A Hacker’s Interesting Story

The story of the person who is considered one of the first hackers starts with having to communicate with his friends over the phone because he frequently changes places with his family.

Çekino Information Technology

A Hacker’s Interesting Story

The story of the person who is considered one of the first hackers starts with having to communicate with his friends over the phone because he frequently changes places with his family. In this way, our pirate, who has a lot of knowledge about phone systems and decides to cut the phone lines of those he does not like, succeeds in capturing the system known as “punch card” that commands the data processing services of Los Angeles buses

In this way, the turning point in terms of improving cyber abilities is that he meets Roscoe and his girlfriend Susan, who are computer hackers like him and know phone systems very well. They were searching for people in the system they wanted to infiltrate, talking to them as if they were officials, accessing their personal information and recording it. With the development of computer technologies, the trio, which switched from phone systems to computer systems, began to infiltrate the computer systems of many places from universities to military institutions.

By 1995, they managed to infiltrate many systems, including the NSA. They hacked many systems, especially by doing social engineering. For example, in December 1980, the computers of a company named US Leasing specializing in the rental of electronic devices were entered.

Someone who introduced himself as a technician of the Digital Equipments company called US Leasing and asked for a valid username, password, and phone number to connect to fix a malfunction in the system.When the employee of the company, who gave this information to the other party without suspicion, called Digital Equipments company the next day, he learned that there was no such person and that their companies were not sought by them.

During the same night, the company’s printers constantly said, “System breaker turned. It is almost time to fly your disks and backups on System A. System B was already flying. ” The whole floor was covered with paper. There were occasional human names on the papers: Roscoe, Mitnick, Roscoe, Mitnick… It was not understood who entered the US Leasing.

Yes, as you guessed, Kevin Mitnick is the person we are talking about.

Finally, he was released on January 21, 2000, but remained under surveillance. He was unable to use the phone (except when he called his mother), and he could not access the computer. It was forbidden to leave the USA. He made his living by attending conferences. On January 21, 2003, restrictions on it were lifted. He is still a consultant.

One of his own words is as follows.

“Companies spend millions of dollars on firewalls and secure access devices, and it’s money wasted because none of these measures address the weakest link in the security chain: the people who use, administer and operate computer systems”