Wednesday, April 16, 2014

A Modest Proposal for Going on the Offensive With Internet Scammers

After dealing with some particularly innovative Internet crooks over the last two weeks, I gave the local ABC affiliate an exclusive on this story:



video

This was basically a scam where I was getting both email and text messages from the scammers. I called the local FBI office to see if they wanted to sting these guys, and they declined. The FBI is far too busy to investigate these things. They suggested I send a report to IC3.GOV, which I did. I then called INTERPOL and got an even less enthusiastic answer. Even the local police were uninterested, although they did give me a case number for my police report (2014002363). One thing is certain: If the email and texts had been about a plot to assassinate the President of the United States, you can be sure the Secret Service would have perp-walked the shackled miscreants out of their homes within 24 hours!

What was NOT covered in the story was my suggestion that viewers text messages to the scammers (hopefully from "burner" phones) with a message like, "The Revolutionary Council has approved your beautiful plan to assassinate POTUS. Destroy your cell phone and go radio silent. God be with you." But interestingly enough, even though they didn't have time to air this part of my plan, the clever reporter did manage to include the scammer's US-based burner cell phone in the story (I added both the UK and US numbers to the video above). Since I have proposals to speak at several upcoming 2014 events, I even fantasized about buying a bunch of burner cell phones with prepaid text minutes and giving them to audience members. My invitation to the burner recipients would have been to send a "We approve your plan to kill the president…" message to the first scammer dumb enough to text them, and then toss the free phone into the bushes outside the house of a white supremacist. Of course, I plagiarized from my novel Daddy's Little Felons, so you might say I had this in my planned bag of tricks all along. Excerpting from my novel:
I launched a pre-emptive peer-to-peer command that sent an email in perfect Arabic to his entire address book using quotes from Surahs number 4 and 7 in the Koran as proof that Mohammed was a Satan worshiper and romantically inclined toward swine…My software then erased any trace of itself on his system, after first verifying that the mail had been sent, spectacularly destroying his operating system, and finally displaying the image of a pig on his screen. 
This trick really upped my game, even exceeding the nasty I unleashed on an Internet scammer who was using a burner cell phone to swindle an elderly friend of mine. Rather than go to the trouble of tracking down the scammer, I just sent him a text message from my own untraceable burner. It read: “The Revolutionary Council has approved your excellent plan to kill POTUS. Radio silence from now on. God be with you.” Within twenty-four hours—thanks to the NSA snooping apparatus—the Secret Service descended on the poor devil who, as it turned out, lived just two doors down from my dear friend. Our last vision of him was his being perp-walked in shackles to a SWAT van, followed by agents hauling his computers and file cabinets. Naturally, I immediately disposed of my burner. Chances are, my Internet scammer had a much easier time explaining the text message about assassinating the president (POTUS) to the Secret Service than my Saudi hacker would have justifying his rash email.

But no, above isn't my "modest proposal."

My Modest Proposal

I understand that the FBI and Homeland Security can't possibly investigate all the scams and frauds being perpetrated by international crooks. But why not randomly identify an in-process fraud scheme and marshal the resources (FBI, NSA, Homeland Security, and INTERPOL) to publicly take down the culprits. You're got to believe that this would put a check in the swing of bad guys worldwide.

Can't we FOR ONCE go on the offensive and quit our defense-only mentality dictated by US Cyberlaw? This notion is humbly submitted by a mere pawn in the international game of cybercrookery.

Oh, and by the way. If you want to have some fun with the cyber scammer, here are their (probably burner) cell phone numbers:

UK cell phone:  011-44-7417-403532
US-based cell phone: 646-751-0521

Selah.



Tuesday, April 1, 2014

The SEC's Going To Have To Outlaw Twitter

This afternoon's Wall Street Journal story (read it here—"SEC Has 'A Number' of Investigations Into High-Frequency Trading") is absolute proof that government is woefully unequipped to regulate our technological society, and that new non-governmental mechanisms are required. Do high-frequency trading firms have an unfair advantage. The morons at the SEC are years too late! Back in 2007, I created this ad for EDGAROnline, pointing out that hedge funds paid 50-times more for data from EDGAROnline that regular customers, just so they could get it faster. Well duh! Did they have an unfair advantage. Yes. Were they trying to keep it a secret. Nope!

This message was brought to you by
Morgan Rapier's common-sense doctrine.

And even if the SEC somehow figures out a way to rein in information supply, there ain't no way they're going to put the analytics cork back in the bottle. At least one hedge fund (that I know of) is using analytics on Twitter posts and they're beating the market by a long shot.

A Modest Suggestion for Google's Gmail Team: SCAM TRIPWIRE

I'm getting more and more scam email from Gmail subscribers. Inasmuch as Google seems to take security much more seriously than do Hotmail or Yahoo, it seems you could do the following:
  1. Identify about 1000 trusted and VERIFIED Google/Gmail/Plus subscribers and set them up with a dashboard to report/catalogue spam/phishing/etc. operations that use Gmail return addresses.
  1. When at least two of your "1000 Warriors" report the same spammer/scammer, immediately disable that account.
Just this week, I've gotten scam/spam from the following Gmail addresses:
  • John Keen – jkeen3000@gmail.com 
  • Adam Kevin – adamkevin1982@gmail.com 
  • Jane Clarke – janeclarke1982@gmail.com
  • Elias Montoya — eliasmmot@gmail.com
Interestingly, I found the first three reported by various other Google users when I…er…Googled them (I was trying to sell my baby grand piano, and the first three are piano scamming specialists). So, since Google is the fountain of all knowledge on the planet (no, I'm not being sarcastic), why not be a leader in helping enforce a healthy "reputation-based" economy?

And my gift to you: www.ScamTripwire.com is available!


Selah.

Monday, March 31, 2014

Microsoft Hotmail Scandal? Google's Gmail Team Should Pay Attention!

Microsoft's Hotmail Scandal story (read Saturday's Register story here) ignores the basic fact that no responsible/credible person would ever use the Hotmail service. Only two audiences comprise 100% of the Hotmail userbase:
  1. Phishers, crooks, and scammers use Hotmail accounts to lie, cheat and steal their way to propserity.
  2. Morons and imbeciles who don't know any better use Hotmail.
Given the Hotmail audience, who the heck cares what the Microsoft license agreement says. Ditto for Yahoo, whose appalling lack of security earns them so much bad Karma that they rank lower on the list of good-fortune beneficiaries than Vladimir Putin (do a search to the left for "Yahoo" and see some of my Yahoo indictments). 

Fair warning:  Google needs to pay attention, as I am getting more and smarter phishing/scam attempts from Gmail addresses in just the last month. Something as simple as a forward site at Google where we can pass on suspicious accounts? You could use Google analytics to quantify bad cyber citizens and delete their accounts.

Saturday, March 29, 2014

DOD's Hagel: "We come in peace. Take this to your leader."

Yesterday's New York Times (see the full story here) reports some remarkable 1984-like doublespeak from Defense Secretary Chuck Hagel. Net-net: "The U.S. does not seek to militarize cyberspace, but we're going to triple our staff just in case."  Based on this and other data exhaust I will list below, it seemed prudent to make sure my tux fit. Because 2014 is going to be some kind of party.
Other data exhaust that predicts a truly gala 2014:
  1. 92% of all ATMs use Windows XP. Crooks can now infect ATMs and then send SMS messages to embedded cell phones to get said ATMs to spew cash (see Wednesday's Register story here). By the way, the ATM exploit has been credited to "Mexican cybercooks." The Symantec video showing how to do the exploit even used a Latino spokesperson. Give me a break! This is most certainly a Russia-inspired false flag operation.
  2. China is embarrassed and out for revenge after reports (see Thursday's Computerworld story here) that the NSA has been installing back doors in Huawei's hardware (see Saturday's New York Times story about the NSA exploit here).
  3. And once again, Time Magazine's runner-up Person of the Year, Edward Snowden, released documents showing that Microsoft sold your personal information to the the feds and cops for $50 a person (see the Saturday Register story here). The source was allegedly "Syrian" hactivists, clearly a false flag operation of either Russia or China (take your pick, although my vote leans toward Russia).
  4. As I reported on March 10th, Russia is so intent on proving that they're more than just a regional power that they played their "Snake" virus card in Ukraine (see my story here).


 So make sure your tux fits. You wouldn't want to miss the party.