Kevin Poulsen, aka Dark Dante, and his hacking activities on ARPANET’s networks

by | May 30, 2022 | Hacking Stories

Premium Content

Patreon

Subscribe to Patreon to watch this episode.

Reading Time: 8 Minutes

Introduction

Kevin Poulsen, aka Dark Dante, hacked ARPANET’s network, dig deep into the giant switching networks of Pacific Bell, exploring and exploiting every element he could on his way. From the common systems responsible for the telephone services to the shadow systems that guard of national security.

 

kevin poulsen wired arpanet hacker dark dante

Kevin Poulsen – Wired

 

 

Early life

Kevin Lee Poulsen was born in Pasadena, a suburb of North Hollywood, in California, on November 30, 1965.

He was described by his friends as a shy kid with great potential. Kevin had little contact with his adoptive father and stepmother. They were in their late 40s, with no experience in networks or computers, and Kevin was interested in things that were completely beyond them as they were a farming couple.

On his sixteenth birthday, they bought him his first-ever computer, a TRS-80, but they knew nothing about what he was doing with it.

Just like any gifted kid of his generation, at the age of 13, Kevin was looking for human interaction through the telephone. On the jammed phone-chat lines of the late 70s, he met Sean Randol, a teenage girl with whom their interests aligned. They spoke about their favorite books, and other mutual interests they had as they were the same age, and eventually met in person.

Over the years they would talk for hours on the phone, and met at phone-chat parties with others (yes it was a thing in the 70s).

A lot of chatters were serious “phone phreaks”, who were hacking the telephone lines to chat for free.

 

First steps into hacking

The school wasn’t nearly exciting for Kevin, he didn’t like going, so he decided changed schools. He went to the Valley Alternative Magnet in Van Nuys, where they encouraged kids to make their “own decisions” and he often choose to spend his school days playing video games.

The year is 1983, and Kevin, whose hacker alias was “Dark Dante”, had been already hacking, and phone-phreaking for a couple of years with his internet friends.

Kevin met Ronald Austin at a phone-chat party and they went on to spend time together. Austin was two years older than Kevin, living in Santa Monica and he was far better educated as he had just finished his first quarter as a physics major at UCLA.

Austin was new to the scene of hacking and phone-phreaking. He followed the steps of Kevin and in a couple of months, he was hacking by himself.

 

Hacking ARPANET’s network

The two of them were equipped with modems and cheap computers and went on to penetrate the ARPANET’s networks for fun. ARPANET, was a computer network that linked universities with computers across the country by telephone lines, and it was funded by Pentagon.

In the summer of 1983, Kevin was 17, and Austin was 19. They became obsessed with computer dogfights on ARPANET and they soon began breaking-in networks. In August, the two friends breached several computers on many networks around the country.

Computers were breached at the Stanford Research Institute, a Bay Area think tank that works on classified military projects. There were also multiple break-ins at two East Coast defense contractors plants, two California research firms, the Naval Research Laboratory in Washington, D.C., and several Universities.

 

First Arrest

On the morning of September 22, 1983, the FBI, investigators from the district attorney’s office, and UCLA campus cops pulled up on 2nd Street in Santa Monica, their suspect? A six-foot-tall white male.

The six-foot-tall white male was Austin, he was thrown in jail and charged with 14 counts of “malicious access to networks”. He was convicted on several counts and servers less than two months in custody.

At the same time, Kevin’s house in North Hollywood was swarmed by a fleet of cops and investigators. Kevin was lucky because he was a juvenile, and he was never brought up on criminal charges.

 

kevin poulsen wired arpanet hacker dark dante

Kevin Poulsen first arrest, mugshot.

 

 

New Chapter

After the hacking incidents, The Stanford Research Institute hired Kevin to teach their military officials how to secure their networks with a hefty yearly salary. He served in the department where it was responsible for security codes that protect communications between RSI and the military. He went from an underground hacker to a government hacker, where he could hack and receive a paycheck for his efforts.

 

Short-lived government hacker dream

Kevin was living his dream as he was paying to hack but all fell apart in early 1988. Due to an unpaid rent bill for a storage facility nearby, the owner of the facility entered the locker and soon call the police. The detective found locksmith tools, false ID blanks, and birth certificates and went on to compile a detailed inventory. There were several boxed of gadgets and gizmos, phone company manuals, tools, lock picks, etc.

As they were compiling the inventory, the detectives found pictures of a young man trying to pick the lock of a telephone company trailer, the man in the photos was Kevin.

In February 1988, Kevin was called for interrogation at the Menlo Park police station. The detective let Kevin know about the issued warrant on his name, which included: driving without a license, birth certificates, social security numbers, and addresses that were found in the storage facility.

Kevin said that the stuff found there was “free” to collect from the trash bins, a technique known as “dumpster diving”, where hackers in the 80s and 90s would search the trash bins outside of major corporations to find potentially valuable information.

As the interrogation went on, Kevin seemed to have answers for every question, It was not illegal to do “dumpster diving” so he thought he was covered until the detective brought up the 1983 case when Austin was arrested and Kevin was not charged.

Kevin insisted that he wasn’t continuing those activities anymore and that his computer was only using it for fun and not for computer crimes, leaving Kevin free to live.

FBI agents determined that the acts he was involved in had escalated as they continued their investigation and found evidence that he had penetrated US government computers, and transferred the passwords of that computers to others.

Investigators found that over the last year, someone matching his description had illegally entered several northern California telephone facilities using a false ID.

Kevin, once inside one of the Pacific bell offices (telephone company), he found telephone numbers he could use to get inside the phone company’s computer system.

He also stole the equipment found in the storage facility, which included manuals, switching equipment, etc.

See Also: So you want to be a hacker?
Complete Offensive Security and Ethical Hacking Course

 

Unsolved Mysteries

On Oct. 10, 1990, the NBC show aired an episode of the show called “Unsolved Mysteries”.

The episode was about Kevin’s criminal activities, the attacks on the Pacific Bell telephone lines, stealing military secrets, and even posing him as a national threat. They also included photos of Kevin as he was on the top wanted list of the FBI.

The episode ended with a photo of Kevin and the host giving information provided by the FBI for his whereabouts. The host reported that Kevin was allegedly living in the Los Angeles area and driving a late 70s white van.

Kevin was already hiding for 17 months, he narrowly escaped one time when he was picked up for a minor case and released without checking for federal warrants.

Kevin’s raids on government and Pacific Bell computers were part of his continuing search for identity, the dark side of “Dark Dante”. His dark side left him with only one choice, to run and hide from the FBI.

 

 

kevin poulsen wired arpanet hacker dark dante

Kevin Poulsen, as shown in the NBC series “Unsolved Mysteries”.

 

 

Hacking indictments, charges, jail time

After year-long hiding from the FBI, Kevin run out of luck. The FBI got a tip that he had been seen at the Hughes market in a neighborhood in LA. The FBI agents dropped some photos of Poulsen for employees of the market and were ready to catch him.

On April 10, 1991, the manager of the market saw a man with punk blond hair (Kevin dyed his hair to change his appearance) that seemed to be the guy that the FBI was looking for, but Kevin left by the time that the FBI agents arrived.

A couple of days later Kevin visited the market again, but this time the security guards with the employees weren’t going to leave anything to chance, couple of clerks grabbed him and wrestled him to the ground until the FBI arrived and arrested him.

The fun was coming to an end. The friendships he had formed during his hacking days were falling apart. Four former hackers agreed to testify against Kevin in return for reduced sentences.

After a two-year investigation, On the 21 of April 1993, the jury of Los Angeles delivered a 19-court indictment. The charges were for conspiracy, computer fraud, wiretapping, embezzlement, and theft of public property and records.

The San Jose federal grand jury returned a sealed indictment against Kevin for penetrating military and phone company computer systems in November 1989.

The San Jose indictment began by highlighting the tools used by Kevin and his alleged co-conspirators. Then, they highlighted the burglaries when Kevin broke into a Contra Costa County Pacific bell office in November 1986, and in February 1987, when he struck a larger target, the Pacific Bell’s main office when he stole company ID badges.

Then, a more serious accusation for Kevin was made as he was charged for hacking Pacific Bell computers in September 1987, as he obtained unpublished telephone numbers for the Soviet Consulate in San Francisco. He also found access codes for the US Army, investigations for exiled leaders by the FBI, and plans relating to a secret Army exercise.

Kevin could face up to a maximum of 100 years in prison and fines of nearly 5 million US dollars.

In June 1994, as he was already held without bail at Alameda County’s Jail, spending more than two years in custody, Kevin pleaded guilty to seven counts of conspiracy, fraud, and intercepting wire communications.

In April 1995, four years after his arrest, he was sentenced to 51 months in federal prison and fined 56 thousand US dollars. It was the longest sentence ever given to a hacker at the time.

He was released in July 1996, and he was ordered not to use a computer or the Internet for the next three years.

 

Life after Dark Dante

After his release, Kevin reinvented himself and stayed away from the “Dark Dante’s” illegal past.

In the early 2000s, he became a successful journalist, covering security and hacking news.

In 2005, he joined Wired as a senior editor and hosted his blog, “Threat Level”. In 2006, he released information detailing his successful search for registered sex offenders using Myspace to solicit sex from children. The FBI managed to identify 750 registered people with Myspace profiles and arrest one.

On 15 May 2013, Kevin launched the first-ever instance of a platform named SecureDrop, which was designed by him, Aaron Swartz, and James Dolan. SecureDrop is an open-source software platform for secure communication between journalists and sources.

 

Last words

Born in a time when hacking was an innocent act of youth when the laws were as unclear as to the boundaries of the ARPANET, Kevin had outlived his era.

He started with a TRS-80 computer, armed only with his curiosity and skill, he managed to shake up the world and expose the leaky security of the ARPANET network. Through his actions, the security of those networks was improved dramatically over the next years and paved the way for future network security.

Kevin is one of many hackers who reinvented themselves and help the cyber security space to become more robust with his skills, vision, and pragmatic approach to secure communication.

 

We hope that this write up has taught you something new. If you enjoyed it, the best way that you can support us is to share it! If you’d like to hear more about us, you can find us on LinkedInTwitterYouTube.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Merch

Recent Articles

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This