Monday, December 21, 2009
Explaining his modus operandi, police said Kulkarni used to select places where two or more ATM machines are located and wait for gullible people. Once the customer entered the PIN number after swiping the card, he asked him to try on another machine saying the one he/she was using is under repair. Then he checked the balance and then cleared it.
According to the information available with the police so far, Kulkarni has cheated at least six people in Hubli-Dharwad including Shivappa Pattanashetty, a senior citizen, and one in Upparpet, Bangalore. Pattanashetty had lodged a police complaint leading to his arrest.
Kulkarni was arrested on Saturday morning after a security guard at an ATM in Dammanagi Plaza here alerted police after he grew suspicious about Kulkarni's movements.
Saturday, January 17, 2009
I run an online flowers and gifts delivery site www.clickhubli.com since 2001.
I have similar sites like clickhubli.com which deliver flowers and gifts all over
I take orders through payment gateway provided by a company called CCNOW based in
We received 3 orders in the month of August and September 2008.
All the 3 orders were placed by Mr.Reji Abraham ,6439,Market Street, Upper Darby, PA 19082,ph no : 0091 9815851068.
All the 3 orders were placed for delivery to Ms.Komal Goel, HOUSE NO.28/1,U BLOCK,DLF PHASE, GURGAON, HARYANA 122001
We delivered following mobile handsets to her
The details are:
So we did not get any payment for the 3 orders.
After the chargeback also, the same fake orders were coming on the site.
This time we received 2 orders which were for mobile handsets. One of the order had come from the same e-mail ID : firstname.lastname@example.org
So I got a doubt that somebody is placing order from
I traced the i/p address of the computers from where I received the orders and I got confirmation that the orders have come from
Then I gave FIR against the unknown person to Hubli police station.
Hubli-Dharwad police commissioner Mr.Shivakumar did a great help by taking immediate action and sent police to
I had given a empty parcel to the police and told them that they have to go as a courier person.
Meanwhile I called the recipient Sahil Sharma and told that he will receive the mobile today.
I requested him to receive it himself but he refused to do so and sent his friend.
Still police could manage to catch the criminal Sahil Sharma from
The further story is as follows:
Chandigarh, Jan 9 (IANS) A 20-year-old student has been arrested on the charge of using credit cards of other people for online shopping, a police officer said here Friday.
The student of hotel management, Sahil Sharma, is the son of a senior Haryana government official. His mother is a leading architect there.
Sahil was arrested late Thursday evening after a joint operation was launched by the cyber crime investigation cell of
'Sahil Sharma used credit card numbers of people staying in the
He said Sahil ordered three mobile phones worth Rs.150,000 from a Karnataka-based online portal of gift deliveries clickhubli.com.
Sahil, who was in a Gurgaon hotel in August 2008, allegedly wrote in an e-mail that he was Reji Abraham, a resident of the
But when the amount was deducted from the account of real Abraham, he filed a complaint with the company saying that he never placed any order.
Enthused by his success, Sahil again placed orders with the same portal in the name of
He gave the addresses of his college and home for the delivery of ordered mobile phones.
'We sent a decoy courier boy to make a delivery at Sahil's residence in Sector 23 and caught him red-handed while accepting the parcel,' Singh said.
The owner of the portal had approached the Karnataka police Dec 31, which laid the trap jointly with
Sahil worked for an international call centre in 2006 where he used to sell mobile phones to international customers and note their credit card numbers for the company's record.
From there he managed to get these credit card numbers for fraudulent use,
Wednesday, December 26, 2007
It's a new cause of worry for city police and CID. Wire-tapping is a complicated scheme and much more difficult to track down. It's a technical maze that involves telephone wires, receiving-terminals and a cable line parallel with telephone cables to copy the card details when it is swiped for a transaction.
The first time that the city police got an inkling of fake credit card rackets in Kolkata was when three Bangladeshis were arrested for using a card whose owner was in Singapore. Another fake card was seized in Burrabazar which was in use in New Zealand. Police still have no clue to how this card was copied.
Wire-tapping is the most likely method, they now say. Though they have not identified a racket as yet, cyber sleuths are sure the card racketeers are running a hi-tech operation in the city. Their suspicions were strengthened when a private bank recently held a workshop for CID to discuss fraud techniques.
"We haven't got any case where wire-tapping was used to dupe somebody but we are sure the racketeers are out there. We are trying to find the right technique to detect such crimes and also adopting safe-guard measures," said a senior CID officer.
Wiretapping works in three phases. The first phase involves tapping into the wires of the main server to capture card data as it is processed for a legitimate transaction. The next step is to transfer the encoded data to another server, at the fraudster's end, where it is decoded. In the last phase, the data is used to produce counterfeit cards. The technology is definitely more complicated than a skimmer - a gadget which copies the details of a card from a measured distance. In advanced countries, encrypted cables are installed to prevent telephone wire tapping but awareness is low in India.
"The cable linking the electronic data capturing machine (EDC) and the distribution point box is a very sensitive area which is targeted by the racketeers. When the card is swiped on the EDC, the machine records the financial data in the card's magnetic strip and feeds it to the DP box, from where it moves to the main server of the telephone service provider and is finally transferred to the servers of banks where the transaction is recorded. The hackers target the area between the EDC and the DP box, tap into the wires, steal data and send it to another server," said an anti-fraud officer of a private bank.
Police officers say it is difficult to trace such rackets. "For the first phase, the fraudsters need only a map of the telephone wiring, a receiving terminal and cables matching the ones used by the telephone service provider. These are not very difficult to manage and anybody who has a flair for technology can use it to store the data. High-end technology comes in the next level," said an officer.
Police suspect card fraudsters in Kolkata could be using the technology to copy the data and send it to other cities in India and abroad. They have a good reason to suspect this. In the last one year, such units have been busted in Delhi, Jaipur and Hyderabad. "We heard about it and are looking for effective measures to prevent wire-tapping," said Jawed Shamim, deputy commissioner, detective department. Kolkata Police could also take tips from south-east Asian countries like Thailand and Philippines, where such rackets are active and where law enforcement agencies have more experience in handling such crimes.
Friday, November 2, 2007
<>PIN NUMBER REVERSAL (GOOD TO KNOW)>
If you should ever be forced by a robber to withdraw money from an ATM machine, you can notify the police by entering your Pin # in reverse.
For example if your pin number is 1234 then you would put in 4321. The ATM recognizes ><>that your pin number is backwards from the ATM card you placed in the machine.
The machine will still give you the money you requested, but unknown to the robber, the police will be immediately dispatched to help you.
This information was recently broadcasted on TV and it states that it is seldom used because people> don't know it exists.
Sunday, September 23, 2007
The accused are Ayodam, Dr Tony Cheung, Clement Wang, Ella Doris, Dr Young Chu, Tschipanda Mande and Mashun Khamrag. On April 17, 2007, Dr Vadiraja was informed about the prize money by a mail from Ayodam, who claimed to be the vice-president of International Promotions, Japan Jumbo Draw, Hong Kong.
Later, the doctor was told that the lottery money had been transferred to commerce bank of Philippines for onward transfer to his account in Bangalore. He was asked to remit $750 to the bank account of Tschipanda.
The doctor followed their instructions promptly. He grew suspicious when he was again asked to remit $1,650. After enquiry, he realised the lottery was fake.
Sunday, September 16, 2007
One of my colleague who deposited Cash of Rs,15,000/- at UTI ATM , Kalburgi Building, Deshpande Nagar Br. lost Rs. 2500/- as the bank called him and informed him the next day that, the deposit was 12500/- and not Rs.15000/- My colleague who had deposited Rs.500 x 29 and Rs. 100 x 5 Notes, when checked the envelope at the bank, he found Rs.500 x 5 notes short. The bank informed him that they cannot do anything about it.
So guys beware, deposits at ATM's are not safe. Unless they have ATM's with scanners, and I think the govt should not allow cash deposits with non scanner ATM's as the culprit cannot be caught.