ATM ROBBERY  In first instance, there is a person who apparently is making a transaction at the ATM. Translated by: S.L. de Sánchez.

Slides:



Advertisements
Similar presentations
Completing the Hiring Proposal This section includes instructions on how to complete the Hiring Proposal Section 7.
Advertisements

How to Promote your event. Why should I promote my event? Promoting is the best way to get the word out about your event and get more people to participate.
Create and use your own Electronic Business Card Create and send a simple business card Traditional paper business cards have been around for a long time.
Chapter 4: Requirements Engineering
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
Use Case Diagrams Damian Gordon.
ATM SCAM  At first glance it would appear as though this individual is simply performing a simple ATM transaction.
2.7.1.G1 © Family Economics & Financial Education – December 2005– Get Ready to Take Charge of Your Finances – Electronic Banking Bonanza – Slide 1 Funded.
EMEA Chip & Pin Terminal Training Videos & Instructions
How to use a scanner Throughout this slide show there will be hyperlinks (highlighted in blue) follow the hyperlinks to navigate to the specified Topic.
© 2008 Eyeblaster. All rights reserved Presented by: Limor Nadav-Greenberg ● Solution Specialist ● 26 st Aug 2009 New Publishing Process EB Orange 246/137/51.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
California MEDITECH Info Systems 6.0 How to Manage Your Patient List
1 of 2 Going on vacation requires careful preparation and there are a number of things you should do at the office before taking extended time off. This.
ATM User Interface V3. I/O Devices Input: Keyboardfor input, option select Keyboardfor input, option select Or Touch screen Or Touch screenOutput: Screenfor.
Sequence Diagrams. Introduction A Sequence diagram depicts the sequence of actions that occur in a system. The invocation of methods in each object, and.
Chapter 12 ATM Case Study, Part 1: Object-Oriented Design with the UML
Checking Accounts Consumerism. Objectives By the end of this lesson, TLWBAT: 1.Write a check 2.Complete a check register.
PAYware Mobile Android Comparison June Discussion Topics Obtaining the App PAYware Mobile App.
Events & Messages Paul Ard Ales v2.0. Generic Exceptions  HardwareFail – the device does not respond  HardwareMalfunction – some part of the device.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
By Kieran and Zak.  The Lebanese fraud is when.a loop of tape is inserted in to the card slot.the customer inserts card and the x- ray film tape is put.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
{ How to Use An ATM A simple tutorial to teach how to use ATM Machines.
CARD THEFT USING ATMS PERSONAL OPSEC. ATM THEFTS  In the first slide you see an individual who appears to be making a bank transaction at the ATM.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
Tutorial Video basic skills basic skills Next page -->
Identity Theft Your Problem, Not Mine. What can an identity thief do with your info? 1. Apply for a new driver’s license 2. Open a new bank account and.
This tutorial is a “suggested workflow” to help with sending documents to Referring Providers via Starpanel. The Provider Communication Wizard is an application.
Smartphones for Seniors Apps presentation by WIT Software.
Database Applications – Microsoft Access Lesson 9 Designing Special Queries Updated 4/11.
2.7.1.G1 © Family Economics & Financial Education – December 2005 – Get Ready To Take Charge of Your Finances – Electronic Banking Bonanza Funded by a.
My Daily Tasks. Game My Daily Tasks a simulation & immersion game of everyday tasks that new immigrants to the U.S. may encounter.
Jeopardy Power Point Directions-- Possible Classroom Game Directions (1)Create 2 teams in the classroom. For example, the right side of the class can compete.
Handheld Delivery Customer Feedback Survey March 2013.
Proper Calculator Keyboards and Attachable Overlays Jake Schwartz.
SFWR ENG 3KO4 Software Development Fall 2009 Instructor: Dr. Kamran Sartipi Software Requirement Specification (SRS) for the Automated Banking Machine.
SFWR ENG 3KO4 Software Development for Computer/Electrical Engineering Fall 2009 Instructor: Dr. Kamran Sartipi Software Requirement Specification (SRS)
NITWITS NITPICKING Ard Bahlman. Assumptions  “A customer will be required to insert an ATM card and enter a personal identification number (PIN) which.
What are Sequence Diagrams? Collaboration Diagrams allow designer to specify message flow between collaborating objects –Focus on relationship between.
SIMSWeb “Internet Remote Access” The most advanced central station software in the universe !
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Physical Inventory Training Class. Physical Inventory Why do we take inventory? –Inventory is a check and balance of how the system is performing. –It.
Business Math 3-2 Electronic Banking. Start up Marc uses his charge card to pay for almost everything he buys. Lenore pays for most of her purchases with.
OCS NOVELL SOFTWARE. Novell Clients Typical Novell Configuration Novell Server Print jobs retained in server queue(s)
1 Requirements Engineering From System Goals to UML Models to Software Specifications Axel Van Lamsweerde.
Use Case Diagrams. Introduction In the previous Lecture, you saw a brief review of the nine UML diagrams. Now that you have the clear, you'll start to.
Lecture Outline Monday 23 rd February (Week 4) 3 – 3:10pm Review of Requirements Eng. and use cases 3:10 – 3:40pm Exercise on Use Case 3:40-4:40 Class.
3M Partners and Suppliers Click to edit Master title style USER GUIDE Supplier eInvoicing USER GUIDE The 3M beX environment: Day-to-day use.
Daar is geen woord Chinees bij. Follows the push model, messages are not initiated by the software 2.
IDENTITY THEFT WHAT WE SHOULD KNOW!!!. Standard/Objective: Standard 3 - Objective 4 Describe the rights and responsibilities of buyers and sellers under.
Narragansett Council Online Registration
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
Easy Steps to Send Money in Quick Pay
Data-Basics Training & Support
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
How An ATM Work's Prepaid by, kakani Dinesh.
Data-Basics Training & Support
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Protecting Your Identity
Figure 28.1 POS Conversion Customer’s Bank Merchant’s Bank Customer
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Building a Tissue Paper Hot Air Balloon
I am about to give you a lot of information.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Presentation transcript:

ATM ROBBERY  In first instance, there is a person who apparently is making a transaction at the ATM. Translated by: S.L. de Sánchez

 What he is really doing is placing a trap in the ATM to “capture” the card of the next user. SETTING THE TRAP Translated by: S.L. de Sánchez

THE WARNING  Altering an ATM is a risky business. These individuals work in teams to warn of any possible eye witnesses and/or some potential victims. Translated by: S.L. de Sánchez

 Here we can see the next client using the ATM after the trap has been set. He inserts his card and starts a transaction. THE VICTIM Translated by: S.L. de Sánchez

THE CAPTURE  The card has been captured and the confused client is asking himself why the card is stuck. Anyways, there we see the help (HELP?) coming. Translated by: S.L. de Sánchez

THE HELP  Here we see the thief pretending to help. What he is actually trying to do is to get the PIN number now that he has captured the card. Translated by: S.L. de Sánchez

GETTING THE PIN  He convinces the customer that he can retrieve the card if he [the customer] types his PIN number while he presses both “cancel” and “enter” buttons. Translated by: S.L. de Sánchez

GIVING UP  After several attempts, the customer is convinced that the ATM has captured his card. Both, customer and Thief, leave the ATM. Translated by: S.L. de Sánchez

RETRIEVING THE CARD  Satisfied that the area is clear, the thief returns to the ATM to get the captured card. He not only has the card but also the customer’s PIN number. Translated by: S.L. de Sánchez

RUNNING AWAY  In possession of the card and PIN number, the thief leaves the ATM and takes with him $1, dollars from the account. Translated by: S.L. de Sánchez

THE TRAP  The trap is made of X-ray paper, which is preferred by thieves because of its dark color similar to the plastic frame of the ATM slot. Translated by: S.L. de Sánchez

PLACEMENT  The trap is then inserted into the ATM slot. Taking care of not fully inserting the trap, the ends are filled with glue to stick them to the top and the bottom of the cleft. Translated by: S.L. de Sánchez

INVISIBLE  Once both ends were glued is almost impossible to be noticed by customers. Translated by: S.L. de Sánchez

WHY THE CARD IS CAPTURED?  Cuts are made on both sides of the trap to prevent the card being returned prior to completing the transaction. Translated by: S.L. de Sánchez

RETRIEVING THE CARD  Once the client is gone, and the PIN number was obtained, the thief can remove the glued ends and holding both ends he simply pulls out the trap and gets the captured card. Translated by: S.L. de Sánchez

RECOMMENDATIONS 1. Once the client’s card is retained, he/she must check if the slot does not have both ends of the trap attached to it, if so, pull out the trap and retrieve your card. 2. Immediately report the event to the Bank. Translated by: S.L. de Sánchez

SEND THIS MESSAGE TO ALL YOUR FAMILY AND FRIENDS PEDRO A.MORALES DUEÑAS Translated by: S.L. de Sánchez