Companies used to ignore hackers who discovered security problems in their products, or threaten them with legal action and hope they'd go away. But after the high-profile hacks of Target, Home Depot, Sony Pictures, and other large companies, security has become a mainstream concern. And white-hat hackers like Kamkar, who understand security exploits and can help companies patch them before it's too late, have become the stars of a multi-billion-dollar industry.

Advertisement

The "cypher punks" who used to work in IT by day and play around with security projects on the side are now being recruited heavily by big technology companies and cybersecurity companies. The flaws they point out get written up by journalists, fixed by companies, and addressed by lawmakers who are worried about the economic impact of insecure products. The skills of the hackster-trickster are now understood to be incredibly valuable.

"More and more companies have a public security contact and bug bounty programs," says Kamkar. "They encourage security research as long as it doesn't harm them or their users, and they might even pay you for finding issues."

Advertisement

(Not every company takes such an open approach to hackers. Oracle's security chief recently complained in a now-deleted post about people looking at the company's code for flaws, while companies like GM and John Deere are trying to use copyright law to prevent hackers from touching their proprietary software.)

Kamkar is a hacker's hacker — a skilled coder who can impress the tech-savvy with the techniques involved in his latest hack, but also break down the stakes with flair and drama for the general public.

Advertisement

"Samy seems to have an uncanny capability of breaking anything he touches," says Mikko Hypponen, a well-known cybersecurity expert. "His research is important because he doesn't just focus on hacking computers but everything else."

Advertisement

Sometimes, his hacks shed light on serious vulnerabilities. (He made headlines in 2010 for the "evercookie," a zombie tracker he created that could recreate itself on someone's hard drive even after they'd cleared their cookies.) Other times, they're just for fun. Over dinner one night, he recalled that, as a single guy in his twenties, he took advantage of a cross-scripting vulnerability on a popular dating site to A/B test his messages to women. He sent two versions of his message to thousands of female users to see which did better. The vulnerability, which he never told the dating site about, let him see whether they'd opened his messages or not.

"I got many more dates," he said of the exploit. "But the hacking was more fun than the dates."

Advertisement

Kamkar says he got into hacking at 10 years old, as soon as he got a computer.

"My first day with it, I went into an IRC channel, and someone told me to get out or else.' I didn't and then my computer crashed," he says. "I was terrified and fascinated. If they could do that, I could do that."

Advertisement

He lived in a tiny apartment in L.A., with his mom, who was always working trying to keep them afloat, he says. Kamkar spent a lot of time on his computer and started hacking games, posting cheat software for his favorite, Counterstrike. The software was impressive enough that a gaming company in San Diego called him up and offered him a job. So at 16, he dropped out of high school and moved to a new city.

"When I got there, the company realized how young I was and said they weren't sure it was legal to hire me," he says. He told them it was okay because he had a work permit from his school. The form was forged, based on a template he found online. He also whipped up official looking emancipation documents, so that, as a minor, he could sign contracts for an apartment and a phone.

Advertisement

In 2000, when he was 14, Kamkar went to his first DEFCON; the conference has been held annually in Las Vegas since the early 1990s. He describes his first of many DEFCON visits as "crazy." "My cell phone didn't work because someone was jamming," he says. "Attendees stole a golf cart and drove it into the pool, which they had dyed purple. They took over the TVs. I saw a woman topless for the first time. In person, that is."

DEFCON is much tamer these days, thanks in part to the mainstreaming of security technology. The weekend conference now attracts 19,000 attendees, many of them from big tech companies and cybersecurity firms with flush expense accounts. Facebook sponsors a party at the Wynn Casino, as does Rapid 7, a large cybersecurity firm that recently went public. These days, the biggest trouble caused by DEFCON attendees is jamming up the local radio frequencies, flooding them with vile language to the angst of ham radio operators, and taking pictures of attendees without permission — a huge no-no for the privacy-conscious group. It "reminded me of going to see a great aunt on life support," complained one attendee on Twitter.

Advertisement

At this year's DEFCON, the most anticipated presentation was that by venerated security researchers Charlie Miller and Chris Valasek, who demonstrated that Chrysler had a vulnerability in its UConnect wi-fi system that allowed them to hack a Jeep from afar — blasting the car's music, turning on the windshield wipers and screwing with the speed of the car. Kamkar chose to do a car-hacking talk in part because of Miller, who is a kind of hacker-hero to him.

Advertisement

"He's been doing crazy exploits for years," says Kamkar. "Before his work, I had no idea cars were connected to so many things."

The preeminent car hackers admired Kamkar back, saying his presentation was the only one (beyond their own) that they attended at DEFCON.

Advertisement

"Hacking is fun," says Kamkar. "It's a puzzle. It's such a good feeling when you solve something that wasn't meant to be solved. When something works, I jump up and do a dance for 10 minutes. It's a feeling I chase."

Advertisement

Kamkar is adept at conveying the fun of hacking, while emphasizing its seriousness. After discovering that many garages, including the one in his L.A. apartment building, can be opened by sending them a "fixed code," he reprogrammed a pink, hand-held messaging toy from Mattel to perform a brute force attack on a garage door's code that could crack it within 8 seconds. He called the device "OpenSesame" and announced it the month before the conference on his YouTube channel.

Advertisement

Kamkar's tease worked. Thousands of hackers filled the huge room where he gave his talk in front of the DEFCON logo—a smiley face and crossbones.

Advertisement

But the highlight of Kamkar's talk was the "RollJam," a device he built for around $30 in parts, which can unlock many different types of car remotely. Most cars' remoteless key fobs use a "rolling code" system to communicate with cars, so that each code sent from your fob to your car is unique. But his radio-frequency sniffing device intercepts the "rolling code" and jams the car from getting it. When a person's fob doesn't work, they push the button again, sending a second code that his device intercepts. It then replays the first signal to pop the locks, but it sits on the second code to use later.

Advertisement

Kamkar imagines that a car thief could plant a RollJam-like device under a target's car, and then break into it whenever he or she wanted. He's releasing the code for RollJam online, but it will be broken, missing a line. "Criminals won't be able to use it but a security researcher could," he says. "If criminals ever get high-tech, we're screwed."

He says it's already happening, pointing to a news cast from March, "Thieves Now Use Mysterious Electronic Device to Unlock, Break into Cars."

Advertisement

"I hope this changes the future of car key security," says Kamkar.

After his talk, Kamkar moved to the side of the room while sipping a yellow can of Rock Star Energy, to talk to attendees. A firefighter came up to him, asking if he could work with him to use his garage door opener when fighting house fires. It would save them from having to break someone's door down. "I'm not sure about the legality of that," he said.

Advertisement

Then two attendees who worked in security at an automotive company approached him to tell him they liked his talk and love his videos.

"My email has been blowing up because of your key fob research," one says.

They say his work makes their jobs harder, but that his adeptness at getting media attention means that their higher-ups take notice and give them more resources to shore up security.

Advertisement

In other words, the automotive security guys want to help Kamkar hack them. They suggest he check out a particular wireless spectrum used by an auto company for vulnerabilities and recommend a tool he can use to read signals coming off engines. ("You guys just saved me hours of research," Kamkar says.)

There's a virtuous circle to hacking. It leads to freak-outs, but seems to be the only thing that convinces companies to get serious about spending money on security. With his simple tutorials and emphasis on the inexpensive tools he uses, Kamkar is trying to make it as easy, and cheap, as possible for other people to get into hacking to increase the pressure on companies to improve their wares.

Advertisement

Later, over the phone, Kamkar says: "What I like about my work is making people and companies more cognizant of these issues. I hope it leads to better experiences for users and consumers."

Then, as if to distill his message for a lay observer, he adds: "Anyone can break into my mom's car. That's not cool."