Give Facebook your nude pics to tackle revenge porn

Yes, you’re so desperate to stop your nude photos being shared on Facebook that you share them with Facebook.

Graham Cluley
Graham Cluley
@

 @grahamcluley.com
 / grahamcluley

Give Facebook your nude pics to tackle revenge porn

ABC News in Australia reports that Facebook is “teaming up with Government to stop nude photos ending up on Messenger, Instagram”:

Facebook is partnering with a small Australian Government agency to prevent sexual or intimate images being shared without the subject’s consent.

e-Safety Commissioner Julie Inman Grant said victims of “image-based abuse” would be able to take action before photos were posted to Facebook, Instagram or Messenger.

“We see many scenarios where maybe photos or videos were taken consensually at one point, but there was not any sort of consent to send the images or videos more broadly,” Ms Inman Grant said.

I guess you’ve got to be pretty worried that some toe-rag is interested in sharing nude photographs of you, if you’re prepared to ask for Facebook’s help in this way.

As far as I’m aware, Facebook hasn’t published any information on how it plans to implement this. I would imagine that they are using similar technology to that used by internet companies to identify child sexual abuse images – where they don’t need to store a copy of the actual offending content, but instead have a database of “fingerprints” that can identify images and videos.

Sign up to our free newsletter.
Security news, advice, and tips.

My hope and expectation is that Facebook will automate the process as much as possible, but that there may need to be some human involvement to review submitted images.

My guess is that Facebook will tightly control who in the company can review and access submitted images, and that they will be blurred to protect people’s privacy, before they are converted into “fingerprints” and then permanently wiped.

You probably do need some human involvement to prevent people chucking images into the system which *wouldn’t* be classified as “revenge porn” (perhaps with mischief in mind, or perhaps in an attempt to prevent the spread of images that they were trying to suppress for other reasons).

This “human” element is probably the most risky part of the process, and there will be many people ready to castigate Facebook if it screws this up.

“Revenge porn” is horrendous enough as it is, without technology companies making the problem worse. Facebook knows that there will be many people concerned about how it handles such sensitive content, and I imagine they have put a good deal of thought into minimising the chances that anything goes wrong.

By the way, “revenge porn” is a horrendous phrase. We need to think up a better one.


Update 9 November 2017: Facebook has published some more details of its scheme.

For more discussion on this topic, be sure to listen to this episode of the Smashing Security podcast:

0:00
0:00 0:00
0:00
Show full transcript
TranscriptThis transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Unknown
Hello, and today's episode of Smashing Security is supported in part by Netsparker.

They are the web application and security scanner that can automatically find security flaws in your website and fix them before hackers can exploit them.

If you want to automatically check your web applications for cross-site scripting, SQL injection, and other vulnerabilities and coding errors that can leave you and your business exposed to malicious hackers, check out Netsparker.

Try it out now by downloading the demo from www.netsparker.com/smashing. And thanks to Netsparker for supporting the show.

Smashing Security, Episode 52: Facebook tackles vengeful scumbags and a sex toy privacy boob with Carole Theriault and Graham Cluley.
CAROLE THERIAULT
Hello, hello, and welcome to Episode 2 of Carole's Agony Corner.
GRAHAM CLULEY
The regular— Oh, Carole, hi there. How you doing?
CAROLE THERIAULT
I'm doing well. I'm doing well. We'll do it again sometime. We've had so much feedback saying it was fun. We'll do it again, but maybe not every week. It's a lot of work.
GRAHAM CLULEY
I had people coming up to me in the street saying, about that cat, with their sharing their opinions of the cat.

And it's people who I didn't even know listen to the podcast, but clearly do. But that was the one thing which really got them interested.

If you don't know what we're talking about, go listen to episode 51.
CAROLE THERIAULT
That's right.
Unknown
And we're also joined this week, by the way, it's Smashing Security, episode 52, actually.
CAROLE THERIAULT
And it's not our one-year anniversary because there were weeks when we did two episodes.
GRAHAM CLULEY
Do you remember those halcyon days when we were that keen that we'd do lots of episodes per week? Yes, but we'll be coming up to our birthday, won't we?

Just before Christmas, I think it is.
CAROLE THERIAULT
Yes.
GRAHAM CLULEY
That'll be fantastic. And we are joined this week by returning special guest, Mr. John Hawes. Hello, John. How are you?
JOHN HAWES
Hello. Hello. I'm very well.
GRAHAM CLULEY
Yay. Good to have you here, John. And as always, this week, there's been a lot going on, hasn't there, in the of computer security in the last week.

So we have picked a few of the topics, things which have caught our interest, which we will chat about right now.

And the first thing I wanted to talk about was Facebook and revenge porn. Actually, I don't want to talk about revenge porn because I really dislike that phrase, revenge porn.
CAROLE THERIAULT
Oh, I'm glad you just said that because I was about to take offense. It's an awful term.
JOHN HAWES
It's pretty unpleasant.
GRAHAM CLULEY
It's a bit when people talk about child porn and I think, well, this isn't actually porn, this is child abuse.

And similarly with revenge porn, I don't know what it should be called. Maybe—
CAROLE THERIAULT
I mean, as a big fan of porn, right? You definitely don't want it to be sullied in any way.
GRAHAM CLULEY
Exactly. Yeah, I'd hate porn to be soiled in this way.
JOHN HAWES
Keep the porn clean.
GRAHAM CLULEY
But I think instead of revenge porn, we should call it sort of, I don't know, image intimidation or image-based abuse or something. We need some phrase.

But of course, the newspapers love the phrase revenge porn. That's the sort of thing you may have seen in the press, and it's a ghastly phenomenon. We all know what it is.

It's a serious problem.
CAROLE THERIAULT
Oh, hey, hey, I think you should explain what it is just in case.
GRAHAM CLULEY
So what this is, is where somebody has got some photographs or video content of you of an intimate nature.

Maybe they hacked it and stole it from your computer, or maybe you shared it with them because you were in an intimate relationship with them, which then went sour.

And then people threaten, maybe blackmail you, or just because they don't like you anymore, to post it all over social media and send it to all of your friends and your parents and your employees.

And it's just, you know, it's horrible.
CAROLE THERIAULT
Okay.
GRAHAM CLULEY
How horrible. And this is something which obviously didn't exist in yesteryear.

The internet has made this so much easier and social networks have made it so much simpler for someone in just a rage-fueled moment to share those sort of images with everybody who you know.

And ghastly. And as a consequence, people have obviously been very traumatized. In the worst cases, people have even committed suicide.
CAROLE THERIAULT
Because the problem is, how do you stop the pictures, right, from someone else posting them? How does a social network actually find it and get rid of them?
GRAHAM CLULEY
Well, yeah, I mean, if you were to go to the social network, how are they going to stop it?

And meanwhile, everybody at your school for instance, has seen these photos and you feel you can't go there anymore. Horrible, horrible thing.

Well, Facebook is one company which is trying to take a stand against this.

For some time, you've been able to report image-based abuse on Facebook, and we'll put a link in the show notes so you can read more about that.

If you spot some images of you or video of you which shouldn't be being shared.
CAROLE THERIAULT
So yeah, you have to find it and then send a link, I guess.
GRAHAM CLULEY
Exactly. And I would imagine in many cases when it is being shared with people you know, you do get to find out.
CAROLE THERIAULT
Yeah, you get a heads up pretty quickly. Exactly, I bet.
GRAHAM CLULEY
Someone's going to say, I think you should, you know, know about this. But what Facebook's now trying to do is it's trying to be a bit more proactive about it.

And so they're running a small test in Australia.

And this is what got everyone's attention in the press where— and some of the press presented this as upload all your naked photos to Facebook and then they will try and prevent them from being posted and shared anywhere on Facebook Messenger and Instagram.

And understandably, a lot of people got pretty irate about that. And so what are you talking about, Mark Zuckerberg?

What a perv, you know, that people might want to do those sort of things.
CAROLE THERIAULT
I do have a problem with this. So I think you should, you know, do your bit and then we'll discuss it. Yeah.
GRAHAM CLULEY
So what they've— I mean, it's a difficult problem to solve, isn't it? But clearly Facebook already has systems in place to detect, for instance, child sexual abuse images. Right.

Because they don't want people uploading that sort of thing and sharing them on the network.

And so what they have is a database of fingerprints or checksums, if you like, which can identify offending images and videos. And they store that database.

So they don't store the images. What they do is that they have a database of checksums and fingerprints, I think would be the probably the best way to describe them.

And what they're trying to do is they're trying to expand that and say, look, maybe we can use this as well against image-based abuse against adults too.

So what they're saying is, If you have an image or if you have videos or if you believe that someone is going to start sharing images of you, then there's a process you can go through to basically tip us off and for us to keep an eye open and to try and prevent it from happening.
CAROLE THERIAULT
So, for example, if a specific image is sent of someone.
JOHN HAWES
Yes.
CAROLE THERIAULT
You would be having to look for that specific image online. It wouldn't be 'Let's send us pictures of you and any picture of you that we feel has too much skin.' Oh no, no, no, no.
GRAHAM CLULEY
So it's not, for instance, using Facebook facial recognition as far as I'm aware or something like that.

So it's not asking you, 'Hey, upload your holiday snaps,' or, you know, 'When you were out on the club the other night.' It's nothing like that.
JOHN HAWES
That's what I thought it was going to be, that you would send pictures of your armpit and say, 'If you see this armpit in any pictures, don't share them with us.' John, I think we could identify your armpit.
GRAHAM CLULEY
Well, probably, yeah. Without any sophisticated technology.
JOHN HAWES
But this is based on specific images or the hashes of specific images.
GRAHAM CLULEY
Yes, although I've heard it's not actually a sort of typical cryptographic checksum of an image because of course images can be resized, images can be altered.
JOHN HAWES
Stick a little logo in the corner or something.
GRAHAM CLULEY
Or put some message on or, you know, had some sort of headline saying, hey, look at Sheila or something like that, which would change the contents of the image.

So what they're trying to do is that they're using some smarter algorithms apparently to try and identify, I guess, the body or the shape or something.

So even if it's resized and altered in different fashions, they can still detect it and intercept it and prevent it from being shared.
CAROLE THERIAULT
So I think the intention is very good, but here's where I've got a few problems.
GRAHAM CLULEY
All right.
CAROLE THERIAULT
One, you have to make sure you trust Facebook and Facebook is going to do what it says it's going to do, and it's going to make sure that this doesn't get out in any way.

Now, I realize they're hashing it and they're using all kinds of algorithms.

However, you are sending them a nude pic of you, one that you do not want online, one that you want removed from the internet.
JOHN HAWES
Well, do you actually have to send them the pic? Can you not just do the hashing yourself and send them the hashes?
GRAHAM CLULEY
So how it works is like this.

Right now, as I said, the scheme has only been run in Australia, and you can go to the eSafety Commissioner's official website, so not a Facebook website, and complete an online form.
CAROLE THERIAULT
And that's an Australian kind of authority?
GRAHAM CLULEY
Yes.
CAROLE THERIAULT
Okay, right, right, right.
GRAHAM CLULEY
You can complete the form and that gives you instructions.

And what it's saying is that you have to send the image to yourself on Facebook Messenger, so you don't send it to any other Facebook users.

The eSafety Commissioner, which is the place where you've entered this form, they notify Facebook about what has happened, but they don't get to see the image.
CAROLE THERIAULT
Okay.
GRAHAM CLULEY
Facebook gets to see the— gets the notification, and a member of Facebook's team, and they describe it as a specially trained representative, who will review the image create the fingerprint, which creates the human-unreadable fingerprint of it, and they store that fingerprint, that hash.

They don't store the photograph to prevent anyone else from viewing it. And that obviously prevents in future anyone else uploading the photograph to the service.
CAROLE THERIAULT
Okay, I got you. But I'm with John on this. I think, why does a human have to do— create the fingerprint? Why couldn't it be created automatically at your end?
JOHN HAWES
Well, it sounds like there's some kind of special skill required, I guess, Well, drawing an outline around the relevant part of the person or something.
GRAHAM CLULEY
Well, who knows? I mean, we don't have details of exactly that. It may be complicated. And of course, Facebook isn't in the business normally of creating programs, is it?

It creates a website. So that may not be their expertise. It may be something which they want to regularly update, the algorithms and so forth.

And at the moment, this is something which has just been done as a trial.

So maybe if they decide, you know, this worked really well and we want to do more of this, maybe we want to roll it out over the rest of the world.

Maybe in future there will be something like that which could actually be built into the software. Who knows? It's possible. But right now that isn't happening.

And of course, there is the potential that a Facebook employee might see something which you don't want to see.

But then I think if you find yourself in that desperate situation where all of your schoolmates or your family or whoever might get to see things which you don't want them to see, then you may think, I don't care if some anonymous Facebook employee who doesn't know me gets to see this.

You know, it's not pleasant, but then you're not in a nice situation anyway.
CAROLE THERIAULT
Yeah.
JOHN HAWES
Well, putting in that human element makes it much less scalable as well. That's another issue to think about that.

I don't know how big a thing this is, but if it's affecting tens of thousands of people.
CAROLE THERIAULT
Yeah. And how long does it take for each specially trained representative to deal with each image?
JOHN HAWES
Who knows?
GRAHAM CLULEY
I mean, Facebook, we know in the past when they've had people who have been reviewing controversial content, sometimes they've made bad decisions.

And obviously, there is an enormous amount of that kind of policing and moderation which is going on on Facebook. It often has been less than satisfactory, I think.
CAROLE THERIAULT
Yeah, I've read a few articles on this, not in detail, right, but kind of scanned a few articles, and I don't think I got a proper understanding of what was going on.

So you are not having to upload any picture other than the one that's currently on Facebook doing the rounds that you want removed.
GRAHAM CLULEY
Or the one which you're worried might be distributed.
CAROLE THERIAULT
Or the one that you might— yeah, yeah. So you're saying watch out for this.
GRAHAM CLULEY
And even then, you are sending it via Facebook Messenger to yourself.
JOHN HAWES
Right, right. You're not posting it to your wall.
GRAHAM CLULEY
Yeah, you're not putting it up on your timeline or something like that.
CAROLE THERIAULT
Yeah, make sure. Yeah, you can see someone screwing that one up.
GRAHAM CLULEY
I think there's been lots of sort of joke. I mean, you know, I am not the biggest fan of Facebook, right? And I'd be the first to slag them off normally.

But I actually think, although some have raised their eyebrows about this, I think actually this is probably, you know, we should give them some credit for at least trying to do something about a serious problem which has affected many people.
CAROLE THERIAULT
Yeah, well, they should do something about it. I mean, it's illegal.
JOHN HAWES
It's just the scale of it. That's the problem. There's so much stuff on Facebook. There's no possible way that anybody can control it.
GRAHAM CLULEY
Wouldn't it be great if in order to use Facebook, you actually had to have a hardware plugin?

So you had to have something which was plugged into your computer and maybe it would be like a big boxing glove, which would extend out at you.

So anytime you were a bit of a twit online or just some vile toe rag, it went into your face and gave you a good punch on the nose.

That I think is what computers are missing right now. And maybe that would solve this problem. TM it, Graham. TM it. Hey, not just on the nose.

Maybe it could punch you somewhere else as well.
JOHN HAWES
The back of the head.
GRAHAM CLULEY
So, John, what have you got for us this week?
JOHN HAWES
So I'm going to be staying in the sexual area. I know that's a common theme of this show.
GRAHAM CLULEY
Why am I not surprised for you, John?
CAROLE THERIAULT
We're scraping the barrel now.
JOHN HAWES
Well, no, it's a fairly big story this week. Yet another privacy boob in the intimate tech industry. You had to really, didn't I? So a company called Lovense.
CAROLE THERIAULT
We've talked about them before.
JOHN HAWES
Yes. Well, yes, I'll come to that. So they're a Hong Kong-based maker of what they call wearable toys.
GRAHAM CLULEY
All right.
CAROLE THERIAULT
Okay.
JOHN HAWES
They're also very fond of the term teledildonics, obviously, who isn't? And they use it a lot on their website.

So they've admitted, well, what they call a minor bug in their Android app, which basically resulted in sound recordings being captured while the app was in use and stored on your phone's local storage.
CAROLE THERIAULT
You are kidding me.
GRAHAM CLULEY
Sorry, what kind of app is this, John?
JOHN HAWES
So it's basically a remote control app for their full range of wearable toys.
CAROLE THERIAULT
So this is a sex thing, right?
JOHN HAWES
So it's to, yeah, it's basically to allow you to control your vibrator or whatever it is you're using.

I think the sound portion of it is mainly so that you can time the vibration to go along with whatever music you're listening to or something like that.
GRAHAM CLULEY
Apparently, I don't know, it's not something I've tried out. What, the 1812 Overture or something like that?
JOHN HAWES
Yeah. Yeah, that would work nicely. So I think you can connect kind of two copies of the app. So someone else in a different room or time zone can interact with your machine.
CAROLE THERIAULT
Right. And they were recording the sound.
JOHN HAWES
Yeah. So this guy, some guy on basically on Reddit, where everything comes from, by the nickname Thai doctor.

So he was cleaning up his phone and he stumbled across this audio file that he hadn't expected to be there.

And it turned out that it was a 6-minute recording of his session using the Lovense remote app.
CAROLE THERIAULT
No way.
GRAHAM CLULEY
6 minutes, eh? And he calls himself a doctor. You'd think he'd—
JOHN HAWES
I'm not sure Reddit nicknames are official medical titles.

So apparently it's a cache file that the app uses to store the sound that it needs to monitor to make use of the sound features.

And it was supposed to be deleted at the end of the session. But this bug meant that it wasn't actually deleting it.
CAROLE THERIAULT
This tiny bug, minor bug, they call it.
JOHN HAWES
Minor bug, minor bug, yes.
GRAHAM CLULEY
Quote unquote, right. Well, why was it storing the audio anyway? I don't understand that. Why? I can understand maybe if it wanted—
CAROLE THERIAULT
Maybe for repeat performances? That was good. That was a great one.
GRAHAM CLULEY
Let's reminisce. Here we are listening to classic Gold tunes from the '70s and '80s.
JOHN HAWES
That could easily be a feature, you know, if you set it up to listen to the radio and a particular song's come on and you thought, oh, actually, I quite like that rhythm.

Can I use that again sometime? You need it to have recorded the last 6 minutes or whatever.
CAROLE THERIAULT
I think go and find the song.
JOHN HAWES
You can recycle. You know? Well, yeah, that would be a—
CAROLE THERIAULT
Wow. So people must have been really unhappy. That is—
JOHN HAWES
Well, actually not that much.
CAROLE THERIAULT
Oh, really? This is their claim to fame?
JOHN HAWES
Well, first of all, it's not the first time this, as you mentioned, Lovense has been in the news for poor security.

It was only about a month ago, their Hush, it was called, Bluetooth-controlled bottom pleasuring devices.

So they were using the Bluetooth Low Energy, which is very cheap and efficient, but also very poor security.

So it was pretty easy for anybody that was in the vicinity to hijack the—we talked about this as well.
CAROLE THERIAULT
Yeah, I'm sure you did.
JOHN HAWES
Right up your alley, so to speak. And there's also, there's another incident, was this back in August? A Canadian firm who make a WeVibe device.

Yeah, they had to pay out $4 million in a, to settle a class action lawsuit. So their toys and apps were gathering too much sensitive data.

Not malware, but they were actually sending feedback to the developers. This is WeVibe, which included the temperature levels and vibration intensity.

And also they similarly had, they were using Bluetooth and were very easy to hijack by anyone nearby.

So Lovense, this particular case is about, so they've said that no data was being sent to their servers. Everything sent between the users is peer-to-peer, is encrypted in transit.

And they did say, yes, the cache file is required for the sound feature to operate. And they've issued an update, obviously. They actually had a look at their website.

They have some pretty reasonable privacy advice and they mentioned the encryption.

They mentioned not storing things centrally, but they also note it would be nearly impossible for someone to obtain any of the content that's happening on our platform.

So it's "nearly" very important.
CAROLE THERIAULT
Well, at least they're honest. Yeah.
JOHN HAWES
So I also, I looked on the Google Play Store and there was indeed an update yesterday.

And there's also several commenters who've noted the sound recording issue, but they're not all too concerned.

One review actually says, apparently this app records "creepy." But he still gave it 3 stars.
CAROLE THERIAULT
Okay, great.
JOHN HAWES
Yeah.
GRAHAM CLULEY
There's a general problem here, though, isn't there?

I mean, regardless—I mean, okay, this is a sex toy or whatever, but with any app, you have to be very careful because you don't necessarily know either what it's doing or what it might be storing and how securely it's keeping the information as well.
CAROLE THERIAULT
It'd be smarter to be English about it and just say nothing during the experience.
JOHN HAWES
If you've given an app permission to use the microphone on your phone, you kind of have to assume that it's listening and that probably that is sending that sound somewhere else, or at least doing some kind of processing with the sound.

And the same goes for these speakers that you speak back to.
CAROLE THERIAULT
Everyone would be wise to go to their phones right now and just check the microphone setting to see what apps have access to your microphone and toggle off those that you would prefer not to have to listen to all the time.
JOHN HAWES
Yeah. And just be aware that, you know, if you're near one of these microphones, even the, you know, Amazon Echo things or whatever, they're listening. You're not in private.

And even if you've just got a phone in your pocket, you're not in private.
GRAHAM CLULEY
Well done, Carl, for using the word toggle, which is one of the least sexy words in the English language.
CAROLE THERIAULT
I love the word toggle.
GRAHAM CLULEY
No, I love it as well, but not in a sexual way.
JOHN HAWES
It's quite cuddly.
GRAHAM CLULEY
It just reminds me of Paddington Bear.
JOHN HAWES
Yeah, well, some people find that—
CAROLE THERIAULT
Yeah, perverts love that.
GRAHAM CLULEY
Perverts.
JOHN HAWES
The perverts community.
GRAHAM CLULEY
Don't talk about pervertism. The new Paddington Bear movie is about to come out or is out. You know, we might be taking my kid to go and see it.

I don't want to think about things like that. Okay.
CAROLE THERIAULT
Well, too late.
JOHN HAWES
Watch out for people engaging in discreet public play. That's one of the features of the Lovense range. They facilitate discreet street public play.

Actually, the guy on Reddit who brought it up, he said he was playing pool in a bar when the recording was made.
GRAHAM CLULEY
Oh, be careful with that pool stick.
JOHN HAWES
Yeah.
CAROLE THERIAULT
Oh, so it allows men to multitask. Is that what you're saying?
JOHN HAWES
Oh, yes.
CAROLE THERIAULT
God. Maybe something good will come out of all this.
GRAHAM CLULEY
Carole, I'm hoping you can raise the tone. Well, I can't do a little.
CAROLE THERIAULT
A little.
JOHN HAWES
Unlikely.
CAROLE THERIAULT
A little. So I'd like to tell the story of how a Minnesota— a certain man named John Kelsey Gammell became known as John Kelsey Gammell.
GRAHAM CLULEY
Oh, okay.
CAROLE THERIAULT
Yeah. Became known as, okay, cover your ears, kids, Mr. Cunnius.
JOHN HAWES
Oh, there we go.
CAROLE THERIAULT
Oh my God. And okay. And was arrested by the FBI for launching multiple distributed denial of service attacks on companies, including his former employer, Washburn Computer Group.

So let me get started at the beginning.

The FBI got wind of something fishy going on when Washburn Computer Group, Gammell's former employer, reported getting hit by numerous DDoS attacks on their websites between July 2015 and September 2016.

Right? So they called the FBI and they're saying, look, we're getting hit all the time.
GRAHAM CLULEY
Our websites keep going down.
CAROLE THERIAULT
Our websites keep going down. This is a problem.
JOHN HAWES
Right?
CAROLE THERIAULT
Right. And during this time, Washburn, the company, received emails mocking the company's ongoing IT issues.

Now, the sender of these mocking emails had created Google and Yahoo accounts, and rather than use an anonymous name, he actually used the name of another employee at Washburn.

So the FBI— so this is how it all works— the FBI subpoenaed Google and Yahoo for the detailed logs of these email accounts, and guess what?

They found a direct link to Gammell's CenturyLink IP address and IPVanish VPN service.
CAROLE THERIAULT
So basically, they got a tie between Gammell and these emails that were being sent mocking them for their ongoing IT issues. Now, let's just back up a bit.

So Gammell used to work at this company, and then he left and set up his own kind of soldering training company, and I think was looking to try and get a deal to kind of do training for Washburn, and it all fell flat.
GRAHAM CLULEY
There are soldering training companies?
CAROLE THERIAULT
Apparently there is.
JOHN HAWES
Well, someone has to teach people how to solder.
CAROLE THERIAULT
Yeah, you don't learn your— I mean, people can probably learn off Google, but you know, why not get hands-on?
GRAHAM CLULEY
All right, I'm surprised.
CAROLE THERIAULT
So he had a motive is what I'm saying. He was, sounds like he was pissed off that the deal between them didn't work after he set up his own company.

So the FBI now have a probable cause to subpoena Google for Gamal's official Gmail address, and they get the information and they find some treasure, including registration emails and pro account purchases for a number of DDoS booter services, such as Sea Stress and BooterBox and VDoS.

Now, booter services are this kind of rent-a-DDoS web attack. It's DDoS-for-hire services. Now, this is where Gammill gets extremely unlucky.

One of the DDoS booter services Gammill registered with, so VDoS, suffered a cyber breach last summer, in summer of 2016.

And a security researcher, presumably working on cleaning up the DDoS incident, handed over all the DDoS logs to the FBI.
GRAHAM CLULEY
Oh, nice.
CAROLE THERIAULT
So when the FBI saw DDoS mentioned in Gammill's official Google email communications, they probably had this big light bulb moment, found the old DDoS logs, and performed the art of cross-referencing.

And here the FBI were able to unveil that Gamal was likely to be behind a load of DDoS attacks on servers belonging to companies like Wells Fargo, JPMorgan Chase, and the one he might regret most, Minnesota Digital Branch.
GRAHAM CLULEY
Oops.
CAROLE THERIAULT
Yeah.
GRAHAM CLULEY
Oh, the court.
CAROLE THERIAULT
Yep, his local court.
GRAHAM CLULEY
Oh, whoops.
CAROLE THERIAULT
And can you guess what one of his usernames on the VDoS site was?
GRAHAM CLULEY
I'd rather not.
CAROLE THERIAULT
Yeah, because it is a bit adult.
JOHN HAWES
Was it Senor Canaleaks again?
CAROLE THERIAULT
So the email logs even showed that Gamal sent a congratulatory email to VDoS to tell them that their service had outperformed his expectations.

It starts with, dear colleagues, this is Mr. 'You underestimate your capabilities.' And he ends with, 'We will do much business. Thank you for your outstanding product. Smile emoji.
GRAHAM CLULEY
We are Anonymous USA.' Did he also give them 3 stars like the guy on the Google Play?
CAROLE THERIAULT
He sounds like that email. By the way, this story came from Bleeping Computer, and there's a load more information there. So I suggest anyone interested in the story, go take a read.

It's a really good story. So it's true that apparently in a number of his emails, he, Gamal, has claimed to be a member of Anonymous, the hacker collective. Our Mr.

Cannabis was arraigned in a Minnesota court this week. Washburn said that it suffered losses of over $15,000, which I was surprised that there wasn't a zero missing, but there—
GRAHAM CLULEY
Maybe it does, you don't make that much money, you know, offering soldering training.
CAROLE THERIAULT
Well, they do, I think, point of service repairs.
GRAHAM CLULEY
Oh, I see. They do all kinds of— Oh, I see.
CAROLE THERIAULT
Yeah, yeah.
JOHN HAWES
Anyway, it's entirely through the website, I guess.
CAROLE THERIAULT
Get this. According to local press, Gamal faces between 15 and 17 years in prison for his little revengeful attack.
JOHN HAWES
Well, that's actually quite reasonable for America. It's usually sort of 175 years, isn't it? Or 3 lifetimes to run consecutively.
CAROLE THERIAULT
Yeah, but, you know, it goes to show that revenge doesn't always pay off in any good way.
GRAHAM CLULEY
Well, does it ever really pay off?
JOHN HAWES
I don't think revenge is ever a good thing.
GRAHAM CLULEY
I can understand people feeling really miffed and feeling they've been hard done by by someone they used to work with and the rest of it. And you just want to get my own back.

But do you ever really get that? Oh, well, I'm very satisfied with my revenge. I'll now move on with my life. I think it's just—
CAROLE THERIAULT
Yeah.
GRAHAM CLULEY
Take a deep breath, folks.
CAROLE THERIAULT
Yep. Take a deep breath and go on a holiday. Go get a massage.
GRAHAM CLULEY
Get over it.
CAROLE THERIAULT
All right. It's time for our favorite part of the show, isn't it? Our sponsors.
GRAHAM CLULEY
Are you worried that your website might be the backdoor through which hackers can access your information and steal data? Well, if so, you'll be interested in our sponsor today.

NetSparker is a web application security scanner. It can automatically quickly find the flaws in your website security and fix them before hackers can exploit them.

You can try it out right now. Download a demo from www.netsparker.com/smashing. On with the show.
CAROLE THERIAULT
Doo doo doo.
GRAHAM CLULEY
And we're now at that part of the show we like to call Pick of the Week.
CAROLE THERIAULT
Pick of the Week. John?
GRAHAM CLULEY
Pick of the Week.
JOHN HAWES
Indeed.
GRAHAM CLULEY
So what we do in Pick of the Week is everyone chooses something that they like.

Could be a funny story, a book that they've read, something interesting, TV show, movie, record, app, website, podcast, whatever. It doesn't have to be security related necessarily.

It could be about absolutely anything at all. But my pick of the week this week is something a little bit useful.
CAROLE THERIAULT
Finally.
GRAHAM CLULEY
But it's not going to be useful to you. If you actually use it. Oh, it's going to be useful to other people after you're dead.
CAROLE THERIAULT
Oh, that's an unusual pick of the week.
GRAHAM CLULEY
It is. Google's Inactive Account Manager. There are other sites which have something this, but Google is so widely used, I thought this was a good one to highlight.
CAROLE THERIAULT
Do you think they'd have a better SEO name, Google's Death Manager or something? No one's going to Google Inactive Account Manager, will they?
GRAHAM CLULEY
They don't want to talk about death, I think. That was my feeling when I was reading all about this.
CAROLE THERIAULT
Jeez.
GRAHAM CLULEY
But what it is, right, is at the moment, so much of your life exists on Google, maybe on Google Drive or your Google email, or maybe your Google-run Blogger account, or, you know, whatever it is.

And what are you going to do when you're no longer around? How are your loved ones going to handle it? Now, you might want all that information to be deleted once you've gone.

Or you might want to hand some of it over to someone else to look after.
CAROLE THERIAULT
All right?
GRAHAM CLULEY
And I think it's worth us thinking about this before we do indeed, you know, kick the bucket, as it were.
CAROLE THERIAULT
So you're not going to be thinking about it afterwards.
GRAHAM CLULEY
Let me explain how it works.
CAROLE THERIAULT
Exactly.
JOHN HAWES
You never know.
GRAHAM CLULEY
What you can do with your Google account is you can go to the Inactive Account Manager and you can say, look, if I haven't used my account for maybe 3 months, 6 months, or maybe a year or something that.
CAROLE THERIAULT
What? A year?
GRAHAM CLULEY
Yeah. What's wrong with that?
JOHN HAWES
Okay.
CAROLE THERIAULT
Well, okay, carry on. Give me, give me—
JOHN HAWES
Then there's once-a-year Gmail users.
GRAHAM CLULEY
Basically, you might be in a plane, right, which crashes in the Andes, and it takes you a long time to come home.

Or you might be on a rubber dinghy in the middle of the Atlantic waiting for someone to pick you up for months on end.
CAROLE THERIAULT
Presumably you're not giving your Google account to someone you don't like.
GRAHAM CLULEY
Or maybe you've, you know, gone to prison for some sort of offense like launching a DDoS attack or something like that. Who knows what it is, right?

But anyway, the thing is that for Google to decide your account is inactive, you have to decide what the timeout period is, the period of inactivity that must occur before it assumes you've gone a clunker.

So what you do in advance is you set up your trusted contacts.

You tell Google, these are the people I want you to tell if I haven't been active on my account and who do I want you to alert?

And you have to give it a phone number as well for these people because they don't simply want to rely on those people's email addresses in case their email address is actually compromised.

And you can decide which bits of the Google universe you want to share.

So you might decide, well, I do want to share my contacts, but I don't want to share my email, for instance, right? If only to invite people to the memorial or something like that.
CAROLE THERIAULT
So you're saying to me, right, if you kick the bucket, Graham, and you sign up—
GRAHAM CLULEY
Can we have a moment of silence for that?
CAROLE THERIAULT
And you set this up and I am down as a trusted contact.
GRAHAM CLULEY
As if.
CAROLE THERIAULT
So if you set it up for 3 months, I have to wait 3 months to get your contact list to invite your friends and your chess buddies and your Doctor Who buddies to your funeral?

Because I don't know who they are.
GRAHAM CLULEY
Yeah.
JOHN HAWES
And also if somebody dies and you have a memorial service for them and a funeral, then you mourn and things like that.

And then suddenly 6 months later you get a phone call from Google saying, oh, we think Dave might be dead. That's, you know, that's going to kind of bring up all those bad memories.
GRAHAM CLULEY
It might. All right. But this is the choice of the person who's died, right? They decide whether this happens.

But certainly I can imagine plenty of scenarios where people would want this information to be shared with their nearest and dearest.

And yes, maybe a little bit upset, but maybe after 3 months you'd be able to cope a little bit better with it.
JOHN HAWES
And I like the one, the LastPass approach. They have a similar kind of emergency access system.

So I think you basically set up a trusted person and then they have to request access and you could set a timeout to say, okay, so if my wife tries to access my LastPass and says it's an emergency, it sends me a message.

And if I don't respond within that time, it assumes that I'm dead or incapacitated or in a Turkish prison.

Allows them access rather than just waiting and then suddenly starting spamming people.
GRAHAM CLULEY
So what do you, do you on LastPass say that your partner is the person who can request this?
JOHN HAWES
So you set them up as the trusted person and then they have to request it because I can't get in for whatever reason.

And then I set that the time to say, okay, if give, give me 24 hours in case I'm not in prison.
GRAHAM CLULEY
Oh, I think I'd want a bit longer than 24 hours.
JOHN HAWES
Yeah, well, you can, yeah, it's quite flexible. I think you can.
CAROLE THERIAULT
Yeah, yeah, Graham wants 3 months. He's going to be sitting on ice while we're sorting out everything. I'm going to be Walt Disney. I'm going to be cryogenically suspended.

I don't know why I assume you're going to die before me. I'm sure that's not the case.
GRAHAM CLULEY
I am older than you.
CAROLE THERIAULT
Yeah, I know.
GRAHAM CLULEY
And you're a bit fitter than me.
CAROLE THERIAULT
Definitely.
GRAHAM CLULEY
Carole, what's your— Oh no. John, what's your pick of the week?
JOHN HAWES
Ah, okay. Well, so this week I have been enjoying wood quite a lot.
CAROLE THERIAULT
Oh, based after this episode. Is that appropriate?
JOHN HAWES
What? Hey, calm down. No, no, I've been enjoying woodworking out in my shed.
CAROLE THERIAULT
Ah, yes.
JOHN HAWES
So I discovered that those nice cardboard boxes that you get wine shipments in with the little cardboard dividers, yes, they work very well to store your wine in a kind of vertical stacking system, only until you take one of the lower bottles out and then the whole thing collapses because cardboard's not that strong.

So I thought I'll pop out into my shed and I will knock something up out of bits of wood that I have lying around. I have lots of kind of scraps and recycled, reclaimed things.

I thought that'll be it, make a nice little wine rack.

So I've been tinkering away, and one of the things it's reminded me of is I have some very, very lovely tools, thanks to my very, very kind in-laws, from a Canadian store called Lee Valley Tools.

And these guys make quite beautiful, you know, they're lovingly crafted, hardwearing, and very classical looking stuff.
CAROLE THERIAULT
Yeah. What kind of tools do you have?
JOHN HAWES
Planes, and I have a lovely set of chisels. I have some Japanese pull saws, which are very useful for kind of fine little cutting work. But yeah, and they're very good looking.

They don't just make that kind of traditional classical stuff. They have lots of inventive gadgets and gizmos. With new ideas as well.

And they have kitchen things as well as kind of woodworking stuff, and they ship internationally.
CAROLE THERIAULT
I know the shop, being Canadian, I know it, and it's, it is a pretty cool—
JOHN HAWES
It's quite a big chain.
CAROLE THERIAULT
Yeah, it's quite a cool store. It's got a lot of cool stuff in it.
JOHN HAWES
Yes.

So I, my pick of the week is for anybody that's interested in woodworking or has a friend that's interested in woodworking or just wants a stunning plane to sit on their mantelpiece as a decoration, you know, pop to Lee Valley.

They ship internationally. It's a great, great website.
CAROLE THERIAULT
Cool.
JOHN HAWES
And if you can go to the actual shop, it's even nicer.
GRAHAM CLULEY
Something's going on. All right, Archie, calm down. Sit down.

Well, it's great to know, John, that while you're whittling away in your shed, you've got such fine equipment in your hands.
CAROLE THERIAULT
Okay, that's a weird sentence.
JOHN HAWES
That's, that's, yes.
GRAHAM CLULEY
Just keeping the tone going.
JOHN HAWES
Yes, exactly.
GRAHAM CLULEY
Theme of the show. Carole, what's your pick of the week?
CAROLE THERIAULT
Well, my pick of the week is for kids.

Now Christmas is coming and, you know, we're all thinking of what to get kids in our lives, but wouldn't it be great to give them something that they love that also teaches them something super valuable?
JOHN HAWES
Mm-hmm.
CAROLE THERIAULT
So here's a really cool gift idea for budding engineers. It's not new, but it's certainly tried and tested and great.

I bought these for my niece and nephew a few years ago, and they went down a storm. And what I'm talking about is Snap Circuits from Elenco Electronics.

These are color-coded electronic kits for kids aged 8 and above.

And with Snap Circuits, kids can build hundreds of different projects like mini motors and speakers and lamps and doorbells and burglar alarms and all sorts of stuff.

And it's really, really fun. The pieces are really good quality. They have a really satisfying snap when you put them into place.

And it's a really great way to introduce kids to electronics.

And you know what, you might just learn a little bit more if you're not really au fait with the ins and outs of electricity.
GRAHAM CLULEY
I'm looking at a video right now of some of this stuff. It looks really cool.
CAROLE THERIAULT
It's great. It's really fun. And projects can— some projects can take a few hours or half an hour. So they have different levels.

And there's— if you go to the website, there's tons and tons of different Snap Circuit sections you can buy.

Now, the one thing I would warn is not to buy directly from the website because they don't have HTTPS. So maybe go to Amazon or other trusted online retailers to purchase them.

But I promise you won't be disappointed in either one of your picks. Or a physical shop.
GRAHAM CLULEY
Physical shops?
JOHN HAWES
They exist.
CAROLE THERIAULT
Yeah, but they tend to have less of a range and it's kind of cool. And some of them even connect with your phone, right?

So you can actually test the circuitry using your iPhone or Android. It's pretty cool stuff.
GRAHAM CLULEY
It does look really cool. I mean, there's like flashing bulbs and windmills going off and it looks very, very much fun. Very creative.
CAROLE THERIAULT
Imagine a kid could build a little burglar alarm to stop people from going into their stuff.
GRAHAM CLULEY
Very cool. Very cool.
JOHN HAWES
Or a wearable toy.
GRAHAM CLULEY
John. Sorry. Well, I think that is as good a time as any to wrap up the show. Remember, you can follow us on Twitter @SmashingSecurity without a G. Twitter didn't let us have the G.

You can also join us on Facebook at smashingsecurity.com/facebook, or you can buy some swag at smashingsecurity.com/store.

Thank you very much, John, for joining me and Carole Theriault.
JOHN HAWES
Thanks for having me.
GRAHAM CLULEY
Terrific to have you here.
CAROLE THERIAULT
Keep the tone so low. We love that.
JOHN HAWES
Well, you know, I tried to fit in with the theme.
GRAHAM CLULEY
And if you know someone who might like the Smashing Security podcast, tell them about it. And you can go to smashingsecurity.com for the past episodes and to get in touch.

Until next time, cheerio. Bye-bye.
CAROLE THERIAULT
Thanks for listening, everyone. Thanks. Cheers.
GRAHAM CLULEY
Okay, there we go. Thank you, everybody.
CAROLE THERIAULT
Yeah.
JOHN HAWES
Yeah.
GRAHAM CLULEY
I'm going to press Stop.
CAROLE THERIAULT
Press stop.


Graham Cluley is an award-winning keynote speaker who has given presentations around the world about cybersecurity, hackers, and online privacy. A veteran of the computer security industry since the early 1990s, he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows, makes regular media appearances, and hosts the popular "Smashing Security" podcast. Follow him on TikTok, LinkedIn, Bluesky and Mastodon, or drop him an email.

9 comments on “Give Facebook your nude pics to tackle revenge porn”

  1. someone

    So, how does it get consent? Does it message you out of the blue and say "bob" is trying to publish an intimate picture of you? Do they show you the picture? What if it's not you? Then it would be Facebook spreading it. What if you're a twin?

    How about more articles that say… don't allow others/self to take intimate pictures of you. Unless they're actual non/never digital images stored in a controlled safe place [and that's not even 100% safe], assume it'll eventually fall in the wrong hands.

    1. Graham CluleyGraham Cluley · in reply to someone

      My guess is that Facebook doesn't bother asking for consent.

      If it determines the image is in its database of dodgy images it simply won't allow it to be uploaded to its servers.

      1. Mark Jacobs · in reply to Graham Cluley

        We therefore have to trust the Facebook image matching algorithms! Mmmmm, judging by the way they seem to lose perfectly legitimate comments at random from the site (of which I have proof), I don't think I'd trust much of their software capabilities.

  2. Wayne May

    There is another phrase used instead of "revenge porn" – "image based sexual abuse". I'm guessing the media isn't using it as the "porn" part likely sells more copies for them.

  3. Jeri

    Don't take nude photos. Problem, solved.

  4. Farid Tahery

    Yes, go ahead and upload your nude photos to Facebook. What can POSSIBLY go wrong?!

  5. Martijn Grooten

    Did you see this thread by Alex Stamos, and the article linked there?

    https://twitter.com/alexstamos/status/928740488395608065

    It is something Facebook, any many organisations working with victims, have thought about very carefully. No solution is perfect, but if you're worried about your nudes being shared among your class mates, with your family or within your social circle, should you really worry about some anonymous person at Facebook also having access to your nudes?

    1. Martijn Grooten · in reply to Martijn Grooten

      Also, someone else made the good point that the use of "your" in many articles (including your blog) implies that this is something for the general public. It's for a very specific group of people, for whom this may be the least bad of all bad options.

  6. Mark Cross

    Why does photo need uploading?

    Surely like several firms on the market that use a Photoshop plugin to calculate fingerprint, it could actually be done in the browser or local utility?

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.