Episode Transcript
Transcripts are displayed as originally observed. Some content, including advertisements may have changed.
Use Ctrl + F to search
0:00
The older generation gives us so
0:02
much guidance wisdom that I
0:05
don't know where we'd be without them. They
0:07
teach us the of the world and give
0:09
us insights. That would take us to
0:11
figure out on her own. The internet
0:13
doesn't have an older
0:16
generation. We're still in the first
0:18
generation of users. It's only been thirty
0:20
years LOL brought millions of people
0:22
online for the first time and ohaio.
0:25
The internet has changed since
0:27
i fear that when there's no
0:30
older generation to guide the younger
0:32
generation on how to be safe online
0:34
there's a lot of kids who will learn
0:37
the hard way i know when
0:39
i was eighteen i screwed around so much
0:41
on the internet the i swear i got a new virus
0:43
on my family computer every week there
0:46
was no one around to show me why
0:48
that happened or how to fix it
0:51
the grammar and dad barely knew how to turn it
0:53
on much less handle these kind of problems
0:56
the schools weren't teaching computers yet
0:58
and when they finally did they taught basic
1:00
things like how to type or used some sort
1:02
of application nowhere
1:04
in the curriculum was anything about the dangers
1:07
of downloading software shopping
1:09
online are going to chat rooms
1:11
that kind of stuff this only taught
1:13
by family my case
1:16
by nobody in fact
1:18
the older generation often relies
1:21
on the newer generation to teach them
1:23
about computers so many
1:25
times i've seen parents asked their
1:27
kids to set up the new computer
1:29
or show them how to use social media
1:32
the teaching parents the dangers
1:34
of social media there's like kids
1:37
the parents street smarts that's
1:40
the world where in because it's so new
1:42
what will the internet look like and twenty
1:44
sixty there will be better
1:46
educated users users who
1:49
grew up with parents who have seen the
1:51
darker side of the internet and can
1:53
warn them about it and show them the dangers
1:56
that , is not here yet worse
1:59
in the age the younger generation
2:01
guiding our lights and
2:03
i sure hope they know where they're going
2:10
these are true stories from the dark side
2:12
of the internet
2:14
this
2:20
is
2:38
Support for the show comes from Bramley. Is
2:40
it just me or does life seem to be getting
2:42
busier? And busier, and
2:45
when we're being pulled from one task to another,
2:47
our head is not always in the game to
2:49
write the most clear messages. Luckily
2:52
grammarly make. professional writing fast
2:54
and simple it's an all in one writing
2:56
so that helps you turn out clear concise
2:59
communication quicker than ever
3:01
and set of being stressed out about it rereading what
3:03
i wrote three or four times i just when
3:05
what i wrote to grandmother which has suggestions
3:08
to make my writing sounds better and look stronger
3:11
and it doesn't just press my punctuation but it
3:13
also detect the tone i'm going for
3:15
in the message and even go so far as to suggest
3:17
a full sentence rewrite to get my point
3:19
across better don't get stuck staring
3:22
out the window all spring and summer count
3:24
on grammar lead to get your work done quickly
3:27
he can get out and enjoy the season go
3:29
to grammar lee dot coms i start
3:31
net sign up for a freak out
3:36
Off. Just for being my listener. That's
3:38
grammarly spell. Grammarly.
3:42
Get 20% off at
3:44
grammarly.com darknet.
3:47
net
3:49
The other day someone found me and
3:51
he was willing to up and share what he
3:53
knows about some online communities
3:56
that I don't have visibility into.
3:57
I'll tell you right now, this episode.
4:00
the that's more of
4:02
a tour of what's going on underground
4:05
groups groups setterholm
4:07
the hackers scammers and
4:09
the oh
4:13
oh what's
4:15
, man man
4:18
much do it the other a name that
4:20
i should refer to you as when i'm talking about
4:22
you on is absurd is only true
4:26
i don't know they were not by that sounds
4:28
like and okay
4:33
the i want
4:36
or did call to use it on apart
4:38
than okay
4:41
it is recording
4:45
so the
4:48
glue did , want like the whole
4:50
story ah or
4:53
it's so or sort of like
4:56
mr tina like robots tina only
4:58
by robots and only a
5:01
phone as you can get discounted roadblocks okay
5:03
sy already on last rob lacks is
5:05
just outside of my peripheral view
5:07
and i don't really get it so i
5:09
need really pause here for a moment do some research
5:11
and i'll be right back oh okay
5:14
so first of all roadblocks as okay video game
5:16
but it's more than that it's game videogame
5:19
platform which gives you the tools to
5:21
make your own video game and if make build
5:23
something cool others might want a complaint to
5:26
a however there's this thing called row bucks
5:28
it's the this game currency of roadblocks
5:32
and some the roadblock games
5:34
require you to pay roll back in
5:36
order to players don't have the threats
5:39
of her
5:40
i think that's one thing to keep in mind
5:42
is that little kids the
5:45
currency and they're going to do
5:47
anything for to have the physical money forced
5:49
into their council wants the money to time you buy
5:51
it was real cash
5:53
yes you bought you can only buy it was real gosh
5:55
oh you can't earn it
5:58
no it's not in atlanta and him or animal so
6:00
the kids wanted and they can pay for their
6:03
kids and parents don't want to pay for the game will have
6:05
time to , go to these websites
6:07
where they can just complete surveys do as
6:11
as them again robot sort of
6:13
already i'm saying
6:15
for abuse here so there's real
6:17
money going in and real money
6:19
coming out of roadblocks because
6:21
if you managed to create a game that people with
6:24
pay to play you can get money
6:26
as the game creator so
6:28
if you can someone will get people to play your game whether
6:30
legitimately or not you
6:32
get paid but on the other side
6:34
is how people are getting roebuck's
6:37
as you said kids don't have money so
6:39
they go to these web sites and they sit there and sell
6:41
out surveys and watch ads to
6:43
get roebuck's and there's
6:46
make money from their cliques and pay a
6:48
percentage to the kids that are clicking the links
6:51
yeah as executive order wanted to see them scams
6:53
to be honest yeah and not all these sites be out
6:55
either so you're kind of actually get
6:57
roebuck's from doing all this work and you
6:59
know as a thirteen year old really wants some roebuck's
7:02
and season often to get some free ones they're
7:04
gonna click a link install some software
7:07
a sign up for something and give their email and phone
7:09
number jews friends had set
7:11
up one of the is it was running google
7:13
ads to make it easier for kids to find a server
7:15
and come on by and click on the the
7:18
earn roebuck's
7:20
modi would say so it was my settlers
7:22
depicted for like and
7:24
on for him
7:27
mcgee a thousand it goes not innocent
7:29
muslims in kills like other call
7:31
them everyday and , very
7:33
cool to see like i'm he's my eighty
7:35
like fourteen fifteen fifteen
7:37
doing this every single day suddenly
7:40
the game wasn't to blame roadblocks
7:43
blame to commodities and monetize
7:46
the kids who were willing to sit and
7:48
watch ads to get role bucks
7:50
and like role bucks that's just a friend
7:53
you can imagine all the tactics to game
7:55
the backend such as cloning a popular
7:57
roadblocks game and then somehow attacking
8:00
original to make it go down so that everyone
8:02
flax to yours because yours now
8:04
you're getting paid roebuck's kind
8:06
of black had strategies that are talked about
8:08
on hacker forums that discuss this
8:11
which is where do and his friend were hanging
8:13
out go to new aged thirty
8:15
dollars or thirty dollars friend both
8:18
north and like okay and making this
8:20
much are you know what was the
8:22
look around on the forums to see what other people
8:24
are doing and that's when they learn about vanilla
8:27
gift cards these are gift cards
8:29
that you might receive well done at
8:31
work for as a presence of some kind
8:34
it's a visa gift card that you can use
8:36
anywhere that accepts visa cards and
8:38
if you have one you might be curious how much
8:40
money is on it people need to check their
8:42
just to the bone so they will go are
8:46
they don't get a lot so what his friends
8:48
did was set up like
8:50
the piece of vanilla gift card sites
8:53
and it had a little form i
8:55
enter your car in order to check
8:57
your bag
8:58
the court on information they have an automated
9:00
trucker detective on according
9:03
and then they sell be card with the cash
9:05
out through various methods like g
9:08
to way or well mine's
9:10
about called
9:12
steele's anyone's gift card who
9:14
enters it in but of course nobody
9:16
would go to this page since it's unknown
9:18
and if you do a google search for vanilla
9:20
gift card balance check you get the
9:22
official visas page as the first link however
9:26
, a way to get your site to almost
9:28
instantly show up above the first search
9:30
results and it only costs one or two bucks
9:32
per click that's by using google
9:34
ads druze friends would spend
9:36
tons of money tons of ads to get
9:38
there manila gift card
9:40
balance and checker to show up
9:43
as the first link when you google
9:45
for it to know that it was going
9:47
to
9:48
or least they're not trained to notice that a quick the
9:50
vs on the press on the are sufficient
9:54
onto their card details see their balance
9:56
and before they can spend it's can card is
9:58
emptied by druze
10:01
of course jews friends aren't the only ones
10:03
feeling cards this way there's a whole group
10:05
of people who have made dozens of web sites
10:07
for all the various gift cards to try
10:09
to get anyone who's checking the gift card balance
10:12
to click the link the
10:14
most of the i've done this i've , involved
10:16
in this one for the longest i've ever been involved
10:18
in anything for yeah it really disappoints me the
10:20
most seven i've been to participate
10:22
or this have been a spectator
10:25
, bad day or
10:29
years now is like everyone
10:31
now is i everyone a patriot yeah
10:34
to hear could no longer stand
10:36
by and watch his friends make thousands of
10:38
dollars from a little bit of work he
10:41
learned how to clone a website which is really easy
10:43
and set up his own phishing sites and you started
10:45
running google ads himself to try to get people
10:47
to give him cards which is
10:50
horrible
10:54
and it totally sucks to have someone steal
10:56
your card in this way but
10:58
why are people answering their gift
11:00
card details on details random side come
11:03
on so
11:06
drew is running the scam for while and it's giving
11:09
him some extra money but he had a gambling
11:11
problem anytime he had access
11:14
card the go online and try to double
11:16
or triple or quadruple it that
11:19
a lot of people in this community have gambling problems
11:22
so even though he was making some money
11:24
as a teenager it was gone
11:26
like immediately and so he starts looking
11:28
what else he can get involved with so he can make
11:30
more money that's , he came across a
11:32
forum called oh gee users
11:36
this , forum where you can buy and
11:38
sell social media accounts instagram
11:41
accounts snapshot accounts kick
11:43
skype username it noted
11:45
that put other accounts to like pro blocks
11:47
accounts another video game a chance he
11:50
was one of the early wants to join oj users
11:53
some sort of a loser
11:56
and for those know this is my his
11:58
promos some
12:01
really early of honor this form or look reputable
12:04
is lisa modern forms modern
12:07
boehner and
12:09
vouchers and only been there been there you
12:11
can accumulate anyone
12:14
so basically i'm on a form and us or
12:16
manually may he's heard him center's bad like
12:18
i'm ignorant and , have brains
12:21
on kick a cell is people like
12:23
any particular because i talk to their rosters
12:25
they will call so the people who were already
12:28
on odie users beforehand were
12:30
making some pretty good sales for instance
12:32
if you have a short catching username on
12:34
twitter a cause for more money and i've
12:36
talked about ot users in the past and
12:38
other episodes and how horrible and can be
12:41
do with seeing how people were making money selling
12:43
cars so he just decided to go on
12:45
take it and find some clever sounding
12:47
user names that weren't registered yet and
12:49
just to register them and then try to eighteen
12:52
dollars each for his listings
12:54
weren't selling but the other users on
12:56
the forum saw what he was trying to do
12:59
any was trying real hard to make money and
13:01
they wanted make sort of drama bone drama
13:03
we started buying now
13:05
creating a new user and kick and trying to
13:07
sell dunno it's not illegal
13:10
it's similar to buying it and
13:12
trying to sell it
13:14
what what's up the of is is gonna turn extreme
13:16
for off it can be attributed
13:18
minutes is going to be miserable than on our say
13:21
oh it starts off producing seems
13:23
like a can mimic like got
13:25
any know i gotta i gotta earn
13:27
about i gotta be no the court for my birthday
13:29
present swift the money the has
13:31
he goes on odie users to try to find
13:34
some something that he hoped for
13:36
our
13:38
and you find a really good user name for
13:40
price that was pretty low
13:43
this trying to quit sword because they needed the
13:45
money instantly and
13:48
noble or that is broke for ,
13:51
me what i'm bored of people have nice isn't it and
13:53
they go broke nestled username to get some money
13:55
back several how can there
13:57
to sort of disorder really as i saw two hundred to
13:59
me and at
14:01
is
14:03
the lot of user names have the at symbol
14:05
in front of them so they just certain the
14:07
to add on these forums i saw some
14:09
for like three hundred
14:11
no no me on to the doors and it it
14:13
i'm , little forty nine of
14:16
course the
14:17
is once you get one taste
14:19
of the potential you get
14:21
hooked it's like blood to a sack
14:24
and so he goes deep the
14:26
users trying to snipe more
14:29
sell them for higher and along the way
14:31
he learns more about
14:33
there's works or oh
14:37
it was it was costs of lots of
14:39
chocolate not be some something it's
14:42
interview take any confusion for money goes
14:44
to another but with permission to
14:46
do this in an old my question does people can manually
14:49
take the comp of reclaim it what he's saying
14:51
is suppose the account you want to
14:53
oh and if you buy it there's a chance the account
14:55
holder can contact like instagram
14:58
support or whatever and recover their account so
15:00
what a lot of people do i know to users as
15:02
as soon as the by a stolen user names they
15:04
changed the user name to something else this
15:07
makes it so nobody has
15:08
now and you can just register a new account
15:11
with that username so you can abandon
15:13
the account you just bought because of somebody recovers
15:15
it's and gets or old account back it'll
15:17
have a different user name and a won't be the same
15:20
as what they used to have but here's
15:22
the problems every one every one users
15:24
sees when someone buys a stolen user
15:26
names and they know you're gonna change the
15:28
user name the a new account with
15:30
that username
15:31
so what up to is still try to snipe
15:34
that account from you by constantly
15:36
trying to create a new use that name
15:39
hoping that when you change it to get it before
15:41
to make a new when there's an internal
15:45
for a sale happens on owed user
15:47
some people lose their account right after they
15:49
bought it would only because
15:51
central this is of an automated system gonna offer
15:54
reclaimer or turbo israel the same
15:56
thing turbo is the
15:59
original import the turtle
16:01
the impure and the
16:05
has the hadn't if there's no trusting anyone
16:07
trusting these groups seriously there's like a constant
16:09
barrage of users trying to hack
16:11
users it's endless people
16:13
would own from a different skin
16:15
so the guy like twitter he's
16:18
talking about graham ivan clark
16:20
this a guy who hacked his
16:22
twitter elon musk joe biden
16:25
that your account
16:26
posted a scam two people
16:28
to send him bitcoin graham was
16:30
in these groups before he was arrested
16:33
if he or she was a simmer
16:35
she will limit people's people's service you'd call
16:37
people and told them
16:39
told them britain's committing fraud so when people
16:41
by accounts and ot users they can you the
16:44
do it what ground
16:46
hoarding certain accounts to people to
16:48
try to get their accounts frozen just
16:51
a grief people and sort of attack the community
16:53
he was part of zealand to that
16:55
conclusion blood oh she's just
16:57
committing fraud or did on this
16:59
article
17:00
under a team like down a diverse images
17:03
on stream the twitch streamer
17:05
popular for playing fortnight most
17:07
followed twitch channel out there and israel they're
17:11
blevins open to different
17:13
they're like you want to do something fun you like
17:15
they want to how coming from know the
17:18
into people and a minister going to limited with
17:20
tom they visited their niche actually dog
17:24
the i'm totally plugins oh
17:27
my i'm not a coverage from chicago like
17:29
goes down this point you're
17:31
not i can put this
17:35
is not limited to that's
17:37
internal method
17:42
the only a limited time
17:48
not a lot of one inflict where
17:50
did you think
17:53
but it on
17:54
them they actually wanted people's
17:56
wanted people's service like of yoga
17:59
to someone who you don't read
18:01
about them which means you can send emissions action and
18:03
then take them whatever i
18:05
, a very the causal causal would
18:07
on by things that that that had
18:10
the upper body forbidden to take the money back and get
18:12
back product so
18:14
if the i can always been for thousand dollars
18:16
start enough i particularly
18:19
hate charge backs because the victim is so powerless
18:21
in that situation
18:22
if someone steals your credit card and buy something
18:25
online until the credit card company hey
18:27
i didn't make this purchase please reverse it and
18:29
a credit card company will do what's called a charge
18:31
backs the take the money back from
18:33
what was sent to the merchant
18:35
that they send a merchant a fifteen dollar penalty
18:38
so that can be abused people
18:40
can buy things get the item that they wanted
18:43
and then as you would charge back and the credit card company
18:45
will side with the cardholder almost every
18:48
time anyway this this
18:50
another example of how people in these
18:52
communities attack each other and in fact
18:54
over the course of it's existence be owed users
18:56
website itself has been breached
18:59
at least three times exposing
19:01
all the data on the users who are registered
19:03
there and since drew was amiss
19:06
that meant his accounts had been in a few
19:10
so i have to ask you now have you been by
19:13
any okay so than
19:15
slim but people for thousand
19:17
on sunday those little are among friends
19:19
you been scammed by for ten thousand
19:21
dollars how
19:24
did you end
19:26
the a big is inviting of
19:28
anything i've ever seen those
19:31
were he criminals criminals have no boundaries
19:34
earlier for an enemy the
19:37
present study that's it the
19:39
origin of the have no origin of their
19:41
mouth president obama
19:44
didn't criminals are nice would you rather criminals
19:47
so they will it's what you they will
19:51
the dogs which is often the
19:55
literally
19:57
i'm do anything like it was what you nc
20:02
and will do to your own from they
20:04
would be sword you a
20:07
wallet the new
20:10
grammar going to pull your ssn and i opened
20:12
alone those
20:15
, like the fundamental i think i say
20:17
so it sounds like you that docs us
20:19
are many times times least
20:22
three times so is full
20:24
details were exposed and of course
20:26
that land and
20:28
a wanted to extort him contacted
20:32
him and threatened him don't
20:34
, are going into
20:38
cupboards don't into cupboards to me this much
20:43
there are pointed ammonia
20:45
like i'm the meet with murder or
20:49
the what you mean it right
20:51
the instagram name on you the
20:53
a new period
20:56
okay so you write their name on your forehead
20:58
and then take a picture show us
21:01
, i'll do whatever you want want
21:03
fix introduce fix known as much
21:06
as
21:12
on honor and moment no
21:14
little more consequential things like hello
21:17
they've been so you're printing or cybercriminal
21:19
it
21:23
you know
21:30
don't normally
21:33
, get
21:35
or in against the do
21:37
was hit with his and he didn't want to tell his parents
21:40
so he just sent them some money and they money
21:42
away but there was another time
21:44
when he was scammed which was even
21:46
stranger well all this was
21:48
even he still playing roadblocks rights
21:51
and fact that this point he's made his own game
21:53
with his friends any wants to attract some users
21:55
to the game so that he could buy the
21:58
and make some of those rollbacks the
22:00
had a little game going and it was all set up
22:03
but it just didn't have many players
22:05
so you wanted to shoot him on robots to the front
22:07
page so you get more players see make
22:09
more money
22:11
do you do it when you're a conniving
22:14
teenager you find a way to
22:16
falsely inflate the numbers to make your game look
22:19
more popular so people joined basically
22:21
if you bought mimics are human empathy is
22:24
so is it would you wanted
22:26
to do it enough didn't exist
22:28
join the game but he didn't have a
22:31
the city hired a service
22:33
like a roadblock spot master
22:35
kind of thing someone who specializes
22:37
in getting more players and euro black servers
22:39
for a fee
22:41
the real players at all they're just spots
22:44
but you didn't have enough money
22:46
the person so it's friends gave him the
22:48
money to pay this guy so he gets
22:50
his friends money and paste this bought master
22:52
a few hundred dollars to turn it on the
22:54
by master take the money but doesn't
22:56
deliver users to his game instead
22:59
do things the screen sharing
23:02
one day he accidently revealed something
23:04
that identified who drew really
23:06
was and this essentially men the
23:09
bot masseur new druze real
23:11
name and identity and address
23:14
so instead of sending him bots in his game
23:16
the bought master tried to it yeah
23:21
hundred dollars or all make your life hell and
23:23
this
23:25
i proceeded to show druze real name and
23:27
address and said listen pay
23:29
going be sorry i know where you live surrenders
23:36
other and surrenders
23:39
are from your special underneath my know
23:44
dirty users for us hacking
23:47
so okay so what he got was some
23:49
empty flat boxes from
23:51
the united states post office now
23:53
if you go to us p s stock
23:55
of and to click shop and then priority
23:58
mail all the priority packaging
24:00
supplies are free tv
24:02
just as many as you
24:05
and all for the shipping and
24:08
because he didn't pay that batman hundred
24:11
dollars yes for have
24:13
you in the mail okay
24:16
that's a little spooky but
24:18
no big deal right
24:20
and and to , are
24:23
are , and coming home and school
24:26
like a this school like a like
24:29
entire front your home
24:32
from situation
24:34
, says to there were like pallets
24:37
of boxes they filled up his entire front
24:39
porch and the walkway and there were
24:41
even more stacks and stacks of
24:43
flattened us peek box priority
24:45
mail boxes were at his door and
24:47
there were
24:49
as you can imagine being a fifteen year old kid
24:51
seeing this you get scared we
24:54
either and so his dad wasn't home
24:56
yet drew had a think quick coach
24:58
of amid orchestra
25:01
random place like of is is is very illegal
25:04
and don't regret this more bleed
25:06
mom as , and
25:08
as randomly nearby like only only
25:10
takes pride upwards of three hours by do
25:12
by myself as carrying running
25:14
with these back it is trying to put them all it wouldn't
25:17
put them in wouldn't latest next
25:20
well i mean at least his dad didn't find
25:22
out but by it was
25:24
at a long time messages
25:27
that you're getting of like do this for me
25:29
the more boxes or
25:31
the reason detroit
25:33
, you back or get more boxes and and
25:35
thousand be in contact my father
25:39
are you pay you what how much did they were
25:41
did the one with over the years says
25:44
only around fifteen years old at the time and so he
25:46
tells them that doesn't have five hundred dollars
25:49
and he doesn't even know where to get five the dollars from
25:51
that
25:52
matter to whoever was doing this ama
25:54
desert exploits sixteen year old kids
25:56
they're like like , there
25:59
and after
26:00
in send them more money they sent
26:02
him another order of ten thousand
26:04
us p s packing boxes to was house
26:07
once again he sees them as hes walking
26:09
home from school one day and is like
26:12
oh man not again before
26:17
throwing as many as he can under his arms
26:19
and running them to a nearby mc piece of land by
26:21
a lake and
26:23
them all away before his dad got home and
26:25
again his dad didn't find out about
26:27
this but
26:29
this time someone was walking
26:31
around them all these boxes
26:34
and
26:36
shipping labels were still on
26:38
a few which had druze name and address
26:41
the old the homeowner sufficient advisor much about
26:43
sir david
26:44
the come to the house relic why you
26:46
know much about then
26:49
i'm like okay this
26:51
is that of course hears about though
26:54
she's in and drew gets the
26:58
biggest for was referred to move us posted back to
27:00
the house like
27:03
they will get unbelievably sore
27:05
like there ,
27:08
so much weight to move but
27:10
on the damage was the damage been grounded for monson
27:13
not like know computer even
27:18
are probably almost my life i
27:20
had to him but bosses every single
27:22
weekend defended or cycling been
27:24
colors and we the full retard road with
27:27
boxes like to
27:29
the brim with both if like stocked up on sex
27:32
when in the recycling bin i
27:35
, across most likely to split it up
27:37
months and months at
27:41
the box
27:43
that kind of like a knife to like a
27:46
rings and i'm so we could maximize the amount of of
27:48
sphere cycle this would have taken forever
27:50
right yeah ans the thing is did
27:53
you come clean or to your dad and say actually
27:55
we were trying to you know
27:57
falsely inflate our our
27:59
brother
28:00
our server and so we pay this guy and
28:02
i can backed us afterwards
28:04
, dude that he never knew but additional
28:07
risk i knew what was your to touch it on
28:09
same thing like it was this it
28:11
was a complex story for
28:14
your forehead teenage sons tell the dad
28:16
like i deserve the reason that hollis
28:18
said suspense it
28:20
like will sell it to me a third time because
28:23
i'm not getting is it's simplicity
28:25
to theory are forty five minutes the
28:28
they're doing it myself again imagine how many times
28:30
yeah exactly well
28:34
that i think that so you're
28:37
able to laugh at it now are you still a
28:39
good
28:41
it's hard to what i find it obvious they
28:44
do that but
28:47
it is why is a lesson you learned from that money
28:51
on bristol don't what
28:55
the opposite oh
28:57
let's talk about that for a second a
28:59
little zippers are still my favorite
29:02
beatle reading the
29:04
, how what are the tracks the not be
29:06
docs above above
29:08
is around are talking
29:11
the a person by another teenager
29:15
or so if you wanna avoid
29:18
my they supposed to you is don't screen
29:20
share anything cause you actually
29:22
screens or something it's too revealing
29:26
do you think that you are i'm concerned as this
29:29
year and are overruns name's don't
29:31
mean to concerts or of don't leak accounts tier
29:33
to score liquor spot if spot if can see we're
29:35
for the couples you enter when
29:39
was it was a persona and on ontario's
29:42
the same the one of your emails only
29:46
you could do ruslan
29:49
chagaev common as
29:52
outdoors person yeah and
29:56
just don't trust people my like can
29:59
be your friends but the me like i
30:01
can shared and because you think they're harmless would never
30:04
, with an affront to become two years on the net
30:07
net be anything and don't
30:09
like guns that i always don't
30:11
don't drive you order yeah
30:14
i so and
30:17
you learn from this what else did you learn from cardboard
30:19
boxes from
30:22
the the article
30:26
but there's a moral things
30:28
like i'm why , both
30:30
of these people in are like i
30:32
make no money the automobile
30:35
me to lose and , on
30:39
on more like on where are
30:41
my prayer i'm always been
30:43
a very good soon school like a voice
30:45
against correlate seriously drew
30:48
was realizing that the community
30:50
the was involved with
30:51
the pretty toxic not good
30:53
for society but he didn't
30:55
cut himself the back
30:59
in these forums and just
31:01
a study them and watch them yeah
31:05
yeah i mean the coming out and saying
31:07
hey guys if
31:09
you why i
31:12
don't like the commute the
31:15
they
31:18
could i would the want to discuss
31:22
on the arm
31:25
so detrimental on
31:31
i'm i'm looking to the
31:35
community amo i want to document
31:38
on it and one day aren't
31:40
we would know foreigners in realize like own
31:43
pocket , unit was when it arrives
31:45
on just like my years as like a good
31:47
as well for some
31:50
reason this hits me in a weird way
31:53
when i was a kid on the internet the and
31:55
it was very difference and
32:00
they were therefore it i'm talking about
32:02
the where's seen muds aol
32:04
chatrooms freaking cracking and
32:06
just hearing this noise by itself brings back so
32:08
many memories
32:13
and would pack of that as the good old days
32:16
despite everything being a thousand times harder to
32:18
do back then because the term user friendly
32:20
didn't exist yet it still felt
32:22
like simpler times
32:24
what was happening online was innovating
32:26
a thousand times faster than the clunky
32:29
outside world being online
32:31
celts counterculture and new things
32:33
would cancel it be springing up like napster
32:36
hacking groups and the pirate bay and
32:38
police and major media corporations
32:40
couldn't figure out how to stop us there
32:42
was so many times we were laughing at authorities
32:44
for how ineffective they were at policing
32:47
the internet
32:48
q the kids if we're going through their teens
32:50
today and part of the online
32:53
counterculture is this
32:55
what they're going to look back at as
32:57
the good old days
32:59
are these the kinds of stories that was see
33:01
them into who they'll be later in
33:04
life maybe we
33:06
don't know how it's going to end up
33:08
for them when it's like they're
33:11
going through a similar painful
33:13
crucibles just as i did this
33:16
with all gas and no brakes
33:18
the with us because after the break you
33:21
start naming names
33:29
i want to break for a moment until you got another podcast
33:31
i think you'll enjoy if you were able to know
33:33
exactly what goes on behind closed doors
33:35
would you really wanna know that's
33:38
the central question of two codes news podcast
33:40
listening in starring the marvelous
33:43
of mrs may's all's rachel brosnahan
33:45
listening in follows julia a lonely
33:47
writer and recent new york transplants who
33:49
one day expenses a glitch in her
33:51
home speaker systems that starts transmitting
33:54
conversations from her neighbors apartments
33:56
but my begins as of voyeuristic method of
33:58
procrastination soon the balls into a situation
34:01
with real world consequences julia
34:03
quickly realized that she doesn't know who can
34:05
be trusted and makes that are mission to uncover
34:08
the truth and she learns that nothing
34:10
is as it seems from the makers
34:12
of last known position and soft voice
34:15
listening voice listening a uniquely modern
34:17
mystery thriller available now on
34:19
the queue code network or wherever you find
34:21
podcast check it out to show called
34:23
listening in
34:28
okay so some lessons learned some things
34:30
they're of what's and asserts let's get
34:32
into another story here so what's and other
34:35
thing you've seen the way to make money
34:38
nine i'm listening
34:42
they don't little i think it's journey for now let's
34:44
let's get into some swapping then look at on
34:46
was sinful okay so by
34:48
this point you probably know what same swapping is
34:50
but if not i'll be real quick seem
34:53
swapping is when someone tricks the phone company
34:55
to move your cell phone number it's had
34:57
their phone just like when you get a
34:59
new cell phone you need to tell the phone company that
35:01
you have a new phone and that you want your number to
35:03
work on that now it's sin it be
35:05
possible for someone to just take your phone
35:08
number but there are ways it can
35:10
be done the first way is
35:12
going to sound obvious to return
35:14
insider the company's normally i will be
35:16
boy many or manager
35:19
to give you their logan or to
35:21
this to spots where for no one's looking
35:24
the you doing an imaginary customer
35:27
insiders our own frequently
35:29
paid about a dozen or spurs off and
35:32
this is the a getting a simple thing is
35:34
awesome topic started
35:35
okay so that's one way to do is some swap
35:38
obviously if you're a manager of a mobile phone
35:40
store you have the ability to do
35:42
that and if you do that for one
35:44
of these kids you can make some serious
35:46
money easily over a thousand dollars
35:48
per number maybe even ten thousand dollars
35:50
per number there's a new way these
35:52
kids are doing it and it's wild
35:55
sarah leave the is just
35:57
about that the not going to bomb company
35:59
direction the
36:01
the new wave is called a remote snatching we
36:03
know is short for remote tablet
36:05
the you are going to team or team
36:08
was that uses was airing on it was
36:10
a mobile the running
36:12
a take the store managers tablet from his hands
36:15
you run out
36:19
okay again it if you have the store managers
36:22
tablet that the device as
36:24
the rise to move phone numbers so
36:26
it makes sense you in that you
36:28
can do it swap on hamlin but
36:31
, it's not that easy let's back
36:33
up let's push back way up first
36:36
you need to know who the sims swap
36:39
the unifying the target can take a long time
36:41
and the lot of steps and i want to break that
36:43
down
36:44
the talked about them swapping on the show in the past
36:46
such as in the episode called the pizza problem
36:48
and tennessee these are two stories
36:51
where people were targeted simply because they had high
36:53
value user names on instagram and
36:55
twitter okay so that's one reason
36:57
to target someone to get control of the user
36:59
name and sell it on owed users for a
37:01
few thousand dollars but i feel like
37:03
that's old hat now there's a whole
37:05
new crime wave that springing up and
37:07
it is as he prepares himself for our big
37:09
dogs which are organs they
37:12
own wire out my your that you sell transfer
37:15
several banks what
37:17
this is big in this community it's
37:20
really hard to actually do it so first
37:22
they have to figure out a valid log in for the user
37:24
and will get into how they know passwords later
37:27
but for now just assume that they have a working
37:29
use him and password for a bank account and
37:31
so they log into the town's the did
37:33
of new will withdraw it is you at receiver
37:35
or gp or one time thing the
37:38
word with these are awesome
37:41
go
37:44
shopping bags looking crazy awesome the
37:47
thing is that there's a bunch of monuments they
37:49
also requires your real were knowledge money laundering
37:52
you are literally soon as person's money the
37:55
new the point we're nami countries body that's
37:58
extremely hard right
38:00
there's some really savvy people playing
38:02
in that space the easier target
38:04
is going after people who have crypto currency
38:07
because with crypto currency it's stupid
38:10
easy to grab all the money and a wallet
38:12
and just send it to and anonymizing service like
38:14
tornado cash and cash out
38:16
since this is an easier target now it means
38:18
more people are going after crypto
38:20
currencies now
38:22
okay so it makes sense for these kids to
38:24
target people with high value crypto wallets
38:27
that how you find someone with a big fat
38:29
crypto wallet
38:31
well it takes a whole bunch of steps so
38:33
this is a huge market and i i'm
38:35
underground it is but since without a doubt
38:37
it's on people use will be call
38:39
como list or basically
38:42
we database that are password
38:45
an email with for the presence of indie harsh obviously
38:48
like when doing label cracker john
38:50
the river
38:52
and a there one them drew
38:54
a listening for these coms
38:56
with are password that are user cost motive sites
38:59
okay so youve heard of major websites suffering
39:01
from data breaches right where the whole
39:03
user database stolen and if your customer
39:05
one of these sites you might just shrug
39:08
maybe change password and carry on
39:10
hoping that nothing comes back and hits you
39:12
right well this data is golden
39:15
in these circles for you can head over
39:17
to a site like read forums talk com
39:19
or now the that to or crack
39:22
that to these sites post tons
39:24
and tons are full database leaks
39:26
and might cost you few bucks to get it but
39:29
you can download them right there were
39:31
talking major websites that of been breaches
39:33
there databases are right there easy to
39:35
grab sites like adobe the
39:37
ask of voter database theres and episode
39:40
database there apparently a dolfin
39:42
finder the android forums and that's
39:44
just a small example
39:45
the a's inside these database
39:48
dumps could be a bunch of things but
39:50
they typically have typically person's name the
39:52
user name email debut
39:54
their phone number maybe their address and
39:56
then proceeded to proceeded password
39:58
is typically
40:00
in the database which means you can't actually see
40:02
what it is but this is where tools
40:04
come in that can crack password hashes
40:07
it's hard to crack a single harsh
40:09
if that's all you want to do but when you
40:11
have like one hundred million records
40:13
in the adobe database for instance
40:16
you're likely be able to find some hashes
40:18
that aren't very strong and now
40:20
you have a valid usernames and
40:22
passwords for people now
40:24
tik that username or email address
40:27
and cross reference that with other data
40:29
breaches is this person
40:31
reusing passwords are their
40:33
usernames and passwords in the adobe
40:36
breach that also work on netflix
40:40
sadly yes yes
40:42
a lot of people just pick one
40:44
password and then use that on all the sites
40:46
they have account for and so now just
40:49
by cracking a database dump
40:51
you've got access to someone's netflix account
40:53
and this opens up a whole
40:55
new massive markets in the underground
40:58
communities people will buy netflix
41:00
accounts for two dollars and fifty cents
41:03
because that's obviously wage deeper than
41:05
paying the eighteen dollars a month for a premium
41:07
subscription or it's once
41:09
interest with netflix to
41:11
walmart triple a nordstrom only
41:14
fans sir shark nord vpn
41:16
macy's credit of owings coffee
41:19
jones their sites you can go to to
41:21
buy user accounts for any
41:23
of these websites and you
41:25
might even get a combo pack for a bunch of log
41:27
in say ten dollars for the you
41:32
to edge of in now
41:35
you're stumbling into the to use of the mystery
41:37
burrito orders that people are reporting on
41:39
the supposedly sub reddit you
41:41
can download ad supposedly app on your phone
41:44
and use it to order food but the app
41:46
is often connected to your credit cards see
41:48
you can use someone else is supposedly
41:51
accounts to order a burrito for
41:53
you
41:54
and then they pay for it the same
41:56
goes with papa john's free pizza
41:59
if you have
42:00
the aalborg in someone elses account and
42:02
this enters us into the world of pizza plugs
42:05
which i've been watching closely for while
42:07
it's kind of mythical there's
42:10
these chat rooms where you can go
42:12
and make and food orders such as
42:15
three large pizzas and someone
42:17
in the chat rooms will take your order and ask
42:19
you for like five bucks and then they'll
42:21
use they'll stolen pizza account
42:24
to login create the order
42:26
and then send you then pizza it cost
42:28
them two or three dollars to buy the count the
42:30
make five dollars from this you get three
42:33
pizzas for five dollars and
42:35
of the account holder is the one who's
42:37
paying for it
42:38
i'm telling you this goes so much
42:41
deeper than i have time for oh
42:43
and the window for buying and selling these volleyball
42:45
games is just logs so
42:48
there's a whole bunch of people out there looking to
42:50
database dumps trying to find valid logs
42:52
to as many places as he can so they can
42:55
sell these logs for profit images
42:57
are suing doted on and for at the computer
43:00
connected apple critical for is because the borders
43:02
which were featured on with his aunts
43:05
that an order that it is five hundred a day
43:08
a really popular one going on right now is
43:10
hilton honors loggins because
43:12
these
43:13
i can get you a few nights stay in a
43:15
fancy hotel for free
43:17
okay so there's two types of accounts
43:19
you can get essay and an
43:21
essay that is full access
43:24
and known full access all the counts
43:26
we just listed are basically nfc non
43:28
full access a full access account
43:31
is one that has all these volleyball
43:33
games plus a valid email
43:35
account blog
43:37
that means if you can get into someone's outlook
43:39
or the email then you can easily reset
43:42
the password for any of these other accounts that
43:44
you want to get into and it really does
43:46
give you full access into someone's
43:48
digital life there's little tool that people
43:50
use at once again in the someone's email account
43:52
they can quickly search through all the emails to see if
43:54
there's anything of value in these emails
43:57
schedule richer the printer does this
43:59
it all my good sir to the key terms
44:01
of the ah the whatever you want
44:03
to percent of there he was your
44:05
signed up for mx or america
44:08
were to pull their
44:10
then you just use on the
44:12
dotted rendered to see yeah three
44:16
the number complex
44:17
you don't have essay accounts to
44:20
you can just take a database don't and converted
44:22
to convalesce this is just a format at least
44:24
showing username coal and password and
44:27
you can take this combo less than have a tool just
44:29
automatically try logging into tons of
44:31
sides to check of the password works
44:33
anywhere memory usage for such as centered
44:35
and be a a complaint or superbowl thereby
44:39
automatically check or convalesce
44:41
that is not a manual process and go that are
44:43
with by doesn't cpm which means it was a five
44:45
thousand times per second what it and
44:48
the bottle upwards of eighty
44:51
five thousand wanted a on the shops i
44:53
personally can see because he was shot
44:55
stalkers and shoppers you can
44:57
talk on me shows are getting per day i've
45:00
seen people so upwards of and
45:02
don't need comforted through doors for video we're
45:04
going the got those notes
45:06
okay so now is should be clear how
45:08
someone can get a bunch of valid
45:11
loggins to various sites okay
45:14
but i only wanted to sail that because that
45:16
will help you understand how we find someone
45:19
who has a lot of crypto currency to
45:21
target the most popular did was have
45:23
ever seen in my years of being here you
45:25
want your database
45:27
ledger is a company that provides physical
45:30
code or source for bitcoin well
45:32
what does it say about some of the by a legend lot the
45:35
bitcoin the nearby bombs
45:38
and superbly target for at the don't move
45:41
very interesting letter
45:44
is a physical crypto wallet
45:46
in in twenty twenty the user database
45:49
was breached five months
45:51
later the database was posted to
45:53
raid forums in the database
45:55
is email name physical address
45:58
and phone number know passwords or
46:00
crypto keys were in there the with
46:02
a little crossroads thing one
46:04
can take the email address from the ledger
46:07
database and see if it matches
46:09
any emails and another database
46:12
and , they're seeing as there are any
46:14
known passwords for that email
46:16
address then you can try
46:18
plugging that email address and password
46:20
into coin base or finance
46:23
or crack in or spx in gemini
46:26
or any crypto it seems to it
46:28
if it's a valid login and these are
46:30
all crypto extremes where people keep their crypto
46:32
currencies and of course if you know
46:34
someone's username and password out password crypto
46:36
exchange it means big
46:39
trouble for them
46:40
there's a few safety checks that these exchanges
46:42
put in place to thwart kids
46:44
like this
46:46
there's there's a lot of value just
46:48
knowing if the person is registered
46:50
at a coin base forget about
46:52
their password for a second is this email
46:54
even registered here and if you type
46:56
in someone's email address and a bogus
46:59
password it won't give you any
47:01
clue and whether that email is registered
47:03
they're nice
47:04
however if you try to sign up for a
47:06
new account with an email address that already
47:08
exists
47:09
in bingo coin base will tip
47:11
it's hand and say that email
47:13
is already registered here so
47:16
this is how someone can take the ledger database
47:18
dump and figure out who has accounts
47:20
on queen bees or gemini are cracking
47:22
of finance or wherever and
47:24
then cross reference that with other
47:26
database dumps to try to figure out what's
47:29
the password is on those costs
47:31
now if a thief has a valid email
47:34
and password your crypto accounts
47:36
are still a big hurdle in the way to
47:39
f a
47:40
all the crypto exchanges require you to enable
47:42
two factor authentication the
47:44
urge you to get something like google authenticator
47:47
or authy which is an app on your phone
47:49
that has a six digit number that you have
47:51
to have in order to log in but
47:54
at the bare minimum they'll send you a text
47:56
message with the six or seven digit code
47:58
to lock in so just
48:00
having a user name and password isn't
48:02
enough to get into someone's crypto count you
48:04
also need that to ask a
48:06
code in the fast majority
48:09
of coin base users the
48:11
heck based codes
48:14
then you see where we've arrived no well
48:18
i wanted and corners of millions of dollars
48:20
that know that's where this new seemingly was coming from
48:22
there the comments from databases
48:25
the you to quit it is automated then
48:29
we get the counter medicine for them there's
48:31
it's it's mostly profitable the
48:33
old is arguably the most horrible thing you can derail
48:36
now at this point we have enough information
48:39
to some swap the target we
48:41
know they have a ledger wallet and we
48:43
know they have a queen bees account and we have their
48:45
username and password all that's
48:48
needed now is to take control of
48:50
their phone number so that we can get
48:52
texts so that we can login
48:55
while this might be enough to sim
48:57
swap someone the thieves
49:00
take this step further to
49:02
try to figure out how much as in the accounts
49:04
before same swapping someone only
49:06
registered in a bleak midwinter tell you this but
49:09
there was an expert include this or about one month
49:11
where you could check the balance of any valid password and
49:13
username the beach no matter what he
49:15
didn't need of any sort out as except
49:17
is your password see to need assumed undefeated
49:19
else the people is when millions
49:22
upon millions of combos combo us
49:24
through point eight selma
49:26
millionaires abyss
49:28
there is a million dollars that
49:31
is if you just had just had username and password
49:34
you could see how much was in the users queen
49:36
base account this made it
49:38
crystal clear exactly who to target
49:41
for a juicy same spot
49:43
what you still need that to have a code
49:45
to get in and move the money it's just
49:47
that you didn't need to see the balance for a while
49:50
now i've sort of confirm this bleeping
49:53
computer ran an article back in october
49:55
two thousand and twenty one saying that six thousand
49:57
point based customers had their crypt a while the
50:00
drained due to a flaw in coin
50:02
bases to as a system i'm
50:04
pretty sure it's talking about this bug
50:07
is that drew just said
50:09
knowing exactly how much money that someone
50:11
hasn't their account is vital
50:13
to making your sim swap more successful
50:16
and there's one last bit about coinbase if
50:19
you have you have username and password and you log
50:21
in you'll see whether or not that user
50:23
has text message to have a or
50:25
google the you
50:28
if for and the of
50:31
users use to be
50:35
a if the the
50:38
they and if to
50:40
sim you that a
50:45
on the and it the
50:48
two of the and
50:50
it the we
50:53
two x x x x x x
50:55
x x or your two
50:58
are that of what
51:01
the two of the are are
51:04
for to get the so
51:07
you to do some so
51:10
the he was a
51:13
then we we find a real name of the person and
51:15
i'll tell you they watch your numbers of the phone number with
51:18
information you have to do a have
51:21
, verified or with a search on the person
51:24
person that we that off on
51:26
their name on their personal occasion when
51:28
their occasion number there's a million with you
51:30
this my with advice is the
51:33
house the email is closer
51:35
and there are obstacles to got this email
51:37
hundreds or else they email be as rethink
51:40
their ip are some economy know that
51:42
you can use to know you look at
51:44
them into a people search on
51:46
my pages or been verified search that area
51:48
with their name mean of on the phone number
51:51
that will nationalist sale of the on
51:53
and
51:55
okay so that's how these sims whoppers
51:57
are choosing their targets today
52:00
this point the know the user name password
52:03
the phone number and the account balance
52:05
to know is it's going to be a juicy grab when
52:08
you can quickly look up or kind of carrier the phone
52:10
number belongs to see can swap
52:12
using the right carrier
52:15
there's a big set up process just
52:17
to figure out who are same swapping
52:19
targets gonna be
52:21
in fact it's so much work this is
52:23
a market just in itself just identifying
52:25
a list of targets and selling this information
52:28
is it's own rackets so while
52:30
it seems like a lot of work someone
52:32
could just step in right here
52:35
by the dita and go first
52:37
time swap okay , now
52:40
we're ready for the big sims
52:42
swamp event so you remember
52:44
how the process got started right someone ran into
52:46
ran t-mobile store snatched the tablet from tablet
52:48
store managers hands store managers outta there
52:50
this is called a remote remote tablet
52:52
grab but we're still not ready
52:54
for that part yet before you steal the
52:57
managers tablet you need the managers
52:59
password that's on the tablet rights so
53:01
you need to do rican on the store figure
53:03
out everything you can about the manager
53:06
to try to social engineer them just
53:08
like call you can
53:10
this is on join working with a deity opacity
53:12
mobile can you please on
53:15
tend to the ticket as ticket as if a girl enter
53:18
your mental again
53:19
okay so now you have the managers password
53:22
to log into the tablet and we know how
53:24
to get the tablet but let me tell you this
53:26
is a major problem that t-mobile is
53:28
trying to battle and there are internal
53:30
memos going around right now of procedures
53:32
of what to do if this happens at your store
53:35
like one thing is to immediately call
53:37
the ic helpdesk and get the tablet disabled
53:39
as fast as you can and get that manager
53:41
account disabled and so when this happens
53:44
stores typically get the tablet disabled
53:46
within ten minutes and so we've
53:48
got it back up again because we've only
53:50
got this ten minute window and
53:53
you've got to do everything in that and so
53:55
you'll need to be prepared and we have not done
53:57
our preparations yet so what
53:59
you need to know here
54:00
is that this isn't done by one person
54:02
the snatcher is just one point in this
54:04
game and receive people encoder him aren't
54:07
like that had to personable run into a sore the
54:09
the gruesome idiots that the know i wrote the governors
54:11
have a sore for them and that person who runs
54:13
and and grabs the in runs out is really
54:16
getting paid the lowest on the list here they
54:18
can two hundred grow a suitable cater
54:20
runner so little
54:22
so they'd be two hundred dollars for someone to go in and
54:24
grabbed the tablet and bring it back out to them
54:27
and they have to be set up nearby because the only
54:29
have ten minutes to do this remember and
54:31
so the person who ultimately has the tablet
54:33
in their hands is particularly skilled
54:35
at navigating the t mobile software
54:38
to do the same swap and maybe that's
54:40
because the worked in the store before
54:42
are they saw a video on how it's done but
54:44
still the person who's actually typing
54:47
on the tablet doing the same swap
54:49
is it the same person who's gonna feel crypto
54:52
currency from coin base users that's
54:54
a whole nother group of people who have collected
54:56
all those coin base laws and are waiting for someone
54:58
to do a remote and they all get organized
55:01
inside a telegram chat room and
55:03
people are willing to pay a person to do
55:05
a remote swaps sometimes ten
55:07
thousand dollars per number i'm just trying to confirm
55:10
that winner in the telegram channel and
55:12
they're like okay i hope somebody gets
55:14
a a remote and i i got a three
55:17
them you know accounts i really wanna do
55:19
all you need to do is provide that phone
55:21
number to the person who did the root for got the remote
55:24
right
55:25
perfect you and you sound like a real
55:27
, your in are illegal
55:32
read below the quote is you either
55:34
to die a hero or you live long enough to become
55:36
a villain and that so action
55:41
the only better
55:44
graham am using the term okay yeah
55:46
i know i know
55:48
so people are him telegram
55:51
and they're like rights it's what
55:53
it was like friday night saturday so it's like
55:55
okay eighty goes inside and in the they tell
55:57
the group like i'm getting a minute drive down there and entice
56:00
and brother got it all that i am also
56:02
treated yeah there's always people
56:04
are issues that are like in their bedroom doors
56:06
like don't come in dad i'm i'm very busy tonight
56:09
don't come in the room whatever you do with him
56:11
, all go they'll give you some first no time
56:15
like you the hospital you the
56:19
when i do know you got him a deceptively
56:22
simple be willing to , it right
56:24
now has to her just just
56:26
probably would have ten minutes due to there's no
56:28
time for dinner success in a dinner
56:31
underdogs know if you choose and
56:35
i didn't really have really dozen on exaggerate this dozen on
56:37
how it is sometimes with
56:38
the rules are so short isn't this is what i love
56:40
imagining is like the actual person behind
56:43
the screen and if it is a teenager has just
56:45
as there is this is this possibility
56:47
of it all going wrong any second because
56:50
they're livid over they've got to clean the room or
56:52
right so though besides
56:55
that there that there there they're in
56:57
telegram they get the the
56:59
message okay i thought the remote way and would
57:01
you say ten thousand dollars per
57:03
number don't
57:06
to my soccer
57:08
the will work moment cause you about five thousand dollars
57:10
first or if they're afraid to come in cause you
57:12
some thousand five hundred from become a special
57:14
protection with their guns the to buy possible
57:17
reason , going to cost you upwards
57:19
of of fifty thousand dollars
57:22
for isn't as extreme your secured but also
57:24
but if you have the
57:26
right equipment i got any branch
57:28
manager like and which is a very
57:31
quite position we need to go to pay off at verizon
57:33
mentored a lot then
57:35
you go how come you can't it appears in
57:38
your own people for new findings with diverse
57:40
you really just the an inside cat rutherford the
57:43
agency i think of people were trying to decrease
57:45
the prices down to there
57:47
are two to three thousand dollars
57:49
because the their opus to is
57:52
not to secure
57:54
okay so this person who does the remote
57:56
snatch let everyone know hours
57:58
before that they are planning to you a remote
58:00
that site to the activators the person
58:03
who coordinates the remote search and so
58:05
the activator tells everyone in the discord channel
58:07
that they've got the remote and they're ready for orders
58:10
immediately people in telegram start giving
58:12
him information phone number and i
58:14
see see id that's all they need
58:16
to begin the process of moving the phone numbers
58:18
from the customers phone to the thief's
58:20
phone and telegram
58:22
it's an intense and minutes time
58:25
is ticking and at any moment that tablet
58:27
will become the activated so they've
58:29
gotta go as fast as they can swapping
58:31
out as many numbers as they can
58:34
in that timeframe
58:35
good night and activator can
58:37
make over a hundred thousand dollars
58:40
from doing this german an opioid use
58:42
go to do look more lingo
58:44
luke is when are you joe someone
58:46
but i'll use more points much the liquor
58:48
dale the successful
58:50
long reward console log
58:52
mean point and and our lingo when
58:55
are you going to look at me that you the
58:57
you with through their balance it's yours you want the
59:00
motto is that you can use this for nothing to say this
59:02
person looks like a lick this person was ago easy
59:04
target in other words
59:06
you could use i could a with today meaning i could
59:08
a successful withdraw any quimby second now
59:12
these guys have control over their targets
59:14
phone numbers and it's time for them
59:16
to work as fast as he can sweating profusely
59:18
you go recipient to password gonna
59:21
property near them do noisy a on
59:23
residential proxy your by the target location
59:26
more into their doesn't reset the closer
59:28
to the movies was time it's not the same as or goodness
59:31
the cb going back to fight device of education
59:34
link still sweating profusely or
59:36
order to be or even coaches and dirt under screaming
59:38
or order to send you the code immediately
59:43
are you you're not you're not going to pay them on
59:46
, say holder as to
59:48
again order some of those actually holding onto the phone
59:50
as receiving lcp so most of the people have
59:53
the tories and belts are gonna hold the phone themselves suicide
59:55
operational security holy cow
59:57
have a designated holder
1:00:01
he would hold the cell phones just
1:00:03
have have
1:00:05
no means of course record comments
1:00:07
there's a holder involved with this whole thing to
1:00:10
then yes holders get paid for just
1:00:12
being the ones who bought the phone and got the
1:00:14
numbers switched over to it okay so the
1:00:16
person who wants to do the leg might first start
1:00:18
by going to the victims email and
1:00:20
resetting the passwords and on a lot of
1:00:22
email providers in order to reset the password
1:00:25
a text is and to you and so
1:00:27
the email providers sends the text and
1:00:29
the holder tells the person with the text is
1:00:32
and they get the access to the email account and
1:00:34
from there they tried to log in a coin based
1:00:36
upon putting in the username and password
1:00:38
it sends a text to the phone that the holder
1:00:41
has and the holder has to give the code
1:00:43
to this person and a person now
1:00:45
logs into coin base but there's typically
1:00:47
attacking coin base and had said something like we
1:00:49
don't recognize this device were send you an
1:00:52
email to verify it's you found
1:00:54
the person's already in their email account
1:00:56
so they just have to wait for the email and
1:00:58
click yeah it's me and coin base
1:01:00
less them in now they're in
1:01:02
someone's coin base accounts which
1:01:05
might have thirty thousand dollars
1:01:07
hundred thousand dollars or sometimes
1:01:10
even more than a million dollars and finish
1:01:12
off the rails to coin is prone to the
1:01:14
german army be withdraw the phones
1:01:17
and then you withdraw to your
1:01:19
exodus or your metamask lawyer
1:01:22
the on board
1:01:24
the reason why they transferred to coin bass pro
1:01:26
is because there's a higher daily withdrawal
1:01:28
limit their but there's a safety check their
1:01:30
to before you can withdraw funds from
1:01:32
queen bees there's one more to have
1:01:34
a check c need to get another text message
1:01:36
from the holder to initiate the transfer
1:01:39
there's still yet another security hurdle
1:01:41
coin base has a maximum daily withdrawal
1:01:44
limit and sometimes people have more
1:01:46
than that
1:01:47
the do says that's not a problem use
1:01:49
the workarounds people use
1:01:52
with i'm can talk about but there
1:01:54
are ways to withdraw the tuner fifty
1:01:56
thousand dollars or a million dollars you
1:02:00
can withdraw mass amounts of money there are
1:02:02
one way that everyone knows that i can say to you is
1:02:05
there's a certain bought out there on a forum
1:02:08
the will to spam request or the
1:02:10
same time to overwhelm
1:02:12
them and or them to withdraw like
1:02:14
on your panties of small transactions there
1:02:17
is the other ways
1:02:19
as well that are more directly kids
1:02:23
are determined then why wouldn't
1:02:26
they be when
1:02:26
the potential one million
1:02:28
dollar lick that they can score from
1:02:31
this though that the new generation of
1:02:33
crypto swappers bruno it
1:02:35
was pretty ten million arabs are all
1:02:37
under the age of sixteen i
1:02:39
know her that the line
1:02:42
seen them center elections live the
1:02:44
intimate million or looks there
1:02:47
those forum the older generation
1:02:50
the wonder where they're junior early with the crazy
1:02:53
tony doing or michael turpin targets
1:02:55
they have fifteen million
1:02:57
ten million and or and new also
1:03:00
like and have to use and the
1:03:03
like really high level things hey
1:03:05
michael
1:03:06
or been is a crypto currency investor
1:03:09
but he has a few startups in the space to
1:03:11
like transform group and bit angels
1:03:14
in january two thousand and eighteen someone did
1:03:16
the steps you just heard to hack
1:03:18
into turbans crypto wallet and
1:03:20
stilts twenty three million there's
1:03:22
worth of crypto out of it
1:03:24
twenty three million dollars stolen in one night
1:03:27
you know as soon as a person got that
1:03:30
they had to pay all the people down the line
1:03:32
the help them get their in this case it
1:03:34
was insiders working at eighteen t
1:03:36
that help do this well once this
1:03:38
guy stole the twenty three million he
1:03:40
still wasn't happy he tweeted stole
1:03:43
twenty three million is still can't stay away from
1:03:45
drugs stole two thousand three million
1:03:47
and can get my shit straight
1:03:49
harbin of course when to the police who started
1:03:51
investigating and were able to find some
1:03:53
pretty solid evidence that led them to a guy
1:03:55
named nicholas truly i was
1:03:57
twenty one living in manhattan and
1:04:00
the or keys eighteen
1:04:02
living in boston his mom and dad
1:04:05
erected both of these young men
1:04:07
joe ortiz was sentenced to ten
1:04:09
years in prison court
1:04:12
records show that nicholas and
1:04:14
over seventy million dollars in assets
1:04:16
at the time of his arrest
1:04:18
he pled guilty and is still
1:04:20
in court waiting to be sense as
1:04:23
for michael turpin he was really mad
1:04:25
that she was twenty three million dollars of course
1:04:27
he would be but he also had saved
1:04:29
the other crypto accounts and they were all fine
1:04:32
so i'm not sure what percentage of is cooked
1:04:34
or funds were stolen but he was still
1:04:36
furious so mad that he sued both
1:04:38
nicholas and eighteen teeth he sued eighteenth
1:04:40
heat for two hundred million dollars
1:04:43
claiming the person who talked with him on the phone said
1:04:45
his phone number is secure and cannot be some
1:04:47
swapped get it was and he
1:04:49
wants a tnt to admit that they
1:04:51
are the biggest reason why his money was stolen
1:04:53
however the judge dismissed the case
1:04:56
the turpin the hacker nicholas
1:04:59
and he won that
1:05:00
the judge favorite on the side of turpin and granted
1:05:03
him seventy five million dollars
1:05:05
so while turpin last twenty four
1:05:08
million dollars he was ultimately given
1:05:10
seventy five million dollars in compensation
1:05:13
wild stuff
1:05:14
it was the crypto investors author of
1:05:16
someone holding congress' decision
1:05:18
very useful for you it
1:05:21
doesn't needed emails for things that you deal the
1:05:23
you in a separate your personal in often
1:05:25
of the don't see enough of that
1:05:28
right this makes sense
1:05:30
we have now graduated from don't
1:05:32
reuse passwords to don't
1:05:35
reuse emails on high profile accounts
1:05:38
if you have an email address that
1:05:40
was just for your crypto scenes and
1:05:43
you used at nowhere else then it would be
1:05:45
really hard to discover that email address
1:05:47
and try to hit because after
1:05:49
all you need a username and password
1:05:51
to get into these places so why not
1:05:54
make the user name really hard to find
1:05:56
if your user name is the same email address
1:05:58
that use for everything the not like giving
1:06:00
half of your life the and whoever you chadwick
1:06:03
now we just went over the one hundred steps
1:06:05
it takes the sims want someone and still all
1:06:08
their money but i want to take a step back
1:06:10
and look at this for moments this wasn't
1:06:12
a quick and simple method to do this
1:06:15
it took a whole lot of research to find
1:06:17
just a good target and this is important
1:06:19
to know because people ask me questions all the time
1:06:21
like oh what's the real danger if i put
1:06:23
my birthday on my facebook profile they're
1:06:26
expecting some sort of quick and simple way a
1:06:28
hacker can use against them but it's
1:06:30
not always quick and simple if
1:06:32
these kind of criminals get a whiff that you got
1:06:34
something that they want the will keys
1:06:36
out your life and build a massive report
1:06:39
on you so that they can completely
1:06:41
own your digital life and become you
1:06:43
every little scrap of extra information
1:06:45
they can get about you can potentially mean
1:06:48
a massive pay for them if
1:06:50
some obscure website you had an account
1:06:52
with kids breached and they get the password
1:06:54
you used and you reuse a password
1:06:56
somewhere else that's just opens doors for
1:06:58
them obviously getting into your email and
1:07:00
phone numbers valuable to them so don't really
1:07:02
love it if you just post that publicly but then
1:07:04
there are the little things what city you're
1:07:06
in what browser you use what things
1:07:09
you like where you like to get coffee and
1:07:11
who your family members are all these
1:07:13
things can be used to exploit you further
1:07:15
if they know what city you're in they can use a proxy
1:07:18
and your location to make their traffic look like
1:07:20
it's coming from somewhere close to you if they
1:07:22
know what browser you use that will help them look
1:07:24
more like you when they're trying to access your accounts
1:07:27
and if they know what things you like them i tell them
1:07:29
about some other areas of your life to check out
1:07:31
and if they know what you like to get coffee this might
1:07:33
the next meeting you there and picking your pockets
1:07:36
by standing in line for your latte and
1:07:38
if they have information about who your family
1:07:40
members are those family members
1:07:42
might get targeted
1:07:44
do here told me a story about how one
1:07:46
time when they wanted to get into some guys accounts they
1:07:48
texted the wife posing as the
1:07:50
has been to get her to read off
1:07:52
the two factor authentication codes
1:07:55
over text messages
1:07:56
the more information they have on you the
1:07:58
easier it makes their
1:08:00
the job imagine they had full access
1:08:02
your bank account and decided to turn for all the
1:08:04
money out but you're being cited
1:08:06
wait something doesn't seem right and they
1:08:08
challenge to the transfer and say it's just
1:08:11
to make sure it's you what's your birthday now
1:08:14
that one piece of data that you saw
1:08:16
was innocent to share publicly
1:08:18
could have been your savior if
1:08:20
you didn't posted to facebook i
1:08:23
hope you're convinced now to never
1:08:25
share your private and personal information
1:08:28
personal information public website i
1:08:30
think it should also be clear at this point that you
1:08:32
should never use the same passwords
1:08:34
on different web sites in fact
1:08:37
to emphasize this point i'm gonna play you
1:08:39
a song by results are back
1:09:22
your money
1:09:25
, the crime sale
1:09:28
your account and go
1:09:30
with what you call their sakes it this
1:09:33
group he didn't words records
1:09:35
qualcomm push me
1:09:38
curry her combat we should be and we just vaguely
1:09:40
gloves or com
1:09:41
hum spelled c o
1:09:43
m it's sort for community
1:09:46
and this is new to me back in my
1:09:48
day we called it the scene
1:09:51
now uses the community
1:09:54
it was called combo and and recall
1:09:56
ohms they're swimming home and a nurse
1:09:58
i was there some kirk on these robots
1:10:00
com there's the recent
1:10:03
the orders on twitch on people on
1:10:05
people but which is there's one been overcome
1:10:08
there's and process on info sec
1:10:10
car that's right up my alley
1:10:13
i had to ask him more about that the way
1:10:15
he says it is that there's some people and i t
1:10:17
security space who wanna be part of
1:10:19
in for sec twitter and respected as good
1:10:22
security researchers with also
1:10:24
wanna do things that are illegal or
1:10:26
unethical photos acting
1:10:28
like both an innocent white hats and
1:10:30
a cd black hats at the same time
1:10:33
the jazz
1:10:34
ryan phobia stevenson this
1:10:36
is a guy who reported a few bugs that he founded
1:10:38
telecom companies and was awarded
1:10:40
for it but then use those bugs
1:10:43
to grab the summer data from telecom
1:10:45
companies and sell them on underground markets
1:10:47
the guy was double dip and that sounds
1:10:50
like they're comes for every little area
1:10:52
of focus that people can make money online
1:10:55
the common thread and all this is
1:10:57
that are all unethical coms
1:10:59
and that's why i called them dirty
1:11:01
coms these are nasty communities
1:11:05
that's or for and if she's so
1:11:07
or every day in the news i'm seeing another
1:11:09
attack on and if tease such tease
1:11:12
so very scamming someone out of their
1:11:14
board their
1:11:16
or yeah , course or
1:11:18
a classic okay got
1:11:21
gone you've seen this you've seen is it
1:11:23
somebody from your com center
1:11:25
at that are conducting things
1:11:28
yeah i'm okay so is from the additional really
1:11:30
really says really really rich some
1:11:32
con ed mentioned the
1:11:34
individual were summers that are not in the current one
1:11:38
the in else you'll end up to is there's
1:11:40
a the notable gamecube i'm not
1:11:42
going to say my name but we
1:11:44
there's just people who literally go into sports someone
1:11:47
says they have their teeth their message from
1:11:49
the costs are links i
1:11:51
witnessed this first hand just
1:11:53
this week
1:11:54
i was in an nfc discord oh
1:11:57
and if you don't know what and of he is in this case
1:11:59
it's just digital art that you can buy and
1:12:01
sell and nice pieces of digital art
1:12:03
are going for like thousands of dollars each
1:12:06
and sometimes even hundreds of thousands of dollars
1:12:08
each discord i got a
1:12:10
direct message saying i was selected to
1:12:12
be on a presale list for one of these and
1:12:14
if he drops and i have to buy it now
1:12:17
of course i didn't click the link
1:12:19
someone in the channel did and the site
1:12:21
said in order to mint the nfc you just
1:12:23
need to connect your met him as crypto wallets and
1:12:25
enter your twenty four words seed phrase now
1:12:28
that twenty four word seed phrase
1:12:31
is not something you should ever
1:12:33
share adverse that's the
1:12:35
private password basically your crypt a
1:12:37
while and if you give someone that you basically
1:12:40
handed them control of your entire kept
1:12:42
a wallet but this person put
1:12:44
their seed phrase into the bogus website
1:12:47
and as soon as they did they seas
1:12:49
guy in their kept a while and took all
1:12:51
their valuable and if he's and sold
1:12:53
them for like half price
1:12:55
the thief made about forty thousand
1:12:57
dollars in syria i'm in
1:12:59
like five minutes it was absolutely
1:13:02
crazy to watch this person gets her account
1:13:04
drained right in front of my eyes
1:13:07
there was nothing that anyone could do to
1:13:09
stop
1:13:10
there's no shortage of stories of
1:13:12
people getting digitally mugged and their
1:13:14
crypto wallet stolen in and if he's
1:13:16
and i think the reason is because these crypt
1:13:19
a woeful tons of money and they're
1:13:21
just like browser add ons if
1:13:23
you connect your crypto while it's a the wrong site
1:13:25
it's game over and it's so easy
1:13:27
to connected to the wrong sites it's
1:13:29
kind of like of you have your bank account accessible
1:13:32
right in the browser as a plugin
1:13:35
and all the sites you're visiting all wanna
1:13:37
take a look at it
1:13:38
this is just the beginning almost every day
1:13:40
this happens there are so many scammers
1:13:42
trying to get access to people's crypto wallets
1:13:45
which might have crypto currency in it or
1:13:47
nfp and the scams are vast
1:13:50
and fast coming at you from every
1:13:52
angle if you play in the space for
1:13:54
instance another big scam i saw the other day
1:13:56
was when and nfp was just about to
1:13:58
launch their pride and on
1:14:00
launch day is a big day everyone who
1:14:02
wants to be part of it is ready to rise to
1:14:04
mint or tokens and hope that it goes
1:14:06
up in price so there's a frenzy in those
1:14:09
moments because there's a limited supply
1:14:11
and you don't want to be bought out the
1:14:13
already when people in a rush to buy
1:14:15
something the prone to make mistakes
1:14:18
typically eager buyers will be in the
1:14:20
discord chat room for that and as he to
1:14:22
watch what's going on there's a
1:14:24
whole slew of thing a second go wrong
1:14:26
with this first the owner
1:14:29
of the discord kinda hat
1:14:31
here's how that happens a lot of the credibility
1:14:33
through a friend of so it always goes
1:14:36
the remote my friend says that i'm
1:14:38
i should talk to you eventually
1:14:41
easily into sending some sort of file that
1:14:43
they can actually i'm discord token
1:14:45
log in with
1:14:46
if you use discord chances are you
1:14:48
don't enter your username and password every time
1:14:51
you visit the site or open the app that's
1:14:53
because once you are finicky there's a little
1:14:55
authentication token that exists on your
1:14:57
computer which keeps you logged in but
1:15:00
if you can just take the authentication token
1:15:03
can log in as a person without needing
1:15:05
a person education token
1:15:07
has all the stuff in there in
1:15:09
yeah if you can get someone to install your
1:15:11
malware the malware can still the token
1:15:15
hey so if you can access the moderators
1:15:17
account on a popular discord channel that's
1:15:19
about to launch and and as he and
1:15:22
you can make a ton of money
1:15:24
we need to do is copy the official website
1:15:26
of this and f t which is super easy and
1:15:28
make a similar looking you are all with like one
1:15:31
letter difference and change where
1:15:33
the money goes when someone buys the enter
1:15:35
key instead of going to the n f t maker
1:15:38
is now going to your wallet
1:15:40
so now all you need to do is direct people
1:15:42
to your page and since you're
1:15:45
a moderator you can post
1:15:47
a message to guns blazing was
1:15:49
recalled the message might read minting
1:15:51
is now live open to the public but hurry will
1:15:53
be closing in ten minutes some of these
1:15:55
discord channels have over fifty thousand people
1:15:57
when they're ready to buy and
1:15:59
can imagine
1:16:00
they're pretty dozen people see a message like this
1:16:02
that the project has gone live in they're ready to means
1:16:04
that they'll come flooding to the sides by
1:16:07
their and if he's seen it
1:16:09
happen over and over
1:16:11
the cameras are infecting discord
1:16:14
in are making over a hundred thousand
1:16:16
dollars in ten minutes doing
1:16:18
this
1:16:20
there are other scams that are going on
1:16:22
and discord to there is people who actually
1:16:24
boy out of jesus course if
1:16:26
you've only royce people
1:16:28
grow energy discords using on grocers
1:16:31
the gum they get like shuttle packages from people
1:16:33
in serum there are people
1:16:36
the grow them just as just exit
1:16:38
scam or does the southern to someone who exit scam
1:16:40
oh yeah i've seen this till if
1:16:43
you find an energy project that has honored
1:16:45
thousand followers on twitter and eighty thousand
1:16:47
members and discord you're gonna think that that's
1:16:49
a high end as t project and be more excited
1:16:51
about it but the numbers are all faked
1:16:54
it's a discord channel that was just bought last week
1:16:56
and a keen with eighty thousand members already in
1:16:58
it but they're all boss and , it
1:17:00
creates a false buzz about it and they launch
1:17:02
a project and people pay them and they get
1:17:04
nothing for it except for some cheap piece
1:17:07
of art that was made by someone on fiber fiber
1:17:10
just grab the money and leave again
1:17:12
a scam like this conference someone over one hundred
1:17:14
thousand dollars and done right but
1:17:17
these are certainly pretty involved
1:17:19
and complex scams it takes complex scams time
1:17:22
you have to build a website buying in a sea
1:17:24
server create all the artwork it's
1:17:26
not easy and takes some real for
1:17:28
nes then if that wasn't
1:17:30
enough and ft scams going around there's
1:17:32
also influence are scams happening they
1:17:35
did a reputable person to
1:17:37
be there apart there are these
1:17:39
rich people who are kept on for answers
1:17:41
convince people to forfeit his tricks
1:17:44
like their friends like the convinced her friends to fall
1:17:46
for an empty scams the person
1:17:48
setting them up as these millionaire sims walkers
1:17:50
as horrible thanks man you can't even trust your
1:17:52
friends and nfc land theme might be getting
1:17:54
paid by the scammers to scam you i've
1:17:57
dabbled a nice and of these and i'll tell
1:17:59
you
1:18:00
it's not for everyone is
1:18:02
fraught with land mines packers
1:18:04
thieves scammers criminals and so
1:18:06
much more the big reason why
1:18:08
so many people are in and of teases because they
1:18:11
can go up in value i've seen someone
1:18:13
buying and of see for two hundred dollars and
1:18:15
then sell it for twenty thousand dollars the
1:18:18
same day there are massive
1:18:20
games you can make from and if he's legally but
1:18:22
from watching the news in this space i'm willing
1:18:24
to bet that over a hundred thousand dollars worth of
1:18:26
and of teas are stolen or scammed
1:18:29
from someone every day
1:18:31
that's a real money that you can watch
1:18:33
the block chain and see the criminals cash
1:18:35
out and probably go buy luxury cars
1:18:38
with or something these j peg center
1:18:40
and of teas are extremely valuable which
1:18:42
is why thieves or so into it i
1:18:44
just want you to understand the end of teas
1:18:46
is a very big hustle were a lot of
1:18:49
real money is being stolen everyday
1:18:51
and it's making the people in these dirty
1:18:53
coms rich those people
1:18:56
those all from profit promotional tool
1:18:58
promotional tool little studio you receive
1:19:01
your comment do
1:19:02
why are you in naming people here have enormous
1:19:05
, all public names or okay oh
1:19:08
they've got these have enormous arrested they're
1:19:11
probably like the most famous himself as i've been or support
1:19:13
watch out okay joseph
1:19:16
james o'connor whatever okay
1:19:18
i'm gonna look up with these people dead
1:19:20
joe orgies was arrested for same
1:19:22
swapping effect he was the first ever person
1:19:25
to be convicted for same swapping
1:19:27
this is wild two thousand and
1:19:29
nineteen is the first time as
1:19:31
swap or was ever convicted
1:19:34
this is truly the definition of a modern
1:19:36
crime if only three years ago was the first
1:19:38
time anyone's ever been convicted of this the
1:19:41
jaw ortiz was twenty one from boston
1:19:44
and according to police he scammed forty people
1:19:46
and stole a total of seven million dollars
1:19:48
conducting swaps he was arrested
1:19:50
in got ten years in prison for this we
1:19:53
already talked about nicholas jugular he's
1:19:55
awaiting sentencing but you also mentioned
1:19:57
xavier clemente's this guy
1:19:59
was name the news old when he was arrested for same
1:20:01
swapping please say he stole over
1:20:03
one million dollars in crypto currencies there
1:20:06
is a plug walk joe james o'connor
1:20:09
he was twenty two living in the uk when
1:20:11
he was arrested for some swapping authority
1:20:13
say he stole over seven hundred thousand
1:20:15
dollars doing this
1:20:16
the was just goes on and on there's youssef
1:20:19
selassie a nineteen year old from brooklyn
1:20:21
who was arrested for stealing a million dollars and
1:20:23
crypto currency and there's a guy goes
1:20:25
by the nickname baby al capone he
1:20:27
still twenty million dollars and crypto currency
1:20:30
this guy was just fifteen years old when he was
1:20:32
arrested
1:20:33
there's two more guys are spend herod
1:20:35
and matthew dickman they're facing charges
1:20:37
for working together to do some swamp and still
1:20:39
some crypto and there's eric mags that
1:20:41
guy who's rested for some swapping he saw over
1:20:44
five hundred thousand dollars doing it's declan
1:20:46
harrington pled guilty to doing some swapping
1:20:48
attacks and of course seen zondervan
1:20:51
from episode one of six was arrested for
1:20:53
some swapping and currently he's making
1:20:55
five years in prison there's quite
1:20:57
a rose and twenty two year olds and the uk
1:20:59
who was accused of stealing one hundred bitcoins
1:21:01
as now facing prison time
1:21:04
by the way the items confiscated by the
1:21:06
police are incredible luxury watches
1:21:08
luxury cars and house apartments
1:21:11
these kids are blowing it as fast as a good
1:21:13
it's and almost all of them have gambling
1:21:15
addictions where they'll put some money and
1:21:17
and online casino in spin the wheel and try to
1:21:19
hit it even bigger and they kind of like showing
1:21:22
off what they're willing to wager during live
1:21:24
streams and stuff so that others can see how
1:21:26
much money they have it's nuts older
1:21:28
children channels
1:21:30
the actor we pull screenshots of their targets
1:21:32
in how much money is in them and that they just skim them
1:21:34
from doing sitcoms
1:21:37
you can confirm this because they will literally show
1:21:39
huge yes i use in there because most out
1:21:41
of millions of dollars the to
1:21:43
do thousand or two boys everyday there's
1:21:46
do ridiculously creating
1:21:48
the their money for their kids this list
1:21:50
goes on and on a lot of people are being
1:21:52
rested better under eighteen years old and
1:21:55
so we just never see their names in the news and
1:21:57
some of them get caught and are just forced
1:21:59
to give
1:22:00
the actor crypto currency or and of to use a
1:22:02
store and they just get a stern warning how
1:22:04
about you promise just blows
1:22:07
me away i had no idea
1:22:10
what this underground community looked like
1:22:12
before now but now i feel
1:22:14
like my eyes of adjusted i
1:22:16
can see in the dark do
1:22:18
you feel that way to i
1:22:21
feel like it's an all out war zones
1:22:23
on the internet right now yeah
1:22:25
every day we hear about another company getting hit
1:22:27
with ran somewhere or data breaches but
1:22:29
all that is nimby snow in
1:22:31
my backyard this is what
1:22:33
is in my backyard this is teenagers
1:22:36
targeting regular people and
1:22:38
their nicknames or no coincidence one
1:22:41
goes by baby al capone another goes
1:22:43
by billy the kid billy the kid
1:22:45
used to rob trains back trains the old
1:22:47
days he was days stickup people
1:22:50
in demand money from them then it seemed
1:22:52
like the same thing is going on here if
1:22:54
you make any mention that you have a lot of
1:22:56
crypto currency publicly you can
1:22:59
probably expect that someone's gonna wanna steal
1:23:01
their from you and it's not the most
1:23:03
easy thing in the world he keeps the if it's a really
1:23:05
tricky so if you're holding crypto
1:23:07
i strongly encourage you to not
1:23:09
put all your stuff and fun address
1:23:12
break it up in a different why it's because if something
1:23:14
is compromised you don't want to seeking the whole
1:23:17
piggy bank
1:23:18
phone companies should probably step
1:23:20
up their security it sounds like they're trying
1:23:22
to make it harder and that's why people are paying
1:23:24
ten thousand dollars per cent swamp city
1:23:27
but how can the eliminate this when there's insiders
1:23:30
who work as regional managers
1:23:32
who are in on the cut of this of
1:23:34
this the my get an equivalent to a whole years
1:23:37
with of salaries by helping a sense
1:23:39
whopper do a million dollar lick that
1:23:41
could be a whole thing to turn down
1:23:43
for someone who really needs the money and
1:23:46
, the answers not use them cards anymore and
1:23:48
just keep a wife i hotspot in your pocket at
1:23:50
all times and bouncer phone or sit when
1:23:52
you me because when i don't know exchanges
1:23:55
like coin base do base fairly good job at making
1:23:57
at hard for criminals to get into someone's account
1:24:00
in fact the exploit that drew said which that someone
1:24:02
check the balance of an account without to f a
1:24:04
i think coinbase reimbursed all the people who are
1:24:06
hit with that exploit and they continue
1:24:09
to improve but perhaps they should force everyone
1:24:11
to use google authenticator that would make
1:24:13
it harder for these people or maybe give
1:24:15
you the option to have a second password on the site
1:24:17
that's just for transfers problem
1:24:19
is the harder they make it for criminals to steal
1:24:22
stuff the harder they make it for users
1:24:24
to use the site so it becomes
1:24:26
a difficult balance the top of
1:24:28
that i'm positive north korea is
1:24:30
hitting coin base all the time trying
1:24:32
to find a hot wallet somewhere and
1:24:34
steel that really really have
1:24:36
really heavy load that they've gotta defend against
1:24:39
pressure right but it seems obvious
1:24:42
to me at least that even if you fix a few
1:24:44
of these problems these people in these dirty
1:24:46
coms just find another way to do
1:24:48
it and as the internet moves at the
1:24:50
speed it does software website
1:24:52
don't always put security first neither
1:24:55
some of the consequences for not doing that
1:24:58
and like like saying it's beginning as not
1:25:00
a lot of wisdom being passed down from generation
1:25:02
to generation on what the dangers of the internet
1:25:05
are whether it's for the users of
1:25:07
the sites or the teenagers trying to hack
1:25:09
into that i think it's gonna get
1:25:11
whereas before it gets better to my
1:25:13
even take forty more years before
1:25:15
we see a world where people go online
1:25:17
go online safe responsible manner the
1:25:19
users value their privacy and
1:25:21
security above all and know
1:25:24
not to install apps or by
1:25:26
devices that put your privacy and frisk
1:25:29
and have a strong understanding of the digital dangers
1:25:31
that are out there and do things to protect
1:25:33
themselves
1:25:35
that's why i thought this episode was important
1:25:37
for you to listen to now
1:25:39
you have a much clearer view into
1:25:41
why someone would target you and
1:25:43
how they do it when maybe
1:25:46
you've never even thought you were the target before this
1:25:48
is why things like a def con exist which
1:25:50
is a conference that hackers go to the so
1:25:52
off all the new ways they've learned how to hack into
1:25:54
things and a primary focus there is
1:25:56
to share offensive fucking techniques
1:25:59
and the new techniques as arguably
1:26:01
main security better because of people
1:26:03
don't share them then we don't know
1:26:06
their problem exists and he can do things
1:26:08
that have and against it the real criminals
1:26:10
and nation state actors do not share their
1:26:12
techniques publicly because they don't
1:26:14
want it fixed and we can't simply ignore
1:26:16
that and hope security problems somehow
1:26:19
magically get fixed my hope
1:26:21
is that now that you've heard all these
1:26:23
techniques that you will now take
1:26:25
your digital life more seriously than
1:26:27
you were before i imagine
1:26:30
a world where users were so well educated
1:26:32
on securities that they take it upon themselves
1:26:34
are overly secure their environments because
1:26:37
they've been hit too many times by bad
1:26:39
actors or would just taught properly
1:26:41
how to practice safe internet usage part
1:26:44
in the tv show mister robot or
1:26:46
elliott's a hacker goes into an office
1:26:49
building and he wants to use someone's computer and
1:26:51
he looks around to try to find a good person social
1:26:53
engineer to get them to stand up so he
1:26:55
can use their terminal and he sees an older
1:26:57
lady sniffing wideouts
1:27:00
anything's okay sorely an
1:27:02
older lady sniffing wideout would be
1:27:04
the perfect candidate to
1:27:06
convince to the elliot use her
1:27:08
computer
1:27:09
here's the thing i ,
1:27:12
henry for my teeth how
1:27:14
how tend to do using some unauthorized remote
1:27:17
access software to connected to
1:27:19
the was this home of home
1:27:23
don't worry i'm just gonna take a look at
1:27:25
your machine and perform an assessment make sure
1:27:28
you don't have an unauthorized just have sharing service
1:27:30
installed i'm gonna have i'm can harden
1:27:33
like and stuff further than the standard configuration
1:27:36
including a restrictive first including over
1:27:39
of lifting to block
1:27:41
unauthorized ask for money isn't
1:27:45
isn't that just beautiful
1:27:48
that lady knows her digital environment
1:27:50
so well and has taken so
1:27:52
many security precautions it
1:27:54
brings tears to my eyes imagine
1:27:57
a world where the average internet user is
1:27:59
that edge he did and serious about the digital
1:28:01
safety but it's going to take to take
1:28:04
time for us to get there sometimes
1:28:07
things need to break down before
1:28:09
they can breakthrough it's
1:28:12
a war zone out there be
1:28:14
careful be brave
1:28:17
amy in there you can do it take
1:28:20
your own digital security seriously practice
1:28:23
good digital hygiene good
1:28:26
luck dodging bullets
1:28:36
the big thing he did you for saying this inside
1:28:38
look to the various coms what's going
1:28:40
on in their shows , buy me
1:28:42
some safe jacqui saturday sound
1:28:45
is on in original music was created by the
1:28:47
reactivate or and you marry whether
1:28:49
editing help this episode by the sleeping
1:28:51
damien and are associate producer
1:28:53
suspects on the strip search pancakes
1:28:56
retirement ceremony is ray
1:28:58
redacted theme is because by the heat bringing
1:29:00
freak master cylinder the one nice
1:29:02
thing about getting some swapped as you don't get any annoying
1:29:04
telemarketers anymore some signs
1:29:07
of so bad and nicer which is worse
1:29:09
enjoy this , diaries
1:29:14
i want to play for you the entire and for sexy
1:29:16
santi by rachel tobacco narrative
1:29:35
your it's isn't one
1:29:38
day when the crime as soon as
1:29:41
your account and go
1:29:59
nothing
1:30:21
all
1:30:28
the crimes the failure
1:30:31
account and go
Podchaser is the ultimate destination for podcast data, search, and discovery. Learn More