Blackmailers Getting Sneaky – Using Technology To Remain Hidden
from the though,-it-didn't-work-out dept
Found on Dave Farber’s IP list is this translation of a blackmail scam in Europe where the blackmailer used some fairly sneaky methods to remain anonymous – and to avoid all direct contact with the company he was blackmailing. What he did was to mail the company a steganography program for encoding messages in images. He then had them pull the code off the bank card that had access to the account where the blackmail money was deposited. They then used the stego program to encode that info into an image of a red VW car, which was placed in a fake ad selling used cars on a popular used car buying site. The guy, using an anonymous surfing tool, surfed to the site, downloaded the picture, got the info and made his own copy of the card. Impressive, to say the least. Of course, the info was turned over to the FBI who figured out who the guy was within 24 hours – though, the article doesn’t indicate how. Still, I imagine that these sorts of crimes will only get increasingly sophisticated in the near future.
Comments on “Blackmailers Getting Sneaky – Using Technology To Remain Hidden”
How they found him
The info the FBI provided (via the anonymous surfing tool provider) to the Dutch police was his email address. From there it was easy to obtain his personal information from the ISP that provided the email-address.
Re: How they found him
If it was an anonymous surfing tool, then how did they get his email address?
Re: Re: How they found him
If it was an anonymous surfing tool, then how did they get his email address?
Mike, it is probably best that some things are left to the imagination. Maybe the Anonymous Surfing Tool was run in Germany [theregister.co.uk]?
Re: Re: How they found him
Because he had to register for this service. And he used a real email-address for that…. They always make a mistake;-)