United Kingdom

UK's First Permanent Facial Recognition Cameras Installed (theregister.com) 55

The Metropolitan Police has confirmed its first permanent installation of live facial recognition (LFR) cameras is coming this summer and the location will be the South London suburb of Croydon. From a report: The two cameras will be installed in the city center in an effort to combat crime and will be attached to buildings and lamp posts on North End and London Road. According to the police they will only be turned on when officers are in the area and in a position to make an arrest if a criminal is spotted. The installation follows a two-year trial in the area where police vans fitted with the camera have been patrolling the streets matching passersby to its database of suspects or criminals, leading to hundreds of arrests. The Met claims the system can alert them in seconds if a wanted wrong'un is spotted, and if the person gets the all-clear, the image of their face will be deleted.
The Courts

Director Charged With Netflix Fraud After Splurging on Crypto Instead of Finishing Sci-fi Series (npr.org) 23

Hollywood filmmaker Carl Erik Rinsch has been charged with defrauding Netflix of $11 million after allegedly misusing funds intended for an unfinished science fiction series, federal prosecutors said.

Rinsch, 47, was arrested in West Hollywood this week on charges of wire fraud, money laundering and unlawful monetary transactions that could result in decades of imprisonment if convicted. The FBI and Acting U.S. Attorney for the Southern District of New York allege Rinsch diverted funds meant for his series "Conquest" to speculate on cryptocurrency, stay in luxury hotels and purchase high-end items including five Rolls-Royces and a Ferrari.

Netflix had paid Rinsch $44 million between 2018 and 2019 for the science fiction project about an artificial humanlike species. Prosecutors say he then requested an additional $11 million but never completed the production. An arbitrator ruled in Netflix's favor last year, ordering Rinsch to pay the company $11.8 million. Rinsch appeared in federal court with shackles and posted a $100,000 bond.
Crime

FedEx Data Scraping and Telecom Insider Bribes Powered Nationwide iPhone Theft Operation (wsj.com) 20

Federal authorities have broken up an international crime ring that stole thousands of iPhones from porches nationwide [non-paywalled link], arresting 13 people last month after a sophisticated operation that combined high-tech tools with old-fashioned bribery.

The thieves created software to scrape FedEx tracking numbers and paid AT&T store employees to provide customer order details and delivery addresses, according to WSJ, which cites prosecutors. Armed with this information, runners intercepted packages at doorsteps moments after delivery.

Demetrio Reyes Martinez, known online as "CookieNerd," developed code that circumvented FedEx limits on delivery-data requests, while AT&T employee Alejandro Then Castillo used his credentials to track hundreds of shipments and reportedly received up to $2,500 for recruiting other employees. Stolen devices were funneled through Wyckoff Wireless in Brooklyn, a store owned by Joel Suriel, who was already on supervised release from a previous wire-fraud conviction. The merchandise was then shipped overseas for sale and activation.
Crime

Cybersecurity Alert Warns of 300 Attacks with 'Medusa' Ransomware (theregister.com) 21

A ransomware-as-a-service variant called "Medusa" has claimed over 300 victims in "critical infrastructure sectors" (including medical), according to an joint alert from CISA, the FBI, and the Multi-State Information Sharing Analysis Center.

And that alert reminds us that Medusa is a globe-spanning operation that recruits third-party affiliates to plant ransomware and negotiate with victims, notes the Register. "Even organizations that have good ransomware recovery regimes, meaning they don't need to unscramble encrypted data as they have good backups and fall-back plans, may consider paying to prevent the release of their stolen data, given the unpleasant consequences that follow information leaks. Medusa actors also set a deadline for victims to pay ransoms and provide a countdown timer that makes it plain when stolen info will be sprayed across the internet. If victims cough up $10,000 in cryptocurrency, the crims push the deadline forward by 24 hours.

The advisory reveals one Medusa actor has taken things a step further. "FBI investigations identified that after paying the ransom, one victim was contacted by a separate Medusa actor who claimed the negotiator had stolen the ransom amount already paid," the advisory states. That separate actor then "requested half of the payment be made again to provide the 'true decryptor'," the advisory states, describing this incident as "potentially indicating a triple extortion scheme."

The security groups' advisory stresses that they "do not encourage paying ransoms as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations..." (But "Regardless of whether you or your organization have decided to pay the ransom, FBI, CISA, and MS-ISAC urge you to promptly report ransomware incidents...)

Besides updating software and operating systems, the alert makes these recommendations for organizations:
  • Require VPNs (or jump hosts) for remote network access
  • Block remote access from unknown/untrusted origins, and disable unused ports
  • Segment networks to help prevent the spread of ransomware
  • Use a networking monitoring tool to spot and investigate abnormal activity — including lateral movement (using endpoint detection and response tools). Log all network traffic, and monitor it for unauthorized scanning and access attempts.
  • Create recovery plans with encrypted offline backups of sensitive/proprietary data and servers
  • Require multifactor authentication, use strong (and long) passwords, and "consider not requiring frequently recurring password changes, as these can weaken security." (Also audit access control following the principle of least privilege, and watch for new and/or unrecognized accounts.)
  • Disable command-line and scripting activities and permissions.

The Courts

Climatologist Michael Mann Finally Won a $1M Defamation Suit - But Then a Judge Threw It Out (msn.com) 64

Slashdot has run nearly a dozen stories about Michael Mann, one of America's most prominent climate scientists and a co-creator of the famous "hockey stick" graph of spiking temperatures. In 2012 Mann sued two bloggers for defamation — and last year Mann finally won more than $1 million, reports the Washington Post. "A jury found that two conservative commentators had defamed him by alleging that he was like a child molester in the way he had 'molested and tortured' climate data."

But "Now, a year after that ruling, the case has taken a turn that leaves Mann in the position of the one who owes money." On Wednesday, a judge sanctioned Mann's legal team for "bad-faith trial misconduct" for overstating how much the scientist lost in potential grant funding as a result of reputational harm. The lawyers had shown jurors a chart that listed one grant amount Mann didn't get at $9.7 million, though in other testimony Mann said it was worth $112,000. And when comparing Mann's grant income before and after the negative commentary, the lawyers cited a disparity of $2.8 million, but an amended calculation pegged it at $2.37 million.


The climate scientist's legal team said it was preparing to fight the setbacks in court. Peter J. Fontaine, one of Mann's attorneys, wrote in an email that Mann "believes that the court committed errors of fact and law and will pursue these matters further." Fontaine emphasized that the original decision — that Mann was defamed by the commentary — still stands. "We have reviewed the recent rulings by the D.C. Superior Court and are pleased to note that the court has upheld the jury's verdict," he said.

Thanks to Slashdot reader UsuallyReasonable for sharing the news.
AI

Spain To Impose Massive Fines For Not Labeling AI-Generated Content 27

Spain's government has approved legislation imposing substantial fines of up to 35 million euros or 7% of global turnover on companies that fail to clearly label AI-generated content. Reuters reports: The bill adopts guidelines from the European Union's landmark AI Act imposing strict transparency obligations on AI systems deemed to be high-risk, Digital Transformation Minister Oscar Lopez told reporters. "AI is a very powerful tool that can be used to improve our lives ... or to spread misinformation and attack democracy," he said. Spain is among the first EU countries to implement the bloc's rules, considered more comprehensive than the United States' system that largely relies on voluntary compliance and a patchwork of state regulations. Lopez added that everyone was susceptible to "deepfake" attacks - a term for videos, photographs or audios that have been edited or generated through AI algorithms but are presented as real. [...]

The bill also bans other practices, such as the use of subliminal techniques - sounds and images that are imperceptible - to manipulate vulnerable groups. Lopez cited chatbots inciting people with addictions to gamble or toys encouraging children to perform dangerous challenges as examples. It would also prevent organizations from classifying people through their biometric data using AI, rating them based on their behavior or personal traits to grant them access to benefits or assess their risk of committing a crime. However, authorities would still be allowed to use real-time biometric surveillance in public spaces for national security reasons.
Crime

Thousands of Freed Scam Center Workers Now Trapped in Overcrowded Detention Centers (apnews.com) 85

August, 2023: Thousands of Crypto Scammers are Enslaved by Human-Trafficking Gangsters, Says Bloomberg Reporter. ("They'd lure young people from across Southeast Asia...with the promise of well-paying jobs in customer service or online gambling.")

February, 2025: A coordinated response begins by Thai, Chinese and Myanmar authorities, which includes cutting power, internet, and fuel supplies to the scam centers.

Today: The Associated Press reports that thousands of the people liberated from locked compounds in Myanmar now "have found themselves trapped once again, this time in overcrowded facilities with no medical care, limited food and no idea when they'll be sent home." Thousands of sick, exhausted and terrified young men and women, from countries all over the world squat in rows, packed shoulder to shoulder, surgical masks covering their mouths and eyes. Their nightmare was supposed to be over... The armed groups who are holding the survivors, as well as Thai officials across the border, say they are awaiting action from the detainees' home governments. It's one of the largest potential rescues of forced laborers in modern history, but advocates say the first major effort to crack down on the cyber scam industry has turned into a growing humanitarian crisis...

An unconfirmed list provided by authorities in Myanmar says they're holding citizens from 29 countries including Philippines, Kenya and the Czech Republic. Authorities in Thailand say they cannot allow foreigners to cross the border from Myanmar unless they can be sent home immediately, leaving many to wait for help from embassies that has been long in coming. China sent a chartered flight Thursday to the tiny Mae Sot airport to pick up a group of its citizens, but few other governments have matched that. There are roughly 130 Ethiopians waiting in a Thai military base, stuck for want of a $600 plane ticket. Dozens of Indonesians were bused out one morning last week, pushing suitcases and carrying plastic bags with their meager possessions as they headed to Bangkok for a flight home... The recent abrupt halt to U.S. foreign aid funding has made it even harder to get help to released scam center workers...

It's not clear how much of an effect these releases will have on the criminal groups that run the scam centers. February marked the third time the Thais have cut internet or electricity to towns across the river. Each time, the compounds have managed to work around the cuts. Large compounds have access to diesel-powered generators, as well as access to internet provider Starlink, experts working with law enforcement say.

The article also points out that "The people released are just a small fraction of what could be 300,000 people working in similar scam operations across the region, according to an estimate from the United States Institute of Peace. Human rights groups and analysts add that the networks that run these illegal scams will continue to operate unless much broader action is taken against them..."

"The United Nations Office on Drugs and Crimes estimates that between $18 billion and $37 billion was lost in Asia alone in 2023, with minimal government action against the criminal industry's spread."
Crime

Sam Bankman-Fried Gives a Jailhouse Interview, Seeking a Pardon (msn.com) 67

Sam Bankman-Fried — one of the largest donors to the Democratic Party — "was convicted of fraud, sentenced to 25 years in prison and mostly went silent," reports the Wall Street Journal. "Until recently..." Now, from behind bars at the Metropolitan Detention Center in Brooklyn, Bankman-Fried is orchestrating an extraordinary public-relations blitz that looks very much like a campaign to make the most audacious trade of his career: support for President Trump's agenda in return for a presidential pardon...

There is little downside to Bankman-Fried's long-shot effort to secure a pardon. As the appeal that he filed last year works its way through the courts, Bankman-Fried, 33, is staring down a prison sentence that could extend until his 50s... The crowning touch of his campaign came on Thursday, when Bankman-Fried gave a jailhouse interview to "The Tucker Carlson Show," which was released on social-media channels including X and YouTube. Appearing on video in a brown jumpsuit, he criticized Washington bureaucrats and crypto regulators — and suggested that he went to prison out of political retribution... [Carlson's title for the interview? "Sam Bankman-Fried on Life in Prison With Diddy, and How Democrats Stole His Money and Betrayed Him."]

The interview hadn't been approved by the Federal Bureau of Prisons, according to a person familiar with the matter. Bankman-Fried spoke with Carlson through a link that is typically used by inmates to communicate with their lawyers, the person said. After the interview, Bankman-Fried was placed in solitary confinement, but he was out by Friday afternoon, according to a person familiar with the matter... Bankman-Fried is trying to highlight in media appearances and in any interaction with Trump's team that FTX customers are set to be made whole with interest through the bankruptcy proceedings — at least in dollar terms. Many of those creditors remain furious that they missed out on bitcoin's rally since November 2022.

Bankman-Fried "wants to set the record straight on his political beliefs, which he believes have been misconstrued," according to the article. "While he has given heavily to Democrats, he has also donated to Republican causes, including the contribution of millions to a group supporting Senator Mitch McConnell."

But the New York Times, citing "people with knowledge" of his pardon-seeking efforts, reported that "So far, the push does not appear to have gained traction."
United Kingdom

Electronic Devices Used For Car Thefts Set To Be Banned in England (bbc.com) 99

Sophisticated electronic devices used by criminals to steal cars are set to be banned under new laws in England and Wales. From a report: More than 700,000 vehicles were broken into last year -- often with the help of high-tech electronic devices, including so-called signal jammers, which are thought to play a part in four out of 10 vehicle thefts nationwide.

Until now, police could only bring a prosecution if they could prove a device had been used to commit a specific offence, but under new laws in the Crime and Policing Bill the onus will be on someone in possession of a device to show they had it for a legitimate purpose. Making or selling a signal jammer could lead to up to five years in prison or an unlimited fine.

Crime

To Identify Suspect In Idaho Killings, FBI Used Restricted Consumer DNA Data (nytimes.com) 99

An anonymous reader quotes a report from the New York Times: As investigators struggled for weeks to find who might have committed the brutal stabbings of four University of Idaho students in the fall of 2022, they were focused on a key piece of evidence: DNA on a knife sheath that was found at the scene of the crime. At first they tried checking the DNA with law enforcement databases, but that did not provide a hit. They turned next to the more expansive DNA profiles available in some consumer databases in which users had consented to law enforcement possibly using their information, but that also did not lead to answers.

F.B.I. investigators then went a step further, according to newly released testimony, comparing the DNA profile from the knife sheath with two databases that law enforcement officials are not supposed to tap: GEDmatch and MyHeritage. It was a decision that appears to have violated key parameters of a Justice Department policy that calls for investigators to operate only in DNA databases "that provide explicit notice to their service users and the public that law enforcement may use their service sites."

It also seems to have produced results: Days after the F.B.I.'s investigative genetic genealogy team began working with the DNA profiles, it landed on someone who had not been on anyone's radar:Bryan Kohberger, a Ph.D. student in criminology who has now been charged with the murders. The case has shown both the promise and the unregulated power of genetic technology in an era in which millions of people willingly contribute their DNA profiles to recreational databases, often to hunt for relatives. In the past, law enforcement officials would need to find a direct match between DNA at the crime scene and that of a specific suspect. Now, investigators can use consumer DNA data to build family trees that can zero in on a person of interest -- within certain policy limits.

Crime

Alleged 'CEO Shooter' Luigi Mangione Raises $297K Online (people.com) 348

Luigi Mangione faces first-degree murder charges. On Valentine's Day he posted his first public comments online, reports People magazine, with Mangione saying he's grateful for the support he's receiving: Earlier this week, Mangione accepted $297,000 in donations to cover his legal bills from the December 4 Legal Committee, which is stewarding a fundraiser on GiveSendGo for his legal defense, according to a post shared by the group. (A source with knowledge of the situation confirmed to PEOPLE that the post was genuine.) The committee — named after the death date of Thompson — said the donations were offered by over 10,000 individual supporters. Mangione's lead attorney, Karen Friedman Agnifilo, told the committee that Mangione "very much appreciates the outpouring of support...."

His federal murder charges could land him the death penalty, and he also faces state murder charges that accuse him of committing an act of terrorism.

United Kingdom

UK Drops 'Safety' From Its AI Body, Inks Partnership With Anthropic 19

An anonymous reader quotes a report from TechCrunch: The U.K. government wants to make a hard pivot into boosting its economy and industry with AI, and as part of that, it's pivoting an institution that it founded a little over a year ago for a very different purpose. Today the Department of Science, Industry and Technology announced that it would be renaming the AI Safety Institute to the "AI Security Institute." (Same first letters: same URL.) With that, the body will shift from primarily exploring areas like existential risk and bias in large language models, to a focus on cybersecurity, specifically "strengthening protections against the risks AI poses to national security and crime."

Alongside this, the government also announced a new partnership with Anthropic. No firm services were announced but the MOU indicates the two will "explore" using Anthropic's AI assistant Claude in public services; and Anthropic will aim to contribute to work in scientific research and economic modeling. And at the AI Security Institute, it will provide tools to evaluate AI capabilities in the context of identifying security risks. [...] Anthropic is the only company being announced today -- coinciding with a week of AI activities in Munich and Paris -- but it's not the only one that is working with the government. A series of new tools that were unveiled in January were all powered by OpenAI. (At the time, Peter Kyle, the secretary of state for Technology, said that the government planned to work with various foundational AI companies, and that is what the Anthropic deal is proving out.)
"The changes I'm announcing today represent the logical next step in how we approach responsible AI development -- helping us to unleash AI and grow the economy as part of our Plan for Change," Kyle said in a statement. "The work of the AI Security Institute won't change, but this renewed focus will ensure our citizens -- and those of our allies -- are protected from those who would look to use AI against our institutions, democratic values, and way of life."

"The Institute's focus from the start has been on security and we've built a team of scientists focused on evaluating serious risks to the public," added Ian Hogarth, who remains the chair of the institute. "Our new criminal misuse team and deepening partnership with the national security community mark the next stage of tackling those risks."
Crime

US Releases Russian Cybercriminal As Part of Prisoner Swap (theguardian.com) 55

The U.S. released Russian cybercriminal Alexander Vinnik, who pleaded guilty to conspiracy to commit money laundering through his cryptocurrency exchange BTC-e, as part of a prisoner swap that freed American schoolteacher Marc Fogel from Russian custody. The Guardian reports: Vinnik, who arrived in Moscow on a flight from Turkey on Tuesday after having been released from custody in California, is accused of owning and operating one of the largest cryptocurrency exchanges in the world, BTC-e, which prosecutors allege facilitated the transfer of billions of dollars in transactions for criminals worldwide. In May 2024, Vinnik pleaded guilty to conspiracy to launder billions of dollars through BTC-e. He was first arrested in Greece in 2017 at the request of the United States after he was charged by a US jury in a 21-count indictment.

The charges against him included money laundering, conspiracy to commit money laundering, operating an unlicensed money service business and engaging in unlawful monetary transactions, among others. Vinnik was first extradited to France from Greece, where he received a five-year prison sentence for money laundering. He was then sent back to Greece and extradited to the United States in 2022 to face US charges. The justice department described BTC-e, which was active from around 2011 to 2017, as a "significant cybercrime and online money laundering entity that allowed its users to trade in bitcoin with high levels of anonymity and developed a customer base heavily reliant on criminal activity." Prosecutors say that BTC-e processed over $9 bn worth of transactions and served over 1 million users globally, including numerous customers in the US.

US prosecutors said that the exchange was one of the "primary ways by which cyber criminals around the world transferred, laundered, and stored the criminal proceeds of their illegal activities" and accused Vinnik of operating the company with the intent to "promote" unlawful activities. Prosecutors said that he was responsible for more than $120m in losses. Vinnik, who is a nonviolent offender, is forfeiting tens of millions of dollars in assets in the exchange, according to the New York Times.

Crime

Elizabeth Holmes Breaks Her Silence In First Interview From Prison (people.com) 138

Convicted Theranos founder, Elizabeth Holmes, had her first interview since being reported to prison in 2023, telling People magazine that she is still working on "research and inventions" in the healthcare space. Here's an excerpt from the article: Scheduled for release on April 3, 2032, Holmes says she hopes to travel with her family and to fight for reform of criminal justice system. She recently drafted an American Freedom Act bill -- a seven-page handwritten document -- to bolster the presumption of innocence and change criminal procedure. "This will be my life's work," says Holmes, adding that she is speaking out now as part of her mission to advocate on behalf of incarcerated persons and those ripped away from their children.

And, despite her global reputation as a biotech con artist who put lives at risk, she says she's continuing to write patents for new inventions and plans to resume her career in healthcare technology after her release. "There is not a day I have not continued to work on my research and inventions," she says. "I remain completely committed to my dream of making affordable healthcare solutions available to everyone."

For now, however, she is sustained by weekend visits from her family, when she can cuddle Invicta, watch William gather acorns in the prison yard and hold Evans's hand and briefly hug and kiss. (Conjugal visits are not allowed.) "It kills me to put my family through pain the way I do," she says. "But when I look back on my life, and these angels that have come into it, I can get through anything. It makes me want to fight for all of it."

The Almighty Buck

Woeful Security On Financial Phone Apps Is Getting People Murdered 161

Longtime Slashdot reader theodp writes: Monday brought chilling news reports of the all-count trial convictions of three individuals for a conspiracy to rob and drug people outside of LGBTQ+ nightclubs in Manhattan's Hell's Kitchen neighborhood, which led to the deaths of two of their victims. The defendants were found guilty on all 24 counts, which included murder, robbery, burglary, and conspiracy. "As proven at trial," explained the Manhattan District Attorney's Office in a press release, "the defendants lurked outside of nightclubs to exploit intoxicated individuals. They would give them drugs, laced with fentanyl, to incapacitate their victims so they could take the victims' phones and drain their online financial accounts [including unauthorized charges and transfers using Cash App, Apple Cash, Apple Pay]." District Attorney Alvin L. Bragg, Jr. added, "My Office will continue to take every measure possible to protect New Yorkers from this type of criminal conduct. That includes ensuring accountability for those who commit this harm, while also working with financial companies to enhance security measures on their phone apps."

In 2024, D.A. Bragg called on financial companies to better protect consumers from fraud, including: adding a second and separate password for accessing the app on a smartphone as a default security option; imposing lower default limits on the monetary amount of total daily transfers; requiring wait times of up to a day and secondary verification for large monetary transactions; better monitoring of accounts for unusual transfer activities; and asking for confirmation when suspicious transactions occur. "No longer is the smartphone itself the most lucrative target for scammers and robbers -- it's the financial apps contained within," said Bragg as he released letters (PDF) sent to the companies that own Venmo, Zelle, and Cash App. "Thousands or even tens of thousands can be drained from financial accounts in a matter of seconds with just a few taps. Without additional protections, customers' financial and physical safety is being put at risk. I hope these companies accept our request to discuss commonsense solutions to deter scammers and protect New Yorkers' hard-earned money."

"Our cellphones aren't safe," warned the EFF's Cooper Quintin in a 2018 New York Times op-ed. "So why aren't we fixing them?" Any thoughts on what can and should be done with software, hardware, and procedures to stop "bank jackings"?
Bitcoin

Man Who Hijacked SEC's X Account To Pump Bitcoin Faces Up To 5 Years In Prison (gizmodo.com) 49

Eric Council Jr. pleaded guilty to identity theft and access device fraud after hijacking the SEC's X account to falsely announce Bitcoin ETF approval. He was compensated in Bitcoin by co-conspirators, and while the Justice Department continues its investigation, Council faces up to five years in prison. Gizmodo reports: According to the Justice Department, Council accessed the SEC's account using an attack called SIM swapping, in which a perpetrator uses social engineering to trick a phone carrier's customer service representatives into transferring an individual's phone number to a new device. Basically, they call into a support line and use pieces of personal information about a victim they have gathered online to convince the representative they are the person they are targeting. Once perpetrators take the number and can begin receiving text messages, they are able to reset the passwords of accounts on services like X. It is not really a "hack" in the traditional sense that they are not finding flaws in software but rather exploiting human trust.

Unfortunately for individuals like Council, all Bitcoin transactions are logged on a blockchain for anyone to see, leaving a trail of breadcrumbs for investigators to find. If he did make out with a lot of crypto, it would be hard to keep it hidden forever. Council allegedly did not post the message himself to the SEC's X account, but conducted the SIM swap and left the rest of the work to his co-conspirators who compensated Council in the form of, of course, Bitcoin. The price of the cryptocurrency rose by $1,000 after the fake announcement, according to the Justice Department, and fell by $2,000 after the SEC issued a correction. That could have led to a big windfall depending on how much Bitcoin the perpetrators held at the time.

Crime

'Serial Swatter' Who Made Nearly 400 Threatening Calls Gets 4 Years In Prison (thehill.com) 98

Alan W. Filion, an 18-year-old from Lancaster, Calif., was sentenced to four years in prison for making nearly 400 false bomb threats and threats of violence (source may be paywalled; alternative source) to religious institutions, schools, universities and homes across the country. The New York Times reports: The threatening calls Mr. Filion made would often cause large deployments of police officers to a targeted location, the Justice Department said in a news release. In some cases, officers would enter people's homes with their weapons drawn and detain those inside. In January 2023, Mr. Filion wrote on social media that his swats had often led the police to "drag the victim and their families out of the house cuff them and search the house for dead bodies."

Investigators linked Mr. Filion to over 375 swatting calls made in several states, including one that he made to the police in Sanford, Fla., saying that he would commit a mass shooting at the Masjid Al Hayy Mosque. During the call, he played audio of gunfire in the background. Mr. Filion was arrested in California in January 2024, and was then extradited to Florida to face state charges for making that threat. Mr. Filion began swatting for recreation in August 2022 before making it into a business, the Justice Department said. The teenager became a "serial swatter" and would make social media posts about his "swatting-for-a-fee" services, according to prosecutors.

In addition to pleading guilty to the false threat against the mosque in Florida, Mr. Filion pleaded guilty in three other swatting cases: a mass shooting threat to a public school in Washington State in October 2022; a bomb threat call to a historically Black college or university in Florida in May 2023; and a July 2023 call in which he claimed to be a federal law enforcement officer in Texas and told dispatchers that he had killed his mother and would kill any responding officers.

Crime

California Tech Founder Admits to Defrauding $4M For His Luxury Lifestyle (sfgate.com) 47

The tech startup "purported to make smart home and business products," writes America's Justice Department — products that were "meant to stop package theft, prevent weather damage to packages, and make it easier for emergency responders and delivery services to find homes and businesses." Royce Newcomb "developed prototypes of his products and received local and national media attention for them. For example, Time Magazine included his eLiT Address Box & Security System, which used mobile networks to pinpoint home and business locations, on its Best Inventions of 2021 list."

But then he told investors he'd also received a grant by the National Science Foundation — one of "several false representations to his investors to deceive and cheat them out of their money... Newcomb used the money to pay for gambling, a Mercedes and Jaguar, and a mansion." He also used the money to pay for refunds to other investors who wanted out, and to pay for new, unrelated projects without the investors' authorization. During this period, Newcomb also received a fraudulent COVID-19 loan for more than $70,000 from the Small Business Administration and fraudulent loans for more than $190,000 from private lenders. He lied about Strategic Innovations having hundreds of thousands and even millions in revenue to get these loans.

Newcomb was previously convicted federally in 2011 for running a real estate fraud scheme in Sacramento. He was sentenced to more than five years in prison for that offense, and he was on federal supervised release for that offense when he committed the offenses charged in this case... Newcomb faces maximum statutory penalties of 20 years in prison and a $250,000 fine for the wire fraud charge, and 10 years in prison and a $250,000 fine for the money laundering charge...

This effort is part of a California COVID-19 Fraud Enforcement Strike Force operation, one of five interagency COVID-19 fraud strike force teams established by the U.S. Department of Justice.

SFGate writes that "Despite receiving significant funding, his startup, Strategic Innovations, never made a dime or released any products to market, according to legal documents." The owner of a California tech startup has pleaded guilty to stealing over $4 million from investors, private lenders and the U.S. government in order to live a luxurious lifestyle, the United States Attorney's Office announced Monday... When investors asked about product delays and when they'd be paid back, Newcomb made excuses and provided conflicting info, telling them that there were supply chain issues or software problems, according to the indictment. In reality, federal prosecutors said, he was using the money to travel and continue to make these lavish personal expenses.
Security

Ransomware Payments Dropped 35% In 2024 (therecord.media) 44

An anonymous reader quotes a report from CyberScoop: Ransomware payments saw a dramatic 35% drop last year compared to 2023, even as the overall frequency of ransomware attacks increased, according to a new report released by blockchain analysis firm Chainalysis. The considerable decline in extortion payments is somewhat surprising, given that other cybersecurity firms have claimed that 2024 saw the most ransomware activity to date. Chainalysis itself warned in its mid-year report that 2024's activity was on pace to reach new heights, but attacks in the second half of the year tailed off. The total amount in payments that Chainalysis tracked in 2024 was $812.55 million, down from 2023's mark of $1.25 billion.

The disruption of major ransomware groups, such as LockBit and ALPHV/BlackCat, were key to the reduction in ransomware payments. Operations spearheaded by agencies like the United Kingdom's National Crime Agency (NCA) and the Federal Bureau of Investigation (FBI) caused significant declines in LockBit activity, while ALPHV/BlackCat essentially rug-pulled its affiliates and disappeared after its attack on Change Healthcare. [...] Additionally, [Chainalysis] says more organizations have become stronger against attacks, with many choosing not to pay a ransom and instead using better cybersecurity practices and backups to recover from these incidents. [...]
Chainalysis also says ransomware operators are letting funds sit in wallets, refraining from moving any money out of fear they are being watched by law enforcement.

You can read the full report here.
The Internet

Believing in Aliens Derailed This Internet Pioneer's Career. Now He's Facing Prison (bloomberg.com) 44

Joseph Firmage, a former Silicon Valley prodigy who built a $2.5 billion web services company in the 1990s, is now being sued by investors who claim he defrauded them through an alleged antigravity machine scheme. In 1998, at the height of his success as CEO of USWeb, Firmage claimed an alien appeared in his bedroom, derailing his corporate career. He then spent decades pursuing UFO research and attempting to develop antigravity propulsion technology, raising millions from investors.

Court documents allege Firmage and associates are responsible for roughly $25 million in losses through various companies and schemes. Some investors say he used elaborate ruses, including people impersonating government officials, to solicit funds. Firmage, currently in jail on elder abuse charges, maintains he was actually the victim of international scammers who exploited his access to investors.

Slashdot Top Deals