Deep Dot Web http://deepdot35wvmeyd5.onion Surfacing The News From The DeepWeb Sat, 23 Jun 2018 13:03:00 -0300 en-US hourly 1 https://wordpress.org/?v=4.9.6 More Charges against Ex Lakeville Principal Including Card Fraud and Identity Theft http://deepdot35wvmeyd5.onion/2018/06/23/more-charges-against-ex-lakeville-principal-including-card-fraud-and-identity-theft/ http://deepdot35wvmeyd5.onion/2018/06/23/more-charges-against-ex-lakeville-principal-including-card-fraud-and-identity-theft/#respond Sat, 23 Jun 2018 13:03:00 +0000 http://­deepdot­35w­vmeyd5­.onion/?p=26110 Christopher Endicott, former principal of Lakeville has been handed fresh charges of stalking, card fraud, and identity theft. According to the court, Endicott illegally hacked into the computer system of the school and accessed personal details and financial cards of teachers and their families. He illegally obtained credit card information of the employees, including other sensitive data through this process. He spent $120 of the total amount on a pornographic website and also made some purchases online.

In an investigation, authorities discovered an onion browser installed on his phone. A further investigation revealed that the former principal had a direct contact on the Dark web which enabled him to purchase the sophisticated hacking software. However, it was not made clear whether he sold any of the hacked data on the online black market. One of the victims reported that she observed a wipe out on her cell phone and her iPad. She therefore contacted a resource officer who found out that her private documents had been accessed by someone in the facility. According to a report, the victim took action to trace the hacker behind the unauthorized access of the document. It was then discovered that Endicott was the brain behind it. It was also discovered that Endicott had been accessing the victim’s documents since 2016.

During the investigation, the police came across a few of his writings. It was deduced that his action to compromise employees’ data to illegally steal their funds was a result of financial difficulties being faced by the 50-year-old man. “I had accumulated so much debt that I couldn’t find a way out,” he wrote. He was previously charged for burglarizing his neighbor, and also his tenant. According to records, he also stalked a detective who was looking into his own stalking case.

One of the stalking victims who happened to be in a relationship with him also had her own share of stalking and identity theft after their relation ended up poorly. The victim broke up with Endicott after realizing that he was a married man. Endicott did not accept it in good faith. He, therefore, stalked her for five years which even led to a breakup of her new relationship. That was not enough, as Endicott went ahead to open a financial account in her name, and also hacked into the AT&T account of her father. A report says that he also had a copy of her IRS transcript in his possession.

Authorities searched his school office and found a notebook which contained password hints, account numbers and other information about his victims.

A further investigation also led to a discovery of one of his writings, of which he indicated that he was trying to get revenge. These added up to the four new criminal charges opened against Christopher Endicott. The stalking victim confirmed that she ran into his wife in 2011-2012 over a similar case.

Identity theft and credit card fraud had been rampant in recent years with most of the cases being associated with the Dark web. Authorities have also taken measures leading to the arrest and jailing of credit card criminals. Two men were recently jailed for a similar credit card related case. Despite these arrests, there are a number of hackers who freely operate without any problem with the police, thanks to the Dark web. Unfortunately for Endicott, the anonymity of the Dark web could not erase his tracks.

In his previous arrest, he was accused of stealing properties that belonged to his tenants. According to the complaint, the landlord returned a tote which contained a sports card reported to cost around $738. They also said that the tote contained other items which did not belong to him. “Endicott handed over the tote and then apologized, stating that he had taken the property while MO and KO were away in New Zealand, which was between November 13 and December 5, 2017,” according to the complaint. He also did the same to his neighbors.

He was therefore suspended by the school before the new charges. He is currently being held in custody in Crow Wing county jail.

]]>
http://deepdot35wvmeyd5.onion/2018/06/23/more-charges-against-ex-lakeville-principal-including-card-fraud-and-identity-theft/feed/ 0
Canadian Police Bust Massive Dream Vendor “Mr Hotsauce” http://deepdot35wvmeyd5.onion/2018/06/23/canadian-police-bust-massive-dream-vendor-mr-hotsauce-2/ http://deepdot35wvmeyd5.onion/2018/06/23/canadian-police-bust-massive-dream-vendor-mr-hotsauce-2/#respond Sat, 23 Jun 2018 05:02:56 +0000 http://­deepdot­35w­vmeyd5­.onion/?p=26109 According to an announcement from the Royal Canadian Mounted Police (RCMP), a “prolific drug trafficker” landed in police custody after an investigation into thousands of drug transactions that connected to a single drug operation. The RCMP ended the career of one of the largest fentanyl vendors in Canada. Towards the end of the month of May, the RCMP SOC rounded up four individuals suspected of running the Dream vendor account “Mr Hotsauce” or working as one of the primary conspirator’s associates.

The announcement said the four individuals either operated the darknet market vendor account(s) or functioned as so-called “couriers” essential to the Mr Hotsauce operation. George Anthony Athanasiou, 25, seemingly functioned as the primary conspirator and account owner—the press release left ownership interpretations up to the reader. However, Canadian authorities handed down a total of 46 criminal charges after arresting the four suspects and Athanasiou caught more charges than his co-conspirators.

“The RCMP remains committed to identifying, disrupting and dismantling those who seek to traffic these dangerous drugs in our communities. This includes those groups who may try to conceal their illegal activities using complex schemes and Darkweb ventures,” an RCMP officer said in a statement.

Athanasiou was charged with crimes under the Controlled Drugs and Substances Act (CDSA) and the Criminal Code of Canada (CCC). The RCMP charged him with nine counts of trafficking schedule one substances; nine counts of exporting schedule one substances; nine counts of possession of schedule one substances for the purpose of trafficking; nine counts of possession of schedule one substances for the purpose of exporting; four counts of breach of recognizance; two counts of conspiracy; and two firearms law violations.

Even though Mr Hotsauce had a reputation as one of Canada’s best fentanyl vendors, the RCMP noticed the listings for methamphetamine, cocaine, MDMA, ketamine, and several other illegal substances. They wrote that the vendor account was likely “responsible for several thousand illegal drug transactions.”

Jona Claudia Faller, 28, picked up almost as many charges as Athanasiou. The RCMP charged Faller with nine counts of trafficking schedule one substances; nine counts of exporting schedule one substances; nine counts of possession for the purpose of trafficking; nine counts of possession for the purpose of exporting; two counts of conspiracy; and two firearms-related charges.

During the searches executed in connection with the Mr Hotsauce operation, the RCMP discovered methamphetamine, ketamine, crack cocaine, and heroin. The recent Dream Market fentanyl ban may have something to do with the fact that none of the suspects had fentanyl in their possession. Mr Hotsauce, on Dream, announced that his last fentanyl sale would take place on May 14.

The police also seized a firearm, ammunition, $100,000 in cash, roughly $200,000 in cryptocurrencies, and various items used in darknet drug trafficking operations.

Two suspects—Chadwicklee McLean, 20, and Cypress Araujo, 21—received the same charges in number and in kind. Both caught nine counts of exporting schedule one substances; nine counts of trafficking schedule one substances; and two counts of conspiracy. All four suspects lived in Toronto, Ontario. The ringleader in this operation looks to be the one suspect with the majority of the charges. However, each suspect and their respective charges fit the profile of a darknet vendor; all four were caught on conspiracy charges, exporting schedule one substances charges, and trafficking schedule one substances charges.

]]>
http://deepdot35wvmeyd5.onion/2018/06/23/canadian-police-bust-massive-dream-vendor-mr-hotsauce-2/feed/ 0
Cloudflare Integrates Tor Hidden Services to its DNS Services http://deepdot35wvmeyd5.onion/2018/06/22/cloudflare-integrates-tor-hidden-services-to-its-dns-services/ http://deepdot35wvmeyd5.onion/2018/06/22/cloudflare-integrates-tor-hidden-services-to-its-dns-services/#respond Fri, 22 Jun 2018 21:04:43 +0000 http://­deepdot­35w­vmeyd5­.onion/?p=26099 Cloudflare has launched Tor integrated DNS services. The service is a Domain Name System (DNS) resolver which is similar to URLs such as ‘Cloudflare.com’ with their specific and corresponding numerical IP addresses. This helps users locate where a given domain is geographically hosted and can thereafter match it up with associated servers and hardware devices. This means that the name of the domain gives people all the details and information on who has the control and ownership of a particular website.

According to Cloudflare, the process involved wiping its manual logs that did not write clients IP addresses, saying that most privacy-sensitive people may never have wanted to disclose their IP address in any case to the resolver, a decision the company respect.

Cloudflare global outage

In a statement, Cloudflare has announced that there was an outage on the resolver service indicating that it was a glitch in its own system and not a cyber-attack. “Thanks to a coding oversight in our Gatebot DDoS mitigation pipeline.”

The Gatebot is able to offer protection against many different types of DDoS attacks on Layer 7, Layer 4 and Layer 3 by collecting and measuring live traffic to automatically detect malicious traffic as well as choose the appropriate mitigation logic and executing it on the edge.

After gaining the new code release, Gatebot immediately began intercepting resolver traffic on Cloudflare network as an attack hence locking it down. This is because one of the changes made in the new release involves automating the process in which Gatebot determines if an address is a Cloudflare IP address or not. The developer had failed to account for IP address range exception during the integration.

According to a post by the company:

Provision API is a RESTful API is simply used to give this kind of information. Earlier before its existence, Gatebot had to do full configuration to determine whether an IP addresses is Cloudflare by reading a long list of networks from a hand coded file hence we integrated a new code that linked Gatebot to Provision AIP. What was not included by the coders, was the Gatebot’s hand-coded list of Cloudflare addresses in a manual exception for the 1.1.1.0/24 and 1.0.0.0/24 recursive DNS resolver IP ranges. The whole idea on the fix was simply getting lid of the manual hand coded gotchas. Gatebot, the DDoS automatic mitigation logic system, is very powerful and we failed to conduct a thorough test of the changes. However, we are using this incident to work and improve our internal system. The whole idea was to get rid of the hardcoded Gotchas.

It is a difficult and cautionary tale for those tasked with the job of coding the complex algorithms which go into the automated mitigation logic. The resolver’s address dns4torpnlfs2ifuz2s2yf3fc7rdmsbhm6rw75euj35pac6ap25zgqad.onion, which is accessible through tor.cloudflare-dns is as complex as it looks since it’s the main public key that is used in communication encryption with the hidden service. It uses HTTP Alt-Svc header to send notifications to the browser on where and how to gain access to the source. The post noted is usually supported by Mozilla with Firefox Nightly offering a .onion addresses as an alternative service.

This header notifies the browser that the .onion address is available for tor.coudflare-dns.com such as the case of SOCKS proxy, and thereafter the browser proceeds to check the security information such as the server name and certificates. If all is okay with the security details, the browser proceeds to send requests to the alternative service which is the hidden Tor resolver, making sure that your other requests in future do not leave the Tor network.

According to Cloudflare, there are several other protections available in the package, offering a hidden service:

In particular, users are protected against deanonymization attacks and malicious exit nodes which can unmask a user’s browsing details, or even strip the SSL. The only perfect solution to such attacks is to completely eliminate the necessity for those exit nodes by use of hidden service instead. In case your client does not directly support encrypted DNS queries, the use of a hidden resolver service can secure your connection against on-path attacks as well as BGP hijacking attacks.

The post adds giving instructions on how to configure the Cloudflare daemon so as to use the service. Users are also reminded not to use the service in production since it is still in the early stages of experimentation.

]]>
http://deepdot35wvmeyd5.onion/2018/06/22/cloudflare-integrates-tor-hidden-services-to-its-dns-services/feed/ 0
Largest Dark Web Site in Finland Closed Down by Customs on Drug Smuggling Allegations http://deepdot35wvmeyd5.onion/2018/06/22/largest-dark-web-site-in-finland-closed-down-by-customs-on-drug-smuggling-allegations/ http://deepdot35wvmeyd5.onion/2018/06/22/largest-dark-web-site-in-finland-closed-down-by-customs-on-drug-smuggling-allegations/#comments Fri, 22 Jun 2018 13:04:40 +0000 http://­deepdot­35w­vmeyd5­.onion/?p=26098 A joint operation involving the Finnish customs and the Finnish Police has led to the closure of the Sipulikanava website, a Finnish-only dark web forum. The Sipulikanava website was shut down due to charges of online drug smuggling. It was the biggest Finnish dark web marketplace with huge amounts of illegal drugs selling from 2014 to 2017.

According to an official press release on Thursday, it was revealed that the Finnish Customs in collaboration with the police shut down the Sipulikanava on November 1 of last year. This marked the biggest ever shut down in the country.

Hannu Sinkkonen, Finnish Customs enforcement chief, after the closure stated that: “Of course the drug trade will always find new routes, but the overall impact has been significant,” adding that “This is the largest operation of this scale and very different from previous ones.” Many dark web marketplaces which openly deal in illegal drugs have been shut down in the country but this is the first time law enforcement has boot an entire server offline.

The accused are two Finnish nationals, a 45-year-old IT wizard who also is the Sipulikanava website’s administrator, and another. This case also marks the first time, the administrator of a dark web marketplace is being accused of dealing drugs online in Finland.

Reports suggest the investigation is in its latter stages and the case is expected to be submitted to the Prosecutor’s Office of Itä-Uusimaa for a review of the charges. The presumed offenses which are currently under investigation are linked to 37 previous cases of aggravated narcotics offenses. These offenses, according to an earlier investigation, happened from 2016 to 2017, when a section of the Sipulikanava dark web marketplace dealt in illegal drugs.

The dark web marketplace appeared under the radar of customs officials back in 2017 when it learned that an individual behind the moniker ‘Ekstaasikauppa’ had purchased drugs on the dark web marketplace. This particular individual had been previously investigated by customs officials for buying drugs from a group of people also hiding behind the moniker ‘Douppingkauppa.’ This same vendor was busted in 2016. Apparently, the ‘Ekstaasikauppa’ account holder had contacted the dealers through a drug advert on the Sipulikanava marketplace and both parties agreed and arranged for drugs to be delivered to him.

Custom Officials alongside the National Bureau of Investigation and the Special Investigations Unit of the Helsinki Police Department, between October 31 and November 1 last year searched the residence of the suspected individuals in Vantaa. The search yielded results as concrete technical evidence, linked to the Sipulikanava dark web marketplace and its administration was obtained together with a small number of illegal drugs.

The web server of the prime suspect was afterward seized from his office. Reports suggest that the server was a backup one for that of Sipulikanava’s. His boss, however, denied any knowledge of any wrongdoing or criminal activity by his employee and was cleared of any criminal offense.

Data about buyers and sellers was obtained in connection with closing down the servers and has since been utilized.

The Sipulikanava dark web marketplace was created on March 13, 2014, and worked its way into becoming one of the biggest Finnish dark web marketplaces, dealing in illegal drugs and other illegal activities. The dark web marketplace is basically a discussion forum and in addition to that, it offers clients, legitimate content. However, the person in charge of the website had already created a section, dedicated to only narcotics dealing. He also made sure buyers and sellers of illegal drugs would easily connect to the marketplace. Buyers were able to place an advert with information of the type of drugs they were searching and then add their ID for instant messaging. The purpose of this instant messaging app was for buyers and dealers to agree on the type and quantity of drugs to be sold, as well as delivery.

Sipulikanava is known to have encouraged the purchasing and selling of huge amounts of illegal drugs across Finland. Kilograms of marijuana and amphetamine, over thousands of Rivotril pills which contain the medication Clonazepam, a pharmaceutical used to treat seizures and panic disorder, were all made possible to obtain, thanks to the dark web marketplace.

]]>
http://deepdot35wvmeyd5.onion/2018/06/22/largest-dark-web-site-in-finland-closed-down-by-customs-on-drug-smuggling-allegations/feed/ 4
Utah: Three Enter Guilty Pleas in the PharmaMaster Case http://deepdot35wvmeyd5.onion/2018/06/22/utah-three-enter-guilty-pleas-in-the-pharmamaster-case/ http://deepdot35wvmeyd5.onion/2018/06/22/utah-three-enter-guilty-pleas-in-the-pharmamaster-case/#respond Fri, 22 Jun 2018 05:04:37 +0000 http://­deepdot­35w­vmeyd5­.onion/?p=26097 Three people pleaded guilty to helping the now-infamous darknet vendor “Pharma-Master” distribute fentanyl and alprazolam from his Cottonwood Heights homes. While the three individuals played much less important roles than the two leaders of the Utah-based drug trafficking operation, federal prosecutors pursued the indictment just the same.

The first two now-convicted drug traffickers were first named in the first superseding indictment that included many of the alleged co-conspirators that helped the primary suspects—Aaron Shamo and Drew Crandall—run their multi-million dollar darknet drug operation. Then-roommates Alexandrya Marie Tonge, 26, and Katherine Lauren Anne Bustin, 28, had quickly joined Shamo and Crandall after learning how much money the duo offered simply to receive packages the duo routinely received from China.

At first, although they knew the packages had contained illegal substances of some sort, they remained somewhat naive as to what their new employers needed with the packages. The two women later discovered that many of the packages had contained alprazolam powder, fentanyl powder, or binders used to create pills. Shamo and Crandall, under the Pharma-Master (or PharmaMaster) identity, sold pressed xanax and fentanyl pills they had produced using industrial pill presses the police later discovered in Shamo’s Cottonwood Heights home.

Tonge and Bustin admitted conspiracy to distribute fentanyl; conspiracy to distribute alprazolam; conspiracy to commit money laundering; possession with intent to distribute fentanyl; and use of the US Postal Service in furtherance of a drug crime. The duo described preparing thousands of packages of drugs for shipment every month in exchange for $7,000. The duo had started with a much less lucrative role in the conspiracy but eventually took on increasingly criminal positions. Shamo’s operation had expanded so quickly that he needed all the help he could get.

At the time of his arrest, the police found more than 500,000 pressed pills in the man’s basement and garbage bags stuffed with more than $1 million in cash. Shamo had allegedly produced and shipped thousands of pills every month. In less than one year, he had earned more than $2.8 million through darknet drug sales (gross, most likely, but bulk fentanyl and alprazolam cost almost nothing when purchased in bulk from international suppliers).

The third conspirator who pleaded guilty at the recent hearing in the Utah federal court was Sean Michael Gygi, 28. Gygi played an even smaller role than Tonge and Bustin. Accusing to his plea agreement, Gygi picked up packages of drugs that the two women had prepared and then dropped the packages off at post offices throughout the region. He still faced serious charges, though. In his plea, he admitted conspiracy to distribute fentanyl; conspiracy to distribute alprazolam; the use of the US Postal Service in furtherance of a drug crime; and to aiding and abetting the importation of controlled substances.

All three co-conspirators will be sentenced at an unknown date. Shamo’s jury trial will take place on August 20 and will take up to four weeks.

]]>
http://deepdot35wvmeyd5.onion/2018/06/22/utah-three-enter-guilty-pleas-in-the-pharmamaster-case/feed/ 0
Chicago Woman Denies Hiring a Hitman on the Darknet http://deepdot35wvmeyd5.onion/2018/06/21/chicago-woman-denies-hiring-a-hitman-on-the-darknet/ http://deepdot35wvmeyd5.onion/2018/06/21/chicago-woman-denies-hiring-a-hitman-on-the-darknet/#comments Thu, 21 Jun 2018 21:03:31 +0000 http://­deepdot­35w­vmeyd5­.onion/?p=26091 Tina E. Jones, 31, entered a plea of not guilty to solicitation of murder and attempted murder at the DuPage County court, court documents revealed. In April, Chicago law enforcement arrested Jones after she had allegedly arranged for the assassination of a romantic rival through a fraudulent “murder-for-hire “ site on the darknet. According to the information revealed after the arrest, Jones had already handed the fraudster $10,000 in Bitcoin for the murder.

As with all the murder-for-hire sites on the darknet that have appeared in the news recently, the site she contacted and subsequently contr acted had no intention of truly harming anyone. The hidden service, a Crimebay clone called the Cosa Nostra International Network or just “Cosa Nostra,” was an obvious scam. And especially so to anyone that watched the similar drama unfold with nearly identical sites created by the same scam artist. Many defendants in similar cases have attempted to obtain a more lenient sentence due to the lack of an actual threat caused by the defendant’s attempted solicitation of murder.

However, in Jones’ case, United States law enforcement and officials involved in criminal procedures revealed that the lack of a valid threat had no impact on the severity of attempted murder or related charges. Jones, at this point in her case, effectively had to enter a plea of not guilty, even if she has no intention of fighting the charges in a jury trial.

Due to the nature of the alleged crimes and the risk associated with suspects in (attempted) murder investigations, people were surprised that Judge George Bakalis freed Jones. In contrast to denying her bail and detaining her in pre-trial detention. Judge Bakalis allowed Jones to post a $25,000 cash bond following a brief session in his chambers with the prosecutor and Jones’ attorney, Stephen Hall.

The (likely temporary) freedom came with a number of strict stipulations, though. Judge Bakalis ordered that Jones wear a GPS monitor at all times; that she live in Georgia with her parents; that she not leave the state except to attend scheduled her scheduled court appearances; that the must spend less than 24 hours in Illinois when arriving for the scheduled hearings; that she remain more than one mile away from the woman she had allegedly attempted to murder; and that she contact Illinois authorities every week. She was also banned from contacting the married man with whom she had been intimately involved. And his wife, of course.

Given the mandatory minimum prison sentence of 20 years associated with the charges Jones faces, the relatively strict rules seem more than fair. And likely indicate that the inevitable plea deal will include reduced charges without mandatory minimums.

Jones will reappear in court on August 16.

]]>
http://deepdot35wvmeyd5.onion/2018/06/21/chicago-woman-denies-hiring-a-hitman-on-the-darknet/feed/ 1
Pedophile Caught in Homeland Security Operation Sentenced to Prison http://deepdot35wvmeyd5.onion/2018/06/21/pedophile-caught-in-homeland-security-operation-sentenced-to-prison/ http://deepdot35wvmeyd5.onion/2018/06/21/pedophile-caught-in-homeland-security-operation-sentenced-to-prison/#respond Thu, 21 Jun 2018 13:03:28 +0000 http://­deepdot­35w­vmeyd5­.onion/?p=26090 According to an announcement from John Durham, the United States Attorney for the District of Connecticut, a district court judge sentenced a Connecticut, man to five years in prison for possessing hundreds of pictures and videos that depicted child abuse. The defendant, a 61-year-old from Shelton, Connecticut, named Michael Hull, had been downloading child abuse material on the darknet when federal agents identified identified him through an unknown means.

Hull is one of two suspects recently covered by DeepDotWeb that found themselves amidst a secretive Homeland Security Investigations operation into darknet child abuse sites. Given that the Homeland Security Investigations operation is an active an ongoing operation, the details revealed by the federal law enforcement agency have not provided any worthwhile insight into the operation or the operation’s scope. Now that convictions have started rolling in, more informative information will likely surface.

For now, we know that this investigation focuses on sites and individuals responsible for the dissemination of child abuse material on the darknet. In alignment with the dozens of child abuse operations that focused on specific actors or a specific site, one could reasonably conclude that the HSI operation had been targeting users of a single site. And more specifically, a site where the investigators have the ability to identify users hiding behind the Tor network. This could be as simple as posting links on darknet forums to content hosted on the clearnet sites that is more easily accessed outside of Tor (uploading content to “trusted” or “approved” clearnet hosts is a fairly standard practice; leaving Tor is not).

Homeland Security Investigations could have gone the route of uploading infected media that identifies the downloader. They could have pulled a move similar to Dutch law enforcement in Operation Bayonet: swapping out a safe for for one that “calls home” to LE servers. Users behind a VPN or Tor should still be safe in such a scenario. Another option—and one that would call for more secrecy—is that Homeland Security Investigations carefully became the owners of a large child abuse site where they can employ dozens of attacks in an effort to identify users.

The truth is that until the information leaks or Homeland Security Investigations reveals the details of the operation, we will not know how they are capturing users. All we know is that they are actively doing so. And in May 2017, they did just that: they arrested Hull, a member of whatever site the agency had been investigating. Alongside Shelton Police officers, HSI agents raided Hull’s house in search of electronic devices that contained child abuse content. They pulled 16 electronic devices out of his house.

Forensic analysts 13 images and 126 videos on the devices they successfully accessed. US Attorney Durham announced that investigators failed to decrypt one of the man’s hard drives and two of the man’s tablets. They did not not need access to the encrypted devices to successfully convict the 61-year-old, though.

U.S. District Judge Stefan R. Underhill sentenced the man to five years in prison and five years of federal supervised release. Hull had pleaded guilty to a single count of possession of child pornography in 2018.

]]>
http://deepdot35wvmeyd5.onion/2018/06/21/pedophile-caught-in-homeland-security-operation-sentenced-to-prison/feed/ 0
What is Social Engineering? http://deepdot35wvmeyd5.onion/2018/06/21/what-is-social-engineering/ http://deepdot35wvmeyd5.onion/2018/06/21/what-is-social-engineering/#comments Thu, 21 Jun 2018 05:58:21 +0000 http://­deepdot­35w­vmeyd5­.onion/?p=26086 Social Engineering is a scam artist’s best trick. It’s pretty much as it sounds, you engineer society in order to do things you shouldn’t. A few common examples would be wearing a safety vest and hardhat to sneak onto construction sites for urban exploration, wearing a lanyard and carrying a clipboard to get backstage of a concert without being asked uncomfortable questions, etc. These are just simple examples, you dress the part of someone who belongs where you’re going, and you just walk in. It can get a lot more complicated than that, with benefits to match.
Ok, how is it useful for me?
Social engineering more than just playing dress up to get behind the scenes of some concert. You can use these tricks to get ahead in life. Getting the upperhand in a job interview or promotion. Maybe making yourself appear more desirable to a romantic interest. Or some more nefarious means such as scamming, corporate espionage, etc. In every single encounter with another human being, there is an opportunity for social engineering to be used for your benefit. It’s about looking for the chance and taking it without any hesitation.
You have me hooked, *how* can I use this?
Let’s get into the nitty gritty, what the actual *actions* that you can do? One simple trick is reciprocation. It’s one of the most basic concepts but can take you far. Do a small action for someone and they will do something for you in return. The opposite is true too. If you want to build rapport with someone, ask them to do something small for you. They view you as more likeable. Other things to build rapport would be copying mannerisms and body language in a way that is natural. Think of when someone is in a foreign place and meets someone from the same place as them. Instant friends! That’s what you’re going for. You want to seem familiar. Life is about socialness. If you can make people feel comfortable with you, that’s an open door that might’ve been closed otherwise. Many job interviews have been aced not by what’s on the resume but by how the interviewer feels about the interviewee.
How social engineering can help with illicit gains
Reciprocation is a huge tool and is widely used. Simple things such as holding the door for somebody makes them feel as if they have to hold the next door for you. Useful if the first door can be opened by anyone and the second requires a cardkey, which they have and you don’t. Maybe you lost yours and don’t want to tell your boss or maybe you’re trying to get your hands on some vital information from a competitor. And getting past that receptionist that has never seen your face before? Pretend to be mildly annoyed at someone on the phone. People are less likely to go up to someone if they are on the phone and not being in a good mood helps to deter them more.
Anywhere that you can perform some small service to someone is an opportunity to get them to unknowingly give you something you shouldn’t be having. Whether that be information or access to somewhere, both physical and cyber. These small acts can be everyday occurances such as the previous example of holding a door, or it can be created on the spot by you. For example, you’re pretending to be the new IT guy at a company. You have the outfit, you’re in an area accessible only to staff, etc. You know that everyone does non work related things at work so you go up to someone as say their computer will be remotely accessed for diagnostics, but to not worry as they can keep working during this time. While explaining this you mention that you don’t tell your superior about any non work related sites they may have visited. And right there you just created a situation where you are doing them a small favor. Because of that obligation to reciprocate, they may log in somewhere for you (or even outright give you the credentials). Or show you the way to the server room because you’re new and “forgot”. Point is, these opportunities are everywhere and ripe for the picking.
]]>
http://deepdot35wvmeyd5.onion/2018/06/21/what-is-social-engineering/feed/ 3
Fentanyl Dealer to Spend Two Decades in Prison http://deepdot35wvmeyd5.onion/2018/06/20/fentanyl-dealer-to-spend-two-decades-in-prison/ http://deepdot35wvmeyd5.onion/2018/06/20/fentanyl-dealer-to-spend-two-decades-in-prison/#comments Wed, 20 Jun 2018 21:32:19 +0000 http://­deepdot­35w­vmeyd5­.onion/?p=26075 An announcement from United States Attorney Sherri A. Lydon of the US Attorney’s Office of the District of South Carolina revealed that a Charleston district judge had sentenced a fentanyl dealer to 20 years in prison for distribution of fentanyl that resulted in death. After the incarceration, the defendant—a 61-year-old—will spend another five years on federal supervision.

The defendant, Robert Bryan Mansfield, admitted that he had imported fentanyl in bulk from darknet vendors and then redistributed the drug through darknet markets. The investigation into Mansfield began after Homeland Security Investigations seized more than a kilogram of fentanyl that a supplier in Hong Kong had shipped to Mansfield’s home address. The same day, Homeland Security Investigations agents in Charleston obtained a search warrant that authorized them to search Mansfield’s home.

“Whether you are a dark web vendor or a traditional street dealer, DEA and its law enforcement partners will apply every resource to ensure you face the full measure of justice,” DEA Resident Agent in Charge Jason Sandoval said.

Law enforcement wastes very little time in cases that involve the illicit trafficking of opioids. This process undoubtedly speeds up when the opioid in question is fentanyl. And then turns into a same-day search warrant and arrest when the amount of fentanyl seized or intercepted reaches a the lethality of a chemical weapon capable of taking out a small town. In many cases, authorities have spent countless hours building a case that ensures a conviction. Keep in mind that federal prosecutors have maintained a conviction rate of roughly 90 percent. But with a kilogram of fentanyl in the mail, authorities seemingly move much more quickly than usual.

At the defendant’s house, HSI agents seized more than 100 grams of fentanyl, an assortment of psychoactive substances intended for redistribution, evidence that Mansfield had been selling drugs, and USPS mailers and information that linked Mansfield to USPS packages. Armed with the USPS information seized by HSI agents, United States Postal Inspection Service Inspectors—still on the same day—searched for packages that Mansfield had shipped that had not yet arrived at their destinations. The Inspectors pulled ten packages of fentanyl from the mail stream.

As Mansfield sat in jail in South Carolina with a federal hold, federal law enforcement agencies built a case that would ensure conviction. The US Drug Enforcement Administration joined the investigation and really made sure that Mansfield would remain in prison—if convicted—until he was roughly 80 years old. The DEA had evidence that the fatal overdose of a man in 2016 was due to fentanyl Mansfield had distributed. They introduced a superseding indictment that added one count of “distribution of fentanyl that resulted in death.” The charge carried a mandatory minimum sentence of 20 years in prison.

At a change of plea hearing, Mansfield pleaded guilty to the new charge. And months later, United States District Judge David C. Norton sentenced the 61-year-old to 20 years in federal prison and five years of supervised release.

]]>
http://deepdot35wvmeyd5.onion/2018/06/20/fentanyl-dealer-to-spend-two-decades-in-prison/feed/ 3
Isle of Man Suspect Downloaded the Worst Child Abuse Content Available http://deepdot35wvmeyd5.onion/2018/06/20/isle-of-man-suspect-downloaded-the-worst-child-abuse-content-available/ http://deepdot35wvmeyd5.onion/2018/06/20/isle-of-man-suspect-downloaded-the-worst-child-abuse-content-available/#comments Wed, 20 Jun 2018 13:32:16 +0000 http://­deepdot­35w­vmeyd5­.onion/?p=26074 A 24-year-old from Castletown, Isle of Man, downloaded the most severe child abuse videos from the darknet, a Magistrates heard after deciding they lacked the ability to adequately sentence the suspect. Magistrates believed the maximum sentence they could impose—six months in custody—would not have served as a harsh enough punishment. And as a result, in July, the man will attend a hearing at the Court of General Gaol Delivery where he faces a much lengthier sentence.

The defendant, Paul James Sales, had downloaded nine illegal pictures and videos from an unknown site on the darknet, the court heard. Sales told the court that he had learned about the darknet through one of his friends. He said that he had been looking to purchase steroids and learned that he could likely find any illicit substance on the darknet. Somehow, he explained, nine illegal pictures and videos ended up on his phone.

He said said that since he did not know how to access the darknet, he had to watch YouTube videos for instruction. It was not clear if Sales indicated that there was a connection between his child abuse content and YouTube. This seemed like an otherwise unnecessary detail. So did the explanation of how he had even gotten to the point where child abuse content could have accidentally slipped onto his phone. Disclosing a hunt for illegal substances seems like something one would rather not admit in a case that has nothing to do with illegal substances.

And even if, somehow, the steroid search could have provided a reasonable explanation for why the content had moved from a darknet site to his phone, that was not exactly the problem the authorities had with the case. The severity or extremity of the videos was what led the Magistrates to the decision on not sentencing Sales. According to Prosecutor Barry Swain, one of the videos downloaded by Sales ranked the worst on the Copine scale. Seven of the videos ranked second worst. Only one video fell into category three (out of five).

Even though Sales admitted he had known what the videos had depicted prior to opening them, Stephen Wood, for the defense, argued that Sales had no interest in underage children and did not like the content he saw in one of the videos (Sales maintains that he had only watched part of one of the videos). “They say curiosity killed the cat which is perhaps very apt in this case,” Prosecutor Swain told the court.

The court permitted Sales to remain free on bail until his upcoming hearing at the Court of General Gaol Delivery on July 6.

]]>
http://deepdot35wvmeyd5.onion/2018/06/20/isle-of-man-suspect-downloaded-the-worst-child-abuse-content-available/feed/ 2