Dmitry Vitalievich Sklyarov Biography


The author of the book "The Art of Protection and Hacking of Information". In December, Dmitry was recognized as a jury by San Jose innocent in the crime incriminated to him. Now Dmitry is working on several projects, including ElcomSoft IOS Forensic Toolkit - a specialized tool for conducting a forensic analysis of apple iOS. Then the cars were different - they occupied the square.

Dad subsequently worked at the MVTU for more than 20 years in the main position of the head of the computer. So I was introduced to computing equipment from young nails. The punchcards were lying around at home, ACPU-School Paper was handed over to the school ... The school, by the way, was without any bias, but in the last two years we had a very good teacher of mathematics.

In addition, we were lucky - from the sixth grade we began a professional education. One day a week was reserved for improvement of professional skills.

Dmitry Vitalievich Sklyarov Biography

So far, two-thirds of the class were practiced on the machines of the Salyut plant, the other third was sent to the training and production plant related to computers. Once a week we spent six hours there, we gave lectures, there were some practical classes ... We started with PVM Agat, and in the last year, even staff appeared at this plant. At that time, to afford the computer at home was, of course, unrealistic.

That is, Agat was already sold in stores and cost about 4.5 thousand rubles, while the Zhiguli cost about 6 thousand. In m I graduated from school and was about to enter the institute. I wanted to have as many computers as possible - it was my main goal. I really wanted to get to the department of automated design systems, everything is on computers there. As a result - Baumanka, native university.

True, that year they did not enter the department, but to the faculty, and the distribution through the cathedrals occurred after the first course. Naturally, I got the wrong place where I wanted to: I was distributed to the department of resistance of materials. And although after the semester I still transferred, I still think that of all departments of the faculty of the Sopromat is the strongest department, that is, they are best taught there.

But since my school years, I realized that I like not so much to program as to understand how the programs are arranged, to look for mistakes. Even in parallel with my studies at the institute, I worked in a company that was engaged in geoinformatics - I wrote programs that automated the work to create electronic cards. Later, for some time he developed similar software for Americans.

It was all through the institute, that is, through the department. After graduating from the institute, he thought where to go, and just then it was a year, the Department of Information Security was opened. I already understood that I like security, and I still think that this is one of the most dynamic areas IT. I went there to graduate school. It is called the "method of analyzing software tools for protecting electronic documents." The same report with which I went to Defcon in the year is just a piece of the dissertation.

Now I am in Baumanka a compounder - I give one lecture per week, leading diplomats - and I have enough. We have such a thing - a course of choice. Students are free to choose what to go. I read the course to five -year students, which I call "engineering introduction into information security." I got the impression that, having studied before the fifth year, many students do not understand what they are doing.

I enjoy communicating with the young generation and work there not at all for the sake of salary. I just wrote a piece of code for my needs. One friend of mine has lost access to his Access base, asked me to help. I sat, figured it out and ... helped. As a result, I got a code that could be useful to other people, but I did not know how to sell programs. It was then that I found out that there is such a company-Elcomsoft, which is located in Moscow.

I wrote off with them, talked about what I have, and asked if it would be interested in them. They answered me: "Come, talk." Initially, I wanted to ask for my software a little money and say goodbye. But I was offered to work on a regular basis, then there was a trial period for six months long ... And then they took me to the state. At first there was a restoration of passwords, and only then adjacent directions appeared.

The main buyers of software for Password Recovery, of course, were home users. There are many of them, they are easy to find, they actually come themselves. Forgotten password is a very common situation. Then came the products related to data restoration. For example, we have a wonderful EFS Recovery product. There is a product for an audit - in fact, it performs the same restoration of passwords, only on the scale of Active Directory.

Recently we entered the market of the so -called Computer Forensics. This is also password restoration, but not for home users, but for law enforcement agencies, who are also often interested in this.Our general director somehow sent paper at all, which said that he was an honorary assistant to the sheriff of Texas. Even in years, the Texas police arrested a person on some terrible charge, and encrypted files were found on his computer.

The police turned to Elcomsoft, and we provided them with a program. In decrypted files, evidence of the guilt of the detainee was found. Yes, of course, it happens, but ... for example, we recently have a tool for researching Apple telephones for iOS for any devices except the iPhone 4S and iPad2. We were the first in the world to do this. We do not sell it to everyone, there is no open sale at all, but this product is in demand among representatives of government agencies.

Thus, the organization must provide evidence of what is related to law enforcement agencies. We will keep silent about Adobe. In addition to us, such products are now being produced by three or four companies, known in the global Computer Forensics market. Phone manufacturers, oddly enough, do not mind. Nevertheless, this is cooperation with law enforcement agencies, assistance to the law ...

They have never been addressed from Apple, they have not made complaints. In general, with regard to claims, it is more often the other way around. No, the idea with PDF belonged to me. I came and offered to do this format. They told me: "Well, if interesting, do it." In this sense, we have a unique company - there is no rigid schedule for software development. There is no external customer who dictates to us the deadlines.

In general, yes. In fact, with my participation, a program was developed that made it possible to remove protection from legally purchased PDF documents, including electronic books. She was released in the year. At that time, a law was in force in Russia at that time, according to which anyone had the right to legally make one backup copy of legally purchased products, not reporting this to the copyright holder.

That is, creating this product in Russia, we did not violate anything. Then we started selling it in the USA. It was just a couple of weeks before my trip to the States on Defcon. During this time, it was bought, if I am not mistaken, only 12 or 20 copies of the program. After less than a week since the start of sales, our provider, from whom we hosted, informed us that Adobe was making claims to him.

We stopped sales. I flew to Defcon, calmly made a report there about the Advanced EBook Processor, everything was fine. But two days later, when I already left the room to go to the airport, I was met by the FBI staff and politely offered to drive with them. One of them is Spot the Fede of the federal. At the conference there are really federal agents, of course, secretly, and in its course on questions and answers from the hall it is necessary to calculate the person who is the federal, and in any way indicate him.

When I left the room and stumbled upon four people who introduced themselves as federal agents, I first decided that this was a continuation of some kind of game, although the conference at that time was already over. I tried to get around them. One of them stopped me, grabbing my wrist, showed me a token, and I realized that I would not run anywhere, surrendered to the authorities. After all, then it turned out a very loud story, you were kept in prison for almost a month, for more than six months you were not allowed to leave the States.

The federal agents brought me back to the room, examined my suitcase and were very surprised when they found that I had no laptop with me. The fact is that there were other guys with me who, after the conference, flew to another city in the States. The laptop was not mine, I made a report from him, gave them, and they left. Feberovites disappointed this. Although he would still not find any crime on the laptop.

Then I was taken to the building of the local court in Las Vegas. There are no preliminary chambers in the States and there are no places for permanent "imprisonment". Everything is united, since most people go on bail even before they get into the camera. They refused to let me go on bail: there was a great risk of “escape”, because nothing tied to the United States. As a result, I was left in the Las Vegas prison, in which I spent 11 days.