iPhone Thief Explains How He Breaks Into Your Phone | WSJ

The video delves into the methods used by Aaron Johnson to steal iPhones and exploit Apple's software vulnerabilities to make money, and the consequences of his actions.

Summary

  • Aaron Johnson stole hundreds of iPhones and made hundreds of thousands of dollars by exploiting a vulnerability in Apple's software.
  • Johnson employed various tricks to obtain phones and passcodes, then accessed bank accounts and money apps, locking out the owners.
  • Apple introduced new security software with a stolen device protection setting, but some loopholes remain that users need to actively manage.
  • Johnson shared his techniques which included face ID manipulation and reselling the phones, amounting to thefts between $1-2 million.

Chapter 1

Introduction to iPhone Theft

0:01 - 29 sec

Overview of Aaron Johnson's iPhone theft scheme and the investigation into Apple's software vulnerabilities.

Overview of Aaron Johnson's iPhone theft scheme and the investigation into Apple's software vulnerabilities.

  • Aaron Johnson is incarcerated for stealing iPhones and a large sum of money by exploiting an Apple software vulnerability.
  • The vulnerability allowed him to loot victims' bank accounts and lock them out of their Apple accounts.
  • The reporter has been investigating this vulnerability for a year.

Chapter 2

The Thief's Technique

0:30 - 1 min, 42 sec

Aaron Johnson describes his method for stealing iPhones and passcodes.

Aaron Johnson describes his method for stealing iPhones and passcodes.

  • Johnson targeted individuals in bars, watching them input their passcodes or deceiving them to hand over their phones.
  • He would claim to have drugs or pretend to be a rapper to gain access to the victims' phones.
  • Once he had the phone and passcode, he would quickly take control of the victims' Apple accounts.

Chapter 3

Victim Selection and Interviews

2:12 - 1 min, 5 sec

Johnson's victim profile and interviews with some of the individuals he stole from.

Johnson's victim profile and interviews with some of the individuals he stole from.

  • Johnson preferred to steal from men under 30, typically those who were drunk and not attentive.
  • Victims shared their experiences of being approached by Johnson with offers of drugs or social media connections.
  • Johnson used various excuses to get the victims to unlock their phones, then memorized or recorded their passcodes.

Chapter 4

Theft Execution and Profits

3:17 - 2 min, 43 sec

Details of how Johnson executed the phone thefts and the profits he made from the scheme.

Details of how Johnson executed the phone thefts and the profits he made from the scheme.

  • Johnson pled guilty to racketeering, revealing his cooperation with others and the use of both trickery and violence.
  • He described the process of locking victims out of their phones by changing their Apple ID passwords and face ID settings.
  • Johnson made significant amounts of money by selling the stolen phones and using them for purchases.

Chapter 5

Exploitation of Apple's Vulnerabilities

6:00 - 1 min, 19 sec

Johnson explains how he exploited Apple's security features and the steps he took after stealing the phones.

Johnson explains how he exploited Apple's security features and the steps he took after stealing the phones.

  • He would add his face ID to the stolen phones, giving him access to the victims' financial apps and accounts.
  • Johnson used the stolen phones to make expensive purchases and then erased and sold the devices.
  • The theft included not only the iPhones but also resale of Apple products bought with the stolen phones.

Chapter 6

Apple's Response and Security Advice

7:19 - 1 min, 18 sec

Apple's new security measures in response to the thefts and advice on how users can protect themselves.

Apple's new security measures in response to the thefts and advice on how users can protect themselves.

  • Apple introduced a stolen device protection setting in iOS 17.3, which requires biometric authentication for critical changes.
  • The reporter advises users to not store passwords in notes, use strong passcodes, and be aware of their surroundings.
  • Despite the new security setting, some apps and features like Apple Pay remain vulnerable.

Chapter 7

Johnson's Reflections and Regrets

8:37 - 1 min, 1 sec

Johnson reflects on his actions, expresses regret, and looks forward to a different future post-release.

Johnson reflects on his actions, expresses regret, and looks forward to a different future post-release.

  • Johnson expresses remorse for his actions and the impact on his victims.
  • He admits that greed drove him and wishes he hadn't taken it so far.
  • Looking forward, Johnson intends to change his ways for the betterment of his life and his children.

More The Wall Street Journal summaries

Can the U.S. Secure a Drone Tech Edge Before China Attempts a Move on Taiwan? | WSJ

Can the U.S. Secure a Drone Tech Edge Before China Attempts a Move on Taiwan? | WSJ

The Wall Street Journal

The Wall Street Journal

The US military is planning to invest in next-generation drones as a strategic move to counter China's military advancements and its potential aggression towards Taiwan.

Warren Buffett Explains the 2008 Financial Crisis

Warren Buffett Explains the 2008 Financial Crisis

The Wall Street Journal

The Wall Street Journal

A detailed analysis of the 2008 financial crisis, its impact on the economy, and the subsequent recovery.

OpenAI CEO Sam Altman and CTO Mira Murati on the Future of AI and ChatGPT | WSJ Tech Live 2023

OpenAI CEO Sam Altman and CTO Mira Murati on the Future of AI and ChatGPT | WSJ Tech Live 2023

The Wall Street Journal

The Wall Street Journal

A detailed discussion on human qualities, the progression of AI, and its impact on society and work.

Inside Nvidia HQ: What a $2T Company’s Office Looks Like | WSJ Open Office

Inside Nvidia HQ: What a $2T Company’s Office Looks Like | WSJ Open Office

The Wall Street Journal

The Wall Street Journal

The video details Nvidia's headquarters, showcasing the innovative design and technology used to enhance employee experience and work efficiency.

The Funding Strategies Behind U.S. Colleges: Stocks, Tuition and More | WSJ

The Funding Strategies Behind U.S. Colleges: Stocks, Tuition and More | WSJ

The Wall Street Journal

The Wall Street Journal

The video discusses how wealthy donors, endowments, tuition, and state funding shape the financial stability and strategic decisions of U.S. colleges and universities.

Trump’s vs. Biden’s Plans to Prevent Another ‘China Shock’ | WSJ

Trump’s vs. Biden’s Plans to Prevent Another ‘China Shock’ | WSJ

The Wall Street Journal

The Wall Street Journal

The video examines the trade strategies of the US towards China, highlighting the similarities and differences between President Biden and Donald Trump, and their potential impact on the 2024 election.