SlideShare a Scribd company logo
Cybercrime:Debit/Credit Fraud 1 YevgenBershadsky #100629876 	Konstantin Semerdji#100611781	 April 07,2010
Table Of Contends Introduction History How it Works How to Protect Your Self  Police Prevention Conclusion 2
Introduction 	Debit and Credit card fraud has become an international, underground multimillion dollar business and has become the main source of financial income for many organized crime groups around the world.  	AND ITS COMING TO AN ATM NEAR YOU! 3
History First bank issued credit card (1946)(1) First debit cards started appearing around 1980’s in America (2) Fraud Has been an issue ever since criminals realized it is easier and safer to counterfeit information then to rob people.  4
How it Works: Credit Card Fraud Credit card fraud is fairly simple Hackers gain information Simple reading devices at gas stations, restaurants can be used.  Later copied on to blank cards and used Blank cards can easily be modified, skimmers can easily change the name, number, picture to any they choose, using special printers Online purchases are also very common 5
How it works: Credit Card Fraud Credit Card numbers are gained by spam, computer hacking. Or using mini readers to steal information.  (3)(4) 6
How it works: Debit Card Fraud Trickier then Credit Card Fraud because the pin code is required Debit Cards are more preferred because it is very easy to take out cash from accounts Also very easy to make purchases because of low suspicion Devices have to manufactured. Card over lays are usually created using CNC machines, and Pin Hole cameras are custom made to match the bank machine 7
How it Works: Debit Fraud The top Picture shows a card slot over lay, which is used to record card information Bottom picture shows a person installing a pinhole camera used to capture the pin number (5) 8
How it Works: Debit Fraud Pin pad (6) 9
How it Works: Point of Sale Debit/Credit Fraud Reading Devices installed in to terminals Very hard to spot Hard to Triangulate location of breach 10
Police Prevention Bank Hired Investigators Banks put in new bank machines Card Chips (already obsolete) Triangulation of point of breach Increased bank security (8)(9)(10) 11
How it Works: Debit/Credit FraudAccessibility 				Surprising Fact All of these devices can be very easily purchased of the internet on websites such as http://www.softkeysolution.com/index.html Any training and information needed can be very easily discussed and taught on underground forums such as cardingworld.cc  12
How it works Video Demonstration 				YouTube Video http://www.youtube.com/watch?v=_m4jYdu-IJo&feature=PlayList&p=C5A665D5D09BB43F&playnext_from=PL&playnext 13
How To Protect Your Self Always cover your pin  Be careful who you give your card to Be aware of people around you while at ATM Be picky about the sites you use Check your accounts often (7) 14
Conclusion Debit Card and Credit Card Fraud is easily accessible to anyone Very profitable Popular with the new generation of organized crime Very low punishment  15
Reference http://inventors.about.com/od/cstartinventions/a/credit_cards.htm (1) http://www.economywatch.com/debit-card/history.html (2) http://www.syns0r.com/site/Cameras_and_Camcorders/Memory_Cards/Sima_Card_Reader/magnetic_stripe_readers.html (3) http://chattahbox.com/images/2009/08/hacker.jpg (4) http://www.theukcardsassociation.org.uk/files/ukca/media/pinhole_camera.jpg (5) http://interiorsavingsnewsletter.com/sept2008/images/ProtectYourPin.jpg (7) Cardingworld.cc  http://madukes.files.wordpress.com/2009/03/2005-techart-911-carrera-police-car-porsche-sa-1280x960.jpg (10) http://www.fahad.com/pics/incard_otp_credit_card.jpg (9) http://comsecllc.files.wordpress.com/2009/11/iphone_gps_using_cell_tower_triangulation.jpg (8) 16

More Related Content

Similar to Cyber Crime

Target@ Data Breach2edit
Target@ Data Breach2editTarget@ Data Breach2edit
Target@ Data Breach2edit
Kehinde Adelusi
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97
alessio d
 
Atm theft
Atm theftAtm theft
Atm theft
Apurva Sharma
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
VishnuParsi
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
John Williams
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
Chand Pasha
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
Mohd Nazir Shakeel
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
Eldad Lieberman
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
Shah Sheikh
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
Saikiran Panjala
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card frauds
Vi Tính Hoàng Nam
 
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardCant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
Slawomir Jasek
 
EMV and the consumer Final
EMV and the consumer FinalEMV and the consumer Final
EMV and the consumer Final
Daniel (Dan) DeBlasio
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
wlynn1
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
Hai Nguyen
 
ATM.pdf.pptx
ATM.pdf.pptxATM.pdf.pptx
ATM.pdf.pptx
Rashmibansal15
 
The Rise and Rise of Web Fraud
The Rise and Rise of Web FraudThe Rise and Rise of Web Fraud
The Rise and Rise of Web Fraud
David Jones
 
ATM Security
ATM SecurityATM Security
ATM Security
Roushan Jha
 
Smart card emv for dummies
Smart card emv for dummiesSmart card emv for dummies
Smart card emv for dummies
BACKSEATRIDER
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
ijmnct
 

Similar to Cyber Crime (20)

Target@ Data Breach2edit
Target@ Data Breach2editTarget@ Data Breach2edit
Target@ Data Breach2edit
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97
 
Atm theft
Atm theftAtm theft
Atm theft
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card frauds
 
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardCant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
 
EMV and the consumer Final
EMV and the consumer FinalEMV and the consumer Final
EMV and the consumer Final
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
ATM.pdf.pptx
ATM.pdf.pptxATM.pdf.pptx
ATM.pdf.pptx
 
The Rise and Rise of Web Fraud
The Rise and Rise of Web FraudThe Rise and Rise of Web Fraud
The Rise and Rise of Web Fraud
 
ATM Security
ATM SecurityATM Security
ATM Security
 
Smart card emv for dummies
Smart card emv for dummiesSmart card emv for dummies
Smart card emv for dummies
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
 

Cyber Crime

  • 1. Cybercrime:Debit/Credit Fraud 1 YevgenBershadsky #100629876 Konstantin Semerdji#100611781 April 07,2010
  • 2. Table Of Contends Introduction History How it Works How to Protect Your Self Police Prevention Conclusion 2
  • 3. Introduction Debit and Credit card fraud has become an international, underground multimillion dollar business and has become the main source of financial income for many organized crime groups around the world. AND ITS COMING TO AN ATM NEAR YOU! 3
  • 4. History First bank issued credit card (1946)(1) First debit cards started appearing around 1980’s in America (2) Fraud Has been an issue ever since criminals realized it is easier and safer to counterfeit information then to rob people. 4
  • 5. How it Works: Credit Card Fraud Credit card fraud is fairly simple Hackers gain information Simple reading devices at gas stations, restaurants can be used. Later copied on to blank cards and used Blank cards can easily be modified, skimmers can easily change the name, number, picture to any they choose, using special printers Online purchases are also very common 5
  • 6. How it works: Credit Card Fraud Credit Card numbers are gained by spam, computer hacking. Or using mini readers to steal information. (3)(4) 6
  • 7. How it works: Debit Card Fraud Trickier then Credit Card Fraud because the pin code is required Debit Cards are more preferred because it is very easy to take out cash from accounts Also very easy to make purchases because of low suspicion Devices have to manufactured. Card over lays are usually created using CNC machines, and Pin Hole cameras are custom made to match the bank machine 7
  • 8. How it Works: Debit Fraud The top Picture shows a card slot over lay, which is used to record card information Bottom picture shows a person installing a pinhole camera used to capture the pin number (5) 8
  • 9. How it Works: Debit Fraud Pin pad (6) 9
  • 10. How it Works: Point of Sale Debit/Credit Fraud Reading Devices installed in to terminals Very hard to spot Hard to Triangulate location of breach 10
  • 11. Police Prevention Bank Hired Investigators Banks put in new bank machines Card Chips (already obsolete) Triangulation of point of breach Increased bank security (8)(9)(10) 11
  • 12. How it Works: Debit/Credit FraudAccessibility Surprising Fact All of these devices can be very easily purchased of the internet on websites such as http://www.softkeysolution.com/index.html Any training and information needed can be very easily discussed and taught on underground forums such as cardingworld.cc 12
  • 13. How it works Video Demonstration YouTube Video http://www.youtube.com/watch?v=_m4jYdu-IJo&feature=PlayList&p=C5A665D5D09BB43F&playnext_from=PL&playnext 13
  • 14. How To Protect Your Self Always cover your pin Be careful who you give your card to Be aware of people around you while at ATM Be picky about the sites you use Check your accounts often (7) 14
  • 15. Conclusion Debit Card and Credit Card Fraud is easily accessible to anyone Very profitable Popular with the new generation of organized crime Very low punishment 15
  • 16. Reference http://inventors.about.com/od/cstartinventions/a/credit_cards.htm (1) http://www.economywatch.com/debit-card/history.html (2) http://www.syns0r.com/site/Cameras_and_Camcorders/Memory_Cards/Sima_Card_Reader/magnetic_stripe_readers.html (3) http://chattahbox.com/images/2009/08/hacker.jpg (4) http://www.theukcardsassociation.org.uk/files/ukca/media/pinhole_camera.jpg (5) http://interiorsavingsnewsletter.com/sept2008/images/ProtectYourPin.jpg (7) Cardingworld.cc http://madukes.files.wordpress.com/2009/03/2005-techart-911-carrera-police-car-porsche-sa-1280x960.jpg (10) http://www.fahad.com/pics/incard_otp_credit_card.jpg (9) http://comsecllc.files.wordpress.com/2009/11/iphone_gps_using_cell_tower_triangulation.jpg (8) 16