
Graham wonders what would happen if his bouncing buttocks were captured on camera by a Tesla employee, and we take a look at canny scams connected to China’s Operation Fox Hunt.
All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.
(Oh, and when Carole mentioned Colin the Accountant as her “Pick of the Week” she really meant “Colin from Accounts”. Sorry!)
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security, Episode 318. My name's Graham Cluley.
Now coming up in today's show, Graham, what do you got?
Not because I have chosen to go and watch these things, but because I have rented a house in the countryside and suddenly all these guys come tripping up on horses with lots of dogs.
To picture the scene, people who aren't aware of this, how we have fox hunts in the UK is you get a whole bunch of chinless toffs on horseback.
They're engaging in an entirely fair fight between on one side, 20 hounds, and on the other, a wild fox scared out of its wits that it's going to be ripped to shreds.
And yeah, anyway, they're on horses and it's unpleasant.
Anyway, that's what we picture here in England. But to Chinese people, a fox hunt can mean something quite different.
He said instead what it is, is Beijing targeting Chinese nationals who are viewed as threats. And of course, Chinese nationals who live outside China.
So it's political rivals, dissidents, critics of China's human rights record are being targeted according to Wray.
And they're trying to force those people under the pretext of they've committed some kind of financial crime to come back to China, and who knows what might happen to them.
I just would assume that if, say, there was someone who lived in Canada that the Chinese government was saying, hey, they've done all this awful stuff, the Canadian government would go, prove it, show us.
I don't know why anyone would play.
That's one way in which it can occur. But of course, is that information delivered by the Chinese authorities, is that legitimate or not, is one of the questions.
Or is it being made up in order to bring people of interest back to Chinese soil?
According to FBI Director Wray, when the Chinese aren't able to locate some individuals, they can actually go round to their families' homes in the United States and give them a message to pass on.
So, this is one of the messages which Chris Wray said the Chinese were passing on, which is that, oh, your dad, yeah, your dad, he's got two options.
He can either return to China right now, or he can commit suicide. Which isn't—
And people are saying that they've been coerced into leaving the United States and other countries around the world and go back to China.
And there's a great deal of pressure being put on people to do this.
And furthermore, if you have any family members who are back home in China, it's been claimed that there's been a lot of pressure being put back on them.
Some cases they've been arrested in order to create leverage for you to return to China. And it sounds, I mean, it's not very jolly really. It sounds about—
Now, what's happened now is the FBI has issued a warning.
So this has been known about for some years and people like Obama and others have said, you know, this is outrageous what's going on.
You know, there are some people maybe are being brought back legitimately who may have committed some sort of corruption, but maybe there's not sufficient evidence, or maybe they're sort of stretching things too far.
The FBI has just issued a warning related to Operation Fox Hunt, and that's why I'm talking about it today.
According to the FBI, there are now criminals who are posing as Chinese law enforcement officials in the United States.
We're going to duff you up or arrest you or take you back to China unless you pay up." So give us some money and we'll go away, but otherwise we're going to take you back to Beijing.
These criminals who are posing as members of the Chinese authorities are often phoning up their victims using spoofed numbers to appear as though they come from the Chinese ministry or a US-based Chinese consulate as well.
They're showing their victims fraudulent documents as proof of the accusations.
And of course, they will show basic knowledge of their victims to appear more legitimate. Oh yeah, say, oh yeah, we know about Uncle Frank.
You know, whatever they've managed to pick up from social media as well.
Who are the people who are going around contacting members of the Chinese community pretending to be investigators for China, rounding up criminals? And I thought, well—
Because the actual Chinese agents would have a list of these are the people we want to bring back to China.
They could show up on their door because they presumably have got the means to find out where these people live in some cases.
And say to them, well, look, pay up, otherwise we really will be taking you back to Beijing.
It's a dangerous game to play.
It's a little bit like being a crooked cop who might know who the local drug dealers are and saying, well, you know, I'm not going to bring you down to the station, but, you know, can you give me some of your proceeds?
So, if you believe that you've been contacted by individuals claiming to be a Chinese authority, they say contact your local FBI field office instead.
Don't just trust them, obviously.
Whether they're a criminal or whether they are legitimate Chinese investigators, speak to the FBI because foreign government officials who are conducting legitimate investigations in the United States have to act in coordination with the US federal authorities.
So call the FBI.
What I'd suggest you don't do is don't call your local Chinese consulate, because just in case you are in the list and they say, oh, oh, thank you for this report, where, where exactly are you calling from today?
Where, where, where you— because you might get— you might find yourself on the next slow boat to China.
Do you ever worry that a, you know, member of the Mounted Police Force may show up on his moose?
And the story thankfully does not revolve around Elon, but more about his staff, who according to plaintiffs, severely jeopardized the privacy of their customers, Tesla car owners.
And this has all to do with Tesla cars and their cameras. So I first decided to go check out, I don't own a Tesla, right?
So I went to the Tesla website to just see how many cameras there are on the car. And there's quite a few.
And there's a camera mounted on each front fender. A lot of cameras on the outside of the car. And there's 3 cameras mounted on the windshield above the rearview mirror.
There's also the cabin camera, which is available, and this helps alert the driver in case they're not paying enough attention, right?
It might provide you an audible alert to remind you to keep your eyes on the road and stop looking at your Tinder account or something.
So I suppose there's something to say, you know, occasionally maybe, 'Pay some attention to what's going on. Stop reading a book. Stop playing Scrabble.' Right.
And so it sends it back to base to get some information, right?
This is a statement from Tesla explaining how these images and videos that they collect work.
If you enable data sharing and a safety-critical event occurs, such as a collision— I love that, safety-critical event.
The Model 3 shares short cabin camera video clips with Tesla to help us develop future safety enhancements and continuously improve the intelligence of features that rely on the cabin camera.
And I checked out its privacy notice and it opens its privacy notice with, "Your privacy is and will always be enormously important to us." And it also says in it, "Even if you choose to opt in," and this is to data sharing, "unless we receive the data as a result of a safety event," you know, vehicle collision, airbag deployment, "camera recordings remain anonymous and are not linked to you or your vehicle." Right.
Okay?
And we all know it's crowdsourced in that way. So I don't know.
And yet, Graham, and yet, and yet, and yet, between 2019 and 2022, according to interviews by Reuters with 9 former employees, groups of Tesla employees used internal messaging systems to share videos and images recorded by customer car cameras.
One person recalled seeing embarrassing objects such as certain pieces of laundry, certain sexual wellness items, which I love that word. This is a quote.
So if it's in a, for instance, in a garage, it's not moving.
But if I were a young man and I thought, oh, maybe we could just have a little a little, you know, a little chat, a little fumble around on the back seat.
Could that potentially be uploaded? Yes.
With the less sensationalist stuff, some of these employees at Tesla would create memes and post them to the internal messaging system in order to get kudos from other employees.
Some said basically those that were considered funny and getting high fives around the coffee machine afterwards saying, "Oh, that was a really funny one," tended to get promoted.
A lot of them have to basically look at images all day and explain in a database, this is what it is to teach the algorithm. There's still some manual processes through that.
So I can imagine it could be a mundane task.
But then there was one clip of someone being dragged into a car seemingly against their will.
An ex-employee told Reuters, one ex-employee described a video of a man approaching the vehicle completely in the nude.
So one crash video in 2021 showed a Tesla driving at high speed in a residential area, hitting a child riding a bike, according to an employee.
The child flew in one direction, the bike in the other.
The video spread around the Tesla office in San Mateo, California, via private one-to-one chats like wildfire, the employee told Reuters.
And this is according to two ex-employees who viewed it. Nicknamed Wet Nelly, the White Lotus Esprit sub had been featured in the 1977 James Bond film The Spy Who Loved Me.
Who owned this car?
So okay, so how do you feel about this? I know there's something distasteful here, right?
But I'm going to argue for the other side for, you know, for our listeners' interest's sake, right? These are employees who work at hip and cool Tesla office where memes are cool.
Most of them are 20 to 30 years old doing mundane work like labelling images to improve the car's understanding of what is around them and you land upon something unusual, like maybe it's scary, hilarious, salacious, and you share it.
You kind of nudge your employee next to you, "Hey, check this out, check this out." It's not like the information went outside the company, right?
But let's say, because you had the data sharing that you did, or there was a fault or whatever, that image gets uploaded to some kid who's working at Tesla.
So it's very good that I don't work in a very serious job like this, right?
He says, quote: "Tesla captures recordings of people vulnerable on their own property, in their own garages, and even in their own homes, including at least one instance where Tesla cameras were captured a video of a man naked in his home.
Tesla has also captured and disseminated videos and images of customers' pets and even their children, a group that society has long recognised as vulnerable to exploitation and manipulation.
Parents' interest in their child's privacy is one of the most fundamental liberty interests society recognises." So yet this is a serious sticky pickle for this idiot savant, Musky Musk, to crawl out of.
I know, at least you can run on Twitter, right?
But then I think well, no, why shouldn't he? Because what the bloody hell are Tesla doing allowing their employees to do this and act in this inappropriate way?
Yeah, you'd be pissed. I'd want my money back. So I understand.
With over 14 frameworks including SOC 2, GDPR, HIPAA, and ISO 27001, Drata gets you audit-ready for crucial security standards needed to scale your business.
Automated controls, over 75 integrations, and 24-hour monitoring keeps your company in compliance without manual work.
And with a new open API and plenty of customization, you can build your program your way. With over 360 5-star reviews, Drata is the highest-rated cloud compliance platform on G2.
Countless security professionals from companies like Notion, Lemonade, and BambooHR have shared how crucial it's been to have Drata as their trusted compliance partner.
So listeners of Smashing Security, you can get 10% off Drata and waived implementation fees at smashingsecurity.com/drata. That's smashingsecurity.com/drata.
Kolide patches one of the major holes in zero-trust architecture: device compliance.
Without Kolide, IT struggles to solve basic problems keeping everyone's OS and browser up to date.
Insecure devices are logging into your company's apps, but there's nothing there to stop them.
Kolide is the only device trust solution that enforces compliance as part of authentication, and it's built to work seamlessly with Okta.
The moment Kolide's agents detect a problem, it alerts the user and gives them instructions to fix it. If they don't fix the problem within a set time, they're blocked.
Kolide's method means fewer support tickets, less frustration, and most importantly, 100% fleet compliance. Wanna learn more? Of course you do. Visit kolide.com/smashing.
That's kolide.com/smashing. And thanks to Kolide for sponsoring the show.
Now, did you know that you can log into Bitwarden using a secondary device instead of your master password? Well, now you do.
Logging in with a device is a passwordless approach to authentication.
It removes the need to enter your master password by sending authentication requests to other devices you're currently logged into for approval.
With Login for Device, it can be initiated on the Web Vault, browser extension, desktop app, mobile app, and you can approve access on your mobile and desktop app version of Bitwarden.
Very, very cool. And the Bitwarden team has hardened the security of its vaults, protecting new vaults with 600,000 iterations by default.
And of course, existing accounts can also update themselves to the same level.
These and many other great security features are incorporated all the time into Bitwarden, keeping your passwords secure from hackers.
Learn more, try Bitwarden for yourself at bitwarden.com/smashing. That's bitwarden.com/smashing. And welcome back.
Can you join us at our favorite part of the show, the part of the show that we to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they wish.
It doesn't have to be security related necessarily.
It's both musical and visual. It comes to you in the form of a YouTube channel. And this YouTube channel is called the Device Orchestra. Have you heard of Device Orchestra?
There is a guy out there who plays music covers, but not using musical instruments. He uses electric toothbrushes, credit card machines, typewriters, all kinds of gizmos which go.
He's given them googly eyes. Some have got wigs and pipe cleaner arms.
And very entertaining and creative it is too. And that is why it is my pick of the week.
And it starts off with a car accident and an injured dog, which bring our two protagonists, Ashley, a student doctor, and Gordon, a microbrewery owner together.
But then there's extra reveals in store. The characters get complex and a little not perfectly— you know what I mean? They're not cookie cutouts.
They've got some dark patches as well. There's one character that has a big poo at the other's house when they're both only to discover that the water has been turned off.
Now, Colin the Accountant has a similar flair to When Harry Met Sally, Catastrophe. Right? Like smart, smart, comedic, meet cute.
And it's like, "Will they, won't they?" A pull between the characters. I think you'd love it, Graham.
And I read, I think it's on The Guardian website, they did a little review of it, and they raved about it and said how wonderful it was. You read that as well, did you?
I loved it." Happy to do that. But I just wanted to know. But it seems as though it's a crowd pleaser.
And it was very cute to have a little kind of R&R time.
It's streaming on Binge. Yeah, streaming on Binge, which is an Aussie streaming platform, and it has just been released on Amazon Prime. So enjoy Colin the Accountant.
Look for Smashing Security up there. And don't forget to ensure you never miss another episode.
Follow Smashing Security in your favorite podcast apps such as Apple Podcasts and Spotify.
For episode show notes, sponsorship info, guest list, and the entire back catalog of more than 317 episodes, check out smashingsecurity.com.
Warning: This podcast may contain nuts, adult themes, and rude language.
Hosts:
Graham Cluley:
Carole Theriault:
Episode links:
- Countering Threats Posed by the Chinese Government Inside the US – Speech by the FBI’s Christopher Wray.
- Criminals Pose as Chinese Authorities to Target US-based Chinese Community – FBI.
- FBI: How fake Xi cops prey on Chinese nationals in the US – The Register.
- Special Report: Tesla workers shared sensitive images recorded by customer cars – Reuters.
- 303: Secret Roomba snaps, Christmas cab scams, and the future of AI – Smashing Security.
- Lawsuit: Tesla must be punished for “tasteless” sharing of car-camera images – Ars Technica.
- Customer Privacy Notice – Tesla.
- Tesla hit with class action lawsuit over alleged privacy intrusion – Reuters.
- Tesla About Autopilot – Tesla.
- “Wet Nellie” – Wikipedia.
- Device Orchestra – YouTube.
- “Smoke on the Water”, as performed by Device Orchestra – YouTube.
- “Eye of the Tiger”, as performed by Device Orchestra – YouTube.
- Cabin Camera – Tesla.
- Colin from Accounts – Amazon Prime.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Bitwarden – Password security you can trust. Bitwarden is an open source password manager trusted by millions of individuals, teams, and organizations worldwide for secure password storage and sharing.
- Kolide – Kolide ensures that if your device isn’t secure it can’t access your cloud apps. It’s Zero Trust for Okta. Watch a demo today!
- Drata – With over 14 frameworks including SOC2, GDPR, HIPAA, and ISO 27001, Drata gets you audit-ready for crucial security standards needed to scale your business. As a listener to Smashing Security you can save 10% off Drata and have implementation fees waived.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on Mastodon, on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.
