CJ 316 Seminar 4 – 1/31/11 CJ 316 Seminar 4 1-31-11.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
PAPER PRESENTATION BY V.Priyanka CSE-A Roll no. 13K41A0548.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
ICT at Work Banking and Finance.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Security, Privacy, and Ethics Online Computer Crimes.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
Chapter 4 Billing Schemes.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
Internet Fraud By: Noelle Woodman.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
E-commerce Fraud: The New Reality Thomas Chim Raj Nair Chris Geegan Mike Grimsley.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Commerce Done by: Sadoun AL-Suwaida Turki AL-Anazi.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Unit 4 Auction Fraud & Child Pornography The use of the Internet in an online.
PHONE CLONING TECHNOLOGY
Topic 5: Basic Security.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
Chapter 10 Electronic Commerce. E-commerce is the buying and selling of products and services electronically over the Internet.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Computer Crime Second Part of Chapter 7 A gift of Fire – Sara Baase.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Protecting Your Assets By Preventing Identity Theft
Protecting Your Credit Identity
Take Charge of your Finances
IT Security  .
Take Charge of your Finances
When you get caught for Identity Theft
A Gift of Fire Third edition Sara Baase
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Take Charge of your Finances
Protecting Yourself from Fraud including Identity Theft
Identity Theft Samuel H. Slater.
Presentation transcript:

CJ 316 Seminar 4 – 1/31/11 CJ 316 Seminar

Chapter 4 High-Tech Frauds

CJ 316 Seminar Outline 4.1 Credit Card Fraud 4.2 Auction Fraud 4.3 Cellular/Phone Fraud

CJ 316 Seminar Introduction Technology has made it much easier for the fraudster. – Fake identities – False businesses – Virtual storefronts Law enforcement has been forced to learn new ways to detect high-tech fraudsters.

CJ 316 Seminar Introduction, Con’t The high-tech frauds discussed in this chapter include: – Credit card fraud – Auction fraud – Cellular/phone fraud

CJ 316 Seminar Credit Card Fraud

CJ 316 Seminar Credit Card Fraud Most common way identity theft victim information is used. An epidemic with no signs of a real cure. Biometrics, the “science of life measurement,” is a good vaccine for the problem.

CJ 316 Seminar Biometrics Three primary types: – High biometrics – Low biometrics – Esoteric biometrics

CJ 316 Seminar High and Low Biometrics High biometrics — the most reliable; measures physical characteristics of high accuracy (e.g., retina, iris, and fingerprints) Low biometrics —measure distinct features that have a reasonable level of accuracy (e.g., hand geometry, face recognition, voice recognition, and signature recognition)

CJ 316 Seminar Esoteric Biometrics Are still in early development and include vein measurement or analysis of body odor. 56—91% of the general public supports the use of biometrics. Citizens must be assured that “Big Brother” and others will not abuse customer biometric information.

CJ 316 Seminar Credit Card Fraud Thieves obtain credit card information by: – Dumpster diving – Shoulder surfing – Social engineering – Inside access to credit card information – Credit card generating software – Skimming – Internet chat rooms – /Web Site scams – Stealing it

CJ 316 Seminar Credit Card Fraud, Con’t Skimming — the electronic lifting of the full track data encoded on the magnetic stripe of a valid card and transferring of that data to another magnetic stripe on a counterfeit card. – Most commonly occurs at point of a legitimate sale where the card is skimmed with a handheld skimmer.

CJ 316 Seminar Is Skimming a Problem? Skimming 15 or 20 accounts can generate $50,000 to $60,000 worth of fraud, and nobody is going to be aware of it until the victims get their bills, 30 to 60 days after the crime. In the U.S., it cost $1.2 billion, and, everywhere, the cost is going up.

CJ 316 Seminar Common Security Features Holographic industry or trade emblems Clear, uniform, evenly spaced, and raised credit card number embossing Standard three-digit validation numbers Tamper proof/resistant signature panels Micro printing

CJ 316 Seminar Auction Fraud

CJ 316 Seminar Internet Auction Fraud The use of the Internet in an online transaction between buyer and seller to defraud the seller through deceptive means, including, but not limited to, failure to deliver merchandise, intentionally delivering defective merchandise, or delivering merchandise other than what was promised or purchased (of a lesser quality).

CJ 316 Seminar Common Forms of Auction Fraud Bid siphoning Shill bidding Bid shielding

CJ 316 Seminar Bid Siphoning Con artists lure bidders off legitimate auction sites by offering to sell the “same” item at a lower price. Their intent is to trick consumers into sending money without proffering the item. By going off-site, buyers lose any protections the original site may provide, such as insurance, feedback forms, or guarantees.

CJ 316 Seminar Shill Bidding  When fraudulent sellers or their “shills” bid on “sellers” items to drive up the price. This is also sometimes referred to as “Phantom Bidding.”

CJ 316 Seminar Bid Shielding When fraudulent buyers submit very high bids to discourage other bidders from competing for the same item and then retract those bids so that people they know can get the item at a lower price.

CJ 316 Seminar Auction Fraud Suspect Profile 75% male 25% female Most likely residing in California, New York, Florida, Texas, Illinois, or Ohio Average loss between $ and $ Average victim age 38.6 years

CJ 316 Seminar Auction Fraud Prevention Be familiar with auction site Know available recourse action offered Examine seller feedback Know where the seller is located Note any warranties or return policies Avoid overpriced shipping costs

CJ 316 Seminar Auction Fraud Investigation What is the name of the Web Site and/or web address (Uniform Resource Locator — URL) of the site that the purchase was made from? Did you save a copy of the screen that documented the transaction? Did you save any in connection with the transaction? Did you save any electronic payment receipts in connection with the transaction?

CJ 316 Seminar Cellular/Phone Fraud

CJ 316 Seminar Phone Phreaking The art and science of cracking the phone network. Some phreak to explore the phone system, while others do it to make free phone calls. The Captain Crunch whistle was the earliest phreaking device. Phreaking can take place on land lines and using cellular technology.

CJ 316 Seminar Cellular Phones Each cellular phone has a unique pair of identifying numbers: – Electronic Serial Number (ESN) – Mobile Identification Number (MIN) The assigned ESN or MIN can be viewed on most cell phones by removing the battery cover and battery.

CJ 316 Seminar Cellular Phreaking A police scanner can be used to capture the ESN or MIN. The captured ESN or MIN can then be loaded onto another cellular phone, creating a clone. Readers are also sold on the Internet. PINs were introduced to combat cellular fraud, but are not common today.

CJ 316 Seminar Cell Phone Cloning Cloning fraud Clone fraud Cloned phone

CJ 316 Seminar Cloning Fraud It occurs when criminals use scanners to obtain legitimate MIN/ESN/PIN combinations and then program them into illegitimate phones. (Recall, PINS are not used very often today.)

CJ 316 Seminar Cloning Fraud, Con’t A legitimate serial number is programmed into an imposter’s cell phone. Crooks get the numbers because they are broadcast with every cellular call and can be picked up by ordinary radio scanners.

CJ 316 Seminar Cloned Phone A cell phone has two basic ways it identifies itself to the cell phone company it wants to use — its own telephone number, which can be changed, and a special secret number embedded into the silicon inside the phone called the ESN. When the phone wants to make a call, it sends these numbers and the cell carrier uses them to check if the call is authentic.

CJ 316 Seminar Types of Cell Phone Fraud Counterfeit “clone” phones Counterfeit “lifetime” phones Counterfeit “tumbler” phones

CJ 316 Seminar Counterfeit “Clone” Phones The criminal puts into a phone a computer chip that can be programmed with both the ESN and MIN of a legitimate user. The criminal obtains valid number combinations, either through illegally used test equipment or through an unscrupulous employee of a retail agent or carrier.

CJ 316 Seminar Counterfeit “Lifetime” Phones Thieves reprogram a special wireless phone through its own keypad so that wireless bills are charged to someone else. With the “lifetime” counterfeit phone technology, numerous legitimate MIN/ESN pairs can be stored in each phone.

CJ 316 Seminar Counterfeit “Tumbler” Phones Thieves alter a wireless phone so it tumbles through a series of ESNs and makes the caller appear to be another new customer each time a call is made.

CJ 316 Seminar Common Types of Cellular Fraud Subscriber fraud Roaming fraud

CJ 316 Seminar Subscriber Fraud Occurs when someone signs up for service with fraudulently obtained customer information or false identification. Subscription fraud and identity theft go hand-in-hand and are the most common types of telecom fraud today. The cellular industry estimates that carriers lose more than $150 million per year due to subscriber fraud

CJ 316 Seminar Roaming Fraud With the fraudulently obtained phone in hand, the phreaker goes to another cell area outside of the provider’s network. The phone then enters the roaming mode, utilizing cell towers from another provider. By the time this other provider bills the original provider for the roaming fees on its towers, the thief has racked up significant charges. Since the phone was obtained with false information, locating the criminal is extremely difficult.

CJ 316 Seminar Cell Industry Prevention Roamer Verification/Reinstatement (RVR) Radio Frequency Fingerprinting (RFF) Data-mining

CJ 316 Seminar Roamer Verification/Reinstatement When a visited server (provider) does not recognize a number pair (EIN/MIN), RVR “hot- lines” the caller to an operator who can verify his or her identity. Once this is satisfactorily done, the caller’s ability to roam in that market is reinstated.

CJ 316 Seminar Radio Frequency Fingerprinting Each phone has a unique radio wave pattern that is recorded by the phone company when it is first used. Whenever a mobile purporting to be that phone attempts to access the network, its emissions are tested to see if they match the characteristics previously recorded. If the match is close, the call is completed.

CJ 316 Seminar Data Mining The practice of automatically searching large stores of data for patterns. The cellular industry uses data- mining programs to monitor and detect fraud by creating customer profiles that track average call duration, percentage of no-answer calls, percentage of calls to/from a different area code, percentage of weekday calls (Monday—Friday), percentage of daytime calls (9a.m./5p.m.), average number of calls received per day, and the average number of calls originated per day.

CJ 316 Seminar Investigative Uses of Cell Phones Cell signals can be used to track victims. Cell signals can be used to track suspects. Cell phone records can reveal phone numbers called and lead to a suspect or associates, especially when investigating identity theft complaints.

CJ 316 Seminar Consumer Fraud Prevention 1.Locking phones or removing handsets and wireless antennas (to avoid drawing attention to the vehicle). 2.Protecting sensitive documents, such as subscriber agreements, which include electronic serial numbers. 3.Immediately reporting a stolen phone to the wireless phone carrier. 4.Using the lock code.

CJ 316 Seminar Consumer Fraud Detection 1.Looking for unusual call activity on monthly wireless phone bills. 2.Reporting frequent receipt of wrong numbers or hangups on the wireless phone. 3.Asking the wireless provider to eliminate overseas toll or North American toll (long distance) dialing capabilities. 4.Immediately contacting the wireless phone company if fraud is suspected.

CJ 316 Seminar Computer Network Attack Involves malicious code (i.e., a virus), used as a weapon to infect enemy computers to exploit a weakness in software, in the system configuration, or in the computer security practices of an organization or computer user. Other forms of CNA are enabled when an attacker uses stolen information to enter restricted computer systems.

CJ 316 Seminar Reasons for Using Cyberterror Vulnerability Fear factor Anonymity Attention Availability and low cost Safety Expertise

CJ 316 Seminar Organized Crime Organized crime groups are also turning toward technology. Organized crime is crime committed by criminal organizations whose existence has continuity over time and across crimes and that use systematic violence and corruption to facilitate their criminal activities.