45 million fake £1 coins in circulation – and how to spot a fake pound coin.

This great feature came from The Bolton News. They show you how to spot a fake £ coin after the BBC announced yesterday there were as many as an eye-popping 45 million of them in circulation

 

WITH about 45 million fake pound coins in circulation and a suspected counterfeiter on the loose in Bolton, we have put together a handy guide on how to spot a forgery.

It comes as chancellor George Osborne announces that a new £1 coin, designed to help reduce counterfeiting, will be introduced in 2017.

Spotting a fake £coin

Mr Osborne revealed plans to introduce the new coin — billed by the Royal Mint as “the most secure coin in the world”— in his budget statement to the House of Commons.

In the meantime, check the pound coins in your own wallet and look for these tell-tale signs of a fake:

  • The date and design on the reverse do not match (the reverse design is changed each year).
  • The lettering or inscription on the edge of the coin does not correspond to the right year.
  • The milled edge is poorly defined and the lettering is uneven in depth, spacing or is poorly formed.
  • The obverse and reverse designs are not as sharp or well defined.
  • Where the coin should have been in circulation for some time, the colouring appears more shiny and golden and the coin shows no sign of age.
  • The colour of the coin does not match genuine coins.
  • The orientation of the obverse and reverse designs is not in line.

Large scale privacy invasion by NSA

This story comes from Eduard Kovacs. I believe it originally comes from the Intercept, if it’s true it is truly scary.

The Intercept’s Glenn Greenwald and Ryan Gallagher have published another report based on information stolen by Edward Snowden from the US National Security Agency. The latest report highlights the technologies that enable the intelligence agency to perform “industrial-scale exploitation” of computer networks.

It turns out that the NSA has automated processes in place that enable them to plant malware on millions of computers worldwide. Documents obtained by Snowden show that the British intelligence agency GCHQ has played an important role in developing these systems.

The NSA’s tactics are similar to the ones used by cybercriminals. In some cases, it has set up a fake Facebook server and has used the social media website to distribute a piece of malware capable of stealing data from infected computers.

The agency has also relied on spam campaigns to distribute software capable of recording audio and taking pictures via the computer’s webcam.

In 2004, there were around 100-150 malware implants. However, as the Tailored Access Operations (TAO) unit recruited hackers and developed new tools, the number of implants reached tens of thousands.

Since it’s impossible to manage the malware implants manually, the NSA has developed a solution called TURBINE. This system is capable of managing active implants, enabling the agency to conduct “industrial-scale exploitation.”

TURBINE is said to be part of a broad NSA surveillance initiative dubbed “Owning the Net.” And in case you’re wondering how much money goes into the project, the NSA has requested a $67.6 million (€48,6 million) budget for it last year.
There is a wide range of implants utilized by the NSA. For instance, UNITEDRAKE is used to gain complete control of a device.

UNITEDRAKE has a number of plug-ins, each designed for a specific purpose. CAPTIVATEDAUDIENCE is for recording conversations via the computer’s microphone, GUMFISH is for Continue reading Large scale privacy invasion by NSA