Perfect Digital Cri...
 
Notifications
Clear all

Perfect Digital Crime

36 Posts
8 Users
0 Likes
1,801 Views
RolfGutmann
(@rolfgutmann)
Posts: 1185
Noble Member
Topic starter
 

As a training excercise I got a task to solve A suspect planning to commit crime builds in advance a perfect and hardened alibi based on all aspects of live. He does

#1 Doppelganger engagement
#2 Perfect digital selflogging for selfdefense
#3 Perfect Pre- and PostCrime Alibi 12 months each
#4 Perfect Normality Interspersal (Looks Like Normal LLN)

The question is how as LEO to find an Indicator of Illusion IoI? Where, how and why such IoIs are unavoidable? In short the Perfect Digital Crime PDC.

Two things to consider The suspect plays fully in public and social live with all aspects, no hidding but actively building an illusion.

Where are the areas the plan cannot work or will for sure fail?

DFA! You can talk to me.

 
Posted : 28/03/2018 5:48 pm
(@trewmte)
Posts: 1877
Noble Member
 

As a training excercise I got a task to solve A suspect planning to commit crime builds in advance a perfect and hardened alibi based on all aspects of live. He does

#1 Doppelganger engagement
#2 Perfect digital selflogging for selfdefense
#3 Perfect Pre- and PostCrime Alibi 12 months each
#4 Perfect Normality Interspersal (Looks Like Normal LLN)

The question is how as LEO to find an Indicator of Illusion IoI? Where, how and why such IoIs are unavoidable? In short the Perfect Digital Crime PDC.

Two things to consider The suspect plays fully in public and social live with all aspects, no hidding but actively building an illusion.

Where are the areas the plan cannot work or will for sure fail?

DFA! You can talk to me.

As per your statement above… you have just admitted to your attempt (inchoate) to commit a perfect digital crime by identifying steps to making innocent-looking (outward appearance) activity to hide a crime thus revealing your mens rea (mindset) and actus reus (physical activity). Thank you for that and the UK National Crime Agency (NCA) will be in-touch you shortly.

 
Posted : 28/03/2018 6:54 pm
jaclaz
(@jaclaz)
Posts: 5133
Illustrious Member
 

#3 Perfect Pre- and PostCrime Alibi 12 months each

You seemingly forgot DCA (During Crime Alibi).

IoI (Indicator of Illusion) should be written as IOI as in most non-serif fonts IoI can easily be confused with lol (laughing out loud), particularly in sentences like

Where, how and why such IoIs are unavoidable?

Here lols are unavoidable
https://www.reddit.com/r/Jokes/comments/87s376/man_sues_quantas_for_misplaced_luggage/

SYLA/SYSC

jaclaz

 
Posted : 28/03/2018 7:48 pm
RolfGutmann
(@rolfgutmann)
Posts: 1185
Noble Member
Topic starter
 

Biometrics fooling is not so easy and starts with false intial biometrics authentication. So any registration process in the society will fail I first thought. But how about twins, they have good chance to fool such a process. Twins are kind of comparable to genuine and doppelganger but has to be registered as twins before. The subject is all about CCI Criminal Composability Imagination first but practical barriers in real world.

Would e.g. a public surveillance cam really find-out the twins difference? If no database entry resolving exist not possible just storing. New Facial Personality Analysis (faception IL) would bring-out both twins suspect or none of both.

Voice is another layer which fails between genuine and doppelganger, as no relation between DNA face characteristics and voice band.

I first was wondering about the LLN aspect. How is normal defined, based on which indicators normal is defined in a range? More stupid can be an IoI and less stupid can hint to preparation.

Further more a very consistent communications scheme must be in-use. Otherwise the two human comparison fails. Normally human fails in one way or another. Preparation is one thing but humans react differently in certain situations (Unknowns).

It would be interesting to first list all authentication processes during a year and after compare which are difficult to bypass.

But a PDC is for sure possible, as I hold otherwise a Perfect Crime for not possible. The element of digital as a technical layer should be possible to harden.

 
Posted : 28/03/2018 9:53 pm
RolfGutmann
(@rolfgutmann)
Posts: 1185
Noble Member
Topic starter
 

By taking an ordinary day lets assume that S takes a public transport for going to work. Instead of him goes the Double D and needs a valid ticket, e.g. mobile digital ticket. Payment based on an Mobile Payment App like Apple Pay requests FaceID by an iPhone X the related credit card would be validated by Passport or ID at the application process. Would the background check work if both S and D have almost similar address credentials (ordinary spell check failure)?

The first question How do credit card companies separate twins and indicate them in their systems?
Could be a form of discimination to flag them internally and if they would know they could go against it.

Today is a climate of all is allowed and diversity is a wish. Lets assume they solved the first discrimination. After the way would be free for them to continue.

As I said before the trend of non-binary persons will open the anti-discrimination domain. Is digital ordinary existing (no hidding) in the anti-discrimination domain the area to search for IoIs?

One could say S&D are open eye hidding, nobody realizes a IoI, but I should.

Is shadow hidding and distraction with LLN a digital domain to search for new IoIs?

 
Posted : 29/03/2018 4:32 am
jaclaz
(@jaclaz)
Posts: 5133
Illustrious Member
 

The first question How do credit card companies separate twins and indicate them in their systems?

They mark them as PET (Possible Evil Twin) setting the appropriate flag as PET1, PET2, etc., of course, but anyway credit card companies are not particularly interested in the identification of the one that presents the credit card to the cashier (or ATM, or payment system) as long as the card is valid, and there is credit, and no report of the card as lost or stolen exists, what they are after is more about card twins (that they call "clones") that about their bearers.

jaclaz

 
Posted : 29/03/2018 7:44 am
RolfGutmann
(@rolfgutmann)
Posts: 1185
Noble Member
Topic starter
 

So the PET1 and PET2 are flagged in the EMV and SWIFT systems. Would actual selfie pay of MasterCard fail by PETS attempts? Obivously any authentication process will compare actual with DB reference.

The Initial Criminal False-in ICF is crucial. All starts if the inital validation process will be consistent.

Are there based Criminal Composability Imagination CCI undiscovered technigques to establish ICF? Normally over time we discover year-over-year that suspects find new ways in the area of ICF. Simply as they think day-and-night around this single problem and cross-think all possibilities. I call this the Prisoners Genius Approach PGA.

Does LEO think all the time in the area of ICF based on the PGA? No, simply because no free brain-time. But prisoners have exactly this ressource. They have one huge problem and its worth to solve it.

My post about the lack of CCI within LEO had no response. For the goal of our job in LEOs we have to FOCUS on ICFs.

My boss said No more hunting, we have to build traps. Evidence Proof Traps EPTs.
Actually we run in-lab several new tiny EPTs to change the game. We want to be

Ahead Of Crime AOC.

For this I want to think about Indicators of Illusion IoIs.

 
Posted : 29/03/2018 11:40 pm
jaclaz
(@jaclaz)
Posts: 5133
Illustrious Member
 

So the PET1 and PET2 are flagged in the EMV and SWIFT systems.

Yes, but it is only a "datapoint", not actually used in normal operation, as said this only applies to actual debit and credit cards, actual rectangles of plastic with a number, a CCV, a magnetic stripe (and lately) contactless chips which are normally used without any PIC (Proper Identity Check), and in the case of online transactions, without even the card, as just the numbers are enough.

The ICCPCS (International Credit Concurrency Payments Checking System) uses geolocation (of the actual terminal, be it a POS or an ATM, synchronized on UTF) and time-distance analysis to DDB (Detect Deter and Block) what appear to be TNIT (Too Near In Time) transactions coming from distantly located terminals.

The historical example (an iconical ad in the late '80's or early '90's by AMEX) was about the impossibility to take US$200 at an ATM in Joliet, IL and 15 minutes later pay with the same card in a shop in Peoria, IL (hence the slang phrase "Will it pay in Peoria?" once often jokingly asked when buying counterfeit/stolen cards in the USA), which is of course an ETS.

For online transactions, it is not officially (I mean public) reported whether there is a difference in the algorithms between residential, i.e. IPBG (Internet Protocol Based Geolocation) which is notoriously flawed and mobile (3G, 4G, etc.) geolocation (which is evidently more accurate) and what happens in "mixed mode" AFAIK.

jaclaz

 
Posted : 30/03/2018 8:47 am
(@athulin)
Posts: 1156
Noble Member
 

As a training excercise I got a task to solve

That's not a good place to start. It's *your* training.

I'll help you. You're not asking a forensic question. OK?

You're asking something that is much closer to an intelligence problem. You're asking a question that counterespionage agencies spend a lot of time on. As well as auditors.

Perhaps you need to read some spy stories? Or a handbook of chartered accountancy?

As for spy stories, I recommend Scott W. Carmichael's book about Ana Montes. It's not a novel, it's more of real life.

I'll even suggest Peter Wright's book Spycatcher can be useful, but that's mostly because of the kind of mirror-world paranoia that it describes in the part that describes the hunt for an mole inside MI5.

 
Posted : 30/03/2018 4:01 pm
RolfGutmann
(@rolfgutmann)
Posts: 1185
Noble Member
Topic starter
 

All good points. My task is targeted to find the 'forensic questions'. All reading is about 'what is already' but I have to search for the 'will be'. Nobody knows isnt true.

The concrete forensic questions could e.g. be a payment authentication with mastercard id check (blinking selfie pay). Do I get out with Cellebrite UFED if two iPhones by Airdrop can one run the id check and the other replay the validation clip highly timely synchronized to the session timeframe when the app says 'blink now'? Humans all ages have reading-understanding-reaction delays and this timeframe isnt zero, which opens a chance to break.

How do I evidence tight proof that this was in use? May its a forensic question others like counterintel also have.

I still think about forensic evidence of Initial Crime False-in ICF a puzzle part of PDC and PreCop simulation.

 
Posted : 31/03/2018 4:05 am
Page 1 / 4
Share: