
He’s not a pop star, but Jeffrey Bowie is alleged to have toured staff areas of a hospital in Oklahoma, hunting for computers he could install spyware on. We dive into the bizarre case of the man accused of hacking medical networks and then sharing how he did it on LinkedIn.
Plus! Move over Nigerian princes — the WASPI scams are here. Fraudsters are now targeting UK women born in the 1950s, exploiting pension injustice for phishing gain.
All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security episode 415. My name is Graham Cluley.
Now, coming up on today's show, Graham, what do you got?
He's trying to get into multiple offices until finally he stumbles upon two unguarded computers.
And our man's got a perfectly innocent explanation. He says, look, I've got a member of my family, they're undergoing surgery right now. I needed to use a computer urgently.
I hope you don't mind that I was using this staff computer.
But no, what he's actually doing is he's installing a little something onto the computer, a tiny piece of software that secretly takes screenshots every 20 seconds and beams them off to an external server.
You know, totally normal hospital visitor behaviour. That is the kind of thing you do, isn't it?
You take a screenshot because there's so much information which is shown on the screen. You'll get emails, for instance.
You may be able to grab credentials, people's contact details, people's private hospital information. Medical information.
I'm imagining it's an actual person looking at these thousands of screenshots that arrive, scanning to see if they can see any secret information and writing it down on a yellow pad.
Rather than plowing through, looking through the different databases and trying to gain access anyway.
The installation of this malware could potentially have resulted in unauthorized access to patient data if he hadn't been stopped in time.
But thankfully, vigilant staff were able to intercept him.
Security footage showed him trying to access multiple offices, logging into different machines, and behaving so suspiciously, even the overstretched hospital IT team spotted something was up.
They were able to put the resources in, get him.
Let me check what's going on over here. And then hunters, yes.
Is he some sort of low-level crook? Is he a bored teenager? Is he a confused pensioner thinking he was using a vending machine. None of those things. It was a guy called Jeffrey Bowie.
And Veritaco is a cybersecurity firm that offers services such as digital forensics, instant response, penetration testing. So he's now been arrested by Oklahoma City Police.
And let me tell you, was he—
I wasn't arrested. I just woke up and everyone thought I was in jail. He says his phone went crazy telling him that he'd been arrested at the hospital.
He says, look, nothing like that happened. And he carries on in this LinkedIn post, which I'll link to in the show notes.
He claims his reputation has been wrecked, and he's demanding that the News 9 TV station in Oklahoma City, which reported on this case, did incalculable damage to his business reputation.
Well, he has actually calculated the amount, actually. He says he's lost a whopping $12,000. So that's what he's demanding from the TV station.
He says, "Well, yeah, yes." He said, "I did access two hospital computers." But he says that's fine because one had the username and password literally taped to the side of the monitor.
So obviously that's like an open invitation. Once you've gone into a staff area, which, you know, a regular visitor, member of the public shouldn't be in, in a hospital.
If you see a username and password on the side of a computer, then you're perfectly within your rights to enter that username and password to gain access to the computer.
That's his opinion as a so-called cybersecurity professional.
So he went in and he's like, he sees the username and password taped to the screen or whatever and goes, "I'm just gonna try it out and see what happens," not realizing he's breaking the law.
There's another computer as well, which he already accessed, according to him in his LinkedIn post.
Remember, this is in his LinkedIn post where he's admitting he entered the username and password.
He's admitting he went into offices, and he says on this other one where he said the computer was already logged in, all I had to do was jiggle the mouse.
So this isn't the greatest defense that's ever been.
Now, it's an odd way to claim that he definitely didn't do anything wrong. He makes some other claims as well. He says that the FBI, he says the FBI were very underhand, he said.
He says they bought me lunch. They said they wanted to chat to me about using AI to catch online paedophiles.
And when he showed up for the lunch, they then turned the tables on him and hit him with this hospital hack instead.
Anyway, he's very, very angry, but he says he's very, very happy to speak to the media about this, what he claims is a miscarriage of justice.
He's requesting payment for interviews.
So if you're a member of the media who wants to report on this, he says, you can get in touch with me, but be ready with Apple Cash in order to pay me.
So he writes all this on LinkedIn. I've been to his LinkedIn page and checked it all out.
And some people have been replying to him, pointing out that, you know, as a cybersecurity professional, was it really wise to access a PC to write a script that takes screenshots, sends them offsite without prior authorization?
Because I think you'll actually find, I think you'll find, I think you'll find that is actually a crime.
So aside from this particular case, where do we stand, Carole, on this kind of thing? Should people, if they see a computer with a username and password, where do they stop?
You don't go in and type in their username and password, and you don't play around and send emails pretending to be them or do little jokes, 'cause it's against the law, at least in the UK.
Check the laws in your own geography, I suppose.
We don't know if you have been arrested, as the police say, or not. But potentially, you could be facing a large fine and maybe even some prison time if found guilty.
Carole, what's your story this week?
They were tech high flyers, right, with lots of wonga. But their retirement aim was $9 million US.
You know, I don't know about you, but I live in a not-so-chi-chi neighborhood, and there are a number of older people who would literally not heat their homes or eat enough were it not for state pensions.
So the modern state pension was introduced in 1948, and men who made enough National Insurance contributions received their state pension at 65, and women received it at 60.
Now, in 1995, the then Conservative government introduced a timetable to make the age at which men and women start getting state pensions the same.
But in 2010, a coalition government decided to speed up these changes, all in the aim of reducing the overall cost of state pensions.
Because if you can raise the number by 5 years more quickly, you can save a lot of wonga.
Anyway, the Pension Act 2011 brought forward the qualifying age of 65 for women to 2018, two years earlier than expected.
Now, obviously some people were unhappy with this decision, particularly women who were nearing retirement and suddenly having 5 years tacked on.
So a group was founded called Women Against State Pension Inequality, WASPI. They're known as WASPI, which, you know, I don't know, I'm not super comfortable with that name.
Maybe it's because I come from the other side of the pond. But yeah. Anyway, so it's called the WASPI Campaign.
And they say this campaign is fighting for justice for all women born in the 1950s who were affected by the changes to the state pension age.
So they say we're not against equalization, but maintain that changes were poorly communicated and have called on successive governments to provide redress to the millions of women impacted.
Now, the thing is, is most women affected now have reached their state pension age. And the WASPIs now say that a lump sum compensation for the lack of notice would be nice, right?
Because that would be commensurate with the degree of loss suffered. It would be an equitable solution.
The WASPIs wanted, I think, around £10K. They thought that was commensurate. But hey, £3,000, you know, I don't know, better than nothing.
Because if they wanted equality, they could have reduced the age at which men could get their state pension to what women had. So all those years when we'd had to work—
But by the end of last year, in December, the Labour government announced that the affected women would not receive any financial compensation.
And currently, a High Court challenge by WASPI campaigners is in progress.
More than 3.6 million women were affected by this Department for Work and Pensions failure to properly inform them of the increase to the state pension age.
Well, last week, Angela Meaden, she's the chair of the WASPI campaign, spoke about an alarming spike in spam attempts aimed at affected women. In recent days.
So they warn of bogus websites promising compensation payouts worth thousands of pounds to women who had their state pension age delayed by the government.
So searching for terms like WASPI or WASPI compensation can land you on a site that looks legit but is very much not, they say.
And some media reports blame Google for spreading this effectively fake news, right?
So they say, quote, headlines circulate false claims, which are then pushed by Google News, such as DWP, which is Department of Work and Pensions, announces £3,000 compensations for 3.8 million WASPI women, or provide a Martin Lewis WASPI calculator that lures women into giving away personal data.
I've seen a few headlines. I'll Google it, right? So Martin Lewis, he's gotten involved. He's a financial expert and TV personality.
He's sounding the alarm and urging caution and vigilance against these fraudulent schemes.
So what do you think scammers are at fault, but you can also see how affected women would Google for this stuff and look for information on this.
Sometimes you also get those sponsored ads as well, where the criminals have actually managed to boost their listings higher up in the search results in order to—
They typically tout you can claim for a payout worth several thousand pounds.
They often mention £2,950, and that was the highest payout recommended last year by the Parliamentary Health and Service Ombudsman, as we talked about earlier.
They have the site calculators claiming to show how much you could be owed in compensation. These figures are often inflated to get the potential victim excited at the return.
And then of course, if you get on there, some women have been asked for their birth certificates and banking details.
So the upshot here is UK women who were born in the 1950s ignore anything claiming a compensation scheme because it does not exist. The government has rejected calls for payouts.
That's the latest that's happened to date. And even though the case has been in the news again this year with the WASPI group threatening legal action, the position has not changed.
But if it does, the compensation would be administered by the government, and you probably wouldn't have to do much because they know you exist.
Even if it did come through, it's not going to be the situation that you have to visit a website and register and give your information, because clearly the government already knows about you and how old you are and whether this is something that you should be given.
I think I looked at some stats, and maybe it's not a huge percentage, but maybe our lovely listenership can do their bit to make sure that their elderly relatives don't fall for scams and maybe get them listening to Smashing Security as well.
Head to vanta.com/smashing to learn more. That's vanta, V-A-N-T-A,.com/smashing. And thanks to Vanta for sponsoring Smashing Security.
Do your end users always, and I mean always without exception, work on company-owned devices and IT-approved apps? I didn't think so.
So my next question is, how do you keep your company's data safe when it's sitting on all those unmanaged apps and devices?
It ensures that every user credential is strong and protected, every device is known and healthy, and every app is visible.
And you join us on our favorite part of the show, the part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they like.
It doesn't have to be security related necessarily.
There's amazing historic houses to explore and landmarks. And if you get a National Trust annual subscription, you gain free access to these. But there is a problem.
Who carries their wallet around with them anymore?
I can't find it, blah, blah, blah." She's saying all this. And I'm saying, "I don't know." And she says, "Look, don't even bother looking.
You'll never find it." But she says it's around somewhere. And eventually she finds it, right?
And I said to her, "Don't they have a digital version you can have on your phone?" She says, "No, they don't. They've only got this card." And I said, "Give the card to me," right?
I didn't take a photo of it.
There is a wallet facility on the iPhone, which is how you pay for things and how you put your gym membership card and all sorts of things like that, your Nectar points and all those sort of things.
But you're limited as to what you can put in it. I have found an app called Wallet Creator, which is free and does not have any adverts.
That's very exciting to me, which allows you to create your own custom cards you can put in your Apple Wallet where it will scan the barcode on the real-life card that you have and then add it as a card in digital form on your Apple Wallet.
I think it's very exciting.
Anyway, so my wife actually ended up, even though she managed to find her card, she used this to check into the National Trust and apparently they were very impressed.
They said, "Oh, I didn't know you could do that." The app is called Wallet Creator. I will put a link in the show notes.
There are other apps which do this, which charge you a fortune. Don't use them. Use this one instead. It worked for me. And that is my pick of the week.
Carole, what's your pick of the week?
And recently, last year, there was a huge big hoo-ha about the Dubai chocolate bar. Has this made it into your echo chamber at all?
Say you wanted to buy one just so you can see how much they cost because these are not cheap.
But I personally adore pistachios as well in all things, and they shouldn't just be for the uber-rich.
So my pick of the week is don't buy pistachios or make this Dubai bar so that I could see them in my food markets once again. I thank you.
And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
For episode show notes, sponsorship info, guest list, and the entire back catalog of more than 414 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Episode links:
- Cybersecurity Firm CEO Charged with Installing Malware on a Hospital Computer – HIPAA Journal.
- Edmond cybersecurity CEO accused in major hack at hospital – YouTube.
- Jeffrey Bowie’s post on LinkedIn – Wayback Machine.
- Martin Lewis issues scam warning as fraudsters use him to target WASPI women – Metro News.
- ‘Waspi’ women warned over fake compensation websites – The Guardian.
- WASPI campaigners warn of “dangerous” spike in fake compensation scams – Financial Reporter.
- National Trust.
- Wallet Creator – iOS App Store.
- DIY Dubai chocolate: Ravneet Gill’s recipe for crunchy pistachio chocolate – The Guardian.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
- 1Password Extended Access Management – Secure every sign-in for every app on every device.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.
