{"id":86113,"date":"2019-03-18T16:10:14","date_gmt":"2019-03-18T23:10:14","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=86113"},"modified":"2024-04-25T13:37:17","modified_gmt":"2024-04-25T20:37:17","slug":"cia-porn-accusation-emails-heres-what-mac-users-need-to-know","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/","title":{"rendered":"CIA porn accusation emails: Here&#8217;s what Mac users need to know"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/V4GXOhBlcAg?rel=0\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p><em>Have you received an e-mail accusing you of pedophilia and demanding a ransom? Read on to find out what to do.<\/em><\/p>\n<p>Email scams are commonplace; you\u2019ve likely received countless over the years. Lately these scams have strayed into rather unpleasant territory: blackmail centered around porn. These scams are sometimes known as sextortion.<\/p>\n<p>These emails take various forms. The most recent we\u2019ve seen has you being sent a case number by a purported CIA agent, stating that your personal details are among those of 2,000 people about to be arrested as part of an international pedophilia sting; but, as \u2018luck\u2019 would have it, the sender is crooked, and so will remove your details if you send them ten grand in Bitcoins. If that sounds dodgy \u2014\u00a0spoiler! \u2014 it\u2019s because it <em>is<\/em> dodgy.<\/p>\n<p>So you can see for yourself (and possibly compare the content with emails you\u2019ve already received), the full text of one such communication is as follows:<\/p>\n<hr \/>\n<blockquote><p>Subject:\u00a0Central Intelligence Agency &#8211; Case #69723148<\/p>\n<p>From:\u00a0pastyfaust@gov3.cia-govn.cf<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Case #69723148<\/strong><br \/>\n<strong><em>Distribution and storage of pornographic electronic materials involving underage children.<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>My name is Pasty Faust and I am a technical collection officer working for Central Intelligence Agency.<\/p>\n<p>&nbsp;<\/p>\n<p>It has come to my attention that your personal details including your email address (<strong>[<em>your email address<\/em>]<\/strong>) are listed in case #69723148.<\/p>\n<p>&nbsp;<\/p>\n<p>The following details are listed in the document\u2019s attachment:<\/p>\n<ul>\n<li>Your personal details,<\/li>\n<li>Home address,<\/li>\n<li>Work address,<\/li>\n<li>List of relatives and their contact information.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Case #69723148 is part of a large international operation set to arrest more than 2000 individuals <strong>suspected of paedophilia<\/strong> in 27 countries.<\/p>\n<p>&nbsp;<\/p>\n<p>The data which could be used to acquire your personal information:<\/p>\n<ul>\n<li>Your ISP web browsing history,<\/li>\n<li>DNS queries history and connection logs,<\/li>\n<li>Deep web .onion browsing and\/or connection sharing,<\/li>\n<li>Online chat-room logs,<\/li>\n<li>Social media activity log.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>The first arrests are scheduled for April 8, 2019.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Why am I contacting you ?<\/p>\n<p>&nbsp;<\/p>\n<p>I read the documentation and I know you are a wealthy person who may be concerned about reputation.<\/p>\n<p>&nbsp;<\/p>\n<p>I am one of several people who have access to those documents and I have enough security clearance to amend and remove your details from this case. Here is my proposition.<\/p>\n<p>&nbsp;<\/p>\n<p>Transfer <strong>exactly $10,000 USD (ten thousand dollars &#8211; about 2.5 BTC)<\/strong> through Bitcoin network to this special bitcoin address:<\/p>\n<p>&nbsp;<\/p>\n<p><strong>[<em>Bitcoin address redacted<\/em>]<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>You can transfer funds with online bitcoin exchanges such as Coinbase, Bitstamp or Coinmama. The deadline is March 27, 2019 (I need few days to access and edit the files).<\/p>\n<p>&nbsp;<\/p>\n<p>Upon confirming your transfer I will take care of all the files linked to you and you can rest assured no one will bother you.<\/p>\n<p>&nbsp;<\/p>\n<p>Please do not contact me. I will contact you and confirm only when I see the valid transfer.<\/p>\n<p>&nbsp;<\/p>\n<p>Regards,<br \/>\nPasty Faust<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Technical Collection Officer<\/strong><br \/>\n<strong>Directorate of Science and Technology<\/strong><br \/>\n<strong>Central Intelligence Agency<\/strong><\/p><\/blockquote>\n<hr \/>\n<p>Variations of the e-mail include different names of the alleged sender (e.g. Antionette Carbajal, Carla Jernigan, Carmelo Kenyon, Devon Babin, Hong Lees, Huey Ferguson, Page Fogle, Robyn Mckinney, Roxana Mackay, Pasty Faust, Sadye Crawley, Sandie Curtin), implying that the name is randomized for each e-mail that&#8217;s sent.<\/p>\n<p>Similarly, the return address subdomains (e.g. the &#8220;gov3.&#8221; in the example above) change with each e-mail, although many of the e-mails seen so far have come from a subdomain of one of various fake CIA domains containing &#8220;cia&#8221; and &#8220;-gov&#8221; or &#8220;-govn&#8221; (examples include cia-gov-int.ga, cia-gov-int.gq, cia-gov.ga, cia-govn.cf, cia-govn.ga, cia-govn.ml, or cia-us-govn.ga).<\/p>\n<h3>Porn blackmail variants \u2013 and should you be afraid?<\/h3>\n<p>There are variations on this basic theme. In 2018, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\">we covered a similar email<\/a> that\u2019s had something of a resurgence in recent weeks. This one features a lone hacker making demands, but instead they claim to have somehow acquired video surveillance of you from your webcam. Unlike the CIA porn scam, this earlier variant may appear to be sent from your own email address, to showcase the hacker\u2019s amazing hacking prowess. (In fact, such email address \u2018spoofing\u2019 is comically easy, and it proves nothing.)<\/p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-81526\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-scam-email-example-2.png\" alt=\"\" width=\"876\" height=\"666\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-scam-email-example-2.png 876w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-scam-email-example-2-150x114.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-scam-email-example-2-300x228.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-scam-email-example-2-768x584.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-scam-email-example-2-657x500.png 657w\" sizes=\"(max-width: 876px) 100vw, 876px\" \/><\/p>\n<p>There is a common theme to these messages: to override your internal reasoning and replace it with fear. The threats talk of the recipient being arrested for a horrendous crime, or compromising videos being circulated among their contacts. Even if the accusations are false, this fear might be enough to spook people into paying the blackmailer.<\/p>\n<p>The question that will doubtless play on your mind is whether you should be concerned. <strong>The answer is no.<\/strong><\/p>\n<h3>What to do on receiving a porn blackmail email<\/h3>\n<p>Explore the \u2018CIA\u2019 text above and you\u2019ll spot red flags that showcase it to be as much spam as scam. The content is quite well written, but doesn\u2019t add up, and has giveaway spellings that are not in U.S. English. Moreover, the email address our example was sent from was pastyfaust@gov3.cia-govn.cf. (In Mail on macOS, you can check a sender\u2019s email address by clicking the down arrow next to their name.) We find it rather unlikely\u2014to say the least\u2014that the CIA has suddenly switched to using the top-level domain (.cf) of the Central African Republic!<\/p>\n<p>So here\u2019s our advice on what to do if you receive a similar email:<\/p>\n<ol>\n<li><strong>Don\u2019t worry.<\/strong> <em>Seriously<\/em>.<\/li>\n<li>(Optional)\u00a0<strong>Forward the email to spam@uce.gov<\/strong>\u00a0if it impersonates a U.S. agency (see <a href=\"https:\/\/www.youtube.com\/watch?v=fGCiDTlyHME\" target=\"_blank\" rel=\"noopener\">our instructional video<\/a> for details on how to include the full headers to help in the investigation)<\/li>\n<li>(If applicable) <strong>If you paid the ransom<\/strong>\u00a0and you&#8217;re a U.S. resident, <a href=\"https:\/\/www.ic3.gov\/complaint\/default.aspx\" target=\"_blank\" rel=\"noopener\">file a report at\u00a0ic3.gov<\/a><\/li>\n<li><strong>Delete the email<\/strong>. If you don\u2019t pay, nothing will happen, because this CIA case file on you <em>does not exist<\/em>\u2014just like the fake surveillance threats from the other scams.<\/li>\n<\/ol>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/fGCiDTlyHME\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<h3>Protect yourself against genuine email scams<\/h3>\n<p>There are, however, much more dangerous scammers out there who can make your digital life miserable by using social engineering and other techniques to gain control of your online accounts. So although you shouldn\u2019t be worried about porn scams such as those outlined in this article, do not become complacent. Chances are your email has ended up on a scammer\u2019s list through a password breach;\u00a0check <a href=\"https:\/\/haveibeenpwned.com\" target=\"_blank\" rel=\"noopener\">haveibeenpwned.com<\/a> to see if yours has been compromised.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone size-large wp-image-86125\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/cia-porn-pwned-1024x521.jpg\" alt=\"\" width=\"1024\" height=\"521\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/cia-porn-pwned-1024x521.jpg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/cia-porn-pwned-150x76.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/cia-porn-pwned-300x153.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/cia-porn-pwned-768x390.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/cia-porn-pwned-657x334.jpg 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/cia-porn-pwned.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>If you&#8217;ve had any accounts become compromised, be sure to read <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/\" target=\"_blank\" rel=\"noopener\">How to Avoid Getting Hacked After Data Breaches<\/a>. Also, we can\u2019t stress enough that you should <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\" target=\"_blank\" rel=\"noopener\">use a password manager<\/a> to manage your passwords. Every service and account you have online should have its own unique, complex password (and wherever possible, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authorization-apps-for-ios\/\" target=\"_blank\" rel=\"noopener\">two-factor authentication<\/a>).<\/p>\n<p>You may also wish to keep your Mac protected from malware and ransomware using <a href=\"https:\/\/www.intego.com\/products\" target=\"_blank\" rel=\"noopener\">Intego VirusBarrier X9<\/a>\u00a0(or at least scan manually with the free <a href=\"https:\/\/itunes.apple.com\/us\/app\/VirusBarrier-Scanner\/id1200445649\" target=\"_blank\" rel=\"noopener\">VirusBarrier Scanner<\/a>, available on the Mac App Store; read <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\" target=\"_blank\" rel=\"noopener\">Why Your Antivirus Needs Real-Time Scanning<\/a> to learn about the differences).<\/p>\n<p>In short, then: don\u2019t worry about porn blackmail scams from the CIA or elsewhere, because, well, they\u2019re scams. But do remain vigilant, ensuring your Mac and your online accounts are well defended, rather than a row of open doors.<a style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\" name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you received an e-mail accusing you of pedophilia and demanding a ransom? Read on to find out what to do. Email scams are commonplace; you\u2019ve likely received countless over the years. Lately these scams have strayed into rather unpleasant territory: blackmail centered around porn. These scams are sometimes known as sextortion. These emails take [&hellip;]<\/p>\n","protected":false},"author":85,"featured_media":86137,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[4465,4264,116,4732],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Have you received an e-mail accusing you of pedophilia and demanding a ransom? Read on to find out what to do. Email scams are commonplace; you\u2019ve likely\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CIA porn accusation emails: Here&#039;s what Mac users need to know - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Have you received an e-mail accusing you of pedophilia and demanding a ransom? Read on to find out what to do. Email scams are commonplace; you\u2019ve likely\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-18T23:10:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-25T20:37:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/cia-porn-scam-lead-image-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Craig Grannell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/cia-porn-scam-lead-image-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/cia-porn-scam-lead-image-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"CIA Porn Email Scam\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/\",\"name\":\"CIA porn accusation emails: Here's what Mac users need to know - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#primaryimage\"},\"datePublished\":\"2019-03-18T23:10:14+00:00\",\"dateModified\":\"2024-04-25T20:37:17+00:00\",\"description\":\"Have you received an e-mail accusing you of pedophilia and demanding a ransom? Read on to find out what to do. Email scams are commonplace; you\\u2019ve likely\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CIA porn accusation emails: Here&#8217;s what Mac users need to know\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/f53d811d4cbcbd7a455ef46fb7a5878c\"},\"headline\":\"CIA porn accusation emails: Here&#8217;s what Mac users need to know\",\"datePublished\":\"2019-03-18T23:10:14+00:00\",\"dateModified\":\"2024-04-25T20:37:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#webpage\"},\"wordCount\":1300,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/cia-porn-scam-lead-image-400x260-1.jpg\",\"keywords\":[\"CIA\",\"Porn Blackmail\",\"Scam\",\"Sextortion\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/f53d811d4cbcbd7a455ef46fb7a5878c\",\"name\":\"Craig Grannell\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/92e23fb10ef01b4587d7d59e730e0959?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/92e23fb10ef01b4587d7d59e730e0959?s=96&d=mm&r=g\",\"caption\":\"Craig Grannell\"},\"description\":\"Craig Grannell is a technology writer, mostly specialising in Macs, iOS, apps, and games. He\\u2019s been immersed in all things Apple for over 20 years, and enamoured with computers since getting his hands on a VIC-20 as a kid. He also has a Korg Gadget addiction. Send help. Or alternatively, visit his website, craiggrannell.com, and follow him on Twitter at @craiggrannell.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/craig-grannell\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Have you received an e-mail accusing you of pedophilia and demanding a ransom? Read on to find out what to do. Email scams are commonplace; you\u2019ve likely","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"CIA porn accusation emails: Here's what Mac users need to know - The Mac Security Blog","og_description":"Have you received an e-mail accusing you of pedophilia and demanding a ransom? Read on to find out what to do. Email scams are commonplace; you\u2019ve likely","og_url":"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/","og_site_name":"The Mac Security Blog","article_published_time":"2019-03-18T23:10:14+00:00","article_modified_time":"2024-04-25T20:37:17+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/cia-porn-scam-lead-image-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Craig Grannell","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/cia-porn-scam-lead-image-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/cia-porn-scam-lead-image-400x260-1.jpg","width":400,"height":260,"caption":"CIA Porn Email Scam"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/","name":"CIA porn accusation emails: Here's what Mac users need to know - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#primaryimage"},"datePublished":"2019-03-18T23:10:14+00:00","dateModified":"2024-04-25T20:37:17+00:00","description":"Have you received an e-mail accusing you of pedophilia and demanding a ransom? Read on to find out what to do. Email scams are commonplace; you\u2019ve likely","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"CIA porn accusation emails: Here&#8217;s what Mac users need to know"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/f53d811d4cbcbd7a455ef46fb7a5878c"},"headline":"CIA porn accusation emails: Here&#8217;s what Mac users need to know","datePublished":"2019-03-18T23:10:14+00:00","dateModified":"2024-04-25T20:37:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#webpage"},"wordCount":1300,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/cia-porn-scam-lead-image-400x260-1.jpg","keywords":["CIA","Porn Blackmail","Scam","Sextortion"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/f53d811d4cbcbd7a455ef46fb7a5878c","name":"Craig Grannell","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/92e23fb10ef01b4587d7d59e730e0959?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/92e23fb10ef01b4587d7d59e730e0959?s=96&d=mm&r=g","caption":"Craig Grannell"},"description":"Craig Grannell is a technology writer, mostly specialising in Macs, iOS, apps, and games. He\u2019s been immersed in all things Apple for over 20 years, and enamoured with computers since getting his hands on a VIC-20 as a kid. He also has a Korg Gadget addiction. Send help. Or alternatively, visit his website, craiggrannell.com, and follow him on Twitter at @craiggrannell.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/craig-grannell\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/cia-porn-scam-lead-image-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-moV","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/86113"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=86113"}],"version-history":[{"count":15,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/86113\/revisions"}],"predecessor-version":[{"id":100354,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/86113\/revisions\/100354"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/86137"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=86113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=86113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=86113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}