Story Time

This 15 year old boy was chased by the entire State Police.. This is his story

Hello, friends. Today our story is about a man who was not quite ordinary. No, he didn’t have four arms and he didn’t look anything different. But most experts consider him to be the progenitor of what we are going to talk about next. The era of hacking and and social engineering began with him.

What is surprising is that he did not start in the age of advanced technology, but at a time when telephones were still with a dial pad and computers were only seen on TV. But nothing could stop the kid. For him, it was a big game or an exciting adventure, but in no way breaking the law. And 30 years ago, hacking was not considered a crime. On the contrary, it was encouraged by the authorities because young people developed their intelligence.

What could be wrong with that? But first things first.

In 1963, a boy named Kevin Mitnick was born in the United States. His father abandoned the family in 1968 when the boy was only five years old, so his mother had to work. Most of the time, Kevin didn’t draw any attention to himself and was just an average kid. But by the age of twelve, he got a hobby. A lot of people like to play ball or just frolic in the street, but Kevin liked bus rides.

He liked to look at the city from the window. But as he had very little money, he had to save some change for a ticket. One day he was riding and looking at the ticket, and that’s when the boy came up with a clever way to bypass the whole system and save good money on bus rides. The boy realized that the check relied on an unusual puncture scheme by the driver, and the scheme depended on the day, time and route. But to make the plans a reality, he needed a similar hole punch and new tickets.

You could also use unused tickets from the bin, but where to get a hole punch? So the boy inadvertently asked the driver where he could get such a device, and the man, without a backward glance, told him the secret. After a while, Kevin’s first trick was a success, and the schoolboy rode many routes for free. He was very proud of this achievement and considered himself a genius until at school he joined an amateur radio club where he befriended a boy to whom he told about his clever ticketing plan, to which his new friend only smiled and said that he still had a lot to learn. The guy became a friend of Kevin and showed him many amazing things with the phone systems that he could do anything with.

As it turned out, his new friend was selftaught and had already mastered freaking. The art of phone network hacking at school age. Over the years of telephone lines, dozens of techniques had been deployed. As a rule, the aim of hacking was and still is, to make free long distance and international calls. A new friend showed him how to use a secret number to make long distance calls for free, and soon introduced him to other freeloaders who became Mitnick’s role models.

In case anyone does not know, the founders of Apple Jobs and Wozniak were also famous freeloaders. The guy listened to his new friends, called the phone companies how they used little tricks and jargon words to sound authentic and suggestive. Soon Kevin himself was practicing freaking. This was a trick he pulled off with a computer course instructor, which was only available to school graduates. And since Mitnick wasn’t yet of age, naturally he wasn’t taken.

But Kevin was too stubborn to give up so easily. Using his voice and tone dialing, acting on behalf of another person. He found out all about the teacher and came to him with information. The teacher was so impressed by the boy’s ability that, despite his age, he took him on as a student. As Kevin himself said many years later, I think my teacher regretted teaching me.

If only he had known what it would lead to. Meanwhile, the boy was improving his skills. At 14, Kevin learned how to reroute a home phone signal to a payphone, amused by the fact that home phone owners were asked to put a dime before talking. By the time he was 15, telephones and PBXs were no problem for Kevin. He knew how to make free calls, and soon he got bored with this pastime.

He began to sit for long periods in the school’s computer lab, studying the manuals. In 1980, Kevin commits his first hack into a school land. But despite the fact that in doing so, he was given the opportunity to correct his grades, he did not do so because he was solely interested in the process of hacking. The result was secondary. When Kevin was 16, the phone company literally yanked the phone cord out of his flat infuriated that the kid had hacked into their system using a social engineering technique because there were no other legal ways to influence the hacker.

But the resourceful boy didn’t get lost. He lived with his mother in a flat with number 13, so he simply went to a building shop and bought two numbers and a letter to make the number twelve. B. This is how he managed to get a new service contract with the telephone company. In 1979, Mitnick received his first serious assignment to rightfully be called and be a hacker.

He met a group of young hackers who suggested he join their community. But in order to do so, he had to pass a test that would show what he could do. The job was to hack the computer system of Digital Equipment Corporation. At the time, the company had the most effective security system. There was no way they could have foreseen that they could be hacked.

Kevin got the login and password and easily completed the task in only five minutes, after which Kevin became a legend among hackers. However, Mitnick was most interested in telephony. He had been studying at Los Angeles College at the University of Southern California, but as was to be expected, the first problem soon began. Soon, the hacker group the boy was a part of was turned into by the authorities by the girlfriend of one of the members. Kevin was sentenced to three months in a juvenile detention center and a year’s probation.

However, even in prison, Kevin wasted no time. By the time he was released, he had all the telephone networking knowledge of America’s top specialists. Kevin had become a telephone hacking virtuoso. He could create unregistered phone numbers, make calls from other people’s numbers, wiretap and disconnect conversations. Throughout the 1980s, the guy perfected his skills.

Settling in California, he pulled a variety of computer and phone pranks by cleverly covering his tracks, he managed to evade from prosecution for a long time. But in December 1987, he was out of luck again when a friend and fellow hacker turned him into the police. The reason was jealousy, since no one could reach Kevin’s level. After that came a string of stints in prison. After another stint in prison for illegally accessing the ARPANET, the forerunner of the Internet, Mitnick seemed to have calmed down.

But eager to find out what he was capable of, what secrets might surface, the guy continued his game. At the trial, the head of the computer crime unit said Mitnick was several orders of magnitude above what characterized the average hacker. Kevin was released on probation in 1990 as a basic condition. He was not allowed to touch a computer. Soon, however, the lad was joking around again.

The probation officer’s number was locked, the judge’s credit account went into total chaos, and all mention of Kevin’s arrest and conviction disappeared. In 1992, Kevin Mitnick disappeared from the radar of the FBI officers, who had been relentlessly monitoring the hacker’s activities. All the while, the feds were searching the country for the hacker. The feds had been searching for the hacker all over the country. He was able to wiretap the FBI agents and beat them to it by several steps each time.

In 1994, authorities suspected him of stealing Motorola cell phone monitoring software. Also, the firm Mcico Communications claimed that someone had stolen the electronic serial numbers of its mobile phones. On the night of December 25, 1994, Mitnick showed the world what he was capable of. He hacked into the home computer of Sutomo Shimamura, a leading American computer security specialist. In the beginning, Mitnick hacked into Loyola University’s Computer in Chicago, from which Shimamura’s computer could be accessed.

Kevin successfully copied hundreds of classified files. Catching Mitnick was Shimamura’s honor because the breach undermined his professional reputation as the world’s best computer security specialists in the world. On the night of February 15, 1995, the hacker was arrested. Many say he surrendered freely himself because it was almost impossible to catch him, he was always one step ahead. Kevin has been charged with 23 counts of fraud with more than $80 million in damages.

Kevin Mitnick had become something of a legend in US circles. His adventures had been vividly documented in the New York Times. A funny story was once published in Los Angeles. Minnik managed to reprogram the phone network so that agents tracking his call would not burst into the hacker’s lair. But to an immigrant from the Middle East who was watching TV, Kevin spent a total of five years in detention, including a year in solitary confinement.

Prosecutors convinced the judge that if Mitnick was given a phone, he would easily call the Aerospace Defense Command and whistle into the receiver to launch an Intercontinental ballistic missile. This image was largely due to the fact that Kevin hacked as if for fun and sport and did not steal anything at all. He could transfer hundreds of millions of dollars into his account in five minutes. But even while on the run, he went to a regular job. He was a humble and unremarkable technician at a medical center.

While Kevin was in prison. Many books by various authors were published about him. Shortly after Mitnick’s conviction, Shimamura released a book called Breaking In, in which he revealed that Kevin is currently unparalleled. In January 2000, Kevin was released from prison and never returned to hacking, at least officially. Since 2003, he has been officially allowed to use the Net and phones.