CYBERCRIME: DEBIT/CREDIT FRAUD 1 Yevgen Bershadsky #100629876 Konstantin Semerdji #100611781 April 07,2010
1
CYBERCRIME:DEBIT/CREDIT FRAUD
Yevgen Bershadsky #100629876Konstantin Semerdji #100611781
April 07,2010
2
Table Of Contends
Introduction History How it Works How to Protect Your Self Police Prevention Conclusion
3
Introduction
Debit and Credit card fraud has become an international, underground multimillion dollar business and has become the main source of financial income for many organized crime groups around the world.
AND ITS COMING TO AN ATM NEAR YOU!
4
History
First bank issued credit card (1946)(1) First debit cards started appearing
around 1980’s in America (2) Fraud Has been an issue ever since
criminals realized it is easier and safer to counterfeit information then to rob people.
5
How it Works: Credit Card Fraud
Credit card fraud is fairly simple Hackers gain information Simple reading devices at gas stations,
restaurants can be used. Later copied on to blank cards and used Blank cards can easily be modified,
skimmers can easily change the name, number, picture to any they choose, using special printers
Online purchases are also very common
6
How it works: Credit Card Fraud
Credit Card numbers are gained by spam, computer hacking. Or using mini readers to steal information.
(3)(4)
7
How it works: Debit Card Fraud
Trickier then Credit Card Fraud because the pin code is required
Debit Cards are more preferred because it is very easy to take out cash from accounts
Also very easy to make purchases because of low suspicion
Devices have to manufactured. Card over lays are usually created using CNC machines, and Pin Hole cameras are custom made to match the bank machine
8
How it Works: Debit Fraud
The top Picture shows a card slot over lay, which is used to record card information
Bottom picture shows a person installing a pinhole camera used to capture the pin number (5)
9
How it Works: Debit Fraud
Pin pad (6)
10
How it Works: Point of Sale Debit/Credit Fraud
Reading Devices installed in to terminals
Very hard to spot
Hard to Triangulate location of breach
11
Police Prevention
Bank Hired Investigators Banks put in new bank machines Card Chips (already obsolete) Triangulation of point of breach Increased bank security (8)(9)(10)
12
How it Works: Debit/Credit FraudAccessibility
Surprising Fact All of these devices can be very easily
purchased of the internet on websites such as
http://www.softkeysolution.com/index.html Any training and information needed can
be very easily discussed and taught on underground forums such as cardingworld.cc
13
How it works Video Demonstration
YouTube Video
http://www.youtube.com/watch?v=_m4jYdu-IJo&feature=PlayList&p=C5A665D5D09BB43F&playnext_from=PL&playnext
14
How To Protect Your Self
Always cover your pin Be careful who you give your
card to Be aware of people around you
while at ATM Be picky about the sites you use Check your accounts often (7)
15
Conclusion
Debit Card and Credit Card Fraud is easily accessible to anyone
Very profitable Popular with the new generation of
organized crime Very low punishment
16
Reference http://inventors.about.com/od/cstartinventions/a/credit_cards.htm (1) http://www.economywatch.com/debit-card/history.html (2) http://www.syns0r.com/site/Cameras_and_Camcorders/Memory_Cards/
Sima_Card_Reader/magnetic_stripe_readers.html (3)
http://chattahbox.com/images/2009/08/hacker.jpg (4) http://www.theukcardsassociation.org.uk/files/ukca/media/pinhole_ca
mera.jpg (5)
http://interiorsavingsnewsletter.com/sept2008/images/ProtectYourPin.jpg (7)
Cardingworld.cc http://
madukes.files.wordpress.com/2009/03/2005-techart-911-carrera-police-car-porsche-sa-1280x960.jpg (10)
http://www.fahad.com/pics/incard_otp_credit_card.jpg (9) http://
comsecllc.files.wordpress.com/2009/11/iphone_gps_using_cell_tower_triangulation.jpg (8)