ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

Report: ID theft claims 27 million victims over last 5 years WASHINGTON - More than 27 million people have been victims of identity theft in the last five.
© Annie Patton Credit Cards One of the most popular forms of credit Next Slide.
What Are the Functions of ATM Machines?
Chapter 4: Requirements Engineering
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Use Case Diagrams Damian Gordon.
ATM SCAM  At first glance it would appear as though this individual is simply performing a simple ATM transaction.
2.7.1.G1 © Family Economics & Financial Education – December 2005– Get Ready to Take Charge of Your Finances – Electronic Banking Bonanza – Slide 1 Funded.
EMEA Chip & Pin Terminal Training Videos & Instructions
USE CASE – ATM EXAMPLE Actors: ATM Customer ATM Operator Use Cases: The customer can withdraw funds from a checking or savings account query the balance.
SWE 214 (071) Use Case Diagrams Slide 1 Use Case Diagrams Examples.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Debit Card Plastic card that looks like a credit card
ATM User Interface V3. I/O Devices Input: Keyboardfor input, option select Keyboardfor input, option select Or Touch screen Or Touch screenOutput: Screenfor.
Sequence Diagrams. Introduction A Sequence diagram depicts the sequence of actions that occur in a system. The invocation of methods in each object, and.
Events & Messages Paul Ard Ales v2.0. Generic Exceptions  HardwareFail – the device does not respond  HardwareMalfunction – some part of the device.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
By Kieran and Zak.  The Lebanese fraud is when.a loop of tape is inserted in to the card slot.the customer inserts card and the x- ray film tape is put.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Callum Hunter. How can we design a cash machine that reassures the user ?
{ How to Use An ATM A simple tutorial to teach how to use ATM Machines.
CARD THEFT USING ATMS PERSONAL OPSEC. ATM THEFTS  In the first slide you see an individual who appears to be making a bank transaction at the ATM.
Identity Theft Your Problem, Not Mine. What can an identity thief do with your info? 1. Apply for a new driver’s license 2. Open a new bank account and.
Electronic Payment Systems
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Credit Cards One of the most popular forms of credit Next Slide.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
ATM ROBBERY  In first instance, there is a person who apparently is making a transaction at the ATM. Translated by: S.L. de Sánchez.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Welcome to the SPAA Online Exam Tutorial This short presentation aims to demystify the online exam process and give you peace of mind as you undertake.
NITWITS NITPICKING Ard Bahlman. Assumptions  “A customer will be required to insert an ATM card and enter a personal identification number (PIN) which.
Identity Theft By: Tiffany Goode and Jessica Jackson.
Learning Intentions Explain what an ATM is and the facilities offered Identify the stages of withdrawing cash from an ATM List the advantages and disadvantages.
OCS NOVELL SOFTWARE. Novell Clients Typical Novell Configuration Novell Server Print jobs retained in server queue(s)
Protecting Your Assets By Preventing Identity Theft 1.
Use Case Diagrams. Introduction In the previous Lecture, you saw a brief review of the nine UML diagrams. Now that you have the clear, you'll start to.
Lecture Outline Monday 23 rd February (Week 4) 3 – 3:10pm Review of Requirements Eng. and use cases 3:10 – 3:40pm Exercise on Use Case 3:40-4:40 Class.
ATM Fraud. Lost/stolen cards The Lost or Stolen physical card is becoming less of a target The data that can be skimmed is much more valuable and any.
Daar is geen woord Chinees bij. Follows the push model, messages are not initiated by the software 2.
IDENTITY THEFT WHAT WE SHOULD KNOW!!!. Standard/Objective: Standard 3 - Objective 4 Describe the rights and responsibilities of buyers and sellers under.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Acquire Safe Solution When Gmail Password Reset Required Toll Free Number
Protecting Your Assets By Preventing Identity Theft
One of the most popular forms of credit
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
SECURITY FEATURES OF ATM
Discover the Boom in Electronic Banking!
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
How An ATM Work's Prepaid by, kakani Dinesh.
How to resolve the not working issue of Yahoo mail?
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Figure 28.1 POS Conversion Customer’s Bank Merchant’s Bank Customer
2019 Convention Planner Training Using NCA Convention Central: Part I
Discover the Boom in Electronic Banking!
Two methods to observe tutorial
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
I am about to give you a lot of information.
Two methods to observe tutorial
How To Avoid Being A Victim
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
FRAUD AWARENESS FOR SENIORS
Presentation transcript:

ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.

Placing the trap What he really is doing is placing a trap in the ATM machine to “capture” the next user card.

Lookout Warning Altering the ATMs is a risky business, these individuals work in teams. The lookout warns of any possible eye witnesses / or of the next potential victim.

The Victim Here we see the next client using the ATM, after the trap has been set. He inserts his card and begins his transaction.

Springing the TRAP The ATM card is confiscated, and the customer is confused, asking himself, Why has my card been confiscated? However, here we see the cavalry coming to help, (HELP!!!).

Honest,Samaritan Offering HELP Here we see the thief pretending to help. What he is really doing is trying to gain the “customers” PIN, now that he has captured his card.

Gaining access to the PIN The good Samaritan convinces the “Customer” He can recover the card, if he presses his PIN at the same time the Samaritan press “cancel” and “enter”.

Situation Hopeless, “They Leave” After several attempts the “customer” is convinced his card has been confiscated. The “customer” and the Samaritan leave the ATM.

Recovering the CARD Satisfied the area is clear, the thief returns to recover the confiscated card from his trap. He not only has the card, he also has the PIN the “customer” provided unknowingly.

The Escape In possession of the card and the PIN he leaves the ATM with £4,000 from the “Customers” account.

THE TRAP The trap is made up of XRAY film, which is the preferred material by thieves; Simply because of the black color which is similar in appearance to the slot on the card reader.

Placing the TRAP The trap is then inserted into the ATM slot. Care is taken not to insert the entire film into the slot, the ends are folded and contain glue strips for better adhesion to the inner and outer surface of the slots.

INVISIBLE Once the ends are firmly glued and fixed to the slot, it is almost impossible to detect by unsuspecting clients.

¿How is your card confiscated? Slits are cut into both sides of the trap, This prevents your card being returned prior to completing your transaction.

Retrieval of Confiscated card. As soon as the “Customer” has gone, and they have your PIN , The thief can remove the glued trap, by grasping the folded tips, he simply pulls the trap out that has retained your card..

RECOMENDATIONS. 1.-Once your card has been confiscated, observe the ATM slot and the card reader for any signs of tampering. Should you see the film tips glued to the slot, unglue, pull the trap out and recover your card. 2.- Report IMMEDIATELY to the BanK.

Send this message to friends and family immediately.