ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.

Slides:



Advertisements
Similar presentations
Creating Personal Accounts in OvidSP Ovid Training Department 2008 Think Fast. Search Faster.
Advertisements

What Are the Functions of ATM Machines?
Chapter 4: Requirements Engineering
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
ATM SCAM  At first glance it would appear as though this individual is simply performing a simple ATM transaction.
EMEA Chip & Pin Terminal Training Videos & Instructions
SWE 214 (071) Use Case Diagrams Slide 1 Use Case Diagrams Examples.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Direct Attacks on Computational Devices
Debit Card Plastic card that looks like a credit card
S.M.A.T.E. Serving Money Around The Earth The Revolutionary ATM Irvin Shen, Juan Favela, Sam Ammons, and Christopher Leonardi.
Present Value of an Annuity; Amortization (3.4) In this section, we will address the problem of determining the amount that should be deposited into an.
ATM User Interface V3. I/O Devices Input: Keyboardfor input, option select Keyboardfor input, option select Or Touch screen Or Touch screenOutput: Screenfor.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Electronic ATM Fraud. ATM Fraud is where you goto an ATM and you insert your card into a skimmer which is placed in the card slot and it will take all.
By Kieran and Zak.  The Lebanese fraud is when.a loop of tape is inserted in to the card slot.the customer inserts card and the x- ray film tape is put.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
{ How to Use An ATM A simple tutorial to teach how to use ATM Machines.
CARD THEFT USING ATMS PERSONAL OPSEC. ATM THEFTS  In the first slide you see an individual who appears to be making a bank transaction at the ATM.
Identity Theft Your Problem, Not Mine. What can an identity thief do with your info? 1. Apply for a new driver’s license 2. Open a new bank account and.
2.7.1.G1 © Family Economics & Financial Education – December 2005 – Get Ready To Take Charge of Your Finances – Electronic Banking Bonanza Funded by a.
ATM ROBBERY  In first instance, there is a person who apparently is making a transaction at the ATM. Translated by: S.L. de Sánchez.
This portion will demonstrate how to track customers with SimPOS! Retail Point of Sale. You may track a few or all of your customers if you wish. Reasons.
SFWR ENG 3KO4 Software Development Fall 2009 Instructor: Dr. Kamran Sartipi Software Requirement Specification (SRS) for the Automated Banking Machine.
January Ron McFadyen1 January 2004 Assignment 1 Due: Friday Jan 23, Implement the ProductSpecification and Payment classes in any OO.
Lecture Outline Monday 23 rd February (Week 4) 3 – 3:10pm Review of Requirements Eng. and use cases 3:10 – 3:40pm Exercise on Use Case 3:40-4:40 Class.
ATM WITH AN EYE. An automated teller machine (ATM) or automatic banking machine (ABM) is a computerised telecommunications device that provides the clients.
ATM Fraud. Lost/stolen cards The Lost or Stolen physical card is becoming less of a target The data that can be skimmed is much more valuable and any.
Daar is geen woord Chinees bij. Follows the push model, messages are not initiated by the software 2.
IDENTITY THEFT WHAT WE SHOULD KNOW!!!. Standard/Objective: Standard 3 - Objective 4 Describe the rights and responsibilities of buyers and sellers under.
Credit & Debit Cards: Advantages and Disadvantages
PostBase Automatic Feeder Component Removal Service Training
Teens 2 lesson six using banking services presentation slides 04/09.
Project Overview Introduction & Product Analysis
Paul Ammann & Jeff Offutt
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
Structured Analysis and Design Technique
ATM WITH AN EYE Suresh kumar.
SECURITY FEATURES OF ATM
Copyright Lessons Learned Ltd 2016
Outline 1. Exercise on use case diagram
Discover the Boom in Electronic Banking!
Top Six Web Design Tips for eCommerce Website
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
How An ATM Work's Prepaid by, kakani Dinesh.
Chapter 8: Modelling Interactions and Behaviour UML Activity Diagram
the first card insert text here.
SCHEDULE PLANNER Schedule Planner is a new software that went live at OSU on October 19th. It helps students navigate their multiple schedules and sort.
Indiana Senior Medicare Patrol (SMP)
Ashley direct Replacement parts. Create my parts order
Introduction To Logarithms
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Paul Ammann & Jeff Offutt
#1 #2 Click on Infinite Campus Parent Portal
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
1) 2) 3) 4) 5) Warm Up/Do Now Evaluate: OBJECTIVE: Try these problems
using banking services
Teens 2 lesson six using banking services presentation slides 04/09.
using banking services
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Real-Time Structured Analysis and Design Technique (RSTAD)
Checking Account Vocabulary
I am about to give you a lot of information.
How To Avoid Being A Victim
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
FRAUD AWARENESS FOR SENIORS
Presentation transcript:

ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.

Setting the Trap What he is in fact doing is rigging the slot on the machine so as to capture the card of the next person who uses the ATM.

The Lookout Rigging the machine is very risky business therefore the services of a “lookout” is required in order to warn of possible witnesses and/or potential victims.

The Victim Here we see the next customer to use the machine after the trap has been set. He inserts his card and attempts a transaction.

The Capture The card has been captured and the customer is confused as to why this is so. However in the background we see that help is on its’ way……or is it?

The Con Here we see the Fraudster pretending to render assistance. What he is in fact trying to do is obtain the customer’s P.I.N now that he has captured the card

Obtaining the P.I.N He convinces the customer that he would be able to retrieve his card if he entered his P.I.N while he holds down both the “cancel” and the “enter” buttons.

The Surrender After several attempts the customer is convinced that the machine has captured his card. Both he and the Fraudster leave the ATM.

The Pickup Satisfied that the coast is clear the Fraudster returns to retrieve the card that has been captured by his trap. He not only has the customers card he also has his P.I.N.

The Exit Armed with card and P.I.N he left and was able to withdraw $1000 from the account.

The Loop The loop is made from a thin strip of X-Ray negative or similar type material. X-Ray negatives are preferred by the fraudsters since the color blends in well with the plastic housing of the card slot.

The Set The strip is then inserted into the ATM card slot with use of an ATM card. Care is taken so as not to allow the card to be inserted all the way. The ends of the strip are then glued to the upper and lower portions of the slot.

Invisible Once the ends are glued it is almost impossible to the unsuspecting customer to detect.

Why the card is captured. Slits are made on the upper and lower portions of the strip which prevent the card from being ejected after the completion of a transaction.

Retrieving the Card Once the customer has left, and the PIN obtained, the fraudster would then detach the glued ends of the strip from the housing. Holding both ends of the strip he simply pulls and is able to retrieve the captured card