Posts Taged technology

Why Do Ordinary People Commit Acts of Espionage?

Political ideology and money serve as motivators for some people to commit acts of espionage, but they’re not the only factors involved.

By Jerad W. ALEXANDER

In mid-July, 2018, Mariia Butina, a 29-year-old assistant to the Russian central bank and long-time Vladimir Putin ally Alexander Torshin, was arrested in Washington, D.C., on a charge of “conspiracy to act as an agent of a foreign government,” according to the U.S. Justice Department. Per the affidavit, Butina was allegedly involved in an operation lead by officials within the Russian government to infiltrate the Republican party, including members of the Trump campaign, and the National Rifle Association, for the purposes of aligning right-wing political interests with similar interests in Russia. Butina’s actions dovetailed with continued efforts by Russian operatives to commit cyber espionage to influence U.S. elections.

According to the affidavit, two American citizens provided Butina intelligence and guidance on her efforts in the United States.

 
MI5, the intelligence agency of the United Kingdom, defines espionage as “the process of obtaining information that is not normally publicly available, using human sources (agents) or technical means (like hacking into computer systems). It may also involve seeking to influence decision-makers and opinion-formers to benefit the interests of a foreign power.” As Butina and countless others throughout history, such as spies like Julius and Ethel Rosenberg, have discovered, espionage is a dangerous game, one that can lead to imprisonment or even death. What motivates people to commit acts of espionage is as important as the ramifications of their actions.

Naturally, simple ideology serves as a motivator to commit espionage, but it’s not the singular cause. According to a Spring 2016 article of The Intelligencer: Journal of U.S. Intelligence Studies, ideology “is adopted by an individual to the degree that it reflects the individual’s ego. In that sense, an ideology is like another motivation – money – in that it serves as a vehicle for the individual to express a personal value or belief; an ideology is chosen in order to confirm conscious or unconscious beliefs the individual has already internalized. In the case of espionage, a particular ideology may serve as either the actual motivation for a spy to breach the trust placed in them or simply as a means of rationalizing that behavior.”

A Combination of Factors


Three concurrent elements need to exist within an individual to make them prone to acts of espionage — a personality dysfunction, personal crisis and opportunity.

According to Dr. Ursula Wilder, a clinical psychologist with the Central Intelligence Agency, four personality elements are essential to the entry into espionage: psychopathy, narcissism, immaturity, and grandiosity.

“A psychopathic person is a person whose approach to reality is ruthless and cold,” she stated in an interview at the International Spy Museum in Washington, D.C. “They have no conscience, or they have very limited capacity to feel guilt. So, their whole approach to life is predatory. They’re excitement seeking. They love to con people. It’s a game. This is all they can do to connect with other human beings. So that kind of person will commit espionage either flat-out for self-interest or because it’s fun, or both.”

“The next is narcissism,” she explained. “A narcissistic person is fundamentally ego-centric. They can only experience the world with themselves at the center. They are very much needy for and will provoke circumstances that will permit them to be at the center of attention. They believe that what they need, want and desire is the truth. They will get greedy for attention. That kind of person will commit espionage as a grab for fame. Someone like that will commit espionage because it makes them feel big and important.”

Regarding immaturity, Wilder explained an individual prone to commit acts of espionage (in comparison to a professional intelligence agent), either for or against their nation, is “an adult who can only function as an adolescent. These people live their lives in a blend of fact and fantasy. They do have a conscience, they can feel deep guilt afterwards, but fantasy is much more real to them than it is to adults who are grounded to reality, so to them committing espionage is a bit of a game, a fantasy, and online they have this illusion that if they do it online, if they just turn off the machine it goes away. They have a fantasy about the implications of their actions, and although on some level they might grasp the reality of it, it’s not real to them. The grandiosity applies to all three.”

An individual must be up against some form of personal crisis that produces distress. According to a paper released by the CIA titled “Why Spy?”, a survey of agency employees “identified emotional instability related to ambition, anger leading to a need for revenge, feelings of being unrecognized and unrewarded, and loneliness as the top vulnerabilities on the road to espionage. They ranked such problem behaviors as drug abuse and illicit sex as second, and various mental crises or stresses brought on by debt, work issues, or psychological factors such as depression as third.” Regarding opportunity, access matters. An individual must have access to sensitive information of some caliber that could be of use to a foreign power. All three combined — the personality, the crises, and the access — serve as fertile soil for acts of espionage.

It’s important to make the distinction between ordinary people who commit espionage and individuals who join intelligence services.

“People who join the intel community spent years preparing themselves — school, applying, screening — there’s a huge amount of drive and ambition, identification, pride,” says Dr. David L. Charney, a psychiatrist with the National Office of Intelligence Reconciliation, known as NOIR, a nonprofit dedicated to educating the intelligence community on the management of insider threats. This would include people with access to sensitive information who flip, such as Edward Snowden or Reality Winner. “They’re not coming in to be spies; they join for loftier reasons. The question is what makes a person go bad. That’s when you have to get more psychological.”

According to Charney, at the core of espionage can be an intolerable sense of personal failure, and not necessarily a shifting ideology. “Going back to the ideological spies of the 1930s and ’40s, we run across people all the time who you know have personal demons that are driving them, but they wrapped their demons into the current issue of the day to give it a higher-minded packaging. Any time you try to understand you have to dig a little deeper.”

Amazon Echo turned into snooping device by Chinese hackers

‘ALEXA, SNOOP ON MY WESTERN BUDDIES’ is potentially a command Chinese hackers barked at an Amazon Echo after they managed to turn it into a snooping device.

By Roland Moore-Colyer

Cybersecurity boffins from Chinese firm Tencent’s Blade security research team exploited various vulnerabilities they found in the Echo smart speaker to eventually coax it into becoming an eavesdropping device.

The hackers showed off the snooping speaker at the DefCon security conference, reported Wired, using it as a demonstration for the potential for smart home devices to be used for surveillance.

 
But before you boot your Echo or Google Home out of the nearest window, the hackers noted that getting into the Echo was hardly an easy process, and Amazon now has fixes for the security holes.

“After several months of research, we successfully break the Amazon Echo by using multiple vulnerabilities in the Amazon Echo system, and [achieve] remote eavesdropping,” a description of the hackers work, provided to Wired, explained.

“When the attack [succeeds], we can control Amazon Echo for eavesdropping and send the voice data through the network to the attacker.”

The hackers first needed to create a spying-capable Echo, which involved a multi-step penetration technique with enough intricacies to get past the device’s built-in security. This included taking apart the Echo, removing its flash chip and writing custom firmware onto it before remounting the chip.

Once done, the Echo then had to be connected to the same network as a target device Echo device. From there, the hackers could exploit a vulnerability in Amazon’s Whole Home Audio Daemon, which can communicate with other Echo devices on the network, and gain control over targeted Echo gadgets.

And, from there, they could then snoop on their victims and pass recording back to the malicious Echo or pipe all manner of sound through the hijacked Echo.

The technique is hardly an easy or particularly remote way to hack an Echo, but it does conjure up some techniques spies could apply in surveillance operations, providing they have permission to sneak into a person’s house, or they could go rogue like Ethan Hunt does in pretty much every Mission Impossible flick.

The whole situation also highlights how security in such devices needs to be given as much attention as other smart features, as there’s already been a swathe of examples where lax security in smart or connected devices has lead to hack attacks.

Creepy hostel owner caught using remote-controlled cameras hidden inside shampoo bottles to film women in the shower – and then put the clips on porn sites

New Zealand man pleaded guilty to charges related to secretly filming guests 
The court heard the man would film female guests at his homestay property 
He would put hidden cameras in shampoo bottles and upload footage online 

By ADAM MCCLEERY

A New Zealand man has pleaded guilty to secretly filming female guests while they showered at his homestay property by using cameras hidden in shampoo bottles. 

The Hawke’s Bay man faced the Hastings District Court and pleaded guilty to a combined 51 charges. 

The court heard he had made up to 219 recordings of 34 different women who had stayed with him before uploading them to a porn website. 

Stuff reported that the man would allow guests to us the shower in the property, but had to organise times first. 

Once those times were organized, the man would place shampoo bottles with hidden cameras around the bathroom and shower, the court heard. 

He would then use a remote control to turn them on, catching guests in the shower and undressing. 

He would wait until his house guests left the bathroom before retrieving the hidden cameras and uploading footage to his personal hard drive.

Once he had uploaded the videos online, he also encouraged users to leave ‘positive comments’, it was reported.

The court heard the man would caption the videos and describe his victims by race and occupation. 

In one case the man also added his own commentary to a video. 

The man’s identity was suppressed by the court, despite the pleas of crown prosecutor Steve Manning. 

‘There are 34 victims whose most intimate images have been spread all over the world,’ he said.  

The man’s lawyer, Matt Phelps, requested the suppression order to protect the man’s wife who he said suffers from a condition which would be compounded if he were identified,’ the New Zealand Herald reported.

Judge Geoff Rea imposed the suppression order and also granted the man bail pending his sentence at the Napier District Court in October.

The most serious charges the man faces carry a maximum jail term of 14 years.

Camouflaged camera used to spy on neighbours

A man who used a hidden camera to secretly film his neighbours has been convicted of harassment.

by Ryan Nugent

Thomas Kelly (66), of 14 Weirview, Lucan, Dublin, covered a camera in camouflage netting and pointed it to the rear of a neighbour’s house.

Mr Kelly claimed in court he was using the camera for security, to monitor property boundaries, and to catch one of his neighbours “masturbating repeatedly” in the man’s back garden.

Gardaí were alerted to the situation after the neighbour, Paul Lynam, discovered two cameras on a cliff at the back of his home in early 2016.

In his evidence at Blanchardstown District Court, Mr Lynam, of 7 Weirview, said: “I’d a feeling for a long time that I was being watched.”

On foot of the discovery, Mr Lynam, along with two other neighbours, journalist John Mooney and Willie Stapleton – whose homes were also captured by the camera, made an official complaint to gardaí on February 11, 2016.

The following day, gardaí arrived with a search warrant for Kelly’s home along with two other properties he owned, 11 and 12 Wearview.

Upon entering 14 Weirview, now-retired Detective Inspector Richard McDonald said in his evidence there were two large flat screen televisions located in the sitting room. One of the TVs was showing regular programmes, with the other having live feeds to all 16 of Kelly’s CCTV cameras.

Gda Damien Reilly also discovered the camera located on top of the cliff to the rear of the house.

The camera, along with the hard drive of the CCTV system and a number of USB sticks on which footage was stored, was seized by gardaí.

Det Insp McDonald said video footage showed zooming in on the rear of certain homes.

 
A further search by gardaí on July 15, 2016, discovered a replacement camera where the initial one was seized. On this occasion more USB sticks were seized.

On reviewing what had been seized initially, gardaí called Mr Lynam in on May 21, 2016, to review the footage.

One clip appeared to show Mr Lynam to the rear of his own home masturbating. When asked by gardaí if that was the case, Mr Lynam said it was.

In his defence, Kelly claimed in court that he had witnessed Mr Lynam masturbating at the back of 7 Wearview while he was working at the top of the cliff.

He said he had made a complaint to child and family agency Tusla and used the camera to catch Mr Lynam in the act.

Kelly said Mr Lynam was “habitually” naked and was “masturbating repeatedly”.

“My purpose in using those cameras was to capture him doing what we all knew he was doing so I could advance my case,” Kelly said.

He said his grandchildren would be up on top of the cliff and he didn’t want them to witness it.

Kelly also claimed that the 16 cameras were primarily used as a security mechanism and to monitor the boundaries of his land – currently the subject of an ongoing civil dispute.

In their evidence, the victims said they had been “stalked”.

Mr Mooney said: “I have a teenage daughter and a son with a camera pointed at their bedrooms. It terrifies me to think that’s going on.”

He added that he could not allow his daughter to open the blinds at the back of the house for two years, for fears they were being watched.

He said he was alerted to the cameras after Mr Lynam showed images of them to him.

Defence barrister Kitty Perle described the dispute between the neighbours over land as “hotly contested and entrenched warfare”.

Judge David McHugh found the defendant guilty on four counts of harassment. Kelly was remanded on bail until September 27, when victim impact statements will be read out.

 
Irish Independent

Spy camera fury: Staff walk out after discovering hidden lenses in Glasgow shop

STAFF at a city center health food store have gone on strike after discovering secret cameras in rooms where staff changed, just four weeks after opening.

Exclusive by Niall Christie

Workers at Harvest Stores, some under 18, were horrified and alerted police after findings the lenses hidden in a network modem and air detector.

The Union Street store, which has been closed since Monday’s walk out, houses nearly 70 cameras but, as the room is not a designated changing area, legal lines have not been crossed by managing director Amin Din.

The row emerged amid claims that Mr Din owes four staff thousands in unpaid wages.

Store manager Karen Nicholson, who led the walk out, said: “We shut the shop as soon as we found the cameras and got the police in.

“That is where staff got changed and nobody knew about these until Monday. We uncovered the cameras in the office on Sunday, where staff also get dressed, and then checked the staff room as we knew the number of cameras and microphones in the shop already.

“We might have suspected this but it was still a massive shock. He monitors the cameras from home.

“Police said that while it was morally questionable, legally he was in the clear.

“I am very upset. The staff are predominantly young women, some of them are just young girls under 18. Now they are worried about what has happened to the footage.”

She added that officers were “amazed” at the number of cameras in the shop.

Staff have also been left in the lurch as some are owed hundreds in unpaid wages from June. In total, four staff are yet to get just under £2,000 from the shop’s owner.

They now face an anxious wait to see whether they will be paid this week.

Despite being paid in full, supervisor Robert Taylor also walked out.

With three young children to support, he may have to sell belongings to afford food.

He said: “I’m putting together a list of things that I can afford to sell to pay rent.

“We’re doing this so new staff don’t have to deal with the secrets and lies like us.

“I will be looking for other work but I’m worried I won’t get my next pay this week.”

After walking out, staff approached the Baker’s Union and Better than Zero who are now supporting them through an industrial action.

A spokesperson for Better than Zero said: “It takes real courage to do what the workers at Harvest Stores are doing – standing together as union members, against a boss who has run his business with a toxic mix of control and intimidation.”

“Karen, Robert and their co-workers will go all the way to get the pay they’re due. But this is about more than settling a wage dispute – by speaking out and joining the BFAWU union en masse, they are lighting a beacon for everyone in Glasgow whose pay and conditions are set at the mercy of the boss.

 
“Precarious work is becoming the norm in Glasgow, and Better than Zero is ready to support all workers who are prepared to join unions and take on those who profit from low pay and insecurity.”

Police also confirmed that they had attended the store on Monday morning over a problem with security cameras.

They added: “Police provided assistance and advice was given to staff on the matter. No crime was identified.”

When asked to comment, Mr Din said that the matter was a “stupid oversight” on his part.

He said: “I hold my hands up and admit that I should have put signs up sooner.

“Basically the staff entered and found cameras in the staff kitchen area and office.

“It was not a changing area. The police confirmed that no law has been broken. They were installed by a reputable company. I can monitor these from home but they have not been working.

“They were purely for security purposes so that if there were any issues I could look back. I just never got around to putting them up. There is a separate area for changing for staff in the toilet facility, with a separate sink. This was made clear. There are cleaning products everywhere.

“The pay issue was resolved by the accountant and staff would have been paid in full on Monday. As the company is new, it hadn’t worked out.

“Staff were not paid in full or on time. Every single staff member was asked before hand. We were late getting details to the accountant so there was a delay.

“It was an oversight and they were there for security only.”

Man in Switzerland filmed neighbours’ young daughters with camera hidden in pen

A 52-year-old resident of the northern Swiss town of Lucerne was found guilty of downloading child pornography and filming his neighbours’ young daughters using a camera hidden in a pen.

The Local
news@thelocal.ch
@thelocalswitzer

The father of three had been downloading child pornography between 2011 and 2015, while also running an online forum where such images could be shared. 

The man was apprehended thanks to an Interpol warrant. He was found guilty of secretly filming his neighbour’s young daughters as they used his toilet. He had previously also uploaded images of children from a nudist beach in Austria, reports Swiss news portal 20 Minutes.

Both the young girls were interviewed by investigating authorities, who confirmed that the man had not physically abused them. 

The accused was also found guilty of appropriating a CD of family photos while housesitting his neighbour’s home.

According to an expert who testified in court, the accused had suffered abuse as a child. The court in Lucerne sentenced the man to two years imprisonment, although that sentence was later changed to a course of therapy, and a 34,000 Swiss franc fine. 

While the court judged that the acts were of limited harm, the presiding judge stated that there was a high chance the man could reoffend

Surely we can find, and stop, high-tech spies

It’s rumored that the U.S. intelligence community has commissioned The Eagles to rewrite some of their famous lyrics to serve as a deterrent to Russia and China. The hope is that this new song will stop the apparently unabated espionage activities occurring in the National Capital Region, known as the NCR. It’s called “You Can’t Hide Your Spyin’ Eyes.”

BY MORGAN WRIGHT

Concerns about enhanced technical espionage have circulated for a long time. A very provocative technology, currently being used by law enforcement and our military, is a cell-site simulator. Known as an IMSI-catcher, or commercially as a Stingray, it’s a box about the size of an oversized pair of sneakers.

 

IMSI stands for International Mobile Subscriber Identity. This is how the Global System for Mobile Communications (GSM) finds you, regardless of country, and delivers a call to you or allows you to make one to a destination of your choice. Several reports surfaced in 2017 that showed the Department of Homeland Security was worried about IMSI catchers. 

 

In a Nov. 17, 2017, letter, Sen. Ron Wyden (D-Ore.) asked the DHS National Protection and Programs Directorate if there was any evidence of foreign IMSI catchers operating in the National Capital Region. A pilot study had been conducted from January to November of the same year. The short answer was yes. The longer, typical government response was:

“The Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD) has observed anomalous activity in the National Capital Region (NCR) that appears to be consistent with International Mobile Subscriber Identity (IMSI) catchers. NPPD has not validated or attributed such activity to specific entities or devices. This information was reported to our Federal partners at the time it was observed.”

Now that it’s been established that nefarious electronic hijinks abound in the NCR, surely there must be a way to find it and stop it. Right? The short answer is no. The government answer is even more terrifying:

“NPPD is not aware of any current DHS technical capability to detect IMSI catchers. To support such a capability, DHS would require funding to procure, deploy, operate and maintain the capability, which includes the cost of hardware, software, and labor.”

The previous statement might make you think this is a newly discovered problem of which DHS is just becoming aware. But our Canadian neighbors found the same activity near their Parliament in 2017. In 2014, the Harvard Journal of Law and Technology said that “Hostile foreign intelligence services can and, almost certainly, are using the technology in this country for espionage.”

About two weeks ago, the Senate passed a spending bill that included language directing the Pentagon to divulge the use of IMSI catchers near U.S. bases and facilities. It’s not the first time the use of electronics has caused security concerns. A 20-year-old Australian student discovered the location of several military bases overseas by simply looking at the heatmap posted by Strava of running routes that had been shared.

You’d have to go back almost another 20 years to find when the threat of IMSI catchers became a real issue. The notorious hacker Kevin Mitnick was captured in 1996 using the same technology DHS is worried about in 2018. The hacking victim who helped the FBI track Mitnick down — Tsutomu Shimomura — was very well acquainted with the technology.

“Later that night, the FBI radio surveillance team from Quantico, Virginia, arrived at the Sprint cellular telephone switch office. The team talked to me a little about the technology they had toted along in the station wagon, especially something called a cell-site simulator, which was packed in a large travel case. The simulator was a technician’s device normally used for testing cell phones, but it could also be used to page Mitnick’s cell phone without ringing it, as long as he had the phone turned on but not in use. The phone would then act as a transmitter that they could home in on with a Triggerfish cellular radio direction-finding system that they were using.”

This wasn’t Shimomura’s first brush with cell phones. In 1993, in front of a congressional oversight committee, he showed how easy it was to use a software hack to listen in on the calls of nearby cellular phones. The problem isn’t new. In fact, it’s quite old.

If you take DHS’s response at face value, it appears NPPD does not have its own technical capability. If DHS has no organic ability, how did it detect anything in the first place? With a little help from other solutions. Project Overwatch, for example.

According to the RSA presentation, “Project Overwatch has been a multinational effort between USA, Germany, and Australia to create a solution leveraging GSMK’s patented Baseband Firewall technology.” This began six years ago.

In February 2017, at the RSA Security Conference in San Francisco, a demonstration of Project Overwatch showed the detection of rogue IMSI catchers — the same technology DHS used, but did not disclose, in its letter to Sen. Wyden.

The warnings were there. The threat was there. Six years ago, we worked with our allies to develop a solution to counter this growing form of technical espionage. So why is Congress just now worried about this?

It’s inconceivable that this electronic eavesdropping that targeted the White House, Congress, our federal law enforcement and intelligence agencies, and who knows what else, should have gone on for this long without a warning to the relevant oversight committees. And the public.

When it comes to our national security, no one should be allowed to, as The Eagles might say, “Take It Easy.”

Morgan Wright is an expert on cybersecurity strategy, cyberterrorism, identity theft and privacy. Previously Morgan was a senior advisor in the U.S. State Department Antiterrorism Assistance Program and senior law enforcement advisor for the 2012 Republican National Convention. Follow him on Twitter @morganwright_us.

South Korean women protest in Seoul over hidden sex cameras

Tens of thousands of women gathered in Seoul on Saturday calling for a crackdown on spy cam pornography, in one of the country’s biggest ever female-only protests.

Perpetrators film or photograph women with hidden cameras in public spaces.

Although distributing pornography is illegal in South Korea, the videos and pictures are shared widely online.

Organisers say women live in constant fear of being photographed or filmed without their knowledge.

Carrying placards and banners with messages like “My life is not your porn”, the women were mostly teenagers or in their 20s – seen as the main victims of the hidden cameras.

“Those men who film such videos! Those who upload them! Those who watch them! All of them should be punished sternly!” they chanted.

The women covered their faces with masks, hats and sunglasses as instructed by the organisers.

Demonstrators said around 55,000 women took part, although police put the figure at around 20,000.

The recent protests began after police arrested a 25-year-old woman in May for secretly photographing a male colleague who posed nude for university art students. She then shared the picture online.

Demonstrators believe police only acted so swiftly because it was a female perpetrator, and pointed to instances of police closing cases with female victims because they could not find the photographers or track them online, because they posted on foreign servers.

While the law mandates a maximum five-year prison term or 10 million won ($8,970; £6,770) fine for creating sexual images, and a maximum seven year sentence and 30 million won ($26,900; £20,200) fine for distributing them for profit, protesters say many receive far lighter punishments.

The recent protests began after police arrested a 25-year-old woman in May for secretly photographing a male colleague who posed nude for university art students. She then shared the picture online.

Demonstrators believe police only acted so swiftly because it was a female perpetrator, and pointed to instances of police closing cases with female victims because they could not find the photographers or track them online, because they posted on foreign servers.

While the law mandates a maximum five-year prison term or 10 million won ($8,970; £6,770) fine for creating sexual images, and a maximum seven year sentence and 30 million won ($26,900; £20,200) fine for distributing them for profit, protesters say many receive far lighter punishments.

By BBC

Chinese peeping Tom installed secret cameras to film couples in love hotels and sell footage online

Man accused of selling footage through popular social media platform

by Nectar Gan

A man has been arrested in southwest China on suspicion of installing webcams in hotels to film couples having sex and then selling the footage online, according to local media reports.

When the couple went to bed they looked up and saw a hole in the ceiling, which they examined and found a camera had been hidden inside pointing directly at the bed.

The two immediately called the police, who soon arrived and took out the camera.

Police found no memory cards inside so concluded it was a real-time webcam that sent footage to another platform.

“My whole body just froze up,” said the woman, who then decided to spend the night sleeping in the car with her husband.

The next day, the couple went to the hotel to demand an explanation, but the hotel said it was not aware the camera was there.

After further investigation, a second webcam was found in a room on the same floor.

Hotel staff told police they remembered that a man had booked two rooms at the hotel in March and checked in on his own. The two rooms he had booked turned out to be the ones that had the cameras installed.

A month later, police seized the suspect in his flat, and found two hard drives totalling 3 terrabtyes of memory containing the sex tapes he had recorded.

The man was reported to have told police he came up with the idea because he was broke and wanted to earn some quick money by selling the clandestine footage.

He first installed cameras in hotels in his home county about 100km (60 miles) away from Chengdu, but the people who checked in to the hotels were “not ideal”, he said.

Following suggestions from his customers, he decided to install cameras in more expensive hotels in the provincial capital, and bought a fake identity card online.

Through mobile apps, he located love hotels popular among young couples. But the first camera he installed in January was soon discovered by a hotel staff member and thrown away.

Not ready to give up, he tried again in March.

The two cameras he is accused of installing then had been connected to the power strip in the ceiling and could be automatically turned on when the customers plugged in the room key.

The report said footage was directly sent to the man’s phone and then uploaded to a computer.

Police believe the man created a chat group on QQ, a popular social media platform, and started to absorb “members” who would pay a monthly fee for unlimited access to the footage.

In just a few months, the monthly fee rose from 400 yuan (US$60) per month to 2,000 yuan. He had about 10 “members” in total and made 15,000 yuan, he said.

The man has now been officially arrested on the charge of spreading obscene articles. There was no word on whether police would seek to take action against his subscribers.

CABBIE CAM Lanarkshire taxi driver installed hidden camera in his cab to upskirt female passengers

Police discovered his pervy cam after they raided his home in connection with sick images of children

By David Meikle

A TAXI driver who installed a hidden camera to film under the clothing of unsuspecting passengers is facing jail.

David Whitehead, 53, set up the covert device in a twisted bid to record members of the public as they travelled in his vehicle.

His seedy spying operation saw him capture footage of a passenger but it only came to light when police raided his home in connection with sick images of children.

Officers launched a dawn raid at the property in Cumbernauld, Lanarkshire, after a tip off and discovered extreme clips and pictures.

The disturbing haul of 2503 photos and 1529 videos included horrific footage of abuse.

Whitehead appeared at Airdrie Sheriff Court and admitted taking or permitting indecent images of children between August 2005 and August 2017

He also admitted having the hidden camera in his car between August and September 2013.

The court was told Whitehead was stripped of his taxi licence soon after his arrest last year.

 

Depute fiscal Agnes Meek said: “Information was received by the National Child Abuse Prevention that a device associated with the locus was connected to the internet and had indecent images of children available for sharing.

“Officers sought and were granted a warrant and police attended to execute the warrant.

“A systematic search was carried out and a number of devices were seized.

“The accused while standing in his kitchen in front of officers, stated ‘it is all me, nothing to do with my boy’.

“He was detained and after provided a no comment interview.”

Miss Meek added: “One moving image is 29 minutes long and features several clips put together of child sexual exploitation.”

Sheriff Derek O’Carroll deferred sentence and continued Whitehead’s bail for reports but warned him to expect to be sent to prison.

He added: “Given the nature of the offences you should understand that a custodial sentence is very much at the forefront of this court’s mind.

“I will continue your bail but you should not draw any conclusions from that regarding the ultimate final disposal of this case.”

Whitehead was placed on the sex offenders register.

North Lanarkshire Council confirmed they revoked Whitehead’s taxi licence last year.

His not guilty pleas to possessing indecent photos, possessing extreme bestiality images and possessing cannabis were accepted by prosecutors.