Here's how to SMS spam Liberal voters and get away with it

Bulk SMS sender, Tails, Tor, and some free WiFi

It's easy to spam voters with text messages and get away with it.

If you wanted to swing voters ahead of a federal election, as the Australian Labor Party is alleged to have done in a message claiming a rival Liberal Coalition Government would privatise the nation's healthcare provider Medicare, you wouldn't send a text message from campaign-linked phones.

That would make the job of the Australian Federal Police too easy. The feds are now investigating the incident which occurred during Australia's federal election period, the results of which are still neck-and-neck.

Labor campaign headquarters says the text messages were in line with its party propaganda messaging.

The texts had the MMS subject of 'Medicare' with some recipients believing the message was sent from the government health agency.

But you're smarter than to get caught, so instead you first turn to Google. Try it yourself; type 'bulk SMS no registration' and enjoy filtering through the many paid and free offerings available.

Select one that is offshore, preferably.

But don't send your text just yet.

Reg hack Chirgo gets a text.

Grab that cheap burner laptop bought off Gumtree you've never used with Tails installed and jump on some cafe wifi three towns over. Fire up Tor.

Browse to your bulk SMS site, register with a throwaway email account and garbage credentials, buy credit using your anonymous currency of choice, be it bitcoins or virtual credit cards, and load up your database brimming with voter victim phone numbers.

Enter your details.

Fret over the number of CCTV cameras you walked past.

All of this is of course nothing new, and there are doubtless better operational security tactics to pursue.

Mobile numbers in Australia can also be spoofed to appear sent by any number, which this author may have tested for research purposes on unwitting mates. ®

Broader topics

Other stories you might like

  • Five Eyes alliance’s top cop says techies are the future of law enforcement
    Crims have weaponized tech and certain States let them launder the proceeds

    Australian Federal Police (AFP) commissioner Reece Kershaw has accused un-named nations of helping organized criminals to use technology to commit and launder the proceeds of crime, and called for international collaboration to developer technologies that counter the threats that behaviour creates.

    Kershaw’s remarks were made at a meeting of the Five Eyes Law Enforcement Group (FELEG), the forum in which members of the Five Eyes intelligence sharing pact – Australia, New Zealand, Canada, the UK and the USA – discuss policing and related matters. Kershaw is the current chair of FELEG.

    “Criminals have weaponized technology and have become ruthlessly efficient at finding victims,” Kerhsaw told the group, before adding : “State actors and citizens from some nations are using our countries at the expense of our sovereignty and economies.”

    Continue reading
  • Police lab wants your happy childhood pictures to train AI to detect child abuse
    Like the Hotdog, Not Hotdog app but more Kidnapped, Not Kidnapped

    Updated Australia's federal police and Monash University are asking netizens to send in snaps of their younger selves to train a machine-learning algorithm to spot child abuse in photographs.

    Researchers are looking to collect images of people aged 17 and under in safe scenarios; they don't want any nudity, even if it's a relatively innocuous picture like a child taking a bath. The crowdsourcing campaign, dubbed My Pictures Matter, is open to those aged 18 and above, who can consent to having their photographs be used for research purposes.

    All the images will be amassed into a dataset managed by Monash academics in an attempt to train an AI model to tell the difference between a minor in a normal environment and an exploitative, unsafe situation. The software could, in theory, help law enforcement better automatically and rapidly pinpoint child sex abuse material (aka CSAM) in among thousands upon thousands of photographs under investigation, avoiding having human analysts inspect every single snap.

    Continue reading
  • Australian digital driving licenses can be defaced in minutes
    Brute force attack leaves the license wide open for undetectable alteration, but back end data remains unchanged

    An Australian digital driver's license (DDL) implementation that officials claimed is more secure than a physical license has been shown to easily defaced, but authorities insist the credential remains secure.

    New South Wales, Australia's most populous state, launched its DDL program in 2019, and as of 2021 officials there said that slightly more than half of the state's eight million people use the "Service NSW" app that displays the DDL and offers access to many other government services.

    Now, a security researcher at cybersecurity company Dvuln claims he was able to brute force his way into the app with nothing but a Python script and a consumer laptop. Once inside, he found numerous security flaws that made it simple to alter the DDL stored in the app. 

    Continue reading
  • Quad nations pledge deeper collaboration on infosec, data-sharing, and more
    But think tank says its past attempts at working together haven't gone well

    Leaders of the Quad alliance – Australia, India, Japan, and the USA – met on Tuesday and revealed initiatives to strengthen collaboration on emerging technologies and cybersecurity, with an unspoken subtext of neutralizing China.

    "Today, we – prime minister Anthony Albanese of Australia, prime minister Narendra Modi of India, prime minister Fumio Kishida of Japan, and president Joe Biden of the United States – convene in Tokyo to renew our steadfast commitment to a free and open Indo-Pacific that is inclusive and resilient," declared the Quad in a very formal statement.

    The nations also stated they "strongly oppose any coercive, provocative or unilateral actions that seek to change the status quo and increase tensions in the area."

    Continue reading

Biting the hand that feeds IT © 1998–2022