textfiles/anarchy/SCAMS/ckfraud2.txt

241 lines
12 KiB
Plaintext

@!@!@!@!@!@!@!@!@!@!@!@!@!@!@
@! !@
@! CHECK FRAUD MADE E-Z !@
@! PART TWO !@
@! !@
@! !@
@! Written By: THE RAVEN !@
@! MAJIX and INTROSPECT !@
@! Typed & Edited By: !@
@! BIT STREAM !@
@!@!@!@!@!@!@!@!@!@!@!@!@!@!@
Who else will bring you such a graphic and up-to-date file!?!
-----------------------------------------------------------------------------
Altho this text may describe ways of defrauding & frogery it is the
authors right to show how lax check cashing places are when it comes
to passing a bad check. THE RAVEN does not assume any responsibility
for the action taken by those who use this files in an unlawful way.
This file should not be looked upon as a crime tutorial, cause I'm
writting a crime tutorial!! It will be called :
The Crime Technical Journal (CTJ1.TXT)
It will be comming soon to a real bbs near you! This journal will contain
scams, secrets, ideas, etc. It will be released in volumes so look for
The Crime Technical Journal 1 and be sure that every chance we get we will
release another, and another, and another. You get it!?! GOOD....
CTJ1.TXT > COMMING SOON!
-THE RAVEN
============================================================================
I'm sorry for not releasing this file sooner but we had to do some hands-on
testing for my up comming file called card fraud! That file will change the
world of the Carder to make him/her 500% more succesfull. Now I'm getting a
lot of heat for that file! But anyway
you slice it THAT file is comming out!! And it's INTENDED TO TECH EVERYONE
HOW CREDIT CARD SECURITY CAN BE BREACHED, IN HOPE THAT PROBLEMS SUCH AS
THAT CAN BE TAKEN CARE OF. ya right that's it!! hehehe
-THE RAVEN
-----------------------------------------------------------------------------
INDEX: I.BASIC'S
II.FORGERY
III.SCAMS
IV.Where 2 Find Me
----------------------------------------------------------------------------
I. Basic's of passing a bad check
The bad check passer normally follows certain guides when working. He knows
that there are certain things that the merchant insist, and he tries to
blend in with the crowd.
The first step is reconnaissance. The professional bad check passer seeks
to find the easy targets. To do this you opps I mean he will enter various
stores to observe there procedures. He may make small purchaces with cash or
check, so he can see for himself whether cashiers ask for id when a person
pays buy check, and also what sort of id passes in a certian store.
The secret of a con man's success is not his uncanny skill of fooling
people, nor is it his being a masterful psychologist. Instead, it's his
willingness to lay back and observe before working his con, because he
knows that it's easy to fool careless or vulnerable people. When there are
several cashiers, a few minutes spent in watching for the tired or careless
one who skips basic security procedures avoids the need for devising ways to
fool an alert one.
Another important factor is timing. The bad check passer needs the
anonymity of a crowd, and knows that long check-out lines keep cashiers
under pressure. This works in his favor. The height of the bad check season
just passed, it's late fall, just before Christmas, when stores are crowded
with people buying gifts.
The first point is to appear respectable, as part of the clientele. The
bad check passer does not enter a store dressed in rags, or demonstrate a
surly or vicioius manner. He does his best to appear respectable and very
pleasent, because he is first of all a salesman, and knows that he must sell
himself if he's to succeed in "selling" a bogus check to a clerk.
Another point is that the bad check passer must always keep his cool. Any-
one who looks nervous, or gets flustered easily, will attract attention and
arouse suspicion.
II. Forgery
It's possible to counterfiet checks from scratch as how I outlined in pt.1
most people will say that it requires a high-tech operation cause of the
special paper and shit but if you invest about $600 in equipment and services
you will be able to gross $100,000. I have herd from people that some have
tried to use Check Fraud pt.1 with no success, if that's the case I suggest
that you let me see a 'sample' of your product case you may be overlooking
something simple that can get you locked up!
It's also necessary to know certain numbering systems, even for low-tech
forgeries. Social Security cards, are not accepted for I.D., but the
government issues them following a number system according to state of origin
Likewise, checks have clearing house and bank numbers, according to
geographical are, and creating an effective forgery requires printing the
correct numbers on the checks.
Just like carders & hackers have "Dumpster Divers" so do the check fraud
artist. The system works the same instead of going through garbage from
the phone co. or stores the check forger goes through garbage from printing
plants that print checks for local banks and shit.
Photocopy machines are very useful for check copying, because of color
toners. These often come close to matching the inks used on genuine checks.
Another forgery technique that if your reading this file I'm sure you'll
try is the use of "print shop" programs on home computers, coupled with
laser jet printers that print high-resolution copies. Available software
allows producing almost any type font needed, and for those not included in
available software, a scanner allows picking it up from a copy.
III. CHECK SCAMS
1) The Double Check Scam
An almost fool-proof scheme to defraud retailers is the double check. The
check passer (which we will refer as 'paperhanger' from now on) buys an
expensive item at a jewelry store, for example and writes a completely
legitimate check for the price. The clerk telephones the bank to verify
that there is enough on deposit to cover the amount. The bank assures him
that the check will be covered, and the clerk begins to wrap the purchase.
At this point the 'paperhanger' changes his mind, and selects a slighty less
expensive item. He asks for his checkback, and takes out his check book to
write another one, for the smaller amount. The clerk, having already verified
the first check, usually finds it unnecessary to verify a smaller check, not
noticing that the second check is drawn on another account at the same bank.
The second account is closed, and the check bounces, by which time you, opps
I mean the paperhanger is long gone.
If you live in a state which makes it a felony to draw checks on closed
accounts (like where I live). Open the second account, but with the minimal
balance like $25. This covers the legal contingency, and avoids making it
obvious that the intent was fraud.
2) Telephone Order Scam
Some telemarketers and other shop-by-phone companies accept customers'
checks. Some use special telephone check authorization services. One procedure
is to ask the customer for the bank routing number, which is printed in
magnetic ink at the lower left side of the check. The next step is to request
account number, to the right of the routing number. The weakness in this
procedure is that anyone finding a discarded check made out by a person, can
use the numbers without having to sign the account holders name or show the
check for verifaction.
2) Kiting Checks
"Kiting" means covering checks with other checks drawn on accounts with
insufficient funds, and using the freshly drawn checks to cover the ones used
tocover them. Kiting depends upon the 'float' or time lag, between the moment
a check is written and the day it arrives at the other bank for collection.
Such a scam could go on forever, with one check covering the other in
rotrtion.They'd all be good, but only if the series lasted forever. The
reason kiting is illegal is that the last check would bounce.
In its simplest form, kiting work this way: The Fraud artist draws a check
for oone thousand dollars from checking account "a" and deposits it in
account "b" set up under another name. Knowing the time it takes for the
check to clear, he writes a check for $1500 on account "b" and deposits it
with $500 "cash back" into account "a". He uses the $500 for living expenses.
Alternately, he can write a check for $1000 to cover the first check, and
write another to cover his living expenses.
The next cycle begins with his having to write a check on account "a" for
$1500 to cover those drawn on account "b" He deposits this in "b" and draws
other checks to pay for purchases, as well as to cover the $1500 check
draen on "a".
Modern kiting operations are more sophisted than the one I just mentioned.
A modern con artist will set up several checking accounts in the names of
dummy companies, to avoid the obvious tip-off of a customer writing checks
to himself on other accounts.
Kiting can work only under certain conditions:
* There has to be enough time between deposit and collection. Modern
electronic banking has reduced the "float" time to only a day or two
with three days maximum between banks at opposite ends of the country.
The practical difficulty of running checks back and forth between the
Alantic and Pacific coasts makes this very awkward.
* All banks involved have to be willing to allow the account holder credit
for uncollected funds. This means that the bank must not put a "hold"
until collection on checks deposited. Otherwise, the checks the con man
uses to cover those drawn on each account would bounce, and the scam will
become totally unglued.
* The con man knows when to quit! Eventually, someone will become suspicious
of an account that has constantly increasing deposits and withdrawls.
When that happens the police will be waiting at the bank.
3) Sweeting the Account
This means using an established account and depositing bogus checks to
increase the balance, meanwhile drawing other checks on it. Another way to
take advantage of a "sweetened" account is to take "cash back" on bogus
checks. Banks will often give long-term customers credit for uncollected
funds, and sweetening the account with out-of-state checks will often allow
playing fast and loose with the checkbook until the bogus checks begin to
bounce.
4) The High Tech Hood Scam
The name of this should tell you who pulled it off and that it's a
'goldmine'. NOw to work this scam you'll open up a account in a bank under
a fake name. With that handy you'll deposit checks that are 'sort-of'
stolen. Your saying huh? Let me explain...
When you find a personal check in the street the person usually puts a
stop payment on it now what you do is calculated about6-10 checks after
that, say the found check number is 160 you print up a check #170 using
all the info contain here and in part 1. and deposit the check into your
account make sure you don't write something that might bounces. Keep it
small like $475.00 under $500 so if you get bagged you who be charged with
'Grand Theft". If you redo all the #'s right the check will clear!
I also wrote a guide on check fraud the insiders guide but it's in G-file
mode on THE NEW YORK HACK EXCHANGE BBS so you can look for it there under
the G-file section of scams.
=============================================================================
IV. BBS's where you can find Me.
RIPCO (312) 528-5020
P-80 (304) 744-2253
The New York Hack Exchange (212) 379-4702
Unauthorized Access 10pm-7am +44-0636-708063
=============================================================================