Feeds

Feds cuff man in ATM skimming case

'You won't know what to do with the money'

Build a business case: developing custom apps

Federal authorities have arrested a Serbian national living in Chicago and charged him with attempting to buy an ATM skimming device.

Louis Sokolovic, also known as Ljubisa Sokolovic, was taken into custody late last week after being charged with one count of attempting to obtain device-making equipment with intent to defraud, according to documents filed in US District court in Chicago. They allege that beginning in July of 2008, Sokolovic began shopping for a device with the help of someone who turned out to be a confidential witness for the FBI.

“You won't know what to do with the money, don't you worry,” Sokolovic told the unnamed snitch during a meeting on July 3, according to the complaint. “If you get this realized, I'll work for a month and a half and stop. In a month and a half I guarantee you half a million and up.”

Sokolovic allegedly spent the next six weeks trying to get his hands on a digital video recorder and video camera suitable for capturing the personal identification numbers of targeted payment cards. Although the pair discussed stealing the devices, the 59-year-old Serbian national eventually decided it would be easier to buy one off the internet.

“Motherf----r, we have to pay a thief to steal it, but he can fail .... everything can happen,” he told the witness. “Motherf----r, I would rather buy it! Tell me what I need to buy. If it is on the internet, I will buy it.”

He eventually acquired a PV-500 DVR and an “ultra mini camera” for about $585 but grew increasingly impatient with the amount of time it was taking to get the scheme off the ground.

“This is going to take two years . . . . I cannot work on this for 100 years,” he complained. “This is f---ing me up.”

During the course of the investigation, Sokolovic repeatedly said the device would be used to capture account information such as PINs from unsuspecting ATM customers, which he then planned to use to steal funds from victim accounts, prosecutors alleged. Sokolovic faces a possible sentence of 10 years in prison. He has not yet entered a plea. ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?