Blackmailers Getting Sneaky - Using Technology To Remain Hidden

from the though,-it-didn't-work-out dept

Found on Dave Farber's IP list is this translation of a blackmail scam in Europe where the blackmailer used some fairly sneaky methods to remain anonymous - and to avoid all direct contact with the company he was blackmailing. What he did was to mail the company a steganography program for encoding messages in images. He then had them pull the code off the bank card that had access to the account where the blackmail money was deposited. They then used the stego program to encode that info into an image of a red VW car, which was placed in a fake ad selling used cars on a popular used car buying site. The guy, using an anonymous surfing tool, surfed to the site, downloaded the picture, got the info and made his own copy of the card. Impressive, to say the least. Of course, the info was turned over to the FBI who figured out who the guy was within 24 hours - though, the article doesn't indicate how. Still, I imagine that these sorts of crimes will only get increasingly sophisticated in the near future.
Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team


Reader Comments

Subscribe: RSS

View by: Time | Thread


  1. identicon
    Yme Bosma, 26 Aug 2003 @ 7:26am

    How they found him

    The info the FBI provided (via the anonymous surfing tool provider) to the Dutch police was his email address. From there it was easy to obtain his personal information from the ISP that provided the email-address.

    link to this | view in thread ]

  2. icon
    Mike (profile), 26 Aug 2003 @ 8:55am

    Re: How they found him

    If it was an anonymous surfing tool, then how did they get his email address?

    link to this | view in thread ]

  3. identicon
    Anonymous Coward, 26 Aug 2003 @ 2:19pm

    Re: How they found him

    If it was an anonymous surfing tool, then how did they get his email address?

    Mike, it is probably best that some things are left to the imagination. Maybe the Anonymous Surfing Tool was run in Germany [theregister.co.uk]?

    link to this | view in thread ]

  4. identicon
    Yme Bosma, 27 Aug 2003 @ 10:12am

    Re: How they found him

    Because he had to register for this service. And he used a real email-address for that.... They always make a mistake;-)

    link to this | view in thread ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.