Top Banner
1 Yevgen Bershadsky #100629876 Konstantin Semerdji #100611781 April 07,2010
16
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Crime

1

Yevgen Bershadsky #100629876

Konstantin Semerdji #100611781

April 07,2010

Page 2: Cyber Crime

Introduction

History

How it Works

How to Protect Your Self

Police Prevention

Conclusion

2

Page 3: Cyber Crime

Debit and Credit card fraud has become an international, underground multimillion dollar business and has become the main source of financial income for many organized crime groups around the world.

AND ITS COMING TO AN ATM NEAR YOU!

3

Page 4: Cyber Crime

First bank issued credit card (1946)(1)

First debit cards started appearing around 1980’s in America (2)

Fraud Has been an issue ever since criminals realized it is easier and safer to counterfeit information then to rob people.

4

Page 5: Cyber Crime

Credit card fraud is fairly simple

Hackers gain information

Simple reading devices at gas stations, restaurants can be used.

Later copied on to blank cards and used

Blank cards can easily be modified, skimmers can easily change the name, number, picture to any they choose, using special printers

Online purchases are also very common

5

Page 6: Cyber Crime

Credit Card numbers are gained by spam, computer hacking. Or using mini readers to steal information.

(3)(4)

6

Page 7: Cyber Crime

Trickier then Credit Card Fraud because the pin code is required

Debit Cards are more preferred because it is very easy to take out cash from accounts

Also very easy to make purchases because of low suspicion

Devices have to manufactured. Card over lays are usually created using CNC machines, and Pin Hole cameras are custom made to match the bank machine

7

Page 8: Cyber Crime

The top Picture shows a card slot over lay, which is used to record card information

Bottom picture shows a person installing a pinhole camera used to capture the pin number (5)

8

Page 9: Cyber Crime

Pin pad (6)

9

Page 10: Cyber Crime

Reading Devices installed in to terminals

Very hard to spot

Hard to Triangulate location of breach

10

Page 11: Cyber Crime

Bank Hired Investigators Banks put in new bank machines Card Chips (already obsolete) Triangulation of point of breach Increased bank security (8)(9)(10)

11

Page 12: Cyber Crime

Surprising Fact

All of these devices can be very easily purchased of the internet on websites such as

http://www.softkeysolution.com/index.html

Any training and information needed can be very easily discussed and taught on underground forums such as cardingworld.cc

12

Page 14: Cyber Crime

Always cover your pin

Be careful who you give your card to

Be aware of people around you while at ATM

Be picky about the sites you use

Check your accounts often

(7)

14

Page 15: Cyber Crime

Debit Card and Credit Card Fraud is easily accessible to anyone

Very profitable

Popular with the new generation of organized crime

Very low punishment

15

Page 16: Cyber Crime

http://inventors.about.com/od/cstartinventions/a/credit_cards.htm (1)

http://www.economywatch.com/debit-card/history.html (2) http://www.syns0r.com/site/Cameras_and_Camcorders/Memo

ry_Cards/Sima_Card_Reader/magnetic_stripe_readers.html (3) http://chattahbox.com/images/2009/08/hacker.jpg (4) http://www.theukcardsassociation.org.uk/files/ukca/media/pi

nhole_camera.jpg (5)http://interiorsavingsnewsletter.com/sept2008/images/ProtectYour

Pin.jpg (7) Cardingworld.cc http://madukes.files.wordpress.com/2009/03/2005-techart-911-

carrera-police-car-porsche-sa-1280x960.jpg (10) http://www.fahad.com/pics/incard_otp_credit_card.jpg (9) http://comsecllc.files.wordpress.com/2009/11/iphone_gps_usin

g_cell_tower_triangulation.jpg (8)

16