Allied Capital Trade Newsletter No. 127
Poštovani klijenti,
Dok čekamo nove informacije u predmetu Allied Capital Trade, želimo da sa vama podelimo jednu važnu temu koja često ostaje nevidljiva, a u praksi je ključna za međunarodne finansijske istrage: način na koji lažne kripto-platforme brišu digitalne tragove i kako se ti podaci ipak mogu povratiti.
Na prvi pogled deluje kao da prevaranti nestaju bez traga. Platforma se ugasi, nalozi se izbrišu, a žrtvama ostaju samo screenshotovi i sećanja. Međutim, tragovi i dalje postoje — samo su vešto sakriveni.
Lažni prikaz stanja: brojke koje nikada nisu postojale
Većina žrtava veruje da su na platformi zaista imali određeno stanje, bilo u kriptu, profitima ili investicionim paketima. U stvarnosti, te brojke nikada nisu postojale.
Lažne platforme funkcionišu tako što:
- generišu iznose koji nisu povezani ni sa jednom realnom transakcijom,
- prikazuju „dobitke“ koji su samo vizuelna simulacija,
- ne vode nikakvu stvarnu knjigu poslovanja,
- čuvaju sve podatke interno, bez veze sa blokčejnom ili bankarskim sistemom.
Drugim rečima, korisnik zapravo gleda računarsku predstavu, a ne investiciju.
Brisanje tragova: kako prevaranti pokušavaju da nestanu
Kada platforma nestane, počinje proces „čišćenja“. Najčešće se koriste tri metode:
- Brisanje servera i baza podataka
Prevaranti uklanjaju naloge, istoriju aktivnosti i interne beleške. Ali kompletno brisanje gotovo nikada nije moguće — serveri ostavljaju sigurnosne kopije i logove.
- Korišćenje hostinga u stranim državama
Serveri se nalaze u jurisdikcijama koje štite privatnost. Ipak, uz međunarodnu saradnju, delovi podataka se i dalje mogu pribaviti.
- VPN, sakrivanje IP adresa i privid anonimnosti
Čak i kada koriste VPN, mrežni tragovi postoje. Tehnički otisci konekcija ostaju u sistemima provajdera.
Kako se digitalni tragovi mogu povratiti?
Iako prevaranti pokušavaju da obrišu sve, podaci mogu biti rekonstruisani iz više izvora.
- Forenzika servera
Kada se pribave podaci hostinga, analiziraju se:
- logovi,
- sigurnosne kopije,
- keš memorija,
- obrisani, ali obnovljivi fajlovi.
Često se dođe do važnih tragova i nakon dužeg vremena.
- Praćenje novca preko blokčejna
Čak i ako platforma nije bila stvarna berza, uplata žrtve ostavlja trag:
- identifikuju se kripto-novčanici,
- prate se tokovi novca,
- povezuju se transakcije između različitih adresa.
Najvažnije: blokčejn ne zaboravlja.
- Analiza komunikacionih obrazaca
VPN konekcije, bot-poruke i automatizovani pozivi imaju prepoznatljive šablone.
Ti obrasci često povezuju više prevara sa istom mrežom ljudi.
Zašto je sve ovo važno za žrtve?
Zato što odgovara na najčešće pitanje:
„Ako je platforma ugašena i sve je obrisano, da li postoji ikakva šansa za rekonstrukciju podataka?“
Odgovor glasi — da, postoji.
Digitalni tragovi su poput otisaka prstiju: možete ih pokušati obrisati, razmazati ili sakriti, ali retko kada nestanu potpuno. Zato međunarodne istrage traju dugo, ali i imaju šansu da dođu do rezultata.
Srdačan pozdrav,
Advokat Zoran Miljaković
Dear Clients,
While we await new information in the Allied Capital Trade case, we would like to share an important topic that often remains unseen but plays a crucial role in international financial investigations: how fake crypto platforms erase digital traces — and how that data can still be recovered.
At first glance, it may appear that scammers vanish without leaving anything behind. The platform disappears, accounts are deleted, and victims are left only with screenshots and memories. However, digital traces still exist — they are simply well-hidden.
Fake account balances: numbers that never existed
Most victims believe they had a real balance on the platform — whether in crypto, profits, or investment packages. In truth, those numbers never existed.
Fraudulent platforms operate by:
- generating amounts that are not connected to any real transaction,
- simulating “profits” through visual animations,
- keeping all data internally without linking it to any blockchain or banking system,
- avoiding any real bookkeeping.
In other words, victims are shown a computer-generated illusion, not an actual investment.
Erasing the evidence: how scammers try to disappear
Once the platform shuts down, the “cleanup” begins. The most common techniques include:
- Deleting servers and databases
Scammers remove accounts, activity logs, and internal records. But complete deletion is rare — servers retain backups, system logs, and cached data.
- Using foreign hosting providers
Servers are often placed in jurisdictions that protect data privacy. Still, through international cooperation, parts of that data can often be obtained.
- VPNs and hiding IP addresses
Even with VPNs, network fingerprints remain. Connection routes leave technical traces that can be analyzed later.
How digital traces can be recovered
Even when scammers attempt to erase everything, much of the data can still be reconstructed.
- Server forensics
Once investigators gain access to hosting data, they review:
- security logs,
- backups,
- cached elements,
- deleted but recoverable files.
Valuable information can often be retrieved even months later.
- Blockchain tracing
Even if the platform was not a real exchange, the victim’s crypto transfer leaves a trail:
- wallet addresses can be identified,
- fund flows can be tracked,
- connected transactions can be mapped.
Most importantly: the blockchain does not forget.
- Analysis of communication patterns
VPN-based logins, bot messages, automated calls — all of these have identifiable patterns.
These patterns often link several scams to the same organized network.
Why this matters for victims
Because it answers the most common question:
“If the platform is gone and everything is deleted, is there any chance the data can be reconstructed?”
The answer is — yes.
Digital traces are like fingerprints: scammers can smear them, hide them, and try to erase them, but they rarely disappear completely. This is why international investigations take time — but also why they have a realistic chance of uncovering the truth.
Kind regards,
Attorney Zoran Miljaković