Carding Umh2809-CE

Total Page:16

File Type:pdf, Size:1020Kb

Carding Umh2809-CE Carding umh2809-CE Carding is a term describing the trafficking of credit other carding sites and forum 'dump shops’[10] specialis- card, bank account and other personal information on- ing in these types of illegal goods.[11] [1] line as well as related fraud services. Carding activi- On the more sophisticated of such sites, individual ties also encompass procurement of details,[2] and money [3] 'dumps’ may be purchased by zip code and country so as laundering techniques. Modern carding sites have been [12] [4] to avoid alerting banks about their misuse. Automatic described as full-service commercial entities. checker services perform validation en masse in order to quickly check if a card has yet to be blocked. Sellers will advertise their dump’s 'valid rate', based on estimates or 1 Acquisition checker data. Cards with a greater than 90% valid rate command higher prices. 'Cobs’ or changes of billing are highly valued, where sufficient information is captured to allow redirection of the registered card’s billing and ship- ping addresses to one under the carder’s control.[13] Full identity information may be sold as 'Fullz' inclusive of social security number, data of birth and address to perform more lucrative identity theft.[14] Fraudulent vendors are referred to as 'rippers’, vendors who take buyer’s money then never deliver. This is in- creasingly mitigated via forum and store based feedback systems as well as through strict site invitation and refer- ral policies.[15] Whist some carding forums will exist only on the dark web, today most exist on the internet, and many will use the Cloudflare network protection service.[16][17][18] Screenshot of a carding site Estimated per card prices, in US$, for stolen payment card data 2015[19] There are a great many of methods to acquire credit card and associated financial and personal data. The earli- est known carding methods have also included 'trashing' for financial data, raiding mail boxes and working with insiders.[5][6] Some bank card numbers can be semi- 3 Money laundering automatically generated based on known sequences.[7] Today, various methodologies include skimmers at The 2004 investigation into the ShadowCrew forum also ATMs, hacking an ecommerce or payment processing led to investigations of the online payment service E- site or even intercepting card data within a point of sale gold that had been launched in 1996, one of the pre- network.[8] Randomly calling hotel room phones asking ferred money transfer systems of carders at the time. guests to 'confirm' credit card details is example of a In December 2005 its owner Douglas Jackson’s house social engineering attack vector.[9] and businesses were raided as a part of 'Operation Gold- wire'. Jackson discovered that the service had become a bank and transfer system to the criminal underworld. Pressured to disclose ongoing records disclosed to law 2 Resale enforcement, many arrests were made through to 2007. However, in April 2007 Jackson himself was indicted Stolen data may be bundled as a 'Base' or 'First-hand base' for money laundering, conspiracy and operating an unli- if the seller participated in the theft themselves. Resellers censed money transmitting business. This led to the ser- may buy 'packs’ of dumps from multiple sources. Ul- vice freezing the assets of users in 'high risk' countries and timately, the data may be sold on darknet markets and coming under more traditional financial regulation.[20] 1 2 5 HISTORY Since 2006, Liberty Reserve had become a popular ser- vice for cybercriminals. When it was seized in May 2013 by the US government, this caused a major disruption to the cybercrime ecosystem.[21] Today, some carders prefer to make payment between themselves with bitcoin,[22][23] as well as traditional wire services such as Western Union, MoneyGram or the Rus- sian WebMoney service.[24][25] Funds from stolen cards themselves may be cashed out via buying pre-paid cards, gift cards or through reshipping goods though mules then reselling through Screenshot from AOHell online marketplaces like eBay.[26][27] Increased law en- forcement scrutiny over reshipping services has led to the rise dedicated criminal operations for reshipping stolen goods.[28][29] sive guides on 'Carding Across America', burglary, fax fraud, supporting phreaking,[40] and advanced techniques for maximizing profits.[41] During the 1980s the majority 4 Related services of hacker arrests were attributable to carding-related ac- tivities due to the relative maturity of financial laws com- Many forums also provide related computer crime ser- pared to emerging computer regulations.[39] [30] vices such as phishing kits, malware and spam lists. Started in 1989, by 1990 Operation Sundevil was They may also act as a distribution point for the latest [31] launched by the United States Secret Service to crack fraud tutorials either for free or commercially. ICQ down on use of BBS groups involved in credit card fraud was at one point the instant messenger of choice due to and other illegal computer activities, the most highly pub- its anonymity as well as MSN clients modified to use [32] licised action by the US federal government against hack- PGP. ers at the time.[42] The severity of the crack down was Other account types like PayPal,[33] Uber,[34] Netflix and so much that the Electronic Freedom Foundation was loyalty card points may be sold alongside card details.[35] formed in response to the violation of civil liberties.[43] Logins to many sites may also be sold such a site backdoor In the mid-1990s with the rise of AOL dial-up accounts, access apparently for major institutions such as banks, [19] the AOHell software became a popular tool for phishing universities and even industrial control systems. and stealing information such as credit card details from Tax refund fraud is an increasingly popular method of new Internet users.[44] Such abuse was exacerbated be- using identify theft to acquire prepaid cards ready for im- cause prior to 1995 AOL did not validated subscription mediate cash out.[3][36] Popular coupons may be counter- credit card numbers on account creation.[45] Abuse was feited and sold also.[37] so common AOL added "no one working at AOL will ask for your password or billing information" to all instant Personal information and even medical records are some- messenger communications. Only by 1997 when warez times available.[19] Theft and gift card fraud may operated and phishing were pushed off the service did these types entirely independently of online carding operations.[38] of attacks begin to decline.[45] December 1999 featured an unusual case of extortion 5 History when Maxim, a Russian 19-year-old, stole the 25,000 users’ card details from CD Universe and demanded $100,000 for its destruction. When the ransom was not 5.1 1980s–1999 paid, the information was leaked on the Internet.[46] Since the 1980s[39] in the days of the dial-up BBSes, the One of the first books written about carding, 100% In- term carding has been used to describe the practices sur- ternet Credit Card Fraud Protected, featured content pro- rounding credit card fraud. Methods such as 'trashing', duced by 'Hawk' of carding group 'Universal Carders’. raiding mail boxes and working with insiders at stores It described the spring 1999 hack and credit card theft were cited as effective ways of acquiring card details. on CyberCash, the stratification of carder proficiencies Use of drops at places like abandoned houses and apart- (script kiddie through to professionals) common pur- chases for each type and basic phishing schemes to ac- ments or with persuadable neighbors near such a location [47] were suggested. Social engineering of mail order sales quire credit card data. representatives are suggested in order to provide passable By 1999, United States offline and online credit card fraud information for card not present transactions.[6] Charac- annual losses were estimated at between $500,000 and $2 ters such as 'The Video Vindicator' would write exten- million.[47] 5.3 2007–present 3 5.2 2000–2006 From the early 2000s, sites like 'The Counterfeit Library', also functioning as a diploma mill, grew to prominence, with many of its members going on to join larger cy- bercrime websites in later years until it closure around September 2004.[32] In 2001 Russian speaking hackers founded CarderPlanet in Odessa which would go on to be one of the most noto- rious forums of its kind.[48] In the summer of 2003, separate US secret service and FBI investigations led to the arrest the top administra- Master Splynter explaining DarkMarket's invite and vendor poli- cies tor Albert Gonzalez of the large ShadowCrew carding forums, turned informant as a part of 'Operation Fire- wall'. By March 2004, the administrator of 'Carder- as inter-forum rivalry. In 2007 details of the operation Planet' disappeared with Gonzalez taking over. In Octo- was revealed to German national police, that the NCFTA ber 2004 dozens of ShadowCrew members were busted had successfully penetrated the forum’s inner 'family'. By across the US and Canada. Carder’s speculate that one of October 4, 2007 Mularski announced he was shutting the the USSS infiltrators might have been detected by a fellow site due to unwanted attention from a fellow administra- site member causing the operation to be expedited.[32] Ul- tor, ironically framed as 'too much attention' from law timately, the closure of ShadowCrew and CarderPlanet enforcement.[56] For several years following site closure did not reduce the degree of fraud and led to the prolif- multiple arrests were made internationally.[57] eration of smaller sites.[49][50] From 2004 through to 2006, CardersMarket assimi- ShadowCrew admin Brett Shannon Johnson managed to lated various rival forums through marketing, hacking avoid being arrested at this time, but was picked up in databases.[58] Arrested in 2007, in 2010 the site’s owner 2005 on separate charges then turned informant.
Recommended publications
  • The Underground Economy.Pdf
    THE THE The seeds of cybercrime grow in the anonymized depths of the dark web – underground websites where the criminally minded meet to traffic in illegal products and services, develop contacts for jobs and commerce, and even socialize with friends. To better understand how cybercriminals operate today and what they might do in the future, Trustwave SpiderLabs researchers maintain a presence in some of the more prominent recesses of the online criminal underground. There, the team takes advantage of the very anonymity that makes the dark web unique, which allows them to discretely observe the habits of cyber swindlers. Some of the information the team has gathered revolves around the dark web’s intricate code of honor, reputation systems, job market, and techniques used by cybercriminals to hide their tracks from law enforcement. We’ve previously highlighted these findings in an extensive three-part series featured on the Trustwave SpiderLabs blog. But we’ve decided to consolidate and package this information in an informative e-book that gleans the most important information from that series, illustrating how the online criminal underground works. Knowledge is power in cybersecurity, and this serves as a weapon in the fight against cybercrime. THE Where Criminals Congregate Much like your everyday social individual, cyber swindlers convene on online forums and discussion platforms tailored to their interests. Most of the criminal activity conducted occurs on the dark web, a network of anonymized websites that uses services such as Tor to disguise the locations of servers and mask the identities of site operators and visitors. The most popular destination is the now-defunct Silk Road, which operated from 2011 until the arrest of its founder, Ross Ulbricht, in 2013.
    [Show full text]
  • Beware of These Common Scams
    Beware of these common scams Nigerian Scams People claiming to be officials, businessmen or surviving relatives of former government officials in countries around the world send countless offers via e-mail, attempting to convince consumers that they will transfer thousands of dollars into your bank account if you will just pay a fee or "taxes" to help them access their money. If you respond to the initial offer, you may receive documents that look "official." Unfortunately, you will get more e-mails asking you to send more money to cover transaction and transfer costs, attorney's fees, blank letterhead and your bank account numbers and other sensitive, personal information. Tech Support Scams A tech support person may call or email you and claim that they are from Windows, Microsoft or another software company. The person says your computer is running slow or has a virus and it’s sending out error messages. Scammers will ask you to visit a website that gives them remote access to your computer. If the caller obtains access they can steal personal information, usernames and passwords to commit identity theft or send spam messages. In some cases, the caller may even be asked for a wired payment or credit card information. Lottery Scams In foreign lottery scams, you receive an email claiming that you are the winner of a foreign lottery. All you need to do to claim your prize is send money to pay the taxes, insurance, or processing or customs fees. Sometimes, you will be asked to provide a bank account number so the funds can be deposited.
    [Show full text]
  • Shadowcrew Organization Called 'One-Stop Online Marketplace for Identity Theft'
    October 28, 2004 Department Of Justice CRM (202) 514-2007 TDD (202) 514-1888 WWW.USDOJ.GOV Nineteen Individuals Indicted in Internet 'Carding' Conspiracy Shadowcrew Organization Called 'One-Stop Online Marketplace for Identity Theft' WASHINGTON, D.C. - Attorney General John Ashcroft, Assistant Attorney General Christopher A. Wray of the Criminal Division, U.S. Attorney Christopher Christie of the District of New Jersey and United States Secret Service Director W. Ralph Basham today announced the indictment of 19 individuals who are alleged to have founded, moderated and operated "www.shadowcrew.com" -- one of the largest illegal online centers for trafficking in stolen identity information and documents, as well as stolen credit and debit card numbers. The 62-count indictment, returned by a federal grand jury in Newark, New Jersey today, alleges that the 19 individuals from across the United States and in several foreign countries conspired with others to operate "Shadowcrew," a website with approximately 4,000 members that was dedicated to facilitating malicious computer hacking and the dissemination of stolen credit card, debit card and bank account numbers and counterfeit identification documents, such as drivers' licenses, passports and Social Security cards. The indictment alleges a conspiracy to commit activity often referred to as "carding" -- the use of account numbers and counterfeit identity documents to complete identity theft and defraud banks and retailers. The indictment is a result of a year-long investigation undertaken by the United States Secret Service, working in cooperation with the U.S. Attorney's Office for the District of New Jersey, the Computer Crime and Intellectual Property Section of the Criminal Division of the Department of Justice, and other U.S.
    [Show full text]
  • Online Money Laundering Operations to Take Place
    Laundering Money Online: a review of cybercriminals’ methods Jean-Loup Richet Tools and Resources for Anti-Corruption Knowledge – June, 01, 2013 - United Nations Office on Drugs and Crime (UNODC). Executive Summary Money laundering is a critical step in the cyber crime process which is experiencing some changes as hackers and their criminal colleagues continually alter and optimize payment mechanisms. Conducting quantitative research on underground laundering activity poses an inherent challenge: Bad guys and their banks don’t share information on criminal pursuits. However, by analyzing forums, we have identified two growth areas in money laundering: Online gaming—Online role playing games provide an easy way for criminals to launder money. This frequently involves the opening of numerous different accounts on various online games to move money. Micro laundering—Cyber criminals are increasingly looking at micro laundering via sites like PayPal or, interestingly, using job advertising sites, to avoid detection. Moreover, as online and mobile micro-payment are interconnected with traditional payment services, funds can now be moved to or from a variety of payment methods, increasing the difficulty to apprehend money launderers. Micro laundering makes it possible to launder a large amount of money in small amounts through thousands of electronic transactions. One growing scenario: using virtual credit cards as an alternative to prepaid mobile cards; they could be funded with a scammed bank account – with instant transaction – and used as a foundation of a PayPal account that would be laundered through a micro-laundering scheme. Laundering Money Online: a review of cybercriminals’ methods Millions of transactions take place over the internet each day, and criminal organizations are taking advantage of this fact to launder illegally acquired funds through covert, anonymous online transactions.
    [Show full text]
  • Issues Confronting US Law Enforcement
    The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement Updated January 17, 2013 Congressional Research Service https://crsreports.congress.gov R41927 The Interplay of Borders, Turf, Cyberspace, and Jurisdiction Summary Savvy criminals constantly develop new techniques to target U.S. persons, businesses, and interests. Individual criminals as well as broad criminal networks exploit geographic borders, criminal turf, cyberspace, and law enforcement jurisdiction to dodge law enforcement countermeasures. Further, the interplay of these realities can potentially encumber policing measures. In light of these interwoven realities, policy makers may question how to best design policies to help law enforcement combat ever-evolving criminal threats. Criminals routinely take advantage of geographic borders. They thrive on their ability to illicitly cross borders, subvert border security regimens, and provide illegal products or services. Many crimes—particularly those of a cyber nature—have become increasingly transnational. While criminals may operate across geographic borders and jurisdictional boundaries, law enforcement may not be able to do so with the same ease. Moreover, obstacles such as disparities between the legal regimens of nations (what is considered a crime in one country may not be in another) and differences in willingness to extradite suspected criminals can hamper prosecutions. The law enforcement community has, however, expanded its working relationships with both domestic and international agencies. Globalization and technological innovation have fostered the expansion of both legitimate and criminal operations across physical borders as well as throughout cyberspace. Advanced, rapid communication systems have made it easier for criminals to carry out their operations remotely from their victims and members of their illicit networks.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • Understanding Online Carding Forums
    All Your Cards Are Belong To Us: Understanding Online Carding Forums Andreas Haslebacher, Jeremiah Onaolapo, and Gianluca Stringhini University College London [email protected] fj.onaolapo,[email protected] Abstract—Underground online forums are platforms that The sales volumes thus generated appear to be substantial. enable trades of illicit services and stolen goods. Carding forums, It is estimated, for example, that the closure of several credit in particular, are known for being focused on trading financial card related forums in 2012 prevented international fraud to the information. However, little evidence exists about the sellers that tune of £500 million [2]. It is therefore important to understand are present on active carding forums, the precise types of products the characteristics of these online forums and the activity of they advertise, and the prices that buyers pay. Existing literature cybercriminals using them. focuses mainly on the organisation and structure of the forums. Furthermore, studies on carding forums are usually based on literature review, expert interviews, or data from forums that The body of research into underground forums is growing have already been shut down. This paper provides first-of-its-kind but still limited. In particular, there are only a few studies avail- empirical evidence on active forums where stolen financial data is able about credit card related forums. These studies mainly traded. We monitored five out of 25 discovered forums, collected focus on the organisation and the structure of the forums posts from the forums over a three-month period, and analysed but less on the content itself, that is, the products traded them quantitatively and qualitatively.
    [Show full text]
  • Inside Online Carding Courses Designed for Cybercriminals
    Inside Online Carding Courses Designed for Cybercriminals Card fraud more sophisticated than ever, and what you can do about it Executive Summary Payment card fraud costs banks and merchants billions every year. As consumers spend more and more money online, the opportunities for fraud increase; experts project a loss of $24 billion to payment card fraud by the end of 2018.1 Payment card fraudsters do not operate in a vacuum, instead relying on a sophisticated ecosystem and support network that provides a wide range of credit card details, fraud tools and online tutorials. This paper looks at one recent online course designed for bad actors in order to shed light on the latest fraud tactics and tools, allowing consumers, merchants and credit card companies to better understand the threat and make it harder for the fraudsters. Table of Contents Executive Summary................................................................................................... 2 Payment card fraud is big business – and it’s getting even bigger....................... 3 Fraudsters are only one part of a broader ecosystem........................................... 4 Stage 1: Learn the latest techniques......................................................................... 6 Stage 2: Buy payment cards from a reputable site.................................................. 8 Stage 3: Commit payment card fraud and cash out................................................ 10 Fraudsters score big...............................................................................................
    [Show full text]
  • The President's Identity Theft Task Force
    The President’s Identity Theft Task Force Combating IDENTITY THEFT A Strategic Plan April 2007 COMBATING IDENTITY THEFT A Strategic Plan Table of Contents Glossary of Acronyms .................................................................v Identity Theft Task Force Members ............................................... vii Letter to the President .............................................................. viii I. Executive Summary .............................................................. 1 A. Introduction .................................................................................. 1 B. The Strategy .................................................................................. 2 II. The Contours of the Identity Theft Problem ............................. 10 A. Prevalence and Costs of Identity Theft ......................................... 11 B. Identity Thieves: Who They Are .................................................. 12 C. How Identity Theft Happens: The Tools of the Trade ................... 13 D. What Identity Thieves Do With the Information They Steal: The Different Forms of Identity Theft ........................ 18 III. A Strategy to Combat Identity Theft ....................................... 22 A. Prevention: Keeping Consumer Data out of the Hands of Criminals ..................................................................... 22 1. Decreasing the Unnecessary Use of Social Security Numbers ........................................................ 23 2. Data Security in the Public Sector .........................................
    [Show full text]
  • Basics of Ethical Hacking – Manthan M. Desai
    Hacking For Beginners – Manthan Desai 2010 Legal Disclaimer Any proceedings and or activities related to the material contained within this book are exclusively your liability. The misuse and mistreat of the information in this book can consequence in unlawful charges brought against the persons in question. The authors and review analyzers will not be held responsible in the event any unlawful charges brought against any individuals by misusing the information in this book to break the law. This book contains material and resources that can be potentially destructive or dangerous. If you do not fully comprehend something on this book, don‘t study this book. Please refer to the laws and acts of your state/region/ province/zone/territory or country before accessing, using, or in any other way utilizing these resources. These materials and resources are for educational and research purposes only. Do not attempt to violate the law with anything enclosed here within. If this is your intention, then leave now. While using this book and reading various hacking tutorials, you agree to follow the below mentioned terms and conditions: 1. All the information provided in this book is for educational purposes only. The book author is no way responsible for any misuse of the information. 2. "Hacking for Beginners” is just a term that represents the name of the book and is not a book that provides any illegal information. “Hacking for Beginners” is a book related to Computer Security and not a book that promotes hacking/cracking/software piracy. 3. This book is totally meant for providing information on "Computer Security”, "Computer Programming” and other related topics and is no way related towards the terms "CRACKING” or "HACKING” (Unethical).
    [Show full text]
  • Learn the Slang and Operational Techniques of Online Payment Fraudsters
    Fraudster Dictionary Learn the slang and operational techniques of online payment fraudsters 1 Table of Contents Intro 3 Real darknet stories - Wall Street Exit Scam 15 Step 1: Learn the language. Fullz 16 Dictionary. 4 MMN 16 MSCS 16 English Language Sphere Ripper 16 Spoofing 17 Altcoins 6 TOR 17 Anonymity Checker 6 VBV 17 Automatic Vending Cart (AVC) 6 AVS 7 Russian Language Sphere BIN 7 Bulletproof hosting 7 Вбив 19 Real darknet stories - Hosting servers Вещевой/Вещевуха 19 inside a military bunker 8 Дроп 19 Carding 9 Дропоwод 19 Cashout 9 Энрол 20 Cardable websites 9 Закладка 20 Credit card checkers 10 Кладсмен 20 Criminal forums 10 Pазогревать Шопa 20 Cryptocurrency mixer 11 Реролл 21 Darknet 11 Фулка 21 Darknet market (DNM) 11 чернухи 21 Darkweb 12 Dead fullz 12 Step 2: Learn techniques. DOB 13 Profiler. 22 Drop 13 Dump 13 Profiler Technology 23 Escrow service 14 Main Profiling Attributes 24 Exit scam 14 Intro Going up against online fraudsters is a tough battle. There isn’t one rule that can help you win it all, but there are certainly some crucial steps each fraud specialist should undertake. Anti-fraud tools are a “must-have’’, but a more sophisticated approach is to understand the behaviour and language of your opponent. However, 75% of fraud analysts admit that they do not research and collect evidence from the darkweb. We totally understand that. Digging through the darknet is a time-consuming job, and it’s hard to keep up with evolving criminal threats and technological advances. It’s also a risky activity.
    [Show full text]
  • I Was a Cybercrook for The
    I Was a Cybercrook for the FBI For 18 tense months, a computer-savvy grifter named David Thomas runs a thriving online crime hub for bank heists, identity theft and counterfeiting, with the FBI paying the bills. By Kim Zetter 02:00 AM Jan, 30, 2007 By the time David Thomas eased his Cadillac into the parking lot of an office complex in Issaquah, Washington, he already suspected the police were on to him. An empty Crown Victoria in one of the parking spaces confirmed it. "That's heat right there," he told his two passengers -- 29-year-old girlfriend Bridget Trevino, and his crime partner Kim Marvin Taylor, a balding, middle-aged master of fake identities he'd met on the internet. It was November 2002, and Thomas, then a 44-year-old Texan, was in Washington to collect more than $30,000 in merchandise that a Ukrainian known as "Big Buyer" ordered from Outpost.com with stolen credit card numbers. His job was to collect the goods from a mail drop, fence them on eBay and wire the money to Russia, pocketing 40 percent of the take before moving to another city to repeat the scam. But things didn't go as planned. Ignoring Thomas' suspicions, Taylor walked into the Meadow Creek Professional Center to collect the Outpost shipment, and found the cops waiting for him. Thomas and his girlfriend tried to escape in the Cadillac but were caught half a mile away. An ID badge that Taylor wore when he was arrested indicated that he worked for Microsoft.
    [Show full text]