Blog

Navy veteran raped schoolgirl and planted hidden camera

Scott Forbes plied a 14-year-old girl with alcohol during sex attacks in Edinburgh.

A former serviceman raped a schoolgirl and sexually assaulted another underage girl 

By STV

Scott Forbes also placed a hidden camera in another victim’s bedroom and recorded footage of her while she was naked and getting dressed.

Jailing him for nine years on Monday, a judge told Forbes, 49, that the corrosive effect of his behavior on victims was “incalculable”.

 Lord Woolman said: “You have altered the course of their lives.”

Forbes, formerly of Firrhill Park, in Edinburgh, was convicted of five offences committed between 2009 and May last year, including rape, sexual assault and possessing and making indecent images of children.

He locked a 14-year-old in a house in Edinburgh and made sexual remarks to the child and molested and raped her and photographed her naked body.

He also plied another 14-year-old with drink, showed her pornography, molested her and took pictures of her naked body while she was intoxicated at an address in Edinburgh on May last year.

Forbes was also found to have set up equipment at a house in Bonnyrigg, in Midlothian, to covertly shoot and record footage of a third victim in April last year.

Lord Woolman also ordered at the High Court in Edinburgh that the Royal Navy veteran should be kept under supervision for an extra four years after his release.

The judge said he had “narrowly” decided against calling for a full risk-assessment report, which can lead to the making of an Order for Lifelong Restriction.

He told Forbes he was prepared to treat him as a first offender and noted that he had medical problems which have prevented him working for the last eight years.

Defence counsel David Nicholson said Forbes continued to deny the serious sexual offending.

Mr Nicholson said Forbes had been on long term sick leave following a variety of health problems.

He told the court that Forbes has a neurological condition and was previously diagnosed with post traumatic stress disorder.

The defence counsel said that arose primarily from Forbes’ service when he was stationed in Iraq and the Arabian gulf.

He added: “He is not somebody with any difficulty with drugs or alcohol.”

Following the sentencing, police praised victims who came forward to give evidence against Forbes.

Detective Sergeant Jonny Wright, of Edinburgh’s Public Protection Unit, said: “Scott Forbes is a devious individual who took advantage of each of the victims’ trust.

“I want to commend their bravery in coming forward, which has led to Forbes’ conviction.

“I would also like to reassure any victims of sexual crime that there is no time limit to reporting offences and we will always investigate.”

Police Scotland added: “Anyone with information about sexual offences can contact Police Scotland on 101, or report this anonymously to the independent charity Crimestoppers on 0800 555 111.”

Amazon Echo turned into snooping device by Chinese hackers

‘ALEXA, SNOOP ON MY WESTERN BUDDIES’ is potentially a command Chinese hackers barked at an Amazon Echo after they managed to turn it into a snooping device.

By Roland Moore-Colyer

Cybersecurity boffins from Chinese firm Tencent’s Blade security research team exploited various vulnerabilities they found in the Echo smart speaker to eventually coax it into becoming an eavesdropping device.

The hackers showed off the snooping speaker at the DefCon security conference, reported Wired, using it as a demonstration for the potential for smart home devices to be used for surveillance.

 
But before you boot your Echo or Google Home out of the nearest window, the hackers noted that getting into the Echo was hardly an easy process, and Amazon now has fixes for the security holes.

“After several months of research, we successfully break the Amazon Echo by using multiple vulnerabilities in the Amazon Echo system, and [achieve] remote eavesdropping,” a description of the hackers work, provided to Wired, explained.

“When the attack [succeeds], we can control Amazon Echo for eavesdropping and send the voice data through the network to the attacker.”

The hackers first needed to create a spying-capable Echo, which involved a multi-step penetration technique with enough intricacies to get past the device’s built-in security. This included taking apart the Echo, removing its flash chip and writing custom firmware onto it before remounting the chip.

Once done, the Echo then had to be connected to the same network as a target device Echo device. From there, the hackers could exploit a vulnerability in Amazon’s Whole Home Audio Daemon, which can communicate with other Echo devices on the network, and gain control over targeted Echo gadgets.

And, from there, they could then snoop on their victims and pass recording back to the malicious Echo or pipe all manner of sound through the hijacked Echo.

The technique is hardly an easy or particularly remote way to hack an Echo, but it does conjure up some techniques spies could apply in surveillance operations, providing they have permission to sneak into a person’s house, or they could go rogue like Ethan Hunt does in pretty much every Mission Impossible flick.

The whole situation also highlights how security in such devices needs to be given as much attention as other smart features, as there’s already been a swathe of examples where lax security in smart or connected devices has lead to hack attacks.