Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsInside an International Tech-Support Scam
AARPEn español | A light rain fell and a cold gray mist hung over the street as Jim Browning arrived home from work. A middle-aged Irishman with a strong brogue, Jim is a software engineer at a midsize consulting firm, and on this workday, like most, there were few surprises. He shared a pleasant dinner with his wife, and when the dishes were cleared, he retreated to his office, shut the door, opened his computer and went undercover.
Jim Browning is not his real name. The alias is necessary to protect him and his family from criminals and law enforcement, as what he does in the privacy of his office may be morally upright but technically illegal. It's a classic gray area in the netherworld of computer hacking, as we will explain. What is important to know is that back in 2014, it was the same annoying robocalls that you and I get most days that set Jim on his journey to become a vigilante.
A relative of Jim's had told him about warnings popping up on his computer, and Jim, too, was besieged with recorded calls saying his computer was on the verge of meltdown, and that to prevent it he should call immediately. As a software expert, Jim knew there was nothing wrong with his system, but the automated calls from certified technicians didn't stop. One night that spring, his curiosity got the better of him. It was part nosiness and part intellectual curiosity, Jim said. I'm a problem solver and I wanted to get to the bottom of what these people wanted. So he returned one of the calls.
The person who answered asked if he could access Jim's computer to diagnose the problem. Jim granted access, but he was ready; he had created a virtual computer within his computer, a walled-off digital domain that kept Jim's personal information and key operations safe and secure. As he played along with the caller, Jim recorded the conversation and activity on his Trojan horse setup to find out what he was up to. It took mere moments to confirm his hunch: It was a scam.
Jim Browning is not his real name. The alias is necessary to protect him and his family from criminals and law enforcement, as what he does in the privacy of his office may be morally upright but technically illegal. It's a classic gray area in the netherworld of computer hacking, as we will explain. What is important to know is that back in 2014, it was the same annoying robocalls that you and I get most days that set Jim on his journey to become a vigilante.
A relative of Jim's had told him about warnings popping up on his computer, and Jim, too, was besieged with recorded calls saying his computer was on the verge of meltdown, and that to prevent it he should call immediately. As a software expert, Jim knew there was nothing wrong with his system, but the automated calls from certified technicians didn't stop. One night that spring, his curiosity got the better of him. It was part nosiness and part intellectual curiosity, Jim said. I'm a problem solver and I wanted to get to the bottom of what these people wanted. So he returned one of the calls.
The person who answered asked if he could access Jim's computer to diagnose the problem. Jim granted access, but he was ready; he had created a virtual computer within his computer, a walled-off digital domain that kept Jim's personal information and key operations safe and secure. As he played along with the caller, Jim recorded the conversation and activity on his Trojan horse setup to find out what he was up to. It took mere moments to confirm his hunch: It was a scam.
Read on; what he did to investigate is fascinating.
InfoView thread info, including edit history
TrashPut this thread in your Trash Can (My DU » Trash Can)
BookmarkAdd this thread to your Bookmarks (My DU » Bookmarks)
3 replies, 431 views
ShareGet links to this post and/or share on social media
AlertAlert this post for a rule violation
PowersThere are no powers you can use on this post
EditCannot edit other people's posts
ReplyReply to this post
EditCannot edit other people's posts
Rec (3)
ReplyReply to this post
3 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
Inside an International Tech-Support Scam (Original Post)
brooklynite
Apr 2021
OP
PoliWrangler
(139 posts)1. Great article! Nt
MerryHolidays
(7,715 posts)2. Check out his scammer videos on YouTube
There are several of these scam-busters who post videos....there is something so satisfying in watching these!
SeattleVet
(5,477 posts)3. His YouTube channel is great.
He's gotten into the systems of the scammers and exposed them, gotten some call centers shut down, and done an amazing job of stopping several people from losing many thousands of dollars. His latest one was working with Mark Rober (former NASA engineer that created the 'glitter bomb'...his channel is also definitely worth a look-see!) and getting one of the US-based 'money mules' that intercept the packages of cash arrested.
https://www.youtube.com/c/JimBrowning/videos