- My Secret Life at the CIA
- The Underground Internet You’ve Never Heard of
- Succeeding When You’re the ‘Odd Woman Out’
- Bad Bosses
- Be Your Own Security Advisor – Security Tips from a Counterterrorism Expert
- Be Your Own Security Advisor—Small Decisions are Big Decisions
- Recruited—How I Got Into the CIA
- When you’re not just “The Wife”
- Incredible India: Rhinos, Rats, Potholes and the Taj Mahal
- 4 Steps to Survive an Active Shooter Scenario
- Sexual Extortion on the Internet: Blackshades
- Craigslist, Sex, and One Woman’s Intuition
- Healing the Blind in North Korea
- 5 College Safety Musts to Discuss with Your Daughter
- Exposing Fraud: Melanoma or Just a Mole?
- I’m Tired of Being Scared
- I couldn’t get a job … until I finally got hired by the CIA.
- Interview With A Female CIA Operative
- The EQ Factor
- Escape from ISIS
- 3 Things to Remember About 9/11 and America
- 13 Things You May Not Know About Nice People
It’s one of the biggest threats that no one thinks they are vulnerable to until it happens to them: online exploitation.
Nasty people are peeking into our very homes and capturing images we would rather not have floating around the Internet. Sound crazy and unlikely?
Tell that to Miss Teen USA Cassidy Wolf who discovered in 2013 that someone had captured images of her while she thought she was in the privacy of her own bedroom—through the camera on her laptop computer. Then, the stranger emailed her threatening to release the images online unless she sent salacious photographs of herself and/or “performed” for him online via Skype. After an extensive investigation, it turns out that the blackmailer was someone she knew: 19-year old Jared James Abrahams, a computer science student who was Cassidy’s former high school classmate.
Everyone thinks that to protect yourself online you need to have the skills of a hacker and high-tech cyber knowledge. But you don’t have to be a technology wizard to protect yourself or your family. Here is one significant thing you can do to prevent unknown assailants from capturing photographs or videos of you or your loved ones without your knowledge. Wait for it. Wait for it … Scotch tape. All you have to do is to “go all MacGyver” by placing a small piece of scotch tape over the camera. Simply remove the scotch tape each time you want to use the video feature on Skype, etc. and replace when finished. Problem solved. Oh, and I should mention that you need to have a quick conversation in which you explain this and then watch while your teenager/wife/sister does the same. We love low-tech methods for protecting the family and this is one you can implement immediately– Because you’re just that smart and just that cool (wink)!
Technical Note for Non-Technical People: This particular hacking strategy is enabled by Blackshades remote access malware which allows someone to hack into your computer and access documents, record keystrokes, and activate the webcam (yikes!!!!). The software is activated when someone clicks on a malicious link, often from social networking sites. Once you click on the attachment or image, the software is downloaded and you no longer have privacy—everything in your computer is now at someone else’s fingertips. It is so easy to fall into this trap it’s ridiculous. Since the software is known, your anti-virus software should prevent this unfortunate event from happening to you, so make sure your anti-virus software is updated and current.
According to the FBI, more than a half-million computers in over 100 countries were infected by this software which was being sold by its two creators for only $40 a pop. Those guys are now sitting in prison: one is a 24-year-old Swedish man who was arrested in Moldova and is currently facing extradition to the United States. The other is 23-year-old Michael Hogue of Arizona, who pleaded guilty after his arrest in June 2012. As of May 19, forty FBI field offices had conducted approximately 100 interviews, executed more than 100 e-mail and physical search warrants, and seized more than 1,900 domains used by Blackshades users to control victims’ computers. In the global investigation that involved 19 different countries, over 90 arrests have been made so far in this massive take-down of cyber-criminals. Now that’s a well-coordinated operation.