Logo
    Search

    Podcast Summary

    • The Dishonest and Unethical Practice of Insider TradingInsider trading is illegal and unreliable, and using privileged information to gain an unfair advantage is both dishonest and unethical. The stock market must remain fair and transparent to avoid any exploitation of confidential or non-public information.

      Insider trading is an illegal practice in the stock market where traders obtain privileged information about a company's internal reports or financial data, before it is publicly disclosed. Such information gives them an unfair advantage over other traders and investors, making the process dishonest and unethical. Predicting the future of a company is hard and often risky, and relying on insider information to make trades isn't a reliable method. Despite the illegality and the risk involved in insider trading, people still try to obtain privileged information and profit from it. It's important to maintain fairness in the stock market and to avoid using confidential or non-public information to gain an advantage over others.

    • A Tense and Risky Airport Meeting for an Insider Trading SchemeConducting sensitive business meetings in public places can compromise information security and lead to legal repercussions. Always choose a secure location to discuss confidential matters.

      The busiest airport in the world, Atlanta Airport was once the scene of an important business meeting that involved a carefully-timed on-the-hop business meeting by a Ukrainian stockbroker named Arkadiy Dubovoy, his business partner Alexander Garkusha and Vitaly Korchevsky, a hedge fund manager from Wall Street. Arkadiy proposed a foolproof way of having access to top-level insider financial information on big US companies before anyone else knew about it, which could be used to make big trades on that company's stock with insane profits. This one-of-a-kind insider trading scheme was discussed in the airport, which is not the best place for such an important business meeting.

    • Insider Trading and the Importance of Regulating such ActivitiesInsider information can result in huge profits or losses, and it is important to regulate such activities to prevent illegal means to make money in the stock market.

      Insider information on financial reports of publicly traded companies can result in big profits or losses in the stock market. Newswire agencies specialize in distributing financial reports and other news that a company needs to relay to its shareholders, making the process easier for the companies. This kind of financial information can have a huge impact on investors and stock prices in the market. Vitaly, using his stock market knowledge, teamed up with Arkadiy who had reliable insider information by accessing financial reports before they were made public, and Ivan, a hacker, to make more money illegally. This shows how people can use illegal means to gain profits in the stock market and how important it is to regulate such activities.

    • The Vulnerability of Digital Networks and the Importance of CybersecurityImplementing robust cybersecurity measures such as regular security assessments and employee training can prevent cyberattacks like the theft of non-public press releases which can lead to significant financial losses. Prevention is key in cybersecurity.

      The theft of non-public press releases from leading newswire agencies through SQL injection attacks and phishing emails highlights the vulnerability of digital networks where information is stored before release. Cybercriminals can target such vulnerabilities to exploit sensitive data, leading to significant financial losses for unsuspecting traders and businesses. Organizations must prioritize cybersecurity and implement robust measures to prevent such attacks. Such measures include network monitoring, regular security assessments, multi-factor authentication, and employee training to avoid phishing attacks. Prompt release of software patches and updates to prevent known vulnerabilities can also prevent such breaches. Prevention is always better than cure in cybersecurity.

    • Using Automated Systems and Video Demos to Streamline Insider Trading SchemesInsider traders can benefit from automation and video demonstrations to make the process of parsing information and covering tracks easier, while the SEC's use of advanced technology makes it challenging to engage in illegal trades.

      Insider trading schemes involve fast processing of a lot of information that could move the market and traders need to plan their exit. It becomes tedious and repetitive to download and share press releases manually. An automated system can ease the process and make it easier to parse information. Traders may not be tech-savvy so video demos help them access the press releases on the server and share tips on how to cover their tracks using VPNs and proxies. The SEC uses advanced technology such as the Artemis system to detect illegal trades. Ivan, the hacker, lost his backdoor access into PR Newswire in January 2011 but found another way to keep a steady flow of press releases to traders.

    • The Costly Consequences of Insider Trading and Information BreachTight security measures and ethical business practices are critical in preventing insider trading and protecting sensitive information. Any breach can lead to costly lawsuits and reputational damage.

      Insider trading can yield huge profits in a short amount of time, as seen in the examples of Dendreon Corp and Caterpillar Inc. The crucial role of the hacker Ivan is also evident in this scheme. However, leaving breadcrumbs behind can lead to the identification of those involved in the scheme. Marketwire even filed a $25 million lawsuit against PR Newswire for allegedly poaching their staff to gain confidential information and trade secrets. Overall, the case highlights the importance of tight security measures in companies that handle sensitive information.

    • Hacking and Trading in Collaboration for MillionsCollaboration between hackers and traders can lead to major financial gain, but eventually, bragging and carelessness can lead to their downfall and criminal charges. The authorities are always watching.

      The hacking scheme involved two distinct skill sets- hacking and trading, working together to make millions of dollars by stealing press releases and making trades based on that information. The traders didn't know the hackers, and there were middlemen to distance them. However, a drunk bragging by Ivan to his friends led to a double-cross, resulting in Ivan losing access to the source of valuable press releases. The FBI discovered the breach and Ivan's backdoor in PR Newswire's systems, leading to the removal of his access and Olek managing to restore his own access, but unbeknownst to them, the authorities were onto Ivan, and they had him firmly in their sights.

    • How Insider Trading and Hackers Worked Together for ProfitInsider traders and hackers collaborated to profit from selling valuable information. Their scheme lasted until authorities caught on, proving that crime doesn't pay.

      Hackers know the value of information. They carry out schemes to sell financial, business or personal data. The longer the scam runs, the more confident everyone gets. The insider traders know which press releases are more valuable or useful than the others. They ask for early access to them and receive profits after trading. Ukraine has extradition laws that protect the citizens from another country's authorities. This led the hackers to keep the scheme going. The introduction of new traders increased the profits but also increased the risk for the criminals. Money attracted the criminals to expand the business, and they kept living the luxurious lifestyle until the authorities caught them. The crime didn't pay in the end.

    • International Hacking Scheme Exposes Profitable Trading ScamSeven individuals arrested and found guilty after hacking and trading scheme exposed. Confidential news releases stolen led to over $30 million in profits, with multiple law enforcement agencies involved in investigation and seizure of funds and properties.

      An international hacking and trading scheme involving several people was uncovered and litigated, resulting in seven arrests and guilty pleas from some of the involved individuals. The scheme involved hacking the networks and servers of Marketwired, PR Newswire, and Business Wire in Ukraine to steal over 100,000 confidential news releases. Using various hacking tactics, the individuals involved in the scheme made over $30 million by trading ahead of more than 800 releases. The investigation, indictment, and trial involved multiple law enforcement agencies, resulting in the seizure of seventeen bank and brokerage accounts and fifteen properties believed to contain over $6.5 million. The evidence presented in the trial revealed the extent of the involvement of each individual in the scheme.

    • Insider trading using hacking leads to multi-million-dollar scheme and prison sentences.Financial fraud using hacking is a growing concern, leading to increased regulation and security measures. Even masterminds can be caught through real-time anomaly detection, and greed is often the driving force behind such schemes.

      Insider trading using hacking was used to make over $30 million. Vitaly and Vlad, the masterminds, were found guilty and sentenced to five and four years in prison, respectively. One hacker, Vadym, was caught and sentenced to two-and-a-half years in prison, with restitution of over $3 million. Ivan, Olek, and Pavel are still on the US most-wanted fugitives list for their involvement. The SEC now has tools to detect anomalies in real-time to prevent similar schemes. Greed drove the team to expand and cut corners, leading to their downfall. This scheme highlights the need for increased regulation and security measures to prevent financial fraud using hacking.

    Recent Episodes from Darknet Diaries

    147: Tornado

    147: Tornado

    In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity and Tornado cash. It’s a digital heist of epic proportions that changes everything.

    This story comes from part of Geoff’s book “Rinsed” which goes into the world of money laundering. Get yours here https://amzn.to/3VJs7pb.

    Darknet Diaries
    en-usJuly 02, 2024

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    139: D3f4ult

    139: D3f4ult
    This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries. Sources https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/ https://archive.ph/Si79V#selection-66795.5-66795.6 https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

    138: The Mimics of Punjab

    138: The Mimics of Punjab
    This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy. To learn more about protecting your digital privacy, watch Naomi’s YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner’s Introduction to Privacy (https://amzn.to/3EjuSoY). Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from SpyCloud. It’s good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they’ll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    189: Ashwin Krishnan: The Moral Compass For Cybersecurity – Should We or Shouldn’t We?

    189: Ashwin Krishnan: The Moral Compass For Cybersecurity – Should We or Shouldn’t We?

    Ashwin Krishnan is a technology expert with over two decades of experience in cybersecurity and cloud technologies.

    Formerly Senior Vice President of Products and Strategy at HyTrust, a late stage security startup, Ashwin is now a reformed high tech executive turned freelance Cyber Moralist and Tech Demystifier.

    He is the host of The Moral Compass Podcast, and a regular columnist for CSOOnline.com, ITSPMagazine, ThriveGlobal and Qrius. He also contributes to publications such as LightReading.com, Securitynow.com, CIOreview.com, SDxcentral.com, Virtual-Strategy.com, SoftwareMag.com, TEISS.co.uk and CloudTweaks.com, and is further quoted in publications including Erpscan.com, DigitalGuardian, FutureOfEverything.com, TalkinCloud.com, EnterpriseProject, MRC  and SiliconIndia.com.

    A recognized thought leader, his speaking engagements have included the Mobile World Congress, CSA World Congress, ISACA,RSA Security Conference, VMWorld, Telecom Industry Association, and Product Camp Silicon Valley.

    In our eye-opening discussion with Ashwin, he sheds light on the impact of cybersecurity on our day-to-day lives and our businesses. Massive amounts of data are being collected and stored – how is it being protected and used? Who is responsible if/when things go wrong? Ashwin addresses these questions and more, as we delve into the complex world of technology, artificial intelligence and automation.

    We are getting there faster than most realize. Whether you are a small business owner, an industry leader, or simply a consumer in today’s society, this episode will enlighten and engage you in an important conversation about the morality and ethics of cybersecurity and what it means to us today.

    Key Takeaways

    1. We are at the cusp of something dramatic. We have gotten to where we’re at by the efforts of humans. Now, humans are being outpaced by machines, however they lack fundamental human concepts of ethics and moral values.
    2. A lot of research is being done on cyber morality and its impact, but it’s not yet translating into the business world.
    3. Twitter can already predict the onset of depression based on the words you use repeatedly. The question is, “What they do with that information? Who do they inform?”
    4. It is getting easier to manufacture numbers of followers. Which begs the question, “If my competitors are doing it, should I or shouldn’t I?”
    5. There are 3 stages of Artificial Intelligence: Data insights, Prediction, and Action. The morale framework needs to be applied at all stages.
    6. At what point goes a human need to step in to make the right decision? The problem is the amount of data – it will be impossible.
    7. We’re getting there faster than people realize. Uber is going towards driverless vehicles and trucks. An important question to ask is, “What biases are getting built into autonomous vehicles?”
    8. Small companies need to pay attention to the information they are collecting and storing and how the data is being put into application. They can use a 3rd party, but who will ultimately be accountable if something goes wrong?

    Episode Show Notes: https://leadersoftransformation.com/podcast/business/180-ashwin-krishnan-the-moral-compass-for-cybersecurity 

    Check out our complete library of episodes and other leadership resources here: https://leadersoftransformation.com

    ________

    📣SUBSCRIBE to the Leaders of Transformation Podcast 

    👇 CONNECT with Nicole Jansen on Social Media 

     

    ▶︎ YOUTUBE

    ▶︎ INSTAGRAM

    ▶︎ FACEBOOK 

    ▶︎ LINKEDIN

    ▶︎ TWITTER

    The Plight of “Tipper X”: How Tom Hardin Became The Most Notorious FBI Informant in the Biggest Insider Trading Case in Decades — And The Long Run To Redemption

    The Plight of “Tipper X”: How Tom Hardin Became The Most Notorious FBI Informant in the Biggest Insider Trading Case in Decades — And The Long Run To Redemption
    This week we explore some very new terrain. Let's kick it off with the Greek myth of Icarus. As the story goes, Daedalus — a master craftsman best known for building King Minos' labyrinth to trap the Minotaur — plied his talent to construct a pair of wax and feather wings to help him and his son Icarus escape from Minos' vendetta (it's a long story) and Crete altogether. Being the good father he was, Daedalus pled with his son not to fly too close to the sun for fear that the heat would melt the wings. But as sons are wont to do, Icarus ignored his father’s advice. The rest is history. The heat indeed melted Icarus' wings, sending him into a deathly free fall collision with the sea which today bears his name, the Ikarian Sea near Ikaria — ironically one of the Blue Zones as described in my recent podcast conversation with Dan Buettner. As most know, this is an age-old remonstration about ambition. A tragic allegory about the perils of hubris, particularly when fueled by a sense of entitlement, and perhaps sprinkled with a light dusting of denial. These are all very human traits of course. And if today's guest is anything, he is quite human indeed. Tom Hardin was a highly motivated young guy with a big bright future and Wall Street aspirations. After graduating from the prestigious Wharton School of Business, he was on track to achieve his dream when he landed in the fast paced hedge fund world and quickly rose through the ranks. But it wasn’t long before Tom felt he was falling behind – lacking that mysterious competitive ‘edge’ so many others seemed to freely enjoy (without repercussion) to their reward in untold millions. What was that edge? If you ask Tom, he will tell you the not so secret to success within the insular hedge fund world meant having a network of inside sources willing to share reliable confidential information about companies they worked for or with. Everybody's doing it. Nobody's getting caught. I'm falling behind. Then one day Tom got a call from an investor colleague named Roomy Khan – a woman with some pretty juicy insider tips. The timing was right. Tom was primed. And that fateful moment arose. That moment when you make a decision to take a very small step over a very important line. A decision you simply cannot undo. Not now, not ever. For Tom, it started with taking a few small crumbs off the table. An imperceptible insider trade here, another one there. Until one day, the previously unthinkable became easy. Almost too easy. Capitalizing on a handful of secrets fed by Khan and others about companies like Google, 3Com and Hilton Hotels, Tom's flight towards the sun escalated to the tune of $1.7 million in gains for his fund and $46K in personal profits. Then in July 2008, while dropping of his dry cleaning one morning, Tom felt a tap on the shoulder. A tap that would alter the trajectory of his life forever. Like a scene out of a movie, Tom turned to face two FBI agents boxing him in with with a Hobson's choice – either get in the back of the black sedan for a trip downtown, or start providing actionable information on those higher up the food chain. Panicked and heart pounding, he immediately opted for the latter. Ultimately, Tom became one of the most prolific informants in securities fraud history. Soon infamous as the mysterious, unnamed Tipper X, Tom spent the next several years wiretapping and documenting the illegal misdeeds of friends and c...

    The Sunday Read: 'Who's Making All Those Scam Calls?'

    The Sunday Read: 'Who's Making All Those Scam Calls?'

    The app Truecaller estimates that as many as 56 million Americans have fallen foul to scam calls, losing nearly $20 billion.

    Enter L., an anonymous vigilante, referred to here by his middle initial, who seeks to expose and disrupt these scams, posting his work to a YouTube channel under the name “Jim Browning.”

    On today’s Sunday Read, Yudhijit Bhattacharjee follows L.’s work and travels to India to understand the people and the forces behind these scams.

    This story was written by Yudhijit Bhattacharjee and recorded by Audm. To hear more audio stories from publishers like The New York Times, download Audm for iPhone or Android.

     

    Inside the secret world of corporate spying

    Inside the secret world of corporate spying

    Watch This Interview Live: Click Here

    We all know the Russians spy on us and that we spy on the Chinese but what most people are shocked to find out is that major corporations are spending hundreds of millions of dollars a year to spy on each other.  RUSE is a juicy, captivating look into the dark underbelly of corporate espionage and cybercrime as companies attack each other at their very core.

    Pulling no punches, RUSE provides a never before seen look into the hidden life of a corporate spy.

    Robert Kerbeck’s true crime memoir about his career as the world’s #1 corporate spy, RUSE: Lying the American Dream from Hollywood to Wall Street, has received praise from Frank Abagnale (Catch Me If You Can), ex-CIA Agent Valerie Plame (Fair Game), and Bradley Hope (Billion Dollar Whale). RUSE is currently in development for a TV series with Silver Lining Entertainment (Showtime’s Your Honor).

    He has been featured on many of the most popular podcasts and radio shows in the country.

    Buy the Book: Click here

    Do you or someone you love Not lasting as long as they should in the bedroom? 🍆"Hims" can help👇🏽 Click this link below https://prf.hn/l/7ENJ05V

    Want to see this and many more interviews LIVE! Subscribe to our Youtube Channel: Click Here

    Toni Townes-Whitley (Microsoft) - The Ethics of Innovation

    Toni Townes-Whitley (Microsoft) - The Ethics of Innovation
    How often do entrepreneurs and corporate leaders think about issues like fairness, accessibility or unseen biases in the technologies they invent and advance? That’s the challenge for companies leading the digital transformation that’s disrupting every aspect of society, says Toni Townes-Whitley, Corporate Vice President of Worldwide Public Sector and Industry at Microsoft, in this talk about innovating strategically and responsibly.