Phishing & Hacking from Texas Authorities
Emboldened by a lack of enforcement on criminal violations to include public corruption. Officials in a rural East Texas County have resorted to soliciting for Cyber Crime perpetrators. What exactly does “phishing and hacking” mean? How does one solicit a cyber crime? It goes something like this.
The police or sheriff department come up with a brilliant idea for entrapment! Next they learn a way to contact the source to be targeted. Then they send a careful written letter soliciting the criminal act in hopes the source will respond the way they want them too.
Clapping hands together and giggling excitedly. Quickly emailing them back. Yes! I want you to commit International and Federal Crimes on my behalf! Here is some money to pay for it and this is who I am…..
There is a comedy crime drama series on Netflix, “Comrade Detective, that has scenes similar to the one above. Perhaps that is where the idea came from.
First what is a “Hacker?” Some may actually not understand the term so we have provided a brief explanation.
Today, mainstream usage of “hacker” mostly refers to computer criminals, due to the mass media usage of the word since the 1980s. This includes what hacker slang calls “script kiddies”, people breaking into computers using programs written by others, with very little knowledge about the way they work. This usage has become so predominant that the general public is largely unaware that different meanings exist. While the self-designation of hobbyists as hackers is generally acknowledged and accepted by computer security hackers, people from the programming subculture consider the computer intrusion related usage incorrect, and emphasize the difference between the two by calling security breakers “crackers” (analogous to a safecracker).
Back to the subject of this article. The following email was sent in what has been interpreted as an attempt of entrapment. Someone offering “hacking” services on a Federal and International level.
From: Rosemary Juarez <email@example.com
Welcome to the Hacking Services network!
Hackmaster is a registered professional hacker trained to perform hacking services in an absolutely efficient and quality way. Since 2009 i have been active and i specialize in all fields and areas of hacking. I work hard every single day to improve skills, and also get to create better and effective hack tools for all your complains and requests.
if you are in need of hack services
I can also work for you from any country you are located
below are the lists of services i render
We can get any password, from any email address. Doesn’t matter if it’s a free address (like outlook, hotmail, gmail, yahoo, etc) or private/corporative.
We can get any password, from any Facebook account. We can help you too to get access into a fanpage or group.
We can get any password from any Twitter account. Hire our services and get the password from the account you want.
*Cell Phones Hacking
Cell Phones also have many vulnerabilities. For that reason we offer a service to hack an entire mobile device.
We can access into any university/college system in order to change your grades, missed classes, among other things
We can hack any website. Either hack the entire server where a website is hosted or only its administration panel.
Do you have a debt you can’t pay? Have your name been included on a defaulter list? We can help you.
Do you want to change the results of a search engine? Remove an undesired result? Or maybe change a result position?
If you want to order some complex service not listed on this page, then you need a tailored services
We have not disclosed the IP address publicly in this article but…..we did submit it to the Internet Crime Complaint Center (IC3) In the event you are wondering who they are we again, shall provide an explanation. The IC3 is a partnership agency involving the FBI, National White-Collar Crime Center and Department of Justice. A sort of task force under the supervision of the FBI but they could possibly become an independent Federal Agency in the near future.
We also submitted the email and IP Address to Interpol and the ever-friendly folks at the Cyber Crime Department in the UK. They are actually easier to report cyber crimes too.
Interesting enough Bernard Otupal the IT Crime Chief in Lyons France was not surprised at who is behind the email.
“All you have to do is watch the news with what is going on in the United States. Nothing there surprises me anymore.”
He suspects that by personally emailing it to a contact within the IC3 will result in provoking some kind of reaction. Thanks Bernard! Let’s hope so. In the meantime, it would be important to note we wish to expose crime not commit it.