SlideShare a Scribd company logo
1 of 16
Cybercrime:Debit/Credit Fraud 1 YevgenBershadsky #100629876 	Konstantin Semerdji#100611781	 April 07,2010
Table Of Contends Introduction History How it Works How to Protect Your Self  Police Prevention Conclusion 2
Introduction 	Debit and Credit card fraud has become an international, underground multimillion dollar business and has become the main source of financial income for many organized crime groups around the world.  	AND ITS COMING TO AN ATM NEAR YOU! 3
History First bank issued credit card (1946)(1) First debit cards started appearing around 1980’s in America (2) Fraud Has been an issue ever since criminals realized it is easier and safer to counterfeit information then to rob people.  4
How it Works: Credit Card Fraud Credit card fraud is fairly simple Hackers gain information Simple reading devices at gas stations, restaurants can be used.  Later copied on to blank cards and used Blank cards can easily be modified, skimmers can easily change the name, number, picture to any they choose, using special printers Online purchases are also very common 5
How it works: Credit Card Fraud Credit Card numbers are gained by spam, computer hacking. Or using mini readers to steal information.  (3)(4) 6
How it works: Debit Card Fraud Trickier then Credit Card Fraud because the pin code is required Debit Cards are more preferred because it is very easy to take out cash from accounts Also very easy to make purchases because of low suspicion Devices have to manufactured. Card over lays are usually created using CNC machines, and Pin Hole cameras are custom made to match the bank machine 7
How it Works: Debit Fraud The top Picture shows a card slot over lay, which is used to record card information Bottom picture shows a person installing a pinhole camera used to capture the pin number (5) 8
How it Works: Debit Fraud Pin pad (6) 9
How it Works: Point of Sale Debit/Credit Fraud Reading Devices installed in to terminals Very hard to spot Hard to Triangulate location of breach 10
Police Prevention Bank Hired Investigators Banks put in new bank machines Card Chips (already obsolete) Triangulation of point of breach Increased bank security (8)(9)(10) 11
How it Works: Debit/Credit FraudAccessibility 				Surprising Fact All of these devices can be very easily purchased of the internet on websites such as http://www.softkeysolution.com/index.html Any training and information needed can be very easily discussed and taught on underground forums such as cardingworld.cc  12
How it works Video Demonstration 				YouTube Video http://www.youtube.com/watch?v=_m4jYdu-IJo&feature=PlayList&p=C5A665D5D09BB43F&playnext_from=PL&playnext 13
How To Protect Your Self Always cover your pin  Be careful who you give your card to Be aware of people around you while at ATM Be picky about the sites you use Check your accounts often (7) 14
Conclusion Debit Card and Credit Card Fraud is easily accessible to anyone Very profitable Popular with the new generation of organized crime Very low punishment  15
Reference http://inventors.about.com/od/cstartinventions/a/credit_cards.htm (1) http://www.economywatch.com/debit-card/history.html (2) http://www.syns0r.com/site/Cameras_and_Camcorders/Memory_Cards/Sima_Card_Reader/magnetic_stripe_readers.html (3) http://chattahbox.com/images/2009/08/hacker.jpg (4) http://www.theukcardsassociation.org.uk/files/ukca/media/pinhole_camera.jpg (5) http://interiorsavingsnewsletter.com/sept2008/images/ProtectYourPin.jpg (7) Cardingworld.cc  http://madukes.files.wordpress.com/2009/03/2005-techart-911-carrera-police-car-porsche-sa-1280x960.jpg (10) http://www.fahad.com/pics/incard_otp_credit_card.jpg (9) http://comsecllc.files.wordpress.com/2009/11/iphone_gps_using_cell_tower_triangulation.jpg (8) 16

More Related Content

Viewers also liked

Mac os installation and Hardware Report
Mac os installation and Hardware ReportMac os installation and Hardware Report
Mac os installation and Hardware ReportPratik Vyas
 
Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Mikhail Kurnosov
 
Linux Installation And Shamba Server
Linux Installation And Shamba ServerLinux Installation And Shamba Server
Linux Installation And Shamba ServerMayur Verma
 
PhD thesis presentation 2012
PhD thesis presentation 2012PhD thesis presentation 2012
PhD thesis presentation 2012vsharma78
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...Andris Soroka
 
Lee Clark 7th June 2010
Lee Clark 7th June 2010Lee Clark 7th June 2010
Lee Clark 7th June 2010leewclark
 
Almoços Convívio Cerberus
Almoços Convívio CerberusAlmoços Convívio Cerberus
Almoços Convívio CerberusCerberus Pt
 
An Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentAn Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentS. M. Hossein Hamidi
 
Temporal La Coru
Temporal La CoruTemporal La Coru
Temporal La Coruluisgontad
 
презентация земноводные и пресмыкающиеся
презентация земноводные и пресмыкающиесяпрезентация земноводные и пресмыкающиеся
презентация земноводные и пресмыкающиесяСветлана Брюховецкая
 
How to identify credit card fraud
How to identify credit card fraudHow to identify credit card fraud
How to identify credit card fraudHenley Walls
 
Проект по обществознанию 6гг
Проект по обществознанию 6ггПроект по обществознанию 6гг
Проект по обществознанию 6ггco1858
 

Viewers also liked (20)

Mac os installation and Hardware Report
Mac os installation and Hardware ReportMac os installation and Hardware Report
Mac os installation and Hardware Report
 
Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...
 
Linux Installation And Shamba Server
Linux Installation And Shamba ServerLinux Installation And Shamba Server
Linux Installation And Shamba Server
 
Jaba sat explorer-710
Jaba sat explorer-710Jaba sat explorer-710
Jaba sat explorer-710
 
PhD thesis presentation 2012
PhD thesis presentation 2012PhD thesis presentation 2012
PhD thesis presentation 2012
 
Finding Time to Study for the CIH Exam
Finding Time to Study for the CIH ExamFinding Time to Study for the CIH Exam
Finding Time to Study for the CIH Exam
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
Lee Clark 7th June 2010
Lee Clark 7th June 2010Lee Clark 7th June 2010
Lee Clark 7th June 2010
 
Almoços Convívio Cerberus
Almoços Convívio CerberusAlmoços Convívio Cerberus
Almoços Convívio Cerberus
 
cIHMS
cIHMScIHMS
cIHMS
 
Sp ws1 ulrich teichler
Sp ws1 ulrich teichlerSp ws1 ulrich teichler
Sp ws1 ulrich teichler
 
An Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentAn Introduction To Linux Development Environment
An Introduction To Linux Development Environment
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
QIP 2012
QIP 2012QIP 2012
QIP 2012
 
Desktop environment
Desktop environmentDesktop environment
Desktop environment
 
Temporal La Coru
Temporal La CoruTemporal La Coru
Temporal La Coru
 
презентация земноводные и пресмыкающиеся
презентация земноводные и пресмыкающиесяпрезентация земноводные и пресмыкающиеся
презентация земноводные и пресмыкающиеся
 
How to identify credit card fraud
How to identify credit card fraudHow to identify credit card fraud
How to identify credit card fraud
 
Проект по обществознанию 6гг
Проект по обществознанию 6ггПроект по обществознанию 6гг
Проект по обществознанию 6гг
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Cyber Crime

Data Breach Prevention - Start with your POS Terminal!
Data Breach Prevention - Start with your POS Terminal!Data Breach Prevention - Start with your POS Terminal!
Data Breach Prevention - Start with your POS Terminal!Halo Metrics
 
Chip and Skim: cloning EMV cards with the pre-play attack
Chip and Skim: cloning EMV cards with the pre-play attackChip and Skim: cloning EMV cards with the pre-play attack
Chip and Skim: cloning EMV cards with the pre-play attack- Mark - Fullbright
 
Target@ Data Breach2edit
Target@ Data Breach2editTarget@ Data Breach2edit
Target@ Data Breach2editKehinde Adelusi
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97alessio d
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eyeChand Pasha
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological InnovationEldad Lieberman
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayShah Sheikh
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALASaikiran Panjala
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsVi Tính Hoàng Nam
 
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardCant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardSlawomir Jasek
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docxwlynn1
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
The Rise and Rise of Web Fraud
The Rise and Rise of Web FraudThe Rise and Rise of Web Fraud
The Rise and Rise of Web FraudDavid Jones
 

Similar to Cyber Crime (20)

Data Breach Prevention - Start with your POS Terminal!
Data Breach Prevention - Start with your POS Terminal!Data Breach Prevention - Start with your POS Terminal!
Data Breach Prevention - Start with your POS Terminal!
 
Chip and Skim: cloning EMV cards with the pre-play attack
Chip and Skim: cloning EMV cards with the pre-play attackChip and Skim: cloning EMV cards with the pre-play attack
Chip and Skim: cloning EMV cards with the pre-play attack
 
Target@ Data Breach2edit
Target@ Data Breach2editTarget@ Data Breach2edit
Target@ Data Breach2edit
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97
 
Atm theft
Atm theftAtm theft
Atm theft
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card frauds
 
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardCant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
 
EMV and the consumer Final
EMV and the consumer FinalEMV and the consumer Final
EMV and the consumer Final
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
ATM.pdf.pptx
ATM.pdf.pptxATM.pdf.pptx
ATM.pdf.pptx
 
The Rise and Rise of Web Fraud
The Rise and Rise of Web FraudThe Rise and Rise of Web Fraud
The Rise and Rise of Web Fraud
 
ATM Security
ATM SecurityATM Security
ATM Security
 

Cyber Crime

  • 1. Cybercrime:Debit/Credit Fraud 1 YevgenBershadsky #100629876 Konstantin Semerdji#100611781 April 07,2010
  • 2. Table Of Contends Introduction History How it Works How to Protect Your Self Police Prevention Conclusion 2
  • 3. Introduction Debit and Credit card fraud has become an international, underground multimillion dollar business and has become the main source of financial income for many organized crime groups around the world. AND ITS COMING TO AN ATM NEAR YOU! 3
  • 4. History First bank issued credit card (1946)(1) First debit cards started appearing around 1980’s in America (2) Fraud Has been an issue ever since criminals realized it is easier and safer to counterfeit information then to rob people. 4
  • 5. How it Works: Credit Card Fraud Credit card fraud is fairly simple Hackers gain information Simple reading devices at gas stations, restaurants can be used. Later copied on to blank cards and used Blank cards can easily be modified, skimmers can easily change the name, number, picture to any they choose, using special printers Online purchases are also very common 5
  • 6. How it works: Credit Card Fraud Credit Card numbers are gained by spam, computer hacking. Or using mini readers to steal information. (3)(4) 6
  • 7. How it works: Debit Card Fraud Trickier then Credit Card Fraud because the pin code is required Debit Cards are more preferred because it is very easy to take out cash from accounts Also very easy to make purchases because of low suspicion Devices have to manufactured. Card over lays are usually created using CNC machines, and Pin Hole cameras are custom made to match the bank machine 7
  • 8. How it Works: Debit Fraud The top Picture shows a card slot over lay, which is used to record card information Bottom picture shows a person installing a pinhole camera used to capture the pin number (5) 8
  • 9. How it Works: Debit Fraud Pin pad (6) 9
  • 10. How it Works: Point of Sale Debit/Credit Fraud Reading Devices installed in to terminals Very hard to spot Hard to Triangulate location of breach 10
  • 11. Police Prevention Bank Hired Investigators Banks put in new bank machines Card Chips (already obsolete) Triangulation of point of breach Increased bank security (8)(9)(10) 11
  • 12. How it Works: Debit/Credit FraudAccessibility Surprising Fact All of these devices can be very easily purchased of the internet on websites such as http://www.softkeysolution.com/index.html Any training and information needed can be very easily discussed and taught on underground forums such as cardingworld.cc 12
  • 13. How it works Video Demonstration YouTube Video http://www.youtube.com/watch?v=_m4jYdu-IJo&feature=PlayList&p=C5A665D5D09BB43F&playnext_from=PL&playnext 13
  • 14. How To Protect Your Self Always cover your pin Be careful who you give your card to Be aware of people around you while at ATM Be picky about the sites you use Check your accounts often (7) 14
  • 15. Conclusion Debit Card and Credit Card Fraud is easily accessible to anyone Very profitable Popular with the new generation of organized crime Very low punishment 15
  • 16. Reference http://inventors.about.com/od/cstartinventions/a/credit_cards.htm (1) http://www.economywatch.com/debit-card/history.html (2) http://www.syns0r.com/site/Cameras_and_Camcorders/Memory_Cards/Sima_Card_Reader/magnetic_stripe_readers.html (3) http://chattahbox.com/images/2009/08/hacker.jpg (4) http://www.theukcardsassociation.org.uk/files/ukca/media/pinhole_camera.jpg (5) http://interiorsavingsnewsletter.com/sept2008/images/ProtectYourPin.jpg (7) Cardingworld.cc http://madukes.files.wordpress.com/2009/03/2005-techart-911-carrera-police-car-porsche-sa-1280x960.jpg (10) http://www.fahad.com/pics/incard_otp_credit_card.jpg (9) http://comsecllc.files.wordpress.com/2009/11/iphone_gps_using_cell_tower_triangulation.jpg (8) 16