Gap

Advanced
Joined
14.09.20
Messages
139
Reaction score
1,113
Points
93
Let's say they came to you, and they came to you. In any case, your task is to build a correct picture of what is happening in front of the investigators, which makes you innocent, and them - making mistakes and trying to sew a case to an innocent person - that is, you.
To understand what and why to say, know the following:
Only traces on your computer are 100% proof of a computer crime and nothing else.
Most often this is correspondence in ICQ, Skype, and other messengers + the presence of bots builders, files with cardboard, etc.
Money transfers by themselves are also not sufficient evidence. Although essential.
If you find everything at once (correspondence, cardboard, traces of financial transactions), then you will not be able to get off the topic.
But if you were at least minimally attentive to hiding traces (used truecrypt / bestcrypt, used portable software on wearable media, did not accept dirt and dullness from anywhere), most often the snoopers will only have financial transactions and testimonies at their disposal.
It is the latter that are highly vulnerable.

Any crime includes an object, a subject, an objective and subjective side of the case.
We are interested in the latter. Take away the subjective side - and there is no corpus delicti, that is, there is no crime itself.
In other words, if you did not want to commit crimes and did not know that the act you were committing was part of a crime, but on the contrary, you were sure that you were acting legally, and most importantly, you did not commit anything for which punishment is provided, then you automatically become a witness from a suspect.
The easiest way is to look like an intermediary or a drop, who was brazenly lit by evil carders. You yourself must be sure of this. You are piously indignant at how you were impudently deceived. Play, but don't overdo it.
More specifically, it looks like this.

Suppose you are accused of Western Union money (and on top of that, you yourself went to get money). Your behavior:
1) don't deny receiving money. do not deny objective factors that are easy to verify. yes, you did receive transfers. but is it illegal to receive transfers? is it illegal to transfer money to someone?
2) your role is a humble intermediary. you receive the money and give it to the customer.
3) method of transfer - for example, throw money into a cash-in ATM (think!)
4) the card was received by the train conductor. the card has already been thrown away. forgotten receipt details.
5) met the customer on one of the forums on the Internet. communicated with him only on the forum - no mobile, no asec, no other contacts. all the details were discussed there, including the transfer data. there you told him your address for sending the card. after communication, all messages were deleted.
Everything. Your honest but humble help in catching a real carder criminal will lead to the fact that you become a witness from a criminal.
In other cases, your behavior should be the same - reduce everything to mediation, make sure that you had no idea that purchases are made with stolen credit cards.
For example, when accusing the same vestar of the carrage - say that you started working in the support of the exchange service.
When charged with airline tickets, make sure that your partner told you that he is an employee of one of them, and he has many certificates from airlines, which is why the tickets are so cheap. Your task was to look for clients.
Let's say a thing - a person on the forum asked you to help him sell unnecessary laptops / goods that were given to him for debts. You gave him the address, he came, brought him, you immediately gave him part of the money. Then he needed money himself, decided to sell unnecessary goods.
And so on.
Think over the legend before you start doing anything.

Be aware of objective things that snoopers can easily check. Never deny them, prepare in advance, duplicate your messages, correspondence.
To pay attention:
1) calls by mobile and SMS; numbers and text of messages - it's all written and easy to check
2) your location; the history of your movements is recorded and stored for a long time; For example, removing money from an ATM-card of a drop, only an idiot will take with him his real mobile, which glows at home.
3) mobile interconnection; remember, if you carry your and your left mobile phone with you at the same time, this can be easily tracked. the software used by the authorities allows you to do this.
4) there should not be a single transfer between your wallet (webmoney, bitcoin, alpha, qiwi, in general, any) and drop wallets.
5) remember about ATM cameras. wear heels or squat (height), wear big glasses, a hat, etc. Cover your fingers with glue while removing.
6) remember the cameras next to the ATM. do not park your car or taxi near the ATM. it is better to go for a walk, but make sure that the car is not caught in any lenses.
7) register sim cards for left people. do not keep the phone switched on unless necessary.
8) don't be greedy. do not stay on one phone for long. throw it out in the cafe, have someone pick it up and start using it.
9) prepare the correspondence on the forum. create dummy accounts in advance, from the left IP of course.
View hidden content is available for registered users!

This is precisely the reason that usa carding is so reluctantly investigated.
Addendum: exactly how to avoid leaving evidence in a technical sense?
I have already written above that the traces on your personal computer are an iron proof of your guilt.
To avoid evidence, you need to know what traces are, where they are stored, and how to hide / clean them.
Traces are most often:
1) bases of accs, cardboard, grandfathers, etc. material (they take up relatively little space)
2) correspondence in instant messengers, mail (stored both locally and on servers)
a) with your personal data
b) without your data
3) hack software (checkers, builders, cryptors, framers, etc.)
a) installed (usually a little)
 
Top Bottom