SlideShare a Scribd company logo
1 of 40
Card Fraud and Identity Theft Michael D. Herr, VP, Card Fraud Strategy Manager 3/7/2007 Cyber Crime Hits the Big Time in 2006 Experts Say 2007 Will Be Even More Treacherous Online job scammers steal millions Elaborate con is 'out of control,' authorities say Debit card thieves get around PIN obstacle Wave of ATM fraud indicates criminals have upped the ante Easy check fraud technique draws scrutiny Ever written a check? Your account could be targeted, too Ameritrade warns 200,000 clients of lost data Account information, including SSNs, on missing tape ATMs may be an easy target for thieves  Police uncover debit-card skimming at Calgary gas station  1
Table Of Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3
Introduction   (Continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4
[object Object],Historical Fraud Evolution Historically, most fraud scenarios impacted single consumers and typically only had a single type of fraud. CURRENCY CREDIT APP CREDIT CARD Physical remove of checks. Purse stolen, vehicle stolen, house burglarized. Occasional forgeries or alterations or counterfeit Occasional mail theft Single consumer  impact Physical removal of card. Purse/Wallet stolen, vehicle stolen, card physically left somewhere. “ Card Not Present” (Phone/ Internet) Occasional mail theft Occasional counterfeit cards Single or limited cardholder impact Utilizing stolen information or invalid information to apply for credit with another persons credentials Partial information Single consumer impact  Physical removal of cash from consumer.  Purse/Wallet, desk, auto or home are common sources Single consumer impact CHECK Most fraud scenarios, were preceded by the physical removal of the financial instrument.  Quality of counterfeit devices or information was average at best. Each scenario has different, relatively reliable control mechanism that could be could be applied to control the fraud events and limit impact. 5
Today’s Fraud – A Convergence of Threats ,[object Object],LOANS CHECKING SAVINGS INVESTMENTS LOC’s BRANCH PHONE ATM WEBSITE ATM ACH CHECKS DEBIT CD WIRE CREDIT CD MERCHANTS INSURANCE EDUCATION MEDICAL GOVERNMENT MAIL STORE PHONE KIOSK WEBSITE MAIL Financial Products Access Points Transaction Conduits Consumer Relationships Access Points SECURITY SOFTWARE VENDORS TEMP EMPLOYEES RECORD STORAGE PROCESSORS Merchant Relationships CUSTOMER CRIMINAL SKIMMING WEB SPOOFING KEY LOGGING MAIL THEFT PHISHING HACKING DATA THEFT BURGLARY 6
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Today’s Fraud – Data Acquisition/Aggregation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],7
Today’s Fraud – Data Acquisition/Aggregation Criminals utilize hacking techniques to identify merchants or other entities inappropriately storing card Non-Magnetic stripe data.  Card Non-Track data (CVV2, EXP Date, E-Mail Address, Name, Phone #, Address) obtained by criminals. Nikon World Magazine Moneygram International Credit/Debit Card Non-Magnetic Stripe Information Aggregated Data Warehouse TJX Enterprises Card Systems Solutions Credit/Debit Card Magnetic Stripe Information Criminals utilize hacking techniques to identify merchants or other entities inappropriately storing card magnetic stripe data. Card track data (CVV, Name, EXP Date, Service Code, PIN Block & Card Number obtained by criminals. PHISHING/Key Loggers PROBING - .COM/VRU Criminals employ various techniques such as PHISHING e-mails designed to look like financial institution correspondence or Key Loggers to covertly acquire data. Also brute force attacks , that employ repetitive attempts at non-traditional points that utilize the PIN# as authentication (VRU/.COM) Data captured not limited to PIN, CVV2, e-mail address, address, card number, VbV sign-on password also at risk Personal Information Credit Monitoring Services DMV//Universities Criminals employ various hacking techniques to gain access to non-financial institution databases that contain personal information.  Examples include; Credit Monitoring Agencies, Universities, DMV’s etc. Alternatively, criminals infiltrate the above institutions with employees. Additional non-card related data captured such as; Maiden Name, DOB, PH #’s, Place of Birth, Residence Info, Vehicle Info, Driver Info and Credit Info. Debit Card PIN # 8
Today’s Fraud – Data Acquisition/Aggregation Card Track Data 4060000000001234|0809| TESTSUBJECT|001|09|1|A Other Card Data 487|TESTSUBJECT|6141231234|111MAIN ST|COLUMBUS|OH|12345|TEST@AOL.COM PIN # + Additional 1234|765|TEST@AOL.COM|111MAINST| COLUMBUS|OH|VBVPURCH|9999 Personal Information TESTSUBJECT|BROWN|06041969|6141231234| 123121234|WASHINGTONDC|GMCENVOY05 NET RESULT - CONSUMER DATA COMPILED FROM MULTIPLE SOURCES IS AGGREGATED AT SINGLE SITE! ,[object Object],[object Object],[object Object],[object Object],9
Today’s Fraud – Educational Facilities - Data Breaches ,[object Object],[object Object],[object Object],Source:  www.privacyrights.org  – A Chronology Of Data Breaches 10 Hacker Compromised University Server Containing Names, Addresses, Credit Card #’s, SS#’s, 180,000 June 2006 Institution # 9 Various Combinations of SS#’s, DOB’s, Addresses, PN#’s, Grades.  Information Contained Within Stolen Computers 13,084 Sept 2006 Institution # 8 Laptop Stolen SS#’s And Other Student Data 22,500 Nov 2006 Institution # 7 Hackers Gained Access To Database Containing Names, Addresses, SS#’s, DOB 800,000 Dec 2006 Institution # 6 Records Including SS#’s, Home Address, PN#'s #, Email Add May Have Been Exposed VIA Network Intrusion 35,000 Dec 2006 Institution # 5 Document Containing SS#’s of 15,000 Students Transmitted Over Non-Secure Connection 15,000 Dec 2006 Institution # 4 Financial Aid Applications From 2 Stolen Computers. Data Included Names, SS#’s, DOB, PN#’s, DL #’s And Asset Lists 5,015 Jan 2007 Institution # 3 Envelopes not folded properly on IRS1098T Form SS#’s exposed. 750 Feb 2007 Institution # 2 Exposed on university website. Names Addresses, SSN#, Some Credit Card #’s 65,000 Feb 2007 Institution # 1 Information # Of Individuals Date Institution
[object Object],[object Object],[object Object],[object Object],Today’s Fraud – Criminal Focus – PIN Based Focus WHY??? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],11
Today’s Fraud – Criminal Focus – PIN Based Focus – Contributing Factors ,[object Object],[object Object],[object Object],[object Object],[object Object],BANKS ,[object Object],[object Object],[object Object],[object Object],CONSUMERS ,[object Object],[object Object],[object Object],[object Object],MERCH/ACQUIERS/PROCESSORS ,[object Object],[object Object],[object Object],[object Object],[object Object],CRIMINAL 12
[object Object],[object Object],Today’s Fraud – Criminal Focus – Magnetic Stripe “Skimming” 4060111111111111341212320974JOHNQDOE0905*121240601111111111110905*1 Where does “Skimming” occur?  Just about anywhere that physical card transactions are present!  It can also occur at telecommunication points and processing sites that handle card transactions !  What is Magnetic Stripe  “Skimming”?  13
Today’s Fraud - “Skimming” Variants  - Device Examples Pass Through Reader – ATM “Skimming” PIN-Hole camera placed in close proximity to machine, captures PIN Fictitious card reader with exceptionally good craftsmanship Imposed over existing card reader of machine 14
Today’s Fraud - “Skimming” Variants  - Device Examples Transaction Inhibiting Device  – ATM “Skimming” Screen of false front actually is Pocket PC Partial front constructed with separate card reader (white). Imposed over existing ATM Screen.  Helpful sign to “assist” cardholder.  It advises the cardholder “ ATM operations have changed and directs cardholder to swipe card and enter PIN # on touch screen or follow on-screen instructions”. 15
Today’s Fraud -  “Skimming” Variants  - Device Examples Internal Re-Wiring or Completely Fictitious Machine Completely fictitious machine or existing machine (Requires vendor/employee collusion. Inner workings completely re-wired to capture stripe and PIN in clear before encryption occurs.  16
Today’s Fraud - “Skimming” Variants  - Device Examples Traditional POS – “Skimming” Devices + OR + Traditional splice Computer + POS Terminal  Traditional Wedge  + POS Terminal  17
[object Object],[object Object],Today’s Fraud - “Skimming” Variants  - Device Examples Emerging POS –  Potential “Skimming” Devices Pocket PC attachment magnetic stripe readers $ 229.99 – Next Day Shipping Not to exclude PALM OS fans, yours cost $199.99 18
Today’s Fraud - PHISHING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],19
Today’s Fraud - PHISHING ,[object Object],[object Object],[object Object],[object Object],[object Object],Source:  www. antiphishing.org 20
Today’s Fraud – PHISHING - Examples ,[object Object],[object Object],[object Object],[object Object],21
Today’s Fraud – PHISHING - Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],22
Today’s Fraud – PHISHING - Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],23
Fraud Myths – Classification – Problem Dictates Remedy ,[object Object],[object Object],[object Object],[object Object],[object Object],Source:  www.ftc.gov 24
Fraud Myths – Classification – Problem Dictates Remedy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],25
How Can Consumers Be Protected – Financial Institutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],26
How Can Consumers Be Protected – Financial Institutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],27
How Can Consumers Be Protected – Financial Institutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],28
How Can Consumers Be Protected – Industry Associations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],29
How Can Consumers Be Protected – Merchants/Schools/Other Data Points ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],30
How Can Consumers Be Protected – Merchants/Schools/Other Data Points ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],31
How Can Consumers Be Protected – Merchants/Schools/Other Data Points ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],32
How Can Consumers Be Protected – Merchants/Schools/Other Data Points ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],33
How Can Consumers Be Protected – Merchants/Schools/Other Data Points ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],34
How Can Consumers Protect Themselves ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],35
How Can Consumers Protect Themselves ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],36
How Can Consumers Protect Themselves ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],37
How Can Consumers Protect Themselves ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],38
How Can Consumers Protect Themselves ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],39
40

More Related Content

What's hot

Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftElizabeth Dimit
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudGeo Coelho
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Money Laundering in the Art, Collectibles, and Luxury Goods Industry
Money Laundering in the Art, Collectibles, and Luxury Goods IndustryMoney Laundering in the Art, Collectibles, and Luxury Goods Industry
Money Laundering in the Art, Collectibles, and Luxury Goods IndustryBrandonRuse1
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingIJSRED
 
Nascio who areyoue-authbrief122104
Nascio who areyoue-authbrief122104Nascio who areyoue-authbrief122104
Nascio who areyoue-authbrief122104Hai Nguyen
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Age Verificationn in the Alcohol industry
Age Verificationn in the Alcohol industry Age Verificationn in the Alcohol industry
Age Verificationn in the Alcohol industry BrandonRuse1
 

What's hot (19)

Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
White Paper 2011 BOC
White Paper 2011 BOCWhite Paper 2011 BOC
White Paper 2011 BOC
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Top online frauds 2010
Top online frauds 2010Top online frauds 2010
Top online frauds 2010
 
Money Laundering in the Art, Collectibles, and Luxury Goods Industry
Money Laundering in the Art, Collectibles, and Luxury Goods IndustryMoney Laundering in the Art, Collectibles, and Luxury Goods Industry
Money Laundering in the Art, Collectibles, and Luxury Goods Industry
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Nascio who areyoue-authbrief122104
Nascio who areyoue-authbrief122104Nascio who areyoue-authbrief122104
Nascio who areyoue-authbrief122104
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Age Verificationn in the Alcohol industry
Age Verificationn in the Alcohol industry Age Verificationn in the Alcohol industry
Age Verificationn in the Alcohol industry
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 

Viewers also liked

How the Stolen Credit Card Black Market Works
How the Stolen Credit Card Black Market WorksHow the Stolen Credit Card Black Market Works
How the Stolen Credit Card Black Market WorksTripwire
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionkalpesh1908
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label IssuersChristopher Uriarte
 
1 introdução à escatologia i
1 introdução à escatologia i1 introdução à escatologia i
1 introdução à escatologia ifaculdadeteologica
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionanthonytaylor01
 
Fatima Jinnah Medical College (FJMC) Lahore Merit List 2014
Fatima Jinnah Medical College (FJMC) Lahore Merit List 2014Fatima Jinnah Medical College (FJMC) Lahore Merit List 2014
Fatima Jinnah Medical College (FJMC) Lahore Merit List 2014Rana Waqar
 

Viewers also liked (9)

How the Stolen Credit Card Black Market Works
How the Stolen Credit Card Black Market WorksHow the Stolen Credit Card Black Market Works
How the Stolen Credit Card Black Market Works
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
 
1 introdução à escatologia i
1 introdução à escatologia i1 introdução à escatologia i
1 introdução à escatologia i
 
The City of Lahore
The City of LahoreThe City of Lahore
The City of Lahore
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Fatima Jinnah Medical College (FJMC) Lahore Merit List 2014
Fatima Jinnah Medical College (FJMC) Lahore Merit List 2014Fatima Jinnah Medical College (FJMC) Lahore Merit List 2014
Fatima Jinnah Medical College (FJMC) Lahore Merit List 2014
 

Similar to Naccu Card Fraud And Identity Theft

Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBakerTillyConsulting
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Anil Jain
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdfMerchantech - Payment Processing Services
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptxdarrengracia
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersCognizant
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docxwlynn1
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008ClubHack
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissectedamiable_indian
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments FraudChristopher Uriarte
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015James Sheehan
 
Credit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyCredit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyIJMER
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk MitigationBrandProtect
 

Similar to Naccu Card Fraud And Identity Theft (20)

Credit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptxCredit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptx
 
DRAFT 2 RP.docx
DRAFT 2 RP.docxDRAFT 2 RP.docx
DRAFT 2 RP.docx
 
HealthCo Accelerate 2016 speaker deck #2
HealthCo Accelerate 2016 speaker deck #2HealthCo Accelerate 2016 speaker deck #2
HealthCo Accelerate 2016 speaker deck #2
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
 
ID Theft
ID TheftID Theft
ID Theft
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments Fraud
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
 
Credit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyCredit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A Survey
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
 

Naccu Card Fraud And Identity Theft

  • 1. Card Fraud and Identity Theft Michael D. Herr, VP, Card Fraud Strategy Manager 3/7/2007 Cyber Crime Hits the Big Time in 2006 Experts Say 2007 Will Be Even More Treacherous Online job scammers steal millions Elaborate con is 'out of control,' authorities say Debit card thieves get around PIN obstacle Wave of ATM fraud indicates criminals have upped the ante Easy check fraud technique draws scrutiny Ever written a check? Your account could be targeted, too Ameritrade warns 200,000 clients of lost data Account information, including SSNs, on missing tape ATMs may be an easy target for thieves Police uncover debit-card skimming at Calgary gas station 1
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Today’s Fraud – Data Acquisition/Aggregation Criminals utilize hacking techniques to identify merchants or other entities inappropriately storing card Non-Magnetic stripe data. Card Non-Track data (CVV2, EXP Date, E-Mail Address, Name, Phone #, Address) obtained by criminals. Nikon World Magazine Moneygram International Credit/Debit Card Non-Magnetic Stripe Information Aggregated Data Warehouse TJX Enterprises Card Systems Solutions Credit/Debit Card Magnetic Stripe Information Criminals utilize hacking techniques to identify merchants or other entities inappropriately storing card magnetic stripe data. Card track data (CVV, Name, EXP Date, Service Code, PIN Block & Card Number obtained by criminals. PHISHING/Key Loggers PROBING - .COM/VRU Criminals employ various techniques such as PHISHING e-mails designed to look like financial institution correspondence or Key Loggers to covertly acquire data. Also brute force attacks , that employ repetitive attempts at non-traditional points that utilize the PIN# as authentication (VRU/.COM) Data captured not limited to PIN, CVV2, e-mail address, address, card number, VbV sign-on password also at risk Personal Information Credit Monitoring Services DMV//Universities Criminals employ various hacking techniques to gain access to non-financial institution databases that contain personal information. Examples include; Credit Monitoring Agencies, Universities, DMV’s etc. Alternatively, criminals infiltrate the above institutions with employees. Additional non-card related data captured such as; Maiden Name, DOB, PH #’s, Place of Birth, Residence Info, Vehicle Info, Driver Info and Credit Info. Debit Card PIN # 8
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Today’s Fraud - “Skimming” Variants - Device Examples Pass Through Reader – ATM “Skimming” PIN-Hole camera placed in close proximity to machine, captures PIN Fictitious card reader with exceptionally good craftsmanship Imposed over existing card reader of machine 14
  • 15. Today’s Fraud - “Skimming” Variants - Device Examples Transaction Inhibiting Device – ATM “Skimming” Screen of false front actually is Pocket PC Partial front constructed with separate card reader (white). Imposed over existing ATM Screen. Helpful sign to “assist” cardholder. It advises the cardholder “ ATM operations have changed and directs cardholder to swipe card and enter PIN # on touch screen or follow on-screen instructions”. 15
  • 16. Today’s Fraud - “Skimming” Variants - Device Examples Internal Re-Wiring or Completely Fictitious Machine Completely fictitious machine or existing machine (Requires vendor/employee collusion. Inner workings completely re-wired to capture stripe and PIN in clear before encryption occurs. 16
  • 17. Today’s Fraud - “Skimming” Variants - Device Examples Traditional POS – “Skimming” Devices + OR + Traditional splice Computer + POS Terminal Traditional Wedge + POS Terminal 17
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. 40