A Novel Approach to Money Laundering

What do you get when a fake author using a stolen identity publishes a gibberish-ridden novel on demand and then buys scads of them at high prices with dirty money? Clean money. h/t BoingBoing


Money Laundering Via Author Impersonation on Amazon?
Krebs on Security
February 20, 2018

Patrick Reames had no idea why Amazon.com sent him a 1099 form saying he’d made almost $24,000 selling books via Createspace, the company’s on-demand publishing arm. That is, until he searched the site for his name and discovered someone has been using it to peddle a $555 book that’s full of nothing but gibberish.

Reames is a credited author on Amazon by way of several commodity industry books, although none of them made anywhere near the amount Amazon is reporting to the Internal Revenue Service. Nor does he have a personal account with Createspace.

But that didn’t stop someone from publishing a “novel” under his name. That word is in quotations because the publication appears to be little more than computer-generated text, almost like the gibberish one might find in a spam email.

“Based on what I could see from the ‘sneak peak’ function, the book was nothing more than a computer generated ‘story’ with no structure, chapters or paragraphs — only lines of text with a carriage return after each sentence,” Reames said in an interview with KrebsOnSecurity.

The impersonator priced the book at $555 and it was posted to multiple Amazon sites in different countries. The book — which as been removed from most Amazon country pages as of a few days ago – is titled “Lower Days Ahead,” and was published on Oct 7, 2017.

Reames said he suspects someone has been buying the book using stolen credit and/or debit cards, and pocketing the 60 percent that Amazon gives to authors. At $555 a pop, it would only take approximately 70 sales over three months to rack up the earnings that Amazon said he made. Continue reading “A Novel Approach to Money Laundering”

New Dirty Politics: Fake Internet Comments

Fake internet comments may be the only thing worse than real internet comments.


“Fake Comments on Trump Administration Website are Trying to Take Down an Obama-era Rule”
By Greg Price
Newsweek
December 27, 2018

Critical fake comments, attributed to a real person, were reportedly posted against a controversial fiduciary rule to the Department of Labor”™s website, presumably to convince the department to do away with the rule altogether.

Altogether, 40 percent of people who responded to a survey conducted for The Wall Street Journal stated they did not write the negative comments against the rule first implemented under former President Barack Obama to protect investors and avoid conflicts of interest at brokerage firms and other financial institutions.

The survey was conducted by research firm Mercury Analytics for The Journal. It was sent to 345 people out of the 3,100 comments posted to the Labor Department”™s site about the fiduciary rule. Most of the 345 comments were critical of the rule, but of the 50 people to respond to the survey, 20 told The Journal they did not author the critical post.

An Internet Writer Breaks Up With Her Boyfriend Over Trump… You Won’t Believe What Happens Next!

The ferocious and funny Anna Merlan takes an impressively deep dive into the made-up career of Rachel Brewson, the JT LeRoy of womens-interest clickbait.


“The Team of Men Behind Rachel Brewston, the Fake Woman Whose Trump-Fueled Breakup Went Viral”
by Anna Merlan
Jezebel
October 4, 2016

aotp_brewsonIn December 2015, readers at women”™s site xoJane were enthralled and filled with all-caps rage by Rachel Brewson, a self-described “giant liberal” who boldly declared her love for a Republican named Todd. She described, in rapturous terms, how the couple”™s political disagreements fueled an ecstatic third-date bipartisan fuck-fest that soon flowered into a real relationship.

Mid-date, they got into a “heated debate” about politics, Brewson wrote. They fought from wherever the date took place (she didn”™t say), into the street, and into a cab. The discussion ended when Todd””who, as it turned out, was a gun-loving, Iraq-war-supporting libertarian””manfully invited himself up to her apartment.

“What followed was the best sex of my life up to that point,” Brewson wrote, whose author bio said she was a “dating editor” at a site called Review Weekly. “Somehow the political tension between us had transformed into sexual tension. I was hooked.”

The post was a modest success””it was shared just under 3,000 times on social media, and racked up 1,000 comments on xoJane itself (whose editor-in-chief is Jane Pratt of Sassy fame. The site was purchased by Time. Inc last fall). Many of those comments complained about Rachel”™s privileged white-woman version of liberalism, which allowed her to ignore “petty differences”””her term””between her and Todd on issues like immigration.

“He flashed some money your way and you”™re ready to label things like rape culture and systematic racism as “˜petty differences,”™” one commenter fumed. “You aren”™t as liberal as you want to believe you are.”

Three months later, the fairytale was over. Continue reading “An Internet Writer Breaks Up With Her Boyfriend Over Trump… You Won’t Believe What Happens Next!”

STEM, Social Engineering and Stealing

The Kernel delves into the hidden subculture of liars, thieves, and hackers who expose and exploit gaping loopholes in e-commerce via Jonah (not his real name), someone who’s been there and back.


“Confessions of a social engineer”
by Dell Cameron
The Kernel
August 9, 2015

serialcodegenerator…Part theater and part science, social engineering is the method by which hackers, for lack of a better term, exploit vulnerabilities in human psychology; for Jonah, it was a key to getting anything he wanted, from televisions and laptops to smartphones and expensive wines. One of his largest takes netted him around $60,000 worth of product, he says. He showed me a Rolex Daytona watch””part of a gallery of stolen goods he”™d photographed in his bedroom””which retails on Amazon for around $26,000.

Whether through face-to-face interaction, by phone, or by email, the human gatekeepers of any network can be exploited””if you know how to play the game. They”™re the weakest link in any company”™s security.

Almost every major electronics company is vulnerable in nearly the same way: They all have warranty-based replacement systems that can be exploited. Most companies, for instance, don”™t require a defective item to be returned before mailing out its replacement. It”™s likewise difficult to prove that an in-warranty item has been lost or stolen.

Through repeated phone calls, social engineers develop strategies for navigating a company”™s customer help line. They get a feel for which sob stories and which “yes” or “no” responses will work best toward achieving their objective. Intelligence, temperament, and even humor all come into play. The questions and responses are then mapped out, as if composing a flowchart, with the goal of expediting the con. Read the whole article.