Former Criminal Shares Shocking Secrets to Protect Others from Crime

Former tech criminal Aaron Johnson, currently serving a prison sentence for stealing smartphones, has revealed his dark past. Once homeless and desperate, Johnson managed to amass around $300,000 by stealing iPhones and using their financial applications. However, now Johnson is sharing his secrets to help others avoid similar crimes.

Johnson targeted individuals in bars and clubs, taking advantage of their intoxication. He noticed that young male college students, often intoxicated and unaware of their surroundings, were the easiest targets. Meanwhile, women were more cautious, making it more difficult for him to execute his plans.

Throughout his criminal career, Johnson developed various tactics to gain access to phones. He would convince his victims that he was a rapper or offer them drugs. He memorized their access codes, recorded people entering their codes when possible, and quickly changed passwords and biometric settings to gain full control over the stolen devices.

Apple’s new feature, Device Theft Protection, which introduces a one-hour delay in making changes to passwords and biometric settings when the device is being used in unfamiliar locations, would have hindered Johnson’s actions. Unfortunately, this feature appears too late for his victims.

Once Johnson had access to a stolen phone, he wasted no time in using banking apps and cryptocurrencies, as well as searching for sensitive information stored in notes and photos. He would then transfer money using Apple Pay and indulge in a shopping spree, often buying high-end devices like the iPad Pro, which he would later sell for cash.

Despite his dark past, Johnson is now determined to make amends for his actions. Hopefully, by sharing his criminal techniques, he will be able to help people protect themselves from similar scams in the future. While his intentions may be sincere, the damages caused by his actions cannot be easily repaired. Nevertheless, his story serves as a cautionary tale and a reminder of the importance of securing personal information and being vigilant against potential threats.

Frequently Asked Questions (FAQ):
1. What traits made Johnson choose his victims?
– Johnson targeted individuals who were intoxicated and unaware of their surroundings. Young male college students were easier targets for him than women, who generally were more cautious.

2. What methods did Johnson use to gain access to stolen phones?
– Johnson used various methods, such as pretending to be a rapper or offering drugs, to convince his victims to unlock their devices. He would memorize their access codes, record the codes being entered when possible, and quickly change passwords and biometric settings to gain full control over the stolen devices.

Definitions:
1. iPhone – a smartphone developed and sold by Apple Inc.
2. Apple Pay – a mobile payment service by Apple Inc. that allows users to make payments using Apple devices.
3. Biometrics – technology that uses biological data, such as fingerprint or facial recognition, for user identification.

The source of the article is from the blog reporterosdelsur.com.mx