NFSSC 2012 Annual Conference Do You Have Identity Theft On Your Menu? Walt Augustinowicz 800.610.2770 x 110.

Slides:



Advertisements
Similar presentations
Identity Theft and Online Identity Solutions Heidi Inman May 29, 2008.
Advertisements

PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Presented by: Your Name Your Phone Number Your Website Address How Your Local Business Can ATTRACT and KEEP Customers Through Mobile Marketing.
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
What’s new. Amazon Price Check App They’re making it even harder for real-world retailers,– scan and scram. Here’s how it works: you go into a store,
The Importance of Social Media. Some facts and statistics: Nearly 1 out of every 5 minutes online is spent on social media Facebook reached 1.11 billion.
What is new in the digital world? What has happened since last time?
Mobile Payments Commerce Without Cash or Credit Cards.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Flash Wireless Customer Training
Digital Wallet Alberto Almonte (CPE) Miles Curiotto (CPE) Michael Stross (EE) The new, compact, secure and efficient way to carry all your credit and debit.
Smartphone Marketing.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Hidden Apps Carrier IQ and Privacy in Mobile Devices.
Near Field Communication By Van Logan HTM 304. What is Near Field Communication Short range wireless communication technology between electronic devices.
GETTING BUTTS INTO THE SEATS. SOCIAL MEDIA FACTS As of tomorrow Facebook will be 10 years old and has an estimated 1.3 BILLION users Facebook StatisticsData.
Mobile Phone Theft. Serving our communities and protecting them from harm Introduction Mobile Phone Theft There were an estimated 742,000 victims of mobile.
Confidential Company Internal396/ LXE Uen PA2Xperia Transfer Mobile Communication Material Company Internal396/ LXE.
FIRST SCREEN In 1929, we were introduced to the “First Screen” Still today, Television advertising is a tremendously effective way to market.
ITEC0722: Mobile Business and Implementation: Mobile Payment and Security Suronapee Phoomvuthisarn, Ph.D.
Cyber Crimes.
Cosc 4/5730 Android and Blackberry Near Field Communications (NFC)
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
Smart Card Application. Smart-card is a plastic card, the size of a standard credit card, with one or several integrated circuits (chips) capable to store.
NFC - Near Field Communication Technology
NEAR FIELD COMMUNICATION. WHAT IS NFC??? NFC or Near Field Communication is a short range high frequency wireless communication technology. A radio communication.
Near Field Communication Systems Patras, July 2006.
By: Ken Steinmann. A virtual wallet that securely stores your credit and debit cards, coupons, and rewards cards. You can make in-store payments by tapping.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Driving Business Online Wed 15 August 2012 Canberra Online Business in Australia (PayPal Market Research)
Systems that support electronically executed business transactions.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Mobile Marketing Olivia Lyon Matt Brown. What mobile marketing is and techniques associated with it Mobile marketing is the interactive multichannel promotion.
CISC 849 : Applications in Fintech The future is already here?
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
SMARTER. TOGETHER. The Mobility of Fraud Michael Loox, CFI Director of Loss Prevention & Safety Coffee Bean and Tea Leaf David Johnston.
Patrol Live The #1 Guard Tour App is now available on Android. All-in-one real-time guard tour app combines GPS geotag scanning, voice notes, photos, live.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
INTRODUCTION TO NEW MEDIA DR. BURÇE ÇELİK. THE NEW NEW MEDIA Words and photos were new on the net, now videos, news feed, RSS, apps are there. New hardwares.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Near Field Communication Armando Octavio Yesenia Sunny Nidia.
Mobile Money 1/37 Fiserv Mobile Money Staff Education © 2010 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. All trademarks.
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
App&Web Multikanalmarketing GmbH. APP&WEB EVENT 2.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
LOGO iPhone to Galaxy Note Transfer Transfer iPhone Data to Galaxy Note 3/Note 4/Note 5/Note Edge.
Identity Theft It’s a crime!
Near Field Communication (NFC)
Mobile Operating Systems
Suronapee Phoomvuthisarn, Ph.D.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 mPOS Terminal Market unit shipment.
Cesar Lomeli.
Cesar Lomeli.
The protector card RFID PROTECTOR.
Protecting Yourself from Fraud including Identity Theft
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
Protecting Yourself from Fraud including Identity Theft
2N Access Unit 2.0 Multi-technology access control readers.
Company Name | Phone Number | Website | Address
Protecting Yourself from Fraud including Identity Theft
Identity Theft and Credit Safety
Presentation transcript:

NFSSC 2012 Annual Conference Do You Have Identity Theft On Your Menu? Walt Augustinowicz x 110

Outline What is Electronic Pickpocketing? What is NFC (Near Field Communications)? How will the combination of the two effect your operations?

Electronic Pickpocketing What is Electronic Pickpocketing?

Electronic Pickpocketing Electronic Pickpocketing = When un- authorized persons use the RFID capability of your cards to steal information from those cards or clone them remotely. Very difficult to detect or solve crime. Already a crime in some states such as California to skim data wirelessly without permission. Nevada Attorney General issued an Electronic Pickpocketing Consumer Alert in Better Business Bureau now recommending shielding and Identity Stronghold products.

Credit/Debit cards Building Access cards Mandated by HSPD-12 for all US Federal Employee ID cards National ID cards Healthcare ID cards Passports Transit cards Drivers’ Licenses Hotel key cards Trade Show ID cards Ski lift passes What kind of cards contain RFID chips? Which cards?

An interface built into many new smart phones that mimics RFID credit cards but can be used for any kind of data transfer to another NFC device. Designed so a consumer can make a credit or debit card payment using their own cell phone by waving it over your contactless payment card reader. Google Wallet and ISIS are some of the biggest projects involving NFC and payments. NFC = Near Field Communications What is NFC?

RFID = Radio Frequency Identification Device Frequency = 13.56Mhz Protocol = ISO Billions of cards issued No Off switch Endless personal data from credit card numbers and photos to fingerprints and iris scans. Two Technologies = One Big Problem Contactless Cards (RFID)NFC Smart Phones NFC = Near Field Communications Frequency = 13.56Mhz Protocol = ISO Millions sold Technology designed to emulate contactless cards Can EASILY be reversed to read contactless cards The Problem

Nashville News Story

Which phones have NFC capabilities? Which smartphones? Galaxy Nexus Verizon Nexus S Sprint T-Mobile Android HTC One X HTC One XL Nexus S Google Nexus S 4G Samsung Galaxy S II and III(not all versions) Samsung Galaxy Note (not all versions) Galaxy Nexus HTC Amaze 4G Huawei Sonic T20 Huawei Sonic (U8650NFC-1) Sony Xperia S Sony Xperia P Sony Xperia SOLA Turkcell T20 Turkcell T11 BlackBerry Blackberry Bold 9790 (Codename Bellagio) BlackBerry Bold 9900/9930 (Codename Dakota/Montana) BlackBerry Torch 9810/9860 Blackberry Curve 9350/9360/9370 And many more (from Wikipedia) Rumor is the next version of the iPhone will feature NFC

Electronic Pickpocketing via Trojan Application Smart Phone Applications can easily be written with hidden Trojan functionalities. Once an app or game containing a Trojan electronic pickpocketing function is downloaded your phone is always listening for nearby RFID cards. A smartphone left near a card has lots of time and processing power to attack even encrypted cards. Lots of code already published on the web for well known attacks on cards such as Mifare Classic and DESFire. Credit cards and debit cards are easy targets as there is no encryption that we have seen. Data can be delivered conveniently to attacker anywhere in the world via .

The Effect on YOU With new NFC capabilities, will you have to collect employee phones at the door? Should customer credit cards be shielded while passing through the restaurant? What about employees with building access cards?

Prevention Techniques Read the security warnings when downloading apps. If the app says it uses NFC and you can’t think of a good reason it should, DON’T install! Keep your cards in shielded sleeves, shielded wallets, or shielded badge holders.

What can restaurants do to help prevent this? Restaurants have contact with millions of people daily and make a great distribution point for protected Secure Sleeves®. Secure Sleeves can be customized with your brand. Your company provides a valuable service to the community by protecting them from payment fraud and in return you get a promotional mention every time the consumer opens their wallet.

Consumer Knowledge Millions of consumers already know about Secure Sleeves through media appearances by Identity Stronghold on 4 continents including over 60 local markets in the United States. Once they find out your restaurant is giving them out for free with each visit they will come back for more and tell their friends. Seen On: *All logos copyright their respective owners.

Free Samples! Come by Identity Stronghold booth 104 today and pickup FREE SAMPLES. Don’t forget to enter the raffle. You could win one of our shielded Italian leather wallets. Watch WKYC TV Cleveland tonight after the Olympics. The Investigator Tom Meyer will be demonstrating how we used a skimmed card to make a purchase from one of the worlds largest online retailers. look under News then “The Investigator”

Contact Info and additional information Walt Augustinowicz – Founder/CEO Identity Stronghold 565 Paul Morris Drive Englewood, FL Website YouTube Video Demonstrations and News Stories