Misha Glenny: Hire the hackers!

Now this is a very un-TED-like thing to do, but let’s kick off the afternoon with a message from a mystery sponsor. Anonymous: Dear Fox News, it has come to our unfortunate attention that both the name and nature of Anonymous has been ravaged. We are everyone. We are no one. We are anonymous. We are legion. We do not forgive. We do not forget. We are but the base of chaos. Misha Glenny: Anonymous, ladies and gentlemen — a sophisticated group of politically motivated hackers who have emerged in 2011. And they’re pretty scary. You never know when they’re going to attack next, who or what the consequences will be. But interestingly, they have a sense of humor. These guys hacked into Fox News’ Twitter account to announce President Obama’s assassination. Now you can imagine the panic that would have generated in the newsroom at Fox. “What do we do now? Put on a black armband, or crack open the champagne?” (Laughter) And of course, who could escape the irony of a member of Rupert Murdoch’s News Corp. being a victim of hacking for a change. (Laughter) (Applause) Sometimes you turn on the news and you say, “Is there anyone left to hack?” Sony Playstation Network — done, the government of Turkey — tick, Britain’s Serious Organized Crime Agency — a breeze, the CIA — falling off a log. In fact, a friend of mine from the security industry told me the other day that there are two types of companies in the world: those that know they’ve been hacked, and those that don’t. I mean three companies providing cybersecurity services to the FBI have been hacked. Is nothing sacred anymore, for heaven’s sake? Anyway, this mysterious group Anonymous — and they would say this themselves — they are providing a service by demonstrating how useless companies are at protecting our data. But there is also a very serious aspect to Anonymous — they are ideologically driven. They claim that they are battling a dastardly conspiracy. They say that governments are trying to take over the Internet and control it, and that they, Anonymous, are the authentic voice of resistance — be it against Middle Eastern dictatorships, against global media corporations, or against intelligence agencies, or whoever it is. And their politics are not entirely unattractive. Okay, they’re a little inchoate. There’s a strong whiff of half-baked anarchism about them. But one thing is true: we are at the beginning of a mighty struggle for control of the Internet. The Web links everything, and very soon it will mediate most human activity. Because the Internet has fashioned a new and complicated environment for an old-age dilemma that pits the demands of security with the desire for freedom. Now this is a very complicated struggle. And unfortunately, for mortals like you and me, we probably can’t understand it very well. Nonetheless, in an unexpected attack of hubris a couple of years ago, I decided I would try and do that. And I sort of get it. These were the various things that I was looking at as I was trying to understand it. But in order to try and explain the whole thing, I would need another 18 minutes or so to do it, so you’re just going to have to take it on trust from me on this occasion, and let me assure you that all of these issues are involved in cybersecurity and control of the Internet one way or the other, but in a configuration that even Stephen Hawking would probably have difficulty trying to get his head around. So there you are. And as you see, in the middle, there is our old friend, the hacker. The hacker is absolutely central to many of the political, social and economic issues affecting the Net. And so I thought to myself, “Well, these are the guys who I want to talk to.” And what do you know, nobody else does talk to the hackers. They’re completely anonymous, as it were. So despite the fact that we are beginning to pour billions, hundreds of billions of dollars, into cybersecurity — for the most extraordinary technical solutions — no one wants to talk to these guys, the hackers, who are doing everything. Instead, we prefer these really dazzling technological solutions, which cost a huge amount of money. And so nothing is going into the hackers. Well, I say nothing, but actually there is one teeny weeny little research unit in Turin, Italy called the Hackers Profiling Project. And they are doing some fantastic research into the characteristics, into the abilities and the socialization of hackers. But because they’re a U.N. operation, maybe that’s why governments and corporations are not that interested in them. Because it’s a U.N. operation, of course, it lacks funding. But I think they’re doing very important work. Because where we have a surplus of technology in the cybersecurity industry, we have a definite lack of — call me old-fashioned — human intelligence. Now, so far I’ve mentioned the hackers Anonymous who are a politically motivated hacking group. Of course, the criminal justice system treats them as common old garden criminals. But interestingly, Anonymous does not make use of its hacked information for financial gain. But what about the real cybercriminals? Well real organized crime on the Internet goes back about 10 years when a group of gifted Ukrainian hackers developed a website, which led to the industrialization of cybercrime. Welcome to the now forgotten realm of CarderPlanet. This is how they were advertising themselves a decade ago on the Net. Now CarderPlanet was very interesting. Cybercriminals would go there to buy and sell stolen credit card details, to exchange information about new malware that was out there. And remember, this is a time when we’re seeing for the first time so-called off-the-shelf malware. This is ready for use, out-of-the-box stuff, which you can deploy even if you’re not a terribly sophisticated hacker. And so CarderPlanet became a sort of supermarket for cybercriminals. And its creators were incredibly smart and entrepreneurial, because they were faced with one enormous challenge as cybercriminals. And that challenge is: How do you do business, how do you trust somebody on the Web who you want to do business with when you know that they’re a criminal? (Laughter) It’s axiomatic that they’re dodgy, and they’re going to want to try and rip you off. So the family, as the inner core of CarderPlanet was known, came up with this brilliant idea called the escrow system. They appointed an officer who would mediate between the vendor and the purchaser. The vendor, say, had stolen credit card details; the purchaser wanted to get a hold of them. The purchaser would send the administrative officer some dollars digitally, and the vendor would sell the stolen credit card details. And the officer would then verify if the stolen credit card worked. And if they did, he then passed on the money to the vendor and the stolen credit card details to the purchaser. And it was this which completely revolutionized cybercrime on the Web. And after that, it just went wild. We had a champagne decade for people who we know as Carders. Now I spoke to one of these Carders who we’ll call RedBrigade — although that wasn’t even his proper nickname — but I promised I wouldn’t reveal who he was. And he explained to me how in 2003 and 2004 he would go on sprees in New York, taking out $10,000 from an ATM here, $30,000 from an ATM there, using cloned credit cards. He was making, on average a week, $150,000 — tax free of course. And he said that he had so much money stashed in his upper-East side apartment at one point that he just didn’t know what to do with it and actually fell into a depression. But that’s a slightly different story, which I won’t go into now. Now the interesting thing about RedBrigade is that he wasn’t an advanced hacker. He sort of understood the technology, and he realized that security was very important if you were going to be a Carder, but he didn’t spend his days and nights bent over a computer, eating pizza, drinking coke and that sort of thing. He was out there on the town having a fab time enjoying the high life. And this is because hackers are only one element in a cybercriminal enterprise. And often they’re the most vulnerable element of all. And I want to explain this to you by introducing you to six characters who I met while I was doing this research. Dimitry Golubov, aka SCRIPT — born in Odessa, Ukraine in 1982. Now he developed his social and moral compass on the Black Sea port during the 1990s. This was a sink-or-swim environment where involvement in criminal or corrupt activities was entirely necessary if you wanted to survive. As an accomplished computer user, what Dimitry did was to transfer the gangster capitalism of his hometown onto the Worldwide Web. And he did a great job in it. You have to understand though that from his ninth birthday, the only environment he knew was gangsterism. He knew no other way of making a living and making money. Then we have Renukanth Subramaniam, aka JiLsi — founder of DarkMarket, born in Colombo, Sri Lanka. As an eight year-old, he and his parents fled the Sri Lankan capital because Singhalese mobs were roaming the city, looking for Tamils like Renu to murder. At 11, he was interrogated by the Sri Lankan military, accused of being a terrorist, and his parents sent him on his own to Britain as a refugee seeking political asylum. At 13, with only little English and being bullied at school, he escaped into a world of computers where he showed great technical ability, but he was soon being seduced by people on the Internet. He was convicted of mortgage and credit card fraud, and he will be released from Wormwood Scrubs jail in London in 2012. Matrix001, who was an administrator at DarkMarket. Born in Southern Germany to a stable and well-respected middle class family, his obsession with gaming as a teenager led him to hacking. And he was soon controlling huge servers around the world where he stored his games that he had cracked and pirated. His slide into criminality was incremental. And when he finally woke up to his situation and understood the implications, he was already in too deep. Max Vision, aka ICEMAN — mastermind of CardersMarket. Born in Meridian, Idaho. Max Vision was one of the best penetration testers working out of Santa Clara, California in the late 90s for private companies and voluntarily for the FBI. Now in the late 1990s, he discovered a vulnerability on all U.S. government networks, and he went in and patched it up — because this included nuclear research facilities — sparing the American government a huge security embarrassment. But also, because he was an inveterate hacker, he left a tiny digital wormhole through which he alone could crawl. But this was spotted by an eagle-eye investigator, and he was convicted. At his open prison, he came under the influence of financial fraudsters, and those financial fraudsters persuaded him to work for them on his release. And this man with a planetary-sized brain is now serving a 13-year sentence in California. Adewale Taiwo, aka FreddyBB — master bank account cracker from Abuja in Nigeria. He set up his prosaically entitled newsgroup, [email protected] before arriving in Britain in 2005 to take a Masters in chemical engineering at Manchester University. He impressed in the private sector, developing chemical applications for the oil industry while simultaneously running a worldwide bank and credit card fraud operation that was worth millions until his arrest in 2008. And then finally, Cagatay Evyapan, aka Cha0 — one of the most remarkable hackers ever, from Ankara in Turkey. He combined the tremendous skills of a geek with the suave social engineering skills of the master criminal. One of the smartest people I’ve ever met. He also had the most effective virtual private network security arrangement the police have ever encountered amongst global cybercriminals. Now the important thing about all of these people is they share certain characteristics despite the fact that they come from very different environments. They are all people who learned their hacking skills in their early to mid-teens. They are all people who demonstrate advanced ability in maths and the sciences. Remember that, when they developed those hacking skills, their moral compass had not yet developed. And most of them, with the exception of SCRIPT and Cha0, they did not demonstrate any real social skills in the outside world — only on the Web. And the other thing is the high incidence of hackers like these who have characteristics which are consistent with Asperger’s syndrome. Now I discussed this with Professor Simon Baron-Cohen who’s the professor of developmental psychopathology at Cambridge. And he has done path-breaking work on autism and confirmed, also for the authorities here, that Gary McKinnon — who is wanted by the United States for hacking into the Pentagon — suffers from Asperger’s and a secondary condition of depression. And Baron-Cohen explained that certain disabilities can manifest themselves in the hacking and computing world as tremendous skills, and that we should not be throwing in jail people who have such disabilities and skills because they have lost their way socially or been duped. Now I think we’re missing a trick here, because I don’t think people like Max Vision should be in jail. And let me be blunt about this. In China, in Russia and in loads of other countries that are developing cyber-offensive capabilities, this is exactly what they are doing. They are recruiting hackers both before and after they become involved in criminal and industrial espionage activities — are mobilizing them on behalf of the state. We need to engage and find ways of offering guidance to these young people, because they are a remarkable breed. And if we rely, as we do at the moment, solely on the criminal justice system and the threat of punitive sentences, we will be nurturing a monster we cannot tame. Thank you very much for listening. (Applause) Chris Anderson: So your idea worth spreading is hire hackers. How would someone get over that kind of fear that the hacker they hire might preserve that little teensy wormhole? MG: I think to an extent, you have to understand that it’s axiomatic among hackers that they do that. They’re just relentless and obsessive about what they do. But all of the people who I’ve spoken to who have fallen foul of the law, they have all said, “Please, please give us a chance to work in the legitimate industry. We just never knew how to get there, what we were doing. We want to work with you.” Chris Anderson: Okay, well that makes sense. Thanks a lot Misha. (Applause)

100 thoughts on “Misha Glenny: Hire the hackers!

  1. Pay actors, politicians and sports stars 50K a year and give people with fucking BRAINS multi-million-dollar salaries. It might encourage stupidity a little less.

  2. That dude that calls himself ICEMAN isn't american, now im talking about the real iCeMan, he's from europe. Mather of fact is that i know him, very very very good. And he's around 40-60 years old not some youngster.

    Nice video anyways!

  3. @justhuman but he said in the talk, that guy ended up with so much money piled up in his apartment that he went into depression. you can pay them a large salary that they can sustain there epic lifestyle without the risk of getting caught.

  4. 1. ANON didn't make that intro.
    2. he doesn't know what hackers are
    3. he doesn't know when ANON came together
    4. he doesn't know that ANON are average people who but CAN do something about bullshit when they see it.
    Or, points 1 to 4 are wrong and he is a lying, corporate whore with an agenda…

  5. @KilluaXIII Well what is your opinion of what he is trying to do or tell us, since you claim he gave us disinformation about hackers and ANON? Why would he do that?

  6. @KilluaXIII I agree but technically anon did make that intro. The guy who made it is anonymous and he doesnt need membership so unfortunately, he's one of them. Thats kinda the problem with anon, I think…

  7. @openvedio Hire thieves for CEOs, Hire rapists and murderers for SOLDIERS, hire liars for POLITICIANS and the world is a better place.
    Thing is, you cannot hire anonymous.

  8. Anonymous are not 'hackers on steroids' – they are a bunch of misanthropic neckbeards trolling an image board waiting for their lives to start, with few real 'hackers' amongst them. I should know; I used to lurk along with them.

  9. I wonder how you feel when you are in the audience and you hear this guy talking. Do you hit your head to the chair in front of you or just stand there feeling fucked in the ass?

  10. Hiring hackers is far from a new concept, white-hat hackers have been an integral part of computer security companies since the beginning. Then again, even if you don't have a revolutionary idea; TED will give twenty minutes to anybody with an accent.

  11. @pseudodeduction LOL I think what he was trying to say is that the USA/UK government doesn't do it as much as they shouldand that the public should stop fearing them.

  12. What a goof. Used to hold TED up as almost too smart for me, now with the obvious dumbing-down of America, we have ostensibly smart people falling to the "room temperature IQs" of John Stewart and "Dave." Oh well… I'm off to watch Big Bird for my daily dose of intellectual stimulation…

  13. sophisticated group of politically motivated hackers ?? are you fucking kidding me ? TED turned to be piece of shit. People are so stupid.

  14. How I imagine all those Anonymous, LulzSec, etc.:
    Kids or other immature (mentally) people gather and start doing things that they've seen on movies.
    "Hey, lets start doing something illegal and look cool!".
    "Oh, I want to look like that guy in that movie!".

    Cut the crap off and find a normal job instead of trying to break into somewhere pretending you are the saviors and the robin hoods of the 21st century.

  15. @ivnat77 Did my day become brighter when Anonymous hacked Sony or other giant companies? It didn't.

    All this bubble about "We, anonymous, are everywhere and nowhere. We are your neighbour, your barber, blablabla" – is just ridiculous. Too many movies watched by some teenagers, I must say. A group of people wants to be noticed and wants to be a bigger part of the world than anyone else.

  16. @abram730 No I'd feel confused because I wouldn't really know what the "here" was referring to. Here as in the mailbox, or here as in the piece of paper, or here as in the earth and they killed themselves…it wouldn't make sense.

  17. How do these hacks even emerge? It's not hard to protect against XSS and SQL injection, buffer overflows are usually patched days after they're discovered, and 0-days are rarely given to people like Anonymous anyway.

  18. And America does higher hackers. Ever heard of Norton? The developer dooped the CIA , so we hired him. Or Frank Abignale. If you beat the CIA (and usually if you didn't kill anyone while doing it) they'll higher you.

  19. @FekkenRay Wow, I fail so hard. I got back from a dance at like 1:00 so ill blame it on that. The sad part is that i'm a native English speaker.

  20. i talked to them and they have helped me out. i know it sounds silly, they helped me out. why? i have no idea. they have bigger and better things to do, why help me? maybe it was when i said "i care more about people, than i do about money or wealth". i don't know. they are so mature, how can they be young folks?

  21. This guy hasn't got a clue…

    He doesn't seem to understand that many security professionals come from a hacking background and a huge number of people find exploits and provide full disclosure or sell information about findings back to the company independently

    Also, anon is not a political hacking group, its a million regular people on the internet (some of whom can hack) that occasionally like to fuck things up, troll or demand tits either for the lulz or because some people deserve it.

  22. One more talk in which the distinction between hackers and cyber criminals is blurred. If you watch this you get the impression most hackers are involved with criminal activities. Fuck that. Read Wikipedias article about hackers.

  23. @weyzer01 What he actually meant here by hiring the hackers, is hiring BlackHats, aka criminals. Those who have previously been stealing and got into a lot of trouble, because they are MUCH better. A criminal is always a win, until you hire another criminal. ūüėČ

  24. @411American A war monger who has started no wars in 4 years? He's obviously not a very effective one then. Also, if you didn't catch it they said he was assassinated, not just "leaving". If you would celebrate someone being killed merely because you have some political differences then I pity the miserable wretch you must be. Then again you may simply be a troll, though if you think that makes you any better you'd be wrong in my opinion.

  25. They didn't do the original PSN hack.

    The one where shit was stolen wasn't anonymous and if it was it was an offshoot not representing the whole.

  26. As a security adviser/researcher I feel this is an insult to me. ūüėź How could someone generalizes this so deeply without looking at the whole picture?

  27. want to hack someone's social media account, emails, etc.
    we can talk.
    send me a email to

  28. Ask me any questions, or if you need tutorials
    You can also hire me as a hacker
    email me to cowmmander6(.)gmail.com

  29. People still care about anonymous when they have a damned webpage to advertise their hacktivism now. A site that resembles a blog more than anything I might add.

    It's anonymous' personal blog.  The real hackers have gone

  30. (*) Misha Glenny: "CyberCrime: Kriminalit√§t und Krieg im digitalen Zeitalter". Aus dem Englischen von Sebastian Vogel. Deutsche Verlags-Anstalt, M√ľnchen; 352 Seiten; 19,99 Euro. Erscheint am 12. M√§rz.

    Spur nach Schwaben
    Quelle: DER SPIEGEL 6/2012,  Rosenbach, Marcel

    Wie ein Sch√ľler aus Eislingen als Online-Ganove international Karriere machte – und sein Fall eine FBI-Undercover-Aktion auffliegen lie√ü

    Tags√ľber b√ľffelte "Matrix001", wie der Teenager aus dem schw√§bischen Eislingen sich im Internet nannte, am Gymnasium Englisch. Nachts nutzte er das Gelernte f√ľr Verhandlungen mit Kreditkartenbetr√ľgern. Weltweit.

    Der Teenager wohnte bei seinen Eltern in einer Doppelhaushälfte. Was er in seinem Jugendzimmer unter dem Dach so trieb, davon erzählte er niemandem. Dass er im Milieu der organisierten Netz-Kriminellen eine international bekannte Größe war, hätte wahrscheinlich sowieso keiner geglaubt.

    Matrix001 entwarf an seinem Windows-PC mit simplen Grafikprogrammen Druckvorlagen f√ľr Kreditkarten. Die g√§ngigen Visa- und Mastercard-Dekors verh√∂kerte er f√ľr 45 Dollar. Bestimmte American-Express-Karten waren aufwendiger nachzubauen, sie kosteten bis zu 250 Dollar. Seine Abnehmer waren begeistert. In sogenannten Carding-Foren bestellten sie die t√§uschend echt aussehenden Vorlagen, um damit Karten-Rohlinge zu bedrucken und dann einkaufen zu gehen.

    Der Fall des jungen F√§lschers besch√§ftigte jahrelang die Justiz; jetzt beschreibt das Buch eines ehemaligen BBC-Korrespondenten, wie er online mit Kriminellen aus der T√ľrkei und der Ukraine Gesch√§fte machte – unter Aufsicht des amerikanischen FBI(*). Denn Matrix001 arbeitete, ohne es zu ahnen, monatelang eng mit einem US-Fahnder zusammen, der unter falscher Identit√§t einen der gr√∂√üten Schwarzm√§rkte f√ľr Internetkriminelle betrieb (SPIEGEL 27/2011).

    In diesem nur auf Empfehlung zugänglichen Forum ("DarkMarket") gab es so

    ziemlich alles, was Online-Ganoven beim Ausnehmen ihrer Opfer ben√∂tigen: Das Angebot reichte von Kreditkartennummern bis zu Zugangsdaten f√ľr Amazon- oder Ebay-Konten.

    Die Server, auf denen DarkMarket lief, verwaltete FBI Special Agent Keith Mularski aus Pittsburgh im US-Bundesstaat Pennsylvania. Unter dem Pseudonym "Master Splyntr" sammelte er f√ľr seine Beh√∂rde jahrelang wertvolle Informationen im digitalen Untergrund – bis eine Pannenserie beim Landeskriminalamt (LKA) Baden-W√ľrttemberg, das vom FBI √ľber die Spur ins Schw√§bische informiert worden war, die Undercover-Operation enth√ľllte.

    So erhielt Matrix001 eines Tages eine anonyme E-Mail, in der er gewarnt wurde. Sein Telefon werde √ľberwacht, die Polizei kenne seinen Namen, er solle Beweise zerst√∂ren und andere "Carder" warnen. Bis heute ist nicht gekl√§rt, wer den Tipp gab.

    Matrix001 schickte die Warn-Mail an "Master Splyntr" weiter und informierte damit das FBI. Wegen des offenkundigen Lecks in deutschen Ermittlerkreisen zogen die US-Amerikaner den Zugriff auf die Hehlerbörse vor und lösten umgehend eine internationale Polizeiaktion aus.

    In Eislingen klingelte es kurz darauf morgens an der T√ľr. Matrix001, der nebenbei sein Abitur bestanden und eher pro forma ein BWL-Studium begonnen hatte, √∂ffnete im Pyjama. Erstaunlich abgebr√ľht bat der junge Schwabe darum, sich schnell noch etwas √ľberziehen zu d√ľrfen. In seinem Zimmer gelang es ihm, den laufenden Rechner auszuschalten. Matrix001 hatte die Festplatte hochgradig verschl√ľsselt, sein Passwort hatte 64 Zeichen. Der Computer fiel als Beweismittel gegen ihn deshalb aus. Der 22-J√§hrige kam f√ľr vier Monate in Untersuchungshaft nach Stuttgart-Stammheim, wegen des Verdachts der Bildung einer kriminellen Vereinigung.

    Als der SWR-Reporter Kai Laufen eher zufällig auf den Fall stieß, entdeckte er in den Akten eine verräterische E-Mail, die offenbar durch einen weiteren Fehler der schwäbischen Ermittler an den Anwalt von Matrix001 geraten war. "Ich bin Master Splyntr", hieß es in der dort zitierten Mail, abgesandt von der Dienstadresse des FBI-Agenten Mularski. Erst dadurch wurde die Undercover-Operation auch öffentlich bekannt.

    Innerhalb des Landeskriminalamts Baden-W√ľrttemberg hatte die misslungene FBI-Kooperation ein unsch√∂nes Nachspiel. Einer der LKA-Fahnder wurde unter dem Verdacht suspendiert, die Warn-Mail an Matrix001 geschrieben zu haben; zeitweise wurde ihm auch vorgeworfen, er habe die FBI-Operation absichtlich enth√ľllt. Doch das Amtsgericht Bad Cannstatt befand, dem Beamten sei nicht nachzuweisen, dass er die Warnung verfasst hat.

    Von den Vorw√ľrfen gegen Matrix001 blieb nicht viel √ľbrig, der gravierendste Punkt der "kriminellen Vereinigung" wurde verworfen. Am Ende verurteilte ihn das Amtsgericht G√∂ppingen zu 21 Monaten auf Bew√§hrung.

    Der junge Mann sagt, er habe sein "Leben seither umgekrempelt". Er hat ein neues Studium absolviert, eines, das seinen Talenten entspricht: Grafikdesign. Diese Woche hat er seine Abschlusspräsentation, dann will er sich einen Job suchen, in einer Agentur. Von seinem Vorleben im Untergrund des Internets hat er nur engen Freunden erzählt. "Matrix001 ist Geschichte", sagt er.

  31. hire the hackers? if i was the hackers, I wouldn't take the offer either. who knows that the so called gov't, a bunch of corrupted, self serving, and lying politicians aren't going to kill the hackers once they are done using you..

    stick to the Anonymous way!!! Just don't exploit people for your own personal gain and you'll be fine! There are actually people in the world that care verses those that pretend to care.

  32. I understand they don't know who hacks but they gave them a name and page to blame so people have a subject to blame and the media the same making sure government's were going to protect them. this is a bait page at that. it's all about safe surfing our free internet trade

  33. If you encounter a hacker, ask for his or her certification. that was what made me have confidence in Williams because apart from being a hacker, 
    he is also a security analyst who knows what he is doing. I have hired him for the fifth time so i guess it is safe to say the guy is legit. 
    for all you hacking desires contact [email protected] .com for all exploits. Shout out to real hackers, they work hard.

  34. Hackers ¬†who scam are really a great concern to us who need their services cause all we just ask ourselves is that can i really get a real hacker without being scamed yeah but it takes a lot of commitments i went to a site it's called quora though it's a popular site where you ask and answer questions and i saw an answer under where can I hire a hacker written by a guy called ron bilder his answer really got to me that i contacted him not knowing he too was a hacker so he gave me his mail address which is [email protected] that was just how i got help

  35. I can recommend a very smart and trusted hacker who is so good in what
    he's doing. He has worked with Microsoft as a Web developer and software
    engineer he's a wizard in this areas, clearing of MUGSHOT ONLINE without it being traced
    backed to you, CLONES PHONE, HACKS DATABASE, hacks facebook, instagram,
    tracks calls, CHANGE SCHOOL GRADES, he can crack into any social media,
    database record, clears mugshot, clones phones, call tracker, credit card
    cracking and lot more.. he reads and write all kinds of codings.
    contact me: [email protected]

  36. Do you need hackers for hire? Do you need to keep an eye on your spouse by gaining access to their emails? As a parent do you want to know what your kids do on a daily basis on social networks ( This includes facebook, twitter , instagram, whatsapp, WeChat and others to make sure they're not getting into trouble? Whatever it is, Ranging from Bank Jobs, Flipping cash, clearing criminal records, DMV, Taxes, name it,and he can get the job done. Contact hacklordwiz at gmail dot com for more information!

  37. Hello guys I'm Ben ,I'm here to recommend this guy because I know real hackers are a rare commodity, came through for me more than once and has come through for a friend I recommended him to .he's your guy .he's into

    WhatsApp number
    Website hack
    Facebook hack
    Credit card hack
    And email and password
    Contact him for any sort of hacking issues at [email protected]

  38. Haven't been a victim of fake hackers, It got so bad I had to open up to my
    very close male friend who always made use of private investigators
    back in the days to spy on his business partners and other loved ones
    but due to the kind of hack job i wanted done which was bank hacks of my
    family’s confiscated funds by the government, I couldn’t just tell
    anyone what I wanted to do except the hacker himself.
    When he saw how reluctant I was he then told me to contact a guy his private
    investigator used to help him get his ex wife’s location by hacking into
    her bank account and seeing her recent withdrawal locations, this man
    was Dmitry Sklyarov [email protected] Since I met him, I can boast
    that my life has turned around, I even have met with him on different occasions
    after buying him tickets that he turned down initially but now we are
    close and good business partners as my secrets are well kept with him.
    I will advice my fellow ones out there to these fake hackers to please stop
    communication and go for the right thing. The advantages of Dmitry Sklyarov is he might
    have pity and give you a discount, always provide something to make you
    rest assured he can do your job and also in most cases if you are close
    to him he would arrange for a meeting. He does any hack job you want,
    just name it and inquire from him, tell him you got his email from
    James and let him know you need help. He doesn’t reply immediately as
    he's always very busy so be patient with him

  39. Haven't been a victim of fake hackers, It got so bad I had to open up to my very close male friend who always made use of private investigators back in the days to spy on his business partners and other loved ones but due to the kind of hack job i wanted done which was bank hacks of my family‚Äôs confiscated funds by the government, I couldn‚Äôt just tell anyone what I wanted to do except the hacker himself. When he saw how reluctant I was he then told me to contact a guy his private investigator used to help him get his ex wife‚Äôs location by hacking into her bank account and seeing her recent withdrawal locations, this man was Dmitry Sklyarov [email protected] Since I met him, I can boast that my life has turned around, I even have met with him on different occasions after buying him tickets that he turned down initially but now we are close and good business partners as my secrets are well kept with him. I will advice my fellow ones out there to these fake hackers to please stop communication and go for the right thing. The advantages of Dmitry Sklyarov is he might have pity and give you a discount, always provide something to make you rest assured he can do your job and also in most cases if you are close to him he would arrange for a meeting. He does any hack job you want, just name it and inquire from him, tell him you got his email from Fred and let him know you need help. He doesn‚Äôt reply immediately as he's always very busy so be patient with him

  40. We Provide Online Hacking Services

    Lost your password? Have another online account that you want to hack into? Need to hack a password? You have come to the right place!
    We offer to hack your password and hack into online accounts. Be it email (Gmail, Yahoo, Hotmail etc) or website accounts such as Facebook, Twitter, Blogs and others; we can do it.
    Our full list of services:
    University grade change
    Email account password recovery and hacking
    Social media and website password recovery and hacking
    Western union and moneygram reference number
    Website defacing
    Database hacking
    Cyber stalking
    Bank Hacking
    Bitcoin, Coinbase, Credit card Topup
    All Account loading and instant transfer
    Clear criminal records,
    Clear credits card debts
    Delete Mugshots off Search engines.
    Clear DMV
    iPhone / Android hacking
    … and much more!
    Just email your hacking needs to [email protected] and we will promptly respond to your needs?
    Show less

  41. i owe this dude publicity. there are level of information that can be easily attainable when you meet a great vetran. i and my friends have been helped several times since i met Ro bert his Gmail hackerrobert001. i have been ripped off severally and hiring real hacker took me alot of time.

  42. I major in…

    Different Kinds of Games Hacking Credit score increase and decrease Upgrade University Grades Facebook, Instagram, Twitter, WhatsApp, Line, Skype Hack Delete unwanted online Pictures and Videos on any website Remove Criminal Records Tracing peoples background Hack bank accounts Apps hacking Loading all MasterCard, Bank Accounts, PayPal, Bitcoin, WU, Money Gram with untraceable credit on it. etc. We also develop hacked facebook, twitter, instagram, yahoo, gmail passwords etc. Do you need to keep an eye on your spouse by gaining access to their emails? As a parent do you want to know what your kids do on a daily basis on social networks.

    Also introducing:

    Introduction to Ethical Hacking,Different Kinds of Games and Software hacking,Games server files + database,Social Engineering,Scanning Networks,Evading IDS, Firewalls, and Honeypots,Sniffing,Hacking Mobile Platforms,Hacking Web Applications,Hacking Web servers,Hacking Wireless Networks Cloud ‚Äď Threats & Opportunities,Malware Threats,Session Hijacking,SQL Injection,Enumeration,Denial of Service,Footprinting and Reconnaissance,System Hacking.

    We have 100% track records from our client as well as highest return hire rate.

    Contact Best Online Hacker With 100% Guarantee and Money Refund Policy.

    Always online 24/7 drop your mail or offline message

    Gmail__ midomark2016

    I C Q 724093575

    skYpe MIDOMARK2016

    Text ~ Whatsaapp +1(321)4143672

    Dis,cord ID__ midomarkhack#2417

  43. We Provide Online Hacking ServicesLost your password? Have another online account that you want to hack into? Need to hack a password?You have come to the right place!We offer to hack your password and hack into online accounts. Be it email (Gmail, Yahoo, Hotmail etc) or website accounts such as Facebook, Twitter, Blogs and others; we can do it.Our full list of services:University grade changeEmail account password recovery and hackingSocial media and website password recovery and hackingClear RRB ExamsChange Exam ScoresWebsite defacingDatabase hackingCyber stalkingBank HackingMoney TransferClear criminal records,Clear credits card debtsDelete Mugshots off Searh engines.Clear DMV RecordsiPhone / Android hacking… and much more!Just email your hacking needs to [email protected] and we will promptly respond to your needs

  44. finding a real hacker these days is really frustrating , you get ripped off almost every time you try, i decided to try this guy i saw people recommend him on youtube MALCOMX442 @ GMAIL . COM, he amazed me, he pulled off what i thought was impossible, i know there are a few real ones but i am satisfied with this hacker, he is the real deal

  45. You must have come across the name in your daily searches, they call him
    Robert Gmail hackerrobert001. And I believe we all know how robert
    operates, they are always there even when we can't see. He didn't let me
    down and never disappointed me because i have been scammed alot in the
    past..He does all types of mobile hacks, and also does changes in
    database/website such as your college/university grades. He did help me
    by exposing my cheating spouse then by cloning the device. All you need
    to do is writing to the address.

  46. Out of desperation, I hire this Russian hacker, Arthur Vitali. This man really surprised me with his amazing jobs. Helped me hack 4 cellphone and 3 websites.If you need help contact Arthur on EMAIL- [email protected] WHATSAPP- +38068301 OR KIK- Arturquickhack.

    He also helped a friend take down some criminal records that kept jeopardizing his efforts of getting any good jobs. Right now my friend has a good job and good pay.

  47. The best hacker i can refer to everybody is hacker hendrick who i met on dark web and he really surprised me by spying on my cheating spouse that is the reason i can recommend him for hire…..if you are interested in his services you can contact him [email protected] or text/whatsapp him on +15126607649

  48. if you think you have doubt about your spouse i say you contact [email protected] he helped me hack my husband's phone and I caught him hooking up with other women, the evidence came in very handy in the divorce. you can mention that hannah jackson referred you for a quick response and you might probably get a discount.

  49. Do hackers really gotta use that kind of voice? Same with a dude from last week that helped me hack my bfs email. He was really good at it but his voice gives me goosebumps anyone needs a professional hacker should email him Serviceapproval(a) hotmail,com or whatsapp +15624554717

Leave a Reply

Your email address will not be published. Required fields are marked *