How To Buy Bitcoin Without KYC Verification - Cryptimi

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

I'm an Undercover FBI Agent on the Deep Web.

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to mrcreeps [link] [comments]

I Dared My Best Friend to Ruin My Life - He's Succeeding

My name is Zander, and my best friend is trying to ruin my life. It started out very small, but has quickly grown out of control.
I'm currently sitting inside a church, using their WiFi to post this story and taking advantage of their air conditioning. I’m posting this story in case… Well in case he finds me and kills me soon. It's only a matter of time now, and I want someone to know what happened before I die.
Two years ago, my friend David and I were sitting on the couch at my house thoroughly bored. It wasn’t a temporary boredom either. It was a resounding boredom with life. We both worked full time at the local movie theater making minimum wage and cleaning up after idiots who couldn’t keep popcorn and soda in their mouths. We had graduated high school two years prior and had no plans to attend college.
Life looked bleak for us. College didn’t sound appealing, work was annoying, and the little free time we had was blown on video games and YouTube. We both still lived with our parents too, which made dating somewhat embarrassing. Looking back, I’m sure we were suffering from mild depression on top of everything else.
These life circumstances blended together to create the perfect storm for what I now have to call my reality.
As we sat on the couch at my parent’s house, channel surfing the TV, David asked me if I was bored with life. I responded in the positive, and he sighed.
“High school was so easy because we knew our purpose and our goals were set for us. Outline the english essay. Finish the math homework. Get decent grades. Pass the driving exam. Be home by curfew. Find a girlfriend. Now that we’re out of high school, there’s no structure. Our lives have become meaningless and we are just floating through space with no aim or purpose.”
“Would you go back to high school then?” I asked. He shook his head.
“In the moment, high school was annoying. It’s only after looking back that I see how much better it was than I realized.”
“What’s the solution, then?” I asked.
“Either go somewhere that has structure and can deliver what high school gave us, or create our own structure,” David replied.
“Well I don’t want to go to college or the military,” I said. “And I can’t think of anywhere else that provides the same structure. Guess I have to make my own, but I have no idea where to start.”
“The thing about high school was that it required a minimum effort. If you didn’t give that minimum effort, you would face the consequences. The consequences were bad enough that you and I would put effort into school. When high school ended, that minimum effort level decreased. Now our minimum effort is not enough to improve ourselves. Whatever structure we build has to have those consequences built in and a minimum effort that forces us to improve constantly.”
David was, and is, a very intellectual person. He thinks about everything, if you can’t already tell. I was pretty dumb compared to him, but I stuck around because he always had interesting things to say. This conversation definitely counted as interesting.
I won’t bore you with the entire conversation that we had, but it lasted an hour where we discussed how to build structure into our lives.
I want to emphasize here that boredom is dangerous. Well, it’s not dangerous by itself, but it can quickly lead to dangerous things. Boredom can lead to pain, accidental children, technology that disrupts a monopoly, and even death.
Our boredom led to a dare.
“I dare you to try and ruin my life,” David said.
“What does that mean?” I asked.
“It’s a way to build structure into my life. If I know that you are always trying to ruin my life and actively trying to make me fail, then I am driven to fight back and act on initiative.”
“But how could I ruin your life?” I asked.
“You could ruin anyone’s life if you gave it enough thought, planning, and action,” David said with a smirk. “I’m not going to give you any ideas. I just want you to try and ruin my life.”
I remember sitting back and thinking about what he meant. The first thoughts that came to mind were about tripping him occasionally, or hiding his toothbrush every time I went to his house. My young mind didn’t fully understand how serious David was being. His mind was running three tracks above mine, so I didn’t know what I was getting into when I said, “okay, I’ll try to ruin your life. But I dare you to do try and ruin my life as well.”
He smiled with a newfound enthusiasm, and I smiled back. I had hoped it would be a great way to relieve my boredom with life. David stood up and punched me in the leg as hard as he could. I shouted at him, mostly out of surprise. He just laughed.
“The dare starts now,” he said, grabbing his shoes. “We are no longer friends, we are nemeses.” He opened my front door and looked over his shoulder. “Good luck,” he said. “I hope you’ll work half as hard as I will.”
Once he left, I just sat there rubbing my sore thigh. Okay, I thought, if he wants a war, he’ll get a war.
That night, I had laid awake trying to think of ways to make his life harder for him. My ideas were all so childish and useless compared to what he would later throw at me. I’m too embarrassed to list my ideas from back then.
I wish I could say I remembered the day David turned against me for real. But it was so subtle that I didn’t notice right away. To my face, David acted completely normal.
While we were at work, I would sprinkle popcorn over a section he had just cleaned and point it out to him. He would just laugh, and say, “is that supposed to ruin my life?” Then he would clean it up. I expected him to do the same to me, but he didn't. His lack of visible retaliation made me bored again so I stopped. Looking back, I suspect that behind my back he was sabotaging my image with our other co-workers and our boss.
Out of the blue, my boss called me into his office and told me that I was fired because I wasn’t doing a good enough job. David acted sorry i was leaving and we promised to hang out again soon.
I left, thinking I could make this something good and get a real job. That dream died, and I ended up at McDonald’s instead.
After I had been at McDonald’s for a month or so, my parents confronted me. They asked me if I had been stealing cash from their wallets. I had never stolen a cent from them, and told them so. They backed off, but only for a week until my mom’s debit card went missing.
They confronted me again, this time very angry. They accused me of withdrawing several hundred dollars using my mom’s debit card. I have no siblings, so it wouldn't have been anyone else in the house. It turned into a screaming match and they demanded that I move out as quickly as possible. With my small cache of savings, I found an apartment near the local community college that housed college students. The rent was affordable enough for me, so I moved out within the month.
I moved in and became instant friends with two of my roommates, Clark and Ivan. Our other roommate, Isaac, kept to himself and stayed in his room playing video games 24/7. Life got good again because I hung out with Clark and Ivan frequently.
David and I had stopped hanging out after I was fired from the movie theater. I hadn’t forgotten about him, but I had forgotten about the dare. Every once in a while, I would message him on Facebook or shoot him a text to ask if he wanted to hang out, but my messages were always ignored. Eventually I gave up.
Within six months, I had a great life going. I was dating a girl named Katie, I had been promoted to crew trainer at McDonald’s, which paid better, and my bank account was slowly growing.
I only recognize this as David’s doing when I look back, but an obscene amount of junk mail showed up with my name on it every single day. Magazines, credit card offers, vacation ads, and even physical letters from real people who claimed to be excited to be my new penpal. I sorted through them every day trying to find some pattern. Clark and Ivan thought it was hilarious. When I came home late from work, they would sometimes toss the junk mail in the air like confetti as I walked through the door, cheering that the Mail King was home.
One day, I remember feeling sick of getting all this junk mail and deciding to sit down, call every subscription to cancel. I recruited Clark and Ivan to help me, and we sat down with snacks one afternoon and started to crank through phone calls.
In a few days, the tide of junk mail subsided and we celebrated our efforts. That only lasted a week.
The next week, it started coming back in full force. There was twice as much as before, and even some pornorgraphic magazines in the mix. Not only did my physical junk mail increase, but my email became unnavigable through all the new spam messages. Google moved a lot of it to the spam filter, but there were still hundreds of emails that made it through. My email had been subscribed to websites I’d never even heard of.
Clark and Ivan were blown away by the new tide of junk mail. The event was dubbed “Return of the Junk” and became a great ice breaker for Clark and Ivan to introduce me to other people at parties.
One day I was browsing Facebook’s “People You May Know” section when I came across someone’s profile that had my picture, but a different name. The account was open for anyone to view and had a lot of porn posts, status updates full of swearing, and praises to Hitler. I frowned when I clicked on their pictures. Most of the pictures were the same ones from my Facebook account, but there were some pictures of me that weren’t on my account or anywhere else online. Keep in mind, I didn’t remember my dare to David, so I was feeling pretty creeped out.
I hit the report button and let Facebook know that the account was a fake and went on my way.
I think three months or so later is when more stuff started to happen. Katie and I are getting very serious and discuss moving in together. The junk mail still rolls in and I’ve started to just throw it away. Ivan has moved out to go to an actual university, so a new roommate Jackson has moved in. Clark and I attempted to befriend Jackson, but he’s similar to Isaac and locked himself in his room most of the time.
A new game became available for pre-order, so I submitted my email to reserve a copy. When I tried to log into my email to make sure the reserve code was there, I couldn’t log in. I hit “Forgot Password” and it asked if I wanted to use my phone number to reset the password. I pressed yes and waited for my phone to light up. It never did. I pressed the button three more times, but no text ever came. I tried old passwords I used to use, but none of them worked. I frowned, but eventually just walked away from my computer. I’d try again a different day.
I sat down on the couch and pulled up Facebook on my phone. A popup appeared. “You’ve been signed out,” it said. Then it jumped to the login screen. I thought I’d hit the logout button on accident, so I just typed in my email and password. It didn’t work. I tried again, but it still told me the password was incorrect.
My phone buzzed in my hand. Katie was calling me. I answered it and immediately became concerned. She was sobbing.
“Katie?” I said.
“You coward,” she spat. “You don’t get to just Facebook me that shit, no you have to talk to me and tell me with your voice.”
“Katie, what are you talking about?” I asked.
“Don’t play stupid, asshole. Say it.”
“Say… what?”
“You Facebook me and say we are through, but when I call, you deny everything? What the hell are you trying to pull, Zander?” Katie hissed.
“Katie, my Facebook got hacked! I was literally just trying to log in when you called. Are you at home? I’m coming over. We are not done, we are far from done, sweetheart.”
It took me some time to convince Katie that it hadn’t been me, but she relented when I showed her that I couldn’t log in. I googled how to get my Facebook account back and contacted their helpcenter. Thankfully, they were able to get me back into my account. Lots of links to porn sites had been posted all over my page by whoever jacked my account, so I spent time deleting all of those. I also spent time answering family members who asked about the “strange content” I had been posting. Awkward.
Katie also found out through her feeds that my Twitter and Instagram had been hacked. The accounts were posting hundreds of crude messages and pictures. Those two sites took a little more effort, but eventually I regained control over those too. Fixing my email took a couple of days, but I got access again.
Not wanting to repeat the experience, I made my passwords into really long strings of numbers, letters and symbols. Each account had a different password. For anyone who has done this, you know how impossible it would be to memorize your passwords. I wrote them down on a sheet of paper and put it in my dresser drawer. I didn’t intend to get hacked again.
I'm telling you where I put the paper so you'll know how freaked out I was when Facebook signed me out again the next week. I checked my other accounts. Locked out again. I shot Katie a text to warn her and then called the Facebook help center again. They gave me access to Facebook and gave me the same warning about making a long password.
When I told them the type of precautions I had taken last time, they suggested checking my computer for viruses in case there was a keyloggers collecting all the information I typed.
I called a computer repair center and asked what I needed to do to get my computer scanned. They asked me to bring it down and they'd check it out.
I had a desktop, so ‘bringing it down’ required a lot of unplugging. When I got down behind the computer to unplug everything, I found a tiny USB stick that I'd never seen before. I frowned and tried to locate its contents on the computer. The computer said no USB was attached.
The computer repair guy confirmed that the USB drive was a keylogger. He asked if my computer had ever been anywhere that anyone could walk up and use it. I told him no and he said he had no idea how it could have gotten there.
He didn't charge me anything, just warned me to keep an eye on my computer.
I changed all my passwords again, going through the motions to get my accounts back.
A few days later, I received three, yes THREE credit card bills in the mail. I still had the habit of skimming through the junk mail in case there ever was anything super important. I'm glad I did, because I might never have found out about the credit cards that were registered in my name.
I called the credit card companies to inform them that they were mistaken. I had never signed up for a credit card. My parents had warned me about them so often that I'd been deterred from ever getting one. Before you comment and tell me I need them to build my credit, yes I know that now.
A quick google search told me what to do next. I called Equifax, which is a company that calculates your credit score and tells creditors that it's okay for you to open a credit account. I placed a 90-day fraud alert on my credit. They said they would call me if anyone tried to open a credit account in my name.
The dude at Equifax was kind enough to tell me what I needed to do next. He asked me to go online and view my credit report. If I saw any accounts I didn't recognize, I was to write them down and fill out a complaint to the Federal Trade Commission (FTC) explaining the situation. Once I had that submitted, I was to file a copy of it with the police and create a police report. Then I had to take those two reports and call each of the credit companies that had issued credit to my identity and start the dispute process. I instantly felt very discouraged at the amount of effort this would require. It felt utterly insane to be required to follow all these steps just because I was the victim of identity theft. God damn.
Clark was horrified at what had happened and looked at his credit score. He was relieved when it came back clean. I made Katie check hers too just in case. Also clean.
I'll take a minute to tell everyone reading that you are entitled by law to one free credit report per year from each of the three credit score companies. That means you can and should check your credit three times a year. Clark and I set reminders on our phones to check the scores again in 4 months. I asked Katie to do the same.
When I first found out about the accounts, I had called my parents to ask if they had opened any accounts in my name. If they had, I'd at least know who the culprit was. They told me they hadn't opened any accounts, and I warned them about my problems. They promised to check their credit score.
Two weeks after I had called them, my dad called. They found fifteen fraudulent accounts between the two of them. What the hell? I told him the steps he needed to take, and he was grateful for my help and warning.
I know this is boring to read, but I want you to realize how insanely painful it was to fix all of this shit. Seriously, watch your credit reports and nip identity theft in the bud before it happens to you.
I had requested detailed bills from the credit card companies that had issued the fraudulent accounts, and they mailed them to me. The bills were full of online purchases. The accounts had been opened almost a year ago, and in that time they thief had spent $62,000 between all the fraudulent accounts. I was pretty upset that in a full year, I had only just found any credit card bills in the mail. I must have been tossing them with the mountains of junk mail. Now I know that the masses of junk mail were deliberate and calculated so the bills would blend in and hopefully get thrown away
The first few transactions were from stores like Target, Walmart, etc. But the further down I went, the less I recognized. One word stuck out to me: bitcoin. I had learned a little about it from my Facebook feed as I had some friends from high school who touted it as the next real currency. According to the credit card statements, several thousand dollars had been exchanged into bitcoin.
I started really researching bitcoin and trying to figure out what it was and why an identity thief would want it. To make the explanation short, bitcoin allowed my thief to make completely anonymous purchases online. It was as if he'd gone to an ATM and drained all the credit cards into cash. I didn't foresee the credit card companies ever getting their money back.
David now had a hell of alot of cash he could use to ruin my life. I didn't know it was him at the time, obviously, but now I do.
Guys, identity theft is a serious crime and is very damaging to everyone in the economy. And while the theft had been bad, my life was about to get a whole lot worse.
That’s all I have time to write for now. I have to go and get some serious shit taken care of. I'll write again as soon as I can.
My name is Zander, and my best friend is trying to ruin my life.
Part 2
Part 3
Part 4
Part 5
Part 6
Part 7
Part 8
 
Series 2
submitted by Zandsand90 to nosleep [link] [comments]

I'm an Undercover FBI agent on the Deep Web (Part One)

My name is Special Agent “Barry Allen” .(not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize the name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

I'm an UnderCover FBI Agent on The Deep Web. (Part one)

My name is Special Agent “Barry Allen” . It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
submitted by BeardedVeteran to nosleep [link] [comments]

December 25th CHRISTMAS (Presents from the King)! News on Christmas: MCO, PAY, WAVES, BAY…Tech This Week: BURST, ICX, XVG, STRAT, XEM, ARDR

December 25th CHRISTMAS (Presents from the King)! News on Christmas: MCO, PAY, WAVES, BAY…Tech This Week: BURST, ICX, XVG, STRAT, XEM, ARDR
Ok yesterday with a market that basically tanked I managed to pick 5 of the only green coins out of literally 1200. MCO, PAY, BURST, ICX, and STRAT were all in the green. Picking winners when everything is green is one thing, but when the market is swimming in red and you have the 4 green, it’s a good day.
I appreciate all my loyal followers! For tips and strategy hours before being posted to the message boards follow on Reddit, Instagram: JaketheCryptoKing and Twitter: JbtheCryptoKing. And now on Discord: https://discord.gg/MWBTWFV (join group to reach me directly and see posts early!) Remember in trading minutes matter, hours are eternities.
Let's get to it, Merry Christmas All! News For Christmas: MCO has promised a Christmas bonus. Their twitter is swimming with hints about a KRISTMAS (spelled incorrectly? Bonus!). According to MCO, "We have something special planned for all of you for December 25th and we think you will love it." Their new cards are supposed to be released by January 1, maybe their debit cards (allowing you to exchange crypto for FIAT instantly) are ready?! Check them out online they look GORGEOUS. I have already placed orders for 3/5 of the available ones and I’m #40,000+ I expect MCO to start rolling these cards out, there is absurd demand for them. With surprise Christmas news tomorrow and a working product this month this coin should skyrocket. If you are interested in getting a card rf downloading the ap they are gorgeous: https://get.mona.co/ivwt/tc7kbhig6I
PAY tweeted earlier today about shutting down their system for a short period while they prepared for the Christmas surprise. This confirms we will have Christmas news and from the tone of the tweet, positive news! What could it be?! With many projects and partnerships on the horizon I highly doubt they would release negative news on Christmas this is a must own for tomorrow to find out what news is released!
WAVES’s founder has a livestream occurring on Christmas (not sure how he picked the day) at least everyone will be home to watch it? Either way their NG activation was successful, they have a live stream with the coin founder tomorrow, and a presentation at an enormous Miami Blockchain Convention in January. This is a buy and hold. Not to mention the Binance promotion which in essence is buy and hold WAVES (you lose points if you sell) is in effect for another 3 days and they are having an airdrop and the end of the month. Nothing but positive information here. If you need a Binance account to trade WAVES please use my referral link: https://www.binance.com/?ref=15316928
BAY has hinted at a Christmas surprise for some time now. The crypto coin market is gambling mixed with stock trading. My money is on BAY not disappointing and releasing news worthy of placing it in the 20%+ range with heavy volume.
Now that the “NEWS” section is complete, which is all positive news for today! Let’s begin to discussion on technology. Nothing really creates 100% gains (or more) in the Crypto Markets like technological block chain advances. This is the week’s leaders for this category…
BURST is one of the most unique altcoins on the scene. I wrote about them yesterday and they are here today because on the 27th we get Dymaxion. Do you investors/followers/crytophenes know what one of the biggest problem with mining is? Electricity consumption! BURST changes that by using 400x less electricity then BTC miners. They have their Dymaxion launch this week and their mining platform should revolutionize blockchain tech. BURST uses free memory space instead of CPU, GPU, and ASIC miners using literally less than 0.025% of the electricity when compared to BTC’s mining algorithm. BTC mining uses more electricity than many small nations and BURST will provide an ability to mine at a very low cost while still having a tradable coin on exchanges. Imagine being able to use the free memory on your computer, while you sleep to earn an income, the technology is crazy. I expect this week (their release is the 27th), particularly the next 72 hours to see the biggest BURST gains to date, while leading volume on Bittrex.
NXT (will be in each post until the airdrop, and it went from $.7 when originally recommended to $1.80ish), with the future value of airdrop priced this should trend toward $2.00 or $2.50. As I’m writing this I see it’s spiked over $1.60. That is more then 100% gains in 72 hours, I’ve been screaming to buy NXT in all of my prior posts. Two days ago it popped. The whole market trended downward yesterday. However, NXT should continue to trend toward $2.00+. I just did the math on the IGNIS airdrop, the IGNIS has increased to $4.02 in value, meaning NXT should be worth a minimum of $2.00, a penny more for every penny NXT is worth following the airdrop, price point $2.00-$3.00 depending on if IGNIS continues to appreciate. More people will become interested in “free IGNIS” tokens in the coming days. NXT and the future value of IGNIS should continue to appreciate following Christmas leading up to the airdrop.
ICX was one of the few winners yesterday! Their Mainnet goes live by the end of December which means any day now there will be that 100% pop everyone dreams of. Leading up to that we should receive the hype and anticipation boost on a daily basis. I expect ICX to rally 10% daily until the Mainnet announcement is made with a 100% gain the day of going live! Having a live Mainnet is essential for a viable crypto currency. Welcome to the big leagues ICX.
XVG, VERGE WRAITH PROTCOL (XVG promises this to come out by end of year, plus a very impressive ad came out 4 days ago so I doubt they miss their deadline) anonymity with the flick of a button (public and private ledges in one block chain). By the time you are reading this post it may unfortunately be too late . There is speculation Wraith may be released in the morning. XVG has promised WRAITH will be released by the end of this year, it should hit $.50-$1 range when it does, McAfee although I don’t agree w/him on much he says, states a $15 price target within 6 months of Wraith Protocol being released. I’m saying $1.00 it’s currently $.25 that’s a 400% upswing if I’m right, 4000% if McAfee is. Does it matter really who is correct at that point?
Wraith allows the individual user to determine if they want their balance visible on the block chain or not. Right now we have coins like Monero which are completely anonymous hence their use on the dark web, or ones that are completely public where anyone who knows your wallet address can check your balance. Verge lets each user determine whether to be, public or private, this will revolutionize blockchian and altcoins. If you want to see the impressive link for the Wraith ad here it is: https://youtu.be/dMrk6rozbJg
An article was written today by Bitcoinist highly favorable of Verge, Wraith will make the coin value explode: http://bitcoinist.com/verge-next-bitcoin/.
XEM has been quiet but should NOT go unnoticed. Have you seen yesterday's chart? I suggest you glance at it. Literally no dips, 45degree angle upward. Leading to what.... Catapult, which is version 2.0 of NEM (is to be released by the end of the year). Plus a 4 week hackathon beginning in January. There is nothing better to build awareness and test out their new Catapult network they’ll be releasing this week, then a worldwide hackathon and a new update to their NEM network. XEM will have a pop this week when Catapult goes live, followed by a 4 week awareness rally driven by a worldwide hackathon.
STRAT, is going to have an amazing week. It was one of the only positive performers on a day the market looked like the movie Jaws. They promised that by January, "I can confirm they will be able to host ICO's on our blockchain agnostic platform this year." STRAT is on the cusp of being able to host ICO’s for other companies. This is extremely valuable technology and they’ve announced it will be ready to go this week. Would anyone like to know the going rate of an ICO? 20-40BTC. Per ICO these small companies and their coin holders are making $250k-$600k at the depressed BTC prices. This is a very big business. They’ve also announced 2 Flagship ICOs that will be available on their STRATIS network in January. The platform to host ICOs goes live this week, and within 2 weeks we find out which ICOs STRAT is hosting. This should be a very positive 2 weeks for STRAT.
ARDR’s platform launches Jan 1st. Ardor’s blockchain becomes fully operational Jan 1st., and the Genesis snapshot is announced 1 week in advance. Not to mention all those NXT you’ve been holding for the free IGNIS are used specifically on the ARDR block chain. ARDR should continue to trend upward with NXT and IGNIS leading up to the airdrop. With a new platform and coins to be used on it this will be a positive week for ARDR with exceptionally high returns correlated with the new platform and IGNIS.
I am including some CB predictions as they are a favorite DM topic I’ve received of late. CB Future Picks the same screenshot that showed BCC showed XRP and Monero. CB admits new coins will be added in the next few months. It was speculated in the online community that because CB released wallets for BCC, XRP, and Monero that those would be added next. CB adamantly denies that they planned to add BCC, XRP, and Monero. And then CB added BCC. I fully expect XRP and Monero to be added within 2 months, and that the original rumor they denied had some truth to it. XRP and Monero are buy and holds. Another favorite question is ICOs. ICOs are very difficult because 99% of them are garbage which is why I've only recommended 2, one of which just met it's hard cap for fund :/. The only one left I like is.. Crypterium- The team is unreal and they are presenting at the Dubai Blockchain Intl’ in January. The ICO is also ending very soon! The bonus period ends in 2 days so I highly recommend getting an ether or 2 involved in this. The Dubai Blockchain Intl’ will greatly increase the number of individuals interested in holding Crypterium, (I make $0 off my posts and extensive research if you do purchase the ICOs please use my referral link): https://tokensale.crypterium.io/?ref=4a5381543424516aa2b4e3a6
Some Lovely Followers Requested I Provide Addresses for “Thank You’s and Holiday Cheer” Here are 3 address to help provide my girlfriend with presents so I can spend more time researching! What is 5% of the 200% I earned you this week? (NXT, Verge, MCO, PAY, EMC2, STRAT)
ETH: Address: 0x955A1a68613C028Ea98b0b5dcC58901897EB90DB LTC Address: LSnEW1h1bZwFH67s9tXZVX2GCZHNmzFGVN BTC address: 1GKPSkohnt9pSgBnXRmn2SejQNPWD96qif
Once again, no tips are mandatory but I spend 100’s of hours a week researching to make your investment and my small investment grow! Help spread the love this Holiday Season!
THESE ARE SOLELY STRATEGIES I USE IN THE CRYPTOCURRENCY MARKETS BY NO MEANS AM I TRYING TO PROVIDE INVESTMENT ADVICE. I DO OWN SOME OF THE LISTED CURRENCIES FOR THE REASONS I’VE STATED.
submitted by JakeTheCryptoKing to u/JakeTheCryptoKing [link] [comments]

I was told of a scam that has been attempted a few times by deceitful clients

It happens when long term appointments are booked. Overnight or even multiple day appointments. The client brings the full payment in a regular envelope or in a bank envelope (because they needed to withdraw a large amount of cash at once). The money is legit and in the full amount so everything seems okay. Sometime during the appointment, maybe when the escort is sleeping or taking a bath, a switch is made. The envelope with the real money is switched for one with fake counterfeit money, like those used in movie props or as training money in other countries.
The escort leaves with an envelope that appears to have the donation inside. Once the client has parted ways, she eventually discovers the contents are fake. The client/con artist has probably used a fake name or phone numbeemail to contact her. I was told of this by a girl who I see for extended appointments. She lives in France and she tells me this happens in Europe, but has never happened to her or anyone she personally knows. But I wouldn't be surprised if someone here in the US has tried it too.
Edit: I forgot to originally mention this. Sometimes the client will also rummage through the lady's purse and steal whatever cash she has in her wallet. Or take a picture of any credit/debit cards to make fraudulent purchases (buying anonymous gift cards/Bitcoin purchases that once sent can't be tracked or returned).
submitted by patriotsfan1 to SexWorkers [link] [comments]

Friday Fun: Pot, Porn & Bitcoin

It’s Friday of a short week. Want to talk about pot and porn? So do I.
Regardless of your personal values, marijuana and pornography are now massive legal industries in the United States. On January 1st, dispensaries in Colorado began selling marijuana legally to recreational users. Over 20 additional states have at least decriminalized pot if not legalized it for medicinal purposes. Almost immediately redditors began clamoring to use Bitcoin at dispensaries. Not to be outdone, the porn industry made its first first foray into bitcoin when Porn.com (and all of its affiliates as one expert redditor pointed out) announced that it would begin accepting Bitcoin for its monthly premium subscriptions.
Bitcoin could be a godsend (satansend?) for these industries.
When it comes to weed, it is still against federal law to possess and distribute the drug. With the delicate balancing act that exists between federal restrictions and state blessings, dispensaries are bound to be extremely cautious about their sales. Already there were rumors that Colorado shops were refusing credit and debit card payments. Today, marijuana is a cash only business. So how about digital cash? It makes perfect sense for dispensaries (and dealers) to accept bitcoin due to the anonymized nature of the transactions, and the real-time settlement options. Moreover, in a closely scrutinized industry, these merchants could at least create a better digital paper trail to assist with their sales and income tax reporting.
On the other hand, porn accounts for approximately 1 in 8 websites and up to 30% of all web traffic. And yet the business of porn has struggled. (Links are safe for work.) Many think the major issue confronting the adult industry has been piracy and the widespread availability of “free” porn. But an equally problematic issue is the proliferation of fraud and credit card scams, not to mention privacy concerns. Bitcoin could address those issues and become a financial Viagra for the industry. I actually met not one, but two, producers in the adult industry who attended the Inside Bitcoins conference. Aside from being the middle-aged, pot-bellied ruffians I had fully expected to produce adult movies, they were savvy about the business side of things and downright gleeful about Bitcoin’s potential in porn.
Both industries could use merchant tools like Coinbase’s and BitPay’s, but those companies are batting away customers left and right and not likely to touch anything which would attract additional regulatory headaches. But tools like BitPay’s real-time currency conversion could help streamline tax accounting for dispensaries. And paywall solutions like BitMonet's seem custom made for industries like porn.
The result is likely to be one or more bitcoin startups that focus near exclusively on these and other gray market merchants. Some will call them Silk Road Lites, but expect them to be major money makers, probably soon.
For those of you interested in firing up a Chrome Incognito tab or a blunt, get ready to whip out your digital wallet in 2014.
@twobitidiot
For full post with links try http://two-bit-idiot.tumblr.com/post/72112533730/friday-fun-pot-porn-bitcoin You can get my Daily Bit by +1 to [email protected], or following me on twitter @twobitidiot
submitted by twobitidiot to Bitcoin [link] [comments]

SCAMMER CONFIRMED: Everyone needs to know that Dr. Michael Moriarty PhD and the Moriarty Bitcoin Network is a SCAM

This guy is a joke! And I want him to pay for his theft or in jail. I really don't care which one. You can checkout http://antilyze.com for full details but I will try and keep this post short and clear.
  1. I (JC) write an article, an interview about Dr. Michael Moriarty (MM) and his network on CCN. I praise MM for being a bitcoin advocate and he shits on Coinbase and Circle etc. calling them Ponzi etc.
  2. BitcoinTalk user "RickyJames" (RJ) sees the interview and uses MM site "bitlaunder.com" to deposit about 132btc for mixing.
  3. After the coin is not returned for 24 hours, RJ tries to email MM but gets no response. RJ tries support requests and more emails and all go unanswered.
  4. RJ emails me and asks if I will try and contact MM as I did the interview.
  5. I say okay. Assume RJ is full of shit. So, I email MM as to why I have a customer claiming $80,000 in losses at his site.
  6. MM returns my email saying he never heard of RJ, knows nothing of the situation.
  7. RJ emails me a PDF of proof which includes the address he paid the coin to, I check MM site and indeed that is the pay to address and when checking blockchain, RJ proof holds up. Now I'm thinking, "Okay MM, where is this 80k?"
  8. MM emails me and says he can confirm user RJ sent 125 btc and withdraws 123 btc. Claims RJ is a scammer-extortionist and not to worry about him. He also gives me the bitlaunder "payout address" of 1DDWEQM11uMUKiqpGEWvBT2at3CjCw3Vra (1DD)
  9. I again check the blockchain and see the money go from RJ to MM then from MM to 1DD. From 1DD there is never a payout of anything close to 123 btc. So, I simply ask MM for a transaction id.
  10. MM emails me copies of emails of him "taking care" of customers and says, "now do I look like a scammer? I have no need for his 125 btc, I have over 50,000 bitcoins"
  11. This seems crazy, I email Michael and again ask, "MM, this is simple, I need the payout trx id so I can get RJ off my back. Where are his coins?" I tell him the RJ will go to the feds soon, he really should give me the info.
  12. MM then says that if RJ goes to the Feds that RJ will be arrested because the coins are dirty and stolen. Then asks me, "Why would you send someone 125 btc and need them cleaned in 24 hours? Why so quickly? Because they are stolen or hacked that's why"
  13. I email MM and tell him he is wrong. I say that RJ is clean and so are the coins. At this point I'm shocked! How can MM play cop? He runs a launder site and chooses when to send coins back to the customer?
  14. MM emails back and asks to see the proof that RJ and his coins are clean... which I provide him. MM writes back and says that he has checked into RJ and I am right, that RJ and his coins are clean and so he will get them back shortly. Wants RJ to email him with btc address and an agreement that once the 125 btc is returned, that the case is done.
  15. RJ emails MM as requested and MM confirms and says he will send a test transaction for 0.01 btc and then the rest. MM sends 0.01 and then shows his true colors by KEEPING THE REST! He has never sent the rest of the stolen btc.
again, for copies of all emails, see http://antilyze.com
The day after he was supposed to send the 125 btc and did not, MM posts in the forum that he has opened hotbitcoins.com and has decided to "Give Away Free Bitcoin" but fails to respond to any email from JC or RJ about the stolen coins.
Then yesterday, he responds to a thread concerning the safety of investing in btc and claims, "I have invested $400,000 in bitcoin, proof: 1DD.
Like an idiot, he shows the address that he has already told me is the bitlaunder payout address. So, when users send him coin, and he mixes them and then either does or does not (in the case of RJ) return them to the customer, he is claiming that as proof of his btc investments.
Laughable clown! Those are users of your site depositing coin that you are to pay them out with... that isn't investing you fraud scumbag.
Now, MM since when this all began has continued operating all his scam sites including but not limited to:
bitwebhosting.com elaunder.com, bitbuzzer.com, btwager.com, btcstakes.com, bitflippa.com, bitzam.com, bitbrowse.com, bitwant.com, bithyip.com, paidbitcoin.com, duocoin.com, bitarmored.com, coinchill.com, coinchimp.com, bitbiddy.com walletpays.com, vcbtc.com, smoochbay.com, fairbitcoindice.com, bitplastic.com hotbitcoins.com, bitforum.org, bitlisting.com, bitspeculate.com, bit007.com, thebitcoinescrow.com, bitlaunder.com, bitfiverr.com, bitsecurity.com, bitscams.org bitmeetup.com, bitsweeps.com, bitbing.com
Here is his reason, so far, for not paying back RJ. In the course of my trying to get him to admit that he had RJ coins, I sent an email from another account (same IP) in which I even signed the email JC. He was supposed to know it was me, but I was trying to get him to admit that he had the coins. In my email I said, "I know what you've done, so to keep me quiet, I need 20 btc"
I admit now, that wasn't the best idea but I was always in contact with RJ and had MM decided to send the 20 btc, I would have sent it to RJ immediately and with it, the obvious fact that MM has admitted to stealing the coins. Nope, instead MM makes a site named after my name http://jerancampanella.com and claims there that I am a scammer extortionist. Claims I was fired from my job at CCN for writing lies about MM, claims that my house is in foreclosure and that I am scamming bitcoin businesses.
This must stop. I am trying to recover funds for RJ. I wanted nothing out of this. But at this point, I want MM to pay Ricky back or pay by going to jail for running a scam operation.
In the interview he slammed Coinbase and Circle for their practices and wanting to know your private info. On his sites he claims the following:
Customer service is available 24/7 by our support ticket system and we usually respond within hours. Feel free to contact us with questions, concerns, feedback or suggestions for new features. (He did not get back to RJ for days)
If you make money speculating, you may incur 'capital gains taxes' in your country. However, we DO NOT report to any revenue agency or government, nor would we comply with official requests for information. Whether you choose to pay taxes on your profits is your business. (Illegal)
Our privacy policy ensures we do not share information with third parties, including governments or revenue agencies, under any circumstances. Nor do we retain client information or IP logs beyond what is necessary to service your account.
We protect your privacy and anonymity by not storing IP logs or personal information. Nor do we respond to requests to divulge such information.
No personal identifying information is required to sign up, and no IP logs are maintained for the site. We could not identify you to third parties under any circumstances.
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information. This does not include trusted third parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential. We may also release your information when we believe release is appropriate to comply with the law, enforce our site policies, or protect ours or others rights, property, or safety. However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses. (Hmmmm conflicting much?)
We will NOT comply with any court order for information pertaining to our clients, nor will we comply with any government request (of any country) for information about our clients. (see paragraph above)
Moral here is that MM is a scumbag. He has tried to scare me into backing down with repeated threats of what will happen if I don't get back to my life. He has also offered me bribes for ignoring RJ and getting back to my life. I will DO NO SUCH THING since they all involve letting him steal $80,000. He has made a recent post on the forum and at jerancampanella.com saying some of his sites have been reported by me and that my claims are "factless." Again, please see http://antilyze where every bit of proof is found. Also see RJ's most recent post here https://bitcointalk.org/index.php?topic=713699.0
It is true that I have been and will continue reporting every single site you own. I have already had all your sites listed on badbitcoin.org. Why can't you stop being a douchebag and return the $80,000 you flat out stole from RJ?
Here is why: You are not a Doctor in any way. You are a school boy thief who lives with Mommy You are not Michael Moriarty, and you are not a criminal mastermind like the Moriarty in Sherlock Holmes. He is a character, cause in real life... scam artists like you and Karpeles pay for your actions. You are not a PhD from Stanford. You might have a PhD in being a scammy piece of shit however. You register all your sites under a pseudonym. You register them under a "mailing center" or fake addresses You list fake phone numbers that do not work.
You are attempting to operate a business with a refusal to remain transparent because of the fact that on occasion you see a need to steal your customers money. If you operated your business like the businesses you hate, Coinbase, Circle, etc. you would not be able to steal, because these companies are owned and operated by legit businesses who follow laws which help protect it's customers, and include accountability. You have none of these things. What you do have is nothing more than a movie poster as your identity and of the owner of your company. This allows your customers no redress in the event, such as RJ, of theft of their money when entrusting it to one of your many sites.
I OFFICIALLY AM OFFERING ALL I CAN TO HELP CATCH THIS SCAMMY SCHOOL BOY. THE BOUNTY WILL BE PAID FOR INFO HELPING TO BRING MM TO JUSTICE OR TO PAY WHAT HE HAS STOLEN. My Bounty on MM is 1 btc.
I'm available for chat at http://antilyze.com I am not hard to find. I'm not hiding. I'm not the piece of shit and if after reading this you think MM is anything but a piece of shit, then I suggest you look in the mirror and btw, you stink.
Would appreciate comments or any help or ideas on how we get this no good scammer running a scam operation that has probably turned thousands off bitcoin with his theft. See below more sites that talk about this loser MM.
Thanks for taking the time to read this.
Jeran Campanella
You can add see other sites that are talking about Michael Moriarty below https://bitcointa.lk/threads/bitlaunder-com-scam.184327 http://tedjonesweb.blogspot.ru/2014/01/bitplasticcom-scam-bitplastic-bitcoin.html https://bitcointalk.org/index.php?topic=601675.0 http://www.reddit.com/Bitcoin/comments/1v9pzbitplastic_scam/ https://bitcointalk.org/index.php?topic=613635.0;wap https://muut.com/i/localbitcoins/general-discussion:bitcoin-debit-card-discou_1
submitted by jerancampy22 to Bitcoin [link] [comments]

BitPlastic - Anonymous Bitcoin Debit Card - Worldwide OK 10 Bitcoin Debit Cards 2018 Buy bitcoins with credit card anonymous - YouTube How to Buy Bitcoin on Coinbase Using Your Debit Card - YouTube BitPlastic Anonymous Bitcoin Debit Card, order now

Withdraw Bitcoins Funds through ATM Credit Card in your Country, Bitcoin Credit Card, Bitcoins ATM card, Buy Bitcoin, Buy Bitcoins, Paypal Bitcoins, Bitcoins Paypal, Exkash.com, Buy Bitcoin Online, Bitcoin Mining, Bitcoins Price, Bitcoin Value, Bitcoins Exkash Card, Exkash Bitcoins ATM Visa Debit Card, Bitcoins Card to withdraw. Bitcoin Debit card Place an order to request for a bitcoin debit card. Three factors are involved, for example, your place of residence, the currencies you use, and how much you'll pay for your card. In case you decide on picking a crypterium card, get to the 'card' section, and click. You can either se lect a visa card or UnionPay. Digital money that’s instant, private, and free from bank fees. Download our official wallet app and start using Bitcoin today. Read news, start mining, and buy BTC or BCH. Your Debit Card and CoinsBank Wallet are perfectly united. Simply add bitcoins to your wallet and the card is ready for use. Whether you prefer to shop online or visit your local store, the card is accepted worldwide. More about cards. The leading platform for professional cryptocurrency traders. Customers can trade on our industry-grade, low-latency exchange. Enjoy the tools that professional ... To buy Bitcoin with debit card or credit card, you will need to create a Bitcoin wallet, and here are your options: Desktop wallet - Easy to use and very secure. The most popular option is Electrum. Hardware wallet - Outstanding security. The most popular option is Ledger. Online wallet - Very convenient. Paper wallet - Budget option that’s also secure. In short, the best wallet to buy ...

[index] [17440] [6276] [21194] [50273] [26760] [41183] [3970] [9408] [6346] [26000]

BitPlastic - Anonymous Bitcoin Debit Card - Worldwide OK

BitPlastic Anonymous Bitcoin Debit Card, order now http://20us.ru/bitcoin/eng/info/number/page3/11 In this video you will see some of today's best cryptocurrency debit card company's.i am not affiliated or sponsored by any of the featured company's in this video.this video is only for ... This Video will show you how to get an Anonymous Bitcoin Wallet and Debit Card, Please Donate So I Can Show you proof of the Card Once Bought, Please donate to this address ... The CryptoDad Shows you the easiest and safest way to buy Bitcoin using Coinbase! Check out the rest of this description for relevant links and additional in... Want to know how the BitPlastic anonymous Bitcoin debit card works? Watch this short video to learn how real people use the Bitcoin debit card.

#