<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Thomas Cano Morant</title>
    <description>The latest articles on DEV Community by Thomas Cano Morant (@kenosama).</description>
    <link>https://dev.to/kenosama</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1104326%2Fecbf1155-ea6c-4dd8-813f-066c48414087.jpeg</url>
      <title>DEV Community: Thomas Cano Morant</title>
      <link>https://dev.to/kenosama</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/kenosama"/>
    <language>en</language>
    <item>
      <title>Shocking Arrest in Paris: Woman Detained for Strange Behavior Reveals a Dangerous SMS Fraud Network</title>
      <dc:creator>Thomas Cano Morant</dc:creator>
      <pubDate>Mon, 19 Jun 2023 13:45:02 +0000</pubDate>
      <link>https://dev.to/kenosama/shocking-arrest-in-paris-woman-detained-for-strange-behavior-reveals-a-dangerous-sms-fraud-network-1d0o</link>
      <guid>https://dev.to/kenosama/shocking-arrest-in-paris-woman-detained-for-strange-behavior-reveals-a-dangerous-sms-fraud-network-1d0o</guid>
      <description>&lt;h3&gt;
  
  
  "Discovery of an IMSI-catcher Exposes a Massive Scam Operation and Highlights Challenges posed by New Technologies"
&lt;/h3&gt;

&lt;p&gt;Paris, December 30, 2022&lt;/p&gt;

&lt;p&gt;What initially seemed like an ordinary situation took a disturbing turn when police apprehended a woman in Paris due to her peculiar behavior. What unfolded next piqued the curiosity of law enforcement officials.&lt;/p&gt;

&lt;h4&gt;
  
  
  Arrest Unveils a Sophisticated Criminal Network
&lt;/h4&gt;

&lt;p&gt;Upon her arrest, police officers decided to search the vehicle for any evidence that could explain the driver's unusual conduct. However, what they discovered was far more intriguing than expected.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Alarming Discovery of an IMSI-catcher
&lt;/h4&gt;

&lt;p&gt;In the back of the car, they found a device equipped with antennas connected to a cable concealed beneath the rear seat. Intrigued, they opened the trunk and were astounded to find a sealed container.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--E8aIGVma--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/97lem3iw1wa9tndbg31o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--E8aIGVma--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/97lem3iw1wa9tndbg31o.png" alt="twitter showing picture of the device" width="800" height="570"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Gripped by fear, the officers immediately suspected a bomb. Bomb disposal units were called in, and the suitcase was neutralized. After investigation, it was revealed that the case did not contain explosives. So, what was it?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--iqsImzDK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/p70wcf9mzlajgq6ymd0p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--iqsImzDK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/p70wcf9mzlajgq6ymd0p.png" alt="Journal article related to the fake bomb alert" width="800" height="584"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  The Illegal and Dangerous Nature of the IMSI-catcher
&lt;/h4&gt;

&lt;p&gt;The device found in the trunk proved potentially more dangerous than a bomb, and much costlier. Possession of such a device is strictly illegal for individuals and is often used by intelligence services during protests or significant events to intercept unencrypted metadata.&lt;/p&gt;

&lt;h4&gt;
  
  
  Unveiling the Troubling Details of the IMSI-catcher
&lt;/h4&gt;

&lt;p&gt;The IMSI-catcher is a complex electronic device capable of conducting a "man-in-the-middle" attack on a GSM network. In other words, it emulates a 2G, 3G, 4G, or 5G antenna to attract nearby phones and extract data from these smartphones (calls, SMS, data).&lt;/p&gt;

&lt;h4&gt;
  
  
  The Consequences of IMSI-catcher Use
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--7bvOJmof--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yayscl1si2hxdss8j0y8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--7bvOJmof--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yayscl1si2hxdss8j0y8.png" alt="schema explaining the IMSI-catcher" width="800" height="443"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This device can intercept the 2G signal, which does not require authentication to connect, thus allowing the interception of SMS and calls from the "network" and transmitting them to actual relay antennas. This process is completely transparent to the victim.&lt;/p&gt;

&lt;h4&gt;
  
  
  Unveiling a Massive SMS Fraud Operation
&lt;/h4&gt;

&lt;p&gt;In this case, the owners of the IMSI-catcher were identified as two men owning a digital marketing company. They also provided low-cost SMS communication services, including the rental of a database containing 20 million mobile phone numbers.&lt;/p&gt;

&lt;h4&gt;
  
  
  Arrests and the Unveiling of a Massive Fraud Operation
&lt;/h4&gt;

&lt;p&gt;A subsequent raid led to the discovery of a second vehicle, 12 phones, 8 computers, a few diamonds, and the identification of 3 other suspects. The alleged scammers utilized the device to send thousands of fraudulent messages, with 16,000 devices connected to the device and 424,000 fraudulent SMS sent.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Impact of SMS Fraud
&lt;/h4&gt;

&lt;p&gt;The fraudulent messages contained a link to a fake health insurance website, enabling the scammers to collect victims' personal and banking information. Authorities arrested two men suspected of being the masterminds behind the operation, along with a technician and another female driver involved.&lt;/p&gt;

&lt;h4&gt;
  
  
  Challenges Posed by New Technologies
&lt;/h4&gt;

&lt;p&gt;This case highlights the challenges faced by law enforcement with the evolving nature of new technologies and the increasing use of artificial intelligence. Law enforcement's lack of knowledge in these areas facilitates the creation of fake content and the perpetration of fraudulent acts.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--6tVgZm16--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9yoe1m6kotztor4h2llx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--6tVgZm16--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9yoe1m6kotztor4h2llx.png" alt="User of telegram bragging about using chatGPT to make scam-sites" width="800" height="911"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;User of telegram bragging about using chatGPT to make scam-sites&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  An Online Criminal Community
&lt;/h4&gt;

&lt;p&gt;On the internet, criminal networks are suspicious of each other, leading to a widespread climate of mistrust. To address this issue, "scamlists" have been created where individuals share the names of alleged scammers. However, these accusations are often based on one person's word against another's, making it difficult to verify their accuracy.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--eFwL2_AH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jxmco1347fnhiyv0992r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--eFwL2_AH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jxmco1347fnhiyv0992r.png" alt="this picture shows a example of files used to make a scam site using a French postal service." width="800" height="445"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;this picture shows a example of files used to make a scam site using a French postal service.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--fy4CxcIZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jmui8t08tewy0man3jml.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--fy4CxcIZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jmui8t08tewy0man3jml.png" alt="in the code in one of those files, we can see a strange execution block of crypted code. when decrypted, the code make a request to another crypted place." width="800" height="433"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;in the code in one of those files, we can see a strange execution block of crypted code. when decrypted, the code make a request to another crypted place. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Z4nDqQri--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/luffxd9ulq8p95nno93j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Z4nDqQri--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/luffxd9ulq8p95nno93j.png" alt='when decrypted, we can see a redirection where the "altruist coder", get all the "work" from the newbie scammer' width="800" height="121"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;when decrypted, we can see a redirection where the "altruist coder", get all the "work" from the newbie scammer.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  The Need for Coordinated Action
&lt;/h4&gt;

&lt;p&gt;It is imperative to strengthen collaboration between authorities, businesses, and security experts to combat online crimes. Raising public awareness of the risks and implementing preventive measures are also essential to protect users of new technologies.&lt;/p&gt;

&lt;p&gt;In conclusion, this arrest highlights the dangers posed by illegal devices such as the IMSI-catcher and emphasizes the importance of strict regulations to safeguard public security. Combating online fraud requires a multidimensional approach involving technology, legislation, and public awareness.&lt;/p&gt;

&lt;p&gt;Sources: &lt;br&gt;
&lt;a href="https://twitter.com/AmauryBucco/status/1608931614666682368?lang=fr"&gt;Amaury Bucco Twitter&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=6Jv0EzXdQbk&amp;amp;t=449s&amp;amp;ab_channel=Micode"&gt;Micode Yt Channel&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/sRgqTTc_AdA"&gt;Underscore Yt Channel&lt;/a&gt;.&lt;br&gt;
&lt;a href="https://www.lesnumeriques.com/vie-du-net/ce-que-l-on-sait-de-l-arnaque-a-l-imsi-catcher-qui-a-vise-16-000-smartphones-n207339.html"&gt;Journal article from Les Numériques&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.la-croix.com/Sciences/Numerique/IMSI-Catcher-comment-telephones-portables-sont-ecoutes-2016-02-03-1200737352"&gt;La croix for the schema&lt;/a&gt;&lt;/p&gt;

</description>
      <category>sms</category>
      <category>imsi</category>
      <category>paris</category>
      <category>scammers</category>
    </item>
  </channel>
</rss>
