Unlimited Cash-out Operations

Slides:



Advertisements
Similar presentations
Part IV. MONEY SERVICE BUSINESSES Another Money Laundering Trend.
Advertisements

Government Prepaid Card
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Cyber Crime The current threat to the UK Security Marking.
Time Share Fraud Investigations
Montana Digital Summit Cross Boundary Collaboration
Facts, Issues, and Considerations 7 May 2008 Steven Barnett Identity Theft.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
ATM Security Recommendations. n There are over 200,000 ATMs in the U.S. n Cash in ATMs ranges from $15,000 in small machines to $250,000 in larger bank.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
Role of Alberta Human Services at the POC in support of the delivery of Emergency Social Services ESS Forum
Presented by: Office of Homeland Security & Preparedness (OHSP)
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
ENFORCING THE RULES OF A NATION UNIT 1 – PART 2E.
Created by Curt Harrell & Jesse Kuzy for THE DEPARTMENT OF HOMELAND SECURITY.
Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
For Visa Internal Use Only Visa Europe This information is not intended, and should not be construed, as an offer to sell, or as a solicitation of an offer.
Comparative Criminal Justice Systems AN INTERNATIONAL PERSPECTIVE ON POLICING Reichel / Dammer and Fairchild.
Division of Emergency Management & Homeland Security Department of Emergency Services & Public Protection June 25, 2013 Connecticut All-Hazards Response.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
SSA, Todd Petrie The AMLA Presentation: 3/18/2009.
Cyber Security Nevada Businesses Overview June, 2014.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
ITS Emergency Management Are You Prepared? Philip R. Mann, P.E. City of Gainesville, Florida Public Works Department.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Title: U.S. Department of Homeland Security Small Vessel Security Strategy Author: Sean K. Moon Economy: United States of America.
Executive Branch. Executive Office Advise the president on important matters White House Staff – “the President’s people” Vice President – Only job given.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
1 Intellectual Property Rights Investigations Office of Investigations U.S. Immigration and Customs Enforcement Department of Homeland Security.
National Model Scanning Tour “Communications”. The Iowa Department of Public Safety administers a trusted statewide network of servers, PCs, service.
Cyber Defense: The Industry point of view Asgeir Myhre Managing director Teleplan Globe AS (Norway)
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Fraudulent and Questioned Documents. Top 5 Countries Originating Fraud.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
Security Partnership By Kevin Hegner Public Private.
Early Warning Law Enforcement Insights on Emerging Trends and Typologies 11:10 – 12:15 PM, Yale Club, New York.
Overview of the EB-5 Program
Role and Functions of ARINSA
Exercise Station Guardian 2016 Crisis Communications Case Study
Maritime Security as an Integral Part of an
Nation State Actors Lex Dunlap.
Presented by: Assistant Superintendent Debra Thompson
Hotline Data Collection Form
Juniper Software-Defined Secure Network
International TOP ups Business presentation
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
UCD Centre for Cybersecurity & Cybercrime Investigation
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
Public Facilities and Cyber Security
Introduction to asset recovery in Poland and Wielkopolska region, along with the presentation of the invited guests and discussion of thematic areas presented.
Attribution & the globalization of criminal evidence
City Police Departments and Santa Barbara Sheriff
ITIS 6200/8200: HCIP 6200 Principles of Information Security and Privacy Dr. Weichao Wang.
Career Paths in Accounting
Cybersecurity – Three Perspectives
ITIC 2017 Hourly Cost of Downtime and Minimum Reliability Requirements Survey March/April 2017 Laura DiDio Principal.
Findlay Creek Safety Meeting March 21st, 2018
Network Intrusion Responder Program
Forensics Week 12.
JIT Veto Match Fixing Press Conference
OperationOC Operational Area Orange County Rescue Mission’s
Crime DOES Pay (Unless you get caught)
Conquest-Financial Services
Federal Law Enforcement
Prosecuting International Intellectual Property Crimes
Introduction to: National Response Plan (NRP)
A Secret Service Perspective on Credit Card Fraud
IBM Software A financial services company speeds up fraud detection Protecting customers and innovating new product offerings with an IBM business rules.
Presentation transcript:

Unlimited Cash-out Operations CASE STUDY Unlimited Cash-out Operations 4/4/2019

Organizational Structure Responsible for targeting, planning, funding, & executing operations. Hackers & Patrons… 3-5 % COMMAND The Operations & Business Unit of the Organization. Highly Trusted group in direct Comms with the command. 10-12% CONTROL 25% FRONT LINE MANAGEMENT Recruit & Run One or more cashing crews. Usually local & directly involved in cashing. 60% CASHERS, RUNNERS & DROPS Conduct physical cashouts, launder funds, assist in moving proceeds to management United States Secret Service U.S. Department of Homeland Security

Fraudulent ATM Transactions Case Study Fraudulent ATM Transactions $13.5 Million in losses over a single weekend Russia $1.63 Million Canada $1.78 Million Great Britain $1.05 Million Ukraine $1.53 Million Las Vegas, NV $1.67 Million France $195,000 Romania $1.08 Million Atlanta, GA $328, 716.40 Pakistan $391,000.00 Cyprus $504,000.00 Egypt $633,000.00 Mexico $563,000.00 Columbia $100,000 Earlier I said iWire and the operations that followed were the biggest of their kind. I was wrong Again, the USSS is the agency responding to the largest intrusions of it’s kind worldwide. You don’t see any other law enforcement handling large investigations of this kind. We get called to investigate these case and we are successful because as an agency leverage the full might of our capabilities when we investigate them. Real time observation by USSS, real time notification to the victim. The cash out operation ran for 3 days. The US Secret service took immediate efforts to identify the victim and to conduct triage. - More than 15,000 transactions in less than 48 HOURS. - TRANSACTIONS IN 18 COUNTRIES & 5 STATES (Total of 140 Cities) - UTILIZED 21 COMPROMISED PREPAID CARDS ASSIGNED TO LARGE NON-PROFIT - Attack targeted Linux, Unix & Windows devices…More than 500 systems on the victims network affected - More than a dozen compromised attack servers utilized across the world – each server had 3+ months of pre- attack surveillance

Unlimited OPS – Transnational Investigation CASE STUDY Unlimited OPS – Transnational Investigation 4

Unlimited OPS – Ongoing Investigation CASE STUDY Unlimited OPS – Ongoing Investigation 5

CASE STUDY Potential Fraud Loss: $ 2,000,000,000 Actual Fraud Loss: $ 50,000,000 (approximate) 33 Subjects Arrested; More at Large $750,000 seized in the United States Extensive cooperation with both Domestic/International Law Enforcement and Private Sector Partners. 6