Cyber Crime


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cyber Crime

  1. 1. Cybercrime:Debit/Credit Fraud<br />1<br />YevgenBershadsky #100629876<br /> Konstantin Semerdji#100611781 <br />April 07,2010<br />
  2. 2. Table Of Contends<br />Introduction<br />History<br />How it Works<br />How to Protect Your Self <br />Police Prevention<br />Conclusion<br />2<br />
  3. 3. Introduction<br /> Debit and Credit card fraud has become an international, underground multimillion dollar business and has become the main source of financial income for many organized crime groups around the world. <br /> AND ITS COMING TO AN ATM NEAR YOU!<br />3<br />
  4. 4. History<br />First bank issued credit card (1946)(1)<br />First debit cards started appearing around 1980’s in America (2)<br />Fraud Has been an issue ever since criminals realized it is easier and safer to counterfeit information then to rob people. <br />4<br />
  5. 5. How it Works: Credit Card Fraud<br />Credit card fraud is fairly simple<br />Hackers gain information<br />Simple reading devices at gas stations, restaurants can be used. <br />Later copied on to blank cards and used<br />Blank cards can easily be modified, skimmers can easily change the name, number, picture to any they choose, using special printers<br />Online purchases are also very common<br />5<br />
  6. 6. How it works: Credit Card Fraud<br />Credit Card numbers are gained by spam, computer hacking. Or using mini readers to steal information. <br />(3)(4)<br />6<br />
  7. 7. How it works: Debit Card Fraud<br />Trickier then Credit Card Fraud because the pin code is required<br />Debit Cards are more preferred because it is very easy to take out cash from accounts<br />Also very easy to make purchases because of low suspicion<br />Devices have to manufactured. Card over lays are usually created using CNC machines, and Pin Hole cameras are custom made to match the bank machine<br />7<br />
  8. 8. How it Works: Debit Fraud<br />The top Picture shows a card slot over lay, which is used to record card information<br />Bottom picture shows a person installing a pinhole camera used to capture the pin number (5)<br />8<br />
  9. 9. How it Works: Debit Fraud<br />Pin pad (6)<br />9<br />
  10. 10. How it Works: Point of Sale Debit/Credit Fraud<br />Reading Devices installed in to terminals<br />Very hard to spot<br />Hard to Triangulate location of breach<br />10<br />
  11. 11. Police Prevention<br />Bank Hired Investigators<br />Banks put in new bank machines<br />Card Chips (already obsolete)<br />Triangulation of point of breach<br />Increased bank security<br />(8)(9)(10)<br />11<br />
  12. 12. How it Works: Debit/Credit FraudAccessibility<br /> Surprising Fact<br />All of these devices can be very easily purchased of the internet on websites such as<br /><br />Any training and information needed can be very easily discussed and taught on underground forums such as <br />12<br />
  13. 13. How it works Video Demonstration<br /> YouTube Video<br /><br />13<br />
  14. 14. How To Protect Your Self<br />Always cover your pin <br />Be careful who you give your card to<br />Be aware of people around you while at ATM<br />Be picky about the sites you use<br />Check your accounts often<br />(7)<br />14<br />
  15. 15. Conclusion<br />Debit Card and Credit Card Fraud is easily accessible to anyone<br />Very profitable<br />Popular with the new generation of organized crime<br />Very low punishment <br />15<br />
  16. 16. Reference<br /> (1)<br /> (2)<br /> (3)<br /> (4)<br /> (5)<br /> (7)<br /> <br /> (10)<br /> (9)<br /> (8)<br />16<br />