“Pig Butchering” The Ultimate Financial Slaughter

Introduction:

Imagine having someone you thought you could trust emotionally manipulate you, swindle your life savings, and leave you to pick up the pieces of a shattered future.

This isn’t just a cautionary tale; it’s a horrifying reality for thousands who fall prey to the rapidly growing “Pig Butchering” scam.

A friendly hello from a charming stranger quickly turns into a nightmare where the line between love and fraud blurs, ruthlessly butchering your financial security.

This global scheme lures you in with promises of wealth, only to fatten you up for a merciless slaughter—leaving you broken, both emotionally and financially. If you think it can’t happen to you, think again.

Thousands of people have lost enormous sums of money after falling for fraudulent internet investment schemes set up by really attractive strangers who initiate online discussions with them.

One type of fraud on social media and dating services is rapidly expanding globally.

“Tinder trading scam” is what investigators term it, but the criminals mockingly call it “pig butchering.”

If you’re like most people, a stranger with an attractive social network profile picture has probably contacted you via chat or text at least once.

A simple “Hello” or a seemingly friendly misunderstanding about why your phone number appears in that person’s contact book is the beginning of it all.

These messages are frequently anything but random, though.

These are the first steps in a process that will eventually guide you from a pleasant conversation to online investing, and ultimately, to witnessing your money disappear into a scammer’s account.

A procedure known as “pig butchering,” which refers to the process of fattening a pig before slaughter, began in China and spread throughout the world during the Corona epidemic.

Today’s criminal networks prey on individuals worldwide, frequently coercing South-east Asian trafficked victims into committing schemes against their consent.

Pig butchering: what is it?

Also referred to as “Sha Zhu Pan or Shazhupan,” or the “Killing Pig Game,” the Pig butchering scam is a kind of long-term fraud and investment scam in which the victim is progressively tricked into contributing more and more money, typically in the form of cryptocurrency, to a fraudulent cryptocurrency scheme.

Their use in social applications is widespread. Victims of dating apps increased from 5% in 2018 to 12% in October 2023.

Through online discussion, the scammer gains the victim’s trust before persuading them to invest in a phoney bitcoin scheme.

Theft of a victim’s property or assets is considered “butchering” or “slaughtering” of the victim.

During the COVID-19 epidemic, the scam, which started in China in 2016 or before, expanded throughout South-east Asia.

The perpetrators are typically victims of fraud factories, where organized crime groups get them to fly overseas under false pretenses, smuggle them to another place, and coerce them into committing fraud.

Tinder connection

Scammers use cunning techniques to steal millions.

Frequently, it begins with a passionate Tinder connection.

Perpetrators first establish an emotional bond.

They then use phoney websites to persuade their victims to invest in cryptocurrencies. In the end, they lost both money and affection.

The bulk of victims to date have been men, despite the fact that the offenders also communicate with female victims, particularly through social media.

The psychological impact on the affected individuals is severe, in addition to the financial harm.

Regrettably, many individuals opt not to report the crime.

Anxiety and depression are possible.

In certain instances, the offenders even encourage the victims to end their own lives.

In order to humiliate someone financially, scammers typically approach them online, establish an emotional bond, or mimic a friendship.

The con artists in the “Tinder Trading Scam” are not pretending to have financial difficulties, in contrast to the so-called “Love Scam,” which is a contemporary online marriage hoax.

Conversely, they try to entice their victims into making their own investments by advertising alluring deals with shares or cryptocurrencies.

The identities of the criminals are fictitious; for example, they use influencers’ images or occasionally intentionally created photos (known as “deepfakes”).

Digital counterfeiting is becoming more widespread.

This kind of deception occurs in every nation. Since more frauds occur daily, legislation should be passed to control this sector and address these issues.

Modus operandi

These scams are systematic and extremely well-organized.

Here’s how scammers typically operate:

First Stage: “Finding the Pig”

We use dating services and social networks to connect with the “prey” or target individual.

Usually, a messenger switch follows immediately. There, scammers entice victims with promises of money and love.

  • They make a fake profile.

Pig butchers typically begin by creating an online persona, often complete with a seductive photo (which they may have stolen) and images that depict a glamorous lifestyle.

  • They made contact.

Scammers begin texting people on dating sites or social networks as soon as they create an online profile.

As an alternative, they can pretend to have found the “wrong number” while calling you over WhatsApp, Viber, Messenger, or another messaging app.

Despite the apparent innocence of this type of contact, you should remain vigilant at all times.

  • They gain the target’s trust.

Talking to the potential victim and earning their trust is the next stage.

Scammers frequently strike up harmless discussions about work, family, and life in an attempt to elicit personal information from their victims that they can use to control them later.

They will create aspects of their lives that mirror yours.

People tend to favor those who are similar to them, after all.

Again, exercising caution is never sufficient.

The second stage is “Fattening Pigs.”

The discussion skilfully veers toward purportedly profitable Internet investing ideas as it goes along.

The sites tricked people into believing they were making a lot of money if they signed up.

To encourage those affected to invest all their savings (more).

  • They begin discussing investing.

Scammers will soon start talking about investments.

They might post screenshots of a brokerage account with impressive data to support their claims about their own purported investing success.

They will make an effort to persuade their targets to register for an online brokerage account. Because the brokerage is fraudulent and does not know the target, the scammer will directly receive any provided money.

The majority of victims are unaware of that final aspect until it is too late.

The third stage involves “Butchering the Pig.”

The criminals attempt to “squeeze” every last penny out of the victims during phase 3.

The concerned party delays any withdrawal or refund requests, charges a substantial additional withdrawal fee, and ultimately terminates the contract.

Apparently, all of the invested money has vanished.

  • Transferring funds to a fictitious account

Scammers will “assist” people in the investing process once they agree to learn investment tactics.

Scammers will describe the process of moving funds from your bank account to a cryptocurrency wallet and then to a phoney brokerage firm.

The fraudster will typically help the process along by suggesting a small initial investment that will undoubtedly provide a profit.

In order to convince victims that the process is reliable, scammers frequently ease their first concerns by allowing them to withdraw money once or twice.

  • Getting people to invest more money

And that’s only the start.

Guides on pig butchering include information on how to take advantage of their financial and emotional weaknesses to trick them into making increasingly larger deposits.

The urge to take out loans, liquidate retirement funds, or even mortgage the house increases after initial promises that investments are risk-free.

  • Cut them off

Targets’ apparent financial success abruptly ends when they reach the limit and lose interest in making additional deposits.

They either experience a significant “loss” that wipes out their entire investment or withdrawals become impossible.

  • They make the most of their desperation.

By telling victims they could recover their losses by depositing more with the brokerage, the con artists tightly controlled the manipulation.

Sometimes, a successful investment may have a “tax problem” that requires additional payments, such as 10% or 20% of the account’s total value.

If the victim pays, the scammer would claim that new challenges have emerged and more fees are required.

Targets never make enough money, no matter how much they pay.

  • Scoffing, they leave

The scammers frequently make fun of or humiliate their victims after they realize they have been duped.

They soon stop talking and take down their phoney brokerage websites.

After that, they start the process over with new goals and publish a new website with a different URL.

In order to give their plan more authenticity, scammers also create phoney brokerage websites and mobile applications, which make it harder for victims to tell them apart from authentic platforms.

To those who are impacted

  • Please examine who is texting you carefully online, particularly if the sender is never available for a video call or in-person meeting and prefers to switch from dating sites to messaging apps as soon as possible after making initial contact.
  • Be cautious if someone asks you to pay with cryptocurrency.

An additional piece of advice is that web browsers might be able to identify fake profiles.

For me, reporting the offenders is really crucial. Anyone could become a victim of this type of fraud and scam.

QR Codes and Cyber Security: Understanding QR Code Fraud and How to Avoid It

Introduction

In our modern, technology-driven world, the smartphone is a staple in daily life, offering instant access to information, connection, and convenience.

But as digital dependency grows, so does the risk of exposure to sophisticated cyber threats.

Among these, QR code fraud has emerged as a subtle yet pervasive form of identity theft, exploiting trust and convenience in ways few anticipate.

This piece sheds light on the origins, uses, and alarming risks associated with QR codes, urging readers to approach these common tools with informed caution.

From recognizing signs of malicious intent to safeguarding personal data, this exploration underscores the importance of digital awareness in an era where our identities are increasingly tied to the devices we carry.

Let this be both a guide and a reminder: even the smallest actions—like scanning a simple code—can hold unseen risks.

QR fraud

Today QR codes are one of the most prevalent methods by which fraudsters swindle people.

Scanning a QR code may expose you to identity theft.

This is first and most important.

Nowadays, people frequently use QR codes, or quick replies, which are readable by a smartphone camera and contain links and other information.

I’m sure you’ve used a QR code reader in a business setting, such as a restaurant, parking lot, or a variety of retailers.

This year, more than 100 million people will scan QR codes using their phones.

The technology benefits retailers by providing insights into customer behaviour, such as tying a QR code to a loyalty program.

While they provide some convenience for customers and assist firms in conducting business, a government watchdog warns that they can also provide criminal actors with a covert instrument to steal consumers’ personal data.

Identity theft can be financially disastrous for victims, who frequently have limited resources.

Thieves can use your personal information to deplete bank accounts, charge credit cards, start new energy bills, and even seek medical treatment through someone else’s health insurance plan.

In some cases, the thief even used the name of the person whose identity he stole via QR code when the police arrested him. You can only imagine the extent some scammers go to.

Unexpected bank account transactions or credit card charges are indicators of identity theft.

Now let’s go back to the beginning.

QR codes: what are they?

In 1994, a Japanese business developed the quick response (QR) code, a type of two-dimensional barcode, to track cars during their manufacturing process.

An optical scanner or a camera with decoding software installed can read these codes.

QR codes can be used for various purposes.

  • Launching the URLs of websites.
  • We track products in warehouses and factories.
  • Exchange of private data.

The popularity of smartphones quickly led to the use of QR codes in advertising, despite their initial use in industrial settings. Scanning them with phones’ cameras can provide product and service information.

Still, after the COVID-19 outbreak, QR codes have become much more popular.

All of a sudden, QR codes were commonplace.

Businesses required a contactless method to give customers information, including restaurant menus, during the viral pandemic.

Despite their ease of use, QR codes have regained popularity as scammers now use them as a seductive tool to prey on unsuspecting individuals.

Even though the majority of QR codes are secure to use, it’s crucial to understand the dangers of fake ones and what you can do to protect yourself from them.

What does a QR code scam involve?

Consider visiting a restaurant where you may browse the menu and place your order by scanning the QR code sticker on the table.

The restaurant provides a website with its menu and payment method for a comprehensive ordering experience.

However, what if the QR code is malicious, planted there by a cybercriminal?

A phoney QR code may redirect your payment to a credible third-party website, giving hackers access to your credit or debit card details for fraudulent transactions.

How to identify faulty QR codes

Although QR codes are convenient and easy to use, it’s nearly impossible to find their destination without scanning them.

This immediately puts users at risk.

The modern take on phishing emails is QR codes. Similar to phishing emails, a QR code may appear authentic.

You can find these codes in various places such as emails, social media feeds, coffee shops, and TV shows. The common availability of these codes makes it difficult to recognise phoney codes.

First, be aware of any misspelled terms near QR codes.

  • Poor grammar,
  • faulty functionality, or
  • To avoid falling for a scam, choose a design that doesn’t exactly match the website of the firm it claims to represent.

Additionally, review the web address of any QR code you’re considering scanning.

A preview of the URL linked to the QR code may now be accessed on a lot of devices before it is opened. Don’t click on the link if it doesn’t appear legitimate or if it seems fishy in any way.

You would note, for instance, that a legitimate link should never begin with “http://” but rather “https://” and should not have any typos.

What happens if you run a code that you believe is malicious?

Then, refrain from providing personal information on the page and close any files that might have begun downloading on their own when you first visited it.

If you’re in a business and need to verify the QR code, ask an employee.

Even if a company says it employs QR codes, you should still exercise caution because some con artists make stickers that neatly hide real codes.

Consider that the code can be a hoax if it is located in an odd spot, like a random sticker on the wall.

How to stop ID theft using QR codes

Give it some thought before you scan a QR code.

  • Examine a code first if it arrives unexpectedly elsewhere. Should the code include a misspelt URL, it can indicate fraud.

Take care when you receive unexpected QR codes.

  • Make direct phone or web contact with the firm, even if the text or email appears to be from them.

Update the software on your phone.

  • Make sure your smartphone is running the most recent operating system updates, and use strong passwords to secure your online accounts.

To ensure that only you can access your personal accounts, combine multi-factor authentication as well.

Beware: New ‘Finfluencer’ Scams Emerging on the Horizon

Introduction

Every day, our addiction to social media grows stronger. It’s straightforward to see how our lives have all gone to social networks, where we congregate, study, shop, and transact.

This is a natural result of life’s rapid pace, ongoing development, and the introduction of new technology.

What happens when popular videos and memes start to displace experienced investors as the go-to sources of financial guidance?

Retail or non-professional investors have turned to digital channels, including social media sites TikTok or Instagram, to learn about investing.

Thanks to quick, amusing videos on social media that employ inventive methods to communicate financial concepts, like memes and metaphors, learning about financial matters has become more intriguing and approachable for novice retail and lay investors.

Although many people now have easier access to financial literacy and guidance thanks to this trend, the advice can occasionally be superficial, inconsistent, and vulnerable to fraud and false information.

Investor safeguards regarding financial advice from social media influencers are just beginning to emerge, given the novelty of this new trend.

If left unattended, this could have long-term effects on many individuals in the capital markets sector.

Immo Tommy – Finfluenser

Most of you are aware that I was born in Europe—specifically in the heart of Europe. My birthplace is Croatia, which I visit every year.

As I have many friends not only in Croatia but throughout Europe, we often discuss topics such as world espionage, interrogations, and, most importantly, the world of scammers, fraudsters, and wealthy fininfluencers on social media.

It was during these discussions that the name Finfluenser Immo Tommy emerged. I learned about Immo Tommy while I was in Berlin.

But let’s go in order…

Who is Immo Tommy?

The son of a single Croatian guest worker, Immo Tommy, also known as Tomislav (Tommy) Primorac, grew up in Stuttgart.

In his youth, the skilled retailer staged a variety of events, including concerts, themed, and imaginative parties.

Currently, Tomislav (Tommy) identifies as a family man, influencer, businessman, and real estate investor.

Tommy’s first apartment purchase a few years ago ignited his passion for real estate. Since then, he has consistently invested in real estate as a (then) traditional employee, amassing a fortune of several million euros.

He started the “Our Stuttgart” Facebook page in 2014 to showcase the best that his hometown has to offer. After the website quickly attracted 100,000 members, Primorac started using it regularly.

The incessant name changes and issues with business partners prompted him to launch his own platform, Citivoo, in 2016.

Primorac began making real estate investments in 2016. Primorac started the immo.tommi TikTok channel and the corresponding Instagram account in 2020.

Primorac uses the username immo tommi on YouTube.

She offers guidance on general financial topics and the purchase of rental homes on her social media networks.

Tommy conducts interviews with himself in several of his videos, a detail that is quite intriguing.

Since November 2020, he has been entertainingly imparting his insightful real estate expertise on social media.

Three years later, he is reaching millions of people via various media and has already assisted thousands in acquiring real estate.

He listened to his followers’ desires and developed a network of like-minded individuals along with practical, step-by-step mentorship through ImmoMentoring.

Immo Tommi had 1.1 million TikTok and 877,000 Instagram followers in August 2024.

Primorac calls himself “Europe’s biggest influencer in real estate.”

According to his own information, he employs 17 agents. They handled 163 apartment transactions, totaling 300 million euros in 2022.

Primorac received half of the 16.7 million euros in commission as a result.

Primorac is an independent business owner; hence, it is impossible to confirm his information.

Primorac also works as a real estate specialist for a number of websites and media outlets, including Handelsblatt, ZDF, and virtschaft.tv.

However, there are now grave accusations levelled against this influencer in Germany.

Investigative reports by the German media Spiegel claim that Primorac and his network of salespeople arranged real estate deals that ultimately proved to be extremely risky investments for apartment purchasers.

Research has documented cases where clients have overpaid by as much as fifty percent.

The buildings were allegedly overpriced and in bad condition when they were sold.

They are accused of marketing worthless real estate, and on top of that, their financing arrangements are allegedly highly disadvantageous for purchasers.

Contracts do not specify repayment, so the only payment is interest. The principal amount is not lowered.

Public sales contracts assert that the influential Primorc received significant commissions.

Financially significant scene

According to some affected parties, they primarily relied on the reputation of “Immo Tommy” when brokering real estate.

The influencer, who describes himself as “the biggest real estate influencer in Europe,” uses the phrase “Learn how to buy property, rent it, and get rich.”

In addition to about 900,000 Instagram followers, he has over a million TikTok followers.

However, Immo Tommi is not alone on social media.

The “financial influencer” or “influencer” scene is growing in significance, particularly for younger generations.

Financial influencers can affect young people’s investment decisions in addition to being a source of information.

Numerous individuals found Finfluencer’s proposition even more alluring during the pandemic and the ensuing inflation.

They make lofty promises of prosperity, financial freedom, and advancement, but the background is often initially unclear.

How do you spot questionable influencers?

You must understand that financiers and bloggers always have their own financial interests.

I always repeat this!

As a result, when searching for financial information on social media, you should proceed with caution.

Reputable financial influencers would not provide any precise investment advice.

Consumers should be aware if an influencer wishes to switch to a private chat service such as WhatsApp or Messenger. This is a significant concern that is usually not taken seriously.

Check out the business model.

Undoubtedly, influencer content can be truly captivating.

However, they always stand apart from the portal’s recommendations. When it comes to influencers, we must constantly understand how the influencer business model operates.

What is he actually living on?

I believe this is one of the more essential questions.

Indeed, many influencers’ business strategies are not immediately apparent.

Some promote financial items, while others sell expensive courses or, like “Immo Tommy,” broker real estate transactions.

A network typically forms around prominent persons, combining several business methods.

Don’t blindly trust investments

In the case of Immo Tommi, it’s comparable to an advertisement found in a newspaper or on the Internet.

However, you should think carefully about the investment rather than blindly trusting it.

In practice, things don’t always look like that. Some Immo Tommy real estate buyers have never seen real estate in person.

This story reveals a lot about Immo Tommy and his business operations, as well as the dangers of blindly trusting influencers.

“I couldn’t control many things anymore.”

Imo Tomi, an influencer, reacted to German media allegations. In a video statement, he admits to his mistakes and announces his separation from several business partners.

Primorac stated that mistakes and problems occurred as a result of collaboration with several companies.

Primorac released a video on YouTube, Instagram, and TikTok revealing that some of these partners split up a few months ago.

The influencer also claims that he and his family have received death threats because of the report.

Primorac thinks he can accept constructive criticism.

His firm has grown dramatically in recent years. “I couldn’t control many things anymore.” He now wishes to return to health.

He has sold over 500 properties in the last four years, but “something goes wrong on one side or the other.”

There are “tonnes of happy customers” there, he said.

However, purchasing real estate entails some personal responsibility. “They can’t blame me for everything,” said Primorac.

Contracts

For instance, according to the notarized sales contract, Primorac received 49,000 euros of the 166,000 euros sold for the property.

According to a lawyer’s testimony in court, Primorac received 90,000 euros as a “sales commission” for the second house, whose purchase price was roughly 550,000 euros.

Customers say they weren’t told the fees’ purpose, and the contracts weren’t clear.

Primorac left all of this out of his statement.

What can all of this teach us?

One reason that financial advice on social media is easier to access is the increase in influence.

The financial advice industry is evolving. The popularity of “finfluencers,” or influencers who post financial advice on social media, can eclipse that of traditional advice media.

According to FINRA research, 57% of US investors under 35 rely on financial experts as their source of investment advice, while over 60% turn to social media.

In order to further connect individuals whose interest has been aroused by social media with more potent financial advisory tools, financial institutions are starting to establish paths from social media to their products and services.

Social media makes diversity and inclusive content prominent

Social media creates powerful networks that reflect a wide range of regional, ethnic, cultural, and special interest backgrounds while also making financial advice inclusive and accessible.

These internet forums may be the only places where a large number of people can discuss these crucial personal finance issues together.

Certain fin-influencers showcase the “real” side of personal finance through relatability and honesty.

Institutions have the opportunity to engage with a wider range of investors and draw inspiration from thriving emerging markets to enhance their credibility and meet the growing demand.

Giving advice on social media carries some risk

Younger generations frequently use social media as one of their initial stops when looking into where or how to invest.

However, private and opaque algorithms have a significant influence on the platform’s content; thus, posts that are engaging may take precedence over those that are not as good.

Influencers pose two primary risks:

  • The quality of the advice they offer is exceptional.
  • The social media posts do not disclose the absence of attendance.

The qualifications of influencers range greatly, from self-taught to officially accredited, making it challenging for a new investor to determine the quality of their advice.

Fininfluencers have the potential to earn six figures or more annually from their brand or advertising partnerships. This creates invisible or hard-to-distinguish conflicts of interest between producers and their viewers.

Exciting advances in the capital markets industry include the advent of influencers, innovations in social media content delivery, and easier access to interesting content.

Traditional financial advisors and institutions, however, continue to play a significant and vital role in giving individuals access to risk management, education, and comprehensive, individualised advice in order to facilitate successful investment outcomes.

Espionage in the Digital Age: How Spies and Hackers Threaten Global Security

Espionage has evolved significantly from the romanticized Cold War image of suave spies in tuxedos. While espionage has always existed, from the early diplomatic schemes to Cold War intelligence, today’s spy games are far more complex.

Industrial espionage, often state-sponsored, has become a major concern as technology and the internet have made corporate secrets more accessible.

Nations like China use extensive methods to gather as much data as possible, posing a threat to industries worldwide.

The rise in cyber-espionage means companies must now prioritize cybersecurity to protect sensitive information, as the lines between corporate and state-sponsored spying continue to blur.

Gentlemen don’t read each other’s mail.

For years, months, even days, the media has been reporting on the discovery of foreign spies connected to international military conflicts, corporate espionage, and other activities.

The growth of social networks and the Internet only aided in raising the bar for espionage to a whole new level.

However, spies and espionage have existed since the earliest ages. Despite the Cold War’s significant focus on them,

In 1929, US Secretary of State Henry Stimson proclaimed, “A gentleman does not read other people’s mail,” blocking his office from deciphering telegrams from foreign ambassadors.

The United States did not develop a central foreign intelligence service until World War II became necessary.

However, President Harry Truman disregarded the hidden power and dissolved the service once more in 1945.

Moscow, on the other hand, has a long history of having a strong spy network that allowed it to monitor the US nuclear program.

The public release of this game in 1946 gave the proponents of a settlement with the USSR a false sense of innocence.

This is one of the reasons Truman re-established the Central Intelligence Agency (CIA) on July 26, 1947, to compile and assess the results of several intelligence agencies, the majority of which were military.

Truman awarded the CIA ten million dollars from slush funds shortly after the Communists threatened to win the Italian election.

They used the money to employ thieves to destroy Communist Party posters, disseminate propaganda, and conduct covert campaign advertisements.

The success of this method encourages supporters of covert operations. The CIA overthrew the Iranian government in 1953 and then orchestrated the installation of a pro-American monarch.

The Agency orchestrated a similar coup in Guatemala in 1954.

But seven years later, her attempt to remove Fidel Castro from power in Cuba with the aid of rebel forces was a colossal failure.

Since then, Castro has been the target of some daring plans, including cigars and poisoned diving suits.

Industrial espionage is becoming more and more significant

However, the “Committee for State Security,” also known as the KGB, covertly backs uprisings in Latin America, former European colonies in Africa and Asia, and subsequently terrorist organisations like the RAF in West Germany or the IRA in Northern Ireland.

The Soviet Union seemed more circumspect than many Western observers had thought, but its agents were still regularly attempting high-profile assassinations, most frequently via poisoning.

According to the Kremlin, industrial espionage is more significant because Moscow spies steal plans for military hardware, computers, fighter jets, and space shuttles to make up for the lack of copies.

For spies on both sides, this is a dangerous job.

The US relies on technology for surveillance

With time, technology—radar stations, radio-tapping systems, spy planes, and satellites equipped with high-definition cameras—is displacing scouts and defectors, especially in the US.

President Truman founded the National Security Agency as a special agency for telecommunications intelligence, and it has grown to be the country’s largest foreign intelligence agency.

On both sides, massive espionage and defence empires had grown by the conclusion of the Cold War.

The KGB, which employs more than 700,000 people, is also responsible for managing and disciplining its own workforce.

Numerous US intelligence agencies employ a comparable number of agents, commanding officers, technicians, engineers, foreign language speakers, administrative professionals, scientists, and scientists of all stripes.

They don’t only read each other’s letters. However, they bug their bedrooms, tap phones, and break into laptops. Kill, pilfer, extort.

The secret services now have more power than they did during the Cold War.

Nuclear countries will battle more vehemently in the shadows the less an open military solution exists for their dispute.

New spies

A few years ago, Moscow and Washington engaged in a spies’ exchange, demonstrating that espionage has not stopped even after the fall of the Berlin Wall.

However, espionage is a little different now. Industrial espionage surged while military espionage decreased following the fall of the Berlin Wall.

The romanticized portrayal of a spy during the Cold War is unrelated to modern reality.

Bond, James Bond

This is the famous quote from the most well-known spy in a motion picture that you have all seen and remembered.

Instead of athletically fit agents in tuxedos, today’s sniffers appear less impressive. They appear in unexpected places.

Often, an overly enthusiastic and meticulous practitioner who is willing to stay in the office after hours conceals a person who discreetly examines and delivers internal and confidential documents.

You cannot trust even a friendly potential business partner who frequently uses his camera and clicks while viewing the production facilities.

However, those who install themselves directly in the company’s computer system over the Internet and silently collect data are frequently more effective than in-person spies.

All of this may seem expensive, but for businesses facing an increasingly fierce struggle in the global espionage market, it is a major issue.

Industrial espionage, which occurs under the direction of state structures, has received a lot of attention recently.

Indeed, spies and spy games pose a threat to both major governments and smaller nations today.

In a talk with a colleague a few days ago, we commented that today’s surveillance is much more sophisticated than spying on a little entrepreneur from a Chinese region who collects consumer products at industrial fairs and meticulously copies them at home.

The greater flow of data over the Internet also contributes to the rise in espionage activity.

This has significantly enhanced the risk of espionage strikes.

Every year, the theft of innovative technologies causes more damage.

There is a gigantic black figure (number), and I believe we are unaware of its magnitude.

Many incidents of technology theft go undetected. Most of the time, companies are unaware that they have suffered harm.

However, there are times when companies choose not to disclose it out of concern that if governmental authorities become involved, everything would become public and damage the company’s reputation.

Chinese vacuum cleaners

The “dust vacuum cleaner” is a means of acquiring information popular among Chinese spies.

It involves gathering as much information as possible and determining what somebody might value.

Other intelligence services are much more selective, focusing on companies or industries that expressly interest them.

However, organizations may not always take their own technological knowledge seriously.

Continuous education is required for the IT security system to function as best it can.

It is imperative that employees in all firms become aware of this issue.

Furthermore, it’s important to identify the most sensitive information and safeguard it appropriately by preventing direct access from the Internet.

Corporations take initially painful but ultimately necessary steps once they realize how valuable and threatened data is.

Having a reliable virus protection application is essential—in fact, it could be the most crucial thing.

Since it’s the weakest point, it’s critical to address that subject thoroughly.

This involves updating the security program on a regular basis.

When someone approaches you, such as a student posing as a researcher for a PhD or master’s thesis, and requests access to private technical documents, you should always proceed with caution and due diligence.

Either way, the days of agents driving Aston Martins and wearing tuxedos are behind us.

How P. Diddy and Hollywood Shattered Our Dreams: The Dark Side of Fame and Influence

Introduction

In today’s world, we often look to entertainers not only for amusement, but also as role models and educators for our children. Media companies frequently grant these artists, like P. Diddy, platforms to influence young minds.

We admire their success, but sometimes these entrepreneurs and gurus aren’t what they seem.

As a result of their fame, some turn out to be scammers, crooks, and liars, shattering the trust we have in them. It’s a powerful reminder that we must carefully vet who we allow to shape our and the next generation’s perspectives.

You must earn trust, not just give it to others.

According to recent studies, parents spend seven minutes a day conversing with their kids. Envision the entire seven minutes.

What is happening to us as a society, and where have we come from? Who is looking after our kids? During their free time, are we aware of their whereabouts and companions?

Perhaps I’m exaggerating a little, but you are all aware of the narrative that originates in Hollywood, i.e., in the United States these days.

The hip-hop culture

Artist Sean “Diddy” Combs, better known by his stage name P. Diddy, formerly Puff Daddy, was just arrested in New York and accused with charges relating to prostitution, racketeering, and human trafficking in the form of sexual exploitation.

One of the most shocking revelations in the indictment is the discovery of more than a thousand bottles of baby oil and lubricants in his homes.

This is because he was previously accused of pressuring women to have sex with male prostitutes until they were so tired that they required intravenous therapy.

Sean John Combs: Who is he?

Sean John Combs was born November 4, 1969. Combs is also known by the stage aliases Diddy, Puff Daddy, and P. Didi.

The three-time Grammy Award-winning American rapper, record producer, and record executive is known for discovering and promoting music artists such as Notorious B.I.G., Mary J. Blige, and Usher.

Choombs was born in Harlem and grew up in Mount Vernon, New York.

Combs was two years old when his father was slain while riding in his automobile on Central Park West. He lived with his mother and sister and grew up poor.

Combs was a Catholic who served as an altar boy. He attended Mount Saint Michael Academy, an all-boys Catholic institution, and graduated in 1987.

He played football for the academy. Combs asserts that people nicknamed him “Puff” as a child due to his tendency to “huff and puff” when upset.

Combs was a business major at Howard University and dropped out after his sophomore year.

He was a talent director at Uptown Records before launching his own record label, Bad Boy Records, in 1993.

But….

One of the most significant hip-hop producers of the past three decades and a three-time Grammy winner, Combs is currently dealing with a flurry of lawsuits from women accusing him of sexual assault.

He now faces a criminal trial after having his $50,000 million bail denied.

After his arrest, more accusations, some involving rape, have surfaced, and news of a new lawsuit has emerged.

What are the charges?

The Southern District of New York (SDNI) asserted three claims in their legal indictment.

  • Racketeering conspiracy.
  • Sex trafficking by force, fraud, or compulsion
  • Transportation to engage in prostitution

The maximum sentence for racketeering conspiracy is life in prison.

Sex trafficking by force, fraud, or coercion carries a maximum term of life in jail and a mandatory minimum sentence of 15 years in prison.

Prostitution-related transportation is illegal and carries a maximum 10-year sentence.

According to the indictment, Combs “abused, threatened, and coerced women and others around him to fulfill his sexual desires, protect his reputation, and cover up his conduct from at least 2008.”

The 54-year-old is accused of starting “a criminal enterprise whose members and associates participated in and attempted to engage in, among other crimes, sex trafficking, forced labour, kidnapping, arson, bribery, and obstruction of justice” by using his connections, resources, and influence in the music business.

One of the most shocking revelations in the indictment is that over a thousand bottles of baby oil and lubricants were seized from his homes, regardless of the fact that he had previously been accused of forcing women to have sex with male prostitutes until they were exhausted enough to require intravenous therapy.

Let me pause here and ask myself, Where is this planet going?

Every day, new facts emerge that are increasingly alarming, and it is especially concerning that we now know that everyone knew but remained silent, and that silence continues.

When I say “everyone,” I mean A-list celebrities.

“Time for the kids to go home, and for the real fun to begin.”

Furthermore, a fresh video showing the contentious artist telling guests that “it’s time for the kids to go home and the real fun is just getting started” during one of his well-known white parties in the Hamptons has surfaced.

In an exclusive Daily Mail video, the 54-year-old Diddy addresses the crowd while standing with a glass of champagne on his balcony.

“Now that you’ve all been fed and hydrated, it’s time to enjoy life. This is a life celebration. This is the real White Party. After an hour of entertainment for the kids, all of this becomes something that everyone wants to attend as they get older. Let’s put the kids away and move on. In the video, the rapper, who is charged with several horrible acts, says, “Alright DJ, let’s get this done.”

White parties

Before allegations of sexual assault, violence, kidnapping, and gun ownership permanently damaged Diddy’s reputation, the wealthy and well-known enjoyed his ‘white parties’. Diddy hosted his ‘white parties’ at his East Hampton house from 1998 to 2009, to which many famous people requested invitations.

Numerous celebrities from the music and entertainment industries were on the magnificent guest list.

Since the music mogul’s detention in New York, everyone has been unusually silent.

Jennifer Lopez, a well-known singer, dated Diddy from 1999 to 2001.

Other celebrities included the wealthy heiress Paris Hilton, Jay-Z and Beyonce, Howard Stern, Kelly Osbourne, Aretha Franklin, Martha Stewart, Tommy Lee and Pamela Anderson, the young Kim Kardashian, and Mariah Carey.

In short, everyone who was someone and something was at Diddy’s events and loudly called it out.

Furthermore, once the kids went home, things got fairly crazy and rowdy, even though there’s no indication that the celebrities who attended the parties were involved in any of Diddy’s unlawful operations.

At his penultimate party in 2008, he witnessed girls in skimpy clothes and half-nakedness plunging into the pool. Men roam around naked, kiss each other while the alcohol seeps through their skin, and pour streams of champagne onto their lips.

Insider

Insider Tom Swoope, who was present at the white parties, claimed that there were multiple layers to them.

A ‘public entrance’ was preceded by several ‘floors’ that concealed the rooms where the’real’ celebration took place. Both male and female attendees allegedly endured sexual humiliation in exchange for record deals or specific financial gains.

Swoope and other individuals reported smelling substances like cocaine and ecstasy off various surfaces, including the attendees’ bodies.

In addition, he disclosed that Diddy offered him $100,000 and a record deal if he could perform a sexual act with his bodyguard.

However, Diddy later clarified that the request was ‘just a joke’.

“I can make anybody do anything because this lifestyle is what they want, and I have the keys to that castle,” Swoope claimed that Diddy had told him.

“If this is what’s going on behind closed doors, and they’re all comfortable with it… no, I don’t want this life.”

Many celebrities were okay with him being who he was and doing what he did for their amusement. Everyone was the same way; it wasn’t simply one unusual instance, Swoope said.

Prison and a well-known roommate

Combs now shares a cell with crypto con artist Sam Bankman-Fried after his imprisonment in New York.

The rapper has not eaten since his imprisonment for racketeering, human trafficking, and other crimes.

According to foreign media, Diddy is terrified that someone will poison him because he has retained the film from his parties.

Larry Levine, a former Metropolitan Detention Centre inmate, said he thought the rapper’s unwillingness to eat was due to paranoia.

“Consider what happens if someone bribes a prisoner to contaminate his food; the victim suffers a heart attack and passes away. That might occur if someone managed to get close to a police officer. They don’t have a lot of money, but he acknowledged that there are wealthy individuals in the world about whom he knows something.”

Levine speculated that his dislike of food, common to most prisoners, could be one of the reasons he won’t eat.

Hollywood shakes with fear

When the world’s most famous stars attended contentious parties, who was involved in the scandal?

Currently incarcerated in New York, Diddy’s well-known associates fear for their lives.

Rapper P. Diddy was detained on suspicion of participating in a number of illegal activities, including human trafficking for the purpose of sexual exploitation and racketeering.

His extravagant parties, to which he frequently hosted and invited his well-known colleagues, were the setting for the majority of these crimes.

“Freak Offs”

The gatherings he referred to as “Freak Offs” are thought to have included some celebrity attendees who were also involved in the purported sex parties.

In the 2000s, Combs hosted one of his well-known White parties, which drew hundreds of guests, including famous personalities.

From 1998 to 2009, he threw the same parties with people dressing all in white, and every time was more outrageous than the last.

Not only did celebrities enjoy attending his white parties, but they also looked forward to his birthday celebrations.

Up to a thousand guests attended some of the parties, including a number of well-known figures including Leonardo DiCaprio, Beyoncé, Jay Z, Naomi Campbell, Kanye West, and Beyoncé.

These days, rumours about who among them may have taken part in the illegal acts that Diddy was involved in and coordinated are circulating on social media thanks to images of their arrival that were captured and shared.

Stars frequently refused to answer enquiries about their glamorous parties, which would begin during the day and continue till the next day.

They would simply stutter, laugh, and respond incoherently.

The reason why many of them chose not to divulge the specifics of the parties held in the rapper’s opulent homes—which federal officials had just raided—became evident to many these days.

They said only his parties compare to “Diddy’s party,” suggesting his events will be remembered for a long time.

However, those enjoyable times have long since faded from memory

The whole entertainment business, including Diddy’s well-known peers, is waiting nervously to see which celebrity will be at the heart of the scandal while he sits in prison in New York awaiting his verdict, which could result in a life sentence.

His ex-girlfriend Cassie, who first accused him of sexual abuse, allegedly attended one such party. Lately, a hotel video went viral, showing her attempting to flee what appeared to be a “freak-off” before Diddy attacked her.

According to the prosecution, Diddy planned these events and then recorded them to catch his well-known associates arriving.

Diddy allegedly kept recordings of politicians having “sex parties,” according to his former security Gene Deal. Deal also stated that the recordings might reveal other famous people.

Tom Swoope, one of the white party attendees, claimed that people had sexually harassed and degraded both male and female guests in the house’s VIP rooms in exchange for money.

The former drug dealer asserted that Diddy invited him to his Hamptons mansion during one of his parties.

The rapper received him in a bathrobe and escorted him to a room, where he witnessed male rappers having sexual interactions with each other.

Rodney “Lil Rod” Jones

One of the famous people who attended those events against their choice is producer Rodney “Lil Rod” Jones, who filed a lawsuit against the rapper alleging sexual assault.

In the indictment, he claimed that Diddy, the man he worked with, caressed his privates and attempted to convince him to have sex with a different man.

He said that this was “standard in the music industry.” Despite his denial of the charges, Diddy found himself imprisoned shortly thereafter. Many people are now curious as to whether any celebrities are genuinely able to disclose what transpired.

Usher

Aside from Diddy’s close friend Jay Z, Usher was a regular partygoer. When he was fourteen, Usher lived with the rapper and might be considered to have owed his career to him.

He deleted every post he had made on X recently, a move that many people found quite peculiar.

Furthermore, the world has come to know about his 20-year-old interview in which he claimed Diddy showed him “completely different kinds of dreams, especially sex.” At all times, girls were around us. He said at the time, “You open the door and you see someone doing it or a few people in a room having orgies.”

Justin Bieber

Additionally, Justin Bieber was very close to Diddy, who went silent following the rapper’s imprisonment and is reportedly going through a very trying period. According to a prior insider, “Bieber is upset about the Diddy news and can’t process it or talk about it, so he’s shutting down.”

When he was a youngster, he met P. Diddy. A video of their meeting went viral on social media, where the rapper told the singer that he had “48 hours with him.” Additionally, he mentioned that he will be doing something, but he would not say what.

Recently, a new video featuring Bieber and Diddy hugging surfaced, prompting many to speculate that Diddy might be investigating Bieber’s voice.

A few years later, in 2020, to be precise, Bieber broke down in tears during an interview discussing what had occurred to him at the start of his career. He said he wanted to safeguard Billie Eilish, who was just starting her career. All I want to do is keep her safe. I want her to avoid experiencing what I did. I would never wish that on anyone. It was horrible… He cried as he said, “It was dark.”

Leonardo DiCaprio

Famous actor Leonardo DiCaprio, who had also met the rapper when he was younger, frequently attended Diddy’s events in addition to Bieber.

Diddy revealed in 2018 that DiCaprio is his “number 1 guest” at all gatherings.

He was also present at the rapper’s fiftieth birthday celebration, but the two haven’t communicated since. ” This has nothing to do with Leonardo DiCaprio.

He attended a couple of his parties in the 2000s, but almost everyone did. They weren’t abnormal people. There were large-scale house parties. Leo had had enough of partying at this early stage in his profession. According to an insider close to the actor, “He has no connection with that world.”

Naomi Campbell

Diddy frequently listed Naomi Campbell, the well-known model, as a guest. At one point, rumours circulated that they were romantically involved, but they never verified this. She attended Diddy’s 50th birthday celebration, as well as his 54th.

Janet Jackson then joined the rapper and the model, and both women shared a picture of themselves with the rapper on social media.

Cassie accused her ex of being violent, but they removed it.

Many people are curious whether Jennifer Lopez, Diddy’s ex-girlfriend from 1999 to 2001, had anything to do with the “freak-offs.”

They also worry about Ashton Kutcher, who said in an interview that Diddy’s events are filled with activity but he can’t speak out.

What’s going on right now?

The case draws attention to all of the A-list celebrities who have long been part of Diddy’s inner circle, in addition to him.

Rumours are circulating on social media, but formal confirmation is yet to come.

The public has now learned what we consider to be the biggest secret in the entertainment industry.

Now the wall of stillness has crumbled.

We will monitor all developments in the near future and anticipate a complete resolution to this issue.

“Is the Earth Flat?” is this Fact or Disinformation

Introduction:

I do remember in Academy subject where we studied information as a part of war operations, prior, during, and after combat operations, and I clearly remember we used to study portions from Ion Mihai Pacepa, a former high-ranking Romanian intelligence officer who defected to the West in 1978 and exposed Soviet disinformation tactics.

His book, Disinformation, reveals the extent of Cold War-era propaganda and the manipulation of global perceptions, offering invaluable insights into modern disinformation campaigns.

Today, the true battle about how to subside and fight misinformation or disinformation has just begun.

The other day, I accidentally caught a conversation amongst children, specifically their discussion of the issue “Is the Earth Flat?”

Even though I appreciate their arguments, their discussion led me to consider the possibility of “conspiracy theories.”

That’s misinformation. We have been vulnerable since childhood. The internet and social networks contribute significantly to their rapid dissemination.

It’s not like disinformation originated in “our” time.

In today’s “post-truth era,” disinformation seems to be the dominant strategy.

But has everything really changed over the past few decades?

Today’s conversations sometimes present disinformation and arguments about “fake news” as novel occurrences.

Disinformation efforts nowadays, however, combine tried-and-true techniques with fresh opportunities provided by the Internet.

Black-and-white propaganda

People sometimes refer to disinformation as “black propaganda” because it conceals the source of a message.

The term “white propaganda” typically refers to public relations and advertising.

Disinformation is purposefully deceptive and so furthers an agenda, in contrast to misinformation, which frequently stems from inadvertent mistakes or ignorance.

Sometimes, active foreign policy uses disinformation to influence public opinion abroad for better or worse.

The goal of disinformation is to undermine valid ideas, truths, and positive connotations in society.

Disinformation can affect more than just politicians. It also affects institutions, organisations, and even nations.

The goal is frequently to cast doubt on the authority of important organisations or individuals, especially in majority-based democracies.

Divide and Rule

The goal of disinformation is to influence public opinion.

Upsetting these will foster political disenchantment and apathy.

Disinformation is an active political tool that seeks to “divide and rule” by breaking social cohesion and causing society to break apart into small, isolated factions.

Disinformation during the Cold War

Today’s conversations often present disinformation and arguments about “fake news” and the post-factual era as novel occurrences.

Nonetheless, the operations of the Soviet secret service KGB during the Cold War provide the intellectual foundation for many of the disinformation phenomena that may be investigated today.

The examination of the target audience’s concerns, fears, social conflict lines, and dominant discourses is the first step in the KGB’s so-called disinformation cycle.

Disinformation consciously seeks to widen societal gaps that already exist.

The second step involved identifying targets vulnerable to these conflict lines and narratives that can fuel them.

Next, people create misinformation content, such as rumours or fake papers, to support a specific viewpoint.

This content is then secretly released, whether by “unwitting agents” or by purchasing or bribing media outlets in other nations.

These individuals mindlessly disseminate lies that have been passed down to them, much like leaks.

When the media or unquestioning journalists serve as advocates for misleading information and it becomes entrenched in national discourses, the disinformation cycle comes to an end.

When media outlets regarded as reliable disseminate incorrect information, the message gains credibility and reaches a wide target audience.

Confirmation Bias

As an active measure, disinformation deftly takes advantage of social and psychological flaws, such as our tendency to accept something as true if we hear it from others frequently.

Disinformation is especially likely to reach those with strong ideological inclinations or those who think they are immune to it.

They are less inclined to challenge you if you present them with conspiracy theories that support their worldview (“confirmation bias”).

Rotten Herring

One method is “rotten herring.”.

Anonymous rumours about a person circulate on the Internet and in tabloid media.

These rumours usually involve abuse, corruption scandals, or affairs

These stories aim to create a negative impression in the target’s mind. Sensation-driven tabloid media in particular, without key source checking mechanisms such as double verification of material, are susceptible to this.

Scandals drive traffic or clicks.

Whether or not information is true is irrelevant. Therefore, we oversimplify by equating misinformation with erroneous information.

The highest calibre of disinformation frequently starts with real premises that are compounded or taken out of context to produce ominous conclusions.

Conspiracy theories are a methodically disseminated type of well-researched deception.

We propose many divergent, sometimes contradictory theories to explain a difficult subject. Ultimately, this leaves the intended audience unsure of what is genuinely true and what is entirely fictitious.

So, it’s about diverting attention from the truth.

This “firehose of falsehood” approach symbolically muddies the discursive waters, making it impossible for anyone to see through it.

The KGB operated under the presumption that misinformation could be easily uncovered or would likely not be effective in the short run.

Disinformation typically doesn’t persuade strongly disagreeing people; instead, it reinforces prejudices in those who hold its core beliefs.

Individuals who already harbor a deep cynicism towards the media, political, or scientific systems, perceive them as bought or viewed as corrupt.

Additionally, persons with limited media literacy and those who only consume a small number of homogenous media outlets and do not receive a diversified image of the news landscape are more susceptible to the effects of disinformation.

Disinformation: In the era of information

Contemporary disinformation efforts leverage pre-existing techniques and augment them with novel opportunities presented by the Internet.

This refers to the ease with which blogs and social networks enable global information sharing, as well as the disinformation-resistant economic models of Internet platforms.

Displaying material that people like is the foundation of Facebook, Twitter, Amazon, and Google’s data-driven business strategies.

The objective is to maintain people’s focus on the platforms in order to present them with additional product advertising, which is how these businesses generate revenue.

Research demonstrates that sensationalist content, conspiracy theories, and scandals entice users to remain on these platforms for extended periods, thereby boosting revenue from “clickbait” advertisements.

“Micro-targeting,” or the practice of advertisers showing people tailored ads based on their interests and psychological profile, is another issue.

Therefore, it is possible to automate and customize misinformation.

Disinformation can spread millions of times through blogs, Twitter, and Facebook to reach a global audience.

Automated bots or paid commenters—troll armies—can attempt to influence online conversations.

Non-state actors like right-wing organizations are increasingly using disinformation.

Because of technical issues, it is frequently difficult to establish authorship of information.

It is useless to try and stop the rain

These developments are supported by the media’s shifting behaviour.

The old-fashioned media no longer serves as a gatekeeper to sort pertinent information from irrelevant information.

Because of the Internet’s free culture, users are no longer accustomed to paying for premium content.

The economy’s pressure results in quality reductions.

There is a trend towards even faster news cycles, which also indicates a decline in quality control. Even after repairs, very few users identify problems.

This tendency has long-term implications, including the likelihood that people will accept false information from a reputable source rather than an untrustworthy one.

Long-term dissatisfaction with the media landscape leads readers to actively seek alternative media, which in turn leads them to divisive blogs or foreign propaganda sources.

Readers of newspapers that report on politics more fairly, for example, tend to have a more positive opinion of politics than do those who mostly get their news from algorithmically aggregated social media news feeds.

Disinformation can only address preexisting human deficiencies and limitations; thus, it’s critical to address these core issues over time.

We should approach short-term “quick fixes” that use artificial intelligence—AI systems or upload filters to counteract misinformation—with caution.

Artificial intelligence is terrible at picking up on grey areas such as humour, misquoted statements, and suggestive misinformation.

“It is useless to try and stop the rain.” Instead, we need to make sure that it doesn’t further destroy our home’s foundation.

Only by adapting the political, media, and educational structures to the demands of the information era can we achieve this in the long run.

Scams involving cryptocurrency and five strategies con artists use to trick victims

Introduction:

In the social media age, con artists are still using the rising demand for digital assets to trick regular people and small-time investors. They frequently cause them to suffer catastrophic losses.

“Digital assets” refers to tokens, coins, and cryptocurrencies, including those sold in initial coin offerings (ICOs).

Investors may become less cautious or succumb to FOMO, or the fear of missing out, if an investment opportunity presents something innovative or cutting edge.

If you’re thinking about investing in digital assets, spend some time learning about the investment’s operation and evaluating its dangers.

Keep an eye out for indicators that it could be a fraud.

As I mentioned in previous articles, cryptocurrencies, coins, tokens, or crypto can all be considered crypto assets.

Scammers frequently exploit innovation and new technologies to perpetrate investment frauds.

Cryptocurrency investments were no exception.

It can be difficult to track down and collect monies from fraudsters, which makes recovering money from them problematic. Fraudsters, for instance, can use technology to conceal their identity or obfuscate the source of money when using cryptocurrency assets.

It can also be challenging to recover your money from a scam using cryptocurrency assets, as con artists have the ability to transfer your money quickly outside.

Scammers employ a range of strategies to persuade investors to part with their hard-earned cash.

Five strategies that con artists use to lure victims into cryptocurrency securities scams

Here are five things to be aware of in order to prevent losing money to cryptocurrency asset scams.

Social media: “pig-slaughter scams”

After establishing contact with you via social media or an ostensibly random text message, scammers try to win your trust.

Scammers may contact potential victims via spam text messages or social media platforms, such as meetups, professional networks, messaging websites, and apps.

They can pretend to be an old friend or claim to have accidentally gotten in touch with you.

The con artist may then form a romantic or platonic relationship to gain your trust and convince you to invest your money before it disappears.

Sometimes, the term “pig-slaughter scams” is used to describe these trust scams, which are as unsavoury as the scammers’ actions.

One way this kind of fraud works is that the con artist may tell you about profitable trading or investment options, including cryptocurrency asset investments, once they have built an online profile with you.

The con artist might even claim that a friend or family member of theirs is an “insider” or works for a financial company and can supply trade knowledge.

In an effort to further win your trust, the fraudster can lead you to a seemingly genuine (but phoney) website or a popular app that you can download from a reputable app store.

They may even allow you to withdraw a small portion of your “profit” via the app. The con artist may next ask you to make higher financial investments.

Scammers frequently come up with a reason why you can’t withdraw your money, or they could inform you upfront that you need to make additional payments to cover fees or taxes.

Paying extra usually results in a loss of money because there is often no way to recover your investment or make a profit.

For everyone with whom you’ve only interacted via the app or online,

Avoid allowing their advice or influence to shape your investment decisions.
Con artists may instruct you to obtain Bitcoin for your investment deposit at a Bitcoin ATM (or kiosk) or via a cryptocurrency platform, after which they will provide instructions on where to send the Bitcoin.

Be cautious if someone asks you to use cryptocurrency assets to pay for the investment.
Don’t tell them anything about your identity or personal finances.

Don’t give them anything like your date of birth, social security number, passport, driver’s licence, bank or brokerage account information, tax forms, credit card, or passport.

Artificial intelligence (AI)

Fraudsters are taking advantage of the excitement surrounding emerging technology, such as artificial intelligence.

Fraudsters can entice investors to purchase cryptocurrency assets by using the rising appeal of artificial intelligence.

Purchasing crypto assets tied to artificial intelligence may seem thrilling, but proceed with caution.

Con artists frequently use propaganda about cutting-edge technological advancements, including new AI technologies, to deceive investors.

Scammers may promise you large sums of money and use enticing language related to artificial intelligence, all in an attempt to defraud you of your money.

They may claim to have AI-powered bots that they use to identify the best cryptocurrency asset investments.

Fraudsters may also employ artificial intelligence to generate convincing websites or marketing materials that advertise investment frauds, particularly those involving cryptocurrency assets.

In a similar vein, they can produce “deep fakes” by cloning, manipulating, or spoofing voices, images, and videos in order to trick investors using artificial intelligence technology.

To win your trust or persuade you to contribute money, they might even make up false personas that mimic famous people, public servants, or your loved ones.

Fraudsters pretend to be trustworthy sources or exploit them

Note that official sources may appear in correspondence such as emails, letters, certificates, voicemails, texts, phone calls, and messages on social media.

The use of artificial intelligence technology has made it much simpler for con artists to pose as representatives of governmental bodies, businesses, and private citizens in order to trick investors.

Using artificial intelligence (AI) to produce deepfakes, scammers can even pose as your friends or relatives. Additionally, they can break into the social media accounts of your friends or family members and post or send messages purporting to be from them.

As an illustration, con artists can claim that a friend or member of your family has mastered cryptocurrency and invite other people to participate in trading or investing.

Even if you’re sure they’re the source, be wary that friends and family were duped into thinking an investment is real.

Scammers occasionally prey on communities or groups by enlisting leaders or other influential people to make investments on their behalf without disclosing to them that the “opportunity” is a scam.

Pump and dump schemes

Scammers may overvalue cryptocurrency assets, then sell them for a profit.

Scammers can carry out pump and dump schemes involving cryptocurrency assets, such as so-called “memecoins” that reference internet memes or popular culture.

Scammers, for example, might make a memecoin and then promote it on social media to entice people to purchase it and “inflate,” or raise, its value.

Then, before the excitement fades, the promoters and others who collaborate with them “dump” or sell, making money off of the increased price.

Typically, once the promoters sell and pocket their winnings, the price quickly drops and the other token buyers lose most of their money.

Never base an investment choice exclusively on data from applications or social media platforms.

Fraud involving advance fees

Fraudsters want more money—which they falsely claim will let you withdraw or recover your losses.

In investment scams, such as those involving cryptocurrency securities, con artists could ask you for extra money in the form of charges, fees, or taxes before allowing you to take money out of your account.

This is an example of an upfront charge scam, where the scammer asks potential investors to pay a false fee up front before they receive any benefits.

For example, con artists may pretend to inform you that a regulator has blocked your account or is looking into it. To unfreeze your account, you may be required to pay a sizable deposit, charge, or tax amount.

However, in the unlikely event that you make a payment, you will forfeit both the additional payment and the initial investment.

Scammers can even deceive you into paying additional fees by claiming to have “mistakenly” deposited money into your account and requesting that you reimburse them.

It is really a ruse to encourage you to pay them more money; they never really deposit money into your account.

If you have already lost money or cryptocurrency holdings as a result of fraud or bankruptcy, scammers may also target you. In an attempt to “help” you recover your losses, scammers may ask you to send them your private key, enabling them to access your cryptocurrency holdings or encourage you to invest more cash or cryptocurrency.

In real life, if you pay, you most likely won’t receive your money back and will instead fall victim to another scam.

The Jet Set Lie: How Fake Luxury of Influencers Ruins Actual Lives

According to Google and statistics, there are 64 million influencers worldwide, and 6 million influencer accounts are in Australia.

The distinction between fact and fiction is become hazier in the fast-paced social media environment.

One of the more shocking instances of this is the current trend whereby influencers rent false private planes to give the impression of an opulent existence.

Designed to increase likes, followers, and personal brand value, this habit begs major ethical concerns regarding the impact of “faking it until you make it” on the actual world.

The Deception of Luxury

Influencers have been pushed to get innovative with their material in a time when the worldwide epidemic has drastically limited travel internationally.

While some have chosen local travel and elegant staycations, others have followed a more dubious route by planning luxury events that never really materialised.

One classic example is the phenomena of influencers booking a set meant to seem like the inside of a private jet.

Complete with illuminated windows and designer couches, this set—which can be rented for photo sessions—mimics the soft interiors of a private plane.

The reality is significantly less glitzy; the jet is simply a cleverly built Los Angeles studio apartment. The illusion is so strong that it sometimes fools naive followers into thinking these celebrities are leading the great life.

The moral conundrum raised by “Fake It ‘til You Make It”

Not new is the idea of “fake it ’til you make it”.

This kind of thinking will assist you reach your objectives even if you haven’t quite yet since it implies projecting confidence and success.

Although this could be appropriate in some situations, the line is crossed when dishonesty is used as the instrument to pass for this front.

Presenting a jet-setting lifestyle might be enticing for influencers.

After all, luxury goods appeal. Still, the ethical consequences are really important. Influencers are misleading their audience when they upload pictures from these phoney planes, therefore enhancing their image.

Many of the followers could want comparable lifestyles, although they are stuck running after a fantasy. Among their followers, this dishonesty can cause skewed sense of self-worth, financial stress, and unreal aspirations.

The Impacts on Ordinary People

Deception of this nature has consequences much beyond the profile of the influencer.

Ordinary people who follow these celebrities could start comparing their own life to the impossible goals created by these manufactured events.

As followers try to match a lifestyle even the influencers themselves do not lead, frequent comparison can cause emotions of inadequacy, anxiety, and melancholy.

Furthermore, the belief that “faking it” is a valid road to success could skew the ideals of diligence, integrity, and sincerity. In a day when our perspective on the life of others usually comes from social media, the consequences of these lies might be significant.

To fit the supposed lives of others they respect online, people could feel under pressure to get into debt or act unethically.

The consequence of a false reality

The tendency of creating luxurious experiences—such as employing fake private planes—represents a more general problem in social media culture, one in which the search for success and affirmation frequently takes front stage over authenticity.

This starts a poisonous circle whereby followers are deceived into thinking that this degree of luxury is not only realistic but also required for happiness while influencers feel obliged to maintain their false image.

There can be major repercussions from this fictitious portrayal. People who build their self-worth on a created reality may find it difficult to function in actual life.

Instead of concentrating on reasonable goals that fit their actual values, they may spend time and money pursuing an unreachable lifestyle.

The never-ending chase of an illusion can impede personal growth and keep people from realising their own capacity.

In summary, authenticity is essential

Ultimately, the culture of “faking it” in the world of influencers is about the larger influence this dishonesty has on society, not only about producing a false image.

Though apparently benign, the false jet set lifestyle has the ability to skew reality for thousands of everyday consumers of this material.

Particularly in a digital environment where the boundaries between real and fake are so often confused, authenticity, transparency, and honesty should be the cornerstones of influence.

As influencers, we have an obligation to show a reality that inspires rather than lies; as followers, we must be cautious of the material we consume.

These misleading presentations inflict actual damage; only by embracing authenticity will we be able to create a better and more realistic social media scene.

“UNIT 29155” Russia Notorious Special Unit Secret Intelligence agencies, hacker attacks, GRU, Microsoft, and EU

Introduction

I assume most of you, like me, have seen or read about the discussion between the two contenders for President of the United States, Trump vs. Harris. It was a vigorous debate, with low and dirty punches below the belt, as the saying goes in boxing.

But one thing is certain, and it has not gone unnoticed: without secret and intelligence services engaged and operating at full capacity, such debates, particularly those involving the US presidential elections, cannot take place.

These days, one should anticipate cyber-attacks from all directions. Given the interest of all parties involved, it’s important to acknowledge that public domains often contain warnings about misinformation or disinformation.

Germany

A few days ago, the German domestic intelligence agency issued a warning regarding a cybernetic group that was part of the Russian military intelligence service’s unit 29155.

The group claimed to have conducted cyberattacks against nations that are members of NATO and the European Union.

Germany’s Federal Security Service (Bundesamt fur Verfassungsschutz) posted on Platform X that the FBI, the US Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and other international partners had issued a warning against the group known as UNC2589.

This warning comes at a time when worries about Russian hackers and spies’ operations are spreading throughout Europe and the rest of the world.

Cyber Attacks

Berlin had earlier this year accused Moscow of carrying out a string of hacking assaults against the ruling Social Democrats in Germany, as well as IT, defence, logistics, and aerospace firms.

The intelligence service warned that the organisation, also known as Ember Bear or Cadet Blizzard, engages in sabotage and espionage actions, frequently disclosing stolen material and vandalising websites.

He was a member of the GRU group, which came to light in 2018 when it was believed to have poisoned former Russian double agent Sergei Skripal and his daughter Yulia in the United Kingdom.

“Unit 29155“

Up until now, “Unit 29155” has been associated with sabotage and poisoning attacks.

According to reports from US officials and the German Office for the Protection of the Constitution, the force is also responsible for widespread hacking attacks.

Although the targets were very different, all evidence points to the same Russian secret service unit: following the poisoning of former Russian agent Sergei Skripal in the UK and the attempted assassination of Bulgarian arms manufacturer Emilian Gebre, it became evident that agents from “units 29155” were responsible.

It might also be the cause of the unsettling “Havana Syndrome.”

According to travel and telephone records, the research team found that members of GRU Unit 29155 were on the scene during many of the attacks that resulted in the “Havana Syndrome.” They could specifically use electromagnetic or acoustic weapons.

You can read or listen to the audio episode where I discuss “Havana syndrome” in one of my previous posts.

Established in 2009, the unit, a part of Russia’s GRU military intelligence arm, is considered Putin’s strike force. They accuse this unit of carrying out killings and explosive attacks to install terror and instability in the West.

Now, intelligence services have revealed that “Unit 29155” is also responsible for the cyber-attacks.

“Whisper Gate”

This means that the organisation is responsible for a significant wave of malware attacks on Ukrainian systems known as “WhisperGate.”

The FBI, NSA, and the US cyber security agency CISA released this report. The research compiles the results of multiple Western intelligence agencies.

The analysis also incorporates data from the German Federal Office for the Protection of the Constitution.

The USA simultaneously issued public indictments against five GRU members.

Their intention was to destabilise Ukraine in the run-up to the Russian invasion in 2022 by sabotaging computer systems.

Among other targets of the “WhisperGate” campaign were the computers of the Ukrainian Ministry of Foreign Affairs and the official digital services platform.

The hackers also stole private information from Ukrainian national patient records. Additionally, they uploaded a message.

According to recent disclosures from Western intelligence agencies, “Unit 29155” has been operational in the cyber domain since 2020, with a primary focus on critical infrastructure systems.

The team reportedly launched attacks against several NATO institutions, but it was initially unclear if the operations were successful.

APT28 Group

In January of last year, hackers targeted German SPD email accounts. The federal authorities “clearly” blamed Russia for this and promised penalties.

In June 2023, the SPD reported that a cyber attack in January targeted the SPD executive’s email accounts. A security hole in Microsoft’s software, undisclosed at the time of the attack, made this possible.

This attack was attributed to the APT28 group.

APT28 became well-known after the attack on the Bundestag.

The German Office for the Protection of the Constitution states that the APT28 group has been operating since at least 2004 on a global scale, mainly in the area of cyberespionage.

It was also “among the most active and dangerous cyber actors in the world,” having previously spearheaded disinformation and propaganda campaigns.

It is evident that APT28 is a product of the Russian military intelligence agency GRU.

The attack on the SPD was part of a larger operation in which the Office for the Protection of the Constitution, the Federal Intelligence Service, and the Military Counterintelligence Service—all of Germany’s secret services—were involved in federal government investigations.

According to current information, the SPD attack is part of the APT28 campaign, which targets government agencies and companies operating in the energy, IT, defense, or aerospace sectors across several European countries.

Break into Microsoft

Last year, cyber-security agencies overseen by the White House issued a series of criticisms and warnings against tech giant Microsoft, claiming that hackers linked to Moscow and Beijing were able to exploit flaws in the company’s systems, particularly those related to email, allowing them to steal documents and information from US officials.

An omission of this magnitude is a serious incident in and of itself, but the involvement of hackers, who, according to American cyberexperts, work for or with the cooperation of China and Russia, exacerbates the problem.

China, a previous ally, is now likely Washington’s biggest and most important rival in terms of technology, economics, and military might. Russia, on the other hand, is America’s “old” Cold War foe, with whom it has “warred” for decades in a variety of ways, including by stealing mutual data and in politics.

Given that millions of people worldwide, including numerous US departments, agencies, and services, rely on the technological behemoth’s services, it is understandable why the US agencies in charge of cyber-security were so forthright in their criticism.

Complexity is one of security’s main “enemies.”

Microsoft’s global partners and users may indicate security “holes” given its size and variety of services.

Partners with different levels of privilege may, willingly or unknowingly, serve as a “gateway” for hostile actors to “get” deeper into the system.

Furthermore, literally millions of users—including US government employees—use the company’s services, many of whom likely lack the necessary training for safe use. This increases the likelihood of infiltration.

While security and reputational damage are the primary concerns in the Microsoft hacking case, it is undeniable that these intrusions, if indeed executed by hackers with ties to Beijing and Moscow, signify a significant increase in the current state of international cyberwarfare.

These intrusions also impart valuable insights: if large corporations such as Microsoft, relying on millions of individuals and institutions worldwide for their security measures, succumb to such a severe cyberattack, it could lead to two potential outcomes.

  • One significant issue is that Microsoft’s standards are not as high as previously believed.
  • The second, and equally concerning, is that hackers possess the technological means and aptitude to breach the networks of one of the world’s wealthiest and safest corporations.

It is reasonable to assume that hackers will take inspiration from these types of operations and use that knowledge to launch ever riskier and more sophisticated assaults.

Given that cybersecurity incidents are getting more serious every day, businesses and agencies must recognise that cybersecurity is a never-ending battle and that they must continuously adapt and upgrade their defence systems to stay one step ahead of ever-increasing threats.

Who is a leader, and why do you want to be one?

Introduction:

The concepts of “leader” and “leadership” have become ubaiquitous in today’s world, capturing the attention of professionals and scholars alike.

There is no shortage of articles, white papers, and academic research on the subject.

A quick visit to LinkedIn reveals countless experts eager to coach and transform you into an exemplary leader.

Furthermore, Amazon lists a staggering 57,136 books with “leadership” in their titles, each author offering their own unique perspective on what it means to lead.

If you recall the 2011 film “Margin Call,” which came out just two years after the infamous Global Financial Crisis, you might remember the profound impact that event had on many, myself included.

The crisis served as a harsh reminder that, as an employee, cost savings and leadership preservation often reduce you to mere statistics.

In “Margin Call,” the character John Tuld, the CEO, delivers a powerful insight into the essence of leadership during a conversation with Peter Sullivan:

John Tuld: “Let me tell you something, Mr. Sullivan. Do you care to know why I’m in this chair with you all? I mean, why do I earn the big bucks?”

Peter Sullivan: “Yes.”

John Tuld: “I’m here for one reason and one reason alone. I’m here to guess what the music might do a week, a month, a year from now. That’s it. Nothing more. And standing here tonight, I’m afraid that I don’t hear – a – thing. Just… silence.”

In simple terms, leaders—often embodied by CEOs and C-suite executives—are those who navigate uncertainty and guide organizations through unpredictable times.

The Prophecy of Business Collapse

Fast forward to 2020-2021, when the world faced unprecedented challenges.

We all had to adapt, innovate, and respond to a new reality marked by lockdowns, remote work, and social distancing, all driven by the COVID-19 pandemic.

Never before had the world experienced such widespread isolation, not even during wartime.

As the situation unfolded, it became apparent, at least to me, that many businesses would struggle, some even collapsing entirely, while only a few would remain fully operational.

While it might be tempting to credit surviving companies’ leadership, I leave that conclusion to your judgment.

After all, I don’t recall any leaders penning books on “risk management during lockdowns,” though there are countless volumes on leadership.

A New Era of Leadership

We now live in an age of uncertainty, characterised by global conflicts and the emergence of new business models. Unfortunately, this era has also seen a rise in scams, crime, and fraud, a predictable consequence in times of instability.

In such times, I strongly advocate for businesses, regardless of size, to conduct “pre-mortem analyses” and rigorously test their capabilities.

This way, they can be better prepared to respond strategically and tactically to global crises like the one we experienced from 2020 to 2022.

Traditional leadership, as we once knew it, is long gone. While it’s still possible to learn various leadership skills, the challenges ahead require a different approach to leadership and risk management. At just 18 years old, I recall being required to lead during a war.

Despite my lack of knowledge in leadership, I received assurances of supervision and on-the-job training before, during, and after battles.

No one wanted the responsibility, not even me, because, in war, the stakes are as high as they get—human lives are on the line.

However, through that experience, I learned how to lead, be accountable, take responsibility, and, most importantly, own my mistakes.

“Something else was forming that day – leadership. We had commanding officers who didn’t walk around parading. They were checking in with everybody. “Here’s some ammunition.

How do you feel? Are you wounded?”

Leadership was taking care of everybody. Leadership was being built by taking responsibility and accountability for every soul under your command. I was impressed with my commanding
officers. Their first thought was to care for us – not to take their boots off and shout out orders to bring them water, food and other things. They checked in with everyone.”

Excerpt from book “Blood Soaked Soil” by Mario Bekes

The “How” Over the “Why”

When choosing a leadership style to implement in your organization or learning how to be an effective leader, it’s critical not to rely solely on theoretical knowledge from books.

Books provide theory, but they often lack practical application. Do not follow those who have never led or cannot demonstrate their leadership credentials, such as team size, goals, and capacities.

Instead, seek mentors who can show you through their own experiences how they led, how they navigated uncertainty, and how they instilled a fighting spirit within their organizations.

It’s essential to learn from leaders who have practiced what they preach, not just theorised about it. How did leaders achieve their results? Ask them how they led in practice, not just theory.

A true leader integrates all elements of leadership to build a remarkable organisation, instilling pride and enhancing market presence.

Above all, a genuine leader must lead by example and then teach others to do the same. If this approach does not resonate, one might as well continue reading books and attending seminars on leadership.