Global Ramifications of Banking Security Mr. Tom Patterson MagTek VIP Breakout BAI Retail Delivery Expo 4 November, 2009 Boston, MA Dr. Chris Corpora.

Slides:



Advertisements
Similar presentations
Weighing the Risks and Benefits of Online Financial Transactions
Advertisements

Viet Nam Hitech Crime Investigation Department Dr. Tran Van Hoa
An Educational Partnership of Consumer Action and Chase
By: Jason Baltazar MIS 304 Credit Card Fraud and Prevention.
How is money accounted at the Front Desk?. Hotels and Money Hotels provide a number of financial services to guests These services include: Cash Paid.
Key to the Future Chapter 2, Lesson 1 Warm-Up Questions CPS Questions Note for teacher: Use Pick a Student button in CPS.
World of Credit By: Kunal Jolly. What is Credit? Credit mean that you have an opportunity to use someone elses money to meet your own requirements.
3 EASY STEPS TO LAUNCH YOUR PROGRAM The Bank announces the Rewards Program on their Website and through cardholder Online Banking. Step 1 We publish Your.
Prevention of Money Laundering Training session. Overview What is Money laundering? Requirements under the Act Arcadias policy Relevance to your routine.
Introduction and Overview of Digital Crime and Digital Terrorism
Introduction to computer
Let’s Get Financially Focused! Objectives Students will be able to: 1. Define credit. 2. Explain the negative impact that counterfeiting, forgery, fraud,
Database Woes Plague Homeland Security and Law Enforcement.
Prescription for Criminal Justice Forensics. The government has all but declared a national state of emergency regarding computer-related crimes and has.
OVER VIEW OF BANKING FRAUDS
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Cyber Security and the Global Business Environment Jeremy Schaar:)
ICT at Work Banking and Finance.
Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 7.2 October 24, 2011.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Debit cards Shumate – 5th Period.
Millions & Millions of people use the internet across the globe… …and they use it to book reservations… Your hotel cannot afford to miss this important.
“Bank Accounts: What You Should Know”. Overview How to Choose the Right Bank Banking Terminology Types of Bank Accounts Features of Checking Accounts.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
“Bank Accounts: What You Should Know”
SMALL BUSINESS MANAGEMENT Chapter 9 Small Business and Electronic Commerce.
Banking in the United States. Banking Safety FDIC is the Federal Deposit Insurance Corporation On May 20, 2009, President Obama signed the Helping Families.
THE GREATEST INVENTION OF THE LAST 50 YEARS: THE INTERNET.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Shopping and Banking Safely Online Licensed under a Creative Commons Attribution-NonCommercial- ShareAlike 2.5 Canada License.
Electronic Payment Systems University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2010 March 2010 ITSS 4201 Internet.
Beware! Consumer Fraud Module 9.1.
Buying and Selling Items on eBay and Craig’s List Computer and Technology Group May 15, 2008.
Travelocity Build a Trusting Relationship with Customers Networks.
Retailing in Electronic Commerce: Products and Services
Brokerage Model Unit Managing the Digital Enterprise By Professor Michael Rappa.
ICT in Banking.
 Much of the information needed by an organisation comes from within the organisation, and the organisation’s IT systems can be used to extract this.
CREDIT CARD FRAUD. TYPES OF CREDIT CARD FRAUD Counterfeit credit card use. Card lost or stolen by the card holder. Fraud committed without the actual.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Cyber Security Nevada Businesses Overview June, 2014.
Digital Forensics - challenges and opportunities Marc Kirby Cranfield University.
Social Impacts of IT. IT allows others to access information about you through social networking sites. Potential employers can check through Facebook.
Business Administration term project 2 (25%) financial Management Systems Debit card and credit card payments By Ashleigh Gray.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Internet & Digital Economy n What is Internet? n What is Electronic Commerce? n A Framework for EC n Benefits of EC n Categories of EC Applications n.
Objectives SWBAT Identify the various procedures in the enactment, implementation, and enforcement of law SWBAT compare responsibilities, jurisdictions,
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Police are not prepared for rising incidence of Identity Fraud By Chris DeVito.
Borrowing Money & Credit. Borrowing Money PRINCIPAL: The amount borrowed in the loan INTEREST: The amount paid by the borrower for the privilege of using.
Execute sales transactions. Sales transactions include: Cash or check Debit card sales Credit card sales Layaway sales On approval sale Cash-on-delivery.
Identity Theft How it happens and how to avoid it.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
MORE MONEY FOR CYBER- SECURITY?. CYBER SECURITY: A TICKING TIME BOMB? Richie Sabu G/T Independent Research Howard High School Mr. Brian Price, Advisor.
CHAPTER 8 – TYPES OF BUSINESS ORGANIZATIONS. SECTION 1 – SOLE PROPRIETORSHIPS  Characteristics of Sole Proprietorships (single person owned business)
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Objective 4.7 The Cabinet. Objective 4.7 how do cabinet departments and federal agencies, help to carry out the laws?
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Online Shopping: Research Paper Eimear Greene. My Objectives Why People shop online How Online retail has changed What category of product do people shop.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
New Industry Initiatives in CyberSecurity
Chapter 11 crime and security in the networked economy
Protecting Your Company’s Most Valuable Asset
CE-Notes Law Enforcement
A Secret Service Perspective on Credit Card Fraud
Presentation transcript:

Global Ramifications of Banking Security Mr. Tom Patterson MagTek VIP Breakout BAI Retail Delivery Expo 4 November, 2009 Boston, MA Dr. Chris Corpora

Chris Corpora VP, Law Enforcement, Intelligence and Homeland Security, The MASY Group Senior Advisor: FBI,Directorate of Intelligence Author: Crime-Terror Nexus and Threats in the Age of Obama Adjunct Professor, GMU: National Security Decision Making Policy Tom Patterson Chief Security Officer: MagTek Inc. Author: Mapping Security Former CIP Advisor: FBI Domain, NCIX Former Director: National Security Grid

OFFICIAL CAVEAT The ideas and opinions in this presentation are solely those of the two speakers and in no way represent the official positions of the Federal Bureau of Investigation or the U.S. Government. All Stories, Examples, and Documents are UNCLASS or have been DECLASSIFIED.

$4 Billion/Yr Loss

More than just money! Micro Switches 6 small batteries connected to micro switches Magnetic Read Head Transmitter Antenna

$20 on eBay and NOT ILLEGAL !

more than just money!

more than just money!

Recent Victims victimless crime no harm needed the money for books, school, food, rent, etc

LA Gang Employed waitresses at multiple restaurants Bloods 5,300; Drug, Rob, CC Latin Kings 1,900; Drug, Extort, Rob, CC Recent Examples

FBIs Organized Crime Definition: A continuing criminal conspiracy... The public perception is that organized crime has gone away, and that is not at all true. -- FBI AD- NY Russians principal purveyors of credit card fraud-- U.N. Report -Just ahead of Chinese Yakuza ( & )

Russian Mafia (Русская мафия) Russian Business Network Western Express Cybercrime Group Theives in law (Vory v zakone) KGB & Spetsnaz The Big Store Online Auctions

have huge list for sale with full billing info including 3,585 with cvv codes for $10 each –50 minimum order heya. Im selling a bunch of ccs w/o cvv2 for 23 USD. List is over 200 ccs long. Every cc with full info. Cards: MasterCard, Visa, Discover Locations: mostly in US Hi all. I have access to hundreds maybe thousands of credit card numbers through an online travel agent I work for. Its very easy to copy as many numbers as I like. I never thought I would steal anything from them, but I have decided they are a bunch of and changed my mind. Actual Text of Cards offered for sale.

Buy Hack Combine Convert Sell Modus Operandi

The Links Between Terrorists and Counterfeit Cards are Clear

In London, Tariq al-Daour bought 27,000 stolen credit card numbers, inc. addresses, birthdays, and limits.,$3.5 mil In North Africa, terrorist group bought 200 stolen cards to fund their branch of al-Qaida operatives. The Tamil Tigers funding leader had thousands of stolen counterfeit debit cards and pins, as well as a massive amount of cash and receipts. Al-Qaida operative ( Abdi) in Ohio, provided counterfeit credit cards to a cell planning to blow up a shopping mall in Columbus.

Al-Qaidas top cyber-terrorist, Younes Tsouli (aka Irhaby007), used stolen counterfeit cards to buy $3million of terrorist materials –Also, used some of these counterfeit cards to buy 180 web sites that broadcast the horrific execution of journalist Dan Pearl. –He is now awaiting his own execution.

Iman Samudra, a captured terrorist, followed the Al-Qaida Terrorist Handbook, when it came to funding his terror.

…obtain credit card numbers and use them to fund the struggle… Captured Al Qaeda Terrorism Handbook:

…obtain credit card numbers and use them to fund the struggle…

Global Ramifications of Banking Security Counterfeit Card Fraud is REAL A Global Problem YOUR Security Actions Have Global Ramifications Organized Criminals & Terrorists Are Counting on YOUR Inaction Its Time for Bankers & Merchants Work Together to Wipe Out Card Fraud NOW For YOU, your COUNTRY, and WORLD Thank you.

Thank You! BOOK SIGNING NEXT! Tom Patterson captures a compelling and practical view of security in a multinational environment. Your CSO needs to read this book!" Dr. Vint Cerf SVP, GOOGLE, & Founder of Internet Protocol (IP) As companies of all sizes go global in their search for profit and growth, they will need to understand how to use security as a tool for success in different markets, and Mapping Security shows them how. Dr. Craig Fields Fmr. Director, Advanced Research Projects Agency (ARPA) – U.S. Government "The power of the Internet is that it's a global network, seamlessly crossing borders. But it also brings security risks that can cross borders just as easily. Patterson … uses real-world examples and stories, many from his own career, and offers clear, action-oriented descriptions of the different threats and how to deal with them. This book avoids security jargon and speaks directly to business people around the globe." Chris Anderson Editor in Chief, Wired Magazine Security is not a destination, its a journey… I urge you to read this book. From the Forward, by Howard A. Schmidt fmr CSO of eBay and Microsoft Whether consumer or global giant, we all need to be spending a greater share of our budgets on security. Mapping Security offers business oriented and in-depth thinking on how and why to build security into the fabric of the organization. After reading Tom Patterson's book, you will want to make changes with a sense of urgency. John R Patrick President, former VP - Internet Technology at IBM Corporation