LLMpediaThe first transparent, open encyclopedia generated by LLMs

Kevin Poulsen

Generated by GPT-5-mini
Note: This article was automatically generated by a large language model (LLM) from purely parametric knowledge (no retrieval). It may contain inaccuracies or hallucinations. This encyclopedia is part of a research project currently under review.
Article Genealogy
Parent: Cult of the Dead Cow Hop 4
Expansion Funnel Raw 56 → Dedup 0 → NER 0 → Enqueued 0
1. Extracted56
2. After dedup0 (None)
3. After NER0 ()
4. Enqueued0 ()
Kevin Poulsen
Kevin Poulsen
Klpoulsen · CC BY-SA 3.0 · source
NameKevin Poulsen
Birth date1965
Birth placePasadena, California
OccupationJournalist, former hacker
Alma materCalifornia State Polytechnic University, Pomona
Known for1990s computer intrusion, black hat hacking, journalism at Wired and The Daily Beast

Kevin Poulsen

Kevin Poulsen is an American former black hat hacker turned investigative journalist known for a 1990s high-profile telephone system takeover and later reporting on cybersecurity and criminal investigations. He moved from illicit computer intrusions to work for major media outlets and digital security projects, contributing to public understanding of cybercrime, privacy, and law enforcement responses. His career spans intersections with law enforcement, technology companies, and journalistic institutions.

Early life and education

Born in Pasadena, California, Poulsen grew up in a Southern California environment influenced by California State Polytechnic University, Pomona attendance and local technology culture. He studied electronics and computing, engaging with early personal computing scenes tied to nodes of Usenet, Bulletin board system, and regional hacker communities. His formative years overlapped with contemporaneous developments involving Apple Inc., Commodore, IBM PC, and hobbyist publications such as 2600: The Hacker Quarterly and Wired (magazine).

Hacking career and notoriety

During the late 1980s and early 1990s Poulsen became prominent within the underground computer intrusion milieu associated with groups that intersected with figures from Cult of the Dead Cow, L0pht Heavy Industries, and echoing tensions involving Electronic Frontier Foundation debates. He achieved national notoriety when he compromised systems tied to Los Angeles radio station contests and federal investigations, manipulating telephone systems and exploiting vulnerabilities in telephony infrastructure such as systems influenced by Bell Laboratories research. His activities drew attention from media outlets including The New York Times, Los Angeles Times, and Newsweek, and provoked responses from federal agencies including the Federal Bureau of Investigation and legal actors in United States District Court jurisdictions.

Poulsen’s intrusions precipitated a multiagency investigation culminating in criminal charges under statutes enforced by the United States Department of Justice and prosecuted by U.S. Attorneys. He pled guilty to computer fraud and related offenses, resulting in sentencing that included imprisonment, fines, and asset forfeiture, processed through Federal Bureau of Prisons facilities. His case intersected with broader legal debates addressed by scholars at institutions such as Harvard University, Stanford University, and University of California, Berkeley about statutory responses to digital crime and sentencing practices in the 1990s. Post-conviction, he engaged with supervised release and compliance frameworks overseen by probation offices in the United States District Court for the Central District of California and related federal circuits.

Journalism career and later work

Following his release, Poulsen transitioned into journalism and research, joining editorial staffs and investigative teams at outlets like Wired (magazine), The Daily Beast, and contributing to projects with organizations such as ProPublica and Motherboard (Vice)-affiliated writers. He specialized in investigative reporting on cybercrime, data breaches, and law enforcement techniques, collaborating with reporters and technologists connected to The New Yorker, The Washington Post, and The Atlantic. His work involved partnerships with teams at National Public Radio, ABC News, and think tanks including the Brookings Institution and Center for Strategic and International Studies on cybersecurity policy. He also participated in conferences alongside speakers from DEF CON, Black Hat (conference), and academic workshops at Massachusetts Institute of Technology and Carnegie Mellon University.

Notable investigations and publications

As a journalist and researcher Poulsen authored investigations exposing data broker practices, police surveillance methods, and archive recoveries. His reporting uncovered datasets linked to entities such as Experian, Equifax, and LexisNexis-sourced holdings, and examined law enforcement use of tools supplied by firms like Palantir Technologies and Harris Corporation. He wrote in-depth pieces on high-profile incidents including breaches affecting Yahoo!, Sony Pictures Entertainment, and operations involving organized cybercriminal marketplaces referenced alongside Silk Road coverage. His publications appeared in compilations and longform formats alongside contributors from Slate, BuzzFeed News, and The Guardian, and his investigative techniques combined open-source intelligence traditions traced to Bellingcat methodologies and forensic examinations conducted with academic partners at University College London and Oxford University. He has been cited in policy discussions before committees such as the United States Senate Committee on the Judiciary and panels convened by the Department of Homeland Security.

Category:American journalists Category:Computer security experts Category:People from Pasadena, California