Money-Laundering in Paradise

Sir

BANNED
Messages
42
Reaction score
13
Points
8
If you were a criminal looking to hide money-laundering operations, anonymously rent swaths of Web infrastructure for Internet badness, or create a financial base to threaten national security, where would you look? Panama? Liechtenstein? Offshore islands?

Try a leisurely two-hour drive from the White House and the Capitol, in the great state of Delaware.

Delaware holds the No. 1 spot in the recent Financial Secrecy Index (FSI) rankings of secretive jurisdictions compiled by the internationally respected Tax Justice Network, an independent organization promoting justice in tax issues. This undesirable accolade for Delaware was earned for its policies permitting cheap and easy company formation and the hiding of details about corporate ownership, all of which adds up to non-disclosure of the most important corporate information.

Several other U.S. states -- Nevada, Oregon, and Wyoming -- have also received international criticism for lax company registration laws, but it is only inDelaware that an applicant can delay providing company member names, and if timed right, for as long as a year before the state steps in, allowing plenty of time for deals to be completed and illicit funds laundered out of the U.S. Once a company has served its purpose in this way, it can simply shut up shop, and little can be done to trace the perpetrators, invariably resulting in the frustration of international law enforcement.

This short-term corporate environment is perfect for organized cybercrime operations. We only have to look at the examples of the RBN, McColo, and other cybercriminals that were able to mislead reporters, researchers, and investigators for considerable time by hiding behind what are essentially “Mickey Mouse”corporate shields in Delaware.

As Spamhaus points out in its recent analysis of “snowshoe spam,” mass spamming is usually enabled by an endless array of anonymousDelaware and Wyoming shell companies operating from UPS mailboxes and purchasing lots of IP space.

The variety of illicit uses for loopholes such as these, which allow the formation of shell companies, has been regularly commented upon and documented for many years. TheFinancial Crimes Enforcement Network issued a report, "The Role of Domestic Shell Companies in Financial Crime and Money Laundering: Limited Liability Companies,” in November 2006, naming Delaware as at risk.

Other coverage of gaps in state company regulations and abuse by criminals -- and not just foreign criminals, it has to be said -- has been extensive. News network Al Jazeera printed an article on this subject back in June 2009, indicating that most foreign banks see the U.S. as the worst offender in terms of offering tax safe havens, ironically when the U.S. is trying to crack down on such activity.

More recent articles have shed light on the dangerous relationship between Delaware shell companies and national security. One article last fall linked shell firms created with Delaware corporate registrations to the Iranian military. And The New York Times has reported on the association of Delaware shells with arms trafficking.

According to the Tax Justice Network, there are more than 4 million corporations in Delaware, or five per Delaware resident, with Al Jazeera quoting a figure of 6,500 registered companies on one street alone. It’s anyone’s guess how that number may have increased since some of these articles were printed. But the situation is serious: Just a simple Web transaction can provide criminals the access to international banking facilities and trading anywhere in the world.

Legislation in the form of the “Incorporation Transparency And Law Enforcement Assistance Act” is still waiting to go before the Senate. It will require each beneficial owner of a corporation, as well as any other legal entity involved with the organization, to be identified by name and address.

The presence of this bill is due, in part, to the continuing pressure exerted by international organizations, such as the Tax Justice Network and theFinancial Action Task Force (FATF), and to attorneys like Fred Abrams, who aids prosecutors and law enforcement in other countries with cases againstDelaware registered companies. In one particular Polish example, prosecutors are chasing funds suspected of being used for trade-based money laundering in clear violation of Poland’s, and international, anti-money-laundering laws.

Perhaps it is time for the U.S. to set the moral example and clean up corporate registration. After all, this is one major example of why countries like China and others do not regard U.S. protestations on cybersecurity and transparency very seriously. Surely, the Senate in a bipartisan effort should make this bill an urgent priority. More than eight years have passed since 9/11.


Source
 
Very nice, I can recommend a law firm that can be used online to do just that,if anyone is interested.
 

Money laundering​


Part 1: Security and anonymity
For anonymity in QIWI, we will use the old and correct link:
VPN ->Dedic -> FireFox+FoxyProxy ->Wallet either OS Kodachi- > VPN -> Torify -> DNSCrypt -> FireFox+FoxyProxy
A Dedic is a dedicated server, i.e. a remote computer. It is more practical and cheaper to take a rolled one, its price will be from $ 1 to $ 5. The country is not important, the most important thing is to have either Win7 or Win10 installed.

You can buy it here (not advertising):
https://rdpdedic.ru/
https://dedicrdp.ru/

2) The Next step is to buy a VPN, both the banal Nord VPN and Windscribe will do, accounts for 2 years sell for $ 1.

After the purchase, download Nord and log in to the purchased account.
4b52069611e33b4306e55.jpg

Connect to any of the marked items. After that, we go to Dedic and clean the logs. You can easily find out how to do this in Google or YouTube.
As an example:
After that, we do all actions only through it. Download the FireFox browser and create Gmail-mail, it is on it that we will send all accounts.

3) Proxy. All payment systems are banned black IP addresses, so we will need good clean proxies.
You can buy it here (not advertising):
https://proxyline.net

We buy individual Russian IPv4 proxies. After the purchase, download the extension for FireFox - FoxyProxy.
Next, go to your Personal Account on Proxy Line and get the proxy data:

Setting Up FoxyProxy. Go to the extension itself and add new proxies:
6dedfa7dabef4399ade72.jpg

Then turn them on.
46d12fac0c1094d11516c.jpg

To check the functionality, go to the site https://2ip.ru
0ce259543a7bb11776ee7.jpg

Writes that we are from Moscow, so everything is normal and you can proceed to purchase or register Qiwi / Yad.

Part 2: Registration/Buying wallets
There are two ways to get a wallet for yourself: buy it or create your own via the SMS receiver.

1. Create a wallet via SMS registration.
Go to https://5sim.net, create an account on the left mail and top up the balance with the required amount. Next in the list, we look for Qiwi for $ 0.1 and buy it.
22bfe742c64b9198e44b7.jpg


Getting a window with a number? to which we connect our QIWI.

We get a TEXT message with the login code, but DON't CLICK "finish"!

Next, go to settings and uncheck the boxes as shown in the screenshots.

After removing each check mark, you will receive SMS messages, enter all these codes.

9b4a45545fb4e59b3a7f0.jpg

And only now we complete the order for 5sim. After that, we raise the status to the main one through purchased clean scans (you can buy them on shadow forums, but work only through the guarantor!) and create a virtual Qiwi card.

Now our Qiwi Is ready! Let's look at a simpler way.

2. Purchase a Qiwi / Payment system wallet. On any forum, there are many vehicles that sell ready-made wallets. You can also find a lot of bots that provide this service.

We buy qiwi for $ 1, enter the number, password, and email address, and then go to the ready-made wallet.

THE MOST IMPORTANT THING IS NOT TO FORGET TO LOG IN TO QIWI OR YD WITH PROXIES ENABLED, SO AS NOT TO GET BANNED!

Payment system purchases are made in the same way, via a bot.

Part 3: ways to launder and cash out
For security reasons, I advise you to use this chain:
OS Kodachi->VPN->Torify->DNSCrypt->TorBrowser
We will use one of three schemes for cleaning the system, depending on the level of danger of your work:

1. Semi-Gray and not very dangerous work:
Left Qiwi-> Bitcoin wallet in telegram bot->>Our Bitcoin wallet -> > > Exchanger->>> > Our Qiwi or card.

2. Gray and blackish work:
Left Qiwi - > Bitcoin wallet in telegram bot -> Bitcoin mixer -> Our Bitcoin wallet -> Exchanger -> Our Qiwi or card.

3. Black money:
Left Qiwi - > Bitcoin wallet in telegram bot -> Bitcoin mixer -> Left Bitcoin wallet -> Bitcoin mixer -> Left Bitcoin wallet -> Purchase of treasure troves with money for Bit on a three-head account, or wagering via a casino.
Algorithm of actions.

Now let's look at all the steps in our transaction chain. On the left Qiwi, I advise you not to keep more than 10-15K. As soon as this amount is accumulated, we start laundering. We only work via proxy, VPN, and Dedic.

1. Bitcoin wallet in the telegram bot.
Telegram has a bot-exchanger that provides a wallet and exchange without confirming your data.

Go to the bot and create a Bitcoin wallet.

Next, we change our money from the left Qiwi to Bitcoin.

2. Bitcoin mixers mixers:
We go to one of the mixers and send it to a fake email address.

3. Your Bitcoin wallet.
As the main wallet, I recommend using localbitcoins.net, because it is very convenient and does not require personal data.
f8e7b3d0e90b7832f695b.jpg

After the mixer, we get the cue balls to the localbitcon wallet an exchange site.

Now your funds are in bucks, white and clean.
 
Top