Skip to main content

Sophisticated counterfeit card factory raided after LTTE agent sent to jail


After a week a British criminal court convicted a Liberation Tigers of Tamil Eelam (LTTE) agent for cloning 500 credit cards at a gasoline filling station, a special unit of the police raided a factory that produces chips that will be inserted into card reading machines as a mole , better suited for the crime than the pin hole cameras used earlier.

Abdul Samad Mohamed Raik was convicted by the criminal court of Leicestershire a week ago for helping the LTTE to steal 175,000 British Pounds from ATM machines all over the world. Barely a single household on Houghton on the Hill, Leicestershire escaped the Tiger scam.

Two others Ibrar Hussain and Mohamed Mahmood were arrested when Dedicated Cheque and Plastic Crime Unit of the Metropolitan Police of London raided at Burmingham a “sophisticated counterfeit card factory” as described by the police. Police said so far they do not know whether the two men arrested are connected to a terrorist organisation.

In this method, unlike in the earlier method of recording the credit card and pin numbers with a pin hole camera like device while a customer buys merchandise at a filling station or a shop , the criminals would remove the card reading device , insert a mole inside and replace it at original places.

Police said devices they install inside the card reading machines are so high-tech that they could transmit the card numbers and the related pin numbers to a mobile phone.

Cards are then cloned and used abroad in countries including USA, Italy, Australia.

In most countries, like in Britain, they do not even need numbers to withdraw money using credit or debit cards.

A raid on houses found stolen chip and pin terminals, card account numbers, card readers and counterfeit magnetic strip cards.

In Britain, to cut credit or debit card fraud a chip and a pin were newly introduced in 2006. But the new system did not totally succeed when criminals like the LTTE activists in London started scanning the cards and the pin numbers using pinhole camera like devices.

But in the case of Abdul Samad Mohamed Raik , an LTTE agent who confessed that he was blackmailed due to a loan given by the terrorist group to do the job, during the investigation was found using the pinhole like devices in close circuit television (CCTV) footage.

But when cards are being spied on by the new doctored machines the criminals will not be close by to be noticed by any security devices.

Specialist officers from the Dedicated Cheque and Plastic Crime said, card machines from 30 shops, supermarkets and gasoline filling stations across the country have been stolen.

The police raided the Birmingham factory after complaints from the public that their card reading devices had been stolen.

Comments

Popular posts from this blog

Reversing C++ String And QString

After the rust string overview of its internal substructures, let's see if c++ QString storage is more light, but first we'r going to take a look to the c++ standard string object: At first sight we can see the allocation and deallocation created by the clang++ compiler, and the DAT_00400d34 is the string. If we use same algorithm than the rust code but in c++: We have a different decompilation layout. Note that the Ghidra scans very fast the c++ binaries, and with  rust binaries gets crazy for a while. Locating main is also very simple in a c++ compiled binary, indeed is more  low-level than rust. The byte array is initialized with a simply move instruction:         00400c4b 48 b8 68        MOV        RAX,0x6f77206f6c6c6568 And basic_string generates the string, in the case of  rust this was carazy endless set of calls, detected by ghidra as a runtime, but nevertheless the basic_str...

The Base Blockchain Airdrop: Hidden Opportunities You Don’t Want to Miss!

The Base blockchain, supported by Coinbase, is making waves in the crypto space with its surging Total Value Locked (TVL) and potential airdrop opportunities. In this article, we'll dive deep into Base's ecosystem, its key protocols, and strategies for maximizing potential rewards. We'll also explore SynFutures, a standout perpetual protocol, and other exciting opportunities that could set the stage for a lucrative airdrop. Base Blockchain: A Rising Star Current Status Base has climbed to the sixth position among blockchains in terms of TVL, surpassing even Arbitrum, the long-time leader in Ethereum Layer 2 solutions. With $4 billion+ in TVL , Base's rapid growth is drawing attention from the crypto community. Why the Excitement Around a Potential Airdrop? Coinbase Backing: As a leading exchange, Coinbase's involvement ensures credibility and innovation. Changing Regulations: With evolving regulatory clarity, there's renewed optimism for potential rewards lik...

5 Costly Crypto Investing Mistakes to Avoid in Choppy Markets

Crypto markets can be a wild ride, with exhilarating highs often followed by gut-wrenching lows. Many investors see massive gains during bullish trends only to watch them evaporate in sideways or bearish phases. The key to preserving your portfolio lies in avoiding common pitfalls that trap even seasoned traders. This article dives into five critical mistakes crypto investors make in choppy markets and offers actionable strategies to steer clear of them. Whether you're a beginner or a veteran, these insights will help you navigate the volatile crypto landscape with discipline and confidence. The Perils of Slow Decision-Making In crypto, hesitation can be costly. Opportunities often arise from compelling setups — whether it's a promising chart pattern, a groundbreaking technological innovation, or strong on-chain signals like whale wallet activity. However, in dull or sideways markets, investors often become lethargic, missing the window to act. By the time social media buzz ign...