I do not know about everyone else, but I would be tempted to remove it from my resume, if it had clearly sank in that for over half a decade I had been duped into setting up a card fraud money laundering business entity for a Russian organized crime syndicate:
Selling web software design products on the business website in the United States. In partnership with a software company.
Ref:»
www.linkedin.com/pub/kim ··· /6a7/6baJust doing a Google search of one's business entity KCSOFTLLC, would return a staggering
over 1,400 hits and none of them are from anyone who actually made a legitimate purchase in the 5 plus years. I will agree that it is extremely difficult to comprehend how an individual could remain duped for such an extended period. If you only Googled the name of your fraudulent business entity just once in half a decade, even out of curiosity, what a story it would tell. While you shuttle and launder the fraud proceeds out of the country blissfully ignorant, companies as far away as France with almost identical names are being hounded by defrauded consumers. In August of 2005, in response to another round of fraud complaints in the security forum Snowy
posted a link about the French company kcsoftwares.com, in the third entry here: »
$9.95 scam, now from kcsoftllc.com who, at that time had posted an alert due to all the complaints that it was mistakingly receiving:
===========================
About Fraudulent purchases
Many persons have contacted us concerning fraudulent purchases charged on their credit cards with a name very similar to our company's name : KCSOFTWARE.COM LLC (from the United States of America).
We are not such company. We are KC Softwares SARL, based in France.
Charged made by our company are explicitly labeled KC Softwares SARL or Yaskifo. If not then we are NOT the company in cause. We have tried to contact KCSOFTWARE.COM LLC, but without any succes
==========================
The flooding of innocent companies with fraud charge complaints, is, and has been, a recurring issue. In that case the letter "s" was the only distinguishing item. I don't know when Ms. Costanza's LinkedIn page went up, but I do not recall seeing it in the latter half of 2009 when I last conducted a detail audit. So is it possible that a new bank and merchant account were set up for a replacement website for
KCSOFTLLC.COM. It is clear to me that there were multiple merchant accounts supporting
KCSOFTLLC.COM in the half decade that it existed. I can tell that based on the way victims reported the fraud charges over the years. The quoted line item charge known as a "billing descriptor" varies over the period. Since that bill descriptor is set by the merchant account provider, the most likely reason it changed over time is because the merchant provider changed. In this organized crime syndicate's operation the only reason for multiple merchant account providers is because the prior one gets canceled to excessive charge backs and fraud complaints. That would put KCSOFTWARE.COM LLC in the "Steve John Rogan" of Arizona category. However, it might be unfair to question the reasoning, logic, and intuitive, skills of Ms. Costanza without also including the similar but professional version of those skills at Authorize.net / Cybersource. After all, they were, and are, the preferred and so far as I can tell the sole provider of every payment gateway access for all of the organized crime syndicate's decade long card fraud and money laundering operation.
In any event, and presuming Ms. Costanza has retired from:
..."Selling web software design products on the business website in the United States. In partnership with a software company". ...., I feel it is appropriate to now crown:
EBSEBOOKS.COM aka
Electronic Business Resources 412-927-0410 as the OCS's reigning longest continuous and still active card fraud laundering operation.
Although the card fraud charging and laundering of
EBSEBOOKS.COM aka
Electronic Business Resources 412-927-0410 is believed to have began long before this first public report in December of 2007:
quote:
Amanda
28 Dec 2007
Found online that the number belongs to ebsebooks.com AKA Electronic Business Resources 412-927-0410
Ref: »
800notes.com/Phone.aspx/ ··· 927-0410The most recent fraud charge report is from a few days ago, March 31st., on whocallsme.com:
quote:
Mike G
31 Mar 2010
I was reviewing my statement and found a 4.95 charge for which I know nothing. It looks as though I am not the only one being fraudly charged by this company
»
whocallsme.com/Phone-Num ··· 270410/4The first report on that forum is in February of 2008. But we know that the Pennsylvanian cyber mule, Terra Milbourne registered the
Electronic Business Resources LLC on February 6th. 2006, which makes it over 4 years old:
»
/r0/do ··· sLLC.pngIt is also possible that there was a previosu website, as
EBSEBOOKS.COM was not registered until May 30th., 2006, then repeatedly renewed, as I am sure it passed all expectations of the organized crime syndicate's longevity:
Registration Service Provided By:
Jaguar Technologies LLC
Contact: sales[@]jaguarpc.com
Domain name: ebsebooks.com
Administrative Contact: ------>FRAUDULENT
-
Richard Stewart (ebsebooks@yahoo.com)
+1.3094077237
Fax: -
910 Freeport Road
Pittsburgh, PA 15238
US
Name Servers:
ns3.jaguarpc.net
ns4.jaguarpc.net
Creation date: 30 May 2006 20:43:47
Expiration date: 30 May 2008 20:43:47
Expiration date: 30 May 2009 20:43:47
Expiration date: 30 May 2010 20:43:47
.
The documented hosting and nameserver activity history shows:
EBSEBOOKS.COM
IP Address History
===================
Event Date Action Pre-Action IP Post-Action IP
======================================================
2006-06-01 New -none- 207.210.81.180
2006-10-14 Change 207.210.81.180 69.73.180.196
2007-04-22 Change 69.73.180.196 69.73.139.29
2007-10-21 Not Resolvable 69.73.139.29 -none-
2008-06-02 Change 69.73.139.29 8.15.231.113
2008-06-04 Change 8.15.231.113 69.73.139.29
Name Server History
===================
Event Date Action Pre-Action Serve Post-Action Server
============================================================
2006-06-01 New -none- Jaguarpc.net
2008-06-02 Transfer Jaguarpc.net Name-services.com
2008-06-04 Transfer Name-services.com Jaguarpc.net
.
The fact that it goes back over 4 years is a reminder of how the Crime Syndicate routinely and repeatedly used jaguarpc.net, for numerous domain registrations and hosting, which is now owned by Landis Holdings Inc, and was once the OCS's preferred provider. In fact a search for "Jaguar" of the entire DSLR records, will produce 3 pages of results all related to this card fraud and money laundering crime syndicate going back to
September of 2005Repeated efforts to track Ms. Milbourne down have failed. The Pittsburgh, PA., website of magicalhandsmassage.com, which once had a listing for a matching name, is now NLA:
quote:
Terra Milbourne received her massage and body work training from the Pittsburgh School of Massage Therapy. While trained in numerous therapies, her area of specialty is Thai Massage, also know as the lazy man's yoga. She comes from a long line of Native American Healers and uses this healing knowledge in massage. Terra is skilled in the use of herbs, essential oils and their healing properties.
Magical Hands Massage · 5817 Forward Ave · 412.422.2284 · M-F 10am - 7pm, Sat 10am - 4pm
Ref: »
magicalhandsmassage.com/ ··· are.htmlOther digging may indicate that Ms. Milbourne, believed to be in her early thirties, could be related to a famous baseball player from the mid 70's to mid 80's, who played with the Astros, and Yankees, possibly a daughter.
Since the fraud charging and money laundering entity:
EBSEBOOKS.COM aka
Electronic Business Resources 412-927-0410 just passed its 4th birthday, and is now in its 5th year of operation, it really needs to be shut down. The financial system security contact responsible for tracking down and terminating the last know accounts of
KCSOFTWARECOM LLC aka
KCSOFTLLC.COM, has know begun the process of trying to travk down the associated fraud accounts for
EBSEBOOKS.COM aka
Electronic Business Resources 412-927-0410. This wizard has developed a sixth sense whereby they can smell the aroma of any of the Organized Crime syndicate's card fraud laundering operations if any related paperwork passes within 250ft of them, regardless of how well disguised it is. However, the task will be significantly easier if a fraud victim can provide the 21 digit ARN (Acquirer Reference Number) of the related fraud charge from
EBSEBOOKS.COM aka
Electronic Business Resources 412-927-0410. Even the 2nd through 7th digits would be of help.
I will return to
EBSEBOOKS.COM aka
Electronic Business Resources 412-927-0410 in the second post from now as they are uniquely linked to the new card fraud laundering operation that this Organized Crime Syndicate has now morphed into. During the second half of 2009, the overall merchant account fraud detection rate at enrollment time peaked at an all time high. The modus operandi became well know within the system and thus the detection at set up time was significant. Since them the OCS has totally changed the way they operate. They had long ago abandoned the factory servers where over a 100 fraud websites were stashed in various stages of construction and operation. The days of shadowing the operation as they shuttled the production between servers in Australia and the US are no more. The multi year configurations of fake Web Templates, E-Books, Mobile Games, etc are fading fast. They have been replaced with an entirely new genre, designed to co-mingle with legitimate startups and be undetected. Single server hosting scattered individually, all around the globe, along with the strategy of reducing the monthly fraud throughput per site by 50% has produced an entirely new operation totally unlike the prior history. Though the output per unit is dropped to avoid detection and complaints the number of performing units has been increased to compensate. We will return to this rebirth facade, and how the 4 plus year
EBSEBOOKS.COM aka
Electronic Business Resources 412-927-0410 fraud operation is directly linked to it.
But next we will head over to the UK and take a peek at a database of the new matching recruiting operation ...
MGD