> When the transaction goes through, it’s recorded as card-not-present purchase.
> As a result of this emerging trend, instead of finding a large number of re-encoded credit cards during a search, a subject may only possess stickers or cards with barcodes that contain stolen card data,” the alert continues. “Additionally, the barcodes could be stored on the subject’s cell phone. If barcodes are discovered in the field, it could be beneficial to utilize a barcode scanning app to check the barcode for credit card data."
So, it sounds like the advantage is in doing something novel to avoid detection and hide proof better.
> When the transaction goes through, it’s recorded as card-not-present purchase.
> As a result of this emerging trend, instead of finding a large number of re-encoded credit cards during a search, a subject may only possess stickers or cards with barcodes that contain stolen card data,” the alert continues. “Additionally, the barcodes could be stored on the subject’s cell phone. If barcodes are discovered in the field, it could be beneficial to utilize a barcode scanning app to check the barcode for credit card data."
So, it sounds like the advantage is in doing something novel to avoid detection and hide proof better.