Search the Community
Showing results for tags 'williams'.
-
A former cop and owner of the website Polygraph.com has pleaded guilty to five charges of obstruction of justice and mail fraud for teaching people how to cheat lie detector tests. Douglas Williams, 69, of Norman, Oklahoma, faces up to 20 years in jail and up to a $250,000 fine for selling polygraph-evasion training to two clients who were actually part of an undercover sting operation. The first undercover operative posed as an agent with the Department of Homeland Security and told Williams that he wanted to conceal the fact that he been involved with smuggling drugs through the airport where he worked. A second undercover agent told Williams he was applying for a job with the Border Patrol and wanted to hide his criminal history. Williams told both clients – who paid him $1,000 if they traveled to his home and $5,000 if he traveled to meet them (plus travel expenses) – that they should deny they had received his training. According the indictment [PDF] brought against Williams, when the operative posing as a DHS agent admitted he was lying about his innocence, Williams exploded: "I told you I’m assisting you under the assumption that you are telling the truth. What the fuck do you think you’re doing dumbass? Do you think you have, do you think you have like a lawyer confidentiality with me?" But in truth, Williams was undeterred and continued to train the self-styled DHS agent. He grew paranoid and told his client to change his cell phone number and to respond to a new email he sent him from "the paranoid chicken." Then just hours later he changed his mind about changing the telephone number and focused instead on getting paid through an untraceable money order. Money talks Ten days later, Williams flew to meet the so-called DHS agent, who again admitted he had helped smuggle drugs on four occasions. Nonetheless, Williams continued to train him in how to lie – which is a big no-no when you work for the US Department of Justice. "Lying, deception and fraud cannot be allowed to influence the hiring of national security and law enforcement officials, particularly when it might affect the security of our borders," said Assistant Attorney General Caldwell of the Justice Department’s Criminal Division in a statement announcing Williams' guilty plea. "Today’s conviction sends a message that we pursue those who attempt to corrupt law enforcement wherever and however they may try to do so." Williams was more careful when talking about his services in a promotional video. "Even if you tell the complete truth, you will fail 50 per cent of the time," he said in the video, explaining that lie detectors assume that being nervous when you are asked a question indicates you are guilty of whatever was asked. "Why fail?" Williams asks. "Just because you're nervous doesn't mean you're lying. I can teach you how to pass, nervous or not, no matter what." But the Justice Department holds that he crossed the line when he readily trained people who he believed had criminal records and were hoping to conceal their crimes from government authorities. According to the indictment, which was handed down in November, Williams told one of the undercover agents, "I don’t give a damn if you’re the biggest heroin dealer in the fucking United States." Later he added: "I haven't lived this long and fucked the government this long, and done such a controversial thing that I do for this long, and got away with it without any trouble whatsoever, by being a dumb ass." The DoJ would beg to differ. Source
-
After being disrupted by law enforcement in December 2013, the peer-to-peer (P2P) ZeroAccess botnet – also known as Sirefef – has resumed advertising click fraud activities, according to the Dell SecureWorks Counter Threat Unit (CTU). The team first noticed the botnet reactivating from March 21, 2014, to July 2, 2014, and then on Jan. 15 it started to distribute click-fraud templates to compromised systems, a Wednesday post indicates, noting that the botnet is made up of hosts from previous compromises and there have been no observed attempts to expand the botnet. Currently, the ZeroAccess botnet's infection base is around 55,000 systems, which is considerably lower than the reported two million systems that were infected when the botnet was taken down at the end of 2013, Jeff Williams, director of security strategy with the Dell SecureWorks CTU, told SCMagazine.com on Friday. “The current campaign may be small by design [perhaps in order to] evade detection, and it may be largely outside of the United States and Europe as a method to avoid those law enforcement agencies which were involved in the takedown operation (FBI in the U.S. and EC3 in Europe),” Williams said. According to a geographic distribution of ZeroAccess botnet peers included in the post, Japan has 15,322 hosts, or 27.7 percent of total infections. India is the runner-up with 7,446 hosts, or 13.5 percent of total infections, and the U.S. came in fifth with 2,540 hosts, or 4.6 percent of total infections. “There are a variety of ways that a criminal will infect systems with malware,” Williams said. “A common method right now is through the use of an exploit kit, embedded in a hidden frame on a webpage. In some cases, these malicious frames are part of a malicious advertising campaign and delivered through the same advertising networks which they are intending to defraud.” Threat actors typically benefit from click fraud through the cost per click model of online advertising, Williams said. He explained that “the miscreant will leverage software – often in the form of a bot – to click through advertisements repeatedly in order to either generate revenue in a [cost per click] model or to exhaust the advertising budget of a rival.” Click fraud often involves the use of a botnet so that clicks on advertisements are not seen coming from the same computer, Williams said. He explained that clicking from the same computer would trigger anti-fraud measures and that the clicks would be removed from the payout calculations, whereas using a botnet helps fraudsters remain undetected. “The losers in a click fraud scenario from a monetary perspective are the advertisers,” Williams said. “They have invested money to have their advertisements viewed by people who may be interested in their product or service. They pay a finite amount which, when the [cost per click or cost per mille] limit is reached for that campaign, their ads are no longer displayed.” Source
-
- advertising
- botnet
-
(and 3 more)
Tagged with: