Difference between revisions of "User talk:Corvus"
(Created page with "Something ... Because @mutiny said so. :p.") |
|||
Line 1: | Line 1: | ||
− | + | I was born on August 6, 1963. I am an American computer security consultant, and a hacker. Not very long ago I was convicted of various computer and communications-related crimes. At the time of my arrest, I was the most-wanted computer criminal in the United States. I grew up in Los Angeles and attended Monroe High School. I was enrolled at Los Angeles Pierce College and USC. I worked as a receptionist for Stephen S. Wise Temple for a while. At age 12, I used social engineering to bypass the punchcard system used in the Los Angeles bus system. After a friendly bus driver told me where I could buy my own ticket punch, I could ride any bus in the greater LA area using unused transfer slips that I found in the trash. Social engineering became my primary method of obtaining information, including user names and passwords and modem phone numbers. People just loved me and how charismatic I had become while growing up. | |
+ | I first gained unauthorized access to a computer network in 1979, at 16, when a friend gave me the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. I repeatedly broke into DEC's computer network and even copied their software, a crime I was charged with and convicted of in 1988. I was sentenced to 12 months in prison followed by three years of supervised release. Near the end of my supervised release, I hacked into Pacific Bell voice mail computers. After a warrant was issued for my arrest, I got the hell out of dodge. As a result I became a fugitive for two and a half years. If you were to ask the U.S. Department of Justice, The would tell you that I gained unauthorized access to dozens of computer networks while he was a fugitive. I even used cloned cellular phones to hide my location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies. I was so damn good that I also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail. Even the FBI fell victim to my endeavors> This is how I was able to stay ahead of them for as long as I did. Those other people should have just kept their asses out of my business, now under the guise of a national renowned security consultant, I spend large amounts of time planning my revenge. It was largely because of other people that I was apprehended on February 15, 1995 in Raleigh, North Carolina. I desperately tried to deny who I was, but I was found with cloned cellular phones, more than 100 clone cellular phone codes, and multiple pieces of false identification. | ||
− | + | If you have any questions about me, you will have to contact the Federal Bureau of Investigation and ask them about the life and times of Corvus. I do not spend my time discussing myself, there are so many other things that are much more productive, like playing around in Google,s servers, and last but not least, freeing up Oracle's source code! Now my young lads & ladies, get yourself busy learning so that you can take my place when I am gone. |
Revision as of 17:38, 20 July 2012
I was born on August 6, 1963. I am an American computer security consultant, and a hacker. Not very long ago I was convicted of various computer and communications-related crimes. At the time of my arrest, I was the most-wanted computer criminal in the United States. I grew up in Los Angeles and attended Monroe High School. I was enrolled at Los Angeles Pierce College and USC. I worked as a receptionist for Stephen S. Wise Temple for a while. At age 12, I used social engineering to bypass the punchcard system used in the Los Angeles bus system. After a friendly bus driver told me where I could buy my own ticket punch, I could ride any bus in the greater LA area using unused transfer slips that I found in the trash. Social engineering became my primary method of obtaining information, including user names and passwords and modem phone numbers. People just loved me and how charismatic I had become while growing up. I first gained unauthorized access to a computer network in 1979, at 16, when a friend gave me the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. I repeatedly broke into DEC's computer network and even copied their software, a crime I was charged with and convicted of in 1988. I was sentenced to 12 months in prison followed by three years of supervised release. Near the end of my supervised release, I hacked into Pacific Bell voice mail computers. After a warrant was issued for my arrest, I got the hell out of dodge. As a result I became a fugitive for two and a half years. If you were to ask the U.S. Department of Justice, The would tell you that I gained unauthorized access to dozens of computer networks while he was a fugitive. I even used cloned cellular phones to hide my location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies. I was so damn good that I also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail. Even the FBI fell victim to my endeavors> This is how I was able to stay ahead of them for as long as I did. Those other people should have just kept their asses out of my business, now under the guise of a national renowned security consultant, I spend large amounts of time planning my revenge. It was largely because of other people that I was apprehended on February 15, 1995 in Raleigh, North Carolina. I desperately tried to deny who I was, but I was found with cloned cellular phones, more than 100 clone cellular phone codes, and multiple pieces of false identification.
If you have any questions about me, you will have to contact the Federal Bureau of Investigation and ask them about the life and times of Corvus. I do not spend my time discussing myself, there are so many other things that are much more productive, like playing around in Google,s servers, and last but not least, freeing up Oracle's source code! Now my young lads & ladies, get yourself busy learning so that you can take my place when I am gone.