You are on page 1of 10

CASE INVESTIGATION REPORT

POLICE
DEPARTMENT
Complainant : Diana Senner
Address : 3146 County Road 16 SE
Rochester, Minnesota, 55904,
United States
Date : 11-03-2023

PREPARED BY:
Claim Justice
Cybercrime & Crypto Investigation Dept.

US: +1 888-316-1175 IL: +972 3-763-0987


CA: +1 855-951-2884 AU: +61 2-5601-9018
UK: +44 808-258-0027 SW: +46 20 12 76 40

Carlebach 7, Tel Aviv-Yafo, Israel


www.claim-justice.com
URGENT REQUEST
These wallet addresses in the below-named exchanges have been identified as
being part of a fraud against myself, therefore I urgently request that you
identify the criminal/s that the listed addresses belong to. These cyber-criminals
completed the required KYC process when onboarding the platform where they
ultimately hid my stolen cryptocurrency.

We urgently require that you request from the below listed exchanges to
immediately freeze the funds in these accounts by warrant or subpoena. The
source of these funds is connected to this fraud case as shown above making
this an attempt to money launder the stolen funds or in the worst-case scenario
to assist terrorism.

We also expect that you identify and freeze any other account belonging to
these criminals until your investigation proves that the stolen funds should be
returned to me

2
CASE SUMMARY
My name is Diana Senner. I fell victim to a scam company Able Cargo
Company. I came into contact with the representative of The Company not
yet knowing how it would turnout for me. First of all, I need to explain how
this tragedy happened to me for your understanding. I met a guy (allegedly
Jeff), who asked me to help him with his restaurant, sending him 2000
dollars. He told me that he had invested this money and I would get a total
profit of 17600 dollars. He connected me with his broker, Lisa. I should have
my money in a package, but before that I had to pay 1840 dollars for the
delivery of "my package". Then Losa told me that I needed to pay an
additional $400 and she sent me another bitcoin address. My package went to
Able Cargo (Bruce) in California. Every time I paid, she would say it was so
they (able cargo) could send it. She kept telling them (Able Cargo) not to
send my package every time I paid something. By 7/15, I started to ask for
my money back and she said I would never get it unless I paid the whole
amount. By 7/20, she started to threaten me if I didn't keep sending my
money to her. The last 504 I sent her, I checked where i got cash. I was told it
was at Planet Fitness Place. 8/16 She said I couldn't be arrested or sued if I
didn't pay the rest. Bruce (Able Cargo) got his first email 7/15. He demanded
$1,520. I sent 400 in gift cards and he said he couldn't use them. His friend
told me a friend would give me money for the cards. He cashed them later
and said he didn't cash them. 7/16 He told me he would send back my money,
but Lisa told him no. Lisa told me if I sent that last $500 she would let them
send it. She never did it. I kept asking for my money back from both places.
She keeps saying no refunds. So "Jeff" invested my money, sent it to "Lisa"
to give to me, and the money ended up in California, where I paid all of it to
Bruce (Able Cargo). "Lisa" told me she needed more money before I could
get it. I asked for my money back and she said "no" and "no" refunds.

Event timeline
DESCRIPTION DATE
First date of Transaction 06/29/2022
Last date of Transaction 07/20/2022
Client onboard with Claim Justice 08/17/2022

3
OBJECTIVES

 Identification, tracking and recovery of stolen digital assets conspired and

unlawfully acquired by cybercriminals.

INCIDENT INFORMATION
Name Able Cargo Company
Exchange used BTC ATM
Website
Cryptocurrency BTC
Lost cryptocurrency Approx. BTC 0.0602281
Lost amount (USD) $ 1400.00

METHODOLOGIES USED
TRACKING STOLEN CRYPTO CURRENCY AND IDENTIFYING CYBER
CRIMINALS

Our crypto-forensic investigations tracing solution is also used by law

enforcement to investigate suspects of cyber-crime in the crypto economy and

track stolen funds.

4
We track specific crypto addresses, transactions, and entities, and investigate

links to real-world bad actors.

Claim Justice’s crypto forensics investigators are savvy at scrupulously tracing

and mapping activity on blockchains and figuring out.

In some cases, we use de-anonymization tools to identify and trace criminals.

who attempt to use these stolen cryptocurrencies —the leading cryptocurrencies

including ER20s.

5
In this way, we were able to tracked and traced funds being transferred to other

exchanges and wallets.

6
OPEN-SOURCE INTELLIGENCE (If
applicable)
In efforts to address crypto currency crime, we examine the intersection of illicit

crypto activity and online publicly available information. By deploying open-

source intelligence to collect and analyze data across the broadest data set

possible, we developed a complete picture of crypto currency crime, threat

actors and their networks.

Open-source intelligence is uniquely placed to support crypto investigations,

providing valuable insights into hidden sources of data, situational awareness

and anticipatory intelligence and can be deployed to automatically filter and

analyze masses of data to uncover:

 Mentions of public crypto keys

 Threat actors including either organized criminal groups or extremist

groups

 Transitions from online platform to platform and crypto exchange to

crypto exchange

Claim Justice leverages AI-enabled risk analytics alongside advanced data

collection capabilities to help intelligence teams rapidly identify the most

relevant data and uncover valuable insights.

7
 Email Address/Business Email :
 Phone Number/Virtual phone number :
 Website/Link/URL :
 Crypto addresses :
 IP Address :
 Any Social Media platform profile :
 Deep web/dark web URL :
 Company/Organization :

8
FINDINGS
LIST OF EXCHANGES WHERE SUSPECTED CRIMINAL HID THE STOLLEN
FUNDS
Below are the list of addresses traced and tracked to be storing my stolen funds
in specific exchange which is also provided herein:

BINANCE

Client Funds Transaction ID Scammer Wallet(s) Transaction ID Wallet


054b1ed8eeb961b6365adea01 bc1qn8u8q48z6gur3 14df6af68bfeb7e1d609df7313 16NSA9s2e8fbh
167792ac766dbf95104787ca1 x34cvu0p2r2xphgsh c0ac6152fd7d4054dded5add9 aNieL4vm4szStk
72a1b480b74916 vfgpgwmm e94312db66346 Dd3ExpD
BTC ATM 6.29.22 6.30.22 Binance
35Esa4qmQq2hfU 0.01781201 BTC 0.8725 BTC
3DCAH4Qxo1FrC
pL1RaKp
36fNQT4GwKeN 6366966381d6266bdf75d678f bc1qn8u8q48z6gur3 5d45782fed3ee0469ce224839 16NSA9s2e8fbh
NGsJa9aE9BEn3g 620953b634eaa36b6f00fed8e8 x34cvu0p2r2xphgsh d092d8cc02698817117b6dab aNieL4vm4szStk
NeXyQ84g 2725ef5d98189 vfgpgwmm 6f643f044493f69 Dd3ExpD
7.13.22 7.14.22 Binance
0.02729694 BTC 1.2472 BTC

9
DOCUMENTATION
I have attached the necessary documentation that shows the path used by the
scammer/s as proof of the fraud perpetrated that caused the loss of my funds.

Addendum:
● Graphic mapping of the path used by the criminal that tried to hide the
stolen crypto currency.
● Clickable list of all the addresses and Hash transactions used by the
criminal.

SINCERELY,

Name : Diana Senner


EMAIL : dianasenner321@gmail.com

10

You might also like