241 lines
12 KiB
Plaintext
241 lines
12 KiB
Plaintext
|
|
|
|
@!@!@!@!@!@!@!@!@!@!@!@!@!@!@
|
|
@! !@
|
|
@! CHECK FRAUD MADE E-Z !@
|
|
@! PART TWO !@
|
|
@! !@
|
|
@! !@
|
|
@! Written By: THE RAVEN !@
|
|
@! MAJIX and INTROSPECT !@
|
|
@! Typed & Edited By: !@
|
|
@! BIT STREAM !@
|
|
@!@!@!@!@!@!@!@!@!@!@!@!@!@!@
|
|
|
|
|
|
|
|
Who else will bring you such a graphic and up-to-date file!?!
|
|
-----------------------------------------------------------------------------
|
|
|
|
Altho this text may describe ways of defrauding & frogery it is the
|
|
authors right to show how lax check cashing places are when it comes
|
|
to passing a bad check. THE RAVEN does not assume any responsibility
|
|
for the action taken by those who use this files in an unlawful way.
|
|
This file should not be looked upon as a crime tutorial, cause I'm
|
|
writting a crime tutorial!! It will be called :
|
|
|
|
The Crime Technical Journal (CTJ1.TXT)
|
|
|
|
It will be comming soon to a real bbs near you! This journal will contain
|
|
scams, secrets, ideas, etc. It will be released in volumes so look for
|
|
The Crime Technical Journal 1 and be sure that every chance we get we will
|
|
release another, and another, and another. You get it!?! GOOD....
|
|
|
|
CTJ1.TXT > COMMING SOON!
|
|
|
|
-THE RAVEN
|
|
============================================================================
|
|
I'm sorry for not releasing this file sooner but we had to do some hands-on
|
|
testing for my up comming file called card fraud! That file will change the
|
|
world of the Carder to make him/her 500% more succesfull. Now I'm getting a
|
|
lot of heat for that file! But anyway
|
|
you slice it THAT file is comming out!! And it's INTENDED TO TECH EVERYONE
|
|
HOW CREDIT CARD SECURITY CAN BE BREACHED, IN HOPE THAT PROBLEMS SUCH AS
|
|
THAT CAN BE TAKEN CARE OF. ya right that's it!! hehehe
|
|
|
|
-THE RAVEN
|
|
-----------------------------------------------------------------------------
|
|
|
|
INDEX: I.BASIC'S
|
|
II.FORGERY
|
|
III.SCAMS
|
|
IV.Where 2 Find Me
|
|
----------------------------------------------------------------------------
|
|
|
|
I. Basic's of passing a bad check
|
|
|
|
The bad check passer normally follows certain guides when working. He knows
|
|
that there are certain things that the merchant insist, and he tries to
|
|
blend in with the crowd.
|
|
The first step is reconnaissance. The professional bad check passer seeks
|
|
to find the easy targets. To do this you opps I mean he will enter various
|
|
stores to observe there procedures. He may make small purchaces with cash or
|
|
check, so he can see for himself whether cashiers ask for id when a person
|
|
pays buy check, and also what sort of id passes in a certian store.
|
|
The secret of a con man's success is not his uncanny skill of fooling
|
|
people, nor is it his being a masterful psychologist. Instead, it's his
|
|
willingness to lay back and observe before working his con, because he
|
|
knows that it's easy to fool careless or vulnerable people. When there are
|
|
several cashiers, a few minutes spent in watching for the tired or careless
|
|
one who skips basic security procedures avoids the need for devising ways to
|
|
fool an alert one.
|
|
Another important factor is timing. The bad check passer needs the
|
|
anonymity of a crowd, and knows that long check-out lines keep cashiers
|
|
under pressure. This works in his favor. The height of the bad check season
|
|
just passed, it's late fall, just before Christmas, when stores are crowded
|
|
with people buying gifts.
|
|
The first point is to appear respectable, as part of the clientele. The
|
|
bad check passer does not enter a store dressed in rags, or demonstrate a
|
|
surly or vicioius manner. He does his best to appear respectable and very
|
|
pleasent, because he is first of all a salesman, and knows that he must sell
|
|
himself if he's to succeed in "selling" a bogus check to a clerk.
|
|
Another point is that the bad check passer must always keep his cool. Any-
|
|
one who looks nervous, or gets flustered easily, will attract attention and
|
|
arouse suspicion.
|
|
|
|
II. Forgery
|
|
|
|
It's possible to counterfiet checks from scratch as how I outlined in pt.1
|
|
most people will say that it requires a high-tech operation cause of the
|
|
special paper and shit but if you invest about $600 in equipment and services
|
|
you will be able to gross $100,000. I have herd from people that some have
|
|
tried to use Check Fraud pt.1 with no success, if that's the case I suggest
|
|
that you let me see a 'sample' of your product case you may be overlooking
|
|
something simple that can get you locked up!
|
|
It's also necessary to know certain numbering systems, even for low-tech
|
|
forgeries. Social Security cards, are not accepted for I.D., but the
|
|
government issues them following a number system according to state of origin
|
|
Likewise, checks have clearing house and bank numbers, according to
|
|
geographical are, and creating an effective forgery requires printing the
|
|
correct numbers on the checks.
|
|
Just like carders & hackers have "Dumpster Divers" so do the check fraud
|
|
artist. The system works the same instead of going through garbage from
|
|
the phone co. or stores the check forger goes through garbage from printing
|
|
plants that print checks for local banks and shit.
|
|
|
|
Photocopy machines are very useful for check copying, because of color
|
|
toners. These often come close to matching the inks used on genuine checks.
|
|
|
|
Another forgery technique that if your reading this file I'm sure you'll
|
|
try is the use of "print shop" programs on home computers, coupled with
|
|
laser jet printers that print high-resolution copies. Available software
|
|
allows producing almost any type font needed, and for those not included in
|
|
available software, a scanner allows picking it up from a copy.
|
|
|
|
|
|
III. CHECK SCAMS
|
|
|
|
1) The Double Check Scam
|
|
|
|
An almost fool-proof scheme to defraud retailers is the double check. The
|
|
check passer (which we will refer as 'paperhanger' from now on) buys an
|
|
expensive item at a jewelry store, for example and writes a completely
|
|
legitimate check for the price. The clerk telephones the bank to verify
|
|
that there is enough on deposit to cover the amount. The bank assures him
|
|
that the check will be covered, and the clerk begins to wrap the purchase.
|
|
At this point the 'paperhanger' changes his mind, and selects a slighty less
|
|
expensive item. He asks for his checkback, and takes out his check book to
|
|
write another one, for the smaller amount. The clerk, having already verified
|
|
the first check, usually finds it unnecessary to verify a smaller check, not
|
|
noticing that the second check is drawn on another account at the same bank.
|
|
The second account is closed, and the check bounces, by which time you, opps
|
|
I mean the paperhanger is long gone.
|
|
|
|
If you live in a state which makes it a felony to draw checks on closed
|
|
accounts (like where I live). Open the second account, but with the minimal
|
|
balance like $25. This covers the legal contingency, and avoids making it
|
|
obvious that the intent was fraud.
|
|
|
|
|
|
2) Telephone Order Scam
|
|
|
|
Some telemarketers and other shop-by-phone companies accept customers'
|
|
checks. Some use special telephone check authorization services. One procedure
|
|
is to ask the customer for the bank routing number, which is printed in
|
|
magnetic ink at the lower left side of the check. The next step is to request
|
|
account number, to the right of the routing number. The weakness in this
|
|
procedure is that anyone finding a discarded check made out by a person, can
|
|
use the numbers without having to sign the account holders name or show the
|
|
check for verifaction.
|
|
|
|
|
|
2) Kiting Checks
|
|
|
|
"Kiting" means covering checks with other checks drawn on accounts with
|
|
insufficient funds, and using the freshly drawn checks to cover the ones used
|
|
tocover them. Kiting depends upon the 'float' or time lag, between the moment
|
|
a check is written and the day it arrives at the other bank for collection.
|
|
Such a scam could go on forever, with one check covering the other in
|
|
rotrtion.They'd all be good, but only if the series lasted forever. The
|
|
reason kiting is illegal is that the last check would bounce.
|
|
In its simplest form, kiting work this way: The Fraud artist draws a check
|
|
for oone thousand dollars from checking account "a" and deposits it in
|
|
account "b" set up under another name. Knowing the time it takes for the
|
|
check to clear, he writes a check for $1500 on account "b" and deposits it
|
|
with $500 "cash back" into account "a". He uses the $500 for living expenses.
|
|
Alternately, he can write a check for $1000 to cover the first check, and
|
|
write another to cover his living expenses.
|
|
|
|
The next cycle begins with his having to write a check on account "a" for
|
|
$1500 to cover those drawn on account "b" He deposits this in "b" and draws
|
|
other checks to pay for purchases, as well as to cover the $1500 check
|
|
draen on "a".
|
|
|
|
Modern kiting operations are more sophisted than the one I just mentioned.
|
|
A modern con artist will set up several checking accounts in the names of
|
|
dummy companies, to avoid the obvious tip-off of a customer writing checks
|
|
to himself on other accounts.
|
|
|
|
Kiting can work only under certain conditions:
|
|
|
|
* There has to be enough time between deposit and collection. Modern
|
|
electronic banking has reduced the "float" time to only a day or two
|
|
with three days maximum between banks at opposite ends of the country.
|
|
The practical difficulty of running checks back and forth between the
|
|
Alantic and Pacific coasts makes this very awkward.
|
|
|
|
* All banks involved have to be willing to allow the account holder credit
|
|
for uncollected funds. This means that the bank must not put a "hold"
|
|
until collection on checks deposited. Otherwise, the checks the con man
|
|
uses to cover those drawn on each account would bounce, and the scam will
|
|
become totally unglued.
|
|
|
|
* The con man knows when to quit! Eventually, someone will become suspicious
|
|
of an account that has constantly increasing deposits and withdrawls.
|
|
When that happens the police will be waiting at the bank.
|
|
|
|
|
|
|
|
3) Sweeting the Account
|
|
|
|
This means using an established account and depositing bogus checks to
|
|
increase the balance, meanwhile drawing other checks on it. Another way to
|
|
take advantage of a "sweetened" account is to take "cash back" on bogus
|
|
checks. Banks will often give long-term customers credit for uncollected
|
|
funds, and sweetening the account with out-of-state checks will often allow
|
|
playing fast and loose with the checkbook until the bogus checks begin to
|
|
bounce.
|
|
|
|
|
|
|
|
4) The High Tech Hood Scam
|
|
|
|
The name of this should tell you who pulled it off and that it's a
|
|
'goldmine'. NOw to work this scam you'll open up a account in a bank under
|
|
a fake name. With that handy you'll deposit checks that are 'sort-of'
|
|
stolen. Your saying huh? Let me explain...
|
|
When you find a personal check in the street the person usually puts a
|
|
stop payment on it now what you do is calculated about6-10 checks after
|
|
that, say the found check number is 160 you print up a check #170 using
|
|
all the info contain here and in part 1. and deposit the check into your
|
|
account make sure you don't write something that might bounces. Keep it
|
|
small like $475.00 under $500 so if you get bagged you who be charged with
|
|
'Grand Theft". If you redo all the #'s right the check will clear!
|
|
|
|
|
|
I also wrote a guide on check fraud the insiders guide but it's in G-file
|
|
mode on THE NEW YORK HACK EXCHANGE BBS so you can look for it there under
|
|
the G-file section of scams.
|
|
|
|
=============================================================================
|
|
|
|
IV. BBS's where you can find Me.
|
|
|
|
|
|
RIPCO (312) 528-5020
|
|
P-80 (304) 744-2253
|
|
The New York Hack Exchange (212) 379-4702
|
|
Unauthorized Access 10pm-7am +44-0636-708063
|
|
|
|
=============================================================================
|