CARD THEFT USING ATMS PERSONAL OPSEC. ATM THEFTS  In the first slide you see an individual who appears to be making a bank transaction at the ATM.

Slides:



Advertisements
Similar presentations
Report: ID theft claims 27 million victims over last 5 years WASHINGTON - More than 27 million people have been victims of identity theft in the last five.
Advertisements

What Are the Functions of ATM Machines?
Chapter 4: Requirements Engineering
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
ATM SCAM  At first glance it would appear as though this individual is simply performing a simple ATM transaction.
2.7.1.G1 © Family Economics & Financial Education – December 2005– Get Ready to Take Charge of Your Finances – Electronic Banking Bonanza – Slide 1 Funded.
Using the Agile Fleet Commander Kiosk Located in the Humphreys Service Building staff break Area across from room 118 Please call Facilities Customer Service.
ATM Security Requirements & Specification Decomposition Team B: Martijn Christiaan Vasilis Benjamin.
Team 2 Tyler Brun Ashlea Krupa Seung Ho Park Gage Hermanson.
Introduction to Software Testing Chapter 2.6 Graph Coverage for Use Cases Paul Ammann & Jeff Offutt
USE CASE – ATM EXAMPLE Actors: ATM Customer ATM Operator Use Cases: The customer can withdraw funds from a checking or savings account query the balance.
SWE 214 (071) Use Case Diagrams Slide 1 Use Case Diagrams Examples.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Direct Attacks on Computational Devices
Sample Check Register. Sample Blank Check Register.
1.2.2.G1 © Take Charge Today – Revised May 2010 – Electronic Banking Bonanza – Slide 1 Funded by a grant from Take Charge America, Inc. to the Norton School.
Debit Card Plastic card that looks like a credit card
ATM Case Study A Discussion.
SEACORK INSTALLATION ON A CATAMARAN The first step is to make templates of all corner pieces to be cut from sheet material, which will be used for border.
S.M.A.T.E. Serving Money Around The Earth The Revolutionary ATM Irvin Shen, Juan Favela, Sam Ammons, and Christopher Leonardi.
ATM – requirements Team B Tom Hastjarjanto Martijn Nijenhof Ales Sturala Paul van der Ende.
ATM User Interface V3. I/O Devices Input: Keyboardfor input, option select Keyboardfor input, option select Or Touch screen Or Touch screenOutput: Screenfor.
Sequence Diagrams. Introduction A Sequence diagram depicts the sequence of actions that occur in a system. The invocation of methods in each object, and.
Checking Accounts Consumerism. Objectives By the end of this lesson, TLWBAT: 1.Write a check 2.Complete a check register.
Unit 211 Requirements Phase The objective of this section is to introduce software system requirements and to explain different ways of expressing these.
Events & Messages Paul Ard Ales v2.0. Generic Exceptions  HardwareFail – the device does not respond  HardwareMalfunction – some part of the device.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
By Kieran and Zak.  The Lebanese fraud is when.a loop of tape is inserted in to the card slot.the customer inserts card and the x- ray film tape is put.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
{ How to Use An ATM A simple tutorial to teach how to use ATM Machines.
Registration Steps for Registration Steps for :. Go to Choose Register/Purchase Access where you see.
Quality Education for a Healthier Scotland Create and Archive Admin Accounts For Administration Teams (Deanery regional teams, Primary and Secondary Care)
Identity Theft Your Problem, Not Mine. What can an identity thief do with your info? 1. Apply for a new driver’s license 2. Open a new bank account and.
Smartphones for Seniors Apps presentation by WIT Software.
Electronic Payment Systems
Members Ashley-Gail Wright Jade Mills Sami-Jo Bryant Ruth-Ann Robinson Kimberly Grey.
Preventing Financial Exploitation of Vulnerable Adults in Missouri Preventing Financial Exploitation of Vulnerable Adults in Missouri Missouri Department.
Welcome! Congratulations! You are qualified to participate in Room Selection ! The information contained within these slides will guide you through.
ATM ROBBERY  In first instance, there is a person who apparently is making a transaction at the ATM. Translated by: S.L. de Sánchez.
Digital Camera Basics Misty Freeman Georgia CTAE Resource Network 2010.
Welcome to the SPAA Online Exam Tutorial This short presentation aims to demystify the online exam process and give you peace of mind as you undertake.
Banking Math 10 Essentials. Banking Transactions A bank is an financial institution which deals with cash, domestic and foreign, receives and stores deposits.
A Euronet Worldwide Company Welcome to epay WebPOS! Use this index to find detailed instructions for WebPOS and begin taking payments today!! 1.Downloading.
Learning Intentions Explain what an ATM is and the facilities offered Identify the stages of withdrawing cash from an ATM List the advantages and disadvantages.
Throwin’ Caution Masking Tape Throwin’ Caution Position graphic exactly where you want it on surface using tape, make sure to tape The middle section securely.
OCS NOVELL SOFTWARE. Novell Clients Typical Novell Configuration Novell Server Print jobs retained in server queue(s)
When the program is first started a wizard will start to setup your Lemming App. Enter your company name and owner in the fields designated “Company Name”
When the program is first started a wizard will start to setup your Lemming App. Enter your company name and owner in the fields designated “Company Name”
ATM Fraud. Lost/stolen cards The Lost or Stolen physical card is becoming less of a target The data that can be skimmed is much more valuable and any.
1. Setting up an account- technical
Daar is geen woord Chinees bij. Follows the push model, messages are not initiated by the software 2.
IDENTITY THEFT WHAT WE SHOULD KNOW!!!. Standard/Objective: Standard 3 - Objective 4 Describe the rights and responsibilities of buyers and sellers under.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
How An ATM Work's Prepaid by, kakani Dinesh.
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
“Lesson – Installing Material Cartridge and Printing a File”
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
C140 Navigation System Upgrade Manual
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
C140 Navigation System Upgrade Manual
I am about to give you a lot of information.
How To Avoid Being A Victim
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Presentation transcript:

CARD THEFT USING ATMS PERSONAL OPSEC

ATM THEFTS  In the first slide you see an individual who appears to be making a bank transaction at the ATM.

 What he really is doing is installing a trap in the ATM to “capture” the card of the next user. Placing the trap

Lookout Warning  Tampering with an ATM is a risky business, these individuals work in teams. The lookout warns of any possible eye witnesses / or of the next potential victim.

 Here we see the next client using the ATM, after the trap has installed. He inserts his card and begins his transaction. The Victim

Springing the TRAP  The card has been captured, with the client wondering how this came about. It is at this point that the perpetrator will make an appearance pretending to offer assistance to the client-victim.

Honest,Samaritan Offering HELP  We see here the perpetrator pretending to assist the client; but in reality he is trying to know the client’s ATM PIN.

Gaining access to the PIN  The perpetrator assists the client by teaching him that his ATM card can be recovered by pressing his PIN; after which the perpetrator will press the “Cancel” and “Enter” button.

Situation Hopeless, “They Leave”  After several attempts the client is convinced that he can no longer retrieve his card; thus client leaves the ATM booth with the perpetrator appearing to be following suit.

Recovering the CARD  The perpetrator, once is he is assured that the client has already left the premises, returns to the ATM booth to recover the captured card from the trap he has installed; because he has knowledge of the PIN, he now has access to the client’s account balance.

The Escape  The perpetrator now leaves the ATM booth after withdrawing the balance from the client’s ATM account

THE TRAP  The trap is an X-Ray film, which is popularly used for ATM thefts because of its black color that is similar in appearance to the slot on the card reader.

Placing the TRAP  The trap is then inserted into the ATM slot. Care is taken not to insert the entire film into the slot, the ends are folded and contain glue strips for better adhesion to the inner and outer surface of the slots.

INVISIBLE  Once the ends are firmly glued and fixed to the slot, it is almost impossible to detect by unsuspecting clients.

How is your card confiscated?  Slits are cut into both sides of the trap, This prevents your card being returned prior to completing your transaction.

Retrieval of Confiscated card.  The perpetrator will remove the glued trap, by grasping the folded tips, he simply pulls the trap out that has retained your card.

RECOMENDATIONS.  1.-Once your card has been captured, observe the ATM slot and the card reader for any sign of tampering. If you see the film tips glued to the slot, unglue, pull the trap out and recover your card.  2.- Report the incident IMMEDIATELY to the BanK.

We encourage you to share this information with your family and friends.