Arrested

Barrett Brown

Biography: 

Barrett Brown is a 31 year old computer hacker living in Dallas, Texas. He claims to be the leader of Anonymous even though the group boasts itself on having no leader. He is known for wanting to hack the Zeta's which is a deadly drug cartel in Mexico. He was arrested on September 12, 2012 at his home due to him threatening the FBI agent Robert Smith during a Tinychat session.

Pictures: 
References

404myth

IRL Name: 
Christian Cangeopol
Biography: 

is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he engaged in illegal instoring at Walmart to obtain Apple electronic devices with stolen credit cards. Instoring is a term used by carders to refer to using stolen credit card accounts to make in-store, as opposed to online, purchases of items using stolen credit card information and matching fake identifications. As part of the alleged scheme, Cangeopol and a co-conspirator used stolen credit card data to order electronic devices on Walmart’s website; in selecting a delivery option, they opted to have items delivered to various Walmart stores in Georgia; Cangeopol then picked up the items using a fake identification; Cangeopol and the co-conspirator then resold the carded electronics and split the proceeds."

References

iwearaMAGNUM

IRL Name: 
Peter Ketchum
Biography: 

Peter Ketchum a.k.a iwearaMAGNUM is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he and Sean Harper a.k.a Kabraxis314, each sold drop services to other carders in return for money or carded merchandise."

References

Kabraxis314

IRL Name: 
Sean Harper
Biography: 

Sean Harper is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he and Peter Ketchum a.k.a iwearaMAGNUM, each sold drop services to other carders in return for money or carded merchandise."

References

iAlert, Jason Kato

IRL Name: 
Lee Jason Jeusheng
Biography: 

Lee Jason Jeusheng is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he and Joshua Hicks a.k.a OxideDox each sold dumps which is a term used by carders to refer to stolen credit card data in a form in which the data is stored on the magnetic strips on the backs of credit cards."

References

OxideDox

IRL Name: 
Joshua Hicks
Biography: 

OxideDox is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he and and Lee Jason Jeusheng a.k.a 'iAlert' / 'Jason Kato', each sold dumps which is a term used by carders to refer to stolen credit card data in a form in which the data is stored on the magnetic strips on the backs of credit cards".

References

Badoo

IRL Name: 
Ali Hassan
Biography: 

Ali Hassan a.k.a Badoo is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he also sold fulls, a term used by carders to refer to full credit card data including cardholder name, address, Social Security number, birthdate, mother’s maiden name, and bank account information."

References

kool+kake

IRL Name: 
Alex Hatala
Biography: 

kool+kake is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he and Steven Hansen a.k.a theboner1, sold stolen C-V-V's, a term used by carders to refer to credit card data that includes the name, address, and zip code of the card holder, along with the card number, expiration date, and security code printed on the card."

References

JoshTheGod

IRL Name: 
Mir Islam
Biography: 

JoshTheGod is a member of the group “UGNazi,” which has claimed credit for numerous recent online hacks and that he is the founder of “Carders.Org,” a carding forum on the Internet. He was arrested together with Cosmo and other carders in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he trafficked in stolen credit card information and possessed information for more than 50,000 credit cards. Islam was placed under arrest after he attempted to withdraw illicit proceeds from an ATM using one of the cards."

Pictures: 
References

xVisceral

IRL Name: 
Michael Hogue
Biography: 

xVisceral is one of the guys who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he offered malware for sale, including remote access tools (RATs) that allowed the user to take over and remotely control the operations of an infected victim-computer. Hogue’s RAT, for example, enabled the user to turn on the web camera on victims’ computers to spy on them and to record every keystroke of the victim-computer’s user. If the victim visited a banking website and entered his or her user name and password, the key logging program could record that information, which could then be used to access the victim’s bank account. "

References
Syndicate content