
Students learn a valuable lesson when it comes to AI detecting guns on campus, SIM swappers are surprisingly stupid, and romance scammers get scammed by someone (or some thing?) calling themselves Chiquita Banana.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Mark Stockley.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security episode 288. My name is Graham Cluley.
It's their support that helps us give you this show for free. Now, coming up on today's show, Graham, what do you got?
There I was in sixth form.
I was studying with a whole bunch of kids, and one day, two of my mates, Howie and Johnny, came into school, and they told us what had happened to them the previous day.
Now, Howie had a car, which made him quite unusual in the sixth form, but he had a car, and he'd been going around town with Johnny with their water pistols.
They were having fun, basically. They were driving around with their water pistols, sort of shooting at people from the car. You know, she's pissing about.
These are the days when you had to pop into banks if you wanted to get money out.
And they parked on a double yellow line and they raced into the bank, got their money out from the person behind the till, and then leapt back into the car and zoomed off.
And probably about 20 minutes later, all these police cars arrived and surrounded them.
And, you know, and the police showed up who weren't happy at all because it appeared someone had seen them running into the bank with these water pistols, had raised an alarm that there were some shenanigans going on.
And told the police. And the police had obviously come round to the house, or followed them, or whatever. Anyway, they'd been caught. But it's all a false alarm.
They hadn't actually robbed the bank. They were just larking around.
I don't know exactly how it happened, but this thing happened. And they came in, they told me the next day at school, and I said, this is brilliant.
I said, we should do something about this. We should call up a newspaper.
And in fact, they had water pistols. And The Sun loved it. And The Sun said, this is brilliant.
Can we send down a photographer to photograph Howie and Johnny sat on the bonnet of their car with their water pistols? Because this would make a nice little story for us.
And I said, sure, how much you gonna pay us? And I think they said, we'll give you £100 or something. I thought, okay, I'll share that between me, Harry, and Johnny.
But the problem was, the problem was that Johnny was in school that day. So I'd nipped off to someone else's house to plan this and work with the reporter. And Johnny was in school.
So we had to ring up the school, pretend to be Johnny's dad, saying that Johnny had to come home. And then we had to drive in to pick him up.
He didn't know, 'cause we didn't have mobile phones then. We had to drive in, pick him up, and say, "Here's the deal.
You're going to be in the newspaper, but they need you there, something from the guns." So we went in and picked him up and all the rest of it. So that's what I did at school.
Some have bought systems, for instance, which listen for aggressive noises. So they plant microphones into certain rooms. You've heard about this?
But what they found is that this technology doesn't work very well.
So there was, for instance, the case of a drama student who was performing in some sort of horrific play, and she gives an ear-piercing scream like she's been attacked by a ghost.
In the library and nothing happens.
But when a student had a coughing fit in the audience, or if Happy Birthday is sung, then the alarm goes off and they think something suspicious is going on.
ProPublica even tested it with a YouTube clip of, you know, Gilbert Gottfried, the late American comedian. He's got it right down there.
He said, "Is it hot in here or am I crazy?" And if you play that, apparently— "Is it hot in here or am I crazy?" that triggers the alarm. That's something very aggressive.
You also want to stop people coming in with dangerously high temperatures. 'Cause it might mean they have COVID-19 or maybe worse, maybe they're menopausal.
And it sounds brilliant, doesn't it?
And it's also not gonna disrupt the movement of kids coming into school quickly. It's a win-win-win-win-win-win-win. Marvellous.
And Evolv Systems, the CEO keeps on popping up on TV every time there's a school shooting in America. So he's quite busy describing how the technology keeps guns out.
But there's a problem. According— I know that's a shock— according to Motherboard, some school administrators saying the scanners have caused chaos.
At one school which had put the scanners just at one entrance to the school, the school principal described the situation as a clusterfuck.
This chap said, if you have multiple binders in your backpack or a spiral notebook, the sort of thing you might bring to school—
I don't know about other laptops, but apparently Chromebooks are setting off the alarms 60 to 70% of the time as people come in. So it's become absolutely disastrous.
The local police were dispatched to a house fire where the homeowner believed that something had been thrown at their house just before the fire started.
And when the police got there, they found a slate that had been used to break a window and a broken bottle that smelled of a flammable liquid.
So, grounds to believe that, you know, there may be something nefarious going on.
And of course, if there isn't a shooter there, that's incredibly dangerous for everybody concerned.
So these people have been swatted before, but now they've also been the victim of an arson attack.
And then about two weeks later, on January the 2nd, the police in another town were called out when there were shots fired into a house in West Chester, Pennsylvania.
And the police found several shell casings and a discarded pistol magazine outside, and they found bullet holes in a window, and then bullets inside the house embedded in a wall, inside a piano leg, in a piano stool, and in a small table.
And Krebs says that both criminals frequented Telegram channels about SIM swapping.
So SIM swapping is a form of fraud where you steal somebody else's phone number so you can get all their calls and messages. And it's used to defeat two-factor authentication.
The, yeah, so two-factor authentication is normally used to safeguard high-value accounts like, guess what, drum roll, cryptocurrency logins.
Because we can't have a story about crime that doesn't involve cryptocurrency.
Anyway, according to Krebs, and this is terrifying, according to Krebs, there are dozens of teenage or 20-something SIM swap millionaires out there.
And as we all know, when the money and the testosterone outpace the intelligence, stupidity and bullshit follow.
And in this case, that bullshit seems to be manifesting as real-world hits. Now, there's nothing new about the idea of hiring a hitman on the dark web to do your dirty work.
And research, proper academic research, suggests that you can spend up to $120,000 for a really high-end professional hit.
And I can confirm, because I did a bit of research before this episode, I can confirm there are indeed some very scary individuals out there on the dark web.
They are attacking their rival cybercriminals or they're attacking their loved ones in order to intimidate them.
So they've identified who the other cybercriminals are and then have then taken it into the real world.
So what I'm going to do, I'm gonna send a hitman or an arsonist round to his Auntie Ethel to firebomb her house.
Which means that I've identified who Mark is in real life, and I know who his Auntie Ethel is and where she lives.
It's not like you're a regular gangster in that way.
So if they're able to identify each other, why on earth aren't the police able to identify the true identities of these criminals as well?
The criminal mastermind behind this one decided against using the dark web to organize their business.
What they did instead is they used all the pillars of the corporate American establishment, like Google, Apple, and Discord, to coordinate their business.
And it was on Discord that somebody told other Discord users that he was behind the shooting and was willing to carry out firebombings using Molotov cocktails.
And in case that wasn't enough to incriminate himself, the user who the FBI refer to as User 5348, and who's also known as Tongue, or Pat, or Patty, was part of a discussion—
So anyway, Tongue was part of a discussion about a video of the shooting at West Chester, Pennsylvania, in which he disclosed additional details about the shooting, named the target, explained the motive, and then confirmed that he had carried out the shooting when somebody asked him if he'd done it.
Now, that's fine, you say. Nobody else can see what's happening in the Discord channel. It's all secret.
Well, of course, that's not true because Discord can see what's happening in the Discord channel. And they didn't like it.
And the billing address also happens to be the address of record of somebody called Patrick McGovern Allen.
And that identifies Pat as Tung, because Pat's got these emails from Discord that refer to him as Tung.
That's fine, you say, but one or two things that link them aren't proof of anything, okay? We just know that Patrick is Tung and has an address.
Well, anyway, further analysis of Discord chats successfully established that User 5348 and Patrick Allen share the same birthday, because Patrick Allen told people what his birthday was on Discord.
They also established, because he told them, that User 5348 was also an employee at the same Italian restaurant where Patrick Allen worked. That's fine, you say.
That doesn't establish that Allen was the actual shooter, because he could be lying. Well, in another chat, User 5348 tells his phone number.
Now I know what you're thinking — it's a burner phone, right? Well, the other user was thinking that too.
And the other user said, "Is that a burner?" And User 5348 says, "No, that's my main phone." So anyway, wow.
Agent Conway reads this and he subpoenas T-Mobile, which establishes that the phone is owned by Patrick Allen's grandfather, who lives at the same New Jersey address as Allen does.
Okay, that's fine, you say. So we know who Tung is, okay? And we know his phone number, and we know where he lives. That doesn't mean he was actually present at the shooting.
Well, cell tower data provided by T-Mobile puts the mobile phone number volunteered by User 5348 while boasting to another Discord user within 1 mile of the arson attack, which is about 75 miles away from Patrick Allen's home.
Just 17 minutes after the fire is reported.
It also puts the phone number just 2 miles away from the shooting, which is also about 75 miles away from his home, just 5 minutes after that's reported. That's all fine, you say.
He could have been there for perfectly innocent reasons. It's not as if there's actually a video of Allen firing a gun into somebody's window. Now is there? Well—
Maybe that's just too smart for you guys. I don't know.
We know that romance scams were a problem before COVID but it seems the isolation and loneliness that many of us felt during the pandemic may have been some sort of catnip to romance scammers.
All these lonely people online with big fat bank accounts.
I wonder if for some scammers it was just a treasure hunt mentality — as long as I can get the victim to trust me, I can cash in big.
FTC says that in the last 5 years, people have reported a staggering $1.3 billion lost to romance scams. And that's more than any other FTC fraud category.
Okay, so I was reading a few romance scams and this one just caught my eye. I'm going to read the opening paragraphs to a Daily Beast story, okay, on a recent romance scam.
Actually, no, let's play a game. I want you guys to ping whenever you hear something suspicious, okay, in this reading thing. Okay, just go ping. All right.
In May of last year, someone claiming to be a military doctor on a secret mission in North Korea ping contacted Laura Francis on Facebook looking for love and connection.
Francis, a California realtor, thought he was charming. His profile images portrayed a man with a muscular build, beard, tattoos, and hospital scrubs.
So he texted her every morning and throughout the day, usually on Google Hangouts, and called her on the phone just as often. "I fell in love with his voice.
He had just the cutest laugh," recalls Frances. He serenaded her with links to romantic songs on YouTube, like "Hero" from Enrique Iglesias.
So often stories of romance scammers open with a devastating story don't they? But there's another victim of the romance scam, and that's the online dating service itself.
So there's this startup called Filter Off, okay? And this is a video-first dating app. That's what they call themselves. So they launched at the beginning of COVID lockdowns, right?
The startup with just 3 people.
And the platform obviously took off during lockdown because it would host virtual speed dating events, you know, around various topics maybe Harry Potter or Dog Lovers Night, New York City date night, whatever.
Today, the platform is said to have hundreds of thousands of users, and its popularity seems to be growing with humans looking for love.
But the founders discovered that it also attracted a second set of people, humans looking for money, aka romance scammers. So what do you do, right, if you're one of these guys?
Well, they decided to write an algorithm based on dodgy scammer behavior so they could identify someone saying, well, you're up to no good the way you've created this account.
Does this involve AI? Of course it does. Of course it does. So they would identify these dodgy accounts and delete them.
They kept deleting these profiles and every scammer they cut down, another 5 would pop up, Medusa style, right?
So they decided to create a private pool of thousands of bots that were using deep learning GPT-3 to create bots that interact just like real people.
And they tied these interactions with human-like faces to create bot profiles.
And then they threw in the scammer accounts that they had identified into this pool of bots to see what would happen.
If they identified you as a scammer, for example, on their site, they would just throw you into this pool with lots of bots and other scammers to see what would happen.
The scammers had no clue they had been detected. And we received a series of hilarious bot plus scammer conversations. And you two, my friends, are gonna act one out for us.
So, you will see it's called Banana, okay? And Mark, I would like you to be Maurice. The scammer, or the purported scammer. Okay.
And Graham, you're gonna be Bot, and your text is on the right, if you see that. Oh, okay. Okay? So, I leave it to you guys. Please, act one, Banana.
I'm a banana.
No, I can see how romance would flourish after this sort of conversation.
All you reply is Chiquita Banana.
So that might be a way to handle this kind of thing. If ever you feel like, you know, this isn't all right, just start nutballing them, you know?
'Where do you live?' And here's my Gmail address. Wow.
Yeah, no, it's quite fun.
And I have to, you know, hat tip the guerrilla marketing here that has been used for this, for FilterOff, because it's something, you know, guerrilla marketing is dear to my heart.
And I think this is a very clever approach and they're getting lots and lots of coverage. So well done, you guys.
Ashley Madison had all those fembots to try and lure people in, but they didn't think of sort of spinning it to say, oh, we're only trying to catch the scammers rather than trying to get new customers.
Anyone who's listened to Smashing Security over the years will know that we believe that everyone, whether you're a single end user or a business, should use a password manager.
And the password manager we're recommending is Bitwarden.
Millions of users around the world, including many of the world's largest organizations, trust Bitwarden to protect their online information using a transparent, open-source approach to password management.
You can effortlessly manage all your passwords and logins backed by end-to-end 256-bit encryption.
And for the enterprises out there, Bitwarden recently added SCIM support, making it even easier to provision and manage users.
For password security you can trust, get started today with Bitwarden. Learn more at bitwarden.com/smashing.
Take security of your passwords and logins more seriously by visiting bitwarden.com/smashing. And thanks to Bitwarden, they're great folks for supporting the show.
Thanks this week to our sponsor SolCyber, who believe that it shouldn't just be the Fortune 500 that benefit from top-of-the-line cybersecurity.
They make managed security affordable and accessible to all small to medium-sized organizations. Check out SolCyber's foundational coverage services.
They include ransomware assessment and training, advanced email protection, endpoint detection and response, Active Directory abuse prevention and lateral movement detection, and 24/7 security operations center capability.
As a SolCyber Foundational customer, you also get access to expedited cyber insurance coverage and discounts of up to 30% off your premiums.
Mention Smashing Security and you'll get 1 month free for every 12 months you subscribe to SolCyber's foundational coverage services.
Visit smashingsecurity.com/soulcyber to learn more. That's smashingsecurity.com/s-o-l-c-y-b-e-r. And thanks to SolCyber for sponsoring the show.
Kolide sends employees important, timely, and relevant security recommendations for Linux, Mac, and Windows devices right inside Slack.
Kolide is perfect for organizations that care deeply about compliance and security, but don't want to get there by locking down devices to the point where they become unusable.
So instead of frustrating your employees, Kolide educates them about security and device management while directing them to fix important problems.
Sign up today by visiting smashingsecurity.com/kolide. That's smashingsecurity.com/kolide. K-O-L-I-D-E.
Enter your email when prompted, and you will receive a free Kolide goodie bag after your trial activates.
You can try Kolide with all of its features on an unlimited number of devices for free, no credit card required. Try it out at smashingsecurity.com/kolide.
That's smashingsecurity.com/kolide. And thanks to Kolide for supporting the show. And welcome back. Can you join us at our favorite part of the show?
The part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they wish.
It doesn't have to be security related necessarily. Better not be. Well, my Pick of the Week this week is not security related, at least not cybersecurity related.
It was a documentary which I watched, a documentary about an incident which happened in Gladbeck, Germany, and Bremen in August 1988.
I seem to be spending a lot of my time in this podcast back in the late 1980s. Two men robbed a bank. They took two hostages.
And this documentary is all about what happened, because most of this happened on TV. The reporters were in pursuit of this bus. They were injecting themselves into negotiations.
The police, quite frankly, seemed to have lost control and weren't really doing anything. And the media were just sort of chatting to the hostage takers.
They were doing live TV interviews. It is weird. For 3 days, the eyes and ears of all of Germany were glued to TV, live radio, newspapers, watching this.
And I thought, well, this makes for a rather interesting documentary. I will share this with our listeners as well. So I watched it on Netflix.
Now, I have to warn you about this documentary, is that if you go onto Netflix, you will get the most terrible American dubbing on the documentary.
It makes it completely unwatchable.
So what you need to do is not just put on subtitles, obviously, but you also need to change the language to the original German with English subtitles.
You do not want the American dubbing at all because it makes the whole documentary pointless.
But if you're prepared to read the subtitles and listen to it in German, it's a great documentary and fascinating thing which happened. Not necessarily a completely happy ending.
Let's put it mildly.
I'm sure I've heard this on podcasts before this.
I think if there was any Stockholm syndrome being exhibited, it was actually by the media who seemed to fall in love rather with the hostage-takers rather than the hostages themselves, who were obviously in a rather sticky pickle.
And I'm very, very fond of The Ocean Cleanup. I don't know if you've heard of them, but they're basically cleaning the ocean.
So you probably know that there are these giant plastic gyres in the ocean, in all the oceans in the world, where the plastic is gathered by the Coriolis effect.
Into these huge floating pools. And the biggest one is in the middle of the Pacific.
And The Ocean Cleanup are literally out there in the Pacific Ocean with their technology pulling hundreds of thousands of kilograms of plastic out of the ocean.
And they've been testing this.
So in the beginning, what they thought— so it started off with the CEO, a guy called Boyan Slat. I think when he was 16, he came up with this idea of a floating coastline.
So you create an artificial beach, and the plastic basically washes up on this artificial beach that you float in the middle of the ocean.
And he thought they were going to need hundreds of these things. They modeled it all out. They thought they were going to need hundreds of these things.
And where they've got to now is they have a sort of a variation on that, which they tow behind a couple of enormous boats at very, very slow speed.
And this, it works, it works extremely well. And they're going to need a fleet of tens of these Ocean Cleanup vessels.
And with that fleet, they will be able to clean up most of the plastic from the Pacific Garbage Patch. And they've already started.
And they're, at the moment, they've only got the one. They've got the one device, and it's a test system, so it's not full-scale.
So they're now starting to test the larger-scale parts.
And they produce fantastic videos to explain what they're doing and how they're paying for it, why they go where they go, and how they use technology.
And it's just like a sort of Silicon Valley startup in the way that it approaches the problem, but it's actually trying to do something useful rather than something— Really useful.
Like really, yes, really useful. You know, they talk a lot about things like not catching fish and how they avoid bycatch and all that sort of thing.
And what they've done very, very recently is, because they're actually out there, actually pulling plastic out of the ocean, they can tell you what kind of plastic is in the ocean.
And what they've discovered most recently is that it's, I think it's something like 70 to 80% of it is fishing, fishing-related.
So it's nets and tubes for catching eels and things like that. So all this stuff that we hear about, you know.
It's great that we don't use plastic bags in supermarkets, and it's great that we don't use plastic straws with our drinks, but those are not the things filling up the oceans.
Those are the things washing up on the coastlines. So they come down the rivers and they wash out, and then they just come back up against the coastlines.
It's the stuff that's discarded at sea that ends up in these gyres.
And we only know that because there are actually people out there pulling it out of the ocean in such quantities that they can measure it. Anyway, so go support The Ocean Cleanup.
Very cool.
Where you get to give a prompt and the system will create an image based on it. So my pick of the week this week is Craiyon, C-R-A-I-Y-O-N, where you guys can go have a play.
Now, Graham and Mark, I gave a prompt. And these are the images that resulted. Can you guess what my prompt was?
So it's not very radio-friendly. But go have some fun. Maybe you can post some on TikTok Twitter and tag us.
Some were great, some were rude, some were funny, some were hilariously bad. I loved every single one, so didn't know how to choose a winner.
So I put all the names on a bit of paper and put them into a sock and picked one out. So there you go. And the winner of last week's poem competition is Liv with the following poem.
Okay, you ready? Ahem. Security, impurity, and ingenuity. Smashingly dashing through content heavy. Served cleverly light, securely dumb. Smashing Security, I hope for more to come.
Pretty cute. Great. So congratulations, Liv. We'll be in touch this week about sending over your prize, an original watercolor in Miko's brand new book.
And a big shout out to every single one of you who took part, even Steen, who blatantly ignored the rules and sent us a massive 4-stanza poem.
What's the best way for folks to do that?
And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Google Podcasts.
For episode show notes, sponsorship information, guest lists, and the entire back catalog of more than 287 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Mark Stockley:
Episode links:
- ‘The least safe day’: rollout of gun-detecting AI scanners in schools has been a ‘cluster,’ emails show – Motherboard.
- Gun detection AI the latest tech to make schools less safe – TechDirt.
- The unproven, invasive surveillance technology schools are using to monitor students – ProPublica.
- NYC Mayor considering a subway security system that can’t differentiate between a laptop and a handgun – Motherboard.
- Violence-as-a-Service: Brickings, Firebombings & Shootings for Hire – Brian Krebs.
- USA vs Patrick McGovern-Allen (PDF) – Court Listener.
- Reports of romance scams hit record highs in 2021 – FTC.
- Meeting you was a fake: Investigating the increase in romance fraud during COVID-19 – Academic Research.
- This dating app fought scammers with bots… hilarity ensued – TechCrunch.
- She was 69. He Was Young, Hunky,,, and a Fraud – The Daily Beast.
- Gladbeck: The Hostage Crisis trailer – YouTube.
- Watch Gladbeck: The Hostage Crisis – Netflix.
- We flooded our dating app with bots… to scam scammers – Medium.
- Craiyon.
- Carole’s attempt to ask Craiyon to draw Liz Truss eating a giant cupcake of Europe.
- Is this Graham eating a banana? Crayon seems to think so.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Bitwarden – Password security you can trust. Bitwarden is an open source password manager trusted by millions of individuals, teams, and organizations worldwide for secure password storage and sharing.
- SolCyber – SolCyber delivers Fortune 500 level cybersecurity for small and medium-sized enterprises. If the bad guys aren’t being discriminating about who they’re attacking, how can you settle for anything less?
- Kolide – the SaaS app that sends employees important, timely, and relevant security recommendations concerning their Mac, Windows, and Linux devices, right inside Slack.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.

Do you have a written copy of your shows? I cannot understand your accent but my hearing is not the greatest. Thank You, Kay