Hitting the Books: How the ‘Godfather of Cybercrime’ got his start on eBay

The internet has connected nearly everybody on the planet to a global network of information and influence, enabling humanity's best and brightest minds unparalleled collaborative capabilities. At least that was the idea, more often than not these days, it serves as a popular medium for scamming your more terminally-online relatives out of large sums of money. Just ask Brett Johnson, a reformed scam artist who at his rube-bilking pinnacle, was good at separating fools from their cash that he founded an entire online learning forum to train a new generation of digital scam artist.

Johnson's cautionary tale in one of many in the new book, Fool Me Once: Scams, Stories, and Secrets from the Trillion-Dollar Fraud Industry, from Harvard Business Review Press. In it, Professor of Forensic Accounting at DePaul University, Dr. Kelly Richmond Pope, chronicles some of the 20th and 21st century's most heinous financial misdeeds — from Bernie Madoff's pyramid schemes to Enron and VW, and all the Nigerian Princes in between — exploring how the grifts worked and why they often left their marks none the wiser.

birght green background with black block lettering
Harvard Business Review Press

Reprinted by permission of Harvard Business Review Press. Excerpted from Fool Me Once: Scams, Stories, and Secrets from the Trillion-Dollar Fraud Industry by Kelly Richmond Pope. Copyright 2023 Kelly Richmond Pope. All rights reserved.


Cyber Monday

I was doing my morning reading before class, and a story about a reformed cybercriminal caught my attention. I always wanted to learn more about cybercrime, but I’d never interacted with a convicted cyber offender. Here was my chance.

I did a quick Google search and found his personal website. I reached out, explained my interest in his story, and waited. By evening, I had an email from gollum@anglerphish.com. I was immediately suspicious, but it was a legit address of Brett Johnson, the man from the article.

After a few email exchanges, we got on a call. He was super friendly and had the voice of a radio DJ. I invited him to come speak to my class at DePaul.

“I teach on Monday nights for the next eight weeks, so whatever works for you will work for me,” I said.

“How about I hop in my car and come visit your class this coming Monday?” he said.

I was a little shocked—Birmingham, Alabama was a long drive— but I immediately took him up on his offer.

Brett was born and raised in Hazard, Kentucky, “one of these areas like the Florida Panhandle and parts of Louisiana, where if you’re not fortunate enough to have a job, you may be involved in some sort of scam, hustle, fraud, whatever you want to call it,” he said.

Maybe there was something in the water because his entire family engaged in fraud. Insurance fraud, document forgery, drug trafficking, mining illegal coal. You name it, Brett’s family did it.

Young Brett was a natural liar. As he grew up, he participated in the family scams.

Eventually, he branched out on his own. His first scam: in 1994, he faked his own car accident. Second scam: eBay fraud.

He reached his peak in the mid-’90s, during the Beanie Baby heyday. The Royal Blue Peanut, essentially a cobalt stuffed elephant toy, sold for as much as $1,700. Only five hundred of the dolls were manufactured, making it one of the most valuable Beanie Babies.

Brett was trying to earn some extra money. A Beanie Baby scam seemed easy and quick.

He advertised on eBay that he was selling Royal Blue Peanut for $1,500. Except he was actually selling a gray Beanie Baby that he dipped in blue dye to look like Royal Blue Peanut for $1,500.

He accepted a bid and instructed the winner to send a US postal money order. “It protects us both,” he said via email. “As soon as I get that and it clears, I’ll send you your elephant.”

The bidder sent Brett the money order; Brett cashed it and sent her his version of the blue Beanie Baby. The phone rang almost immediately.

“This is not what I ordered!” yelled a voice on the other line.

Brett’s response was swift. “Lady, you ordered a blue elephant. I sent you a blue-ish elephant.”

Brett gave her the runaround for a few weeks until she finally disappeared.

This experience taught Brett two very important lessons about cybercrime:

  • Delay the victim as long as possible.

  • Victims rarely report the crime and eventually go away.

Brett continued to perfect his skills and graduated to selling pirated software. From pirated software, he moved to install mod chips (a small electronic device used to disable artificial restrictions of computers or entertainment devices) into gaming systems so owners could play the pirated games. Then he began installing mod chips in the cable boxes that would turn on all the pay-per-view on clients’ TV channels for free. Then it was programming satellite DSS cards (the satellite DSS card allows access to tv channels).

He was getting requests for his cable boxes from customers all over the United States and Canada. He was on a roll. Finally, it occurred to him: Why even fulfill the cable box order? Just take the money and run. He knew that no customer would complain about losing money in an illegal transaction. He stole even more money with this updated version of his cable box scam but soon worried that he’d get flagged for money laundering. He decided he needed a fake driver’s license so he could open up a bank account and launder the money through cash taken out of the ATM.

He found a person online who sold fake licenses. He sent a picture, $200, and waited. He waited and waited. Then reality punched him in the face: He’d been scammed. The nerve.

No one hates being deceived more than someone who deceives for a living. Brett was so frustrated he started ShadowCrew.com, an online forum where people could learn the ins and outs of cybercrime. Forbes called it “a one-stop marketplace for identity theft.” The ShadowCrew operated from August 2002 through November 2004, attracting as many as four thousand criminals or aspiring criminals. It’s considered the forerunner of today’s cybercrime forums and marketplaces; Brett is known as the Godfather of Cybercrime.

“Before ShadowCrew, the only avenue you had to commit online crime was a rolling chat board,” he told my students. “It’s called a IRC chat session and stands for Internet Relay Chat.” The problem with these rolling chat screens was that you had no idea if you were talking to a cop or a crook. Either was possible.

ShadowCrew gave criminals a trust mechanism. It was a large communication channel where people in different time zones could reference conversations. “By looking at someone’s screen name, you could tell if you could trust that person, if you could network with that person, or if you could learn from that person,” he said. The screen name on the dark web became the criminal’s brand name. They keep this brand name throughout their entire criminal tenure and it helps establish trust with others, so the screen name matters.

When Brett was in class, he showed my students how information ended up on the dark web. “You can find social security numbers, home addresses, driver’s license numbers, credit card numbers on the dark web for $3,” he explained. All the information is there, practically begging to be taken.

In 2004, authorities arrested twenty-eight men in six countries, claiming they had swapped 1.7 million stolen card numbers and caused $4.3 million in losses. But Brett escaped. He was placed on the Secret Service’s Most Wanted list. After four months on the run, he was arrested.

Brett has been in and out of prison five times and spent 7.5 years in federal prison. Today he considers himself a reformed white-collar offender.

This article originally appeared on Engadget at https://www.engadget.com/hitting-the-books-fool-me-once-kelly-richmond-pope-harvard-business-review-press-143031129.html?src=rss

FBI says Americans lost $10.3 billion to internet scammers in 2022

If you know someone who fell for an online scam last year, you're far from alone. The FBI reports that Americans submitting incidents to the agency lost $10.3 billion to internet scams in 2022, a steep jump from $6.9 billion in 2021. While there were fewer complaints (800,944), certain ripoffs were still very problematic. Investment scams were the most common and costliest schemes. Related fraud losses jumped from nearly $1.5 billion in 2021 to $3.3 billion, and most of that value came from cryptocurrency scams — losses surged from $907 million to almost $2.6 billion in 2022.

There were some bright spots. While investment scams were the on the rise, ransomware complaints fell sharply. There were just 2,385 complaints about these digital extortion attempts versus 3,729 the year before, and they led to a relatively modest $34.3 million in losses. And while phishing was the most prevalent scam type with over 300,000 complaints, the damages were limited to $52.1 million.

The FBI warns that its figures don't represent the entirety of online scams in the US. Not everyone who was the victim of a ransomware attack reported it to the bureau, Executive Assistant Director Timothy Langan says. However, he says the reports help law enforcement spot trends and otherwise deal with threats. The Investigators have better sense of what they need to address, even if they don't have the full picture.

This article originally appeared on Engadget at https://www.engadget.com/fbi-says-americans-lost-10-billion-to-scammers-in-2022-144514762.html?src=rss

FBI says Americans lost $10.3 billion to internet scammers in 2022

If you know someone who fell for an online scam last year, you're far from alone. The FBI reports that Americans submitting incidents to the agency lost $10.3 billion to internet scams in 2022, a steep jump from $6.9 billion in 2021. While there were fewer complaints (800,944), certain ripoffs were still very problematic. Investment scams were the most common and costliest schemes. Related fraud losses jumped from nearly $1.5 billion in 2021 to $3.3 billion, and most of that value came from cryptocurrency scams — losses surged from $907 million to almost $2.6 billion in 2022.

There were some bright spots. While investment scams were the on the rise, ransomware complaints fell sharply. There were just 2,385 complaints about these digital extortion attempts versus 3,729 the year before, and they led to a relatively modest $34.3 million in losses. And while phishing was the most prevalent scam type with over 300,000 complaints, the damages were limited to $52.1 million.

The FBI warns that its figures don't represent the entirety of online scams in the US. Not everyone who was the victim of a ransomware attack reported it to the bureau, Executive Assistant Director Timothy Langan says. However, he says the reports help law enforcement spot trends and otherwise deal with threats. The Investigators have better sense of what they need to address, even if they don't have the full picture.

This article originally appeared on Engadget at https://www.engadget.com/fbi-says-americans-lost-10-billion-to-scammers-in-2022-144514762.html?src=rss

News Corp admits hackers had access to its systems for two years

The threat actors who infiltrated News Corp., the company that owns The Wall Street Journal and other news outlets, apparently had access to its network for two full years. In February last year, News Corp. admitted that it had discovered a security breach a month earlier and that hackers broke into a third-party cloud service that contained employees' information. Now, according to Ars Technica, the company has sent a breach notification letter (PDF) to at least one affected personnel. In it, the company has admitted that "an unauthorized party" gained access to business documents and emails in some employees' accounts between February 2020 and January 2022.

When News Corp. announced the breach, the security firm (Mandiant) that investigated the intrusion said it believes the threat actor was connected to the Chinese government. Further, it said the company was most likely attacked to gather intelligence for the country. In an email to Ars, a representative said News Corp. continues to believe "that this was an intelligence collection," but didn't respond to a question asking if investigators still think the hackers were linked to China. 

The company has revealed in the letter, though, that the bad actors may have gotten a hold of employees' names, birth dates, Social Security number, driver's license and passport numbers, as well as their financial, medical and heath insurance information. "Not all of this information was impacted for each affected individual," it added. News Corp. said that it hasn't heard any incidents of identity theft or fraud resulting from the security breach so far, but it's offering affected employees two years of identity protection and credit monitoring. 

"Our investigation indicates that this activity does not appear to be focused on exploiting personal information," News Corp. wrote in its letter. However, it didn't reveal that details of the documents and emails the threat actors were able to access, and it didn't say if they were specifically looking for information connected to the company's reporting. 

This article originally appeared on Engadget at https://www.engadget.com/news-corp-hackers-access-two-years-095301729.html?src=rss

News Corp admits hackers had access to its systems for two years

The threat actors who infiltrated News Corp., the company that owns The Wall Street Journal and other news outlets, apparently had access to its network for two full years. In February last year, News Corp. admitted that it had discovered a security breach a month earlier and that hackers broke into a third-party cloud service that contained employees' information. Now, according to Ars Technica, the company has sent a breach notification letter (PDF) to at least one affected personnel. In it, the company has admitted that "an unauthorized party" gained access to business documents and emails in some employees' accounts between February 2020 and January 2022.

When News Corp. announced the breach, the security firm (Mandiant) that investigated the intrusion said it believes the threat actor was connected to the Chinese government. Further, it said the company was most likely attacked to gather intelligence for the country. In an email to Ars, a representative said News Corp. continues to believe "that this was an intelligence collection," but didn't respond to a question asking if investigators still think the hackers were linked to China. 

The company has revealed in the letter, though, that the bad actors may have gotten a hold of employees' names, birth dates, Social Security number, driver's license and passport numbers, as well as their financial, medical and heath insurance information. "Not all of this information was impacted for each affected individual," it added. News Corp. said that it hasn't heard any incidents of identity theft or fraud resulting from the security breach so far, but it's offering affected employees two years of identity protection and credit monitoring. 

"Our investigation indicates that this activity does not appear to be focused on exploiting personal information," News Corp. wrote in its letter. However, it didn't reveal that details of the documents and emails the threat actors were able to access, and it didn't say if they were specifically looking for information connected to the company's reporting. 

This article originally appeared on Engadget at https://www.engadget.com/news-corp-hackers-access-two-years-095301729.html?src=rss

SEC charges Terraform Labs over alleged ‘multi-biillion dollar’ crypto fraud

It's not just international police trying to hold Terraform Labs accountable for a collapse that took $40 billion from investors. The Securities and Exchange Commission has charged Terraform and its CEO Do Kwon with securities fraud for allegedly running a "multi-billion dollar" crypto asset scheme. The blockchain startup purportedly misled investors by falsely claiming that its TerraUSD asset was a stablecoin pegged to the US dollar, with high yields (up to 20 percent). The firm also fooled people by claiming its Luna token would gain value thanks to a Korean mobile payment app that used the Terra blockchain to settle transactions.

Terraform and Do Kwon didn't provide "full, fair and truthful disclosure" for their crypto asset securities, SEC chair Gary Gensler says. The charges include registration and anti-fraud violations of the Securities Act and Exchange Act.  

TerraUSD and Luna lost their peg to the US dollar in May 2022, with the prices of both plunging to near-zero. Investors lodged complaints accusing Terraform and Kwon of running a Ponzi scheme, and the freefall contributed to the collapse of the crypto hedge fund Three Arrows Capital. The crypto exchange Binance quickly faced a lawsuit over claims it incorrectly marketed TerraUSD as a safe asset. While Kwon insisted that he wasn't evading capture, he left his native South Korea, refused to face investigators' questions and was put on Interpol's "red notice" list.

The SEC's charges join a string of efforts to crack down on reported fraud among some of the crypto industry's biggest names. Authorities have most notably pursued FTX and its founder Sam Bankman-Fried over that exchange's downfall, while former Celsius Network chief Alex Mashinsky is also accused of defrauding investors. While crypto may still have a future, it's clear government bodies want stricter enforcement of financial laws in this arena.

SEC charges Terraform Labs over alleged ‘multi-biillion dollar’ crypto fraud

It's not just international police trying to hold Terraform Labs accountable for a collapse that took $40 billion from investors. The Securities and Exchange Commission has charged Terraform and its CEO Do Kwon with securities fraud for allegedly running a "multi-billion dollar" crypto asset scheme. The blockchain startup purportedly misled investors by falsely claiming that its TerraUSD asset was a stablecoin pegged to the US dollar, with high yields (up to 20 percent). The firm also fooled people by claiming its Luna token would gain value thanks to a Korean mobile payment app that used the Terra blockchain to settle transactions.

Terraform and Do Kwon didn't provide "full, fair and truthful disclosure" for their crypto asset securities, SEC chair Gary Gensler says. The charges include registration and anti-fraud violations of the Securities Act and Exchange Act.  

TerraUSD and Luna lost their peg to the US dollar in May 2022, with the prices of both plunging to near-zero. Investors lodged complaints accusing Terraform and Kwon of running a Ponzi scheme, and the freefall contributed to the collapse of the crypto hedge fund Three Arrows Capital. The crypto exchange Binance quickly faced a lawsuit over claims it incorrectly marketed TerraUSD as a safe asset. While Kwon insisted that he wasn't evading capture, he left his native South Korea, refused to face investigators' questions and was put on Interpol's "red notice" list.

The SEC's charges join a string of efforts to crack down on reported fraud among some of the crypto industry's biggest names. Authorities have most notably pursued FTX and its founder Sam Bankman-Fried over that exchange's downfall, while former Celsius Network chief Alex Mashinsky is also accused of defrauding investors. While crypto may still have a future, it's clear government bodies want stricter enforcement of financial laws in this arena.

Coinbase agrees a $100 million settlement with a New York regulator

Cryptocurrency exchange Coinbase has agreed a $100 million settlement with the New York State Department of Financial Services (DFS), which accused it of violating regulations related to virtual currency, money transmitting, transaction monitoring and cybersecurity. "These failures made the Coinbase platform vulnerable to serious criminal conduct, including, among other things, examples of fraud, possible money laundering, suspected child sexual abuse material-related activity and potential narcotics trafficking," the agency said. The company will pay the state a $50 million fine and invest $50 million to address the issues flagged by the regulator and comply with a DFS-approved plan.

The agency claimed that Coinbase's practices concerning due diligence, transaction monitoring and sanctions compliance (among others) were "inadequate for a financial services provider of Coinbase’s size and complexity." It accused the company of failing to carry out sufficient background checks on customers before they opened accounts and being unable to keep up with transaction monitoring system (TMS) alerts. The DFS added that Coinbase had a months-long TMS backlog that meant the company "routinely failed to timely investigate and report suspicious activity as required by law."

By late 2021, the DFS said, Coinbase had a backlog of more than 100,000 transaction monitoring alerts it had not reviewed. It also noted that by that time, the backlog of customers who required "enhanced due diligence exceeded 14,000." Coinbase's approach to background checks amounted to a “simple check-the-box exercise,” regulators claimed. 

The DFS granted Coinbase a license to operate in New York in 2017. Compliance issues first emerged during a safety and soundness examination that the agency conducted in 2020. Following that probe, the DFS ordered Coinbase to hire an independent consultant to review the compliance program and offer recommendations on how to improve in areas in which the agency felt the company was falling short. As a result, Coinbase adopted a plan to bolster its compliance program. However, following an investigation it began in 2021, the DFS determined that the program could not "keep up with the dramatic and unexpected growth of Coinbase’s business." Coinbase now has more than 100 million users worldwide.

The agency brought in an independent monitor in early 2022 to evaluate the state of the compliance program and work with Coinbase to address the issues — all while the investigation was ongoing. As part of the settlement, the monitor will work with Coinbase for another year. The DFS can extend that timeframe at its discretion. The agency pointed out that Coinbase has started to address many of the issues and develop "a more effective and robust compliance program" under the eyes of the DFS and the monitor, though it noted that the company still isn't moving quickly enough to review older suspicious accounts.

Other crypto firms have faced penalties in recent months for allegedly violating financial regulations. The DFS fined Robinhood $30 million in August, while the Treasury Department reached a settlement with Kraken over claims that the exchange provided services to customers in Iran in violation of US sanctions. According to The New York Times, regulators are investigating Binance over possible money laundering violations. Before its collapse in November, FTX was said to have been under investigation too — the company's founder, Sam Bankman-Fried, pled not guilty to federal fraud charges this week. It was also reported last summer that the Securities and Exchange Commission was investigating Coinbase over possible securities violations.

Two top executives plead guilty to fraud in FTX case

Top FTX executives close to Sam Bankman-Fried, Caroline Ellison and Zixiao "Gary" Wang, have pleaded guilty to fraud and are cooperating with prosecutors. The pair were convicted "in connection with their roles in the fraud that contributed to FTX's collapse," said Damian Williams, the US Attorney for the Southern District of New York in a press conference.

Ellison, the former CEO of FTX sister company Alameda Research and ex-girlfriend of Bankman-Fried, pleaded guilty to seven counts and faces up to 110 years in prison. Former FTX co-founder Wang pleaded guilty to four counts and faces 50 years. Depending on the level of cooperation, however, they could receive lighter sentences. The pair also face civil fraud charges filed by the Securities and Exchange Commission (SEC) and Commodity Future Trading Commission (CFTC). Both were released on $250,000 bonds.

The announcement was made as Bankman-Fried was being extradited from the Bahamas to New York, and add to his mounting legal woes. Wang's lawyer Ilan Graff said that his client has "accepted responsibility for his actions and takes seriously his obligations as a cooperating witness," according to The Washington Post

Despite their cooperation, the SEC didn't mince words in laying out its case against Ellison and Wang. "Mr. Bankman-Fried, Ms. Ellison, and Mr. Wang were active participants in a scheme to conceal material information from FTX investors," said SEC deputy director of enforcement, Sanjay Wadhwa. "By surreptitiously siphoning FTX’s customer funds onto the books of Alameda, defendants hid the very real risks that FTX’s investors and customers faced."

Bankman-Fried, meanwhile, is accused of a long list of misdeeds by multiple agencies, including the SEC, Department of Justice and CFTC. Those include defrauding FTX investors and customers of more than $1.9 billion, multiple counts of wire fraud, conspiracy to defraud investors by sharing misleading information and "surreptitiously" siphoning customer funds. The CFTC also alleges that Bankman-Fried and his cohorts "took hundreds of millions of dollars in poorly-documented 'loans' from Alameda," which they then used to purchase real estate and make political donations.

Two top executives plead guilty to fraud in FTX case

Top FTX executives close to Sam Bankman-Fried, Caroline Ellison and Zixiao "Gary" Wang, have pleaded guilty to fraud and are cooperating with prosecutors. The pair were convicted "in connection with their roles in the fraud that contributed to FTX's collapse," said Damian Williams, the US Attorney for the Southern District of New York in a press conference.

Ellison, the former CEO of FTX sister company Alameda Research and ex-girlfriend of Bankman-Fried, pleaded guilty to seven counts and faces up to 110 years in prison. Former FTX co-founder Wang pleaded guilty to four counts and faces 50 years. Depending on the level of cooperation, however, they could receive lighter sentences. The pair also face civil fraud charges filed by the Securities and Exchange Commission (SEC) and Commodity Future Trading Commission (CFTC). Both were released on $250,000 bonds.

The announcement was made as Bankman-Fried was being extradited from the Bahamas to New York, and add to his mounting legal woes. Wang's lawyer Ilan Graff said that his client has "accepted responsibility for his actions and takes seriously his obligations as a cooperating witness," according to The Washington Post

Despite their cooperation, the SEC didn't mince words in laying out its case against Ellison and Wang. "Mr. Bankman-Fried, Ms. Ellison, and Mr. Wang were active participants in a scheme to conceal material information from FTX investors," said SEC deputy director of enforcement, Sanjay Wadhwa. "By surreptitiously siphoning FTX’s customer funds onto the books of Alameda, defendants hid the very real risks that FTX’s investors and customers faced."

Bankman-Fried, meanwhile, is accused of a long list of misdeeds by multiple agencies, including the SEC, Department of Justice and CFTC. Those include defrauding FTX investors and customers of more than $1.9 billion, multiple counts of wire fraud, conspiracy to defraud investors by sharing misleading information and "surreptitiously" siphoning customer funds. The CFTC also alleges that Bankman-Fried and his cohorts "took hundreds of millions of dollars in poorly-documented 'loans' from Alameda," which they then used to purchase real estate and make political donations.