense Department that filters down to the military.
Sounds like, yeah, I was going to say, sounds like the, you know, sounds like you're doing it for the defense department.
Yeah, just not the same mission of CIA.
CIA is more overt.
And they do more clandestine and, you know, they have much broader without talking bad about CIA.
They have a much broader mission.
Yeah, I interviewed Andrew Bustamante.
I've heard of him, yeah.
Yeah, he's an interesting guy.
He's been on a bunch of podcasts and stuff.
I've known him for a few years.
Actually, I interviewed him for a book that I wrote.
And I mean, I also interviewed him on the podcast.
podcast. But so what were you doing? What were you doing for the, you know, so I managed the privileged
accounts and a lot of applications. So in the intelligence and technical intelligence,
what we do, it's sort of a thing everywhere you go. You manage their information systems or
information security applications. So you'll be assigned to a group of programs that,
that you manage.
I specifically had this special type of access from early on, and I'm not sure how it
happened because it's a very rare.
You're very young.
It sounds like you don't have a lot of experience and you're super young.
Yeah.
And yeah.
So I was I was put in charge of privileged accounts.
And privileged accounts are your administrators of any network.
So the guys that hold the highest access, there has to be.
somebody that manages their accounts. And so that was me. I sort of happened upon it. I don't know how
it happened, but since then, everywhere I've gone, I've managed privileged accounts. To this day,
I still have an expertise in privileged accounts. So, and it just sort of happened by accident there,
and that's where it started. But so I was managing their access. And with that, you have an
extraordinary amount of clearance and access. You have access to everything. So,
you can technically look at everything on the network, you know, and, you know, because you're managing these people, their access.
That's incidentally what Edward Snowden had, you know, at the NSA, which we, we worked there at the same time.
But, yeah.
Do you recall him or?
I'm sorry?
Do you recall meeting Snowden or you just have to be?
No, we worked in different locations.
We had the same job at the same time.
He was in Hawaii.
I was here in Missouri.
Didn't meet him.
I just, I'm very aware of the, you know, the whole situation.
Right.
You can see how he had access to that privileged information.
Yeah, I see how he had access.
What he did was, yeah, not right.
So what happened?
I mean, so this is the, the end of the story.
You've worked there.
You've been working there ever since.
that's it. We're done. No. So. So at the same time, you know, I'm, I'm learning all
these, these, I'm gathering all this information skills. And I'm starting to learn how to really,
well, we gathered information and it was whatever means necessary at the time. So you
learn how to get information, whether it's legal or not.
quite honestly. And when it, when it's on behalf of the Defense Department, it's however you need to get it. So I remember specifically them asking us to do something, you know, whether you hack, borrow, steal, whatever, we need this. And so that we're learning these skills. And at the same time, you know, this is the internet boom. Everybody's on AOL and, you know, the you've got mail.
you know it's in its infancy and I would go home at night and I would spend a lot of time on the internet on AOL and I would get in these chat rooms there were Yahoo chat rooms and AOL chat rooms and you like with the party lines you can meet like minded individuals and so with learning this stuff at work and going home and
spending most nights, you know, up till 3 a.m. learning more because I'm talking to other
techies. I gained an immense amount of knowledge, you know, learning different things. And
it, you know, it just, I really grew my, my abilities, you know, quite a bit. My skills just grew
immensely more so in the chat rooms than actually on-job training is that what you're yeah yeah so
there was a there was a group that I spoke with probably every night we got on and we we hung out
traded secrets and everything and they would some of those guys would eventually go on to be a very
popular hacktivist group later in time and but we there was at the time they called themselves
alt 2,600.
And so there were a group of guys, and there were these, there's a program called IRC as
Internet Relay Chat, I believe is what it means.
And it was a text-based chat program where we would all meet.
It was, I would say it was kind of precursor to the dark web now, because we could get on
there, we could all chat, we could share information.
And they created channels to where you could share things like software, you know,
licensed software that you weren't supposed to share, obviously.
Right.
um you know pirated stuff we'd share movies we'd share music all kinds of things um along with
hacking abilities you know they had channels for learning how to hacking
learn how to hack databases learn how to hack websites um hacking phone systems all that stuff
and so i spent my time my evenings on that and that's so you know great big nerd i'd work go home
do that. And so at the same time, I had, I had injured my back previously. And so I started
taking painkillers for my back. And over time, you know, you get addicted to that stuff.
So I'm working during the day, hacking at night, taking painkillers. And I start developing
this immense, you know, addiction.
And I started at that point moonlighting and developing my skills.
So I was doing things on the side.
And I started selling things on eBay.
And it started with selling software licensing.
And believe it or not, back in the day, that was pretty lucrative because you could get a hold of software licenses pretty easy.
people didn't know the value of it.
They would throw it away.
They'd just buy a software, throw the license away once they installed it,
and here you have a fresh license that's worth quite a bit
because people who actually went by the law would want to buy that license.
So I would take that stuff, sell it on eBay,
and we used PayPal to pay for it.
PayPal was in its infancy.
well I figured out or got this bright idea and I created this fake account for PayPal and I created
an email address and it was online processing fee at gmail.com and I created the PayPal account
with the same name. Nowadays you couldn't do that.
had, you know, validation, or they have validation now that won't let you do this sort of thing.
But at the time, it was, it was pretty early.
Right.
They'll still work. They're still working out the kinks at that time.
Yeah.
Yeah. It was very, they hadn't been bought yet. And I believe, I can't remember what year it was,
but they got bought by a bigger organization. And at that time, then PayPal became huge.
And they were a lot more secure at that point. But so.
I had created this account and I went and got a secure card, like a secure bank card, debit card.
Back then you could get those in pretty much anybody's name.
You know, you'd get these offers in the mail, and all you have to do is fill it out,
send it in, and they'd send you a card back with whoever's name that you put on the application and an account.
And so I linked that account to the PayPal account.
And I created this email to bulk send, and it looked like it came from PayPal.
And it said, you know, hey, this PayPal, you know, your PayPal account, you're something about, you owe processing fees for your PayPal transactions, you know, hit submit to pay them.
And I set it up, I wrote a little script in the background so that it, it charged in $9.99, which, you know, everything ends in $0.99. So, like, it sounds like a legit processing fee.
Well, and this is in at this point, it's, you know, the internet is so new and, and, you know, PayPal is so new. Like, nobody has any idea. Right.
Of these types of scams. Because, you know, obviously, I get these every day.
Uh-huh. Yeah.
So, yeah. And so I'm the last piece of it was, well, not the last piece, but the next piece, I went on Google. And so you can, there are things called Google Dorks. I know it sounds funny, but they are commands that you can use to manipulate the search engine to bring you more specific information. So I would point, basically I would focus on eBay.com.
com because that's where most people use PayPal, right?
And I was looking for any email address that had a PayPal account attached to it on eBay.
So I would run through the search and it comes up with all these results and it's about
filtering out the information that you get.
So I copy all of it out.
I filtered out to just get the email addresses and that pretty much consists of, you know,
writing some scripts that just pull out the email address or the phone number or whatever you
need. And so I did that for a good month or so until I had like 500,000 accounts. And it was an
enormous amount. And so here I've got I've got the account set up. I've got the email ready to go.
I've got all these accounts that have PayPal accounts that I know. Right. So then I send the email blast
out to these accounts and so all they have to do is get this email and click on the button
to submit and they've paid me $9.99. The way I looked at it was like, you know, they're willingly
sending me this money. They're not willing. Right. But it's also it's it's $9.99.
Like nobody's going to lose it. You're not you're not pulling money out of people's retirement
funds here you know right right so by now obviously i've grown some skills um you know and i'm
starting to think of more nefarious ways to use this and so at the time i'm like okay i need to wait
a while i need to give this time to see how many people actually click on this it was kind of
it was half an experiment and half fundraising you know so
Let's be honest.
So it was really early form of fishing is basically what it was.
And I waited and it killed me to wait because it was driving me crazy.
I'm like wanting to check this thing every day.
But I'm like, first of all, the security aspect of it, I know that I can't, I got to be
careful as far as accessing that account.
So if PayPal caught it, you know, I'm going to be given my IP address away the next time
I logged back in, but I didn't realize at the time I wasn't thinking was it probably already
had it anyway if they caught this. But I rationalize it like, you know, these people are,
they voluntarily sent me the money, so I can't get in too much trouble, right? And so.
Yes, you can. And the worst part is it's funny because based on the federal sentencing guidelines,
well, one, of course, that should be federal. I'm assuming.
And the second thing is, is that every one of those people, you know, people will say, oh, well, that's just one person for $10.
You know, every one of those people is a victim.
Right.
And what's so funny, so you're, so you end up getting, you know, more than 25 victims, more than 50, more than 500, more than a thousand victims.
And you're like, I have a thousand victims for $10 a pop.
Like that's, that's a joke.
But if I had stolen, you know, a million dollars.
from one person that'd be one victim and you'd have you get less time really than you would
yeah because the more victims the more you're you get enhanced you get more and more points added
on to your um onto your your sentencing calculation based on the more you know oh more than 10
victims well that might be one extra level oh wait more than 25 well that's two more than 50 more
than 200 more than 500 more and you know very quick and the thing is you're sitting here thinking
i've done no damage these people you could hardly even consider them victims yeah and the funny part
was that at the time you know computer crimes were in their infancy the feds had they had stiff
computer crime laws obviously but a lot of the local jurisdictions didn't and they right so they and so
a lot of them, if this still wasn't picked up by the FBI, then it, you know, that would rely on the other jurisdictions.
So I'm like, I was thinking that, you know, I'm probably going to get away with this and, you know.
And who's technical, who locally has the, the, you know, the skill set to even track this type of a crime down?
Well, they did.
Yeah.
So, well, it gets better.
So I waited and I waited.
And the plan was going to be to wait 30 days.
And it was.
You weren't even going to check the account for 30 days?
No, no.
I didn't.
I didn't tell 28 days.
I couldn't wait another day.
And so I logged in on the 28th day.
And, you know, I was going to be.
thrilled with like 20 grand like right i couldn't believe i i i wasn't prepared for what i've
logged into how much never forget this one million seven hundred ninety five thousand
three hundred twenty three dollars and sixty nine cents so you had to know you're in trouble
yeah well it's it it's a combination of excitement and fear at the same time i'm sure you can relate
yeah it's like holy cow what what and and then my mind goes to what am i going to do with this
because you can't just withdraw what it you know and so i'm like oh my god what do i do and so now
it's there and so now my rationale is well I haven't stolen it yet because I
haven't put it in an account you know and so I'm so naive yeah so I had to
formulate a plan and how to get this money out of there and so I spent a great
deal of time researching how much money I can transfer how I can do
this and obviously this account that I had set up was not going to work because it was a
prepaid account you can't transfer a million dollars to right 1.7 million dollars to and so
it's I really I spent a great deal of time just researching and trying to figure out if
if I should you know at this point and so on so many levels I mean am I going to get caught you know
should I do this?
You know, and I wrestle with the morality of it, believe it or not, even still at that point, I'm still wrestling with the morality.
And it's a little late.
Yeah, I know, right.
These are all, you know, these are all internal discussions you should have had before the money was sitting in that account.
So I, for good three months, I'm trying to figure it because I just, you know, I miss a lot of money.
It's hard to walk away from.
at the same time it's also hard to do because the prison time the fact I'm stealing all this money
I'm you know I wrestle with all of it and so at one point I like I gave up I'm like I can't
I can't do this you know I'm going to get I'm going to go to prison for a very long time
and at the time I was married and I had told my wife
and you know she thought it was fucking crazy you know and i showed her and to this day she still
remembers that she's the x now but she remembers the amount too very vividly and it just
you know but you have to remember i had a serious addiction at this point too i mean it had
grown to the point to where it was a job every day finding painkillers and you know this
said consume my life.
So, you know, this is a dangerous thing to have for an addict, some, but they can pull money
out of the internet like that, right?
Those kind of skills.
And, you know, $1.7 million is going to go a long way.
So I have a question.
Yeah.
Did PayPal at that time, I mean, you weren't you thinking maybe an open additional account,
slowly move the money because I doubt anybody's contacted PayPal or they're even looking
into it anything for $10 like it's you know maybe slow and if you don't hit all these people
again maybe you've slipped through the through the cracks and you can slowly start removing this
money yeah there were so many ideas so many ideas I thought of that but finding accounts because
you have to, you have to create an account. You have to create an email address to assign it to. You have to attach it to a bank account. My problem was that I was too afraid to go put a bank account in my name and attach it to this. And I didn't, you know, I didn't know any criminal masterminds to help me, you know. So it was, it was all just me trying to figure this out. And listen, I got you. Here's what we're going to do. You and I would have been dangerous together.
We're getting that money.
We're not leaving that money.
Okay.
Right.
That's kind of how I felt about it.
And I kept, you know, I kept going back to it.
I would quit and then, you know, I'm like, no, no, no.
I can't leave it.
And then ultimately, I was like, you know, I just, I can't do that much time as what I decided.
And but at that point, I had queued this money up to transfer it.
And I was like, I got to a point where I'm trying to convince myself to do it, but ultimately talk myself out of it.
I walked away.
Problem was, I left that money set up to transfer.
Okay. So that was a very bad move.
To transfer where, though?
To an account, to a bank account.
at bank account the same one you opened the yeah i was just going to try a lower increment
okay um you know something that wouldn't be so obvious um so i i queued it up and all i had to do
is press submit but you know i ended up talking myself out of it and that night i had probably
sat and looked at that computer screen for a good five hours you know working doing things and
and kept going back to it.
And ultimately, I'm just like, I can't.
I just cannot do this.
And so I left it.
I walked away.
And about a month later, I get this email in the, so when you create these accounts,
you have to create a recovery email, which is a backup email in case like you lose your password or whatever.
Right.
So the account that I set up as the recovery email, I got a message that says,
your account needs to be verified or something like that and made it out like I hadn't verified that
that PayPal account. And I'm like, crap, I got to make sure that that doesn't, you know,
something doesn't have in the account or I lose access to it, so I need to go verify it.
Obviously, that was a bad idea. I logged in, and as soon as I verified it,
I got that sinking feeling, you know, and I knew that I was sort of caught.
right there and a couple days later the PayPal fraud department reaches out to me personally
which you know I wasn't attached to this this account and so they had tracked me right
right and basically laid it out they wanted proof of the services that I had provided to
you know get the the money obviously you mean for that that for the process that I work for
Google? I don't. I can't provide that. I... Right. So, obviously, I'm in trouble there. And
I get off the phone with them and I remember my mind racing and I'm like, okay, I figured out how to
do this. Surely I can figure out how to come up with some kind of BS story of how I can
provide services. And about an hour later, there was a knock on the door and it's the police. And I'm
like, oh my God. And so they had, it was a detective who had, he had instructions to call PayPal
fraud department. And I guess PayPal fraud department was intending on having them arrest me, right?
So they were, I don't know what the deal was, what there, but the thing was was there's that
jurisdictional issue, right? So locally, we didn't have any computer crime laws on the books. And so
he gets on the phone, the detective gets on the phone with PayPal, and they're talking back and forth.
And so I remember hearing him say, so he didn't actually take any money.
And I'm like, no way, you know, he's, he's actually, I'm like, holy cow.
And I can literally hear them arguing back and forth.
And they're explaining the whole situation and what, you know, what, what, what, what transpired.
Right.
And so I'm like going to charge him with.
And then he says, so he.
was thinking about stealing one point seven million dollars but he didn't and and then and then all
a sudden he goes well if he didn't take anything then no crime was committed and I'm just like
like is this real like holy cow and I'm shaking I'll never forget that feeling man like I'm like
sweating on the inside and cold on the outside like just about to pass out because I think I'm
going to jail forever and they left and I'm like holy cow and so that afternoon I get
emails that said my PayPal accounts had all been shut down and that was it that was it I never heard
from the police again and or PayPal and it just sort of went away but I'm sure they were
able to just reverse all those charges and give everybody their money
back. They did. Yeah. It was, it was essentially a refund. And I had thought about doing that, too, especially whenever, you know, I knew I was caught. I'm like, oh, I'm just going to go in there and fucking send it all back to everybody and refund it. Because I thought, well, if I could send it, you know, then they can't get me for taking money. I don't have.
Right. Or at least they would take that. Even if they, you know, you'd been charged, they're certainly going to take that into consideration saying, you know, your honor. Look, I was saying I was going to get a few thousand dollars.
$1.7 shows up, you know, I returned it immediately.
That was never my intention.
So I'm sure that they may or may not have taken that into consideration.
At the very least, the problem is in the federal system, there's something called potential fraud,
which is, you know, potentially the victims could have lost this much money.
And they'll charge you with that.
You're like, yeah, but they didn't.
Yeah, but potentially they could have.
Potentially.
You know, that's like you go into the bank and you go up to the teller.
You say, you know, give me $2,000 and she gives you $2,000.
And they go, yeah, but potentially you could have gone in the vault and gotten $2 million.
But I didn't.
Right.
You could have.
You know, that makes sense.
That's how I felt about it.
Yeah.
Right.
So what ends up happening after this?
Is your employer notified?
No.
I am.
It just sort of went away.
And, you know, for a while,
I, like, I didn't touch my computer, like, after work.
You know, I was like, I'm just going to do my job and, and, you know, forget this.
But, you know, again, I had an addiction.
And when you, when you have these skills and it's like, all that you know, it's what you come back to.
Right.
And so right about then, I had gotten an idea to start.
port scanning bulk IP addresses and so not sure how much you know about it but each
connection you know to the internet has an IP address everybody has an IP address
right and I got really interested in how your IP address correlates to your
location it's called IP Geo location and so when you're assigned an IP address
from your internet service provider you know that IP address has something to do with
where you're at. And I got interested in how that that all worked. And I started scanning
ports. Back then, we had to, if you wanted to hack a system, you had to actually get, you know,
find the IP address and then you physically scanned everything on that IP address to find open
ports. And ports are services. So if I run a web server,
from that IP address you're going to have port 80 and port 443 open you know if I
run an email server it's going to have port 25 open because it's it sends emails so
when you find open ports you know what they're doing right right and so based on
that it gives you a head start on finding the vulnerability that you can use to
get access into that that network and so
So at the same time, you know, we used lime wire and bear share and all those to share files back in the day.
Right.
And so there's this tool called NMAP.
And I still use it to this day, actually.
But you can use it to scan, find open ports, and help find the vulnerabilities because it will give you information back like what operating system they're running, what, you know, what just all kinds of details about this device.
and then you take that information and you have to find the vulnerabilities.
But I would scan the ports a lot of times,
and I would find those specific applications.
The ports were open because they were sharing files.
And now that wasn't illegal, really, because once I found they were running it,
I would focus on searching that IP address in that application,
basically take all the files that I wanted.
They're sharing them.
So, you know, that's not illegal.
But then I got the idea that at the time there was something called file transfer protocol.
We still use it today, just not very much.
It ran on port 21.
And used to, it's how people transferred files back and forth.
Nowadays, we have much easier methods.
But web servers specifically use them, like if you wanted to update your website and upload the updates.
like a new web page or something, to the web server you used FTP.
And so most web servers had an FTP server.
So I would scan for Port 21 and find all these web servers
or all these file transfer protocols servers that housed all this information.
A lot of people would store their information on these servers
and they had access them remotely from somewhere else.
and I started finding that there was information there that was worth money.
You know, I found, oh, my gosh, you could find all kinds of stuff.
You could find things like birth certificates.
You could find passports, you know, all digitally scan because this time everybody's getting scanners and they scanned everything.
Credit cards, application, social security number.
All kinds of stuff.
And so, yeah, then I start finding.
And so then it's all about getting into the.
FTP server pulling this information down.
And so at the same time, I had run back into some of the guys from the old Alt-2,600 group.
And a couple of them wanted to start their own hacktivist group.
And they, at the time, they were saying, you're saying, you're saying hacktivist.
Hactivist, yeah.
Okay.
So first I thought that's what you said.
And then I thought you said,
And I thought, no, I don't think that's what he said.
Okay.
Well, it's, it's a activist hacker.
So a hacktivist is what we call it.
So a good example of a hacktivist group is anonymous.
I'm sure you've heard of anonymous.
Okay.
So it's a group of hackers that are working towards kind of a common goal.
Supposedly.
Yeah.
So.
Okay.
And so the guys that are talking about from back in the day that created the group I was talking about, that's anonymous.
Okay.
Right. So the few guys I was talking to at the time, they wanted to create one and they were focusing on, this one person was really mad at Catholic priests. I think he had been abused when he was younger. So he was focusing on, you know, the whole that subject. And I was just sort of, I'm always there for the skills, you know, the actual action of doing this.
and so after you know messed around with that for a little while they realized that there was this other group called anonymous out there and they were specifically at the time they were just getting ready to go after Scientology and so they were they were you know planning all this and so they had met on 4chan and they were
doing all that stuff. So we started talking and I learned something called SQL Injection,
which SQL injection is where you take SQL as a, it's a programming language. And so when you
look at a website that has form fields in it where you fill out information like your name,
so that connects to a database, right? Because you're putting information into a database for
a website. Well, SQL is a database, SQL. And so the computer language using SQL,
you can take that and using SQL injection, you can use that programming language inside the
fields, the form fields. And if you do it right, you can manipulate and pull out information.
Okay.
Um, so I had, at that point, I had been, you know, pulling information and, and doing all this stuff.
And I, for whatever, I think it was my birthday, actually, that year.
And I'm like, I'm going to get a cell phone because cell phones are starting to become increasingly popular.
And, you know, everybody wants one, right?
And so I went and I.
I applied for one online and for some reason I got declined and I was not happy about it.
And it probably had something to the fact that I was an addict at that time.
Probably had depleted all my accounts and didn't have very good credit.
Right.
I'm not somebody that usually, you know, if somebody like that told me no, I stop at the no, right?
So I was looking for other ways around it.
So I get declined and I'm looking at this.
And someone from one of those groups had just taught me some of this, the SQL injection.
And I'm like, oh, I'm going to try this.
And I start playing with it.
I play with it and play with it.
And all of a sudden, I start getting information back.
And, you know, it's never a lot of information.
It's just tidbits.
But so much about what we do is about collecting information.
one of the most common misconceptions about hacking is that you do this quickly.
You know, in the movies, they're like, they sit down and you, you dig into a server and...
Swordfish.
Yeah.
Like the movie Swordfish.
Exactly.
So crazy.
And but so what it, what it's actually like is collecting little pieces of information that you save.
And eventually you, you store enough information that you can do something with it.
And so a good example is,
PII, personal identifiable information, right?
So your name, your social security number, your address, birth date, all that stuff.
So, you know, a hacker, it can take them sometimes months to pull enough information
to be able to use that stuff, you know.
And so that's what I was doing.
I'm pulling information out of the mobile phone provider database on the website.
And, but there are other means that you can use to get that kind of information once you get a little bit of it.
So if you take part of a phone number, you know, then you can go to another site.
And if you figure out somebody's like name, then you got part of their phone number.
And then you can do a search and get the rest of the phone number, you know.
Right.
And so it's, like I said, it's about piecing that information together.
So eventually I piece it enough information together that I,
I input it in this form field, and it says success, and I'm like, in order complete. I'm like,
did that just work? And like, it didn't email me. It didn't do anything like normally when you
buy a phone, you know, you get all this activation information. Nothing happened. So I was like,
oh, it looks like I did something, but I don't think I did. And so I'm like, well, all this work,
it didn't, you know, it didn't pan out like I thought.
it would two days later I get a cell phone in the mail right and I'm like oh wow okay so I've
stumbled on to something here and so I repeated it and another one comes who is the
carrier is this like AT&T oh AT&T okay and so I've repeated it several times and I
start getting them over and over problem is you know obviously
you're using other people's accounts.
So when they figure out...
Thinking those people are probably getting notified on their email saying you just got a phone,
it was mailed.
I think what happened.
I don't think they were notified by email yet.
I don't think it was that mature yet.
But I think...
So maybe something in the mail.
They get their bill and there's another account attached to it.
And they're like, what's this for?
You know, so I would get a phone and it would work.
You know, you got free service for like...
a month or two and then all of a sudden they get shut off. So either the customers figuring
around or AT&T. And so if anybody knows me and they wondered why I was switching phone numbers
like every couple months back there, I told everybody it was because of security, but that's actually
not true. Right. It was because I was getting a different phone and the others were getting
shut off. The phone number I have now is actually, this is the longest I've ever had a phone number
because of that but so yeah i mean it
it and of course again i go back to having this addiction and you you have a
you have something that's worth something to somebody
and just say did you go on to these uh these forums or and share this information
or you did you provide a service i provided a service okay yeah i got you a phone for 45 days
right well i didn't tell them how long i just
said look you know it could be active for a couple days it could be for you know months i don't
know i don't know it's going to happen this because it really you know it all depended on the
the person that you know the account right tied to so you had no idea you know um but yeah so
i did that for a while um and that eventually stopped working um but you know
Again, it was one of those situations where nothing came of it.
And I'm quite certain because of the computer crimes laws at the time.
Right.
So I'm really kind of getting away with this.
And you're becoming, I would, I would assume, I mean, just from personal experience,
every time you get away with something, you just become more and more emboldened by it.
Yeah.
So, you know, your risk, you're, you're.
aversion to risk is you know getting it's smaller and smaller so you're becoming you're taking
bigger and bigger risk because I keep getting away with it and I you know in my personal experience
I just started thinking well I'm just that good that's what it is that does feel it catches up with
you um I did I developed an attitude where I was invincible and I did not think I could be caught at all um
back to school when you can thrive
by creating a space that does it all for
you, no matter the size.
Whether you're taking over your parents' basement
or moving to campus,
IKEA has hundreds of design ideas
and affordable options to complement
any budget. After all, you're in
your small space era. It's time to
own it. Shop now at
at IKEA.ca.
And
I'm not a very boisterous
person, but I was bragging, you know.
I was, you know, here I am.
The people close to me knew me, knew that I could do a lot of this stuff.
They didn't know exactly what I was doing, but, you know, I thought I was the best there was at hacking,
not realizing there are other people out there in the world that were pretty much doing the same thing.
But, you know, so yeah, but that security flaw actually gave me an idea.
So I got it in my head that I.
I could make extra money by finding flaws in other networks and notifying the organization about it.
And so there was a certain bank that was starting to use an imaging system with their checks.
So when somebody deposited checks, they scanned the check.
So there's a picture of it.
And then they put that in a storage.
It was basically a big hard drive.
So they stored it away.
And I started doing some research on one, one, that one bank in specific.
And I would, I'd rather not go into which one that was because I don't think anybody still knows the deep, the entire details of this yet.
But yeah, so I gained, I found out that they, they stored these checks, these images on what they're called EMC.
sand storage devices and it's basically a big computer that has a huge hard drive on it and that's
all it does it just stores information and so i again you scan it you find vulnerabilities
and i realized that this device in particular it it has a database on it it's a user database that
provides the access, the permissions, and everything managed it. That database was in plain
text, which means it has a file somewhere that has all the information that you need to get
into it. I worked on that for a while, gained access to it. And I'm like, great. I've got access to all
these checks, millions of them. I mean, imagine having a check. You know, you've got their personal
information account number routing number all that stuff i i can't imagine what you would do with it i was
going to say that's another paypal event right so i'm like okay i reach out to the information
security team for that particular bank and they didn't believe me they literally denied the possibility
until i provided them you know a couple redacted checks and then of course then they got very
hostile. So I was like, I was trying to be helpful in the way that, you know,
because ultimately my plan was to get paid from this, right? Yeah. I mean, I'm trying to fix
an issue for you for 10 grand, for 20 grand. I could, I could make a hundred grand easily
just dump it on the, by going and selling it to this group of guys that I know that would, you know,
whatever, one of these credit card forums or, you know, the different forums that are out there,
these fraud forums, I can make a ton of money selling people's checking information.
Yeah.
Then you'd have a problem.
Then you'd be, you'd be begging to pay 10 or 20 grand.
Yeah.
That's, that's exactly what I thought too.
But they weren't interested.
They, so at that point, then again, you get, you know, the scenario where, uh, you get
visited by detective and everything.
And it comes down to the fact that I hadn't stolen anything.
And I'm trying to explain it to him, you know, like I'm trying to help.
And ultimately, after, you know, this one lasted much longer as far as negotiating what's going to happen.
But again, no computer crime laws in my jurisdiction there.
And, you know, the detectives were getting to know me.
for this right you know and so eventually i had to sign an india and it had a time period where i
couldn't discuss what i did and how i did it of course that was a really interesting scenario were
you eventually caught for any of these things well yeah again the police came and i mean caught
and prosecuted no no oh okay that's that's the the stupid
luck about this whole, you know, my entire career was that somehow each, each and every time
I'm caught doing this stuff, there was some little thing, you know, whether it was the
jurisdictional laws or whatever, the lack thereof, you know, they didn't charge me. And I
I hadn't taken anything in the detective's eyes.
So, you know, a detective takes it and refers it to a prosecutor.
They're like, well, he didn't steal anything.
So we, you know, we can't.
Right.
Well, especially in that, in that situation.
So how do you eventually turn this into, you know, a business?
Well, to be honest with you, I didn't.
So at that point, I realize in penetration testing,
there really is no money.
I mean, so the way, you know, the way it works with penetration testing is you get a company
that hires you that says, we want you to come and test our network and show us the vulnerabilities.
Well, by that time, they've already secured their network, and you're sort of coming in and doing
due diligence.
This isn't real, real world vulnerabilities, you know, from an actual threat.
so I mean I'm like I found that I still find that boring like you know for myself you know I know I know people that love doing it and you know I'll refer to those people all day long right but going out and finding something that's real out there you know where you have to actually go find that vulnerability that's the fun part I was always one thing that when I worked
intelligence for the intelligence agency it taught us was the gathering of information so there's
and when you hack there's several stages of what we call the attack life cycle and in the very
beginning it's gathering the information and it's called footprinting so it's you know gathering
the intelligence on your target and that was the part that i always loved and i still do um so going out
getting that information finding it to where it's useful that's that's the amazing part of it to me
it's it's exciting and so that's that's called open source intelligence i was talking about that earlier
um so that's what i started doing really um i also realize at that time that i could make more money
contracting because contractors, they work, especially when you contract for the government,
they don't pay you benefits. They don't pay you sick time or any of that stuff.
You don't get, you know, paid vacation. If you work, you get paid. If you don't, you don't.
There's no requirement, no government retirement you're paying into.
Exactly. So right then, I basically went back to contract.
contracting, and that's whenever I took the job at the NSA. It was a position that was listed
as being intelligence in intelligence, but it was ultimately a system administrator position.
This was the one that I mentioned was, you know, when basically the same time that Snowden was
working there. In fact, it was the same timing. But, and I had that,
privileged access again, you know, so I'm managing privileged accounts, which was really interesting
to me. You have an immense amount of access. And to say I didn't like look up things that I
probably shouldn't, you know, obviously I did. You know, I wanted to know who killed JFK. I want to know
there are aliens that kind of thing you know and you know there aren't but yeah no true story but
i am yeah so it i started working there and by this time i'm really really unhappy with myself
and the way i was living because you know i got this addiction that has been going on for some
time now. And the way I see it, I'm taking food from my children and I'm putting poison in my
body and I couldn't stop. I, every time I tried, you know, you go through the withdrawal and you get
sick and it's just easier to give up and go back to it than to keep fighting it. Not to mention
I was a miserable human being when I was going through withdrawal and doing that to the family
was you know it just it was easier to go back but i was at work one day and i was in a meeting
with my boss and i remember catching him look at me really funny and it struck me funny at the time
i still remember it and then afterwards he pulled me aside and asked me if i was okay and it was
became really clear right then that the addiction was really taking it's total
on me. And so, like, and I look at pictures of myself back then now, man, I looked horrible.
But were you dozing off at a meeting or what were you, or nodding out or what do they call it,
you know, when you start to. Yeah. Yeah. In fact, that's, that's what he noticed. He noticed signs
like that. And I would, man, by that time I graduated to fentanyl, you know, there was fentanyl patches that
you could get and we would cut those up and suck on them of all things which is sounds disgusting
but it did the trick right and i would there were a couple of times driving home that i fell
asleep and would wake up driving through an intersection running over a sign or something you know
just ridiculous stuff i mean it it i'm so lucky that between the hacking i didn't
didn't go to prison and the drug abuse, I didn't like kill somebody, you know, because I don't
know how that didn't happen. But so now I'm starting to get to where I'm, I need to get help. I know I need to
get help. And it didn't help that at the time, you know, my mother-in-law was also an addict and my
wife at the time had become an addict because, you know, she was around her mom and myself. And so she's
developed this, you know, addiction. And right about that time, I think I, or well, it was about the time I
finished the contract at the NSA. The agency that I've been working with basically put me on the
bench, which means that they kept me working doing other contracts back to back, just short term.
um and i i was deciding to get treatment looking it up doing some research and i'm sitting
there one night and all sudden my internet just starts fluctuating and it goes up and down
and knowing the signs of someone a hacker getting in your network it i i started doing some
you know looking in my logs and everything and so i had said
up what we call a honey pot, which was a server that lures other hackers in.
Right.
So, you know, whenever they scan my network, they look for certain ports.
And they're like, oh, I'm going to go after that, that server.
And I had set something up that was really obvious.
And so this guy, this kid, um, had got caught in my honey pot.
And he basically got mad because he.
he was trying to get root on this Linux server, which is root is the highest level of
administrator access. He's trying to basically compromise my server, and then he gets locked out.
So when he got locked out, and I had set all that up that way, he got mad. And when he got mad,
he starts flooding my network with packets of data. It's called denial of service. And it literally
does that. You can send packets of data at a certain.
connection and it overwhelms it right right that's why my internet connection was fluctuating
and so i obviously i've got his information in my logs and i go after him i'm not going to let
that slide by any means and so i figure out that he's a gamer very quickly i am one of the things
i realize is that he i scanned his IP address i find an open port
I realize he's got a certain type of router.
And so a good, just a little lesson for everybody is that when you go to your ISP and you ask them to set up a connection, they come out or they hand you the equipment and they say plug it in, right?
They set it up.
They walk away.
Your ISP does not secure that network equipment.
Okay.
so I probably better not name the one I use but it's one of the biggest in the United States
and they still do this to this day if you hire them they'll come out plug it up and it's ready
to go it works great but that means that anybody that can connect to your can fit your router or
your firewall they can see what model it is and if they can see what model it is by the login
page, which is what I did. I connected to him. There was a certain port open on his IP address,
and I could see the login page to his router. So I get there. It's got, you know, username
password, and then it says what brand it was and what model. So I go to Google and I look up
the branded model of that, knowing that ISPs never secure their equipment. And in the manual,
it has the default username and password. So I tried it. Log work.
right on in. So now I've got control of his network. I can literally create access for myself
strictly into his network or anybody else if I wanted to. So I did, you know, and I taught him a lesson.
Problem was he was the son of a mayor of some town in Pennsylvania. And that mayor got pretty
angry with what I did.
And so now
this gets reported.
So his son
doesn't explain that he had started
the process of...
Well, I told them, obviously.
So I get visited again
by a detective
again. And
I explained the situation to
them and like, you know,
I was just retaliating. He connected
to me and I even showed them how.
You know, like this is
this is what he did this is evidence he did this to me first you can see it in the logs the
time stands they didn't care obviously and but he's what he does have is he's got computer
crime laws on the books and he's got me dead to rights he's got evidence showing me he's
showing me printouts everything i did and right i'm starting to get scared
again. I'm starting to get that feeling, the sweating on the inside, the cold, wanting to pass out, thinking about jail time. And then, you know, I'm like, my God, I was just, I'm at the same time, I'm like, I need to quit, you know, I need to clean my life up and I need to stop doing all this. And, you know, that was a very profound moment. But at the same time, I don't.
know what made me think of it but i was like well how do you know it was me and he's like what
do you mean you just said of it i said yeah but you can't prove in court that that was me anybody
could have used my connection and and he so but i basically told him just now because i'm showing him
everything right but i didn't really say i actually connected and so i'm like you know anybody could
connect to my Wi-Fi and do this. You don't know that it was me. Obviously, he knows it's me. I know
he knows it's me, but he can't prove that in court. So again, I'm sort of skating that line of
getting caught, you know, but now I had to be really careful because I'm, you know,
this one is very close.
There's a good possibility that he could make a jury believe that I did this fair because I did.
And so they filed the charges.
And so now, now I'm scared.
And I'm starting to be convinced that I can't beat this.
And I've got to do something.
And so at the same time, I'm like, you know, I got to do something about the addiction, if not for me, just for my kids, you know, because still I feel like I'm spending all this money on painkillers that I should be spinning on my children.
And they're starting to get to an age where, you know, they're going to realize what's going on pretty soon.
right and it just um it you know so ultimately the charges were dropped basically because they
couldn't prove that it was me that did it um but that that was enough the scare was enough
for me to step away from the hacking and i realized you know i'm you know this stuff's
really, it was sort of fueling the addiction and the addiction was fueling the hacking at the same
time. And I, you know, so I remember that day really well because I had a few hurdles to overcome.
I mean, I was working contracting work. So again, I had no benefits. So getting treatment was going
to be hard because, you know, no insurance. And I couldn't take time off and go to like an
inpatient treatment place because I had to work. I had to pay bills. And at the same time,
while I was an addict, I had got myself banned from a couple of the medical facilities in that
area because when, you know, pain pill addicts, they go to the doctor a lot or go to the ER,
to try to get stuff often, right?
Right.
And one of the things about that is you sit in those rooms for a long period of time, and it's maddening.
For a limited time at McDonald's, enjoy the tasty breakfast trio.
Your choice of chicken or sausage McMuffin or McGrittles with a hash brown and a small iced coffee for five bucks plus tax.
Available until 11 a.m. at participating McDonald's restaurants.
Price excludes flavored iced coffee and delivery.
Well, you ever been to an ER, you get my...
one of those rooms. There's always a computer on the side of the wall. So I took it upon myself
to, you know, move myself up in the queue a few times. And then I got caught doing that. So I got
banned from a couple of facilities because I had manipulated myself my place in line to get, you know,
it's not have to wait very long. And so again, you know, I'm messing with things I shouldn't be.
And so I had that problem, no insurance.
I couldn't take time off.
Some of those facilities wouldn't allow me to even walk in the front door because I had, you know, basically got myself trespassed from the property.
But, yeah, it just ultimately, I found, I got online, I believe is what I ended up doing because I didn't have any other choice.
And I reached out to a group.
at that point in time
we were
my wife and I were consuming enough
oxycontin and Xanax to kill
a small elephant every day
and
there shoot there are even things
to this day I don't remember from that time
because of that those are two
things you just don't mix
but I found a group
that invited me to a meeting
narcotics Anonymous
and my
intentions were to go and check it out and then by myself and then come back. And then if I liked it,
I was going to tell my wife. And I went. I came back that night and I was going to tell her
and she was gone and didn't come back to like 3 a.m. And I found that really suspicious. But
keep in mind that I spent a lot of my nights hacking. So for the previous several years or the whole
time we were married, I rarely went to bed with her because I was on the computer, right? I was
hacking. Right. And that she wasn't happy with that. So eventually, obviously she started going
out with her friends and, you know, long story short, she was cheating that night. And you, you,
You know, I've got a broad skill set, and I started checking cell phone records and things like that and figured it out.
And so I never told her that I went to the meeting.
I went back the next week to that meeting, and, you know, basically they assigned me a sponsor, and I started, you know, the painstaking road of getting clean, and I basically confided in them.
And that person told me, basically, I had to cut myself off from all these people that, you know, in my life, that I influenced the use of pills, right?
And even the hacking, because the hacking was an addiction also.
And so at that point, I'm trying to figure out how to do that.
well my wife at the time had a problem of shoplifting and i hated it even though it benefited us
at times you know with the addiction um it drove me nuts because you couldn't go anywhere with her
everywhere she went she had to steal something it drove me crazy and so she got caught right about
then and got arrested and went to jail and so that was my my aha moment i've got
opportunity here i can quit i can quit pills i can quit hacking and quit breaking the law and
you know i can clean my life up for both me and my children and the way i looked at it was like you know
i've got this these skills and i've got this education that i can you know i can get a job making
really good money and so i did i started the the process of getting clean at that point
And, you know, I ended up getting custody of my kids not long after that because they wanted to be in an environment where, you know, obviously where somebody wasn't using drugs and and all that stuff.
Yeah, it just, it started snowballing from there.
So when did you leave the NSA?
I had already at that point.
I got really bored there.
The NSA, at least the job that I had, it was, so it was a system administrator job, and it was something that was created for somebody probably decades before that.
So all the duties that we had, the thing, that your job responsibilities were, were,
were written 10 years prior to me working there, all the things that we had to do could be
automated at this point. And so being someone who is always looking for a better way or a
different way, you know, outside the box thinking, I scripted things and I automated it. So
the manual processes that they used to do we had I had shortcuts for so it created a great deal
of free time for me which was detrimental because I'm a hacker right I'm somebody that's
got to be learning all the time and though it was great for that because I could get online
and I could learn new stuff I've also you know I'm starting to stop the hacking because
you know i i needed to and so i i couldn't do that i couldn't do it at work because if i'd
done it at work i'd have been arrested at that point but um yeah so there's i got bored long and
short of it i got really bored and that that's what took snowdon down actually but you know
it it's he was doing word searches on the network he called
them dirty word searches so part of your system administrators job is to um you know you know we look
for files that aren't supposed to be there on the network or whatnot and i can't tell you how many
people i found with porn on their laptops or you know things that weren't supposed to be there
and so he claims that he was doing dirty word searches on the network and he found these programs
that um that were intrusive on the privacy of the average citizen
which is somewhat true, but I would argue what were you doing looking through the network
in the first place?
I mean, he had privileged access like I did.
And when you do that, you're managing the people with the most amount of access, but just
because you're managing their access doesn't give you the right to go digging through
everything that's on the network.
And that's pretty much what he did, you know?
So, yeah.
So he got bored.
I got bored.
That's why I left.
And at that point, I was working.
I had got a contract job with just a regular company.
It was a telecommunications company at that point and was just doing my thing and living the way I should.
I got clean, got custody of my kids, and started growing as a human, you know, finally.
So, okay.
And that it, so what are you doing now?
Right now?
Yeah, for work.
I mean, I actually can't talk about what I do right now.
I can't in a few years.
I'll leave it at that.
I've written a book most recently on AI and cybersecurity.
AI is both scary and exciting at the same time.
A lot of people don't use or realize how much we use AI every day, just in the things, you know, you got Siri on your, your iPhone.
You use it in your navigation with, you know, your maps on your phone or in your car.
It's in medical devices at the hospital.
It's in your manufacturing.
We use AI so much already, and people don't really realize it.
It's exciting in that aspect, but it's also dangerous because depending on what data set that you pointed at, so when I say that, I mean like, so it pulls, for instance, chat GPT, if you get on chat GPT and you look something up using chat GPT, it's pulling information from the internet.
And as you well know, you don't, you don't have, you could put anything on the internet.
That doesn't mean it's true, right?
So the data set is the internet as far as chat GPT is concerned.
And it does very little data validation whenever it's pulling the information.
So it could, if you asked it who won the last election, it may or may not tell you who actually won the last election.
Maybe because somebody had said they want it, you know, it can pull that information.
So there's, you know, so it's dangerous in that aspect.
And there's a lot greater concerns as far as that goes.
That's just an example.
But yeah, it's, it's really interesting.
But it's also at the same time not going to cause the apocalypse, you know, it's that we call that artificial.
general intelligence, which is AI would become like a human being, you know, knowledgeable.
And it can't do that. It's not going to do that. That'll never happen.
It's not going to turn into sky net. No, no. If that happened, okay, if something like that happened,
it was programmed to do so and therefore not AI, right? Somebody programmed it to do so.
But yeah, it can't develop emotions and decide
that human beings are its enemy because it doesn't know what a human being is.
And, you know, it just, I could get in, go so far into the computer programming.
But if anybody's ever written like a basic computer programming class or basic program
and like a programming class in college, they would understand why AI can't do that.
You have to tell a computer everything you want it to do.
And so for it to be able to accumulate enough knowledge to decide to, you know, do something to humans, it's just ridiculous.
So why did you write this book?
Well, for one, AI, there's, it's a powerful tool.
And you can use it for hacking.
So it's starting to be used in that fashion.
And if you've noticed in the news, there's this thing called vishing that they use, much like fishing, which is what the emails, like bulk emails that are sent out, like what I did to the PayPal users, right?
So, vishing is voice fishing using AI.
And AI will, you can have it mimic your voice.
So an attacker will call you.
and as soon as you say hello, they get a sample of your voice, and then they'll, they can actually
infiltrate your phone, they can call your contacts, and pretend it's you, you know, like you've been
on a car accident or something, and that you need money right away, they'll have you send it to
them. And they mostly prey on, you know, elderly because they're the most susceptible to that now.
But, yeah, it's a very dangerous tool.
So in cybersecurity, there are things that we can do to help mitigate those risks.
And that's basically what the book is about.
Okay.
Yeah, I had a guy on the podcast like a month or two ago,
and we were talking about exactly that.
How using AI, they're able to take these old scams that.
You know, these old Facebook scams where they, they text you on Messenger and say,
Oh, gosh, you know, Jennifer, I'm in, you know, whatever.
I'm currently in Budapest and we lost our passport and we need $500, you know,
sent immediately.
I'll give it back as soon as we get back to the States.
And, you know, can you Western Union it or can you, you know, whatever the case may be,
you know, Venmo or whatever.
And so, you know, you think it, you know, if you're, you know, if you're,
you're 70 years old and you think it's your friend you know Jennifer you send it but you know
but then it was questionable you know it's questionable because I don't remember she was going there
or I haven't spoken with this person in six months why would they contact me but now if now you know
Jennifer calls you or you know whatever teresa or whatever name is now she can actually same same
scenario but she calls you on the phone you know and it's like and you recognize her voice
immediately and she's asking for money and she's in trouble
and I don't have anybody's contacts.
I just happened to have you on Messenger and I was able to dial.
You're the only person that answered and I'm in a real bind.
And for you, it's 300 bucks or 500 bucks.
And that's not a big deal here.
But if you're living in Nigeria, that's a ton of money.
Yep.
You know, and you only have to get a couple of people a week.
If you can get one or two a day, it's even better.
You get two or three of those people a week.
You're living like a multi-millionaire.
right so you know for us it's not that huge of a deal but for them it's it's a lot yeah um so okay so
what how long ago so when did you come up with it when did you release the book um it's actually
not released yet we're getting we're working on the release date at the moment um what's the name
of it um so it's safeguarding AI um and in the cybersecurity world um it's
I want to say March April I ran into just one issue with releasing because I mentioned a certain software in it and had to get their approval but yeah that was otherwise it would have been out by now is there a publisher did you self publish or Elsevier yeah is the publisher yeah
okay well is there anything else you feel like you want to go over uh we're getting ready to
i'm looking at the plan is to um start a podcast basically what i call it a podcast but it's actually
a YouTube channel.
It's a podcast.
It's,
I had,
in the last few years,
I volunteered with the Innocent Lives Foundation on human trafficking.
So those open source intelligence skills that I mentioned,
we used,
that we used an intelligence work.
It's,
it's very useful in the investigation of human trafficking and missing persons.
And so I did some work with the Innocent Lives Foundation in the past.
And we're looking at,
launching a YouTube channel to both highlight the need for human trafficking investigations
and also share tools on how you can do that.
There are tons of cyber sleuths out there who get involved in that sort of thing.
And so that's one of the things that we're doing with the YouTube channel.
But yeah, and then as well, there's going to be a section on there.
for hacking tools and everything, showing people how to use them.
Yeah, you should talk to, I think I mentioned this, Brett Johnson.
Did you ever look him up?
I did, yeah, I hadn't heard of him, but yeah, that was interesting.
I hadn't heard of him specifically.
I heard of the godfather, was it godfather of cybercrime, I believe.
Right.
Yeah, I had heard of that.
I had actually gone to, there's all kinds of conferences,
cybersecurity conferences all over the United States.
And some years back, I had went to one in Las Vegas,
and I met a guy named Kevin Mittnick.
He was, you probably heard of him.
Yeah, of course.
Good guy just passed away a few months ago.
But I remember the godfather of cyber crime.
and I think that's what he went by back then because Kevin talked about him.
So I hadn't actually, I didn't know who he was until you mentioned his name.
Yeah, he's got a podcast.
I'm sure he'd be very interested in talking with you.
Yeah.
I was actually on hit.
He just started it again because he had started a podcast and it was doing well.
And then he was interviewing a woman who had run an escort service, an online escort service.
and he was as he's talking to her and they're talking about her story he started going through you know he pulled up on the screen the um the different sites and he's going through it not realizing a naked pick naked pictures were on the side so the algorithm like it released maybe four hours later the algorithm caught it and realized like oh no removed took the entire channel down oh didn't take the video down didn't give him a warning just boom your chance
channel's done. And, you know, which was really not what they should have done. They should
have just taken the video down. He clearly, anybody who had watched the video, knew that he had
no idea. He wasn't even paying attention, didn't realize it was there. But regardless, so he
had to restart his channel months and months later, and he just started again. I was actually just
did an interview with him, gosh, a couple days ago. I don't even think he's, he hasn't even put
it up yet, but I'm sure he'd be interested in talking with it.
Yeah, I'll write his thing down again.
Yeah, I'll, I'll shoot you his contact information too.
Yeah, thank you.
Sure.
Yeah.
But, hey, are you, we're good?
You want to wrap this up?
Yeah.
All right, well, listen, I appreciate you coming on and talking to me.
Yeah, thanks for having me.
I appreciate it.
Yeah, I will, I'll put your, the link to your book.
in the description and the YouTube you know if you you know if you start you know if you
when you start the YouTube channel or you get the link for the book or whatever I'll put
the all of those okay in the in the description box okay yeah I can I can go I can
give you the YouTube channel I don't have the link for the book just yet it's
going to be a couple months but yeah I just got to get to work that's what we're
doing now is between the interviews you know that they're starting to
set up, which I just after, after you called me, I started getting more, you know, request.
But finding time to do, I got to, I still have the day job that I can't mention, of course.
And then the, you know, between the interviews and trying to film content for the YouTube channel,
I got to find time to do that.
But yeah.
Hey, you guys.
I really appreciate you watching.
I hope you enjoyed the interview.
do me a favor if you liked it please share the video please subscribe to the channel if you haven't
already hit the bell so you get notified of videos like this check the description box for the
books and the youtube channel that we were just talking about really appreciate it also please
consider joining my patreon it's ten dollars a month and it really does help and i do appreciate it
thank you very much see you