Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 13 March 2013

The Ratters - men who spy on women through their webcams

Posted on 15:17 by Unknown
The woman is visible from thousands of miles away on a hacker's computer.  

The hacker has infected her machine with a remote administration tool (RAT) that gives him access to the woman's screen, to her webcam, to her files, to her microphone. He watches her and the baby through a small control window open on his Windows PC, then he decides to have a little fun...

Women who have this done to them, especially when the spying escalates into blackmail, report feeling paranoia. One woman targeted by the California "sextortionist" Luis Mijangos wouldn't leave her dorm room for a week after Mijangos turned her laptop into a sophisticated bugging device. Mijangos began taunting her with information gleaned from offline conversations...


For many ratters, though, the spying remains little more than a game. It might be an odd hobby, but it's apparently no big deal to invade someone's machine, rifle through the personal files, and watch them silently from behind their own screens. "Most of my slaves are boring," wrote one aspiring ratter... (more) (sing-a-long)

That's "old news".
The story really begins here...
The hack follows the path of most hacks. It started as a challenge, became video voyeurism, and evolved into blackmail. Hackers eventually smell money in their hacks. 


While you read about "ratters" today, today's hacker-criminals are sniffing in deep pockets - businesses. Eavesdropping on corporate meetings and watching executive computer screens makes more sense financially. Next year the media will be printing stories about that. Meanwhile, you have them scooped.

Q. So, why don't we notice?
A. “The more cameras we see in our environment, the less we see them.” 

When electronic cameras were new, you noticed them. Now they are everywhere. You pay no attention. The same is true with microphones. The weird logic continues... If one isn't noticing cameras and microphones, one tends to either think they don't exist, or are not being manipulated as surveillance devices.

Many business executives know better. They know the reality of business espionage and electronic surveillance. Their mental Achilles Heel... If you don't see where your stolen conversations, strategies, ideas, etc. are going, well they are probably not going anywhere. Think of that the next time you go car shopping, and they all look like Tesla's... or vice versa. Then, call me.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in amateur, computer, eavesdropping, FutureWatch, Hack, malware, mores, privacy, spycam, spyware, voyeurism, X-Ray Vision | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • When Paranoids Collide they Blow the Whistle on Tea Kettles
    Customs agents in Russia found tea kettles and irons bugged with tiny Spyware chips that exploit WiFi connections , reports a local news out...
  • "1984" Gets a New Look
    via creativity-online.com ... You can't judge a book by its cover, but there's no denying that a thoughtful, bold packaging can mak...
  • Watergate's Next Watergate
    A history professor hopes that a federal court's recent order to release long-sealed Watergate documents will shed light on the motivati...
  • Laser Beam Eavesdropping - In the News Again
    Since the 1970's, stories about laser listeners have periodically popped up in the news. The common thread is their magical ability to e...
  • Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
    Sometimes you just need a dumb phone that can't spy on you.   inKlien Global's tiny phone 6.5mm Ultra Thin AIEK M3 Cool Card Cell Ph...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ▼  2013 (455)
    • ►  November (47)
    • ►  October (53)
    • ►  September (31)
    • ►  August (50)
    • ►  July (50)
    • ►  June (47)
    • ►  May (35)
    • ►  April (40)
    • ▼  March (29)
      • Cell Phone Tracking v. Right to Privacy - To be De...
      • Digital Cameras Easily Turned into Spying Devices
      • Range Wars Redux - Animal Welfare Group Drones v. ...
      • How to Have Safe Specs - Just Say No
      • Putin on the Quits
      • Better Eyes for Flying Robots - A Runaway Hit
      • FutureWatch Update - Skype Tapping
      • Security Director Tip of the Month - More Secure C...
      • Cell Phone Fingerprinting - GPS Tells WHO You Are
      • Hello Federal! Give Me No Second Hand
      • Bugged Van, Other Man, "I'll kill him"... "Just ki...
      • Zombie Privacy Bills Struggle to Become Laws
      • From the Security Scrapbook Archives - 2003
      • World's Smallest Video Cameras
      • Criminals Spy Ops in Mexico
      • "Hey kids, hack it for your Uncle Sam!"
      • Casino CCTV Commandeered in $32 Million Sting
      • Spy Camera Glasses - Austin Powers is Thrilled
      • Chinese Launch Espionage Investigation Against Coc...
      • Pwn Pad - Use it IT, Before it is used against IT
      • The Return of the Invisible Anythings
      • The Ratters - men who spy on women through their w...
      • Wiretapping - Silvio Berlusconi Sentenced to One Y...
      • The Pepsi Spycam
      • Employee Bugs Boss - True Story
      • Vatican Bugs
      • Perkele - Android Malware Swipes SMS Messages
      • Super Secure Cell Phone
      • Barney Google 2013
    • ►  February (33)
    • ►  January (40)
  • ►  2012 (84)
    • ►  December (33)
    • ►  November (33)
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile