Skip to main content

Sophisticated counterfeit card factory raided after LTTE agent sent to jail


After a week a British criminal court convicted a Liberation Tigers of Tamil Eelam (LTTE) agent for cloning 500 credit cards at a gasoline filling station, a special unit of the police raided a factory that produces chips that will be inserted into card reading machines as a mole , better suited for the crime than the pin hole cameras used earlier.

Abdul Samad Mohamed Raik was convicted by the criminal court of Leicestershire a week ago for helping the LTTE to steal 175,000 British Pounds from ATM machines all over the world. Barely a single household on Houghton on the Hill, Leicestershire escaped the Tiger scam.

Two others Ibrar Hussain and Mohamed Mahmood were arrested when Dedicated Cheque and Plastic Crime Unit of the Metropolitan Police of London raided at Burmingham a “sophisticated counterfeit card factory” as described by the police. Police said so far they do not know whether the two men arrested are connected to a terrorist organisation.

In this method, unlike in the earlier method of recording the credit card and pin numbers with a pin hole camera like device while a customer buys merchandise at a filling station or a shop , the criminals would remove the card reading device , insert a mole inside and replace it at original places.

Police said devices they install inside the card reading machines are so high-tech that they could transmit the card numbers and the related pin numbers to a mobile phone.

Cards are then cloned and used abroad in countries including USA, Italy, Australia.

In most countries, like in Britain, they do not even need numbers to withdraw money using credit or debit cards.

A raid on houses found stolen chip and pin terminals, card account numbers, card readers and counterfeit magnetic strip cards.

In Britain, to cut credit or debit card fraud a chip and a pin were newly introduced in 2006. But the new system did not totally succeed when criminals like the LTTE activists in London started scanning the cards and the pin numbers using pinhole camera like devices.

But in the case of Abdul Samad Mohamed Raik , an LTTE agent who confessed that he was blackmailed due to a loan given by the terrorist group to do the job, during the investigation was found using the pinhole like devices in close circuit television (CCTV) footage.

But when cards are being spied on by the new doctored machines the criminals will not be close by to be noticed by any security devices.

Specialist officers from the Dedicated Cheque and Plastic Crime said, card machines from 30 shops, supermarkets and gasoline filling stations across the country have been stolen.

The police raided the Birmingham factory after complaints from the public that their card reading devices had been stolen.

Comments

Popular posts from this blog

The Base Blockchain Airdrop: Hidden Opportunities You Don’t Want to Miss!

The Base blockchain, supported by Coinbase, is making waves in the crypto space with its surging Total Value Locked (TVL) and potential airdrop opportunities. In this article, we'll dive deep into Base's ecosystem, its key protocols, and strategies for maximizing potential rewards. We'll also explore SynFutures, a standout perpetual protocol, and other exciting opportunities that could set the stage for a lucrative airdrop. Base Blockchain: A Rising Star Current Status Base has climbed to the sixth position among blockchains in terms of TVL, surpassing even Arbitrum, the long-time leader in Ethereum Layer 2 solutions. With $4 billion+ in TVL , Base's rapid growth is drawing attention from the crypto community. Why the Excitement Around a Potential Airdrop? Coinbase Backing: As a leading exchange, Coinbase's involvement ensures credibility and innovation. Changing Regulations: With evolving regulatory clarity, there's renewed optimism for potential rewards lik...

Reversing C++ String And QString

After the rust string overview of its internal substructures, let's see if c++ QString storage is more light, but first we'r going to take a look to the c++ standard string object: At first sight we can see the allocation and deallocation created by the clang++ compiler, and the DAT_00400d34 is the string. If we use same algorithm than the rust code but in c++: We have a different decompilation layout. Note that the Ghidra scans very fast the c++ binaries, and with  rust binaries gets crazy for a while. Locating main is also very simple in a c++ compiled binary, indeed is more  low-level than rust. The byte array is initialized with a simply move instruction:         00400c4b 48 b8 68        MOV        RAX,0x6f77206f6c6c6568 And basic_string generates the string, in the case of  rust this was carazy endless set of calls, detected by ghidra as a runtime, but nevertheless the basic_str...

When Berachain Meets AI: 9 Projects Riding the Next Big Wave

Artificial Intelligence (AI) and blockchain are arguably two of the hottest narratives in tech today. With Berachain's mainnet launch just around the corner, combining AI with this innovative blockchain opens up exciting possibilities. In this article, we'll dive into nine AI-driven projects on Berachain, each offering unique use cases and solutions. Baosdotfun 1. Baosdotfun: The Launchpad for AI DAOs Baosdotfun acts as an incubator for AI-driven DAOs, focusing on areas like yield farming and trading strategies. Their "DAO seasons" introduce new AI agents every few months, providing fresh opportunities for users. Key features: Supports multiple AI agents. Focus on decentralized autonomous organizations (DAOs). Official Links: Baosdotfun Website Baosdotfun on Twitter Beradigm 2. Beradigm: Maximizing BGT Farming Beradigm specializes in yield farming to accumulate BGT, a governance token central to Berachain's ecosystem. Using AI, Beradigm optimizes farming strategie...