If the sites are legal dishonesty does not need to be proven. Access fraud, computer fraud, misuse of access, illegal access, and theft of service can apply regardless if the access codes were obtained through malicious intent or through passive means. Don't believe it, look up cable theft prosecutions
Read the law (not even a law, it's a treaty)
http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CM=8&DF=&CL=ENGArticle 2 – Illegal access
Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the access to the whole or any part of a computer system without right. A Party may require that the offence be committed by infringing security measures, with the intent of obtaining computer data or other dishonest intent, or in relation to a computer system that is connected to another computer system.
Article 3 – Illegal interception
Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the interception without right, made by technical means, of non-public transmissions of computer data to, from or within a computer system, including electromagnetic emissions from a computer system carrying such computer data. A Party may require that the offence be committed with dishonest intent, or in relation to a computer system that is connected to another computer system.
I think we're done here until your prove the dishonesty.
I read the treaty (which requires nations that ratified and ascended follow these terms) , clearly you didn't. Article VI requires only one qualification be satisfied under Article II - V. By accessing a system you are connecting one computer system to another (networked activity) which is a defacto qualification. In addition, users are consuming services (resources and transferring data), which is intent to obtain computer data.
You're running around in circles trying to find a "gotcha" stipulation that can allow illegal transactions to take place on this forum. You're not serving the site or yourself by continuing to defend illegal and immoral sales.
Article 2 – Illegal access
Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the access to the whole or any part of a computer system without right. A Party may require that the offence be committed by infringing security measures, with the intent of obtaining computer data or other dishonest intent, or in relation to a computer system that is connected to another computer system.
Article 6 – Misuse of devices1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right:
a
the production, sale, procurement for use, import, distribution or otherwise making available of:i a device, including a computer program, designed or adapted primarily for the purpose of committing any of the offences established in accordance with Articles 2 through 5;
ii a computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed,
with intent that it be used for the purpose of committing any of the offences established in Articles 2 through 5; and
b the possession of an item referred to in paragraphs a.i or ii above, with intent that it be used for the purpose of committing
any of the offences established in Articles 2 through 5. A Party may require by law that a number of such items be possessed before criminal liability attaches.
2 This article shall not be interpreted as imposing criminal liability where the production, sale, procurement for use, import, distribution or otherwise making available or possession referred to in paragraph 1 of this article is not for the purpose of committing an offence established in accordance with Articles 2 through 5 of this Convention, such as for the authorised testing or protection of a computer system.
3 Each Party may reserve the right not to apply paragraph 1 of this article,
provided that the reservation does not concern the sale, distribution or otherwise making available of the items referred to in paragraph 1 a.ii of this article.