Planetary alignment on Friday has offered sky-gazers around the globe a chance to witness a spectacular near-total lunar eclipse, the longest since the 1440s.

The fascinating astronomical phenomenon lasted three hours and 28 minutes – the longest in centuries, according to international space agencies. On Thursday and Friday, depending on local time zones, the Earth, Sun and Moon aligned in such a way that 97.4% of our natural satellite’s surface was darkened in shadow.

When the Moon came out of the shroud, it turned bloody or rusty red in sunlight.

The dramatic celestial show was visible in those parts of the globe where the Moon appeared above the horizon during the eclipse.

Sky watchers in North and South America, parts of Eastern Asia and Australia had a chance to witness the phenomenon.

In Russia, the partial eclipse could be seen in Siberia and the Far East. Russian space agency Roscosmos also shared images of the shadowed moon as seen from the International Space Station (ISS).

Adding to the astonishment, the Moon was very low in the sky for much of the eclipse, causing an optical illusion that made it seem larger.

While the full Moon travels through Earth’s shadow roughly two times a year, lunar eclipses are usually far shorter.

The latest event, due to its rare duration, might have affected people not only visually, but also emotionally, astrologers cautioned.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

An adviser to the EU’s top court has claimed that citizens’ information in Germany is being illegally harvested, after telecom companies challenged bulk data collection.

The German data retention law was criticized on Thursday by an adviser to the Court of Justice of the European Union (CJEU), who stated that general and indiscriminate retention of traffic and location data is only allowed in exceptional cases, such as a threat to national security.

According to the adviser, bulk collection of data generates a ‘serious risk’ of leaks or improper access. It also entails a ‘serious interference’ with citizens’ fundamental rights to privacy and the protection of personal data.

Read more

(FILE PHOTO) © REUTERS/Russell Cheyne
Google won’t pay for spying on UK iPhone users

This comes after two companies, SpaceNet and Telekom Deutschland, challenged the obligation to store their customers’ telecommunications traffic data in 2016. The Administrative Court of Cologne ruled that the two companies were not obliged to retain data because such an obligation violated Union law. Germany then appealed to the Federal Administrative Court, who asked the CJEU about the compatibility of the data retention obligation.

The CJEU has often stated that indiscriminate mass surveillance does not fit within the general principles of EU law. Over a year ago it saw a similar case involving legal challenges around national bulk data collection under UK and French law. The court then ruled that only limited data collection and temporary retention were allowed. France seeks to bypass the CJEU on data retention and has asked the country’s highest administrative court (the Council of State) not to follow the EU ruling. France is waiting for the conclusion of the procedure launched by the Council of State before “assessing to what extent” national law should be changed. 

Despite recent EU court attempts to curb surveillance powers, leaked papers from June 2021 show that the national governments of the Netherlands, France, Spain, Luxembourg, Slovakia, and Estonia are pushing for a new pan-EU data retention law. They claim that data retention is essential for safeguarding public security and ensuring effective criminal investigations.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

The Islamic State terrorist group is tearing a path across Afghanistan, establishing itself in “nearly all” of its provinces while increasing attacks more than five-fold in the past year, the UN’s envoy to the country has warned.

Addressing the UN Security Council on Wednesday, the body’s special representative for Afghanistan Deborah Lyons spoke of a major Islamic State (IS, formerly ISIS) surge through the war-torn country, claiming the jihadist group has now expanded nationwide.

“Once limited to a few provinces and the capital, ISKP now seems to be present in nearly all provinces, and increasingly active,” Lyons said, referring to the group’s Afghanistan-based ‘Khorasan’ faction. She added that so far in 2021, IS has carried out 334 attacks, up from just 60 last year.

The envoy’s comments came just hours after an Islamic State bombing erupted in a Shiite Muslim neighborhood of the Afghan capital, killing one and wounding six others, according to Reuters.

Since taking over as the government following a chaotic US withdrawal and the outright collapse of the American-backed administration in Kabul last summer, the Taliban has struggled to keep the terrorist group at bay, Lyons said. Though she noted that the Taliban insists it is “waging a concerted campaign” against IS and is making “genuine efforts to present itself as a government,” she said its response “appears to rely heavily on extrajudicial detentions and killings.”

READ MORE: ‘Ghost soldiers’ to blame for Afghan government’s quick defeat – ex-minister

Despite the rise in IS attacks in recent months, however, Lyons said the overall security situation in Afghanistan has improved since the end of the US war, which stretched on for two decades.

In addition to the terrorism issue, the UN representative also cited broader concerns for the country in the coming months, warning of a looming “humanitarian catastrophe” driven by a litany of causes, including foreign sanctions – which she said have “paralyzed” the local banking system – as well as growing levels of food shortages due to famine and a failing economy, among other factors.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

A Roadmap for AI in the Intelligence Community

(Editor’s Note: This article was first published by our friends at Just Security and is the fourth in a series that is diving into the foundational barriers to the broad integration of AI in the IC – culture, budget, acquisition, risk, and oversight.  This article considers a new IC approach to risk management.)

OPINION — I have written previously that the Intelligence Community (IC) must rapidly advance its artificial intelligence (AI) capabilities to keep pace with our nation’s adversaries and continue to provide policymakers with accurate, timely, and exquisite insights. The good news is that there is strong bipartisan support for doing so. The not-so-good news is that the IC is not well-postured to move quickly and take the risks required to continue to outpace China and other strategic competitors over the next decade.

In addition to the practical budget and acquisition hurdles facing the IC, there is a strong cultural resistance to taking risks when not absolutely necessary. This is understandable given the life-and-death nature of intelligence work and the U.S. government’s imperative to wisely execute national security funds and activities. However, some risks related to innovative and cutting-edge technologies like AI are in fact necessary, and the risk of inaction – the costs of not pursuing AI capabilities – is greater than the risk of action.

The Need for a Risk Framework

For each incredible new invention, there are hundreds of brilliant ideas that have failed. To entrepreneurs and innovators, “failure” is not a bad word. Rather, failed ideas are often critical steps in the learning process that ultimately lead to a successful product; without those prior failed attempts, that final product might never be created. As former President of India A.P.J. Abdul Kalam once said, “FAIL” should really stand for “First Attempt In Learning.”

The U.S. government, however, is not Silicon Valley; it does not consider failure a useful part of any process, especially when it comes to national security activities and taxpayer dollars. Indeed, no one in the U.S. government wants to incur additional costs or delay or lose taxpayer dollars. But there is rarely a distinction made within the government between big failures, which may have a lasting, devastating, and even life-threatening impact, and small failures, which may be mere stumbling blocks with acceptable levels of impact that result in helpful course corrections.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


As a subcommittee report of the House Permanent Select Committee on Intelligence (HPSCI) notes “[p]rogram failures are often met with harsh penalties and very public rebukes from Congress which often fails to appreciate that not all failures are the same. Especially with cutting-edge research in technologies … early failures are a near certainty …. In fact, failing fast and adapting quickly is a critical part of innovation.” There is a vital difference between an innovative project that fails and a failure to innovate. The former teaches us something we did not know before, while the latter is a national security risk.

Faced with congressional hearings, inspector general reports, performance evaluation downgrades, negative reputational effects, and even personal liability, IC officers are understandably risk-averse and prefer not to introduce any new risk. That is, of course, neither realistic nor the standard the IC meets today. The IC is constantly managing a multitude of operational risks – that its officers, sources, or methods will be exposed, that it will miss (or misinterpret) indications of an attack, or that it will otherwise fail to produce the intelligence policymakers need at the right time and place. Yet in the face of such serious risks, the IC proactively and aggressively pursues its mission. It recognizes that it must find effective ways to understand, mitigate, and make decisions around risk, and therefore it takes action to make sure potential ramifications are clear, appropriate, and accepted before any failure occurs. In short, the IC has long known that its operations cannot be paralyzed by a zero-risk tolerance that is neither desirable nor attainable. This recognition must also be applied to the ways in which the IC acquires, develops, and uses new technology.

This is particularly important in the context of AI. While AI has made amazing progress in recent years, the underlying technology, the algorithms and their application, are still evolving and the resulting capabilities, by design, will continue to learn and adapt. AI holds enormous promise to transform a variety of IC missions and tasks, but how and when these changes may occur is difficult to forecast and AI’s constant innovation will introduce uncertainty and mistakes. There will be unexpected breakthroughs, as well as failures in areas that initially seemed promising.

The IC must rethink its willingness to take risks in a field where change and failure is embraced as part of the key to future success. The IC must experiment and iterate its progress over time and shift from a culture that punishes even reasonable risk to one that embraces, mitigates, and owns it. This can only be done with a systematic, repeatable, and consistent approach to making risk-conscious decisions.

Today there is no cross-IC mechanism for thinking about risk, let alone for taking it. When considering new activities or approaches, each IC element manages risk through its own lens and mechanisms, if at all. Several individual IC elements have created internal risk assessment frameworks to help officers understand the risks of both action and inaction, and to navigate the decisions they are empowered to make depending upon the circumstances. These frameworks increase confidence that if an activity goes wrong, supervisors all the way up the chain will provide backing as long as the risk was reasonable, well-considered and understood, and the right leaders approved it. And while risk assessments are often not precise instruments of measurement – they reflect the quality of the data, the varied expertise of those conducting the assessments, and the subjective interpretation of the results – regularized and systematic risk assessments are nevertheless a key part of effective risk management and facilitate decision-making at all levels.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Creating these individual frameworks is commendable and leading-edge for government agencies, but more must be done holistically across the IC. Irregular and inconsistent risk assessments among IC elements will not provide the comfort and certainty needed to drive an IC-wide cultural shift to taking risk. At the same time, the unique nature of the IC, comprised of 18 different elements, each with similar and overlapping, but not identical, missions, roles, authorities, threats and vulnerabilities, does not lend itself to a one-size-fits-all approach.

For this reason, the IC needs a flexible but common strategic framework for considering risk that can apply across the community, with each element having the ability to tailor that framework to its own mission space. Such an approach is not unlike how the community is managed in many areas today – with overarching IC-wide policy that is locally interpreted and implemented to fit the specific needs of each IC element. When it comes to risk, creating an umbrella IC-wide framework will significantly improve the workforce’s ability to understand acceptable risks and tradeoffs, produce comprehensible and comparable risk determinations across the IC, and provide policymakers the ability to anticipate and mitigate failure and unintended escalation.

Critical Elements of a Risk Framework

A common IC AI risk framework should inform and help prioritize decisions from acquisition or development, to deployment, to performance in a consistent way across the IC. To start, the IC should create common AI risk management principles, like its existing principles of transparency and AI ethics, that include clear and consistent definitions, thresholds, and standards. These principles should drive a repeatable risk assessment process that each IC element can tailor to its individual needs, and should promote policy, governance, and technological approaches that are aligned to risk management.

The successful implementation of this risk framework requires a multi-disciplinary approach involving leaders from across the organization, experts from all relevant functional areas, and managers who can ensure vigilance in implementation. A whole-of-activity methodology that includes technologists, collectors, analysts, innovators, security officers, acquisition officers, lawyers and more, is critical to ensuring a full 360-degree understanding of the opportunities, issues, risks, and potential consequences associated with a particular action, and to enabling the best-informed decision.

Given the many players involved, each IC element must strengthen internal processes to manage the potential disconnects that can lead to unintended risks and to create a culture that instills in every officer a responsibility to proactively consider risk at each stage of the activity. Internal governance should include an interdisciplinary Risk Management Council (RMC) made up of senior leaders from across the organization. The RMC should establish clear and consistent thresholds for when a risk assessment is required, recommended, or not needed given that resource constraints likely will not allow all of the broad and diverse AI activities within organizations to be assessed. These thresholds should be consistent with the IC risk management principles so that as IC elements work together on projects across the community, officers have similar understandings and expectations.

The risk framework itself should provide a common taxonomy and process to:

  • Understand and identify potential failures, including the source, timeline, and range of effects.
  • Analyze failures and risks by identifying internal vulnerabilities or predisposing conditions that could increase the likelihood of adverse impact.
  • Evaluate the likelihood of failure, taking into consideration risks and vulnerabilities.
  • Assess the severity of the potential impact, to include potential harm to organizational operations, assets, individuals, other organizations, or the nation.
  • Consider whether the ultimate risk may be sufficiently mitigated or whether it should be transferred, avoided, or accepted.

AI-related risks may include, among other things, technology failure, biased data, adversarial attacks, supply chain compromises, human error, cost overruns, legal compliance challenges, or oversight issues.

An initial risk level is determined by considering the likelihood of a failure against the severity of the potential impact. For example, is there is a low, moderate, or high likelihood of supply chain compromise? Would such a compromise affect only one discrete system or are there system-wide implications? These calculations will result in an initial risk level. Then potential mitigation measures, such as additional policies, training, or security measures, are applied to lower the initial risk level to an adjusted risk level. For example, physically or logically segmenting an organization’s systems so that a compromise only touches one system would significantly decrease the risk level associated with that particular technology. The higher the likelihood of supply chain compromise, the lower the severity of its impact must be to offset the risk, and vice versa. Organizations should apply the Swiss Cheese Model of more than one preventative or mitigative action for a more effective layered defense. Organizations then must consider the adjusted risk level in relation to their tolerance for risk; how much risk (and potential consequence) is acceptable in pursuit of value? This requires defining the IC’s risk tolerance levels, within which IC elements may again define their own levels based upon their unique missions.

Understanding and considering the risk of action is an important step forward for the IC, but it is not the last step. Sometimes overlooked in risk assessment practices is the consideration of the risk of inaction. To fully evaluate potential options, decision-makers must consider whether the overall risk of doing something is outweighed by the risks of not doing it. If the IC does not pursue particular AI capabilities, what is the opportunity cost of that inaction? Any final determination about whether to take action must consider whether declining to act would cause greater risk of significant harm. While the answer will not always be yes, in the case of AI and emerging technology, it is a very realistic possibility.

And, finally, a risk framework only works if people know about it. Broad communication – about the existence of the framework, how to apply it, and expectations for doing so – is vital. We cannot hold people accountable for appropriately managing risk if we do not clearly and consistently communicate and help people use the structure and mechanisms for doing so.

Buy-in To Enhance Confidence

An IC-wide AI risk framework will help IC officers understand risks and determine when and how to take advantage of innovative emerging technologies like AI, increasing comfort with uncertainty and risk-taking in the pursuit of new capabilities. Such a risk framework will have even greater impact if it is accepted – explicitly or implicitly – by the IC’s congressional overseers. The final article in this series will delve more deeply into needed changes to further improve the crucial relationship between the IC and its congressional overseers. It will also provide a link to a full report that provides more detail on each aspect of the series, including a draft IC AI Risk Framework.

Although Congress is not formally bound by such a framework, given the significant accountability measures that often flow from these overseers, a meeting of the minds between the IC and its congressional overseers is critical. Indeed, these overseers should have awareness of and an informal ability to provide feedback into the framework as it is being developed. This level of transparency and partnership would lead to at least two important benefits: first, increased confidence in the framework by all; and second, better insight into IC decision-making for IC overseers.

Ultimately, such a mutual understanding would encourage exactly what the IC needs to truly take advantage of next-generation technology like AI: a culture of experimentation, innovation, and creativity that sees reasonable risk and failure as necessary steps to game-changing outcomes.

Read also AI and the IC: The Tangled Web of Budget and Acquisition

Read also Artificial Intelligence in the IC: Culture is Critical

Read also AI and the IC: The Challenges Ahead

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post A Roadmap for AI in the IC appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

People who live in the big cities are definitely masters of eavesdropping. Sometimes they can’t help it, accidentally overhearing conversations from complete strangers can be so funny, it’s hard not to share them with someone else. And here comes the fittingly named Instagram account Overheard San Francisco that’s dedicated to sharing the funniest eavesdropped interactions in San Francisco and the Bay area. Scroll down to see the funniest examples!

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

The post Hilarious Private Conversations People Overheard In San Francisco first appeared on .

find more fun & mates at SoShow now !

Australia’s Jewish community has condemned the repeated displays of Nazi references at anti-vaccine and anti-lockdown rallies in Victoria, some of which saw the state premier depicted as Adolf Hitler.

Daniel Aghion, the president of the Jewish Community Council of Victoria, claims that references to the genocidal regime of the Nazis amid the current unrest over pandemic rules is a false equivalence.

“The Nazis had the intention of wiping from the face of the Earth a race or religion simply because of what they were,” Aghion told Guardian Australia. “Nothing in the current proposals is remotely like that, and the comparison to Nazi Germany is therefore shocking, inappropriate and wrong,” he added.

Aghion’s comments come after demonstrators, protesting against pandemic laws, referenced Nazi Germany in an effort to make their point. Some carried placards depicting state premier, Daniel Andrews, as Hitler. 

 Wendy Lovell, a Liberal MP, had also claimed laws proposed to govern future pandemics were similar to Germany’s 1933 Enabling Act – which allowed the Reich government to issue laws without the consent of parliament and preceded atrocities, most notably the Holocaust.

MP Bernie Finn had gone as far as to share a social media post depicting the state premier as Hitler. It was later deleted.Laws proposed by Andrews seek to grant powers to the state leaders in the event of another pandemic. Under the move, the minister “may make any order… that the minister believes is reasonably necessary to protect public health.” 

Opponents claim the legislation, which would see power concentrated with the head of state and health minister, is too broad and far reaching.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

Japan’s fifth wave of Covid-19 has virtually disappeared so dramatically that some scientists are puzzled as to why it happened. One team suggests the highly infectious Delta strain mutated into extinction on the island nation.

In mid-August, Japan experienced a peak in Covid-19 infections, recording over 23,000 new cases per day. Now the metric is just around 170, with deaths attributed to the disease mostly remaining in single digits this month.

The decline has been attributed by many to high vaccination rates, public acceptance of masks, and other factors, but some researchers say the drop was uniquely significant, compared to other nations with similar conditions.

Ituro Inoue, a geneticist at the National Institute of Genetics, believes that Japan had the good fortune of witnessing the Delta strain mostly rooting out other variants of the SARS-CoV-2 virus before then eradicating itself. He explained his team’s theory to the Japan Times newspaper this week.

For some time now, Inoue and his fellow scientists were researching mutations of SARS-CoV-2 and how they are affected by the protein nsp14, which is crucial for the reproduction of the virus.

RNA viruses, like the one causing Covid-19, tend to have a very high mutation rate, which helps them quickly adapt to changes in the environment. However, this opens the door for a so-called “error catastrophe,” when bad mutations pile up and finally cause the full extinction of a strain. The protein nsp14 appears to offer a form of error proofreading that helps the virus genome to stay below the threshold of the “error catastrophe.”

Read more

© Getty Images / Morsa Images
Fighting for our lives: Humanity’s weapons against Covid-19

In the case of Japan’s fifth wave of Covid-19, the Delta variant’s nsp14 failed at this job, Inoue believes, based on the genetic study of specimens collected from June to October. Contrary to his team’s expectations, there was a lack of genetic diversity, while many samples had many genetic changes in the site called A394V, which is linked to the error-fixing protein.

“We were literally shocked to see the findings,” the researcher told the Japan Times. “The Delta variant in Japan was highly transmissible and [was] keeping other variants out. But as the mutations piled up, we believe it eventually became a faulty virus and it was unable to make copies of itself.”

The theory could be relevant to the previous SARS strain, which was identified in 2003, explaining why it didn’t cause a pandemic. But that would be hard to confirm, since the outbreak ended relatively quickly and didn’t result in the massive collection of genetic data necessary to test the hypothesis.

It’s not clear why Japan had this lucky turn of events, but nothing comparable happened in other East Asian countries like South Korea, where populations are genetically close to that of Japan. Virus mutations similar to those flagged by the scientists have been discovered in at least 24 countries, Inoue said. He and his team plan to publish a paper detailing their findings by the end of November.

Even if the natural extinction theory is confirmed, it is at best a temporary reprieve for the Japanese people. New, more successful strains are likely to eventually find their way into the country, though quarantine measures and immigration control could delay the emergence of new variants in Japan, Inoue believes.

Meanwhile, Tokyo is bracing for a new wave of Covid-19 this winter and is preparing to live with the virus. The government reportedly plans to ease travel restrictions by increasing the number of people it allows to enter the country per day from 3,500 to 5,000.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

The annual migration of red crabs has brought traffic to a standstill on an Australian island. Apart from the epic journey, the species is also notorious for eating its own young.

Tens of millions of crustaceans are swarming Canberra-governed Christmas Island, which is almost a thousand miles northwest of the Australian mainland. Parks Australia, a government body in charge of wildlife conservation on the island, has deployed its staff to manage traffic, rake crabs off roads and provide advisories to local residents regarding road closures. Authorities are well-prepared to deal with the epic crab march as it repeats every year, usually in October and November. There are even special bridges and tunnels in place, built over and under busy roads so as to minimize the number of crabs crushed by cars. The sight of millions of these creatures making their perilous trek has become one of Christmas Island’s main tourist attractions.

The exact timing of the red crabs’ journey from forest to ocean is defined by rainfall and lunar phases. The march is led by male crabs, which are later joined by females. On reaching the ocean, they mate and spawn, with each female capable of producing as many as 100,000 eggs. However, most of the young crabs never make it back to the forest as they end up being eaten by fish and whale sharks for whom this is a veritable feast. To make matters worse, the crab larvae that do make it to the beach are often devoured by returning adult crabs of the very same species, hence one of their names – the cannibal crab.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

When the PRC decides to move on Taiwan, it is unlikely to move in a manner that makes a US decision on intervention clear cut.  Should China decide, initially at least, against a full-scale invasion of that island nation, it could instead opt to try to “win without fighting.” Beijing might do so by using its large, state-controlled fishing fleet to cut smaller Taipei-controlled islands off from Taiwan itself much as the PRC is now massing fishing boats to expand Chinese-controlled seas to press claims on the Japanese Senkakus and Whitsun Reef in Philippine waters. Chinese state-owned fisheries companies – part of the so-called ‘Maritime Militia’ – serve as fronts for PLA intelligence. Using their fleets to operate in a manner somewhere between peace and conflict in the gray zone of contested control around Taiwan would allow Beijing to test whether the US and its allies are willing to help defend the island’s independence without being seen to initiate open conflict.

“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” – Sept. 2018, Studies in Intelligence, Vol. 62 No.

Access all of The Cipher Brief’s national-security focused expert insight by becoming a  Cipher Brief Level I Member .  

 

 

The post Why the China – Russia Relationship Should Worry You – Part Two appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

A Canadian teenager has been arrested after allegedly stealing $36.5 million in cryptocurrency from a person in the US. The police claim it was the largest such heist involving one victim ever registered in North America.

Police in the city of Hamilton, Ontario, arrested the unidentified perpetrator on Wednesday, after over a year investigating what they have described as the biggest-ever cryptocurrency theft from a single person in either the US or Canada. Local police began a joint investigation with the Federal Bureau of Investigation and the US Secret Service Electronic Crimes Task Force in March 2020, when the theft was reported.

Read more

© AP Photo/Jiri Buller
Europol detains 10 hackers over $100 million cryptocurrency theft from celebrities

The Hamilton Police Service said it had made “multiple” seizures in excess of CA$7 million (US$5.5 million) during the arrest, which came after investigators noticed some of the stolen money had been used to buy an online username considered “rare” in the gaming community, according to a police statement.

The victim was apparently targeted by a cell phone hijack known as SIM swapping. This method involves manipulating cellular network employees to duplicate phone numbers in order to let the scammer intercept the two-factor authorization requests that allow them access to a victim’s account.

This method is considered especially potent because a lot of people use the same password for multiple sites, according to Detective Constable Kenneth Kirkpatrick, of the Hamilton Police’s cybercrimes unit. He added that cyber and cryptocurrency crimes were becoming increasingly common, but noted that the figures involved in this case were “very surprising.”

“It’s a large amount of money in anybody’s opinion,” Kirkpatrick said, adding that the case was currently in the Hamilton court system.

The police haven’t revealed the age or gender of the youth, the username they purchased, or whether they were acting alone.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !