ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

Report: ID theft claims 27 million victims over last 5 years WASHINGTON - More than 27 million people have been victims of identity theft in the last five.
© Annie Patton Credit Cards One of the most popular forms of credit Next Slide.
What Are the Functions of ATM Machines?
Chapter 4: Requirements Engineering
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Use Case Diagrams Damian Gordon.
ATM SCAM  At first glance it would appear as though this individual is simply performing a simple ATM transaction.
2.7.1.G1 © Family Economics & Financial Education – December 2005– Get Ready to Take Charge of Your Finances – Electronic Banking Bonanza – Slide 1 Funded.
EMEA Chip & Pin Terminal Training Videos & Instructions
USE CASE – ATM EXAMPLE Actors: ATM Customer ATM Operator Use Cases: The customer can withdraw funds from a checking or savings account query the balance.
SWE 214 (071) Use Case Diagrams Slide 1 Use Case Diagrams Examples.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1.2.2.G1 © Take Charge Today – Revised May 2010 – Electronic Banking Bonanza – Slide 1 Funded by a grant from Take Charge America, Inc. to the Norton School.
Debit Card Plastic card that looks like a credit card
ATM – requirements Team B Tom Hastjarjanto Martijn Nijenhof Ales Sturala Paul van der Ende.
ATM User Interface V3. I/O Devices Input: Keyboardfor input, option select Keyboardfor input, option select Or Touch screen Or Touch screenOutput: Screenfor.
Sequence Diagrams. Introduction A Sequence diagram depicts the sequence of actions that occur in a system. The invocation of methods in each object, and.
Checking Accounts Consumerism. Objectives By the end of this lesson, TLWBAT: 1.Write a check 2.Complete a check register.
Events & Messages Paul Ard Ales v2.0. Generic Exceptions  HardwareFail – the device does not respond  HardwareMalfunction – some part of the device.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
By Kieran and Zak.  The Lebanese fraud is when.a loop of tape is inserted in to the card slot.the customer inserts card and the x- ray film tape is put.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Callum Hunter. How can we design a cash machine that reassures the user ?
{ How to Use An ATM A simple tutorial to teach how to use ATM Machines.
CARD THEFT USING ATMS PERSONAL OPSEC. ATM THEFTS  In the first slide you see an individual who appears to be making a bank transaction at the ATM.
Identity Theft Your Problem, Not Mine. What can an identity thief do with your info? 1. Apply for a new driver’s license 2. Open a new bank account and.
Electronic Payment Systems
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Credit Cards One of the most popular forms of credit Next Slide.
ATM ROBBERY  In first instance, there is a person who apparently is making a transaction at the ATM. Translated by: S.L. de Sánchez.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Welcome to the SPAA Online Exam Tutorial This short presentation aims to demystify the online exam process and give you peace of mind as you undertake.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
SFWR ENG 3KO4 Software Development for Computer/Electrical Engineering Fall 2009 Instructor: Dr. Kamran Sartipi Software Requirement Specification (SRS)
NITWITS NITPICKING Ard Bahlman. Assumptions  “A customer will be required to insert an ATM card and enter a personal identification number (PIN) which.
What are Sequence Diagrams? Collaboration Diagrams allow designer to specify message flow between collaborating objects –Focus on relationship between.
Identity Theft By: Tiffany Goode and Jessica Jackson.
Business Math 3-2 Electronic Banking. Start up Marc uses his charge card to pay for almost everything he buys. Lenore pays for most of her purchases with.
Learning Intentions Explain what an ATM is and the facilities offered Identify the stages of withdrawing cash from an ATM List the advantages and disadvantages.
OCS NOVELL SOFTWARE. Novell Clients Typical Novell Configuration Novell Server Print jobs retained in server queue(s)
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Protecting Your Assets By Preventing Identity Theft 1.
Use Case Diagrams. Introduction In the previous Lecture, you saw a brief review of the nine UML diagrams. Now that you have the clear, you'll start to.
Lecture Outline Monday 23 rd February (Week 4) 3 – 3:10pm Review of Requirements Eng. and use cases 3:10 – 3:40pm Exercise on Use Case 3:40-4:40 Class.
ATM Fraud. Lost/stolen cards The Lost or Stolen physical card is becoming less of a target The data that can be skimmed is much more valuable and any.
Daar is geen woord Chinees bij. Follows the push model, messages are not initiated by the software 2.
IDENTITY THEFT WHAT WE SHOULD KNOW!!!. Standard/Objective: Standard 3 - Objective 4 Describe the rights and responsibilities of buyers and sellers under.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Acquire Safe Solution When Gmail Password Reset Required Toll Free Number
Protecting Your Assets By Preventing Identity Theft
One of the most popular forms of credit
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
How An ATM Work's Prepaid by, kakani Dinesh.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Figure 28.1 POS Conversion Customer’s Bank Merchant’s Bank Customer
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
I am about to give you a lot of information.
How To Avoid Being A Victim
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
FRAUD AWARENESS FOR SENIORS
Presentation transcript:

ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.

 What he really is doing is placing a trap in the ATM machine to “capture” the next user card. Placing the trap

Lookout Warning  Altering the ATMs is a risky business, these individuals work in teams. The lookout warns of any possible eye witnesses / or of the next potential victim.

 Here we see the next client using the ATM, after the trap has been set. He inserts his card and begins his transaction. The Victim

Springing the TRAP  The ATM card is confiscated, and the customer is confused, asking himself, Why has my card been confiscated? However, here we see the cavalry coming to help, (HELP!!!).

Honest,Samaritan Offering HELP  Here we see the thief pretending to help. What he is really doing is trying to gain the “customers” PIN, now that he has captured his card.

Gaining access to the PIN  The good Samaritan convinces the “Customer” He can recover the card, if he presses his PIN at the same time the Samaritan press “cancel” and “enter”.

Situation Hopeless, “They Leave”  After several attempts the “customer” is convinced his card has been confiscated. The “customer” and the Samaritan leave the ATM.

Recovering the CARD  Satisfied the area is clear, the thief  returns to recover the confiscated card from his trap. He not only has the card, he also has the PIN the “customer” provided unknowingly.

The Escape  In possession of the card and the PIN he leaves the ATM with £4,000 from the “Customers” account.

THE TRAP  The trap is made up of XRAY film, which is the preferred material by thieves; Simply because of the black color which is similar in appearance to the slot on the card reader.

Placing the TRAP  The trap is then inserted into the ATM slot. Care is taken not to insert the entire film into the slot, the ends are folded and contain glue strips for better adhesion to the inner and outer surface of the slots.

INVISIBLE  Once the ends are firmly glued and fixed to the slot, it is almost impossible to detect by unsuspecting clients.

¿How is your card confiscated?  Slits are cut into both sides of the trap, This prevents your card being returned prior to completing your transaction.

Retrieval of Confiscated card.  As soon as the “Customer” has gone, and they have your PIN, The thief can remove the glued trap, by grasping the folded tips, he simply pulls the trap out that has retained your card..

RECOMENDATIONS.  1.-Once your card has been confiscated, observe the ATM slot and the card reader for any signs of tampering. Should you see the film tips glued to the slot, unglue, pull the trap out and recover your card.  2.- Report IMMEDIATELY to the BanK.

Send this message to friends and family immediately.