Electronic Fraud Techniques Methodologies and Countermeasures Michael

Скачать презентацию Electronic Fraud Techniques Methodologies and Countermeasures Michael Скачать презентацию Electronic Fraud Techniques Methodologies and Countermeasures Michael

25610696a88d0c343f41cba1eac98072.ppt

  • Количество слайдов: 65

Electronic Fraud – Techniques, Methodologies, and Countermeasures Michael Schirling April 2008 Electronic Fraud – Techniques, Methodologies, and Countermeasures Michael Schirling April 2008

Context Extortion Credit card generators Fraud Schemes Trojan Horse scenarios Stock Trading Scams Murder Context Extortion Credit card generators Fraud Schemes Trojan Horse scenarios Stock Trading Scams Murder Child Exploitation Fraud Identity Theft

Context Armed bank robberies net an average of $7, 500 each for an annual Context Armed bank robberies net an average of $7, 500 each for an annual total of approximately $60 million. One-sixth of the money is recovered and 80% of offenders are incarcerated. The FBI estimates that cyber criminals net $10 billion annually, averaging $250, 000. 00 per heist with less than one percent of offenders going to jail (old figure circa 2000).

Cyberspace offenders: A non-exhaustive list Preferential sex offenders Terrorists Spies Hackers – trespasses for Cyberspace offenders: A non-exhaustive list Preferential sex offenders Terrorists Spies Hackers – trespasses for achievement Pranksters – defies authority Phreakers/Crackers Common criminals – for profit Disgruntled insiders *****

In August of 2001, a few men were hanging out in a parking lot In August of 2001, a few men were hanging out in a parking lot near the Arlington, Virginia, Department of Motor Vehicles (DMV) office. This was nothing new. Their fee was no more than $100 and most of their customers were illegal immigrants. “According to an FBI affidavit, on August 2, the men in the parking lot were approached by “three Arab males” in a van. The three men were asking about acquiring official identity cards. They accompanied the men in the van to a nearby attorney’s office and swore to their Virginia state residency. The three men in the van returned to the DMV offices with the proper documentation and were issued Virginia identification cards……. ”

“On September 11, they were among the 19 terrorists who hijacked the jetliners that “On September 11, they were among the 19 terrorists who hijacked the jetliners that crashed into the World Trade Center and the Pentagon. Apparently, more than half of the 19 hijackers boarded the aircraft with phony ID’s. Moreover, the terrorist who was convicted last year in the plot to blow up Los Angels International Airport used 13 identities that were pilfered from the membership roster of a Boston, Massachusetts, health club. ” “Clearly, identity theft is no longer confined to computer hackers and scam artist who are out to make a fast buck…. ” Sanford Wexler, Law Enforcement Technology, April 2002, P 28

STEALING THE OLD FASHIONED WAY Small gain, great risk Victim can ID you Victim STEALING THE OLD FASHIONED WAY Small gain, great risk Victim can ID you Victim can fight back Police can chase you Gun enhancements Long prison terms

STEALING VIA ELECTRONIC MEANS High profit- low risk No victim contact No weapon use STEALING VIA ELECTRONIC MEANS High profit- low risk No victim contact No weapon use Police undermanned and overwhelmed If caught- probation or misdemeanor The loot is delivered!

Top Personal Fraud Schemes Based on Yahoo Internet Life Assessment Top Personal Fraud Schemes Based on Yahoo Internet Life Assessment

Top Schemes Identity Theft Work at Home Fraud Credit Card Fraud Medical Treatments / Top Schemes Identity Theft Work at Home Fraud Credit Card Fraud Medical Treatments / Weight Loss Chain Letters Multilevel Marketing Free Goods Bioterrorism Products Auction Fraud

Top Schemes Advance Fee Loans Credit Repair Vacation Prize Promotion Advance-Fee Fraud International Sweepstakes Top Schemes Advance Fee Loans Credit Repair Vacation Prize Promotion Advance-Fee Fraud International Sweepstakes Web Cramming

Common fraud mechanisms Acquiring key pieces of someone’s identifying information in order to impersonate Common fraud mechanisms Acquiring key pieces of someone’s identifying information in order to impersonate them n Name n Address n Date of Birth n SSN n Mother’s maiden name n Account Numbers

Frauds n Take over financial accounts n Open new bank accounts n Applying for Frauds n Take over financial accounts n Open new bank accounts n Applying for loans n Applying for credit cards n Applying for social security benefits n Purchase/Sell cars & merchandise n Renting apartments

n n n Renting apartments to further other criminal enterprise Establishing services with utility n n n Renting apartments to further other criminal enterprise Establishing services with utility and phone companies Forge/Counterfeit Checks Fraudulent use of stolen credit (checks/credit cards/etc) Commit crimes in another name

How They Do It Use low and high tech methods Shoulder surfing at ATMs How They Do It Use low and high tech methods Shoulder surfing at ATMs Steal your mail Stealing your pocketbook/wallet Dumpster diving Corrupting employees with access to data Check washing Check creation software

Hacking Unlawful entry, trespass, damage to computer systems Leaving/taking/changing information on the computers that Hacking Unlawful entry, trespass, damage to computer systems Leaving/taking/changing information on the computers that are infiltrated

Computer Viruses Computer programs that can damage computer systems Virus’s spread from one computer Computer Viruses Computer programs that can damage computer systems Virus’s spread from one computer to another via media, network, internet Virus Software protects your computer (Norton, Mc. Afee, PCcillin and Others) Updates – ensure your software is updated at least weekly

Web Page Fraud / Phishing Web Page Fraud / Phishing

“Nigerian” Letter Scam “Nigerian” Letter Scam

Protecting Yourself Businesses Protecting Yourself Businesses

Business Exposure Hardware theft Software theft Data corruption Loss of competitive/proprietary information Loss of Business Exposure Hardware theft Software theft Data corruption Loss of competitive/proprietary information Loss of employee productivity

Business Fraud Damages Your reputation Productivity Profitability Business Fraud Damages Your reputation Productivity Profitability

Cost of Workplace Fraud $400 billion annually according to the Association of Certified Fraud Cost of Workplace Fraud $400 billion annually according to the Association of Certified Fraud Examiners Insurance Fraud alone = $120 billion Approximately 6% of a companies annual revenue is lost to fraud

Preventing Internal Fraud – Your #1 Exposure Hiring practices Know your people Treat people Preventing Internal Fraud – Your #1 Exposure Hiring practices Know your people Treat people fairly (FBI Espionage Examples) Implement and maintain controls Require countersignatures & stamp incoming checks “deposit only” Have a code of ethics Conduct random audits Use passwords protection and encryption

Avenues of Deception Live – insiders and associates Social engineering attack On-line Avenues of Deception Live – insiders and associates Social engineering attack On-line

Policies Have a policies Post the policies Enforce the policies Make it known that Policies Have a policies Post the policies Enforce the policies Make it known that you enforce the policies Revisit the policies regularly

Response Procedures Have an incident response protocol Practice it Keep good logs, even it Response Procedures Have an incident response protocol Practice it Keep good logs, even it it costs you a bit more to store them Train your response personnel Develop a relationship with law enforcement and security vendors BEFORE an incident occurs

Check Fraud Risk n n n Checks stored with other material accessible to unauthorized Check Fraud Risk n n n Checks stored with other material accessible to unauthorized employees (or individuals). Maintenance & service personnel have access to that area. Both blank checks & outgoing written checks are left unattended. Creates employee temptation. PR aspect of fraudulent checks with your company name on them being returned to victims.

Check Fraud Prevention Measures: n n n Store blank check stock in a controlled Check Fraud Prevention Measures: n n n Store blank check stock in a controlled area. Consider dual access controls Consider a computer program to print blank checks from blank stock Be sure to enforce the computer access controls Review/delete bank authorization immediately after Employees leave the department.

Accounts Payable Controls Risk: n Improper wire, ACH or check payments Internal fraud payments Accounts Payable Controls Risk: n Improper wire, ACH or check payments Internal fraud payments n n Register states one payee; check another Counterfeit bills Prevention Measures: n n n Use an established institution for conducting ANH & wire transaction Establish a secure electronic transaction system with dual signoff required Pre-establish daily you’re a/P issue report

Other Suggestions: Encourage employees to use direct deposit If an employee check is lost Other Suggestions: Encourage employees to use direct deposit If an employee check is lost or stolen, be sure that they notify payroll immediately. Place a stop payment on the check. Purchase quality checks with security features: n n n Void feature if someone tires to copy your check. Chemical-sensitive paper with background patterns to reduce the risk of alterations. Eliminate duplication of already used check

Other Suggestions: Conduct employee screening check n Social security check n Reference checks (verify Other Suggestions: Conduct employee screening check n Social security check n Reference checks (verify phone numbers) n Credit check n Criminal check Document, train & enforce personnel policies & procedures

On the Business Side… People will try to defraud you of your products and On the Business Side… People will try to defraud you of your products and money Insist on full address and phone information on all orders – and verify it Do not accept orders with free e-mail accounts as the return address Use automated IP checking Beware of new payment methods like virtual checks until they have been fully accepted and tested

How to respond to a payment Fraud Check Fraud n Contact Account Officer immediately How to respond to a payment Fraud Check Fraud n Contact Account Officer immediately n If a check or draft item, obtain a copy of the front & back of the item n Identify all “hands” that handled the check (Internally & externally for the investigation). n File a police report; provide a copy to your Account Officer n Obtain & complete an Affidavit of Forgery for each item (Provided by Account Officer) n Notify your insurance carrier (if applicable) n Anticipate 60 -90 days to process claims

How to respond to a payment Fraud Employee fraud with loss: n n Consider How to respond to a payment Fraud Employee fraud with loss: n n Consider filing a 1099 for the amount of the loss (You have 3 years to file) Consider offering the employee the option to pay over time within three years at a defined pace to avoid tax filing & related tax consequences

ACH Debit Fraud Contact your Banking Account Officer immediately n n Account Officer can ACH Debit Fraud Contact your Banking Account Officer immediately n n Account Officer can initiate an “unauthorized transaction” return Account Officer can provide transaction detail, including the identification of the originator to enable you to approach the originator directly for repayment (be sure to ask for proof of authorization).

ACH Debit Fraud File a police report; provide your Account Officer with a copy. ACH Debit Fraud File a police report; provide your Account Officer with a copy. Notify your insurance carrier, if applicable Expect 60 -90 days to process claims If an employee fraud with a loss: n Consider filing a 1099 for the amount of the loss

Wire Transfer Fraud: Notify your Account Officer immediately n It may be possible for Wire Transfer Fraud: Notify your Account Officer immediately n It may be possible for the Bank to request the funds to be returned to your account, if the receiving account has not used the funds. n Be prepared to provide enough detail to your Account Officer to identify the wire transaction Your Bank account number Date transaction posted to your account Dollar amount Currency exchange sued Transaction reference number Receiving beneficiary's Bank name & beneficiary's name

Wire Transfer Fraud: Bank will likely start the process of requesting the funds from Wire Transfer Fraud: Bank will likely start the process of requesting the funds from the bank that initiated the wire If a series of banks were involved, the transaction must be processed in reverse order thru each bank Shut down the vulnerability that allowed the fraud to occur! n n De-activate the breached PIN De-activate the User ID/Password Block the account for wire activity If your account number was compromised, transfer to a new bank account number

Wire Transfer Fraud: If the Bank is unable to collect, you may have a Wire Transfer Fraud: If the Bank is unable to collect, you may have a loss. If the fraud was accomplished by your employee: n Consider filing a 1099

Safeguarding Your Assets Make security of information & accounts a primary concern Timely identification Safeguarding Your Assets Make security of information & accounts a primary concern Timely identification is critical Contact your financial institution as soon as you suspect anything Financial institutions can assist with services to help you effectively manage these risks

Card Present Key Entered Transaction Higher risk of accepting a counterfeit card. Check expiration Card Present Key Entered Transaction Higher risk of accepting a counterfeit card. Check expiration Date Make imprint Check terminal Obtain signature Match the account number – front to back Verify Signature

Card Present – Unsigned Card Request a signature – Ask cardholder to sign card Card Present – Unsigned Card Request a signature – Ask cardholder to sign card & provide current government ID Check signature on card to ID

Card Not Present Obtain an authorization Verify the card’s legitimacy Use fraud prevention tools Card Not Present Obtain an authorization Verify the card’s legitimacy Use fraud prevention tools n 3 digit security code n AVS Still questioning the transaction n Call your bank n Check telephone number n Hold item

e-Commerce Payment Card Industry Data Security Standard n Build & maintain a secure network e-Commerce Payment Card Industry Data Security Standard n Build & maintain a secure network n Protect cardholder data n Maintain a vulnerability management program n Implement strong access control measures n Monitor and test Networks n Maintain an information security policy Verified by Visa & Master. Card Secure. Code

Employee Accountability Fraud prevention training Posting fraud prevention reminders Prevent employee fraud scams Offering Employee Accountability Fraud prevention training Posting fraud prevention reminders Prevent employee fraud scams Offering rewards/incentives

Potential Signs of Fraud First time shoppers Larger then normal orders Orders include several Potential Signs of Fraud First time shoppers Larger then normal orders Orders include several of the same items Rush or overnight shipping Shipping to international address Transactions with similar account numbers Multiple cards from a single IP address

Potential Signs of Fraud (cont. ) Orders using free email services Orders using relay Potential Signs of Fraud (cont. ) Orders using free email services Orders using relay call service Purchasing a lot without regard to size, style, color or quality Makes purchases, leaves the store, and returns to make more purchases Makes large purchases right at the opening of the store or the closing Customer requests additional charge to card & then wire funds to another

Countermeasures Countermeasures

Computer Security Up-to-date operating system patches Virus Protection Firewall n n Hardware Software Computer Security Up-to-date operating system patches Virus Protection Firewall n n Hardware Software

Preventive Actions Promptly remove mail from your mail box or public areas Deposit outgoing Preventive Actions Promptly remove mail from your mail box or public areas Deposit outgoing mail in post office collection mail boxes or at your local post office Do not leave in unsecured mail receptacles Never give personal information over the telephone unless you initiated the call Shred pre-approved credit card applications, credit card receipts, bills and other financial information you don’t want Empty your wallet/purse of extra credit cards and IDs n

Preventive Actions Order your credit report from the three credit bureaus once a year Preventive Actions Order your credit report from the three credit bureaus once a year to check for discrepancies Never leave receipts at bank machines, bank windows, trash receptacles, or unattended gasoline pumps Memorize your SSAN and all your passwords Sign all new credit cards upon receipt

Preventive Actions Save all credit card receipts and match them against your monthly bills Preventive Actions Save all credit card receipts and match them against your monthly bills Be conscious of normal receipt of financial statements n Contact sender if they are not received on time

Preventive Actions Notify credit card companies and financial institutions in advance of any change Preventive Actions Notify credit card companies and financial institutions in advance of any change of address or phone number Never loan your credit cards to anyone else Never put account numbers on post cards or on the outside of an envelope If you applied for a new credit card and it hasn’t arrived in a timely manner, call the bank or credit card company involved

Preventive Actions Report all lost or stolen credit cards immediately Know your expiration dates Preventive Actions Report all lost or stolen credit cards immediately Know your expiration dates n Contact issuer if replacements are not received promptly

Personal Preventive Actions Beware of mail or telephone solicitations disguised as promotions offering instant Personal Preventive Actions Beware of mail or telephone solicitations disguised as promotions offering instant prizes or awards designed solely to obtain your personal information or credit card numbers Get a locking mailbox….

Internet and On-Line Services Use caution when disclosing checking account numbers, credit card numbers Internet and On-Line Services Use caution when disclosing checking account numbers, credit card numbers or other personal financial data at any web site or on-line service location unless you receive a secured authentication key from your provider When you subscribe to an on-line service, you may be asked to give credit card information n When you enter an interactive service site, beware of con artists who may ask you to “confirm” your enrollment service by disclosing passwords or the credit card account number you used to subscribe

Credit Reports Who to contact: Equifax Experian Information Solutions P. O. Box 105873 (Formerly Credit Reports Who to contact: Equifax Experian Information Solutions P. O. Box 105873 (Formerly TRW) Atlanta, GA 30348 -5873 Telephone: 1 -800 -997 -2493 P. O. Box 949 Allen, TX 75013 -0949 Telephone: 1 -800 -397 -3742 Trans. Union P. O. Box 390 Springfield, PA 19064 -0390 Telephone: 1 -800 -916 -8800

Action Steps For Victims Contact all creditors, by phone and in writing, to inform Action Steps For Victims Contact all creditors, by phone and in writing, to inform them of the problem Call your nearest Postal Inspection Service office and your local police Contact the Federal Trade Commission to report the problem – www. ftc. gov/idtheft Call each of the three credit bureau’s fraud units to report identity theft n Ask to have a “Fraud Alert/Victim Impact” statement placed in your credit file asking that creditors call you before opening any new accounts Alert your bank to flag your accounts and to contact you to confirm unusual activity

Action Steps For Victims Request a change of PIN and new password Keep a Action Steps For Victims Request a change of PIN and new password Keep a log of all contacts and make copies of all documents You may also wish to contact a privacy or consumer advocacy group regarding illegal activity Contact the Social Security Administration’s Fraud Hotline Contact the state office of the Department of Motor Vehicles to see if another license was issued in your name n If so, request a new license number and fill out the DMV’s complaint form to begin the fraud investigation process

Complaints Per Year 1992 35, 000 1998 550, 000 2005 2 Million Est. Complaints Per Year 1992 35, 000 1998 550, 000 2005 2 Million Est.

Federal Trade Commission Federal Trade Commission

Federal Trade Commission Federal Trade Commission

Helpful Links Federal Trade Commission http: //www. ftc. gov/bcp/conline/pubs/credit/i dtheft. htm Internet Crime Complaint Helpful Links Federal Trade Commission http: //www. ftc. gov/bcp/conline/pubs/credit/i dtheft. htm Internet Crime Complaint Center http: //www 1. ifccfbi. gov/index. asp State Laws pertaining to Identity Theft http: //www. identityrestoration. com/state_la ws. htm

Deputy Chief Michael Schirling Burlington, VT Police VT Internet Crimes Task Force 1 North Deputy Chief Michael Schirling Burlington, VT Police VT Internet Crimes Task Force 1 North Avenue Burlington, VT 05401 (802) 658 -2704 x 131 [email protected] org




  • Мы удаляем страницу по первому запросу с достаточным набором данных, указывающих на ваше авторство. Мы также можем оставить страницу, явно указав ваше авторство (страницы полезны всем пользователям рунета и не несут цели нарушения авторских прав). Если такой вариант возможен, пожалуйста, укажите об этом.