Roman Seleznev, a carder and son of the MP, said that he had been working under the protection of the FSB since 2008

Father

Professional
Messages
2,604
Reputation
4
Reaction score
624
Points
113
Recently, the case of Roman Seleznev, a major Russian carder from Vladivostok, known under the pseudonyms nCuX, 2pac, Track2, Bulba, and others, has become widely publicized.

On April 21, 2017, a Seattle court sentenced Roman to 30 years in prison (27 years plus the three years he had already served). In other states, the trial of Roman has not yet begun, where he may face life in prison under the RICO law.

The main points of the case are known to everyone, including from the confession of Roman himself. He has been selling dumps for a very long time, and was involved in the largest hacks of Target, Neiman Marcus, Michaels, Staples, and Home Depot store chains, where Trojans for removing dumps were installed directly on cash registers and PoS terminals. His father is Russian State Duma deputy Valery Seleznev, and Roman himself was badly injured during the terrorist attack in Marrakech in 2011, after which his wife ran away with all the money. The guy was detained in the Maldives, and by the time he was detained, Interpol promptly put him on the wanted list (with a "red notice"). Carder's father then demanded that Russia impose sanctions against the Maldives.

Behind all the tinsel among the hundreds of court documents in the case of Roman Seleznev, there are some details that may seem interesting for a general understanding of the picture of how carding and the entire cybercrime world live in Russia.
Unfortunately, get the full set of documents from the PACER electronic database in the Roman Seleznev case (case 2: 11-cr-00070-RAJ) we haven't been able to do it yet, because it requires more than a thousand dollars at the service's prices. But my colleagues have already pulled the most basic documents from PACER, and my colleague Andrey Sporaw posted them in the public domain and commented on them. Here are some of them::
All files in the archive: seleznev_docs.zip

Of particular interest are some facts mentioned in the memorandum on sentencing. It turns out that the Americans established in 2009 that Roman Seleznev was hiding behind an online character under the nickname nCuX. On May 19, 2009, agents of the US Secret Service and the FBI met with their colleagues from the FSB in Moscow, where they presented "significant evidence" of the suspect's hacking activities, including carding and other crimes. The Americans gave their FSB colleagues the suspect's online nicknames and information about the real identity of Roman Seleznev, a resident of Vladivostok. But the attempt at international cooperation failed. According to the documents, "just a month later, on June 21, 2009, nCuX informed his associates on numerous underground forums that he was going out of business. Shortly after, nCuX completely disappeared from the Internet." After that, he created new online personalities Track2 and Bulba.

One might think that in this case, there is a clear fact of cooperation between the FSB and the criminal world of cybercrime, which experts have long been talking about.

It is quite possible that this is the case. The investigation documents note that information about the actions of US law enforcement agencies "was brought to Seleznev." Apparently, he had his own contacts in the FSB. The materials of the investigation mention an exchange of messages between Roman and his accomplice from 2008, where Roman says that he "received protection through contacts of law enforcement agencies in the department of combating computer crime of the FSB."

8282b65d825a4f098df953bf4a929029.png


In 2010, Roman told another accomplice that the FSB knew his real name and was working with the FBI. American intelligence agencies feared that due to the impossibility of Roman's extradition from Russian territory (this is prohibited by the Constitution of the Russian Federation), this criminal could go unpunished forever, since he enjoys the patronage of law enforcement agencies and the FSB in Russia.

Therefore, a special operation in the Maldives was the only chance. Although Roman constantly checked PACER's American records, followed the investigation against him, and did not travel to countries where there was a risk of being "under the hood". He only flew where the Americans, in his opinion, could not reach him, but here he still miscalculated. The Americans agreed with the law enforcement agencies of the Maldives and issued the detention five minutes before the flight to Moscow, when Roman formally left the border of the Maldives at the airport and gave his passport to an airport employee.

Among the funds confiscated from him are Liberty Reserve coins worth about $17 million. Roman sold dumps mainly for LR. The investigation found that in total he sold dumps for LR in the amount of $17,886,971.09. The investigation failed to establish how much money Seleznev has on the Bitcoin and WebMoney wallets, which he also accepted payments for, due to the anonymity of these systems. It is likely that after his release, Roman will get access to these wallets.

Interestingly, Roman initially refused to cooperate during his incarceration, but then changed his mind and repeatedly offered his services and tried to provide valuable information. He managed to get a meeting where he revealed to the authorities the identities of many participants in carding forums from 2005 to 2014, but the Secret Service refused to cooperate, because most of this information was already known to it. In addition, Roman made some statements that were obviously false, which reduced the value of cooperation to zero.

If you haven't read the comment to the previous article from user SBKarr, then let's repeat once again where did 30 years of charges for Roman Seleznev come from:

For those who are interested in where they are 30 years old from
The gentleman is charged with 40 felony counts, 38 of which are related to hacking. In US law, episodes are grouped, after which they are either summed up or absorbed by the largest in each group. The largest group is considered as a penalty. In addition, there are crimes that are not grouped and are summed up by the end date of the crime.

In the court decision, the episodes are grouped as follows (I will try to translate them in a way that roughly corresponds to our legal terminology:
  • 1-10-Wire Fraud — 336 months
  • 12-19-Intentional Damage to electronic computing devices that perform important operational functions (Intentional Damage to a Protected Computer) in conjunction with
  • 21-29-Illegal access to secret / protected information (Obtaining Information from a Protected Computer — - 60 months
  • 30-38 — Illegal access to devices (Access Device Fraud) — 120 months
As a result, we take the maximum term — 336 months. 24 months are added to them for items 39 and 40 (giving deliberately false testimony). We get 360 months, or 30 years.

Paragraphs 11 and 20 appear to relate to the organization of criminal activity, and the jury decided that they were not proven.

Now about some interesting things.

In addition to this system, the United States has developed a special assessment table that allows you to formalize aggravating parameters, and increase the term in proportion to the severity. For Seleznev, the table takes into account, for example, the following items:
  • Loss in excess of $550 million — total financial losses exceed $ 550 million
    10 or more victims — more than 10 victims
  • Scheme committed from outside of the U.S. — the crime was committed from outside of the United States
  • Organizer / leader — the defendant is the leader of a criminal organization
  • Obstruction of justice — the defendant obstructed the administration of justice
According to this table, the prosecution should have recommended a life sentence, but the use of such "modifiers" is permissible only in certain cases, for example, if the case falls under the RICO Act. And it is quite expensive to prove RICO, and not a fact at all. that Seleznev's organization fits it. Therefore, "modifiers" were not used.

All the more surprising is the fact that these calculations exist in the report, since, according to American laws, they are not relevant to the case and they should have been removed and excluded from the jury's testimony. In my personal opinion, this is evidence of the low qualification of legal assistance provided to a citizen of the Russian Federation, because such calculations clearly incite the jury against the defendant.

In the verdict, you can notice a strange thing, in the description of groups of episodes, it says this:

As to each of counts 1-10 (Wire Fraud), defendant shall serve 336 months to be run concurrently with one another, and also concurrently with all other counts except counts 39 and 40

That is, the punishment for episodes should be served together with other episodes, and together with other groups of episodes. If you think about it, this means that for 1 episode of Wire Froud they give 28 (!) years. This incident is a historical feature of the United States. Fraud involving the use of federal communications (mail, telecom operators) and financial (banks) institutions is a particularly serious crime in the United States.

The proposed prosecution scheme is interesting, according to which the charges against Seleznev were prepared in several states at once, and the episodes were distributed among all of them. At least two states were preparing to press charges under the aforementioned RICO Act, demanding life in prison. The interesting thing is that in any legal country, no one can be tried for the same crime twice, but in the United States, a person can be tried for the same crime several times in different states, if the charges do not completely match the episodes. That is, it is necessary to replace one episode with one for which no charges were brought — and a new trial in another state is ready. There are a lot of episodes in the Seleznev case.
 
Top