
Smashing Security Never knock on the door of a nuclear submarine base and ask for a selfie
10 snips
Mar 26, 2026 Jenny Radcliffe, specialist in social engineering and physical infiltration assessment, shares vivid tales of insider extortion and real-world tailgating. Short, tense stories cover a payroll theft turned ransom and two people brazenly approaching the Faslane nuclear base. Conversations focus on why human behavior and physical access still beat remote hacks.
AI Snips
Chapters
Books
Transcript
Episode notes
Contractor Stole Payroll Data And Tried To Extort Employer
- Cameron Curry, a 27-year-old contracted data analyst, stole his employer's payroll database and sent extortion emails under the name Loot.
- He began exfiltrating files in August 2023, sent 60+ fraudulent DocuSign demands, and was arrested after receiving $7,500 in Bitcoin traced via a Coinbase account linked to his identity.
Extortion Styled As A Fake Salary Transparency Service
- Curry framed his emails as a professional service called Loot offering 'salary transparency' and attached DocuSign settlement agreements.
- He even suggested DocuSign passwords equalled employee ID numbers to lower friction for signatures.
Contact Authorities Instead Of Paying Large Extortion Demands
- Treat extortion attempts skeptically and involve authorities rather than paying large ransoms blindly.
- Graham notes the company contacted the FBI, paid a small tracked amount, and avoided acceding to the $2.5M demand.

