CIA Manages to Let Classified Records Slip Out The Door

 

CIA-2-CrimeShop.jpg

 

Jerry Chun Shing Lee Arrested for Keeping Classified Records

Once again one of America’s spy agencies has managed to lose classified records.

I am not sure if I should be surprised or just laugh at this juncture, these agencies just cannot seem to keep classified information from slipping right out of the front door.

CIA-CLASSIFIED-DOCUMENTS-crimeshop

After Jerry left the CIA in 2012, he more or less kept classified intel that should not have left with him.

FBI-Search-Warrant-CrimeShop

The FBI had obtained a warrant for ‘unknown’ (but a little bird told me it was because Jerry, was suspected of compromising Chinese Informants) reasons and searched his luggage at a hotel room after Jerry had flown with his family from Hong Kong to Northern Virginia.

Upon the search that was conducted for again, ‘unknown’  reasons the FBI found a couple of handwritten notes that may have contained the names and numbers of covert CIA employees and the locations of covert facilities.

CIA-Top-Secret-CrimeShop

Of course after the CIA looked into the situation and discovered that in fact, Jerry had intel that was both secret and top secret in nature.

Oddly, Jerry had been interviewed on 5 separate occasions prior to his arrest by the FBI and failed during each and every interview to disclose that he had these handwritten books.

Top-Secret-CIA-CrimeShop

Jerry was a case officer for the CIA from 1994-2007 where he was trained in surveillance detection, recruiting, handling assets, and the handling of classified information (which he learned well considering his arrest), and he worked at several overseas offices.

Jerry has not been charged with espionage, he has only been charged with illegal retention of documents.

Again, it’s anyone’s guess as to whether or not Jerry had any intention of using the information in order to turn a profit regardless of the fact that he is suspected of compromising informants, he has not been proven guilty yet.
Then Again, maybe he did because perhaps his retirement plan was a little too lean for his comfort level.

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

And https://gab.ai/thecrimeshop

Bitcoin Price Likely Manipulated?

bitcoin-crimeshop

Bitcoin – Invest At Your Own Risk

Does this come as a huge surprise?

If it does to anyone, I am quite frankly surprised. Everyone should at the very least have the slightest suspicion that the Bitcoin market was, has and is being manipulated.

cryptocurrency-trend-crimeshop.jpg

It is after all only a logical sequence of events if you were paying attention to Bitcoin prices at all not to mention that quite a bit of cryptocurrency across the board is currently being acquired fraudulently in some fashion or another. 

Bitcoin prices were not moving then, suddenly it made a pretty significant jump.

Now according to a recent issue of the Journal of Monetary Economics, 4 researchers came together and wrote an article titled “Price Manipulation in the Bitcoin Ecosystem,” that paper shows just how the Bitcoin ecosystem is being manipulated.

The researchers are Neil Ganddal, JT Hamrick, Tyler Moore and Tali Oberman.

mt-gox-hack-crimeshop

According to the paper, the researchers took a look at the Mt. Gox Bitcoin currency exchange and began to casually notice that roughly $600,000 bitcoins that were valued at $188 million just so happened to have been fraudulently acquired.

Looks like someone forgot to cover their tracks but not so much that we actually know the identity of said criminal. 

“During both periods, the USD-BTC exchange rate rose by an average of four percent on days when suspicious trades took place, compared to a slight decline on days without suspicious activity. Based on rigorous analysis with extensive robustness checks, the paper demonstrates that the suspicious trading activity likely caused the unprecedented spike in the USD-BTC exchange rate in late 2013, when the rate jumped from around $150 to more than $1,000 in two months.”

According to what the team was able to learn, the price manipulations looked like they were happening when the market was fairly thin for various cryptocurrencies.

“Despite the huge increase in market capitalization, similar to the bitcoin market in 2013 (the period examined), markets for these other cryptocurrencies are very thin. The number of cryptocurrencies has increased from approximately 80 during the period examined to 843 today! Many of these markets are thin and subject to price manipulation.”

So who is responsible for the manipulation?

According to researchers it appears that two bots named Markus and Willy were conducting what appeared to be legitimate trades yet they did not actually own any bitcoin that they were using which helped drive up the price.

mt-gox-bitcoin-hack-crimeshop.jpeg

Mt. Gox was hacked before, during the hack a number of bots did in fact make away with millions.

This is bad news for bitcoin as it clearly demonstrates how easy it is to manipulate the markets and to make off with millions.

crypto-currency-crimeShop

While I am all for breaking off the grid and deregulation here, I still think Bitcoin as well as other cryptocurrencies have a long way to go in terms of developing actual levels of standards, checks and balances, you know something like security and quality checks are firmly in place.

At least it should be considering now that many countries are looking to legalize cryptocurrency and accept cryptocurrency as a form of payment not to mention that the finance industry is also seeking to invest in it pretty heavily.

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

And https://gab.ai/thecrimeshop

Ohio Hacker Charged with Child Pornography

 

fruitfluy-malware-crimeshop

 

MacOS Malware Used for Child Porn, Computer Fraud and Wiretapping

phillip-durachinsky-CrimeShop

28 year old Phillip Durachinsky has been accused of and charged with computer fraud, wiretapping and child pornography after authorities learned the man had hacked cameras and microphones to both spy on and recorded things that he should not have.

computerhacking_crimeshop

Aside from spying on both people and companies, Phillip was so brazen that he hacked into schools and a U.S. Department of Energy subsidiary and he even spied on a police department.

Where the story takes on a pretty sick twist is where Phillip recorded individuals engaging in sex, some which where underage individuals.

According to court documents, Phillip often made it a habit of recording those that he spied on, collecting thousands and thousands of images, as well as being able to access tax, medical and banking records of the unlucky individuals and organizations that he spied on from 2003-2017.

Yes, you read that right, 14 years in total.

macos-crimehop

Phillip used FruitFly, a specific malware that is used to target Mac’s, a spyware used to surveille person through mac’s, more specifically watching them through their webcam or camera.

Phillip had been installing the malware onto PC’s for years and once on an individual’s PC, the malware was able to reach out and make contact with others, like the PC’s of businesses, schools, a police department and of course a subsidiary of the U.S. Department of Energy.

Once running, FruitFly was able to steal files, passwords, turned on cameras and microphones.

In some cases, FruitFly would alert Phillip if and when an individual computer were being used to search for porn by a victim.

Court documents indicate that thousands of computers had been infected and comprised and while watching and listening to those that he spied on, this brilliant man took notes, yes he took the time to take down notes with regards to what he heard or saw. 

MacBook-Malware-FruitFly-crimeshop

I know what you are thinking, FruitFly should only be able to work on MacOS right?

Phillip, it seems was able to develop a Windows version which explains how so many PC’s were infected in the end.

As to the child porn charges, while the DOJ has not released much with regards to those charges, it appears that from Oct, 2011 – Jan 2017 Phillip recorded underage teens having sex, recordings he knew he could either share or sell, recordings he knew would be shared.

So how did the DOJ finally catch up with Phillip?

In January of last year, Phillip was accused of hacking into computers at Case Western Reserve University. Upon investigating the complaint against Phillip, the FBI had discovered that the computers had in fact been infected for several years.

This serves as a great way to open the door to some dialogue.  

It doesn’t matter what OS you might be on, just because you think you are safe, you may not be.

We can always count on one individual at the very least, who will be able to develop malware or some way so as to infect whatever OS they desire.

Developers may want to get better at patching things up, closing back-doors, creating devices and software that are smart enough to block infected software, ads and files, or at the very least, ensuring that we cannot be hacked as easily as we currently are.

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

And https://gab.ai/thecrimeshop

Bomb Plotting Terrorists Hooking up On Dating Sites

 

Single-Muslim-crimeshop

 

London – Terrorists Get Lonely Too Sometimes

I always wondered what a terrorist dating profile might look like?

Terrorist: I’m a down to earth extremist who is seeking a fairly mentally unstable, bomb plotting companion who would enjoy bonding over our shared extremist views, mass casualty plotting attacks and romantic walks through the busiest part of town picking the best spot to strike and a possible suicide attack where we would die lovingly together, while taking out half a city.

Last Book Read: Rudimentary Bomb Making for Dummies

Last Film: ISIS Propaganda Video

Dislikes: Any infidel who goes against extremist views.

All joking aside:

munir-mohammed-rowaida-el-hasssan-crimeshop

One couple met on the Muslim Dating Site, SingleMuslim.com and went on to become quite the pair.

Munir Mohammed, an asylum seeker from Sudan and Rowaida El-Hassan, a London pharmacist were convicted by jurors in London’s Central Criminal Court, yesterday of plotting a bomb attack in Britain back on Christmas 2016.

While the happy couple denies the charges it would seem that Facebook evidence was able to show that Munir offered to carry out such an attack during a Facebook exchange with a man who is believed to be an Islamic State group commander.

Not to mention that police also found bomb making instructions and two of the three o components needed for the explosive TATP at Munir’s home.

That doesn’t bode well for Munir.

While Munir was not entirely what one would consider any sort of expert in terms of having knowledge of chemicals, Rowaida was more than willing to share her knowledge of chemicals with him.

Rowaida did admit to some sort of emotional attachment towards Munir, she blatantly denies being part of any plot to blow anything up.

The Judge in the case was quick to point out that Rowaida did in fact know of the bomb plot and she provided Munir with support, motivation and assistance due to her ideology.

An ideology the couple shared and bonded over coffees, bombs and such about.

Which equally did not bode well for Rowaida.

To add just a little more insult to injury for Rowaida, instead of just wanting her for sex, prosecutors pointed out the Munir was drawn to Rowaida’s dating profile because of her masters in pharmacy.

Damn, that’s pretty cold, I get sex, not as attractive looking to date up, but being used because of one’s knowledge of chemicals, ouch!

The happy couple also communicated sharing their love of extremist views using WhatsApp.

The plot included using a homemade bomb and chemical weapons, to cause a significant loss of life.

This perfect match could face life in prison, in separate prisons and are due to be sentenced on February 22, 2018.

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

And https://gab.ai/thecrimeshop

Hackers Getting More Ingenious

crypto-currency-crimeShop

Cryptocurrency Valuations Rising – Expect More Hacks and Cyber Attacks

Hackers are becoming more and more ingenious especially now that cryptocurrency is starting to take off, as the valuations of cryptocurrency rises, cyber attacks are becoming more and more prevalent because hackers want to mine for cryptocurrency.

cryptocurrency-mining-crimeshop

All of the attacks are unknown to users and are coin-mining scripts, normally planted by hackers in the background of public websites, on servers, devices, and in software and are far more lucrative than coin-mining’s ugly adopted twin, malware, stealing bank account information from users.

The attacks, they mine for cryptocurrency and as coin prices rise, so too will the attacks.

One recently discovered attack involved a mass collection of servers where hackers were able to exploit CVE-2-17-10271 which is a critical vulnerability in Oracle’s WebLogic package.

Oracle does have a patch for the vulnerability that was released back in October, but the owner of the servers had not installed it yet.

The hackers were able to mine for cryptocurrency and had mined roughly $6,000 worth of the AEON cryptocurrency.

Back in December a hack generated more than $8,500 worth of Monero cryptocurrency, using the same flaw that hackers exploited to hack Equifax.

What’s interesting here is that the mining programs typically mine the Monero currency rather than Bitcoin, because of Monero’s CPU-friendly hashing algorithm.

Cryptocurrency prices tend to be tightly correlated, so Monero’s price is in sync with Bitcoin.

cryptocurrency-trend-crimeshop.jpg

These attacks are not necessarily stealing the cryptocurrency, they are actually generating digital coins which is a new and improved way of creating counterfeit currency.

As cryptocurrency becomes more and more popular, it looks like the security surrounding cryptocurrency is going to need to be tightened exponentially in order to curb these mining attacks.  

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

And https://gab.ai/thecrimeshop

Android Malware That Can Physically Damage Phones?

 

malware-android-CrimeShop

 

Currency Mining Malware and Your New Android Phone

iPhone-8-crimeshop

My dad used to make fun of me for shelling out the extra money for Apple anything, and while iPhone’s are not 100% malware or hacker proof, they are still the safest bet in town.

Reports are circling around town today about a fairly newer piece of malware affecting Android phones. The malware is a cryptocurrency miner that happens to be so aggressive in nature that it can actually cause physical damage to an Android phone.

Once your phone is infected the malware carries out quite a few malicious activities behind the scene such as but certainly not limited to:

Unending ad’s

Actually participating in DDoS attacks

Sending text messages to any number

Silently subscribing to paid services

And of course

Mining cryptocurrency

The malware is hidden ever so conveniently inside apps that are distributed through third party markets, browser ads, and sms based spam. The malware is called Trojan.AndroidOS.Loapi but has been given the nickname of “jack of all trades,” by researchers at Kaspersky Lab.

Android-malware-physically-damages-phones-crimeshop

After just two days of testing the malware in a lab researchers found that after it ran all of its dirty little deeds continuously it actually caused the phone’s battery to swell so much that it caused the cover to become deformed.

Of course the mining is not the only issue, then again neither is the swelling batteries one might encounter.

The malware also sends a number of prompts for users to assist it in obtaining admin permissions, once granted those highly sought after permissions the malware makes it pretty difficult for an infected device to install security apps that would otherwise “disinfect” the device.

It will subscribe the device to costly premium services pretty much all day long, sending codes in sms on its own to confirm those costly subscriptions and, whoever is on the other end of the attack, well those guys can use the infected phones to become part of DDoS attacks.

Lastly, it displays a constant stream of ads that annoy users to no end.

Researchers have never seen anything like this before and are unsure of its origins.

The good news is that no one seems to think that users are downloading it from Google Play.

Still the same, I think I’ll stick with my iPhone.

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

And https://gab.ai/thecrimeshop