CyberCrime & Doing Time: Classic Baggie: Part 2

Q. I want to focus on your relationship with Classic Baggie.
Q. You said you were working as an apprentice at that time.
Q. Ms. Busch, could we pull up 402(c-1), which again is a larger version of that image.
Q. Ms. Busch, can you please pull up Government Exhibit 402(d), and focus on the last message of page 2.
Q. Can we please pull up Government Exhibit 402(d-1) which again is a larger version of that attachment.
Q. Can you turn to what is marked as Government Exhibit 402(g), 402(g-1) and 402(g-2). Mr. Hermann, if you could turn in your binder and take a look at what's marked as Government Exhibit 402(g), 402(g-1)and 402(g-2).A. Yes.
Q. Ms. Busch, could we pull up Government Exhibit 402(g-1), which is a larger version of that attachment that Classic Baggie was sent to Michael Hermann.
Q. Can you turn to Government Exhibit 402(h), Ms. Busch, can we pull up Government Exhibit 402(h), and zoom in on the top message of page 1.
Q. Ms. Busch, could you pull up page 2 of this document, the top message.
Q. Ms. Busch, can you please pull up Government Exhibit 402(i).
Q. If you could turn Ms. Busch, and zoom in on the top message of page 3.
Q. Ms. Busch, could you pull up 402(i-1), which is a larger version of that attachment.
Q. If you could briefly take out that other small binder in front of you Mr. Hermann, and take a look at what's been marked as Government Exhibit 100.A. Yes.
Q. Ms. Busch, could you pull up Government Exhibit 402(k-3), which is a larger version of that attachment.
Q. Ms. Busch, could you please pull up Government Exhibit 402(o).
Q. You talked about your admission of ten percent on that $261,000 wire.
Q. Mr. Hermann, can you please turn to what's marked as Government Exhibit 312(b).
Q. Now, we just looked at quite a few messages between January 2020, and the April of 2020 and we may look at one or two more.
Q. Can you flip in your binder to what is marked as 402(k-4) through 402(k-9). Please take a moment to look at each of those exhibits in 402(k-4) through 402(k-9) and look up at me when you have had a chance to do that.
Q. I want to talk a little bit more and turn your attention back to the role that cars played in the money laundering operation you did with Classic Baggie.


This Cyber News was published on garwarner.blogspot.com. Publication date: Sun, 14 Jan 2024 08:13:04 +0000


Cyber News related to CyberCrime & Doing Time: Classic Baggie: Part 2

CyberCrime & Doing Time: Classic Baggie: A Delaware BEC Case calls him the leader of an International Criminal Organization - The U.S. Attorney's office in Delaware charged Olugbenga Lawal with being a major money launderer for a Nigerian-based international criminal organization that specialized in Business Email Compromise and Romance Scam. The Defendant's importance in ...
10 months ago Garwarner.blogspot.com
CyberCrime & Doing Time: Classic Baggie: Part 2 - Q. I want to focus on your relationship with Classic Baggie. Q. You said you were working as an apprentice at that time. Q. Ms. Busch, could we pull up 402(c-1), which again is a larger version of that image. Q. Ms. Busch, can you please pull up ...
10 months ago Garwarner.blogspot.com
The New Cybercrime Atlas: A Collaborative Approach to Fighting Digital Crime - The global transition to the digital economy means that the operations of governments, critical infrastructures, businesses, and individuals are now a tightly integrated system of interconnected resources. Cybercrime presents a significant risk to ...
9 months ago Feeds.fortinet.com
UN Cybercrime Convention: Tight Timeframe to Create New Global Approach to Combat Cybercrime - Cybercrime is a growing problem that affects nearly all of the world's nearly 200 nation-states. From ransomware attacks to rampant cryptocurrency theft, criminal exploitation of borderless digital systems threatens global economic security and the ...
1 year ago Csoonline.com
Stop, Collaborate and Listen: Disrupting Cybercrime Networks Requires Private-Public Cooperation and Information Sharing - As we reflect on 2022, we've seen that malicious actors are constantly coming up with new ways to weaponize technologies at scale to cause more disruption and devastation. The dangers are showing up everywhere - and more frequently. The volume and ...
1 year ago Securityweek.com
Adobe Real-Time CDP: Personalized Customer Experience - Adobe Experience Cloud Products like Adobe Real-Time CDP are available to assist. A revolutionary solution called Adobe Real-Time Customer Data Platform was created to assist companies in realizing the whole value of their customer data. Adobe ...
10 months ago Hackread.com
Prioritizing cybercrime intelligence for effective decision-making in cybersecurity - In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures. Our discussion will cover a range of essential aspects, from the importance of continuous ...
9 months ago Helpnetsecurity.com
Latest Information Security and Hacking Incidents - Cybercrime has transpired as a serious threat in India, prompting calls for comprehensive reforms and collaborative efforts from various stakeholders. Experts and officials emphasise the pressing need to address the evolving nature of cyber threats ...
6 months ago Cysecurity.news
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
11 months ago Esecurityplanet.com
6 Facts About How INTERPOL Fights Cybercrime - Interpol recently celebrated its 100th anniversary, and as it steps into its second century of operation it remains highly relevant as a policing organization of our technical age. Interpol's global cybercrime program is one of four law enforcement ...
5 months ago Darkreading.com
Microsoft takes down websites used to create 750 million fraudulent accounts - Microsoft seized certain websites run by a Vietnam-based group that created roughly 750 million fraudulent Microsoft accounts after the software maker received a court order a week ago from the Southern District of New York. Posting to its blog Dec. ...
11 months ago Packetstormsecurity.com
US charged 19 suspects linked to xDedic cybercrime marketplace - The U.S. Department of Justice announced the end of a transnational investigation into the dark web xDedic cybercrime marketplace, charging 19 suspects for their involvement in running and using the market's services. An international operation ...
10 months ago Bleepingcomputer.com
Helping to keep the lights on in Ukraine in the face of electronic warfare - Ukraine's high-voltage electricity substations rely on GPS for time synchronization. Many of Ukraine's high-voltage electrical substations - which play a vital role in the country's domestic transmission of power - make extensive use of the ...
11 months ago Blog.talosintelligence.com
CyberCrime & Doing Time: Classic Baggie: Part Three - He claimed he was selected as an independent contractor to rebuild a fleet of airplanes for KLM Royal Dutch Airlines, who had wired him $3.5 Million Euros into his Swiss bank account at Neue Privat Bank. His attorney, Phillip Richardson, said that he ...
9 months ago Garwarner.blogspot.com
Understanding the Seizure of Dark Web Sites Linked to the Hive Ransomware - Recently, law enforcement seized several dark web sites linked to the Hive ransomware. The Hive ransomware is a potent form of malware that cybercriminals use to target organizations and individual computer users in order to demand a ransom for ...
1 year ago Bleepingcomputer.com
Nigerian Police dismantle cybercrime recruitment, mentoring hub - The Nigerian Police Form has arrested six suspects and dismantled a mentoring hub linked to cybercrime activities, including business email compromise, romance, and investment scams. After receiving intelligence and investigating a group of ...
11 months ago Bleepingcomputer.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 month ago Aws.amazon.com
GTA 6 Hacker: Life in Secure Hospital for Cybercrime Intent - The teenage hacker who leaked details about Grand Theft Auto 6 is now facing a life sentence in a guarded institution, which is a surprise development. The person, identified as Lapsus, was placed under an indefinite hospital order because of worries ...
10 months ago Cysecurity.news
Telegram Emerges as Hub for Cybercrime, Phishing Attacks as Cheap as $230 - Cybersecurity experts raise alarms as Telegram becomes a hotspot for cybercrime, fueling the rise of phishing attacks. In a recent development, cybersecurity researchers shed light on the democratization of the phishing landscape, courtesy of ...
9 months ago Cysecurity.news
Why Cybersecurity Businesses Need a Real-Time Collaboration Tool - When the Cybercrime in a Pandemic World study was released in late 2021, the report noted that cybersecurity threats had risen 81% since the coronavirus raised its ugly head. It was a time of restrictive lockdowns, stay-at-home orders, and mask ...
1 year ago Hackread.com
Beyond the Noise: Appreciating the Quiet Work of Effective Doers - In many cases, few, if any, are aware of the work that they do and how important it is. We as an industry are long overdue in appreciating those who talk little but deliver big for us time and time again. Getting things done requires more than talk - ...
11 months ago Securityweek.com
What is a one-time password? Definition from SearchSecurity - A one-time password is an automatically generated numeric or alphanumeric string of characters that authenticates a user for a single transaction or login session. An OTP is more secure than a static password, especially a user-created password, ...
10 months ago Techtarget.com
'Operation Endgame' Hits Malware Delivery Platforms - Law enforcement agencies in the United States and Europe today announced Operation Endgame, a coordinated action against some of the most popular cybercrime platforms for delivering ransomware and data-stealing malware. A frame from one of three ...
5 months ago Krebsonsecurity.com
DOJ to up tempo of cybercrime operations in 2024, senior official says - After a year of high-profile cybercrime busts, a senior Justice Department official said Tuesday that he expects more to come in 2024. At the 10th International Conference on Cybersecurity in New York City this week, several top prosecutors within ...
10 months ago Therecord.media
Cyber Insights 2023: Criminal Gangs - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. Despite some geopolitical overlaps with state attackers, the majority of ...
1 year ago Securityweek.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)