
A hospital gets hacked because of an ex-employee’s grudge, robocalls are on the rise, and we share a scary story about the future of facial recognition.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Michael Hucks.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
There's a lot of similar looking dogs out there.
Hello, hello, and welcome to Smashing Security episode 162. My name's Graham Cluley.
I imagine her parents were fans of tennis or something. So you have love and 40.
But anyway, so— But the actress, I'm sure she's a lovely actress, but I find her extremely irritating.
Now Graham dives into the murky case of a hospital hacker. Mikey waxes lyrical about his absolute love for robocalls.
And I'm sharing a crazy scary story about a secret facial recognition tool. All this and oh so much more coming up on this episode of Smashing Security.
His name is Daniel Mooney, and he was an administrator at a hospital in Great Britain, and he lost his job three years ago because he'd been caught remotely accessing the internal network of the heart and lung department where he worked of the Royal Stoke Hospital from his home computer.
And he was accessing that network, of course, without authorization. Whoa. Yeah, so naughty.
Well, the hospital came down on him hard, and he lost his job, and he was also cautioned by the police.
And as part of his caution, he agreed that he would not access any of the hospital's IT systems in future, and he would not even enter the hospital unless he was unwell or visiting a patient.
Anyway, he's not allowed to come to the hospital unless he's got a broken leg or a splinter or something like that, or has a friend who has, and not have any contact with hospital staff unless asked to by the HR department.
So I guess HR were thinking, well, if he has any knowledge or if he knows any passwords or if—
And certainly if I was in his shoes, maybe I would've used that kind of defense.
And some organizations have got problems with that, quite understandably, and others are much more lax about it.
And wouldn't it also support the Hospital Trust more if you were to go and frequent those stores rather than the high street?
And that appeal was unsuccessful.
And the mistake he then made was to allow that grievance to grow inside him and take over all of his feelings.
And in December 2017, months after Mooney had been dismissed, the hospital's head of cybersecurity noticed something a little bit strange.
Who could that be?
Remember, he got dismissed, right?
And he had all these internal documents, documents which hadn't been shared with him about what was going to happen with Mooney and what the process was and the communications between the managers.
He'd managed to get hold of that.
And furthermore, he'd also accessed 600 staff-related documents, 150 management documents, and almost 9,000 medical images of heart scans, sort of cardiac-related stuff from his department.
Maybe he was thinking if he just comes in and grabs as much as he can possibly grab, and just to get off the system quickly, and then he can scan through it in his own private home rather than spending hours and hours and hours on the system.
One theory I would have would be maybe he's grabbing all this data to go back to them and say, "Aha, look, you've got security issues. Aren't I a hero?
Maybe you should reinstate me in your IT department because I can fix these kind of problems." I mean, foolhardy as that was, particularly as he'd already had a police caution, maybe that was incentive to do it.
Do you think he should have been jailed? Bearing in mind he's been warned before.
Kill them. Kill the other business. That's what they do in the States, isn't it?
But it's not easy if you're an organization as sprawling as the National Health Service, which have got legacy systems and they hardly have staff lolling around, you know, drinking martinis.
You know, it's not like they haven't got enough work to do already. So make it part of your HR offboarding process.
Just like when people come into your company, you set them up with an account and give them a computer, there needs to be some sort of tick list of this person's leaving.
But it's not always easy, particularly when people are getting fired.
From the personnel point of view, you have to speak to an IT guy to remove someone else's passwords, and you don't want them blabbing if they haven't quite left the building yet.
Is this is the NHS, and the NHS are known, certainly in my anecdotal experience and many others, but they have a reputation for having a pretty solid checklist so that they don't leave scissors inside you, or they don't cut off the wrong leg, right?
There's a lot of procedures and papers that need to be signed and agreed with the patient at every single stage to make sure those things don't happen.
Now sure, they might happen occasionally, but it's rare. So surely that kind of system, wouldn't that be good to do for their IT system?
I don't know why they can't port that over to make sure, how could they sit there and go, "Oh wow, we have an admin guy here that we have no idea has access to the systems.
How long's he been there?" How does that happen?
It's probably not nearly as much as how many times they have to make sure they're not leaving scissors inside of someone, so.
But you should have layers of protection such as checking whether it's an external IP address which is accessing your internal system and maybe blocking those or going in and restricting.
He's obviously an expert in grudges, and he could give me some pointers and how I can channel this negative energy I feel.
And I would say I get a fair amount.
So is it a robot which is doing the calling and then you get to speak to a human?
Or is it a recorded voice saying, "Hello, Michael, I wonder if you—" Well, what is the actual, what happens?
I mean, I've had ones before that are just, a straight-up robot voice that asked me to either press 1 to be connected with someone or press 2 to be removed from the call list.
Of course, that is after a full minute of this thing going on and on about the new law that it wants to tell me about or whatever it is. And then, I tried for a while.
I would actually wait for the thing to finish its message and then I would press 2 to be removed from the thing.
And then, sometimes not even an hour later, I get a call from the exact same number with the exact same message, and it's just relentless.
So you're a live prize lion suddenly.
Yes, and I've heard— I mean, I don't know how much of this is just speculation, but I've heard that even just answering the phone call at all puts you on some kind of list that says, oh, even if they're not responding the way we want them to, this person will answer the call.
And so you could even get called more. There was a thing in the past where if you wanted to opt out of real telemarketing calls, yeah, you could be added to the do not call list.
And there was a law here in the United States that you had to be added to this list. The thing is, with these robocalls, I mean, most of these are scams.
I don't think they really care about the law, clearly. No. And so that's the problem now, is that it's not only gotten worse, it's gotten worse a lot.
So according to the 2018 report by global communications platform First Orion, spam phone calls accounted for 29.2% of all mobile phone calls in the US in 2018. Wow.
And it was only 3.7% in 2017. That's astonishing.
I mean, that's really, I mean, does it not get to the point where you just think, well, I don't actually need a phone number because I can communicate with all of my pals via instant messaging services, whichever one you choose to use.
And you can even call them that way as well. I wonder if it's possible to live without a phone number.
You're probably getting phone calls fairly regularly from numbers that you don't recognize.
And these are new people who've gotten your number somehow and you want to be able to answer the phone.
And this is the problem now, is that it's saying that people are just not answering phone calls anymore that they don't recognize, which I totally understand.
But, you know, what if it is the hospital calling to say that one of your family members is in— I guess they'll leave a message. I don't know. Okay.
Just to add to the kind of insanity of the statistics of this, we do have some statistics from 2019.
And according to YouMail, which is a tracking company, it said about 5 billion robocalls were placed in November of 2019 alone.
Which is more than 160 million phone calls a day, averaging 15.3 calls per American. Jeez.
So I suddenly— when I read this, I started feeling a little bit better about my 6 or 7 robocalls a day. I was like, okay, maybe that's not so bad.
I mean, somebody in America is getting more than 15 phone calls a day. I can't even imagine. It makes your phone unusable.
I feel like it'd just be a bad move because everyone is so annoyed with the robocalls that if somebody— even if there was some political candidate that I liked, if they started blowing my phone up every day being like, don't forget to vote for me, I'd be like, okay, this guy is definitely not getting my vote through this ad.
But there is this thing, isn't there, where someone could do what's called a Joe job, where they start a campaign, a robocall campaign promoting the opponent.
I was just gonna say that.
I think I should get paid for every single one of the calls that I've had to put up with, but maybe there's more time for that later.
But the thing I'm wondering about with that is if they're spoofing numbers and they're using this voice over IP, we don't really know where these things are coming from or who's doing it.
Is this going to be that effective to try and charge the people? Are they charging the companies or are they charging the actual phone service providers?
I'm not sure which one it is.
If I don't recognize the number, I don't pick up. And I wait for the—
Now, I don't know if you guys saw in the press, but the big boys, Google and Microsoft, can't seem to agree on how to approach this issue of facial recognition.
You've got Google CEO Sundar Pichai. He's expressed support for Europe's proposal to temporarily ban facial recognition.
But Microsoft's top lawyer, Brad Smith, has cautioned against using a meat cleaver for what should be a surgical operation. So he wants a more soft-touch approach. Okay.
So while these two big dudes are duking it out in their public forum here, a little seemingly insignificant mouse entered the space and created an ethical quagmire that takes total advantage of the lack of regulation in this space.
Okay, sounds interesting. All right, go on. It was the New York Times that did this big exposé on this. And it's kind of stuff that makes my teeth rattle a bit.
And I want to know if it makes yours rattle or if you think, Carole, calm down. I don't even like you. I'm so irritated by your story. Okay, so the story starts with a Mr.
Juan Thom Vat. That's his name. Juan Thom Vat. Juan Thom Vat. Yeah. And he's an Australian-born techie and one-time model. Right. So a little bit of a looker.
Now, during his rise to power, he created an obscure game and he also created a really useful app that lets people put Donald Trump's piss yellow wig onto their pics.
That was one of his creations.
Especially if it was made out of piss, you're suggesting.
Okay. And these two hatched a plan to create a facial recognition tool, which they called Clearview AI.
One helps them design a program that automatically collects images of people's faces from across the internet, such as employment sites like LinkedIn, news sites, education sites, social networks including Facebook, YouTube, Twitter, Instagram, and Venmo.
Effectively, these guys were scraping the web and building a massive ginormous database under Clearview AI's control.
Now they also hired another engineer and this guy was hired to perfect the facial recognition algorithm. They describe this system now as quote, state-of-the-art neural net.
And basically, it converts all the images into mathematical formulas and vectors based on the facial geometry. So how small a person's eyes are, Graham.
So basically, everyone with tiny eyes, Graham, would be put into a little neighborhood, or everyone with big feet, Carole, would be put in their own neighborhood.
So all the pictures that have similar vectors and similar algorithms matching along with the links to the sites from where these images came.
I remember working at a place once where I had a lookalike and the slightly disturbing thing was that my lookalike— Is it the Polish guy? No, not the Polish guy.
That's another— No, the lookalike I'm thinking of was actually a woman. A woman who looked like me. And it was rather peculiar.
So by the end of 2017, okay, year on, the company had what the New York Times describes as a formidable facial recognition tool, which they called SmartChecker.
Now this database is, get this, 3 billion images strong. It's right about 75% of the time, it claims.
And the one cool thing about it apparently is that the algorithm doesn't require photos of people looking directly at the camera.
You could be looking down or covering part of your face and still it can all work.
And people have given their data so willingly. So I'm not surprised about that at all, I'm afraid.
I mean, obviously I can see a million ways that this could be useful, but it's not quite scary until I know why this is happening.
And I feel like it's going to be scary when I figure out the answer.
Can you guess who it might have been?
They want access to that kind of algorithm and that kind of database so that they can identify from CCTV who people are.
So they solved a case within 20 minutes of using the app. So the case was two men had gotten into a fight in a park and one shot the other in the stomach.
A bystander recorded the crime on a phone, so the police had a still of the gunman's face, and they ran that still through the Clearview app. They immediately got a match.
The man appeared in a video that someone had posted on social media, and his name was included in a caption on the video.
He did not have a driver's license and hadn't been arrested as an adult, so he wasn't in any government databases.
Right, this is what the Indiana State Police Captain said at the time. And then the man was arrested and charged. So there's numerous stories, right?
And Clearview is actively marketing this to police departments. And they are also spreading the word amongst themselves saying, "Guys, you should get this.
It's incredible." 600 law enforcement agencies have apparently started using this app in the past year.
The FBI, the Department of Homeland Security, and the Canadian law enforcement authorities are all trying it out, according to New York Times.
You may have given your permission to the social network, but they, the social network hasn't got a deal with this facial recognition company, do they?
They have scraped all these images onto their own databases and put them into a nice, I'm sure, easy-to-use UI that allows you to toggle all the things you want, within this area, da da da da da.
So the New York Times went and asked people, right? And Facebook was, well, we're going to look into this because we, you know, it's a big no-no to image scrape.
And also they may get their knickers in a twist about this because they're not getting any kickback on this. They're not getting any of the traffic or any of the money.
So they may not like this, particularly when they hear the word 3 billion images. So the other problem, Graham, you also alluded to earlier was the fact of doppelgangers.
The bigger the database, the more likely you are going to find people with very similar, if not virtually identical, facial symmetry and facial characteristics.
And it was all a case of which Leonard Nimoy, which Mr. Spock had committed the murder. My wife, my wife on the other end of the sofa. She says this woman is Carole.
She loves marmalade. My wife loves marmalade.
Right, so now, and that was done for privacy. It's if you've done something naughty, your face goes into this database.
And now everyone's face is in that database, whether you've done it just because you've stepped outside or someone's taken a picture of you, posted your own picture online.
You know, when you come back to that argument between Google and Microsoft, I do think regulation is needed. It's Wild West out there, it's the Wild West.
It is a worry because, I mean, if George Clooney, for instance, was to rob a bank, I don't want the police knocking on my door thinking that it's me who did it because of some error in face— and also not just the facial recognition, but also the name similarity.
Our journo— so the journo of the New York Times, he started looking into this way back in November, right, to do some digging.
And listen to his words here, quote: "When I began looking into the company in November, its website was a bare page showing a non-existent Manhattan address as its place of business." And he goes on, "For a month, people affiliated with the company would not return my emails or phone calls.
While the company was dodging me, it was also monitoring me. At my request, a number of police officers had run my photo through the Clearview app.
They soon received phone calls from Clearview AI reps asking if they were talking to the media, a sign that Clearview has the ability, and in this case, the appetite to monitor whom law enforcement is searching for." Holy cow.
So that— okay, and then remember, to use this app, how you use this app, right, how the cops are using this, is by feeding the monster.
They are putting in new pictures of new suspects all the time. Regulation time, I say. Can anyone use this? Can I use it? Very good question.
At the moment, they see this becoming ubiquitous in no time.
Yeah, the final words of the New York Times article: "Police officers and Clearview's investors predict that the app will eventually be available to the public." What could go wrong, guys?
Well, nothing is going to go wrong with that.
It's time to hit the 3D printers and start making a number of realistic-looking rubber masks so that when you leave the house, you have a different face each time.
Think cosplay, but every day.
Its solutions give organizations the ability to use and create a forensic map of criminal activity, assess threats, and prevent future attacks. Nice.
Find out more about their cool products at DomainTools.com.
Now, they've got something very cool that I think you're going to like, a capture the flag competition, especially for Smashing Security listeners.
You can win a $100 Amazon gift card. If you want to join in all the fun, visit domaintools.com/smashing to enter the competition. And may the best geeky listener win.
And when it comes to cybersecurity, that is super important. So listeners, listen up.
If you do not have a password manager in your organization, please check out LastPass Enterprise.
They offer centralized admin oversight and control, shared access and automated user management. All this stuff makes your life easier.
Plus, you can even use LastPass single sign-on to protect all your cloud apps and give seamless access to employees. Check it out at lastpass.com/smashing.
Let me try that again, folks. Check it out at lastpass.com/smashing.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security related necessarily.
The website is called eunoia.world, and eunoia is a Greek word. It's spelt E-U-N-O-I-A dot world. I'll put a link in the show notes.
So if you've always thought, oh, you know, I love, you know, if you like a little bit of schadenfreude and you want to drop that into your conversation, or things where you thought, wouldn't it be wonderful if that word did exist, but it doesn't?
Well, maybe it does exist in Finnish or some other language. I'm going to have a little quiz, right? I am going to tell you 3 words and give you options as to what those words mean.
All right. We'll have a little bit of fun.
Does that mean, is it a jungle of traffic signs? Is it flirtatious talk that leads nowhere? Or is it an ungrudging and overt expressed pride and happiness at other people's success?
Sphallolalia.
And I presume it doesn't exist in other languages. So, yeah, you can check that. Okay, so another one. Next one. Next one. Solkat. Solkat.
Is solkat the glimmer that reflects the sunshine off a wristwatch? Is it the mark left on the table by a cold glass? Or is solkat a person of integrity and honour?
I'll tell you it's a Swedish word, if that helps.
I'm going to say that that is the glimmer off of a wristwatch, because it seems like there'd be words for those other things. So that's my guess.
And the final one, the final one is kusuku— I can't do this. Kusukusu. Okay, kusukusu. Oh, that's beautiful. Kusukusu.
Is it a reason for being, the thing that gets you up in the morning, or is it the suppressed giggling and tittering of a group of women?
Although I don't remember the last time I was talking about the suppressed giggles of a group of women. But if I ever do, it's kusukusu from now on.
Where I uploaded a little video of my cute little doggy.
Her and I were taking a nap on the couch and I had this— actually, I had this video on my phone for about a month before I just decided to post it onto Reddit.
And I woke up the next morning and it had exploded with gajillions of upvotes. And all of a sudden— What's a gajillion? It was within 5 hours, it had 80,000 upvotes. And 80,000.
And actually a few hours later it was the number one highest upvoted post on Reddit within across every subreddit. It was the number one highest upvoted post.
And every time you show the dog's head, the dog's tail wags. That's very cute. Yeah. Every time it sees you, it wags its tail.
Well, it ended up, I mean, right now I think it was at like 130-something thousand. But that had happened within like 5 hours.
And so the interesting thing that happened because of this is that I had a few agencies that started reaching out to me that wanted to buy the license, the rights to license the video.
So I guess there's people who are just looking at this all the time and, you know, these different subreddits and what's getting uploaded and what's getting upvoted, I guess, more importantly.
And so within a few things, I didn't really know how this worked. I had obviously never had any experience with this.
And I kind of jokingly to one person, they asked if they could use it and they said they would give me credit. And I was like, well, what's your offer? Kind of jokingly.
And then all of a sudden all these offers started rolling in. I was like, oh wait, there's actual— there could be money in this.
So over the next 3 or 4 days, I kind of went back and forth with a few companies and then I ended up selling the rights to this video. Dead serious.
So now over time I get— I don't know if I'm allowed to share the exact thing, but I will get a percentage of whatever revenue this video makes.
I don't even know how it makes revenue exactly, but I'm waiting all the time for my check to come in the mail.
And then you take a cute little video of 20 seconds of you and your dog hanging out and her being cute. And that is going to be your door entry into fame.
I've grueled over putting hours and hours into editing something. This is something I flippantly recorded.
It is probably gonna be the most famous video that I'll ever make in my life. And it's a little—
There's a lot of similar looking dogs out there.
I'm going to let her pick out some toys, maybe get her nails done, you know, give her a day at the spa. So we'll see. It's got to make money first though.
So this book basically explains all the steps they went through on exposing Harvey Weinstein after decades of being basically a misogynistic controlling pig.
And I followed that whole story, so they covered it in the paper, and they covered it on their podcast and I was listening to everything.
And so when the book came out, I snapped it up and hoovered it down.
And it's really interesting if you are the kind of person that likes to know more about how an investigative journalist team would chase such a story, especially when none of the victims want to talk about it or want to come forward.
Right, you know, he's got a lot of money and a lot of clout.
And the thing was, when I was reading it, I'm reading this and I'm thinking, okay, if this had happened to me, if he had been, you know, one of those stains in my life and these two journalists had called me up and said, look, we want to share your story.
Would I, you know, because look what's going on, his criminal cases are basically teetering at best at the moment. Because he's got a pretty powerful team.
Did you see him walking in with his walker?
Based on reading this book and, you know, following the story, I have just become a New York Times subscriber because I've been basically gulping down loads of their content.
So I'm adding it to my official news subscription. So there you go, so my pick of the week this week is take a read of She Said.
It's really fascinating about how they were able to nail down all the facts and got the ball rolling on the MeToo front.
Mike, I'm sure lots of our listeners would love to follow you online or find out more about what you're up to. What's the best way for chaps to do that?
But yeah, start there, and then maybe some kind of facial recognition with the dog. You can— you'll find me, you'll find me. It's 2020, you'll figure it out.
Go and find us on the Smashing Security subreddit. And don't forget to subscribe to Smashing Security in your favorite podcast app, such as Castbox.
Go and find us up there and you'll never miss another episode.
Also, a big shout out to this week's Smashing Security sponsors Domain Tools and LastPass. Their support helps us give you this show for free.
Check out smashingsecurity.com for past episodes, sponsorship details, and info on how to get in touch with us.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Michael Hucks
Show notes:
- YOU Season 2 Trailer — YouTube.
- Hospital administrator sacked for using NHS computer to download over 10,000 records is spared jail — Daily Mail.
- Robocalls: Americans got 58.5 billion in 2019, up 22% from last year — USA Today.
- Microsoft and Google just can't agree on proposed ban on facial recognition — ZDNet.
- Clearview – Technology to help solve the hardest crimes.
- The Secretive Company That Might End Privacy as We Know It — New York Times.
- Clearview FAQ (PDF).
- Episode review: Columbo Double Shock — Graham got it wrong. It was Martin Landau, not Leonard Nimoy, who played the twins. And they weren’t surgeons (but Nimoy did play an evil surgeon in a different Columbo episode that season)
- Eunoia: Words that Don't Translate.
- Dog wagging her tail every time she sees her owner — YouTube.
- She Said: Breaking the Sexual Harassment Story That Helped Ignite a Movement — Amazon.com.
- Harvey Weinstein Paid Off Sexual Harassment Accusers for Decades — New York Times.
- ‘She Said’ Recounts How Two Times Reporters Broke the Harvey Weinstein Story — New York Times.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
LastPass Enterprise makes password security effortless for your organization.
LastPass Enterprise simplifies password management for companies of every size, with the right tools to secure your business with centralized control of employee passwords and apps.
But, LastPass isn’t just for enterprises, it’s an equally great solution for business teams, families and single users.
Go to lastpass.com/smashing to see why LastPass is the trusted enterprise password manager of over 33 thousand businesses.
DomainTools helps security analysts turn threat data into threat intelligence. Its solutions give organizations the ability to use and create a forensic map of criminal activity, assess threats and prevent future attacks.
Learn more about their products at domaintools.com, or visit domaintools.com/smashing to enter their Capture The Flag competition and be in with a chance to win a $100 gift card.
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Castbox, Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.

