Prison Inmate Telephone Fraud in Brazil by clifford m jordan.

Slides:



Advertisements
Similar presentations
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Advertisements

BARBADOS 2013 RESPONSE OF INTERNATIONAL COMMERCIAL BANKS TO CARD PAYMENT FRAUD Presenter: Denver Frater Regional Director & Chief Security Officer Eastern.
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Recorder Selection Ask yourself 1. How many phones to record 2. How long do you want to save your recordings 3. How frequently do you want to search recordings.
PAPER PRESENTATION BY V.Priyanka CSE-A Roll no. 13K41A0548.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Globalisation and Transnational Crime Each slide can be advanced using a mouse click. Alternatively, moving the cursor to the: Right Hand edge of the.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up © 2009.
Identity Theft.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
2.02 – Understand Threats to Financial Security Gwishiri.
Presented By The Plano Police Department Crime Prevention Unit.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
International Fraud Scene Clifford M. Jordan February 13, 2007, Las Vegas, NV.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
FINANCIAL SOCCER Module 3 Credit, debit and prepaid cards Collect a quiz and worksheet from your teacher.
Scams awareness month.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Beware! Consumer Fraud Module 9.1.
Telemarketing Fraud: It’s a Crime University of Georgia Cooperative Extension Service Georgia Governor’s Office of Consumer Affairs.
Personal Finance Unit 2.02 Understand Threats to Financial Security.
Programming and Application Packages
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
OPERATION OF CELLULAR SYSTEMS
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
FOUR TYPES OF IDENTITY THEFT. 1. FINANCIAL IDENTITY THEFT  Just using your stolen credit card details to buy things is the example we all know about.
Banking Savings Checking Credit Cards
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Common Scams Lewis Collantine & Clare Cunningham Thurrock Trading Standards 8 th September 2015.
THOMSON REUTERS ACCELUS The Future of Regulation The Cost of Compliance vs The Cost of non-Compliance.
PHONE CLONING TECHNOLOGY
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
By: Asfa Khan and Huda Mukhtar
The rising standards of EU Mobile Payments October 2015 Jeremy King, International Director.
Kyle Purchase and Matt Mastrogiovanni
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Presented By Plano Police Department Crime Prevention Unit.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Unit Four Good Debt, Bad Debt: Using Credit Wisely.
Company Background  Started in 1899 in Abilene, Kansas  Originally known as Brown Telephone Company  Third largest U.S. Wireless Network Operator as.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Scams Awareness Month July Did you know? A scam is a scheme to con people out of their money. Other names for a scam include fraud, hoax, con, swindle,
Presented by Sandeep Kumar IT Final Year 08ESOIT048.
Scams Awareness Month July 2016
Protecting Your Assets By Preventing Identity Theft
Organised Crime in New Zealand
Gangs.
Presentation transcript:

Prison Inmate Telephone Fraud in Brazil by clifford m jordan

Prison Inmate Telephone Fraud in Brazil We will discuss: * Why do the prisoners need phones for. * How phones are smuggled into the prison. * The elaborate illegal networks that are setup in order to make free phone calls. * How to detect it and block it.

Objective behind the Frauds: Continuance of Gang Financing through: –Drug Trafficking –Arms Trafficking –Kidnapping / Ransoming –Other Miscellaneous Fraud Schemes Communication with Other Gang Leaders Prison Inmate Telephone Fraud in Brazil

How Prison Inmates gain access to phone networks: 1.Smuggling in of Cellular Phones: 2.Brought into the prison compound in various methods: a.Guards are paid off b.Smuggled inside of visitors Women claim to be menstruating and are thus allowed visiting rights without any physical searches. 3.Cell phones are obtained on the outside by gang members (often by girlfriends of the inmates) by various methods: a.Stealing Cell phones on the street b.Cloning CDMA phones c.Stealing people’s wallets or purses through car hijacking or holdups. Identifications are then stolen and cell phones are immediately purchased. d.Buying of identifications from street people Prison Inmate Telephone Fraud in Brazil

How Prison Inmates gain access to phone networks: 1.Most cell phones used by prison inmates are prepaid because in most cases identification is not validated for purchases of prepaid phones. 2. In addition to the use of cell phones, clandestine switches are often setup near prison complexes. Why? a.Switches are usually managed by girlfriends of the inmates who naturally live close by to facilitate cell phone smuggling. b.Allows for Radio patching if Cell phones signals are blocked Prison Inmate Telephone Fraud in Brazil

How Prison Inmates gain access to phone networks: 1.A Clandestine Switch is a pair of phone lines obtained and used illicitly that are setup to be conferenced together. 2.Why is this referred to as a Switch? Because it works like the old operator switches. Prison Inmate Telephone Fraud in Brazil

Prison Walls Just one second… Hey Darling, I wants to talk to Guido. Hey Guido!? Oh, Hi Mabel! Whatz up? Tony wants to talk to you… Sure, put him on the line… Hey Guido, we needs to talk about the shipment of goods… Those goods better arrive by Friday…or else! Clandestine Switch Prison Inmate Telephone Fraud in Brazil

Cell phones obtained through: Stealing Cell phones on the street Cloning CDMA phones Stealing people’s wallets or purses through car hijacking or holdups. Identifications are then stolen and cell phones are immediately purchased. Buying of identifications from street people Prison Walls Fixed Phones obtained from Local Phone Company via: Sub Fraud from Stolen Identifications Origin of Hardware Prison Inmate Telephone Fraud in Brazil

Prison Walls Origin of Hardware Prison Inmate Telephone Fraud in Brazil Fixed Phones rarely make LOCAL calls and thus are often not blocked by the local company. When Cell phones are blocked, they are disposed of and more are brought in.

Prison Walls Schemes Used Fraud Behavior: Callers make COLLECT calls via LD provider 1 to phone line B at Clandestine Switch Anti-Fraud Reaction : LD Provider 1 sees many collect calls to line B and blocks all LD calls billed to B B Fraud Reaction : Callers make COLLECT calls via LD Provider 2 to phone line B at Clandestine Switch Collect Calls via LD Providers “CSP Surfing” Prison Inmate Telephone Fraud in Brazil

Prison Walls Schemes Used Collect Calls via LD Providers B Prison Inmate Telephone Fraud in Brazil

Prison Walls Schemes Used Social Engineering / Call Forwarding B The CON: Fraud Operator B calls Res Client C (victim) and poses as a Telco Operator. Victim is offered a chance to win some money by participating in a contest. But first the victim’s name, address, and identity information must be validated. Victim then gives all identity information to fraudster. C Prison Inmate Telephone Fraud in Brazil

Prison Walls Schemes Used Social Engineering / Call Forwarding B The CON (continued): Fraud Operator B then calls Local Telco and poses as victim and orders Call Forwarding for line C. Local Telco C Prison Inmate Telephone Fraud in Brazil

Prison Walls Schemes Used Social Engineering / Call Forwarding B The CON (continued): Fraud Operator B then calls victim again the give the final instructions on how to enter the contest. Victim is then told a sequence of “secret” numbers to dial on the phone after the conversation that will “automatically” enter victim in the contest. C Prison Inmate Telephone Fraud in Brazil

Prison Walls Schemes Used Social Engineering / Call Forwarding B The CON (continued): Victim then hangs up the phone and dials the “secret” numbers in order to enter the contest. Those numbers in reality setup the phone with call forwarding to one of the cell phones of the fraudsters in prison (D). Now all calls to C will be call forwarded to fraudster D in prison. C D Prison Inmate Telephone Fraud in Brazil

Prison Walls Schemes Used Social Engineering / Call Forwarding B The Fraud Behavior: Victim will receive many collect calls via LD provider 1 which will all be forwarded to D. Anti-Fraud Reaction : LD provider 1 detecting the many collect calls will block all calls billed to C. Fraud Reaction : Callers will make COLLECT calls via LD Provider 2 to phone line C C D Prison Inmate Telephone Fraud in Brazil

Prison Walls Full Operation B C D Fraudster makes collect call to Clandestine Switch B and tells Operator he wants to talk to fraudster D in prison. Operator then calls collect to victim C which is then call forwarded to fraudster D in prison. Operator then conferences the two calls together. Prison Inmate Telephone Fraud in Brazil

Prison B Full Operation Variation: Prison to Prison Communications Prison A Prison B Clandestine Switch Prison A Clandestine Switch Prison B Call Forward Victim Prison A Call Forward Victim collect call forwarded collect call forwarded Prison Inmate Telephone Fraud in Brazil

Prison D Full Operation Variation: Prison to Prison Communications Prison C Clandestine Switch Prison B Call Forward Victim Prison A Call Forward Victim Prison BPrison A Clandestine Switch Prison D Clandestine Switch Prison B Clandestine Switch Prison D Call Forward Victim Prison C Call Forward Victim Prison Inmate Telephone Fraud in Brazil

Full Operation Variation: Operation of Major Crimes Prison A Call Forward Victim Prison A Clandestine Switch Gang Leaders in Prisons Manage their Gang Members on outside to continue with illicit activities such as: Drug Trafficking Arms Trafficking Kidnapping / Ransoming Money Laundering Prostitution Racketeering Contract Killing and much more… Product Piracy Prison Inmate Telephone Fraud in Brazil

Full Operation Variation: Other Social Engineerings Prison A Clandestine Switch Gang Leaders use clandestine switches to perform “Mass Market” Social Engineering Cons such as: Personal Information Con Death Threats Bank Information Con Etc…. Objectives: Steal Money Steal Identities Prison Inmate Telephone Fraud in Brazil

Detection 1.Look for residential lines receiving many collect calls 2.Look for residential lines with many call forwards 3.Look for res lines with combo of collect and call forwarded calls 4.Share this information across all LD and local Carriers to look for “CSP Surfing” Prison Inmate Telephone Fraud in Brazil

Prevention 1.Limit the number of lines a residential customer can install in a single location 2.Validate the customer – suspect fraud if lines installed for customer are distant from customer residence. Call existing lines to validate the customer. 3.Do not offer customer call forwarding services unless customer: 1.Is proven to be a good paying customer 2.Makes the request from the same phone that requires the service 4.Do not allow lines to call forward collect calls 5.Share information on such fraudsters with other Local and LD telcos 6.Block cell phone usage around prisons Prison Inmate Telephone Fraud in Brazil