AK357 and TheWireGuys Involved in IPVM Theft Ring

By: John Honovich, Published on Feb 21, 2013

We have evidence and confirmation that multiple individuals are involved in a coordinated effort to steal and redistribute IPVM content.

Involved again is 'AK357' who stole access to IPVM last month. Additionally, our evidence shows that 'TheWireGuys' is involved.

We first discovered the same IP address that AK357 used to illicitly access IPVM was now being used to retrieve IPVM content via Dropbox, as shown below:

We called AK357 and he admitted that he had accessed this file but assured us that he was not distributing IPVM content. Rather, someone was sharing it with him. When we asked him who had done so, he queried what we would do to that person. When we told him we would cancel their account, he offered no further information.

We then cross referenced our records, finding a similar action with the IP address associated with comments from TheWireGuys, as shown below:

When asked, TheWireGuys did not explicitly deny it, rathering claiming, "I don't have access to your site and I have different ISP since the last time I posted on your site." The possibility though of someone else being reassigned that IP address then regularly accessing IPVM is infinitesimal, especially considering the Dropbox links has his name listed. [Update below: TheWireGuys changes his story and admits accessing via Dropbox.]

Evidently, the group includes (at least) AK357 (Alex), TheWireGuys (Mike), Tom, 'Monkey' and 'Gorilla'.

While we certainly understand and respect limited sharing of excerpts, copying whole pages and redistributing them over file sharing services to various third parties is both illegal and unethical. Please review IPVM's Terms and Conditions of use. If you have any questions, let us know.

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

UPDATE:  TheWireGuys Response

TheWireGuys messaged us on Sunday, Feb 24th:

"You have till tomorrow morning to remove your slanderous accusations from your website or I will go public with the truth."

We responded:

"I explained to you our evidence and that's what i published. If you feel it is wrong or incomplete, feel free to email me your position."

To which TheWireGuys affirmed:

"Nothing will be emailed to you you went public and I intent to do the same unless you remove that article."

As in all things we do, getting the underlying facts right is important. If there are facts we do not know or are missing, we are happy to update. However, if and unless they can be provided, there is nothing we can do nor will we remove something simply because someone dislikes it.

Interestingly, ealier TheWireGuys asked:

"What did I do? I am not a member of your site and I didn't download/share anything."

We then explained the issue, saying:

"Our records show that the IP address associated with your computer accessed that file that was shared with you."

He did not object or deny this.

UPDATE 2: Filing Copyright Violation Request

We have filed a copyright violation request with Dropbox requesting the file to be deleted.

UPDATE 3: The 'Truth' Revealed

Following through on his threat, TheWireGuys has released the 'truth', acknowledging that he has, "numerous Dropbox shared folders with various people.  I have no control over who and what is in my Dropbox folder , so I regularly click on files to assess them." Not only does this contradict his previous excuse/lie of having a different ISP, this concurs with what we have specifically alleged.

Being fully aware of the copyright violation, TheWireGuys continues to benefit from it, and refuses to show any interest in stopping or rectifying this practice. Further, he does have control over what is in his Dropbox and can easily delete or disconnect from those who are illicitly redistributing licensed content.

Comments (9) : Members only. Login. or Join.

Related Reports

Dahua Wiretapping Vulnerability on Aug 02, 2019
IPVM has validated, with testing, and from Dahua, that many Dahua cameras have a wiretapping vulnerability. Even if the camera's audio has been...
Axis Exploit Allows Changing Camera Root Password Confirmed on Aug 02, 2016
IPVM has confirmed that using the Axis remote format string vulnerability, an attacker can easily change the root password of the camera, taking...
Hikvision VMS Password Recovery Vulnerability - Emailing Admin Passwords In Plain Text on Aug 28, 2017
Hikvision iVMS-4200 suffers from a vulnerability that allows anyone local, without authentication, to generate a code that Hikvision will respond...
Milestone Co-Founder Invests In Anti Theft Spray SelectaDNA on Sep 06, 2018
Milestone's Co-Founder Henrik Friborg [link no longer available] has invested in CSI Protect, exclusive US dealer of forensic marking startup...
Washington DC Surveillance Hackers Arrested on Dec 29, 2017
The US Department of Justice has announced that "Two Romanian Suspects Charged With Hacking of Metropolitan Police Department Surveillance Cameras...
Uniview Recorder Backdoor Examined on Oct 20, 2017
A Chinese research group has identified a vulnerability in Uniview recorders that allows backdoor access in a method similar to the Dahua...
Hikvision Backdoor Exploit on Sep 03, 2017
Full disclosure to the Hikvision backdoor has been released, allowing easy exploit of vulnerable Hikvision IP cameras. As the researcher, Monte...
Hikvision Critical Cloud Vulnerability Disclosed on Apr 25, 2018
Security researchers Vangelis Stykas [link no longer available] and George Lavdanis [link no longer available] discovered a vulnerability in...
Hikvision Security Code Cracked on Aug 08, 2017
Hikvision's 'security code' feature has been cracked and a program generating security codes is being distributed online. IPVM has obtained and...
Avigilon Responds to Direct Sales Discussion on Jan 24, 2017
In a discussion, an integrator posted that an Avigilon inside sales rep contacted him, mistakenly believing he was an end user, looking to set an...

Most Recent Industry Reports

Sperry West / Alibaba Tablet Temperature Measurement Tested on Jul 07, 2020
In April, we ordered a ~$500 temperature tablet from Alibaba. We set it to the side while doing 18 other temperature screening tests but, after...
Video Surveillance 101 Book Released on Jul 07, 2020
IPVM's unique introduction to video surveillance series is now available as a 145-page eBook. Designed for managers, salespeople, and engineers new...
Startup Duranc Presents AI VSaaS on Jul 06, 2020
Duranc presented its system at the May 2020 IPVM Startups show. A 30-minute video from Duranc including IPVM Q&A Background on the...
Low Voltage Nation Wants to "Help You Carve Out A Fulfilling Career" Interviewed on Jul 06, 2020
It is difficult to make your way in this industry as there is little formal schooling. However, one person, Blake Urmos, the Founder of Low Voltage...
The Next Hot Fever Detection Trend - $100 Wall-Mounted Units on Jul 06, 2020
The first wave of the booming fever detecting market was $10,000+ cameras, now interest for ~$2,000 tablets is high and the next big thing may be...
Cisco Meraki Unlocks IP Cameras With RTSP Tested on Jul 06, 2020
Meraki opened up its cameras to 3rd party NVRs/VMSes by offering RTSP streaming because of "the need to solve a business problem". We tested...
Hikvision Illicitly Uses Back To The Future In Marketing on Jul 03, 2020
NBCUniversal told IPVM that Hikvision UK's ongoing coronavirus marketing campaign using NBCUniversal's assets was not allowed. Hikvision mass...
Verkada: "IPVM Should Never Be Your Source of News" on Jul 02, 2020
Verkada was unhappy with IPVM's recent coverage declaring that reading IPVM is 'not a good look' and that 'IPVM should never be your source of...
Vintra Presents FulcrumAI on Jul 02, 2020
Vintra presented its FulcrumAI object recognition and mask detection offering at the May 2020 IPVM Startups show. Inside this report: A...