- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
815 lines
34 KiB
Plaintext
815 lines
34 KiB
Plaintext
Episode: 3957
|
|
Title: HPR3957: The Oh No! News.
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3957/hpr3957.mp3
|
|
Transcribed: 2025-10-25 17:57:47
|
|
|
|
---
|
|
|
|
This is Hacker Public Radio Episode 3957 for Tuesday the 3rd of October 2023.
|
|
Today's show is entitled The Oh No News.
|
|
It is part of the series' privacy and security.
|
|
It is hosted by some guy on the internet, and is about 37 minutes long.
|
|
It carries a clean flag.
|
|
The summary is, Scotty talks about investment and recovery scams.
|
|
Hello and welcome to another episode of Hacker Public Radio.
|
|
I'm your host, some guy on the internet, and this is The Oh No News.
|
|
Today let's talk a little bit about the human CPU, also known as the human brain.
|
|
Now I'm not a medical doctor, I don't play one on TV,
|
|
and I haven't slept in a holiday in in quite some time,
|
|
but I am some guy on the internet.
|
|
Therefore you can trust everything I'm saying.
|
|
The human CPU is very advanced, and when used to its full potential,
|
|
we can achieve almost anything.
|
|
Now there is some argument about using the human CPU to its full potential,
|
|
and I've heard about studies where they say we only use X% of our brain,
|
|
you know, some small percentage of our brain.
|
|
I think that's possibly because all of the other areas of the body
|
|
is being controlled by the brain.
|
|
So it's not like you can use your entire brain specifically for processing,
|
|
unless you were somehow, I was about to go into true tinfoil hat,
|
|
but I'll save that for another time.
|
|
Now most of us, we know about CPUs that go on our computers,
|
|
and we typically don't refer to the human brain as a CPU.
|
|
I'm doing it now to sort of, you know, connect some dots.
|
|
Our CPU takes information that we've put into our computers,
|
|
and it processes it similarly to how we process information
|
|
shared between human beings.
|
|
So right now, I'm sending information to you
|
|
and you're processing it using your human CPU.
|
|
These are very light instructions you're receiving so far,
|
|
but it's about to pick up.
|
|
So just bear with me.
|
|
Now, the type of instructions we normally send to the human CPU,
|
|
which is conversations one-on-one,
|
|
sometime we'll do group efforts,
|
|
but information is usually lost whenever people speak at the same time.
|
|
So you'll have multiple people trying to say something at one time
|
|
and that generates noise.
|
|
So instructions are lost until the communication is done more efficiently.
|
|
Now in software, one of the things we do,
|
|
especially I'm going to stick to open source software,
|
|
we collaborate on open source software.
|
|
So many talented individuals use their talents
|
|
to make one bit of software better over time.
|
|
And it's not just programmers, right?
|
|
It's not just people who actually type in the instructions
|
|
that will ultimately be compiled into usable software.
|
|
Sometimes it's people who are just passing by who audit the source code
|
|
and maybe they don't have the time to implement the actual changes,
|
|
but they can give information about what areas of the source code
|
|
contains of vulnerability.
|
|
And this is usually discovered because of examining other software
|
|
and seeing those vulnerabilities occur
|
|
in that other software,
|
|
so that information is being passed from one project to another project
|
|
in order to increase security in both projects.
|
|
So by the end of this entire process,
|
|
once you compile that software from the source code,
|
|
there has been information brought in from countless sources.
|
|
I mean, we can keep track of some of it
|
|
if you're using something like version control software.
|
|
There's some information that can be tracked,
|
|
but there's no real way to keep track of all of the information.
|
|
You know, every person you've ever spoken to
|
|
about coding practices was the best practices to use
|
|
when creating all of these functions and things
|
|
to reduce vulnerabilities.
|
|
Users just receive something that's excellent in desire
|
|
and that's because it's community driven.
|
|
The entire community has inputted some donate money
|
|
so that more time can be spent on a project.
|
|
Others donate their time and energy
|
|
to help polish the project.
|
|
Users can also give back feedback through telemetry and things
|
|
so that way the developers can understand
|
|
what areas need more attention
|
|
because these areas are used more
|
|
and here's where users are witnessing the most frustration.
|
|
So what it all boils down to is
|
|
there's a lot of information circulating
|
|
around a single piece of software.
|
|
All of that information is being processed
|
|
by the CPU and your computer.
|
|
Now let's stop and think about the human CPU
|
|
just a little bit more because when you're interacting
|
|
in any situation, especially online,
|
|
and I'm gonna keep our focus on the online interaction,
|
|
most of the time we do not consider
|
|
all of the information when interacting.
|
|
Stop and think about it.
|
|
Some human beings are on the internet right this second
|
|
and they're being asked to provide money
|
|
for a situation that has not been well presented.
|
|
I took the liberty of finding three recent scenarios
|
|
that have occurred online
|
|
and I put them down the show notes.
|
|
We're gonna discuss them a little bit.
|
|
The first scenario we're gonna discuss,
|
|
a human being was asked to provide money for information.
|
|
This information would ultimately return itself
|
|
as more money to this human being
|
|
and it would do so far quicker
|
|
than the human beings normal route for acquiring money,
|
|
meaning going out and working,
|
|
performing some sort of service,
|
|
payment due for services rendered, that kind of thing.
|
|
That's the tried and true method for achieving
|
|
in today's world, but when you get online,
|
|
there these accounts floating around
|
|
which are being managed by human beings,
|
|
but at the time that most humans
|
|
are interacting with these accounts,
|
|
it's driven by a piece of software.
|
|
We just refer to that as a bot.
|
|
So the unsuspecting user,
|
|
the human being interacting with this bot
|
|
is being given a scripted bit of information.
|
|
This script has been tested numerous times
|
|
through trial and error
|
|
and the way they've designed it is,
|
|
was the least amount of effort
|
|
into getting the most return.
|
|
Here's the least amount of information
|
|
we need to provide to any actual human being
|
|
on the internet that will influence that human being
|
|
into separating from their hard earned money.
|
|
Now in this scenario,
|
|
which I'm going to refer to as scenario one,
|
|
the human being is on platform.
|
|
The human being encounters an attacker.
|
|
Again, the attacker most likely sent out a bot.
|
|
The bot controls an account
|
|
and the account only has one job,
|
|
communicate with real human beings,
|
|
attempt to take them off platform.
|
|
Once off platform, begin the attack.
|
|
Now the purpose for going off platform,
|
|
well let's back up for a little bit.
|
|
Before we discuss going off platform,
|
|
let's talk about the interaction,
|
|
the human being online in order to be considered a mark,
|
|
someone who is, well, easily influenced by this scam,
|
|
they usually look for people who are in desperate situation.
|
|
In a desperate situation,
|
|
many human beings will not think,
|
|
they will not process or seek as much information
|
|
as possible to process during a situation.
|
|
If you need money and a mysterious stranger
|
|
from nowhere shows up with money,
|
|
some human beings typically bolt on any excuse
|
|
to just engage with that human being.
|
|
The attacker doesn't necessarily know that you're desperate,
|
|
not all the time.
|
|
A lot of the time is just send the bot out
|
|
to communicate with anyone, right?
|
|
The bot will send you a private message
|
|
informing you you can get a lot of money
|
|
in a little bit of time for little to no effort.
|
|
If you respond, it continues to engage with you,
|
|
thus bringing us to the next step,
|
|
which is to take you off platform.
|
|
The reason for this is the platform
|
|
that you're currently on is the hunting platform.
|
|
The dirty work that's about to happen
|
|
needs to be done elsewhere
|
|
because once the scammer is caught
|
|
and there's evidence on platform
|
|
that this account is being driven by a scammer,
|
|
will all the work in setting up this botan
|
|
using it to influence other users
|
|
and to giving up their hard earned money
|
|
for nothing at all?
|
|
Well, all of that hard work goes down the drain
|
|
because the account will get flagged,
|
|
it'll get banned, and then this camera
|
|
I have to start all over again with a new account.
|
|
And I know some of you might be thinking,
|
|
well, the accounts are free on most platforms,
|
|
you just make one.
|
|
Well, here's the thing, with a brand new account
|
|
that has no history at all
|
|
and does not communicate with anyone,
|
|
no friends or family or anything,
|
|
that normally stands out
|
|
and it will stand out at a glance.
|
|
So you don't have to really do a lot of digging
|
|
to determine this is a bot account.
|
|
Now what the attackers will do
|
|
once they've stolen an account from a victim,
|
|
that account which has a history
|
|
which has friends attached to it
|
|
which has all of the things that can help it to masquerade
|
|
as a real human being,
|
|
that account will now be deployed in scams.
|
|
So the attacker has an account
|
|
which appears human on the surface.
|
|
It has a victim in its clutches
|
|
and it is now dragging the victim off platform.
|
|
Because see on platform,
|
|
there's the image of a human being off platform.
|
|
It can be any old account.
|
|
It can be a brand new account
|
|
just created five seconds ago.
|
|
There's almost certainly going to be no effort
|
|
to verify a second account
|
|
because the first account that the user engaged with
|
|
gave the impression of being a human being.
|
|
And if the user wanted to just look a little further,
|
|
there was enough information in that account
|
|
that could lead one to, you know,
|
|
anyone to believing that this is an actual human being.
|
|
Look, they've got friends, they've got family,
|
|
they've uploaded photos and all sorts of things, right?
|
|
This is a real human being.
|
|
And this human being is telling me
|
|
there's a very good business deal
|
|
where I can make a lot of money really quickly.
|
|
I just need to speak with him over here
|
|
on this other encrypted service off platform.
|
|
Now, once the user goes off platform,
|
|
they engage more closely with the attacker,
|
|
exchanging payment information
|
|
and other personal information.
|
|
The attacker normally leads them to some site
|
|
that is controlled by the attacker.
|
|
The site is designed to look like some sort of marketing,
|
|
some sort of money marketing site
|
|
or whatever stocks or day trading, you know,
|
|
one of the popular attacks involve digital assets.
|
|
So cryptocurrencies, NFTs, anything blockchain related
|
|
because there's so much hype around this.
|
|
Most users do not understand this technology,
|
|
this blockchain technology.
|
|
They've just heard a lot of excitement surrounding it
|
|
and that excitement takes the place of valuable information.
|
|
So instead of processing information
|
|
to learn rather than not,
|
|
this is a great investment.
|
|
They process the excitement.
|
|
So if I just shouted, wow, this is great.
|
|
I love it.
|
|
I love this digital asset.
|
|
Another human being will process that excitement
|
|
in those words.
|
|
Now, if they only process the words themselves,
|
|
you don't understand that there's actually
|
|
no benefit in those words,
|
|
just saying that gives you nothing.
|
|
But if you process the excitement in it,
|
|
well now there's this false sense of value stored in the words.
|
|
And now if I direct you toward a site using those words,
|
|
now suddenly you're processing false data with the excitement.
|
|
Now they do this in a number of ways as well.
|
|
It's not just somebody shouting something crazy
|
|
like I've just done.
|
|
Sometimes it's videos.
|
|
They'll show a video like a 10 second video clip
|
|
of someone just throwing a stack of $100 bills onto a bed.
|
|
You know, something that just shows great wealth,
|
|
large sums of cash, maybe jewelry
|
|
or something like that, expensive things.
|
|
Now, if you just process that,
|
|
here's a video of something that has absolutely nothing
|
|
to do with what I want.
|
|
And they're showing me this as though
|
|
I'm supposed to be able to use it for something.
|
|
That's what logic will tell you.
|
|
This is just a 10 second video of absolutely nothing.
|
|
But if you're processing the excitement,
|
|
combine with this video of large sums of money,
|
|
which can be done if one enables the desperation flag
|
|
in the human CPU.
|
|
Now you can begin to process almost anything, right?
|
|
You can compile all of this useless information,
|
|
the excitement in the words,
|
|
wow, such a great investment.
|
|
Combined with videos of, you know,
|
|
probably fake currency being thrown around
|
|
as though it's just paper because ultimately,
|
|
that's what it is.
|
|
Now you can see how a user who ordinarily should be able
|
|
to see this as absolutely no value.
|
|
Now they're somehow processing tremendous value.
|
|
So they hand over their personal information
|
|
to the attacker, the attacker,
|
|
configures, there's a website that is masquerading
|
|
as some sort of trade day trading site or something.
|
|
And they tell the victim, okay,
|
|
head over to the site and look at your investment.
|
|
The user who is now in a victim
|
|
because they've already given over personal information
|
|
and or payment information.
|
|
You're not a victim at this point.
|
|
You were just the unsuspecting user
|
|
until the attacker has now benefited, gained from you.
|
|
Now the victim is looking at the site.
|
|
They see that they've invested, say, $100.
|
|
And in just a few seconds, even minutes,
|
|
that 100 has went up to 300, through 150, 400, 500, 700.
|
|
Whoa, that's major increases just like the attacker told me,
|
|
I just got hundreds of dollars for doing absolutely nothing.
|
|
But remember, we've enabled the desperation flag
|
|
in the human CPU, the images that they're seeing
|
|
on this website mean absolutely nothing at this point in time.
|
|
The attacker then says, well, you could really maximize
|
|
your investment, but you got to do it now
|
|
while the process is hot, right?
|
|
The money's moving around like nothing we've ever seen before.
|
|
You better take advantage of this while it's happening.
|
|
So now the victim authorizes additional payments,
|
|
giving more information, maybe even handing over access
|
|
to a bank account.
|
|
Now some banks will flag suspicious activity.
|
|
However, when the attacker is in contact with the victim,
|
|
the attacker can now provide influence.
|
|
When the bank sends a message, hey, we think you're being scammed,
|
|
you should watch out, look out for these signs, right?
|
|
Here's information to reduce negative impact
|
|
to your financial stability.
|
|
Well, the victim is still in direct contact with the attacker.
|
|
So the attacker explains, oh no, this is just a safety measure.
|
|
They have to tell you that.
|
|
So just ignore it, right?
|
|
Like click yes on the pop up.
|
|
Never mind that is a licensed agreement that you are signing
|
|
and you will be well, very surprised in the near future.
|
|
Just click yes now so that you can begin benefiting.
|
|
So the user has a lot more information to process now.
|
|
You've got a bunch of useless information,
|
|
you know, the videos they excitement.
|
|
You've got the information from the website,
|
|
which is also useless because it hasn't actually proven
|
|
anything to you.
|
|
You're just watching numbers on a web page go from 100 to 700.
|
|
But that actually translates to nothing.
|
|
So it holds the same value as the videos.
|
|
But then you've also got other information from your bank,
|
|
your bank, a place that has proven it can keep your money safe.
|
|
A place that you have went in been verified authenticated
|
|
that you are the customer.
|
|
They have provided you with information that allows you
|
|
to store money there and perform other services
|
|
with money there.
|
|
So that is a legitimate service for you that you trust.
|
|
They're now telling you something's wrong.
|
|
You should be careful right now, something is wrong.
|
|
The scammer, the person you do not know
|
|
who has you processing all of this hype,
|
|
all of this excitement is telling you to ignore
|
|
the trusted organization that you have physically been to
|
|
and have signed documents and everything,
|
|
ignore them and trust the scam, trust the illusion.
|
|
It's absolutely absurd when you think about it logically.
|
|
It's like for you programmers out there,
|
|
it's like a Hello World program, right?
|
|
Three to five lines of usable code instructions
|
|
that will simply print Hello World on the screen, right?
|
|
Now imagine that with about 4,000 lines of comments.
|
|
It's absolutely ridiculous.
|
|
There's absolutely no reason to have this.
|
|
But when you enable the desperation flag,
|
|
well, suddenly now you have more information, right?
|
|
Suddenly, suddenly now you have more things to consider.
|
|
I wouldn't even call it information.
|
|
You just have more things to apply to this situation.
|
|
Now it all becomes real to our victim,
|
|
the moment they try to withdraw the money.
|
|
You see, the website that they're looking at
|
|
tells them that $100 has turned into seven
|
|
and they have just made another deposit of, you know,
|
|
maybe another $100 or so.
|
|
So they're expecting to see $1400, you know, $1,400.
|
|
The attacker decided to make it look a little bit better
|
|
like, okay, so now you've instead of getting $1,400,
|
|
there was like a bonus or something.
|
|
So now you've got $2,000.
|
|
So out of $200, you now have $2,000.
|
|
You know, this is an attempt to get you to hand over more information,
|
|
more money.
|
|
But maybe you're like, okay, okay, I will do that.
|
|
But first let me take some of this money out.
|
|
And then I'll reinvest it, right?
|
|
You know, try to keep a cycle going here.
|
|
Well, when you try to withdraw the money, see there's a problem.
|
|
There's some taxes and things you have to pay on it.
|
|
And then there's some processing fees you have to pay on it.
|
|
And then there's the other fees and blah, blah, blah, blah.
|
|
So now you end up spending more money and more money and more money
|
|
just so you can get that $2,000.
|
|
So now you have spent about $600 trying to get that $2,000
|
|
that's on the screen because you paid all these fees
|
|
and processing and taxes and all this other stuff.
|
|
Eventually you're just saying, okay, enough.
|
|
Just give me the money.
|
|
I'll invest more, but just give me the money.
|
|
That's when you get blissful silence.
|
|
Suddenly the attacker's done with you now.
|
|
They've gotten all the money they can get out of you
|
|
and this go around.
|
|
So there's no need to talk to you anymore, right?
|
|
Just go ahead and block you.
|
|
You're gonna continue to ask for more.
|
|
And if you're not putting in any more money into the machine,
|
|
the scam machine,
|
|
where you're taking a valuable scam machine time.
|
|
So they're just gonna cut you off now.
|
|
Now, here's the thing, they're not done with you
|
|
because they successfully scammed you.
|
|
Your information goes on to another list.
|
|
But for now, the scam or the attacker
|
|
you're currently dealing with cuts you all.
|
|
They block you on the platform.
|
|
So when you return to the platform to try and contact them again,
|
|
suddenly you can't, you've been blocked.
|
|
Well, you want to report them, right?
|
|
You want to tell everybody that,
|
|
hey, I've been scammed.
|
|
Well, where's the evidence?
|
|
What messages do you have that you've been scammed?
|
|
Well, I have these messages from another platform,
|
|
from another user name.
|
|
Oh, suddenly you're seeing the problem here.
|
|
It is now becoming clear that you have no way of proving
|
|
you've just given money to this individual.
|
|
But there's no problem.
|
|
Maybe you can't do anything on that platform.
|
|
However, your bank controls the money, right?
|
|
You can go to your bank and stop the money.
|
|
It's simple, it's easy.
|
|
So you contact your bank, you tell your bank,
|
|
hey, I think I've been scammed, stop that money.
|
|
You know how in the movies, whenever there's a chase,
|
|
the main character jumps into a taxi and goes,
|
|
follow that car.
|
|
Well, that's you, you hop into your bank's car
|
|
and you say, follow that car,
|
|
meaning the scammer that's dashing away with your money.
|
|
The bank, instead of putting the car in drive
|
|
and racing off after that scammer,
|
|
instead, the bank driver of the bank's car
|
|
turns back and look at you and say,
|
|
but you've authorized this payment.
|
|
And you say, yes, yes, I know, but it was a scam.
|
|
It was a scam.
|
|
I didn't know that it was a scam at the time.
|
|
So that's why I authorized it.
|
|
The bank didn't tell you, yeah, I know,
|
|
but we're not going to go chasing after it.
|
|
You've authorized it.
|
|
It's gone.
|
|
Once you've authorized it, put your signature on it.
|
|
It is done.
|
|
So imagine you sitting in the car with a bank's driver
|
|
in the bank's car and you're telling him,
|
|
look, stop talking, put the car in drive and go after him.
|
|
We're losing him.
|
|
The bank's driver is still just staring at you, saying,
|
|
look, it's done with.
|
|
There's nothing we can do.
|
|
Even if we caught him, there's nothing we could do.
|
|
You're asking, how can it be?
|
|
I'm telling you, it was a scam.
|
|
The information, I have the information.
|
|
I have these these images and stuff in this website
|
|
and these these posts from all these other platforms
|
|
and well, the bank's driver's telling you,
|
|
I can't do anything with that.
|
|
And you would really love to know you really,
|
|
how can you do nothing?
|
|
How is it?
|
|
You take my money and send it over to these people.
|
|
And now you're telling me, you cannot even stop it.
|
|
You can't trace it.
|
|
You can't do anything in the bank's driver's telling you,
|
|
like, yeah, there's absolutely nothing we can do about it.
|
|
You see, you use this peer-to-peer app designed
|
|
for sending money from point A to point B.
|
|
It is not a consumer technology
|
|
in the way that you're thinking of it.
|
|
You see, you're not receiving a receipt for a purchase
|
|
and then you can refund this purchase
|
|
if something goes wrong.
|
|
No, you're just sending money.
|
|
You're just taking money at point A,
|
|
putting it in a slingshot and firing it out to point B.
|
|
And that's it.
|
|
And now there's an awkward silence
|
|
between you and that driver as they just explained to you.
|
|
Now get out the car
|
|
because I gotta wait for other customers
|
|
they need to go somewhere.
|
|
So there is no exciting high-speed chase for you
|
|
to get your money back.
|
|
No, it just ends.
|
|
So you go on, you contact the police
|
|
and everybody else, they all tell you the exact same thing.
|
|
When you put your money into a slingshot
|
|
and fire it into the void,
|
|
don't be surprised if there is no way to recover it.
|
|
That's just the way it works.
|
|
The same thing is true
|
|
if you were to light your money on fire.
|
|
Once it turns into smoke,
|
|
you cannot just grab the smoke back
|
|
and put it in your pocket
|
|
and then spin the smoke like it was the money.
|
|
It doesn't work that way, it's gone.
|
|
So I know most of you must be thinking.
|
|
Now that I'm scammed, I have to find a way to recover.
|
|
Oh, at least it's over,
|
|
but I got a lot of work to do.
|
|
I spent like $600, I got things to pay for.
|
|
So I have to make a lot of decisions.
|
|
Now tough decision.
|
|
Well, what you don't realize is
|
|
the scammers aren't done with you yet.
|
|
You see, suddenly now someone contacts you
|
|
saying, hey, we've gotten a report on our desk
|
|
that you've been recently scammed.
|
|
We can help you recover your funds.
|
|
Now you must be thinking,
|
|
how convenient this is exactly what I need.
|
|
Someone to help me recover from this scam.
|
|
Goodness, just in the nick of time.
|
|
So they tell you everything you need to do.
|
|
You need to provide this information
|
|
so that we can have you in our system
|
|
properly, right?
|
|
You're a client, you're a customer.
|
|
Okay, so now that we always see here,
|
|
we see that you have spent this amount of money.
|
|
Okay, we see this scam and process
|
|
and we think we can recover.
|
|
Oh, you spent $600.
|
|
We think we can get about $530 at $600 back.
|
|
So you're thinking, oh, that'll do.
|
|
That'll do, that's fine.
|
|
So what do I gotta do to get this $500 back?
|
|
And they're telling you, oh, it's very simple.
|
|
If you go ahead and give us $100 now,
|
|
we can go ahead and get that process set up
|
|
and we'll also need your bank information
|
|
so that the money can be wired back to you.
|
|
What we'll do is we'll pay you from our account
|
|
and then when we get the money back from the scammer,
|
|
we'll keep that,
|
|
but we're gonna pay you now from our account.
|
|
But first we need your bank information,
|
|
your account number, your routing number,
|
|
your pen to your bank, all of that.
|
|
We need that.
|
|
So you give them the information they asked for.
|
|
They say, okay, now head over to our website over here
|
|
and I want you to see if the process is done appropriately.
|
|
You head over to their website,
|
|
their website redirects you to,
|
|
say for instance, if you told them you do Bank of America,
|
|
it redirects you to a site that looks like Bank of America
|
|
and it has your information in there
|
|
and they say, okay,
|
|
we need you to authorize this transaction, right?
|
|
We're gonna send you $530.
|
|
We need you to click yes and authorize the transaction.
|
|
All right, so you go to do the authorization,
|
|
it's asking you, do you want to do it?
|
|
Make sure you type the amount in,
|
|
the exact amount you're expecting to come over.
|
|
So you go to type in the $530,
|
|
except you accidentally hit an additional zero.
|
|
Oh no, you accidentally transferred $5,300.
|
|
From these really nice people
|
|
trying to help you recover your money.
|
|
So they're shocked as well.
|
|
They're asking you, why did you transfer $5,000?
|
|
We told you only $500, oh my goodness, oh no,
|
|
this is terrible.
|
|
So you're thinking, oh, how do I give the money back?
|
|
Cause I don't want to rob you,
|
|
I just want my money back.
|
|
So they tell you no problems.
|
|
Subtract the $530 from the $5,000
|
|
and send the rest back to us.
|
|
So you try to do it on the site,
|
|
but oh no, the site kind of closes it.
|
|
It kind of logs out or something, right?
|
|
It glitches.
|
|
No problem.
|
|
All you have to do is log back in and send the money.
|
|
So now you go to log in to the authentic site,
|
|
the real bank of America,
|
|
and you set up the payment to go to them.
|
|
They tell you, okay, yep, yep,
|
|
I understand you lost the information.
|
|
We'll tell you exactly how it works.
|
|
You set up the information, you send it via Venmo
|
|
or a Zell or whatever,
|
|
whatever peer to peer app that they have,
|
|
you set it up or cash app,
|
|
they'll probably ask that you use cash app as well.
|
|
That's another one of these peer to peer systems.
|
|
You send the money over to them,
|
|
because I mean, after all,
|
|
you really, really don't want to rip these people off.
|
|
They're helping you get your money back.
|
|
So this is great.
|
|
So now that the process is done,
|
|
you've got your money back.
|
|
You've given these nice people their money back,
|
|
you know, that $4,000 that you accidentally took
|
|
from them, you've given them their money,
|
|
it's completed, you're good.
|
|
A message from your bank pops up saying,
|
|
you've just spent $4,000.
|
|
And you're thinking, oh, okay, yeah,
|
|
that's because I just sent them the money, right?
|
|
I just gave these people their money back.
|
|
It's no big deal.
|
|
You're probably gonna get a call, probably.
|
|
But let's say, for instance, you don't get a call.
|
|
No one contacts you.
|
|
Instead, when it's time to pay bills,
|
|
you know, mortgage and other things
|
|
that need to be paid, you realize, holy smokes,
|
|
where's the money?
|
|
And my account is in the negative.
|
|
You start tracing back, you know,
|
|
most of these accounts online
|
|
that give you like calendar view,
|
|
and what money was spent on what day blah, blah, blah.
|
|
And you realize that $4,000 that went out?
|
|
Yeah, that was not because of $5,000
|
|
that was added to your account.
|
|
So you sent the additional back to the recovery agency.
|
|
No, you just simply sent out $4,000, that was it.
|
|
But what happened, I thought, I saw it online,
|
|
I saw it on the internet and it said this
|
|
and I thought that and, well, let me explain it to you.
|
|
After you've been scammed for some smaller amount,
|
|
rather it's just for your information
|
|
or for your information or money,
|
|
the scammers keep your information
|
|
and they mark you on the database as you're a mark.
|
|
You're somebody that can easily be scammed.
|
|
So what they do, they hand you over to the next scammer
|
|
on the chain, you know, basically they're co-workers,
|
|
co-scammers.
|
|
Now they wait a little while
|
|
and contact you at just the right moment to inform you
|
|
because they already know you've tried to contact the police,
|
|
right, everybody does the exact same step.
|
|
You run out and try to get help to get your money back.
|
|
So now we won't feel strange when someone contacts you
|
|
to tell you, hey, we've heard you lost money
|
|
and you'll have the feeling that they must be legit
|
|
because in their system, they seem to know
|
|
the exact amount of money you lost.
|
|
They must be legit, right?
|
|
Or they must be the people that scammed you
|
|
in the first place.
|
|
So basically what has happened here is
|
|
the scammers have taken a second bite of the apple.
|
|
They got the first bite
|
|
when they scammed you the first time taking your information
|
|
in the smaller amount of money,
|
|
you know, the 100 which grew to about 600
|
|
in the first scam.
|
|
That was a delicious bite of the apple
|
|
and they got a lot of wonderful information from you as well.
|
|
Bank account information, your full name, address,
|
|
telephone number, email account, everything.
|
|
They've got a lot of good information from you.
|
|
Now when they come back around to scam you the second time,
|
|
they can confirm all of that information
|
|
they've gotten from you as well as getting additional
|
|
information by getting bank information,
|
|
routing and pens and everything else that's necessary
|
|
and get even more money from you in a process.
|
|
And once again, you've used one of those slingshots
|
|
made specifically to send money into the void.
|
|
Now a lot of times with these recovery scammers will do,
|
|
they'll get their victims to make a short video.
|
|
So they'll get you to take your phone out,
|
|
record a short video of yourself being happy and excited
|
|
that this company has just helped you got in your money back.
|
|
You've just recovered almost fully using this company
|
|
and you send that video to them.
|
|
This is before you've discovered it was all a second scam
|
|
and you just lost even more money.
|
|
So they have your information, they have your money
|
|
and they have marketing material that you've generated
|
|
with an authentic look and feel that they can use
|
|
on their next victim and they're still not done with you.
|
|
You will receive more scams in the future
|
|
because you're a mark in their database.
|
|
They'll run you through the gambit,
|
|
every scam that they could possibly run on you,
|
|
they will continue to run on you.
|
|
Now if all of this sounds terrible
|
|
and it sounds overwhelming,
|
|
if it sounds like if you found yourself in a situation
|
|
you absolutely would not know what to do.
|
|
Take the moment now to take a deep breath.
|
|
Be thankful that you're not in a situation
|
|
and be thankful you have knowledge now,
|
|
the ability to stop, think and process the data.
|
|
What is the information that's being placed in front of me
|
|
and how is it relevant to what I'm attempting to accomplish?
|
|
For sure, we'd all like more money
|
|
but I know how to make money, I have skills.
|
|
I'm employed to use my skills to make money.
|
|
This other thing on the internet
|
|
that is being placed in front of me,
|
|
how is it relevant to making money?
|
|
If you don't understand it,
|
|
gain more information on it
|
|
and not from the people presenting it to you in the first place
|
|
because think about it.
|
|
You can always spend more time investigating a situation
|
|
even if you don't wanna do it today.
|
|
You can do it tomorrow or the day after that.
|
|
Just spend the time to investigate to look at it.
|
|
If it didn't make sense
|
|
or if you don't even wanna spend the time to look at it,
|
|
if it just seems like it's too much, leave it alone
|
|
because if even investigating this situation
|
|
is too much for you to be bothered with,
|
|
imagine once you're five, $6,000 in a hole because of it.
|
|
Imagine trying to dig your way out.
|
|
Imagine even explaining to your loved ones
|
|
how you got there in the first place
|
|
because you gotta get help, right?
|
|
You cannot just sit here in this hole.
|
|
Somebody has to help get you out of it.
|
|
How do you explain to your loved ones
|
|
the people that will ultimately come to free you
|
|
from this situation?
|
|
How do you explain how you got there?
|
|
The key to it all is taking as much information
|
|
as you can about it and process it.
|
|
Don't allow yourself to process a bunch of useless nonsense,
|
|
you know, hype, videos that mean absolutely nothing
|
|
of people smiling and throwing around cash.
|
|
Whoo, what does that mean to you?
|
|
You're not smiling and throwing around cashier.
|
|
You're attempting to get money so that you can pay bills.
|
|
Even if you had the money that they're showing in the video,
|
|
you would be investing it towards something better.
|
|
So none of that makes any sense to you.
|
|
The technology they want you to invest your money in
|
|
seems like it's all around a bother.
|
|
You don't understand it.
|
|
So why even bother with it?
|
|
If you can't even make sense of it,
|
|
do you think it's a great idea to put your money in it?
|
|
Nah, let it go because think about it
|
|
as long as you're still in control of your money
|
|
and your data, you've won.
|
|
Just stop, think, process.
|
|
Take additional time if you must
|
|
because remember, you're still in control of your money.
|
|
Even if it's not a lot of money, you still have it.
|
|
If you're unable to think because they're trying to
|
|
push this idea of urgency, the window is closing
|
|
for you to maximize your investment, must act now.
|
|
Close the window, delete them, get rid of them.
|
|
Because they're asking you to act with less information,
|
|
do not benefit from having more information,
|
|
act now with no information or useless information.
|
|
Because believe me, when the time comes for you
|
|
to attempt to recover, all of that will be relevant.
|
|
All right, so this is scenario one,
|
|
and we're going to end the show here.
|
|
And our next show will discuss another scenario.
|
|
Until then, take some time and consider everything
|
|
that's been put before you.
|
|
How often are you acting without the necessary information?
|
|
And are you processing information
|
|
that is not beneficial to your cause?
|
|
Do you see yourself as being vulnerable
|
|
because you accept in information
|
|
that may not be beneficial?
|
|
Because there's nothing wrong with receiving the information.
|
|
The problem is, if you cannot process it
|
|
and see that it is beneficial to you,
|
|
yet you still act on it, that's where the problem is.
|
|
So, not giving you enough, go forth, enjoy the day,
|
|
and think on it.
|
|
Pack your wallet and still in your pocket
|
|
with all of your money and all of your data.
|
|
You're good, so long as it stays there.
|
|
I'm some guy on the internet.
|
|
This is Hacker Public Radio.
|
|
We'll catch you in the next episode.
|
|
You have been listening to Hacker Public Radio
|
|
at HackerPublicRadio.org.
|
|
Today's show was contributed by a HBR listener
|
|
like yourself.
|
|
If you ever thought of recording podcasts,
|
|
then click on our contribute link
|
|
to find out how easy it really is.
|
|
Hosting for HBR has been kindly provided
|
|
by an honesthost.com,
|
|
the internet archive, and our sync.net.
|
|
On this advice status, today's show is released
|
|
under Creative Commons' Attribution 4.0 International License.
|