
Online drug dealers get busted due to poor OPSEC! People are still failing to wipe their USB sticks properly! A potential presidential candidate is outed as a former hacker! Flat Earthers! Pi! Empathy!
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Paul Ducklin.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
We're joined by returning guest Paul Ducklin from Sophos, whom we have once again forced against his will to join the Smashing Security sheep run.
How do you feel about that, Duck?
Ducky's going to talk to us about what we do when we sell our old devices and what we should be doing. And Kroll is going to be talking about an old hacker group.
All this and more coming up on Smashing Security. Right guys.
It says, hey, dear friends, in light of the heavy demand for Patrick Lemon Haze, deliveries to the Tel Aviv area, 5 grams, just 500 shekels.
I'd say you're probably a bit wasted there, Graham.
Telegrass is a community that operates through Telegram, the encrypted messaging app, and it was set up by a guy called Amos Dov Silver and is estimated to have more than 150,000 members from countries around the world.
And what is it? Well, it describes itself as being Uber, but for weed.
It allows users to do a search of dealers by name and find reviews of their operations, just like Yelp if you're checking out restaurant reviews.
And this has resulted actually in people who are dealing in pot and other drugs, improving their service and product quality in order to compete with others, because everyone wants to get a 5-star review.
So if you need help in all different manners, maybe you need to hire a Python programmer, for instance, you go on to Telegram and you're pretty sure to be able to find one.
You put up a little ad.
So there are people with titles like chief financial officer, vice president for infrastructure, vice president of operations, and even a spokesperson.
So it's running in a way like a dot-com startup.
And certainly dealing it in many countries is something which could get you a hefty prison sentence, as it can in Israel, where many of Telegrass's users are.
But it's not all fun and games. There's bad stuff which happens on Telegrass as well. Sometimes people steal or they don't pay up.
And some dealers have even sexually harassed their potential clients, telling them that they can pay in a different way if they don't have the shekels on them.
And there's even a sexual harassment officer at Telegrass who's trying to impose standards upon the dealers so that they don't suggest that people have a bit of nookie rather than paying up.
Sometimes it's just for a week for behaving inappropriately, or she can even request that victims are given 7 grams in compensation for any trouble that has been caused.
So, you know, they've thought this through. You know, it's not just an amateur operation, this.
This is the strain, whatever, whatever.
So any would-be dealers are required to go through a verification process to be authorised on Telegrass.
They look on your Facebook account, they see if you have likes from 5 years ago.
They want to make sure that you've got a history rather than being a new account and make sure that everything's kosher.
Okay, so people are obviously uploading this thinking it's a great idea.
So when a potential client contacts them via private message on Telegram, the dealer verifies the client usually by saying, can you send us a selfie?
Can you send us a photo of your identity card, or can you send us a photo of your salary slip? And that's another way in which they verify, okay, this is a—
Yeah, and the dealers as well. That's right. So what could possibly go wrong with this?
It's just like, oh yeah, I've got to do a bit more investigating here.
Amongst those arrested was Amos Dov Silver, Telegrass's founder. He was in the Ukraine allegedly having business discussions with local criminal gangs.
And Telegrass is meanwhile suspected of selling tons and tons of drugs over the years worth hundreds of millions of shekels.
It's not our fault that they're doing it from countries where pot's not legal.
They should be able to get it, and it should be as easy as possible regardless of local laws. That's their view. That's very much the philosophy of the guy who set this up.
And so he's tried to make it as simple as possible to do that. Now, what kind of defense they're going to mount around this, I don't know.
Certainly in Israel and in some other countries, it's likely that they're going to have the book thrown at them.
Amos Dov Silver, the founder, he is apparently now cooperating with the police. I think he's realized that may be in his best interest.
He's both American and Israeli, but he's been sort of nomadically travelling around the United States for a few years, doing interviews, talking about his basically Uber-for-weed operation.
But he wanted to do it from the States because he found it a bit more free and easy over there.
Because there are taxes to be paid and there's registration to be done and there's all sorts of— it's quite complicated to comply.
Just consider that they went to the effort of thinking, we're going to base this on Telegram, we're thinking encrypted messaging, we're going to keep our communications secure.
But at the same time, they were collecting video footage, photo IDs.
They may have copied it to their local drives as well.
If you're going to get the message and then throw it away, what's the point of collecting it?
So all sorts of trouble for those people, I guess, because everyone's going to be quaking in their boots now.
You're not necessarily going to keep all your information private. You don't know what else will happen with it.
And it's just extraordinary that these people who are obviously involved in criminal activity were sharing so much data, and now it's come to bite them on the bum, hasn't it?
And if someone takes a picture of the picture with another telephone, how are you going to control that? So you're sending this to somebody so they can verify you.
Obviously they have to have that unencrypted saved somewhere so they can look at it.
And that's, you know, so I think maybe people, when they hear about these messaging systems that use the term end-to-end, it kind of sounds like it's universal, complete, eternal, everything encrypted, forgetting about the fact that you had to see it at your end and the other guy sees it at the other end.
What do you not understand about that bit about seeing it?
And from the Telegraph's point of view, of course, maybe a lot of people now will lose confidence in Telegraphs and be nervous that their information may soon fall into the hands of the authorities, which means that if you are after 5 grams of Patrick Lemon Haze or whatever the hot substance is in Tel Aviv right now, you're going to have to look elsewhere, aren't you?
I wonder if there'll be other criminals operating similar networks and taking advantage of the internet and technology to make this as smooth an operation as apparently Telegraphs was until it came undone?
But I imagine many people would have loaded up, maybe not their passport numbers, you know what I mean?
You'd want to obfuscate your character and you'd have an online character that may be different from your real physical character.
I'm going to be amazed if people actually went forward with all their proprietary information.
So that, you know, who knows what people are in the database?
Because you imagine it's not going to be people who are buying weed online, although if it's delivered to your house, it's all LinkedIn.
Now, this comes about, it was a survey done by the University of Hertfordshire that bought up a whole load of USB keys from kind of what you might call public sources.
So they went to eBay, people are selling off old stuff.
And they just bought up devices, which is very much like a project I was involved in when I was working at Sophos in Australia. This is now about 8 years ago.
We went to the New South Wales Railway Company's lost property auction and bought up a bunch of USB keys, and we were interested to see what was on there.
And as you can imagine, the answer is quite a lot that you shouldn't have let out.
There was someone who commented on our site saying, you know, it kind of seems a pity that what everyone's saying is when you're done with a USB key, just, you know, put it in a vice and do it up and crush it to bits and just let the dust drop to the floor and be done with it.
And that's obviously a great way to deal with it. No one's going to get the data off, you don't have to worry about it. Who wants a 256-megabyte USB stick anyway?
And this lady Samantha said, you know, it kind of seems very wasteful and very un-green, which was the angle that I took all those years ago when people were saying, we can't believe that New South Wales State Rail, as it was then, that they're selling the stuff off.
This is a violation of people's privacy, you're saying. So they should waste this stuff, because people can't be bothered to look after their own data properly.
And eventually, you know, the Privacy Commissioner in New South Wales decided it is actually too hard, it's too expensive, it takes too long to wipe a USB key, and who knows if it even worked correctly because of the way writing to USB devices, SSD devices, storage works, that they're not valuable enough, that it would cost us too much to sell them.
I'm really sorry, we're going to— they're basically going to get shredded and turned into dust and distributed back to the universe. And it does seem kind of wasteful.
I love old USB keys because when I want to wipe them out after every time I've used them, the smaller they are, the faster they wipe. And I don't normally need to fill them up.
But we're in this sad thing that it's almost making these devices kind of disposable and wasteful and un-green and un-environmentally friendly.
Sadly, that's the right thing to do from a privacy point of view, because it's the one way you don't have to worry about what you might have left on them, whether you thought it was encrypted or not.
What steps would you— where would you tell them to go?
But the first thing you should do is— you see how times change, Graham? First thing to do is go out and buy yourself a Mac.
And then after 5 minutes, I thought, what have I been doing all this time? Now, the reason I'm saying this—
It's quite slow, but you can leave it running in the background and then it will offer you the chance to reinitialize it and whatnot if you want to.
Or if you're just going to put it back in your own drawer in case you need it later— once I've finished using one for a temporary purpose, I'll wipe it, I'll wait for that to happen, then I figure if I do lose it or someone steals it or I need to hand it to somebody else, yeah, I'm handing them something that I'm pretty certain is blank and I don't have to worry about it.
And the other thing, the other reason I'm suggesting a Mac— you can do this, it's easy enough on Linux or the BSDs, you can do it on Windows although you might have to upgrade to the Windows 10 Pro— but at least on a Mac when you put in a blank USB device it will come up and say do you want to format it and prepare it for use, and when you do it'll say do you want to encrypt it.
And you can actually format it using the Apple filing system, the new Apple filing system. You can format it so that it's encrypted from the start.
Put in a passphrase, you get a recovery key which you can print out and lock away if you really want to.
And that means that then if you do lose it, somebody who hasn't got the key, to them it's just— the data is just so much shredded cabbage.
And I keep a blank one lying around in the little bag I carry around with my stuff.
And if I get somewhere I need to share data with somebody and I can't do it via some electronic means like AirDrop or something from Mac to a phone or whatever, then I basically will take out one of the USB keys that I know I've got blank.
I'll plug it in, my Mac will say this key is unusable on this computer, do you want to prepare it for use? And then I will format it, and I'll format it unencrypted.
I'll put that one file on it, I'll hand it to them, let them use it, and when they give it back, I'll go through the wiping process again.
Because 8 years ago when we did this experiment with the New South Wales State Rail, all doxing USB keys, two-thirds of them had malware on them, and not one of them had any encrypted files.
So nobody had bothered to encrypt them.
So when I get the key back from somebody else, if they've had malware on their computer— I know that happened to you once, didn't it, Graham, at an RSA conference?
Yes, you handed them the key, they plugged it in, or you— they gave you the key, you plugged it into your computer, your Mac, and bloop, Windows virus. Thanks very much for you.
Yeah, so you wonder how many other presenters— I was speaking at an event last week and I got an email saying, thank you, you're one of 700 speakers.
So if they were passing a USB key around, there was a lot that could have gone wrong. I use my own computer, so that didn't come about.
But generally, when I get the key back from somebody, I'll then put it in and immediately wipe it, won't use any of the files off it, and then just put it back in my bag blank.
That way, if someone does run off with it, or someone says, hey, can I borrow a USB stick, I'll just give them that one.
If it's old, relatively low capacity, to be honest, I gave it to them if they never give it back to me, I'm not going to burst into tears. So that's what I do with my old USB keys.
I keep them around as kind of semi-expendables.
I'll tell you the way I make money, Graham, is that when I do presentations, I don't use a funny voice when I'm talking about the people who've very kindly invited me to present.
I found that pays for several USB keys a decade. Just saying.
This is the year Frankie Goes to Hollywood told the world to relax.
Cyndi Lauper told them that girls just wanted to have fun, and Wham!'s George Michael just wanted to be woken up before he go-go'd.
Now in the late '80s, this Cult of the Dead Cow, also known as CDC, basically organized and maintained a loose collective of affiliated bulletin board systems, or BBSs, across the US and Canada.
And these bulletin boards are kind of the geeky Reddit or Facebook of its day, an online discussion forum that allowed people to connect electronically. Did you guys use BBSs?
Anyway, no, I didn't do anything naughty. I did used to log into bulletin boards and things back in.
So instead of connecting directly to the modem, you actually— yes, the modem actually played the noises and your phone listened to the noise and played it down the line.
They'd say, get off the phone, you know.
They also claim to have invented the term hacktivism, which is describing human rights-driven security work, or security quote unquote.
So this is all in the '80s now, and this is all going to become very relevant in a second.
Now, from the '90s onwards, the CDC started releasing tools, right, both for hackers and system administrators and for the general public.
It had a button where you could remotely eject the CD drive or you could swap the mouse buttons around. Why would you need to do that?
But it was this attempt to create tools that were, you know, I suppose a firearm or something.
It's kind of— it's just technology and it's kind of morally neutral on its own, and it's what you use it for.
To be honest, I always found the Cult of the Dead Cow— always, one of the guys is called Sadistic, wasn't he? Yes, he's the guy who did BackOrifice.
I always found it rather childish rather than criminal. It was just guys who had maybe needed to grow up a bit.
Just last week on Friday, Reuters issued a rather explosive article saying that popular Texas Democrat and 2020 presidential candidate Beto O'Rourke was once a member of the CDC.
He's kind of coming clean about his membership to the CDC way back then.
Now, a few things he reportedly admitted to doing whilst in the CDC, or Cult of the Dead Cow— CDC sounds like some Center of Disease Control.
And savvy teens, like you guys were talking about, like savvy teens learn techniques to get around the modem charges, right?
Such as phone company credit card numbers, getting those and having the 5-digit calling codes to place free calls. Because it cost a bomb, didn't it?
Like, you know, these calls would get hundreds of dollars at the end. Did you guys, you're old fogies, did you guys get any horrendous modem bills?
But I remember, I think in the United States, there were reports that people could get local dial-up access very, very cheap, or even maybe free on some plans.
That certainly didn't happen here in the UK. You paid through the nose to get on the internet.
Yeah. Right.
And in many cases, they just mail copy disks to one another with like collections of software on, and then the other guy would upload it to avoid the toll charges.
But if you decided, if you were sitting in the UK and you decided, I want to dial up this US bulletin board because that's where all the cool stuff is and it hasn't got over the pond yet, then you had little choice but to dial up at, what would you get, 300 bits per second at international rates.
Yeah, it could add up pretty quickly.
And he also admits to scouring the BBSs for pirated games so he could play them for free, he and his friends in the group. Now, he quit the Cult of the Dead Cow at age 18.
This was the year he enrolled into Columbia University, 1991. And as you alluded to, Duck, the '80s seemed really to be more about e-zines.
And yeah, Beto was quoted in the Reuters article as saying "There's just this profound value in being able to be a part of the system and look at it critically and have fun while you're doing it.
I think The Cult of the Dead Cow is a great example of that," unquote.
Now, it's an interesting thing to say, don't you think, for someone who's, you know, who's a presidential candidate? It's like he's trying to appeal to, like, Mr.
Robot lovers out there. Or does he just want all of his skeletons out of the closet?
Yeah, actually, maybe he's got better credentials than maybe someone else who's been accused of it.
That's what worries me, is that I think he's— it sounds like he's got this idea that it's all like it was in the 1980s with modems going— Graham did a— so I think he'd say, yeah, we've moved on and I've moved on and I think I've got bigger things to worry about now.
That's what I'd want to hear him say.
He said, it was something I was part of as a teenager, referring to the Cult of the Dead Cow, not anything I am proud of today. So that's exactly what you want to hear.
He was just a bit late at saying that.
This journalist has been working on this for some time and hasn't brought it up until now. Now, the book is scheduled to be published in June. He's made a lot of cash.
And you're right, it's a bit interesting that he's waited and whether that was the ethical thing to do.
Well, good for them, I think. You know, so no one was prepared to talk. And so he kind of did a deal and said, look, after the election, Will you let me interview you about it?
I can't really blame you for it. You know, if the journo went too early, then he'd burn his book.
And but now maybe he figured, oh golly, like if someone scoops me to this news before my book comes out in June, I'll undermine myself. So I have to pick the right time.
I guess he's allowed to do that, isn't he?
He's putting out a book now, and he's gonna, you know, he's facing prison time, which is really, you know, it's crazy the whole way people are using books.
Because it seems to me the typical politician would have done much worse things during their teenage years, like get dressed up in a KKK outfit or blackface themselves up, or who knows what.
And yes, so he may know more about computing than the typical politician, which may be no bad thing.
So I don't think Beto O'Rourke is like the new Julian Assange either, right? Can you imagine him running for president?
Yes, by constitutional affirmation or something. Just like Schwarzenegger. Yeah, exactly the same. Australia. They're easily mixed up.
It'll tell you what threat intelligence is and what it isn't, and you'll learn how other firms are applying threat intelligence inside their organizations.
Grab it now for free at smashingsecurity.com/intelligence. And welcome back.
Can you join us at our favorite part of the show, the part of the show that we like to call Pick of the Week. Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security-related necessarily.
And this documentary is about people who believe that the Earth, which we're all living on, is flat. Not all of us.
The internet has put these people in touch with each other, and they are preparing during the course of the documentary for their first ever Flat Earth International Conference.
So there's a great big wall of ice where you can't get past any further, and then there's this sort of hemispherical dome above us, and so things like the sun and the moon and the stars are sort of projected onto the dome.
For what reason, we know not.
I mean, does the Earth have to be flat like a disc and round with Antarctica at their edge, or could it just be maybe like a kind of flattish, bulgy pancake that's a bit thicker in the middle and you kind of— like, there is an underside which is, say, where Australia is, and you know, you— so there isn't— it doesn't have to be an edge, does there?
But it could be quite flat.
There's no sort of— I mean, Australia is there, but obviously the map of the world is slightly different than what we may be familiar with.
But it will surprise you to hear that there are counter theories and there are schisms inside the flat Earth community, and some of them do not like the other flat earthers.
Now, one of the stars of this documentary is a woman who runs a YouTube channel.
Her name is Patricia Steere, and she has been accused by some of the other flat earthers of being a CIA operative who is giving what they believe not to be the true flat earth message.
So these are— Oh, so clever. So clever. It's genius, isn't it? It was there all along. That's a complete genius.
Now, it's easy when you watch the trailer to think this is just a documentary taking the mickey out of these people and their beliefs.
And the trailer doesn't really give an accurate view. There is some comedy in it. In the documentary, and you do chuckle at some of these things.
What I liked about the documentary is it does make something of a compelling case for empathy and dialogue with people who hold vastly different views from yourself.
And rather than ridiculing these people, it does discuss the importance of actually communicating with them.
Maybe it's more like a very, very, very long rugby ball or something. I don't know.
But I suppose that you could think that the Earth is flat and still travel around it and, you know, contribute decently.
And you could still think that it's a bad idea to pollute the Earth and waste its resources, be cruel to people and shoot animals for no reason, all that stuff.
So, you know, maybe it's not all bad.
And apparently the claim is that in the '50s, the Americans were putting up lots of sort of nuclear weapons into the atmosphere trying to burst through the dome, and they didn't succeed.
And yeah, all of that apparently— It's faked. They do some scientific tests to try and prove that it is flat during the course of the documentary, and they fail.
But the justification which they give for it, because they won't accept that their scientific tests are failing, and they say, well, we have to do more tests because something must have gone wrong, because they're so, so tied.
After all, the world is becoming more polarised, isn't it?
You are probably the person who has the least amount of empathy of anyone in my circle of friends. Do you not agree with that? So you've had a revelation.
This is an epiphany moment for you.
Did I hear you mention the word empathy earlier? Does empathy mean when you take the piss out of somebody, as long as you giggle a little bit, that makes it okay?
Last Friday was 3/14 in American notation because they got this weird way of doing dates where they go month, day, year, so that it's completely illogical and it suits very badly.
Yeah, it's a bad way of doing it, but I can live with it.
And so there's a chance for a lot of fun coming out in that. As Graham said, well, what if it was 22/7, because 22 over 7 is kind of approximately pi.
Unfortunately, some people think it is pi, and of course that's a problem. You can never— it's one of those things where no matter how hard you can try, you can never get there.
But a Googler apparently used Google's cloud to compute pi to the most decimal digits ever, and they delayed their announcement and their verification until Pi Day, and they computed 10 times pi times 1 trillion digits.
Wow. So 31 trillion, 400 billion digits of pi, for no reason other than they could.
It's an occasional series I do where we try and get people to see some, you know, take something that's apparently quite lighthearted but see the serious side in it.
The message that you can take out of this is that the thing with pi is no matter how hard you try, you'll never actually compute it because it's what's called an irrational number.
It never— you can't create a fraction that uniquely determines it, and you don't need to because you can perform mathematical operations by just calling it pi and working with it.
And so if you are a computer programmer, be very, very careful about taking things which are inherently approximations, like floating-point numbers that represent a value, and then presenting them to the world as though they were exact results, because therein lies inaccuracy and crazy answers.
All right. It's a very good point. Very serious.
And someone recently asked me to draw a box, like a cube thing, and I did, and it was horrific.
So I scoured the web and I found this— about 10 seconds— this website called drawabox.com. And DrawABox provides some great free tutorials on the basics of drawing.
I found this guy's approach to videos and tutorials really refreshing.
There's no real ad or sales pitch, you know, basically you never see him, you just see the paper and you see the lessons.
And after following a few lessons, I can draw a pretty darn good box. One of the exercises now that I'm facing is trying to draw 250 boxes. That's a lot of boxes. I've done about 50.
I'm not sure I'll ever finish, but it doesn't matter because now I can draw a pretty darn good box.
It's just a good way, you know, there's people that go out there and they buy these little coloring books, meditative coloring books. Don't do that.
Just go to Draw a Box and learn an actual skill. You can draw already, she says empathetically.
So how should people follow you online? What's the best way to do that? The best way is Twitter @duckblog. Fantastic. And you can follow us on Twitter @SmashingSecurity, no G.
Twitter won't allow us have a G. And you can continue the discussion with us about the show on Reddit. Quickest way to find us up there is to go to smashingsecurity.com/reddit.
If you like what you hear and you want to help us grow, leave us a review. It really, really helps.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Paul Ducklin – @duckblog
Show notes:
- 'It's like Uber, but for weed': Meet the man who revolutionized Israel's pot trade — Haaretz.
- Israel Police arrest top members of Telegrass online drug ring — Haaretz.
- Sources: Telegrass head cooperating with police — YNet News.
- You left WHAT on that USB drive?! — Naked Security.
- Cult of the Dead Cow — Wikipedia.
- Back Orifice — Wikipedia.
- Beto O’Rourke’s secret membership in America’s oldest hacking group — Reuters.
- Beto O’Rourke acknowledges involvement with hacking group as teen — The Texas Tribune.
- Behind the Curve.
- Behind the Curve – Official Release Trailer — YouTube.
- Serious Security: What we can all learn from PiDay — Naked Security.
- Drawabox — A free, exercise based approach to learning the fundamentals of drawing.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
For anyone who is baffled by threat intelligence, and the benefits that it can bring to your company, this is the book for you.
“The Threat Intelligence Handbook” is an easy-to-read guide will help you understand why threat intelligence is an essential part of every organisation’s defence against the latest cyber attacks.
Download it for free at smashingsecurity.com/intelligence
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.

