Max Butler
   HOME

TheInfoList



OR:

Max Ray Vision (formerly Max Ray Butler, alias Iceman) is a former computer security consultant and hacker who served a 13-year prison sentence, the longest sentence ever given at the time for hacking charges in the United States. He was convicted of two counts of wire fraud, including stealing nearly 2 million credit card numbers and running up about $86 million in fraudulent charges.


Early life

Butler was born on July 10, 1972, and grew up in
Meridian, Idaho Meridian is a city located in Ada County in the U.S. state of Idaho. As of the 2020 census, the population of Meridian was 117,635, making it the second largest city in Idaho after Boise. Meridian is considered the state's fastest-growing city ...
with a younger sibling; his parents divorced when he was 14. His father was a
Vietnam War The Vietnam War (also known by other names) was a conflict in Vietnam, Laos, and Cambodia from 1 November 1955 to the fall of Saigon on 30 April 1975. It was the second of the Indochina Wars and was officially fought between North Vietnam a ...
veteran and computer store owner who married a daughter of Ukrainian immigrants. As a teenager, Max Butler became interested in bulletin board systems and hacking. After a parent reported a theft of chemicals from a lab room at Meridian High School, Butler pleaded guilty to malicious injury to property, first-degree burglary, and grand theft. Butler ultimately received probation for his crimes. He was sent to live with his father and he transferred to Bishop Kelly High School.


First offense

Butler attended
Boise State University Boise State University (BSU) is a Public university, public research university in Boise, Idaho. Founded in 1932 by the Episcopal Church (United States), Episcopal Church, it became an independent junior college in 1934 and has been awarding ...
for a year. In 1991, Butler was convicted of assault during his freshman year of college. His appeal was unsuccessful on procedural grounds, as a judge ruled that Butler's defense attorney did not raise the issue in an earlier appeal. The Idaho State Penitentiary paroled Butler on 26 April 1995.


Professional and personal life

Butler moved with his father near
Seattle Seattle ( ) is a seaport city on the West Coast of the United States. It is the seat of King County, Washington. With a 2020 population of 737,015, it is the largest city in both the state of Washington and the Pacific Northwest regio ...
and worked in part-time technical support positions in various companies. He discovered
Internet Relay Chat Internet Relay Chat (IRC) is a text-based chat system for instant messaging. IRC is designed for group communication in discussion forums, called '' channels'', but also allows one-on-one communication via private messages as well as chat an ...
and frequently downloaded
warez Warez is a common computing and broader cultural term referring to pirated software (i.e. illegally copied, often after deactivation of anti-piracy measures) that is distributed via the Internet. Warez is used most commonly as a noun, a plural ...
, or illegally downloaded software or media. After an
Internet service provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privat ...
in
Littleton, Colorado Littleton is a home rule municipality city located in Arapahoe, Douglas, and Jefferson counties, Colorado, United States. Littleton is the county seat of Arapahoe County and is a part of the Denver–Aurora–Lakewood, CO Metropolitan Stati ...
traced Butler's uploads of warez to an unprotected
file transfer protocol The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and dat ...
server –the uploads were consuming excessive
bandwidth Bandwidth commonly refers to: * Bandwidth (signal processing) or ''analog bandwidth'', ''frequency bandwidth'', or ''radio bandwidth'', a measure of the width of a frequency range * Bandwidth (computing), the rate of data transfer, bit rate or thr ...
–to the CompuServe corporate offices in
Bellevue, Washington Bellevue ( ) is a city in the Eastside region of King County, Washington, United States, located across Lake Washington from Seattle. It is the third-largest city in the Seattle metropolitan area and has variously been characterized as ...
, CompuServe fired Butler. After moving to Half Moon Bay, California, he changed his last name to Vision and lived in a rented mansion "Hungry Manor" with a group of other computer enthusiasts. Butler became a
system administrator A system administrator, or sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as servers. The system administrator seeks to en ...
at computer gaming start-up MPath Interactive. The
Software Publishers Association The Software and Information Industry Association (SIIA) is a trade association dedicated to the entertainment, consumer and business software industries. Established in 1984 as the Software Publishers Association (SPA), the SIIA took its new na ...
filed a $300,000 lawsuit against Butler for engaging in unauthorized distribution of software from CompuServe's office and later settled the case for $3,500 and free computer consulting. After marrying Kimi Winters, he moved to
Berkeley, California Berkeley ( ) is a city on the eastern shore of San Francisco Bay in northern Alameda County, California, United States. It is named after the 18th-century Irish bishop and philosopher George Berkeley. It borders the cities of Oakland and E ...
, and worked as a freelance pentester and security consultant. During this time, he developed 'an online community resource called the "advanced reference archive of current heuristics for network intrusion detection systems," or arachNIDS.'


FBI investigation, guilty plea, and sentencing

In the spring of 1998, Butler installed a
backdoor A back door is a door in the rear of a building. Back door may also refer to: Arts and media * Back Door (jazz trio), a British group * Porta dos Fundos (literally “Back Door” in Portuguese) Brazilian comedy YouTube channel. * Works so titl ...
onto American federal government websites while trying to fix a security hole in the
BIND BIND () is a suite of software for interacting with the Domain Name System (DNS). Its most prominent component, named (pronounced ''name-dee'': , short for ''name daemon''), performs both of the main DNS server roles, acting as an authoritative ...
server
daemon Daimon or Daemon (Ancient Greek: , "god", "godlike", "power", "fate") originally referred to a lesser deity or guiding spirit such as the daimons of ancient Greek religion and Greek mythology, mythology and of later Hellenistic religion and Hell ...
. However, an investigator with the
United States Air Force The United States Air Force (USAF) is the Aerial warfare, air military branch, service branch of the United States Armed Forces, and is one of the eight uniformed services of the United States. Originally created on 1 August 1907, as a part ...
found Butler via pop-up notifications. He hired attorney
Jennifer Granick Jennifer Stisa Granick (born 1969) is an American attorney and educator. Senator Ron Wyden has called Granick an "NBA all-star of surveillance law." She is well known for her work with intellectual property law, free speech, privacy law, and othe ...
for legal representation after hearing Granick speak at DEF CON. On 25 September 2000, Butler pleaded guilty to gaining unauthorized access to Defense Department computers. Starting in May 2001, Butler served an 18-month federal prison sentence handed down by US District Judge James Ware. After his release from prison in 2003 on supervised release, Butler exploited
Wi-Fi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio wav ...
technology to commit
cyberattack A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricte ...
s anonymously along with Chris Aragon from San Francisco. He advanced to programming malware, such as allowing the Bifrost
Trojan horse The Trojan Horse was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer's ''Iliad'', with the poem ending before the war is concluded, ...
to evade virus scanner programs and exploited the
HTML Application An HTML Application (HTA) is a Microsoft Windows program whose source code consists of HTML, Dynamic HTML, and one or more scripting languages supported by Internet Explorer, such as VBScript or JScript. The HTML is used to generate the us ...
feature of
Internet Explorer Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated IE or MSIE) is a series of graphical web browsers developed by Microsoft which was used in the Windows line of operating systems ( ...
to steal American Express credit card information. Butler also targeted Citibank by using a Trojan horse towards a credit card identity thief and began distributing PINs to Aragon, who would have others withdraw the maximum daily amount of cash from ATMs until the compromised account was empty. Arrested in 2007, Butler was accused of operating CardersMarket, a forum where
cyber criminals A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing the ...
bought and sold sensitive data such as
credit card number A payment card number, primary account number (PAN), or simply a card number, is the card identifier found on payment cards, such as credit cards and debit cards, as well as stored-value cards, gift cards and other similar cards. In some situati ...
s. After pleading guilty to two counts of
wire fraud Mail fraud and wire fraud are terms used in the United States to describe the use of a physical or electronic mail system to defraud another, and are federal crimes there. Jurisdiction is claimed by the federal government if the illegal activity ...
, stealing nearly 2 million credit card numbers, which were used for $86 million in fraudulent purchases, Butler was sentenced to 13 years in prison, which was the longest sentence ever given for hacking charges in the United States of America at the time. After prison, Butler will also face 5 years of supervised release and is ordered to pay $27.5 million in
restitution The law of restitution is the law of gains-based recovery, in which a court orders the defendant to ''give up'' their gains to the claimant. It should be contrasted with the law of compensation, the law of loss-based recovery, in which a court ...
to his victims. Butler was released from FCI Victorville Medium 2 on April 14, 2021. Butler's story was featured in an episode of the
CNBC CNBC (formerly Consumer News and Business Channel) is an American basic cable business news channel. It provides business news programming on weekdays from 5:00 a.m. to 7:00 p.m., Eastern Time, while broadcasting talk sho ...
television program ''
American Greed ''American Greed'' (also known as ''American Greed: Scams, Scoundrels and Scandals'' and as ''American Greed: Scams, Schemes and Broken Dreams'') is an American documentary television series on CNBC. The series focuses on cases of Ponzi schemes, ...
'' in 2010.American Greed: Cybercrime: Max Butler
Cnbc.com (2010-05-03). Retrieved on 2013-09-27.


References


Further reading

*
Kevin Poulsen Kevin Lee Poulsen (born November 30, 1965) is an American former black-hat hacker and a contributing editor at ''The Daily Beast''. Biography He was born in Pasadena, California, on November 30, 1965. Black-hat hacking On June 1, 1990, Poul ...
, ''Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground'', 2011, publisher: Crown. *
Misha Glenny Michael V. E. "Misha" Glenny (born 25 April 1958) is a British journalist and broadcaster, specialising in southeast Europe, global organised crime, and cybersecurity. He is multilingual. He is also the writer and producer of the BBC Radio 4 s ...
, ''DarkMarket: How Hackers Became the New Mafia'', 2012, publisher: Vintage. {{DEFAULTSORT:Butler, Max 1972 births Living people American computer criminals American people convicted of assault American people of Ukrainian descent Place of birth missing (living people) Boise State University alumni People convicted of cybercrime People from Berkeley, California People from San Mateo County, California People from Meridian, Idaho People with bipolar disorder Prisoners and detainees of the United States federal government Carding (fraud) Bishop Kelly High School alumni