{"id":543,"date":"2024-06-28T16:35:51","date_gmt":"2024-06-28T16:35:51","guid":{"rendered":"https:\/\/www.spokeo.com\/pathfinder\/?p=543"},"modified":"2024-06-28T16:35:52","modified_gmt":"2024-06-28T16:35:52","slug":"using-socmint-in-card-cracking-investigations","status":"publish","type":"post","link":"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/","title":{"rendered":"How Leveraging SOCMINT Can Uncover \u201cCard Cracking\u201d Scammers"},"content":{"rendered":"\n<p>Social media platforms, for good or ill, have become the world\u2019s \u201ctown square.\u201d It\u2019s here that ordinary people meet and interact, gossip, and learn the news.\u00a0 Social media is where legitimate companies come to target those consumers, and it is also very much the place where scammers and criminals target do the same.\u00a0<\/p>\n\n\n\n<p>Card cracking is one of the many scams that flourish on social media.\u00a0 Like a handful of others, it seeks not just to dupe a consumer, but also to frequently co-opt the victim as an accomplice and active collaborator.\u00a0 Uncovering the real-world individuals behind these scams can be challenging, but their reliance on social media to find victims can be a crucial vulnerability when investigators have access to social media intelligence (SOCMINT) tools. \u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Anatomy of the Card Cracking Scam<\/h3>\n\n\n\n<p>Card cracking is part of the larger family of \u201ceasy money\u201d scams, in which the victim is offered an opportunity to earn either a one-time reward or an ongoing income in return for their cooperation.\u00a0 Although there are numerous variations on the theme, the scam <a href=\"https:\/\/www.aba.com\/advocacy\/community-programs\/consumer-resources\/protect-your-money\/how-avoid-card-cracking\">typically follows these steps<\/a>:<\/p>\n\n\n\n<ul>\n<li>Victims are targeted with a social media message, offering them the opportunity to earn money by assisting the message\u2019s purported sender.\u00a0<\/li>\n\n\n\n<li>Anyone responding to the message will be asked to provide access to their banking information, which the other party will use to make deposits (the pretext for this varies, but will be vaguely plausible).\u00a0<\/li>\n\n\n\n<li>If the victim complies, the scammer deposits bogus checks into their account, and then immediately withdraws funds to the limit set by that specific bank or financial institution.<\/li>\n\n\n\n<li>The checks later bounce, leaving the victim responsible for the amounts that have been withdrawn.\u00a0 In some cases, scammers exploit their access to drain those accounts entirely.<\/li>\n<\/ul>\n\n\n\n<p>Scammers target a range of victims with these messages but usually seek out those in financial distress or those who are more easily duped by reason of their youth and inexperience, <a href=\"https:\/\/www.justice.gov\/usao-ri\/pr\/seven-indicted-card-cracking-scheme\">including students<\/a> and early-career <a href=\"https:\/\/www.justice.gov\/usao-ndil\/pr\/six-defendants-charged-card-cracking-scheme-targeted-us-military-members\">serving members of the military<\/a>.\u00a0<\/p>\n\n\n\n<p>The victim in some variations of this scam is encouraged to file a fraud complaint with the financial institution, claiming that their banking information was stolen and that the transaction was conducted without their consent, often securing reimbursement from the bank.\u00a0 At this point, the victim becomes an active accomplice by deliberately defrauding or attempting to defraud their financial institution.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"678\" src=\"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/immo-wegmann-DX3_dXuHVl8-unsplash-1024x678.jpg\" alt=\"unmasking victims and perpetrators of Card Cracking scams with SOCMINT\" class=\"wp-image-547\" srcset=\"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/immo-wegmann-DX3_dXuHVl8-unsplash-1024x678.jpg 1024w, https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/immo-wegmann-DX3_dXuHVl8-unsplash-300x199.jpg 300w, https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/immo-wegmann-DX3_dXuHVl8-unsplash-768x509.jpg 768w, https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/immo-wegmann-DX3_dXuHVl8-unsplash-1536x1018.jpg 1536w, https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/immo-wegmann-DX3_dXuHVl8-unsplash-1170x775.jpg 1170w, https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/immo-wegmann-DX3_dXuHVl8-unsplash-780x516.jpg 780w, https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/immo-wegmann-DX3_dXuHVl8-unsplash-585x388.jpg 585w, https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/immo-wegmann-DX3_dXuHVl8-unsplash-263x175.jpg 263w, https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/immo-wegmann-DX3_dXuHVl8-unsplash.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">The Easy Target and the Hard Target<\/h3>\n\n\n\n<p>The scam presents two targets for law enforcement agencies.\u00a0 The first is the scammer\u2019s victim or dupe, who may be swayed to cross the line and deliberately participate in the fraud.\u00a0 The second is the actual scammers who initiated the transaction.<\/p>\n\n\n\n<p>Gullibility is no defense before the law, and those who knowingly commit fraud or assist in the commission of fraud can be, and often are, prosecuted for their role.\u00a0 That is not necessarily a satisfactory result, from the law enforcement perspective.\u00a0 Finding and prosecuting the scammer or scammers is the more desirable outcome, but they represent a significantly more difficult target.\u00a0\u00a0<\/p>\n\n\n\n<p>While their use of social media as a contact method necessarily creates an online footprint, <a href=\"https:\/\/www.spokeo.com\/pathfinder\/advanced-people-search-for-law-enforcement\/\">connecting a given social media profile<\/a> to a specific individual is not straightforward.\u00a0 Many social media platforms do not require their users to display a real name, offering anonymous or pseudonymous use even when the user\u2019s genuine identity is required.\u00a0 Even on those platforms where identities are verified, the verification procedures are often weak and easily circumvented through the use of false identification or a completely synthetic identity.\u00a0 To trace those anonymous or pseudonymous accounts to their point of origin, investigators require the use of a specialized SOCMINT tool. \u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Approaching Card Cracking Cases Through the SOCMINT Lens<\/h3>\n\n\n\n<p>Card cracking is not a novel scam, going back several years, but it has become more significant since the start of this decade.\u00a0 The trends behind its rise are beyond the scope of this discussion, but the popularity of money-making \u201cside hustles,\u201d the pandemic\u2019s disruptions, and recent years\u2019 rise in the cost of living are potential contributing factors.\u00a0<\/p>\n\n\n\n<p>LEAs may become involved if the victim files a police complaint, or if a bank does so after detecting activity that suggests a card cracking scam.\u00a0 In the first instance, police can assume the active participation of the victim, but will still face the challenge of identifying the scammer or scammers.\u00a0 In the second scenario, the victim is also a potential perpetrator whose cooperation cannot be assumed, which represents a further complication.\u00a0<\/p>\n\n\n\n<p>Because social media provides both the initial point of contact between scammer and victim and the medium of communication between them, it is crucial that investigators be able to a) connect the victim\/accomplice accurately to their social media accounts; and b) trace the scammers\u2019 social media accounts back to real-world individuals who may then be identified and ultimately prosecuted.\u00a0 A <a href=\"https:\/\/www.spokeo.com\/pathfinder\/osint-tools-and-law-enforcement-an-introductory-guide\/\">SOCMINT tool<\/a> that can consistently make accurate connections between individuals and their social media presence is fundamental to this kind of investigation.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/mediamodifier-yx17UuZw1Ck-unsplash-1024x683.jpg\" alt=\"investigating card cracking using SOCMINT data\" class=\"wp-image-550\" srcset=\"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/mediamodifier-yx17UuZw1Ck-unsplash-1024x683.jpg 1024w, https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/mediamodifier-yx17UuZw1Ck-unsplash-300x200.jpg 300w, https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/mediamodifier-yx17UuZw1Ck-unsplash-768x512.jpg 768w, https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/mediamodifier-yx17UuZw1Ck-unsplash-1536x1024.jpg 1536w, https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/mediamodifier-yx17UuZw1Ck-unsplash-1170x780.jpg 1170w, https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/mediamodifier-yx17UuZw1Ck-unsplash-585x390.jpg 585w, https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/mediamodifier-yx17UuZw1Ck-unsplash-263x175.jpg 263w, https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/mediamodifier-yx17UuZw1Ck-unsplash.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Spokeo for Business As an Investigative Tool<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.spokeo.com\/pathfinder\/osint-tools-and-law-enforcement-an-introductory-guide\/\">Spokeo for Business<\/a> is just such a tool.\u00a0 Spokeo launched in 2006 as a social media aggregator, and although it has since become a significant player in open-source intelligence generally it remains a leader specifically in SOCMINT data-gathering and analysis.\u00a0<\/p>\n\n\n\n<p>Spokeo\u2019s powerful search engine can be applied to both of the foregoing use cases.\u00a0 In the case of an uncooperative and potentially complicit victim, searches using the victim\u2019s name, address, phone number, or email (available through conventional investigative channels, or from the bank\u2019s records when applicable) will return results that may include numerous social media accounts belonging to the putative victim, as well as previously unknown secondary phone numbers or email addresses which may in turn be linked to further social media accounts.\u00a0 These may then be scoured by investigators seeking connections to the scammer originating the scheme.<\/p>\n\n\n\n<p>In the case of a cooperative victim investigators will typically be provided with the scammer\u2019s social media persona, and potentially a direct telephone number or email address.\u00a0 All of these, including anonymous usernames, can be searched using Spokeo for Business.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Exposing Failures of OPSEC<\/h3>\n\n\n\n<p>Scammers use a number of methods to obscure their real identities, from fake signups to \u201cburner\u201d phones to fully synthetic identities.\u00a0 None of these are completely foolproof, and any lapses of operational security on the scammers\u2019 part can undo their attempts at anonymity.\u00a0 Spokeo for Business\u2019s search sifts through billions of individual records drawn from thousands of open and private sources, and can make connections that would be difficult or impossible through other means.\u00a0<\/p>\n\n\n\n<p>If a scammer has made any mistakes while setting up and operating the scam, there is a possibility of Spokeo for Business finding links back from the \u201canonymous\u201d social media account or phone number to their point of origin with the scammer.\u00a0 Failing a direct identification, searches will often provide avenues for further investigation.<\/p>\n\n\n\n<p>Some potential outcomes include:<\/p>\n\n\n\n<ul>\n<li>The social media persona being linked by Spokeo\u2019s search results to the phone used to open the account.\u00a0 Search results will include a geographic region in which the phone is registered, and its carrier, which can potentially be used to secure a subpoena or search warrant as the investigation progresses.\u00a0<\/li>\n\n\n\n<li>The target social media account may be connected to others opened using the same phone or email account, some of which may still be active.\u00a0 The target account\u2019s friends list will often be populated with other scam accounts, which in turn can be traced back to their originating phone number.<\/li>\n\n\n\n<li>Investigators may be able to identify potential victims still interacting with one or more of these accounts and request their assistance in helping elicit potentially identifiable disclosures from the scammer.\u00a0 At a minimum, this prevents the successful commission of another fraud.\u00a0<\/li>\n\n\n\n<li>Scammers setting up several accounts across multiple platforms may inadvertently use a personal phone or email on one of them, allowing those other accounts and phone numbers to be traced back to them personally.\u00a0<\/li>\n\n\n\n<li>Scammers maintaining multiple personae across platforms must communicate with a number of potential victims while \u201cin character\u201d as the given persona.\u00a0 Laziness or mental error may cause them to reveal genuine personal details, which investigators can then search for across platforms.\u00a0 It may prove possible to connect the fake profiles to a real one, or failing that the combination of personal details and location data culled from the telephone numbers may combine to suggest a person of interest.\u00a0<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">SOCMINT and Law Enforcement<\/h3>\n\n\n\n<p>Social media is unlikely to be supplanted at any time in the near future, and while it retains its dominance it will continue to provide unique investigative opportunities to law enforcement agencies.\u00a0 This includes card cracking cases, missing persons, intelligence-gathering, and many other forms of investigation which are difficult to bring to a successful conclusion through other avenues.<\/p>\n\n\n\n<p>For further information on the use of Spokeo for Business as a SOCMINT tool in law enforcement, or to arrange a demonstration of the product or a free trial for your agency, reach out to our team through the contact information on our <a href=\"https:\/\/www.spokeo.com\/business\/law-enforcement\">Law Enforcement page<\/a>.\u00a0<\/p>\n\n\n\n<p><em>Disclaimer: This blog post is not intended as legal advice.\u00a0 Consult your legal and\/or compliance department before making any changes to your operations.<\/em><\/p>\n\n\n\n<p>Sources<\/p>\n\n\n\n<p>American Bankers Association: <a href=\"https:\/\/www.aba.com\/advocacy\/community-programs\/consumer-resources\/protect-your-money\/how-avoid-card-cracking\">\u201cCard Cracking\u201d Schemes<\/a><\/p>\n\n\n\n<p>US Attorney\u2019s Office, District of Rhode Island: <a href=\"https:\/\/www.justice.gov\/usao-ri\/pr\/seven-indicted-card-cracking-scheme\">Seven Indicted in \u201cCard Cracking\u201d Scheme<\/a><\/p>\n\n\n\n<p>US Attorney\u2019s Office, Northern District of Illinois: <a href=\"https:\/\/www.justice.gov\/usao-ndil\/pr\/six-defendants-charged-card-cracking-scheme-targeted-us-military-members\">Six Defendants Charged in \u201cCard Cracking\u201d Scheme Targeting Military Members<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Criminals make heavy use of social media to push \u201ccard cracking\u201d scams.  Learn how SOCMINT tools like Spokeo\u2019s can help LEAs push back.  <\/p>\n","protected":false},"author":3,"featured_media":555,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cracking \u201cCard Cracking\u201d Scams Through Social Media Intelligence | Spokeo - Pathfinder | People Intelligence For Professionals<\/title>\n<meta name=\"description\" content=\"Criminals make heavy use of social media to push \u201ccard cracking\u201d scams. Learn how SOCMINT tools like Spokeo\u2019s can help LEAs push back.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cracking \u201cCard Cracking\u201d Scams Through Social Media Intelligence | Spokeo - Pathfinder | People Intelligence For Professionals\" \/>\n<meta property=\"og:description\" content=\"Criminals make heavy use of social media to push \u201ccard cracking\u201d scams. Learn how SOCMINT tools like Spokeo\u2019s can help LEAs push back.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/\" \/>\n<meta property=\"og:site_name\" content=\"Pathfinder | People Intelligence For Professionals\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-28T16:35:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-28T16:35:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/rc-xyz-nft-gallery-RcvQHQB9zgA-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Spokeo for Business\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Spokeo for Business\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/\"},\"author\":{\"name\":\"Spokeo for Business\",\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/#\/schema\/person\/d62b6044cea479d8f3eab7dec2121891\"},\"headline\":\"How Leveraging SOCMINT Can Uncover \u201cCard Cracking\u201d Scammers\",\"datePublished\":\"2024-06-28T16:35:51+00:00\",\"dateModified\":\"2024-06-28T16:35:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/\"},\"wordCount\":1590,\"publisher\":{\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/rc-xyz-nft-gallery-RcvQHQB9zgA-unsplash.jpg\",\"articleSection\":[\"Law Enforcement\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/\",\"url\":\"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/\",\"name\":\"Cracking \u201cCard Cracking\u201d Scams Through Social Media Intelligence | Spokeo - Pathfinder | People Intelligence For Professionals\",\"isPartOf\":{\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/rc-xyz-nft-gallery-RcvQHQB9zgA-unsplash.jpg\",\"datePublished\":\"2024-06-28T16:35:51+00:00\",\"dateModified\":\"2024-06-28T16:35:52+00:00\",\"description\":\"Criminals make heavy use of social media to push \u201ccard cracking\u201d scams. Learn how SOCMINT tools like Spokeo\u2019s can help LEAs push back.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/#primaryimage\",\"url\":\"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/rc-xyz-nft-gallery-RcvQHQB9zgA-unsplash.jpg\",\"contentUrl\":\"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/rc-xyz-nft-gallery-RcvQHQB9zgA-unsplash.jpg\",\"width\":1920,\"height\":1440,\"caption\":\"understanding the card cracking scam\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.spokeo.com\/pathfinder\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Leveraging SOCMINT Can Uncover \u201cCard Cracking\u201d Scammers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/#website\",\"url\":\"https:\/\/www.spokeo.com\/pathfinder\/\",\"name\":\"Pathfinder | People Intelligence For Professionals\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.spokeo.com\/pathfinder\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/#organization\",\"name\":\"Spokeo\",\"url\":\"https:\/\/www.spokeo.com\/pathfinder\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2023\/12\/cropped-favicon.png\",\"contentUrl\":\"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2023\/12\/cropped-favicon.png\",\"width\":228,\"height\":228,\"caption\":\"Spokeo\"},\"image\":{\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/spokeo\/life\/1e9aa786-8e89-4f75-8609-8fccdd6628b7\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/#\/schema\/person\/d62b6044cea479d8f3eab7dec2121891\",\"name\":\"Spokeo for Business\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/pathfinder\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2023\/12\/cropped-favicon-96x96.png\",\"contentUrl\":\"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2023\/12\/cropped-favicon-96x96.png\",\"caption\":\"Spokeo for Business\"},\"url\":\"https:\/\/www.spokeo.com\/pathfinder\/author\/spokeo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cracking \u201cCard Cracking\u201d Scams Through Social Media Intelligence | Spokeo - Pathfinder | People Intelligence For Professionals","description":"Criminals make heavy use of social media to push \u201ccard cracking\u201d scams. Learn how SOCMINT tools like Spokeo\u2019s can help LEAs push back.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/","og_locale":"en_US","og_type":"article","og_title":"Cracking \u201cCard Cracking\u201d Scams Through Social Media Intelligence | Spokeo - Pathfinder | People Intelligence For Professionals","og_description":"Criminals make heavy use of social media to push \u201ccard cracking\u201d scams. Learn how SOCMINT tools like Spokeo\u2019s can help LEAs push back.","og_url":"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/","og_site_name":"Pathfinder | People Intelligence For Professionals","article_published_time":"2024-06-28T16:35:51+00:00","article_modified_time":"2024-06-28T16:35:52+00:00","og_image":[{"width":1920,"height":1440,"url":"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/rc-xyz-nft-gallery-RcvQHQB9zgA-unsplash.jpg","type":"image\/jpeg"}],"author":"Spokeo for Business","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Spokeo for Business","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/#article","isPartOf":{"@id":"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/"},"author":{"name":"Spokeo for Business","@id":"https:\/\/www.spokeo.com\/pathfinder\/#\/schema\/person\/d62b6044cea479d8f3eab7dec2121891"},"headline":"How Leveraging SOCMINT Can Uncover \u201cCard Cracking\u201d Scammers","datePublished":"2024-06-28T16:35:51+00:00","dateModified":"2024-06-28T16:35:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/"},"wordCount":1590,"publisher":{"@id":"https:\/\/www.spokeo.com\/pathfinder\/#organization"},"image":{"@id":"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/rc-xyz-nft-gallery-RcvQHQB9zgA-unsplash.jpg","articleSection":["Law Enforcement"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/","url":"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/","name":"Cracking \u201cCard Cracking\u201d Scams Through Social Media Intelligence | Spokeo - Pathfinder | People Intelligence For Professionals","isPartOf":{"@id":"https:\/\/www.spokeo.com\/pathfinder\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/#primaryimage"},"image":{"@id":"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/rc-xyz-nft-gallery-RcvQHQB9zgA-unsplash.jpg","datePublished":"2024-06-28T16:35:51+00:00","dateModified":"2024-06-28T16:35:52+00:00","description":"Criminals make heavy use of social media to push \u201ccard cracking\u201d scams. Learn how SOCMINT tools like Spokeo\u2019s can help LEAs push back.","breadcrumb":{"@id":"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/#primaryimage","url":"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/rc-xyz-nft-gallery-RcvQHQB9zgA-unsplash.jpg","contentUrl":"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2024\/06\/rc-xyz-nft-gallery-RcvQHQB9zgA-unsplash.jpg","width":1920,"height":1440,"caption":"understanding the card cracking scam"},{"@type":"BreadcrumbList","@id":"https:\/\/www.spokeo.com\/pathfinder\/using-socmint-in-card-cracking-investigations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.spokeo.com\/pathfinder\/"},{"@type":"ListItem","position":2,"name":"How Leveraging SOCMINT Can Uncover \u201cCard Cracking\u201d Scammers"}]},{"@type":"WebSite","@id":"https:\/\/www.spokeo.com\/pathfinder\/#website","url":"https:\/\/www.spokeo.com\/pathfinder\/","name":"Pathfinder | People Intelligence For Professionals","description":"","publisher":{"@id":"https:\/\/www.spokeo.com\/pathfinder\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spokeo.com\/pathfinder\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spokeo.com\/pathfinder\/#organization","name":"Spokeo","url":"https:\/\/www.spokeo.com\/pathfinder\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/pathfinder\/#\/schema\/logo\/image\/","url":"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2023\/12\/cropped-favicon.png","contentUrl":"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2023\/12\/cropped-favicon.png","width":228,"height":228,"caption":"Spokeo"},"image":{"@id":"https:\/\/www.spokeo.com\/pathfinder\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/spokeo\/life\/1e9aa786-8e89-4f75-8609-8fccdd6628b7\/"]},{"@type":"Person","@id":"https:\/\/www.spokeo.com\/pathfinder\/#\/schema\/person\/d62b6044cea479d8f3eab7dec2121891","name":"Spokeo for Business","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/pathfinder\/#\/schema\/person\/image\/","url":"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2023\/12\/cropped-favicon-96x96.png","contentUrl":"https:\/\/www.spokeo.com\/pathfinder\/wp-content\/uploads\/2023\/12\/cropped-favicon-96x96.png","caption":"Spokeo for Business"},"url":"https:\/\/www.spokeo.com\/pathfinder\/author\/spokeo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.spokeo.com\/pathfinder\/wp-json\/wp\/v2\/posts\/543"}],"collection":[{"href":"https:\/\/www.spokeo.com\/pathfinder\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spokeo.com\/pathfinder\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/pathfinder\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/pathfinder\/wp-json\/wp\/v2\/comments?post=543"}],"version-history":[{"count":10,"href":"https:\/\/www.spokeo.com\/pathfinder\/wp-json\/wp\/v2\/posts\/543\/revisions"}],"predecessor-version":[{"id":556,"href":"https:\/\/www.spokeo.com\/pathfinder\/wp-json\/wp\/v2\/posts\/543\/revisions\/556"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/pathfinder\/wp-json\/wp\/v2\/media\/555"}],"wp:attachment":[{"href":"https:\/\/www.spokeo.com\/pathfinder\/wp-json\/wp\/v2\/media?parent=543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spokeo.com\/pathfinder\/wp-json\/wp\/v2\/categories?post=543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spokeo.com\/pathfinder\/wp-json\/wp\/v2\/tags?post=543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}