Nah, didn't think so.... maybe we can chat about it later, over coffee at Senator's Levin's office.
I'll bring the donuts, you bring the coffee, hon.
Ciao babe!
-- Edited by Cyber Diva at 12:58, 2007-03-14
__________________
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
The money trail : How petty crime funds terror By Jeffrey Robinson International Herald Tribune Friday, August 13, 2004
Over the past few weeks, several events have focused attention on the way terrorists move money, creating the belief that terror-money trails will lead to what is being planned and, once identified, that those events can be stopped.
A federal grand jury indicted a Texas-based Muslim charity for conspiracy, dealing with terrorists and money laundering; a mosque in Albany, New York, was raided as the result of a terrorist money laundering sting; several Al Qaeda terror-money-related arrests were made in various parts of the world; computer files were discovered in Pakistan that appear to show that Al Qaeda was investing funds to target the New York Stock Exchange, Citigroup, Prudential, the World Bank and the International Monetary Fund; and the Sept. 11 commission report recommended an invigorated "follow the money" philosophy in order to track down Al Qaeda. On paper, following the money sounds like a great idea.
In the months leading up to September 2001, Al Qaeda operated like a multinational conglomerate by centrally funding a specific activity. They moved a relatively small amount of money — estimates range from $300,000-$500,000 — through charities and alternative remittance systems, known as hawala networks, and were able to exploit the Western banking system with wires, credit cards and ATM machines. But the argument that we can stop Al Qaeda next time by following terror dollars through charities, hawala networks and electronic transfers is misconceived.
It is based on three false assumptions: First, that terror money is somehow different from regular dirty money. Actually, there is no such thing as terror money. Terrorism is financed through crime, so it is criminal money that we have to look for.
Second, that Al Qaeda is otherwise capable of financing a massive sequel to the Sept. 11 attacks. It isn't, because Al Qaeda Inc. no longer exists. Today, instead of being a multinational terrorist conglomerate, Al Qaeda is much more dangerous — it is a brand. Suddenly, any zealot, anywhere in the world, intent on wreaking havoc is a de facto franchisee with an instantly recognizable battle cry. Third, that the funding for Sept. 11 is the model for all terrorist funding. It isn't. Generally speaking, Al Qaeda subsidiaries were not centrally funded before Sept. 11, and their franchises are not funded that way post-Sept. 11. What's more, a terrorist event costs almost nothing. By the time the hijackers attacked the World Trade Center and the Pentagon, they had already spent their funds. They'd used their money on cell phones, cars, apartments, motel rooms, food and airline tickets. Because some of those financial transactions were suspicious enough to warrant reporting under various money laundering regulations, and because reporting didn't happen, the 9/11 commission wants that barn door shut. But the horses never lived there.
The central funding of Sept. 11 was a one-off. The first attack on the World Trade Center in 1993 supposedly cost $25,000. The money, which funded the planning of the attack, was stolen through credit card and other types of low-level fraud. It was much the same with the "Millennium Plot" to blow up Los Angeles International Airport in December 1999. The conspirators lived off check fraud, credit card fraud and identity theft. These days Algeria's Armed Islamic Group, or GIA, milks banks and shops through credit card and check fraud. British-based GIA cells financed the 1995 attacks on the Paris metro. It is believed that they also partially funded the Madrid bombings. That terrorists commit crimes to finance themselves is hardly new. The Irish Republican Amy was funding itself that way more than 30 years ago. They were working slot machines, extortion, identity theft, fraud and cigarette smuggling. Following in those footsteps, three decades later, a Middle Eastern terrorist cell was discovered operating a cigarette smuggling ring in North Carolina. This was not terror money. These funds were the proceeds of crime — dirty money. This was not the centrally-funded, Sept. 11 Qaeda model, it was the locally funded IRA model.
No one knows when or where the next terrorist atrocity will happen. But these four things are true: When it happens, it will cost almost nothing; yesterday's money laundering laws, which are mainly aimed at drug cash going into the banking system, won't stop it; nor will any government intent on following Al Qaeda's terror money trails; but if we get down below the radar where the IRA used to live and where Al Qaeda's franchises are today committing low-level crimes, and if we can cut off their cash flow, then we can bankrupt them and like any business, once it's bankrupt, there is no product.....
For more on the story, follow the link provided above.
-- Edited by Cyber Diva at 13:05, 2007-03-14
__________________
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
Mastercard International Consumer Credit Card Summit 2006
"Governments globally have recognised the close connection between international terrorism and transnational organised crime such as illicit drugs, money laundering and illegal movement of nuclear, chemical, biological and other deadly materials."
Address by Australian Federal Police Commissioner Mick Keelty APM
Topic: ‘Security & Fraud’
10 May 2006
Check Against delivery
I’d like to begin by acknowledging the traditional owners of this land, the Cadigal People.
It is important to recognise their historical connection to the land on which we gather today.
Thank you for your invitation to be involved in today’s discussion on Security and Fraud. I’m sure you will have many questions relating to what you expect from the Australian Federal Police to help protect your business and the wider Australian community from the impact of fraud and other types of economic crime.
But before we talk about the AFP’s role - I’d like to talk to you about what you can do to help us achieve law enforcement objectives.
By the end of today I hope we walk out of here with a better understanding of how we can enhance the partnership between the finance sector and the AFP - for the benefit of all parties.
Governments globally have recognised the close connection between international terrorism and transnational organised crime such as illicit drugs, money laundering and illegal movement of nuclear, chemical, biological and other deadly materials.
Author Loretta Napoleoni in her new book Terror Incorporated: Tracing the Dollars Behind the Terror Networks describes the “New Economy of Terror,” as a fast-growing international economic system with a turnover of about $1.5 trillion that is challenging Western hegemony. Napoleoni suggests interdependency between economies run by armed groups and western economies stating “as in the Crusades, religion is simply a recruitment tool; the real driving force is economics”.
This highlights that reducing economic crime is vital to maintaining economic, and therefore national, security. It also illustrates that addressing economic crime in the private sector is equally as important to public sector endeavours.
In that regard, we need all major organisations, and especially the finance sector, to understand this link, and to partner with law enforcement agencies to enhance the coordination of national and international efforts to encourage a global response to threats to international security.
Firstly, let me outline a few examples of what the AFP is doing to coordinate these efforts.
Recognising that banks and financial organisations should not be exposed to undue risk and must fulfil their lawful responsibilities regrading privacy, the AFP proposed, and government passed, Notice to Produce legislation.
Prior to this legislation, investigators had to obtain search warrants to obtain bank records when in fact we did not actually search anything!
By now being able to use notice to produce powers, we have enhanced our ability to obtain critical documents quickly, while ensuring that the balance remains between respecting the rights of individuals and meeting law enforcement objectives.
Apart from specific powers, there has also been express legislative recognition of the important role that the AFP plays in conjunction with partner agencies in Australia and around the world.
For example, an amendment to the AFP Act to ensure information can be shared without contravening privacy laws recognised the importance of AFP’s role in co-operating with other law enforcement agencies in Australia and overseas.
This is particularly important because economic crime is part of a much bigger, multi-jurisdictional picture.
It is one thing to have the laws and mechanisms to allow you to act domestically – but we as an organisation can be challenged when dealing with diverse laws and procedures in other countries.
But I don’t need to tell you about the challenges of operating in a global environment.
If you look at an example of today’s sponsor from a commercial perspective, just one product - MasterCard's Commercial Card is accepted at 32.8 million locations worldwide, including on the Internet. Alternatively, something that could affect most of you in the room is the potential for fraud and identity theft in Australian call centres based in overseas locations.
Here is a situation where you are providing personal information to international outsourcing companies who are not governed by Australian laws and processes.
How do we work with other foreign governments to ensure that correct security procedures are enforced and policed? That is our challenge.
One example of how successful multi-jurisdictional co-operation operations can be is a recent Bot Net investigation.
Following a series of Distributed Denial of Service (DDoS) attacks upon Internet Relay Chat (IRC)[1] servers in Australia in 2005, the Australian High Tech Crime Centre (AHTCC), using information provided by the Belgian Federal Computer Crime Unit, began investigating the attacks which also affected the United States, Singapore and Austria.
The attacks were carried out by means of IRC Bot Networks (botnets). Botnets are networks of computers on the Internet, which have been enslaved by malicious software and are then remotely controlled by criminals.
On 22 March 2006 officers from the AFP, AHTCC, NSW Police and Victoria Police assisted with the execution of Commonwealth search warrants in the ACT, NSW and Victoria.
Following the execution of the warrants, a man was arrested and charged in Victoria with one count of using a telecommunications network with intention to commit a serious offence under the Criminal Code.
Whilst there are numerous inter agency ‘success’ stories as I have previously stated I would like to talk to you more about enhancing public and private partnerships.
Organised crime is diversifying into economic crimes due to the financial returns and perceived lower risk. In the time that it takes to send a fax these days millions of dollars can be potentially stolen and moved off shore electronically.
To counter this type of fraud the public and private sector, particularly the financial sector, will need to collaborate and work in partnership.
The last Australian Financial Market Association report stated that the continuous striving for greater efficiencies, rapid and continuous change, flatter organisational structures and increased reliance on technology all serve to expose firms to greater risk of fraud.
It also stated that ‘other factors contributing to the global increase in fraud include the failure of governments, law enforcement and regulators to adequately address the problem, due largely to lack of resources and expertise.’[2]
I concur - we don’t always get it right first go.
We need to work in partnership with the industry to achieve the right balance between protecting the community from crime and the potential high cost of compliance with regulation.
Examples of where this is occurring is the Australian High Tech Crime Centre (AHTCC). The AHTCC is working in partnership with private sector companies such as Telstra on the Australian High Tech Crime Centre Workshop, and with Microsoft on exchange of technical expertise and information. Specifically, the AFP worked with Microsoft on the development of software platforms for the Child Sex Exploitation Team that is also being used internationally. We also have a variety of relationships with anti-virus software providers where information on global trends and patterns is shared as well as joint training initiatives.
As a result of the Government having identified that 90 per cent of our critical infrastructure assets are in the hands of the private sector or operated on a commercial basis, the AFP developed a joint partnership to assist in protecting Australia’s National Information Infrastructure (NII) with Defence Signals Directorate, and ASIO called the joint operating arrangement. NII comprises the information networks of essential national services such as telecommunications, banking and finance, transport and distribution, energy and utilities, information services and others such as defence and emergency management.
The AHTCC is the Australian law enforcement response to the investigation of attacks against the National Information Infrastructure.
Under the auspices of the AFP, the AHTCC is party to the formal Joint Operating Arrangement established between the AFP, the Australian Security Intelligence Organisation and the Computer Network Vulnerability Team of the Defence Signals Directorate.
There is also the Joint Banking Finance Sector Investigation Team (JBFSIT) located within the AHTCC. The team consists of Federal and State Police, as well as bank investigators from the major banks including, Commonwealth Bank, ANZ, National Australia Bank, Westpac and Suncorp Metway. The JBFSIT conducts investigations relating to internet banking fraud, phishing and related criminal matters, including fraudulent job recruiting websites.
The JBFSIT receives information on a daily basis from a number of financial institutions and deals with the impact and effect that Internet fraud has on each organisation. It is responsible for collating a monthly report which is disseminated to the Banking and Financial Services sector which outlines trends and issues which has emerged during the reporting period.
The JBFSIT is proactive and has a number of matters currently before the courts.
The AHTCC and the Australian Computer Emergency Response Team (AusCERT) are working with the banks and international partners to identify and shut down foreign hosted ghost websites and exchange information on unauthorised Internet banking.
The Australasian Consumer Fraud Taskforce (ACFT), established in March 2005, is composed of 18 Commonwealth, State and Territory Government regulatory agencies and departments that have a remit for consumer protection and education in relation to frauds and scams. 19 private sector organisations are also partners in the campaign – they include all the major banks, credit card companies, credit unions and major insurance companies, together with 13 community groups.
Education is one of the key weapons in the fight against internet crimes.
This is one of the most effective ways we can work in partnership - with industry committing resources to education on issues such as scams and phishing, and ensuring the community is aware of the steps they can take to minimise these criminal activities.
The Federal Government supports the partnership approach. They have funded investigations to the tune of $300 million over 6 year’s.
Yesterday it announced in the budget a $12 million boost to the Trans National Crime Centre at the University of Wollongong that will train people in the areas of international smuggling and fraud.
The Centre currently trains officers from key Australian agencies such as the Australian Federal Police as well as international students from 15 countries across the Asia-Pacific region. This will help us follow the money trails, and enhance our understanding of the sources of funding for terrorist groups.
Also announced was the establishment of the AFP led Identity Security Strike Teams. Funding of $19.6 million over four years will contribute to the implementation of the Australasian Identity Crime Policing Strategy.
The teams will be located in Melbourne, Brisbane and Perth, and will comprise of staff from the AFP, Australian Crime Commission, Customs and Immigration. They will be based on the successful Identity Crime Task Force comprising State and Commonwealth agencies which operates here in Sydney.
The Government has invested a great deal to combat economic crime because it recognises the cost to the community.
The Australian Institute of Criminology recognises in regards to community, the most damaging organised criminal activity is serious economic crime and that the rise in identity fraud has been linked to organised crime.
Closer to you, according to the 2005 PriceWaterhouseCoopers report, 63 per cent of businesses reported an incidence of serious economic crime. The average value of this economic crime was $3.1 million per organisation.
In the 2004-05 financial year the AFP restrained approximately $90 million dollars in proceeds of crime. In excess of 60 per cent of these proceeds were from economic crime.
In Australia, identity crime is already recognised as a serious and growing problem for business. It is estimated to be costing anywhere between $1 billion and $4 billion annually. Worldwide the cost has been put as high a $2 trillion.
Part of the reason for this is the ongoing and rapid advances in low-cost technology, which are providing criminals with unprecedented capacity to produce high quality replicas of a broad range of identity documents.
Also the cost of storing data has dropped dramatically over the years. Many companies have seen that data mining yields rich customer and product information. As a result, more companies are storing customer information than ever before. Unfortunately organised crime has figured this out and actively seeks to steal this information and exploit it for financial gain. The modern day equivalent of a robbery!
There are procedures being developed to deal with the advances that organised crime groups are making such as anti-money laundering legislation (AML) and chip technology. I know there are some people in this room who might conclude these initiatives are not in their best interest or financially prohibitive but fraud is an issue right now and will continue to become one in the future.
Failure by the financial markets to introduce appropriate anti-money laundering controls will not only expose the sector to undue risk, but will adversely affect the reputation of Australia’s financial markets in the international community and undermine Australia’s fight against money laundering and terrorism.
It means a risk to our competitive advantage – if one company suffers – you all may.
Is the risk worth the cost savings? A potentially catastrophic breach could cause irreparable harm to reputation of a bank
That’s what I’d like to talk to you about now – for all the discussions about the burden of compliance, how can we work together to improve the security and integrity of our data.
In your own ‘backyard’ one of the largest fraud scandals in Australia related to unauthorised foreign currency derivatives trading in National Australia Bank (NAB) by four ‘rogue traders’ in 2003 and early 2004.
The total loss arising from foreign currency options trading was AUD$360million. According to media reports, the scandal wiped out almost AUD$2 billion from the bank’s market capitalisation within a few days.
The World Economic Forum 2005 Global Competitiveness Report ranked Australia’s financial sector first in the Asia Pacific for general health of the banks with sound balance sheets and seventh in the world for market sophistication. Australia also ranks second in the Asia Pacific region for both financial market sophistication and venture capital availability.
But this could change.
We all need to change, to keep up with the pace of technological change that will impact on the security of your business.
If we look at credit cards - there has been a positive reduction in fraud with the introduction of chip technology in some Asian countries.
We know a magnetic strip and signature is no longer as affective as it once was. We also know that high quality counterfeits have been produced for many years now. Research shows the reduction of credit card fraud in Asia as result of the chip enabled smart cards.
Modern retail practices result in a lack of knowledge and anti fraud practices amongst a highly mobile workforce. To rely on humans to detect forged credit cards is not advantageous at all. The technology in the form of chip ‘smart cards’ has existed for sometime and two-factor authentication is more widely accepted now in the Asia Pacific.
We know that in Malaysia for instance the amount of counterfeit credit card fraud has been reduced by 80 per cent since the introduction of chip enabled smart cards.
Here in Australia, costs should be factored into future budgets now to prevent what could be a much more expensive and damaging alternative.
The AFP devotes 26 per cent of our total investigative resources to fraud investigations and an even greater investment with the Economic and Special Operations Function receiving 42 per cent of overall investigation resources.
However we conducted a study which was reviewed independently by the University of NSW, which showed that by way of effectiveness, for every $1 invested by the AFP in economic crime investigations, it returns $6 in social benefits to Australia.
To sum up I’d like to re-iterate that we are already well on track to combat fraud, but we need to do more to make sure we arrest any future increase.
To do this we need to work together in cooperation with business, as you hold much of the information and expertise we need.
Partnerships like this require initiative and hard work. However the rapidly changing security environment has had an impact on the business world and highlighted the growing need for all of us - regardless of what industry we belong to - to cooperate more closely with each other to strengthen our collective security.
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
June 13th, 2006 Credit Card Factoring is a type of business fraud that I commonly refer to in the blog.
What is factoring:
Credit card factoring is essentially processing transactions through a merchant account for a business or entity other than the specific business that was screened for the merchant account. Credit card factoring, also known as credit card laundering, or even money laundering, can exist in many forms. The most basic form of factoring would be a business processing transactions for another business. Another common case of factoring is when a business opens a branch, DBA, or sub-business and attempts to process through the central company’s merchant account. This case is often seen when a business starts a website, and tries to process credit card transactions without opening a separate merchant account for their website.
Telemarketing and call centers used solicit factoring often, but their business practices have come under close scrutiny in the recent years due to massive fraud and losses by major financial institutions.
Why exactly is factoring bad?
First, factoring is used as a method to launder money via credit cards. A business would theoretically process payments for illegal products or services and end up with a clean deposit in their bank account a few days later. It is rumored that a huge amount of terrorist activity is funded illegally with credit cards.
A slightly less severe result of factoring, is the loss of accountability for credit card transactions when a business processes for someone else. In the event of fraud or chargebacks, the processing banks have a hard time figuring out who is responsible for the credit transactions, because they could have been run my multiple businesses. In the end, the customer gets their money back, and the processing bank is left to recoup from the business.
Telemarketing companies have been notorious for employing individuals to open merchant accounts and process transactions for them in exchange for a quick buck. The telemarketing company would keep the bank account empty, and when the chargebacks started rolling in, the processing bank was stuck with the bill. Millions of dollars have been lost to this type of fraud, which has also helped telemarketing companies to be labeled as high risk businesses, whether legitimate or not.
What is considered factoring? Processing a transaction for another business or person Processing a payment for an illegal or restricted product or service Processing the merchant account owner’s credit card Processing transactions in a method not allowed by the merchant account type (Ex: ecommerce transactions through a retail merchant account) Processing transactions for a separate division / branch / DBA of a company not approved on the merchant account Unauthorized scanning / reading / decoding of the information on a credit card with or without the intent to process the card Attempt to employ, or solicit another company or person to process a transaction through their merchant account Unauthorized re-charging of a credit card (often seen if a business looses a chargeback)
Repercussions for being caught factoring: Simply put, Visa and MasterCard will have your merchant account shut down, and you can be substantially fined, and placed on the TMF (Terminated Merchant File). Depending on the severity and intent of the factoring, there may be legal repercussions as well. Since deliberate factoring often qualifies as money laundering, there are a variety of laws that are also being broken when a business is guilty of factoring. Also, depending on whether the factoring took place across different states there are federal and state penalties, for factoring. In many states factoring and money laundering are felonies.
Why am I writing about this? Factoring is something that many businesses do and may not even know its wrong. Factoring is a crime, and is easily avoidable.
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
Canada fraud scheme linked to terrorist activities
Linda Slobodian, CanWest News Service; Calgary Herald Published: Wednesday, May 24, 2006
CALGARY - A criminal cell operating across Canada is funnelling millions of dollars to Dubai to fund terrorist activities through a sophisticated credit/debit card fraud scheme, says the head of Alberta's Integrated Response to Organized Crime unit. It is but one of a number of ''extremely prevalent'' organized crime groups reaping huge profits from an old crime with a new twist, says Insp. Joan McCallum.
''You can make a million dollars a weekend in Calgary,'' said McCallum, noting the group also travels a ''circuit'' from Vancouver to Calgary to Toronto to Montreal. ''For one of the groups, it (cash) goes straight to terrorism in Dubai and some of the other countries. They live on nothing and send all their money to fund terrorist activities.'' Improved criminal technology now involves the insertion of a memory chip to record data into keypad terminals customers use at retail counters, gas stations and restaurants. Criminals target the little black terminals handed to a customer to punch in numbers by simply unplugging them and carrying them off.
''A lot of merchants leave those on the counter. The criminal will modify it to add a memory chip to the terminal,'' said Const. Stephen Macumber of the Calgary police commercial crime unit.
Because the terminals are generic, and many retail outlets use the same kind, they are easily transferable. When a card is swiped, the data goes to the credit card company. A memory card that's been placed inside records magnetic data for the crime group.
''They leave it there a few weeks and go back and steal it again,'' said Macumber. ''The only protection people do have with a credit card is sunk.''
This method only works for credit cards. For debit card fraud, a camera is hidden in the ceiling to record PIN numbers, he said. ''If it is a debit card, they still need a PIN. The camera will be hooked up to a digital recording device with a hard drive that can sometimes run 30 days.''
Gas stations top the list of identified problem sites, but every retail outlet is at risk, he said. Citing ongoing investigations, McCallum declined to name the terrorist group that's the recipient of the illegal flow of cash making its way to Dubai, one emirate that makes up the United Arab Emirates on the Persian Gulf.
''They get a stronghold because they get more sophisticated with the technology. There are so many little devices you can put into a debit machine,'' said McCallum.
That a terrorist group is being funded locally doesn't surprise Calgary Tory MP Art Hanger. ''Sleeper cells have been pointed out in Parliament. It is no surprise they are funding organized terrorist operations.'' This shows the importance of having a national strategy to fight organized crime, he added. ''There are going to have to be solid links with agencies like Interpol and the U.S. Marshals whatever connections that can be built,'' said Hanger, who was recently named chairman of the all-party federal justice committee. ''I think we are going to see more and more of this international criminal activity.''
Setting up these operations is easy, said Macumber.
''This particular method we're seeing only started cropping up in a serious way six to nine months ago. This is certainly national in scope, possible connected to the U.S.''
Det. Spencer Frizzell, of the Calgary police commercial crime unit, questions where the proceeds go, considering the lifestyles of many individuals involved in there crimes doesn't drastically change. For the most part, proceeds from credit card fraud is converted to cash. Organized crime groups will send in ''teams of people'' from other areas of the country to attack ATM accounts, said Frizzle.
''This type of crime is embracing technology and maximizing it.'' lslobodian@calgaryherald.canwest.com
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
Credit card fraud: Nigerian banks beware! By SEUN ADESIDA Thursday, November 30, 2006 •Credit Card Photo: Sun News Publishing
*
Fraud on credit and debit cards has a high cost to society as the proceeds are often used to fund serious organised crime, such as drug trafficking and terrorism.
The financial cost to cardholders of card fraud is largely borne by the banking industry, but the personal cost in time, inconvenience and frustration while an incident is investigated - being without cards, waiting for fraudulent expenditure to be reversed or offset, the sense of violation - is immeasurable.
There are several ways card fraud could be perpetuated. Now that Nigerian banks are beginning to introduce credit card into the system, it is pertinent to sensitise the public on the dangers associated with the latest financial technology introduction.
Fraud could occur where a card is physically stolen from the owners wallet or home, or if lost, and is then used by a criminal, posing as the owner, to obtain goods and services. Most fraud of this type takes place before you have the opportunity to report the loss.
The saving grace is that this type of card fraud has remained fairly static for the past five years, but a decrease is expected once chip and PIN is fully rolled out in Nigeria. The kind of credit card currently deployed in Nigeria are just PIN protected. What this means is that the banking sector is dangerously exposed to great losses arising from credit card fraud alone.
This kind of card has the tendency of being easily skimmed; that is cloned. A skimmed card is one that has been printed, embossed or encoded without permission from the card company, or one that has been validly issued and then altered or recoded. In most cases, the genuine data on a card's magnetic stripe is electronically copied onto another card, without the legitimate cardholder's knowledge.
It occurs at retail outlets, such as bars, restaurants and petrol stations. When a corrupt employee puts a card through a device, without one’s knowledge, that electronically copies the data from the card’s magnetic stripe. Sometimes skimming takes place at cash machines where tampering has occurred and a skimming device has been fitted.
The information is usually then sold higher up the criminal ladder where counterfeit cards are made. Often one will be unaware of such fraud until his or her statement arrives, showing purchases that he did not make. Card-not-present (CNP) fraud: This includes fraud conducted over the Internet, by telephone, fax and mail order. It is perpetrated when criminals obtain card details, through the theft of one’s card details from discarded receipts or by copying down ones details during a transaction. This is now the largest type of fraud in the UK.
The problem in countering this type of fraud lies in the fact that neither the card nor the cardholder is present at a till point in a shop. This means that CNP businesses are unable to check the physical security features of the card to determine if it is genuine without a signature or a PIN. It is not easy to confirm that the customer is the genuine cardholder. Card issuers cannot guarantee that the information provided in a card-not-present envrionment has been given by the genuine cardholder. Mail non-receipt card fraud is a type of fraud that involves your card being stolen in transit, once it has been sent out to you from your bank.
Identity theft on cards: This occurs when a criminal uses one’s fraudulently obtained personal information to open or access card accounts in one’s name. There are two types: Application fraud – stolen or false documents are used to open an account in your name. Criminals steal documents, such as your utility bills and bank statements to build up usable information. Alternatively, they may use counterfeit documentation for identification purposes.
Account take-over – by obtaining key personal information. Criminals are able to take over the running of your account, by pretending to be you. The criminal will try to deceive your bank or card company and arrange for payments to be taken from the account. The criminal may also instruct the bank to change various details of the account, such as the address, and then ask for new cards and cheque books to be issued.
To prevent the occurrence of these fraudulent practices, a chip and PIN - the combination of two effective security features can be used. The first, the `chip' or microchip on the card stores card data more securely than a magnetic stripe, making chip cards harder to counterfeit. The second, the four-digit PIN, which is used to prove you are the genuine cardholder. It is a much safer way to prove that you are the genuine cardholder as it cannot be compromised in the way that a signature can.
Security analysts are asking Nigerian banks and the Economic and Financial Crime Commision (EFCC) to quickly float a card crime unit (CCU). The unit must be jointly funded by the banking industry and the Nigerian government and staffed by newly trained police personnel, fraud investigators and bank staff provided by the Bankers Committee.
The unit must focus primarily on counterfeit fraud to encompass other categories of serious and organised cheque and plastic crime, including cash machine fraud, account take-over, application fraud, mail intercept, cheque and card-not-present fraud. It is expected that the unit will help in identifying, investigating, arresting and prosecuting criminal gangs that may want to start card fraud in Nigeria because of the introduction of debit and credit card into the financial system.
A similar dedicated cheque and plastic card unit (DCPCU), a plastic card crime unit in the UK recorded a resounding success, as it recovered more than 3,400 counterfeit cards, 39,600 compromised card numbers and 5,420 cheques earmarked for fraudulent use. This led to estimated savings to the banking industry in excess of £100 million. The DCPCU has also seized assets and recovered property, valued at £2.39 million, from raids on suspected criminals.
The Unit arrested 306, of whom 90 have been charged. To reduce card-not-present fraud, there is a five pronged strategy in place. This includes the Address Verification System and Card Security Code (AVS/CSC) which is available for businesses that accept card-not-present transactions. These systems allow retailers to verify your billing address and to cross-check a special security code that is on your card. These extra data checks verify the additional information supplied by cardholders to enable merchants to decide whether to proceed with the transaction.
Verified by Visa and MasterCard Secure Code are payment systems that prevent criminals from using stolen card details for Internet transactions. These are password-protected services that enable financial institutions to confirm your identity for the merchant when you are using a card to pay online. Enabling merchants to confirm your identity in this way puts another barrier between criminals and your information.
These systems also have the advantage of being global, and therefore should reduce fraud abroad as well as domestic fraud. In Nigeria, retailers who will be accepting the credit card are encouraged to make use of various card-not-present fraud prevention tools, such as intelligent fraud detection software. In the longer term, chip and PIN cards may help prevent CNP fraud through the development of pocket-sized card-accepting devices that can be used with phones and computers by generating a dynamic password for use solely in the CNP environment (referred to as token-based authentication).
Intelligent fraud detection computer systems are used by banks, and can track customer accounts for unusual spending patterns that may occur due to fraudulent activity on lost, stolen or compromised cards. The snag here is, do Nigerian banks have this system? The system ensures the effectiveness and sophistication of customer-profiling network systems that identify unusual spending patterns or high-risk transactions.
It enables a bank to be notified, if irregular spending is detected, to check if the transactions are genuine and, if not, an immediate block can be put on the card. These systems are not only used for transactions taking place in the UK but internationally as well. The kind of card currently deployed by Nigerian banks are just a hybrid of the chip-PIN protected card. Most of the skimmed cards are mainly the kind of cards that are just magnetic strip- PIN protected cards that can easily be cloned, this account for the huge amount of financial losses involved in the crime in UK alone.
The Industry Hot Card File (IHCF) is another facility that is lacking in Nigerian financial system. It enables retailers to electronically check every card transaction for cards being used fraudulently. More than 80,000 retailers subscribe to this electronic file that distributes data on lost or stolen cards. When a card is swiped as part of a normal transaction, it is automatically checked against the file. If the details given match those of a card on file, an alert is given to the retailer. The IHCF contains information on more than 5 million missing cards and over 440,000 cases of attempted fraud were prevented by this system in 2004.
The UK’s Fraud Prevention Service(CIFAS) provides a range of services to enable its member organisations to exchange information and help identify and prevent fraud, including that relating to plastic cards. CIFAS’ main emphasis is on identity, application and first-party fraud. New figures released recently by APACS, the UK payments association, show that overall card fraud continued to decline in the six months to June 2006. Total card fraud fell by five per cent during this period, from £219.5m to £209.3m, mainly thanks to chip and PIN protected cards.
Card specialist and financial security experts in Nigeria are queurrying why Nigerian banks should introduce these cards when the financial security infrastructure are still grossly inadequate. This is apart from the fact that it is easy to get a customer’s PIN compromised either directly or indirectly. Others use same PIN for almost all their cards in case the bank is not the one generating the PIN. The next question is: How secure are our point of sale (POS) terminals? At the present security level, most of this terminal are just waiting fraud terminals, POS and ATM service providers must ensure that there systems become more secure and are not financial security risks by the use of the chip-PIN security device instead of the present hybrid of PIN only.
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
"It's a world-class business," said Richard Power, editorial director of the Computer Security Institute, a private research firm that tracks electronic crime. "Al-Qaida and serious narcotic terrorists are using credit card fraud to finance their groups."
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
False Personation account, WorkingStiff wrote: Help is available for you [snip]
Help is on the way...as President Bush always says... you terrorists will be "smoked out of your caves" soon.
"It's a world-class business," said Richard Power, editorial director of the Computer Security Institute, a private research firm that tracks electronic crime. "Al-Qaida and serious narcotic terrorists are using credit card fraud to finance their groups."
"It's a world-class business,""Al-Qaida and serious narcotic terrorists are using credit card fraud to finance their groups."
-- Edited by Cyber Diva at 14:04, 2007-03-14
-- Edited by Cyber Diva at 14:05, 2007-03-14
__________________
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
Since the early 1990s, Western law enforcement agencies have noted an increasing reliance on criminal activity by terrorist networks around the world. Funding sources from the Persian Gulf, charities and other non-governmental fronts have been placed under pressure. This development, compounded by the arrests of several high-ranking coordinators and financiers of operations in Europe and North America—such as Abu Doha and Fateh Kamel—have compelled jihadi networks to adapt and further diversify their funding sources. Consequently “traditional” criminal activities like drug trafficking, robbery and smuggling are rapidly becoming the main source of terrorism funding. In fact, many recent terrorist attacks have been partly financed through crime proceeds.
Funding Shifts
Throughout the 1990s, European law enforcement officers tasked with combating the Algerian Armed Islamic Group (GIA) networks noticed that operatives had penetrated local criminal structures in Europe and North Africa by using ethnic and cultural links. With the jihad in Algeria at its height, the under-funded GIA became actively involved in drugs and weapons trafficking through logistics and financial support cells in Europe. GIA members such as Djamel Lounici and Mourad Dhina also trafficked stolen vehicles and forged documents. Similarly, for years the Fateh Kamel network in Montreal and an affiliated cell in Istanbul benefited from trafficking in stolen vehicles, theft and credit card fraud. One of its Montreal members, the Millennium bomber Ahmed Ressam, had also planned a series of armed robberies to secure funding for his aborted attack on the Los Angeles airport in 1999.
While a number of violent crimes involving jihadists have taken place in North Africa and Europe over the last decade, the full synthesis between criminality and terrorism took place in 1996 with a series of deadly armed robberies in the French town of Roubaix, which police initially assumed were perpetrated by criminals motivated solely by money. Following the attempted bombing of a G-7 meeting in Lille, French authorities discovered that the Roubaix gang was in fact a small Islamic militant organization that had also committed robberies in Bosnia to fund the jihad. An added benefit of these actions—from the Roubaix gang’s point of view—may have been that these unconventional “fundraising operations” were, in fact, terrorizing in themselves.
In December 2005, co-leader of the Roubaix gang and French convert Lionel Dumont was sentenced to 30 years in prison. Moreover, similar groups have been dismantled in France in the past months, including in a December 13th joint operation involving five French law enforcement agencies that netted over 25 suspects as well as high-grade explosives and weaponry. The group included known jihadists, radicalized delinquents and common criminals. Some of the members of this Zarqawi-linked cell—including presumed leader and ex-convict Ouassini Cherifi—were also involved in a number of armored car robberies that were undertaken to raise funds for the movement of recruits to Iraq.
Triangular Trafficking and Specialization
A “triangular trade” is steadily evolving that consists of weapons, stolen/contraband goods and narcotics. New al-Qaeda affiliates, notably the Groupe Salafiste pour la Prédication et le Combat (GSPC), the Moroccan Islamic Combatant Group (GICM) and North African branches of Takfir wa al-Hijra (Excommunication and exile) have inherited old GIA networks spread across Europe and are actively involved in various types of trafficking to fund operations, trade in weaponry and explosives and move/shelter militants. In Europe, this nexus is mostly active in France and especially Spain, which because of its geography is a major transit (and destination) point for Moroccan cannabis as well as a hub for forged documents and credit cards (Le Nouvel Observateur, October 7, 2004).
While networks were initially involved in drugs-for-weapons exchanges, many eventually shifted to direct drug trafficking. Moroccan sources suspect drug money to be the main source of funding for the May 16, 2003 attacks in Casablanca. Moreover, according to Spanish police, the funding for the March 11, 2004 Madrid train attacks came from drug trafficking, and many of those who took part in the preparation and execution of the attack had been involved in criminal activities such as stolen vehicle trading, jewel thefts and various types of counterfeiting (La Vanguardia, May 24, 2005). Furthermore, over half of the members of the group planning suicide strikes against the Spanish High Court later that year were already in jail on drug-trafficking-related charges.
Additionally, in June and November of this year, Spanish police uncovered operational and logistics cells of the GSPC and the Zarqawi networks, and discovered that the suspects had engaged in credit card fraud, robberies, drug trafficking and vehicle theft. At times an operational cell may partially fund itself, as when police found 7 kilograms of hashish in the hideout of the suspects planning to bomb the Strasbourg cathedral in 2000. Although financed by Abu Doha, the group had been raising funds through drug trafficking in Frankfurt and London. Many other Islamist cells dismantled in Europe following September 11, 2001, had engaged in drug trafficking, including an al-Qaeda linked group operating in Antwerp and Brussels and a cell in the Netherlands involved in the assassination of Ahmad Shah Massoud.
Diversification
Aside from narcotics, militants and sympathizers also traffic in precious stones and metals, mainly because they are easy to transport and difficult to trace. This was the case with a Tunisian man charged in Germany with planning attacks against Western targets, who had used a travel agency as a front for gold and silver trafficking (Agence France-Presse, November 30, 2004). Front companies are ideal vehicles to transfer illicit funds and since the mid-1990s, dozens of terrorist front companies have been dismantled in Europe. Recent arrests in France uncovered a GICM support cell (linked to the Madrid bombings) operating various business ventures, just as Ould Slahi—involved in major al-Qaeda plots and closely linked to al-Qaeda financier Khaled Al Shanquiti—was first arrested in 1999 for laundering drug money through his import-export firm.
Blurring the Lines
Following the arrests of several key players in the GIA’s European operations in the mid-1990s, networks reorganized themselves around contraband and arms-smuggling rings influenced by elements of the Russian and Sicilian mafia (the latter has also laundered money for the GIA) [1]. These types of relationships arise from mutual benefit, with the terrorists seeking entry into established trafficking/money laundering channels and traditional criminal groups taking advantage of profit opportunities. Ethnic or religious links are not necessarily essential for collaboration to take place; for example, the Madrid bombings were facilitated by members of local criminal groups and petty thieves. When in 2001 the Spanish police conducted a counter-narcotics operation, which netted, among other items, hashish, explosives and detonators, they initially arrested the procurer of explosives for 3/11, José Suárez. Furthermore, the arrests of Marc Muller and Stephen Wendler in the mid-1990s were two of many examples where arms traffickers knowingly supplied terrorist groups with weapons from ex-soviet bloc states. In a case of direct barter, two Pakistanis and a U.S. citizen were detained in Hong Kong in 2002 in an attempt to exchange 600kg of heroin and five tons of hashish for four Stinger missiles, which they intended to sell to al-Qaeda.
Since traffickers and terrorist organizations have similar logistical needs, there is ample room for collaboration in money laundering and even facilitating illegal immigration. Recent evidence from Morocco strongly suggests that jihadists are increasingly reliant on outsourcing to specialized migrant smuggling networks to infiltrate or exfiltrate targeted countries (La Gazette du Maroc, February 9, 2004).
There are additional concerns that trafficking channels can be used to move heavy weaponry and even weapons of mass destruction (WMD) and WMD components. In December 2004 members of Takfir were arrested in Barcelona for allegedly trying to purchase over 400kg of industrial explosives and material from a Czech source to build a “dirty bomb” (MAP Maghreb Arebe Presse, October 28, 2005). Moreover, in a recent case of arms smuggling from Russia, traffickers attempted to sell high-powered arms—and reportedly uranium—to an FBI informant posing as a middleman for al-Qaeda.
Justification
To retain legitimacy, contemporary terrorist groups are particularly concerned about providing religious justification for their acts, criminal or otherwise. The writings of a 13th century Islamic jurist, Ibn Taymiyya, are an important source of authorization in regard to seizing the enemy’s property during jihad. During the Algerian jihad, Ali Benhadj (a leader of the Islamic Salvation Front—FIS) quoted Ibn Taymiyya in declaring a fatwa authorizing GIA groups to assassinate and seize the property of all Muslims who opposed them. Terrorist mastermind Sheik Abdel Rahman had also authorized robbery against “the miscreants and the apostate state,” while in 1998 Osama bin Laden echoed this in his call to kill Americans and “plunder their money wherever and whenever they find it.” In January 2004 a member of the Moroccan group, Salafiya Jihadiya admitted being shown videos that legitimized and promoted robbing “infidels and hypocrite Muslims,” suggesting that encouraging criminal behavior is emerging as an integral feature of al-Qaeda’s internal propaganda.
While Islamists are widely viewed as uncompromising literalists, pragmatism in the search for funds is evident in the religious decree by Salafist ideologue Nasreddine El Eulmi, which authorized the use and sale of drugs during the Algerian jihad. The most radical of contemporary terrorist groups, the Takfir, explicitly encourages robbery and drug trafficking as long as a fifth of the proceeds are used to fund the Islamist cause (Le Parisien, September 8, 2002). Arrests in Morocco in 2002 confirmed that its members were encouraged by their emir to steal “jewels, credit cards and money” from their victims (Maroc-Hebdo, August 3, 2002).
Conclusion
For terrorist organizations, the source of funding is irrelevant and only matters because it procures weapons, facilitates movement and produces propaganda. Even major operations cost relatively small sums when compared with the vast revenues of organized crime groups. For example, major operations like the Madrid bombings cost anywhere between $15,000 to $35,000, while the annual profits from cannabis trafficking in Europe alone are estimated at $12 billion.
The incorporation of organized criminality into terrorist ideology and operations shows the flexibility of terrorist organizations in adapting to dynamic fundraising environments. The border between the two worlds is ever more porous, with terror suspects now often imprisoned on multiple charges, both criminal and terrorist. This poses significant challenges to law enforcement agencies, which have traditionally targeted terrorism and criminality separately.
Hayder Mili is an independent researcher specializing in Islamism in Central Asia and the Caucasus.
Notes
1. Salima Tlemçani, “Trafic d'armes en Europe,” Les filières du GIA, January 11, 2000.
__________________
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
Spain arrested scores of individuals with possible links to al-Qaida and related extremist organizations; there were 79 detentions. At year¿s end, 29 of those 79 detainees remained in custody, while the other 50 were released on bail or cleared of charges. The Minister of Interior reported in October that Spain held a total of 125 Islamist terrorist suspects; that figure rose to 131 total detainees by the end of the year. These detainees included individuals arrested in 2004 for conspiring to bomb Spain's High Court and other Madrid landmarks. In April, Switzerland extradited the alleged leader of this conspiracy, Mohamed Achraf, to Spain where he is awaiting trial. Authorities continued to hold 10 Pakistani nationals arrested in Barcelona in 2004 for allegedly providing logistical support to al-Qaida.
Spain cooperated closely with the United States to investigate and prosecute acts of terrorism and to prevent future attacks. Spanish authorities provided extensive information for the trial in the United States of Zacarias Moussaoui. Spanish officials also provided U.S. investigators substantial information regarding the July 2001 visit to Spain of September 11 hijacker Mohamed Atta and other September 11 plotters.
Spain worked hard to disrupt terrorist acts that possibly were directed against U.S. interests. In June, Spanish police dismantled a network that was facilitating the movement of suicide bombers and other terrorists to Iraq to attack Coalition forces. On March 11, U.S. Attorney General Gonzales and Spanish Minister of Justice Juan Fernando Lopez Aguilar announced the formation of the U.S.-Spain Counterterrorism Experts Working Group to increase cooperation in terrorism investigations and prosecutions. This working group brought together prosecutors, investigators, and other experts from both countries; it met twice to discuss terrorism cases of mutual interest.
Spain cooperated with the Department of Homeland Security on the Container Security Initiative to scan containers bound from the port of Algeciras to the United States for hazardous and illicit materials. Spain and the United States co-chair the Financial Action Task Force (FATF) Terrorism Finance Working Group. Spain participated in all meetings of the G8 Counterterrorism Action Group (CTAG), based on its high level of counterterrorism assistance to third countries. The Spanish Government prepared but has not yet issued implementation regulations for the 2003 Law to Prevent Terrorist Financing.
A Spanish court sentenced 18 members of an al-Qaida cell to between six and 27 years in prison. Separately, authorities continued to investigate the March 2004 train bombings in Madrid that killed 191 people and wounded hundreds of others.
On September 26, Spain's High Court convicted Spain-based al-Qaida cell leader Imad Eddin Barakat Yarkas and sentenced him to 27 years in prison for membership in a terrorist organization and conspiracy to commit terrorist acts. Seventeen other members of the Barakat Yarkas cell also were convicted and sentenced to prison terms ranging from six to 11 years; six defendants were acquitted. Barakat Yarkas, a Syrian immigrant to Spain, was detained in November 2001 on charges of having provided support to al-Qaida and of having helped Mohamed Atta organize the September 11 terrorist attacks. Among those convicted was al-Jazeera journalist Taysir Alony, who was sentenced to seven years in prison for transporting funds from Barakat Yarkas to terrorists in Afghanistan under his cover as a journalist.
Spanish authorities continued their investigation into the March 2004 Madrid train bombings. Police arrested 31 individuals in connection with the investigation, bringing to 110 the total number of suspects detained as part of the investigation; 30 suspects remain jailed awaiting trial or further investigation. In September, Serbian authorities extradited Moroccan national Abdelmajid Bouchar to Spain in response to an international arrest warrant seeking Bouchar for his alleged role in the Madrid train bombings. Bouchar had escaped a Spanish police raid in Madrid in April 2004 and warned his colleagues of the approaching police, allowing the suspects to barricade themselves in their apartment. The seven suspected terrorists detonated explosives in the apartment, killing themselves and one police officer.
In April, Spain joined France, Germany, and Belgium in an agreement to link the criminal record registries of each country to help accelerate background checks on suspected terrorists operating in the region.
The High Court convicted Spanish national Hamed Abderrahman and sentenced him to six years¿ imprisonment for membership in a terrorist organization. Abderrahman was transferred to Spain from the U.S. naval base at Guantanamo in February 2004 at the request of Spanish authorities.
In the Basque region, a Spanish court initiated trial proceedings against 56 individuals charged with providing logistical support to the Basque Fatherland and Liberty (ETA) terrorist group. The case encompassed six separate investigations directed by the National Court against ETA between 1998 and 2002.
Though ETA carried out all the terrorist attacks in Spain in 2005, there were important detentions related to other terrorist groups, including:
¿ On June 1, a UK judge authorized the extradition to Spain of Moroccan national Farid Hilali. Spanish investigators believed Hilali was the person referred to as "Shakur" in multiple conversations intercepted by police as part of the Barakat Yarkas case. In his discussions with Yarkas, "Shakur" indicated significant knowledge of planning for the September 11 attacks in the United States. At year¿s end, Hilali had not yet been transferred to Spanish custody.
¿ On June 15-28, police undertook "Operation Tigris," arresting 11 individuals on charges of working on behalf of Ansar al-Islam to recruit potential suicide bombers in Spain for operations against Coalition and Iraqi Government forces in Iraq.
¿ On November 23, police arrested 11 Algerian nationals on charges of providing financial and logistical support to the Algerian terrorist group GSPC from the proceeds of narcotics trafficking and credit card fraud. Four of the suspects, Khaled Bakel, Said Bouchema, Salim Zerbouti, and Lyies Sihamida, allegedly sought to purchase explosives and were suspected of having links with extremists in Germany, the Netherlands, the United Kingdom, Belgium, and Denmark. The four were held pending further investigation, while the other seven Algerian nationals were released on bail.
¿ On December 9, authorities arrested seven more suspected GSPC members in several towns along Spain's Mediterranean coast on charges of raising funds for the GSPC through robbery. According to press reports, this cell was in contact with senior GSPC figures responsible for extending GSPC actions beyond Algeria's borders, and had funded terrorist attacks in North Africa, Afghanistan, and possibly in Pakistan and Chechnya.
¿ On December 19, police arrested 19 suspected Islamist extremists on charges of recruiting individuals to carry out suicide bombings in Iraq. The detainees included 12 Moroccans and one national each from Spain, France, Belarus, Ghana, Egypt, Iraq, and Saudi Arabia. The investigating magistrate ordered six of the individuals held in pre-trial detention while the rest were released pending further investigation. Three of the detainees reportedly served as imams in their local mosques in Malaga and Ceuta. Spain continued to make progress in its decades-old campaign to eliminate ETA. Spanish authorities arrested 71 individuals for membership in or association with ETA and dismantled six ETA operational cells. Spain cooperated with French authorities in this effort, with French police arresting 33 suspected ETA members and extraditing five of them to Spain to stand trial. Spanish authorities charged 41 members of ETA's illegal political front group Batasuna, including senior Batasuna figure Arnaldo Otegi, with membership in a terrorist organization and providing financial support to ETA. As of December 12, ETA had carried out 30 bombings; although there were no deaths as a result of these attacks, there were injuries and significant property damage.
The conviction in September of Imad Eddin Barakat Arkas and 17 associates was believed to have significantly reduced al-Qaida's direct presence in Spain, although al-Qaida affiliates and supporters appeared to remain active.
The Moroccan Islamic Combatant Group (GICM) was believed to be active among extremist elements in Spain's large Moroccan immigrant community. Many of the Madrid train bombing suspects had direct or indirect relationships with the GICM. GICM figure Hassan El Haski and three associates were arrested in Spain in December 2004.
The Salafist Group for Preaching and Combat (GSPC) is known to use Spain as a logistical base and transit point. On November 23, authorities arrested 11 Algerian citizens on charges of raising funds for the GSPC through drug trafficking and credit card fraud. Police released seven on bail, but continued to hold four of the suspects on charges that they also sought to obtain explosives. On December 9, police arrested a second group of seven GSPC members on similar charges.
Police believed that the Iraqi terrorist group Ansar al-Islam was the main organizer of a terrorist facilitation network that funneled potential suicide bombers from Spain to Iraq, primarily through Syria. In June, police arrested 11 individuals on charges of recruiting terrorists for Ansar al-Islam.
Authorities believed they had nearly eradicated the extreme leftist First of October Antifascist Resistance Group (GRAPO), but a joint Spanish, French, and Italian police operation in October that resulted in the arrest of two GRAPO members led observers to speculate that the group possibly was reconstituting itself.
__________________
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
Hey Passion, isn't this futuristic stuff, cool? "Biometrics, the science of identifying individuals based on their physical, chemical or behavioral characteristics, is a key piece in homeland security strategies..."
CUBS focus is biometrics By ELLEN GOLDBAUM Contributing Editor
Biometrics, the science of identifying individuals based on their physical, chemical or behavioral characteristics, is a key piece in homeland security strategies, but no single biometric—such as face, signature or fingerprint—fits all applications, says the director of UB's Center for Unified Biometrics and Sensors (CUBS).
Many of the systems on the market have a high false-positive rate, which could be misleading or even dangerous, according to Venu Govindaraju, director of CUBS and professor of computer science and engineering.
For that reason, he says, the UB center takes a unique approach to developing technologies in biometrics, combining and tuning different biometrics to fit specific applications.
"We believe success in this area depends on being able to combine and tune technologies to different applications by using contextual knowledge about how the data will be used," said Govindaraju. "The technology for these applications exists. Now it's a question of figuring out how to build the best devices."
CUBS has secured funding to create systems that:
Could quickly identify suspicious public-health patterns, indicating a possible terrorist attack or epidemic, by automating handwritten data collected about patients entering the nation's emergency rooms. Funded by the National Science Foundation.
Will help close the digital divide between the English and non-English speaking worlds by developing the first optical character reader (OCR) software for handwritten and machine-printed Arabic documents so that they can be searched automatically with keywords. Funded by the Director of Central Intelligence Postdoctoral Research Fellowship Program. (See story on this page for further details.)
Protect Web sites against cyberterrorism using handwritten CAPTCHAS (Completely Automated Public Turing Tests to Tell Computers and Humans Apart), automated tests or puzzles designed to determine whether visitors to sites are humans or machines. Funded by the Calspan-UB Research Center.
Bridge biometrics and forensics by matching automatically facial characteristics described by crime victims or witnesses with large facial databases of persons previously or allegedly involved in crimes or acts of terrorism. Funded by the Calspan-UB Research Center.
Prevent credit-card fraud and protect homeland security by combining face, fingerprint and signature biometrics, and embedding them in smart ID cards. Funded by the New York State Office of Science, Technology and Academic Research, UB and Ultra-Scan Corp.
Combine biometrics, such as signatures and fingerprints, to identify individuals entering the U.S. and to improve overall system accuracy. Funded by the U.S. Army Research Laboratory.
Additional funding for CUBS projects comes from other private high-tech firms, such as mobileLexis (Salt Lake City), Infinite Group (Rochester), Uniform Data System for Medical Rehabilitation (Amherst) and Ubique (Buffalo).
__________________
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
Terrorist Capabilities for Cyberattack: Overview and Policy Issues Summary
Terrorist’s use of the internet and other telecommunications devices is growing both in terms of reliance for supporting organizational activities and for gaining expertise to achieve operational goals. Tighter physical and border security may also encourage terrorists and extremists to try to use other types of weapons to attack the United States. Persistent Internet and computer security vulnerabilities, which have been widely publicized, may gradually encourage terrorists to continue to enhance their computer skills, or develop alliances with criminal organizations and consider attempting a cyberattack against the U.S. critical infrastructure.
Cybercrime has increased dramatically in past years, and several recent terrorist events appear to have been funded partially through online credit card fraud. Reports indicate that terrorists and extremists in the Middle East and South Asia may be increasingly collaborating with cybercriminals for the international movement of money, and for the smuggling of arms and illegal drugs. These links with hackers and cybercriminals may be examples of the terrorists’ desire to continue to refine their computer skills, and the relationships forged through collaborative drug trafficking efforts may also provide terrorists with access to highly skilled computer programmers. The July 2005 subway and bus bombings in England also indicate that extremists and their sympathizers may already be embedded in societies with a large information technology workforce.
The United States and international community have taken steps to coordinate laws to prevent cybercrime, but if trends continue computer attacks will become more numerous, faster, and more sophisticated. In addition, a recent report by the Government Accountability Office states that, in the future, U.S. government agencies may not be able to respond effectively to such attacks.
This report examines possible terrorists’ objectives and computer vulnerabilities that might lead to an attempted cyberattack against the critical infrastructure of the U.S. homeland, and also discusses the emerging computer and other technical skills of terrorists and extremists. Policy issues include exploring ways to improve technology for cybersecurity, or whether U.S. counterterrorism efforts should be linked more closely to international efforts to prevent cybercrime. This report will be updated as events warrant.
[edited to add: Wow, Passion ain't this interesting stuff? More interesting than your reasons for delivering libelous "history packages" created by former Car Wash members to harass and terrorize innocent peeps. You are really being "played" big time on that one, darling! Does Senator Levin even know? ]
-- Edited by Cyber Diva at 14:26, 2007-03-14
__________________
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
Next topic for Passion is Operation Cyber Sweep...
http://www.fbi.gov/cyber/cysweep/image045.jpg
-- Edited by Cyber Diva at 14:32, 2007-03-14
__________________
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
Operation Cyber Sweep represents a coordinated initiative targeting an expansive array of Cyber Crime schemes victimizing individuals and industry worldwide. This initiative highlights numerous investigations that have been successfully advanced through cooperation and coordination of law enforcement, and a growing list of industry partners.
Cases included in Operation Cyber Sweep exemplify the growing volume and character of Internet facilitated crimes confronting law enforcement, and also underscores the continuing commitment of law enforcement to aggressively pursue cyber criminals, both domestically and abroad. Historically, Cyber criminals abroad have perceived themselves as beyond the reach of U.S. authorities, and in some instances, untouchable by their own country’s law enforcement. Until recently, law enforcement and industry were consistently frustrated with the inability to effectively pursue matters in certain countries. That situation is rapidly changing, due to a concerted emphasis within DOJ to train and equip law enforcement in many of these countries, including Ghana, Nigeria and Romania. Due in large part to these efforts, certain noteworthy international successes included in Operation Cyber Sweep became possible.
Criminal schemes included in this initiative include: International re-shipping schemes, auction fraud, spoofing/phishing, credit card fraud, work at home schemes, cyber-extortion, Intellectual Property Rights (IPR), Computer Intrusions (hacking), economic espionage (Theft of Trade Secrets), International Money Laundering, Identity Theft, and a growing list of “traditional crimes” that have migrated on-line.
The substantial accomplishments included in this initiative are attributable to the growing number of joint cyber-crime task forces established across the U.S. Over the past year, more than 50 such task forces have either been established or significantly augmented with resources from numerous federal, state and local agencies. Enhanced industry partnerships developed in coordination with associations such as the Merchants Risk Council (MRC), the Business Software Alliance (BSA), the Software and Information Industry Association (SIIA) and the Motion Picture Association of America (MPAA) also contributed significantly to the success of this initiative. Operation Cyber Sweep has been coordinated at the Federal level with the Department of Justice, the FBI, the U.S Postal Inspection Service, the U.S. Secret Service, the Federal Trade Commission and the Bureau of Immigration and Customs Enforcement. Numerous state and local law enforcement agencies contributed significantly to this initiative as well. State & Local participation in this effort was amplified in coordination with The National White Collar Crime Center (NW3C).
Operation Cyber Sweep includes more than 100 investigations, in which more than 125,000 victims lost more than $100 million dollars. Through these investigations more than 350 subjects were targeted, resulting in 125 arrests/convictions, 70+ indictments and the execution of more than 90 search/seizure warrants. Although significant in number, these investigations represent only a fraction of the cyber crime problem, underscoring not only the need for sustained law enforcement focus, but the continuing development of expanded industry partnerships as well.
__________________
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
The victim is required to pay significant fees in advance of receiving a substantial amount of money or merchandise. The fees are usually passed off as taxes, or processing fees, or charges for notarized documents. The victim pays these fees and receives nothing in return. Perhaps the most common example of this type of fraud occurs when a victim is expecting a large payoff for helping to move millions of dollars out of a foreign country. The victim may also believe he has won a large award in a nonexistent foreign lottery.
Business/Employment Schemes
Typically incorporate identity theft, freight forwarding, and counterfeit check schemes. The fraudster posts a help-wanted ad on popular Internet job search sites. Respondents are required to fill out an application wherein they divulge sensitive personal information, such as their date of birth and Social Security number. The fraudster uses that information to purchase merchandise on credit. The merchandise is sent to another respondent who has been hired as a freight forwarder by the fraudster. The merchandise is then reshipped out of the country. The fraudster, who has represented himself as a foreign company, then pays the freight forwarder with a counterfeit check containing a significant overage amount. The overage is wired back to the fraudster, usually in a foreign country, before the fraud is discovered.
Counterfeit Check Schemes
A counterfeit or fraudulent cashier’s check or corporate check is utilized to pay for merchandise. Often these checks are made out for a substantially larger amount than the purchase price. The victims are instructed to deposit the check and return the overage amount, usually by wire transfer, to a foreign country. Because banks may release funds from a cashier's check before the check actually clears, the victim believes the check has cleared and wires the money as instructed. One popular variation of this scam involves the purchase of automobiles listed for sale in various Internet classified advertisements. The sellers are contacted about purchasing the autos and shipping them to a foreign country. The buyer, or person acting on behalf of a buyer, then sends the seller a cashier's check for an amount several thousand dollars over the price of the vehicle. The seller is directed to deposit the check and wire the excess back to the buyer so they can pay the shipping charges. Once the money is sent, the buyer typically comes up with an excuse for canceling the purchase, and attempts to have the rest of the money returned. Although the seller does not lose the vehicle, he is typically held responsible by his bank for depositing a counterfeit check.
Credit/Debit Card Fraud
Is the unauthorized use of a credit/debit card to fraudulently obtain money or property. Credit/debit card numbers can be stolen from unsecured web sites, or can be obtained in an identity theft scheme.
Freight Forwarding/Reshipping
The receiving and subsequent reshipping of on-line ordered merchandise to locations usually abroad. Individuals are often solicited to participate in this activity in chat rooms, or through Internet job postings. Unbeknownst to the reshipper, the merchandise has been paid for with fraudulent credit cards.
Identity Theft
Identity theft occurs when someone appropriates another's personal information without their knowledge to commit theft or fraud. Identity theft is a vehicle for perpetrating other types of fraud schemes. Typically, the victim is led to believe they are divulging sensitive personal information to a legitimate business, sometimes as a response to an email solicitation to update billing or membership information, or as an application to a fraudulent Internet job posting.
Investment Fraud
An offering that uses false or fraudulent claims to solicit investments or loans, or that provides for the purchase, use, or trade of forged or counterfeit securities.
Non-delivery of Goods/Services
Merchandise or services that were purchased or contracted by individuals on-line are never delivered.
Online Auction/Retail
The fraud attributable to the misrepresentation of a product advertised for sale through an Internet auction site or the non-delivery of products purchased through an Internet auction site.
Phony Escrow Services
In an effort to persuade a wary Internet auction participant, the fraudster will propose the use of a third-party escrow service to facilitate the exchange of money and merchandise. The victim is unaware the fraudster has spoofed a legitimate escrow service. The victim sends payment or merchandise to the phony escrow and receives nothing in return.
Ponzi/Pyramid Schemes
Investors are enticed to invest in this fraudulent scheme by the promises of abnormally high profits. However, no investments are actually made by the so called “investment firm.” Early investors are paid returns with the investment capital received from subsequent investors. The system eventually collapses and investors do not receive their promised dividends and lose their initial investment.
Spoofing/Phishing
A technique whereby a fraudster pretends to be someone else's email or web site. This is typically done by copying the web content of a legitimate web site to the fraudster's newly created fraudulent web site. Phishing refers to the scheme whereby the perpetrators use the spoofed web sites in an attempt to dupe the victim into divulging sensitive information, such as passwords, credit card and bank account numbers. The victim, usually via email is provided with a hyperlink that directs him/her to a fraudster's web site. This fraudulent web site’s name (Uniform Resource Locator) closely resembles the true name of the legitimate business. The victim arrives at the fraudulent web site and is convinced by the sites content that they are in fact at the company’s legitimate web site and are tricked into divulging sensitive personal information. Spoofing and phishing are done to further perpetrate other schemes, including identity theft and auction fraud.
OPERATION CYBER SWEEP
This map depicts the locations of the investigative actions highlighted in Operation CYBER SWEEP.
__________________
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
These screen-captures illustrate the similarities between the websites for the fraudulent escrow service (pictured above) and the legitimate escrow service (pictured below).
Sampling of Investigations from Operation Cyber Sweep:
The following cases are a sampling of the investigations that are a part of this initiative. Some of the information has been generalized due to the on-going nature of a small number of investigations.
Phony Escrow Services
The subject of this investigation operated a fraudulent website called www.safexchange-escrow.com. This site, which was nearly identical to a legitimate website operated by an escrow company located in Singapore, www.safe-ex.com, was designed to deceive victims into believing that they were working with a legitimate escrow company. The operator of the fraudulent escrow service used the bogus website to entice eBay auction sellers to mail high-dollar merchandise to mail drop sites in the Philadelphia area.
The subject identified prospective victims by perusing eBay and other online auction sites to locate sellers of high-dollar items such as jewelry and car parts. The subject would contact the seller via e-mail and suggest they conduct a direct purchase using the fraudulent escrow site. The victims would then visit the fraudulent site and sign up for what they believed to be a legitimate account. Victims then received e-mail messages from the fraudulent escrow service advising them that the escrow company had received the promised funds, and that it was safe for them to ship their items to the prearranged mailing locations. The subject, along with two accomplices, used fraudulent drivers’ licenses to pick up the merchandise. The promised funds were never sent to the victims. Total victim loss resulting from this phony escrow. The Federal Bureau of Investigation and the Fairfax County Police Department investigated this case.
Items fraudulently obtained via the phony escrow service include a $42,000 diamond ring, as well as, a ruby and diamond necklace and matching earrings, valued at over $25,000.
Congressional Medal of Honor
This is a photograph of the Congressional Medal of Honor
The Medal of Honor is the highest award for valor in action against an enemy force which can be bestowed upon an individual serving in the armed services of the United States.
Medals of Honor awarded to U.S. Navy Seaman Robert Blume and U.S. Army First Sergeant George Washington Roosevelt.
In a case demonstrating the increasingly international character of many Cyber crime investigations, the Buffalo Cyber Task Force, hosted by the FBI in Buffalo, New York, initiated an Undercover Operation to recover a U.S. Congressional Medal of Honor. The Medal was being auctioned on Ebay, in violation of U.S. law, by an individual in Ontario, Canada. The goal of the Undercover Operation was to recover and safeguard the Medal of Honor while simultaneously obtaining the evidence necessary to charge and convict the subject for his criminal actions. This investigation required extensive coordination with multiple U.S. and Canadian law enforcement and military agencies, and demonstrated the necessity for productive international and inter-agency partnerships to resolve the multi-national nature of criminal investigations made commonplace by the Internet.
In conversations with the Undercover Agent, the subject advised he wanted to sell U.S. Navy Seaman Robert Blume’s Congressional Medal of Honor, awarded for service in the Spanish American War, for $12,000. Although the subject wanted this sale to occur in Canada, he expressed a willingness to sell the Undercover Agent additional Medals of Honor, including one that had been awarded to U.S. Army First Sergeant George Washington Roosevelt, for service in the Battles of Bull Run and Gettysburg, for $30,000. The subject stated he would be willing to meet in the United States for any subsequent sales, and also requested assistance in finding buyers for other medals, firearms, and "large and expensive items" which could be shipped across the border to the United States. Following the purchase of Blume’s Medal of Honor, it was arranged for the subject to travel to Buffalo, New York, to purchase Roosevelt’s Medal of Honor for $30,000. When the subject arrived in the United States, he was arrested and charged, and is scheduled to plead guilty.
This investigation was conducted with the assistance of the following agencies: The Buffalo Cyber Task Force, composed of: The FBI, The Buffalo Police Department, The Erie County Sheriff's Office, The Greece Police Department, The New York State Attorney General's Office, The New York State Police, and The United States Secret Service. Other agencies providing assistance include: The United States Attorney’s Office; Bureau of Immigration and Customs Enforcement; United States Ambassador to Canada; Royal Canadian Mounted Police, Toronto, Canada; Peel Regional Police Department, Ontario, Canada; Provincial Weapons Enforcement Unit, Ontario, Canada; Department of the Navy, Naval Historical Center; Department of the Army, Military Awards; and the Medal of Honor Society.
__________________
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
This Chicago based scheme involves 20+ individuals who were active members of a theft ring/fencing operation which used Internet auction sites to sell the stolen merchandise at prices far below what the items could legitimately be purchased for. The stolen merchandise was obtained via thefts from interstate shipments and major retail stores across the U.S. The main subjects of the investigation are a mother and son who operated three Chicago area pawnshops. The two have generated approximately $3,000,000.00 via Internet auction sales since January 2001. Search warrants executed during the course of the investigation have resulted in the recovery of stolen merchandise valued at $175,000.00.
It is anticipated federal charges of criminal conspiracy to commit interstate transportation of stolen property, mail fraud, wire fraud, and possession of property stolen from interstate shipments will be filed during the week of November 17, 2003.
The Chicago offices of the Federal Bureau of Investigation, the United States Postal Inspection Service, and the Chicago Police Department investigated this matter.
The “Reshipping” Scheme
As the popularity of shopping on the Internet has grown, so have correspondingly the number of e-commerce websites. As traditional brick and mortar stores continue to increase their World Wide Web presence, the organized criminal elements have quickly responded by adapting, changing, and bringing their tradecraft to the Cyber world.
Although the “Reshipping” scheme continues to change and evolve with time, one main underlying component remains the same. This scheme requires individuals in the United tates who, in some instances are coconspirators and, at other times, are unwitting accomplices, to receive packages at their residence and subsequently repackage the merchandise and ship it to another location, usually abroad.
“Reshipper” Recruitment
“Reshippers” are being recruited in various ways. However, the two most prevalent recruitment scenarios that transpire almost everyday are described as follows: Employment
Unknown subjects post help-wanted advertisements at popular Internet job search sites. Respondents throughout the United States, who are very much interested in the prospect of working at home, quickly respond to the on-line advertisement. As part of the application process, the prospective employee is required to complete an employment application, wherein he/she divulges sensitive personal information, such as their date of birth and social security number.
The applicant is informed that he/she has been hired and will be responsible for forwarding merchandise purchased in the United States to the company’s overseas home office. The scheme now transitions to the freight-forwarding phase, commonly referred to as the "Reshipper." The packages quickly begin to arrive and, as instructed by his/her employer, he employee dutifully forwards the packages to their overseas destination. Unbeknownst to the “Reshipper,” the recently received merchandise was purchased with fraudulent credit cards.
After being employed for one month, the employee is now ready to receive his/her first paycheck. Prior to receiving his/her first payroll check, the employer contacted the employee by the usual means, email, and informed him/her that another business, which owes him money, will be forwarding to him/her a cashier’s check drawn on a United States financial institution. Incidentally, the cashier’s check will be issued for an amount in excess of the employee’s negotiated monthly stipend. The employee will be instructed to negotiate the cashier’s check and electronically forward the overage to an overseas bank account. As a matter of fact, the employer will extend his good will by offering the new employee a small financial bonus for the inconveniences associated with negotiating the cashier’s check.
This is a screen shot of a web site.
A fraudulent website offering, “work at home” employment.
Subsequently, the new employee will be contacted by the financial institution that recently handled the transactions and be informed that the cashier’s check was in fact a fraudulent nstrument. At that time, the employee will also be informed that he/she is liable for the total amount of the negotiated fraudulent cashier’s check.
The employee now realized his/her employment was fraudulent. However, this fraudulent scheme does not end here. For the victim employee, it is now when the most troubling aspect of this employment begins. Remember at the outset of the interview, the prospective employee was required to complete an employment application that asked for very personal information. That information is in the hands of an unscrupulous “employer,” who unbeknownst to the victim employee has already obtained credit in his/her name.
“Friendship” and “Love” via Internet Relay Chat
While conversing in various Internet Relay Chat “rooms,” unsuspecting United States citizens are befriended by unknown individual(s) who represent themselves as living in either Ghana or Nigeria. At this initial juncture, the unknown subject’s line of recruitment will take one of two paths.
“Friendship”
After establishing this new on-line “friendship,” the unknown subject explains that, for various legal reasons, his/her country will not let direct business shipments into his/her country from the United States. After the unknown subject has “played" their sad story, he/she asks for permission to send recently purchased items to his/her United States address for subsequent shipment abroad. The unknown subject further explains that he/she will cover all shipping expenses. After the U.S. citizen agrees, the proverbial “flood gates” open and the packages start to arrive at great speed. This fraudulent scheme lasts several weeks until the “reshipper” is contacted. The victimized merchants explain to the “reshipper” that the recent shipments were purchased with fraudulent credit cards. The “reshipper” is interviewed by law enforcement and usually cooperates in the investigation.
“Love”
This recruitment method is very similar in nature to the scheme detailed above. However, instead of friendship, this unknown subject uses the art of seduction to ensnare his/her unwitting accomplice. The unknown subject quickly confirms his/her romantic overtures by providing his/her unsuspecting partner with a nominal gift.
After the romantic trap has been set, the unknown subject proffers the idea of him/her being allowed to utilize their partner’s U.S. residential address for the receiving and subsequent reshipping of the recent on-line purchases. Once the agreement has been reached, the packages start to quickly arrive and, out of his/her feelings of obligation, the packages are quickly prepared for reshipment abroad. Several weeks pass and eventually, the U.S. girlfriend/boyfriend is contacted by the victimized merchants. Shortly thereafter, the strings of attachment are untangled and the boyfriend/girlfriend realize that their Cyber relationship was nothing more than an Internet scam to help facilitate the transfer of goods that were purchased on-line by fraudulent means.
“Reshippers” Economic Impact
In preparation for Operation Cyber Sweep, the Internet Crime Complaint Center (IC3), through its established public/private alliance with the Merchants Risk Council (MRC), requested suspected on-line fraudulent “Reshipper” transaction for the 120 days preceding November 1, 2003.
Numerous Reshipper investigations have been initiated nationwide and abroad, coordinated via the IC3. USPIS, FBI, USSS and a myriad of state and local agencies have participated in these investigations.
Members of the MRC reported 7,812 fraudulent transactions with an aggregated potential economic loss of $1.7 million. Analysis of the transactional data identified
5,053 addresses in the United States that were utilized in the furtherance of the “Reshipper” scheme.
As a result of the continual real time sharing of information between law enforcement and private industry, over $350,000 in merchandise was recovered and returned to the respective victim companies.
According to the MRC, e-commerce in the United States has experienced losses related to the “Reshipper” scheme in excess of 500 million dollars.
“LOVERSPY” Intrusion/Illegal Interception of Communications
The subjects of this investigation were selling a service marketed as a way to “catch a cheating lover.” The service sends software in the form of an e-mail greeting card, which says, “I Love You” or a similar message. Once the greeting card is opened, the software installs itself on the victim’s computer and logs all keystrokes. The service was marketed to potential buyers via spammed e-mail messages. For $89, each buyer received access to a webpage that allowed him or her to send five greeting cards containing the malicious software that could be sent to five separate e-mail addresses. Both the main subject and the buyers received logs of victims’ computer activity. The subject also received copies of all keystrokes.
In October 2003, a search warrant was executed at the residence of the main subject which revealed more than 1,000 victims of intrusion with an egregious loss of privacy and an estimated economic loss of $500,000. The number of victims and the economic loss are expected to increase as the records obtained during the search are analyzed. Charges for intrusion and interception of electronic communications against the main subject, co-conspirators, and purchasers of the software are being considered.
This case is being prosecuted by the U.S. Attorney’s Office, Southern District of California, and investigated by B-ICE, Department of Justice-CCIP and FBI San Diego.
Auction Fraud (Non-Delivery of Merchandise)
In what eBay and investigators believe may be the largest domestic eBay auction fraud case, Russell Dana Smith, aka John P. Leary, is charged in a 54-count indictment returned in the District of Utah with operating a scheme to defraud winning bidders of eBay auctions by failing to deliver equipment purchased by winning bidders. The indictment alleges Smith auctioned computers on eBay and had auction winners pay for the computers by sending money to him through the mail or having payments transferred into his bank accounts. Although winning bidders paid for the computer equipment, the indictment alleges Smith did not provide the equipment to them. The dollar loss and total number of victims in the case is still under investigation, although both appear to be substantial.
This case was investigated by the Utah Cyber Crime Task Force, composed of the Federal Bureau of Investigation, the Department of Defense, the United States Postal Inspection Service, the Utah State Attorney General’s Office, the Salt Lake City Police Department, the West Valley City Police Department, and the South Salt Lake City Police Department.
Access Device Fraud
In a case highlighting the multiple criminal violations often employed in a typical fraudulent Internet scheme, the subject of this investigation orchestrated a sophisticated plan to obtain expensive electronic merchandise through a combination of Access Device Fraud, Identity Theft, Credit Card Fraud, Wire Fraud, and Mail Fraud. The subject facilitated this scheme by illegally obtaining legitimate Internet connection accounts for customers of a major Internet Service Provider (ISP). The subject accomplished these ISP account takeovers by entering ISP chat rooms and cutting and pasting the list identifying which users were currently in the chat room. The subject then used “cracker” software, available for download from the Internet, to gather information concerning the users’ passwords. This code breaking software utilized a brute force attack which was able to randomly guess the user IDs and passwords of approximately 800 of the ISP's legitimate customers. Once in possession of the victims' account information, the subject logged onto the Internet and assumed the identity of one or more of his 800 victims. The subject made use of the ISP's shopping feature to scour the Internet in search of high-end electronic equipment. This equipment was purchased and billed directly to his victims’ credit card accounts which were already on file with the ISP. The merchandise, valued at over $70,000.00, was shipped to the subject and his associates.
Investigation determined the identities of 70 different victims were utilized to fraudulently purchase merchandise via this criminal scheme. The Federal Bureau of Investigation and the United States Postal Inspection Service participated in this investigation.
International Initiatives
Numerous on-line complaints have been filed with the Internet Crime Complaint Center (IC3), wherein the alleged perpetrator(s) reside abroad. After analyzing the complaints and identifying the country from which the offense originated, the IC3, in coordination with the Federal Bureau of Investigation’s (FBI) Legal Attaché (Legat) program, forwarded numerous Internet Investigative Reports to those FBI agents assigned abroad.
In response to those IC3 complaints, Legat Lagos (Nigeria) provided details of the perpetrators’ various on-line fraudulent activities to their counterparts at the newly created Nigerian Economic and Financial Fraud Commission (EFCC). One of EFCC missions is to “Contribute to the Global war against financial crimes.”
As a result of the joint efforts between the FBI and law enforcement officers in Nigeria, to date, FBI Lagos has assisted in the recovery of over $100,000 in merchandise that was fraudulently obtained on-line and has recovered 2.1 million dollars in fraudulent cashier’s checks.
Additionally, FBI Lagos is currently providing investigative assistance to the EFCC regarding a recent recovery of numerous fraudulent bank documents and checks. So far this investigation has identified six subjects in Lagos and two victims in the United States. The subjects in Nigeria have been arrested and the FBI is attempting to locate and interview the victims in the United States.
Internet Investment Fraud
An Internet Investment Company founded and established an on-line website at www.EE?BIZ VENTURES.COM (EBV). EBV claimed to be a Christian?based humanitarian organization that helped individuals improve their financial situation. EBV solicited individuals, via the Internet and Internet chat rooms, to invest money with promises of a 100 percent return in three to four days. Investors, known as participants, were led to believe EBV was able to make such large investment returns due to overseas investments and day trading, when in fact, no such investments were made by EBV. Participants were required to set up an E?GOLD account and transfer funds from their E?GOLD account to various EBV, E?GOLD accounts. Participants invested in $20.00, $50.00 and $125.00 increments with a maximum daily investment total not to exceed $5,000.00. 26,000 victims located throughout the world lost a total of 50 million dollars as a result of the fraud. Seven subjects have been identified and two subjects have already pled guilty.
This investigation was conducted by the Federal Bureau of Investigation, the Postal Inspection Service and the Security Exchange Commission.
Identity Theft
The subjects in this investigation obtained victims’ identity information by stealing U.S. mail from victims’ mailboxes, vehicles, and homes. The subjects then created credit card accounts and forged checks utilizing the stolen identities. To aid their scheme, the subjects used computers to create checks and fraudulent Department of Motor Vehicle, U.S. Military, and business identity cards for the stolen identities. These false identity cards were then used to cash the forged checks and purchase goods with the fraudulent credit card in local stores and over the Internet.
This scheme affected more than 200 victims with an estimated loss expected to exceed $100,000. Twenty-one subjects were indicted on October 31, 2003.
This case is being prosecuted by the San Diego District Attorney’s Office. The law enforcement agencies involved in this investigation include: San Diego Cyber Crime Task Force, Chula Vista Police Department, USPIS, Social Security Administration, California Department of Motor Vehicles, US Naval CID, B-ICE and FBI San Diego. Intrusion/Extortion
The Washington Post obtained information that Forensic Tec Solutions, a computer security consulting company, illegally entered confidential government and business computers. The consultants purportedly entered these systems to notify victims of system vulnerability problems, gain exposure/publicity and subsequently offered to protect the systems for a fee. Investigation has confirmed that computers located on military installations, government facilities, and 70 civilian businesses, to include law and medical offices, were illegally accessed by employees of Forensic Tec Solutions.
Law enforcement personnel from the San Diego Regional Computer Forensics Laboratory, the FBI, Army Criminal Investigative Command's Computer Crime Investigative Unit, and NASA Inspector General's Office executed a federal search warrant and analyzed the evidence. Brett O’Keeffe, the former president of Forensic Tec Solutions, was recently indicted for unauthorized access to protected computers and arrested.
The following agencies are involved in this investigation: NASA's Inspector General's Office, Army Criminal Investigative Command's Computer Crime Unit, Department of Energy Inspector General's Office, Defense Criminal Investigative Service, Naval Criminal Investigative Service, the US Attorney’s Office-Southern District of California, and FBI San Diego.
MSBlaster
This investigation was initiated in response to the illegal release of the Internet worm known as MSBlaster. As a result of this worm’s release, Microsoft experienced a successful distributed denial of service attack (DDoS) on their Internet website, Microsoft.com. This DDoS attack caused the Microsoft website to be shutdown for approximately four hours. Upon notification from Microsoft to the Northwest Cyber Task Force (NWCTF) that possible information regarding the source of the worm had been detected, the NWCTF, together with the United States Secret Service (USSS) and FBI agents from San Diego, Minneapolis, Boston, Seattle, Dallas and Raleigh, coordinated this complex investigation and seized vital computer evidence. Two search warrants were executed which resulted in the recovery of digital data. Analysis of the recovered data assisted in the ultimate identification and arrest of the two responsible subjects. The potential loss due to the MSBlaster worm is estimated at over $10 million dollars.
The NWCTF is composed of investigators from the USSS, the FBI, the IRS, the Washington State Patrol, and the Seattle Police Department.
On-line Death Threats
During July 2003, subject Charles Booher, sent numerous email and telephonic death threats to an individual residing in Canada. Booher thought this individual was responsible for sending him spam email. The threatening messages sent by Booher were very explicit and graphic threatening to kill or maim the victim, as well as any employee at the victim's company. The Internet Service Provider (ISP) made numerous attempts to get him to stop, but he continued until his account was terminated. The Sunnyvale Department of Public Safety also made contact with Booher in hopes of getting him to stop, but he continued making almost daily death threats to the victim. Charles Booher was indicted on four counts of “Sending Interstate Threatening Communications”, November 18, 2003. Auction Fraud (Non-Delivery of Merchandise)
In October 2003, the Boone County Kentucky Sheriff’s Department initiated a fraud investigation into the activities of Michael D. Hoffert of Florence, Kentucky. The investigation was opened based on complaints from victims who made bids on items posted at Internet auction sites and were then subsequently contacted by Hoffert, offering to sell the same item for less than the current bid. Hoffert would arrange for the victim to send him money via wire transfer, or money orders for the item, which ranged from computer equipment to high end electronics, and upon receipt of the funds, would break contact and not deliver the item.
The Internet Fraud Complaint Center was instrumental in identifying victims of this scheme, which increased the loss figure to over $7,000.00.
On October 31, 2003, the Boone County Sheriff’s Department executed a search warrant at Hoffert’s residence in Florence, Kentucky, which resulted in the seizure of computers, and other items deemed to be of evidentiary value.
On November 7, 2003, Boone County District Court Judge Michael Collins issued an arrest warrant for Michael D. Hoffert for eight counts of Theft by Deception. On November 9, 2003, Hoffert was arrested by the Warren County Ohio Sheriff’s Department, and is currently lodged in the Warren County Ohio Jail, awaiting extradition to Boone County, Kentucky.
The following agencies participated in this investigation: Boone County Sheriff’s Department, Warren County Ohio Sheriff Department, and City of Florence Kentucky Police.
Lowe’s Corporation – Intrusion Matter
Lowe’s Corporation Network Security and System Administration personnel detected intrusions into their company’s computer network and notified FBI Charlotte via the InfraGard representative. Subjects gained unauthorized access to Lowe’s network in an attempt to obtain credit card transaction data. A subsequent intrusion on October 25, 2003, was detected at the Southfield, Michigan Lowe’s store. In response, a 24-hour surveillance of the Southfield Lowe’s store was initiated by local and federal law enforcement agencies, FBI Charlotte manned 24-hour shifts at Lowe’s Corporation Headquarters, and personnel from the FBI Electronic Research Facility (ERF) traveled from Quantico, Virginia, and installed specialized equipment to capture network traffic data at the Southfield Lowe’s store.
On November 9, 2003, two search warrants were executed by FBI Detroit and subjects Adam W. Botbyl and Paul G. Timmons were arrested. During the search, approximately 25 computers, network micro cells, telnet servers, and telephone diagnostic tools were seized. Botbyl and Timmons were charged with violating Title 18, USC, Section 1030 (a)(5)(A)(i), “knowingly causing the transmission of a program, information, code and command, and, as a result of such conduct, intentionally caused damage, without authorization, to a protected computer.”
Although the subjects were skilled enough to gain initial access to Lowe’s network, a swift and coordinated response by Lowe’s personnel and law enforcement resulted in the apprehension of the subjects, denial of unauthorized access to credit card data and prevention of serious damage to the network. The estimated costs related to investigate the intrusion and secure the network have not yet been determined.
The following law enforcement agencies participated in this investigation: Waterford Township Police Department, Bloomfield Hills Police Department, Southfield Police Department, Allen Park Police Department, Ottawa Sheriff’s Department, Macomb County Sheriff's Department, FBI Charlotte, and FBI Detroit.
Chicago Re-Shipper/Counterfeit Check Scam
This matter was initiated by the Lansing, Illinois Police Department, upon being notified by several industry participants of the Merchants Risk Council (MRC), that a suspect address in Lansing, Illinois was being used to receive and re-ship numerous packages of miss-appropriated merchandise. Lansing PD requested the assistance of the U.S Postal Inspection Service in this matter. Joint investigation determined that the subject was actually using four separate addresses to facilitate the scheme. Subject was identified as a Nigerian national living in Illinois. Subject was arrested, and through a search and surveillance conducted incident to that arrest, approximately $100,000 in counterfeit checks were recovered, as well as merchandise and invoices from forty two separate merchants, reflecting losses of more than $70,000.
Subject, who continues to cooperate pursuant to arrest, has provided details regarding both the substantial re-shipper scheme, as well as the expanded scheme to enlist additional participants, who would ultimately become victims, upon learning that the payments they received were counterfeit cashiers checks. Typically, these additional participants/victims are asked to assist the subject, either in a re-shipment of merchandise, or in handling a payment from a third party, that the subject is not capable of handling. Due in part to the quality of the counterfeiting, checks were not determined to be bogus for several days after being deposited into the victims account. By that time, the victim, believing the check to be authentic, had already deducted his/her profit, and forwarded the remainder (via wire transfer/Western Union) to subject overseas.
Romanian Internet Fraud Investigation
The Romanian General Directorate for Combating Organized Crime (DGCCOA), in cooperation with the United States Secret Service, arrested a subject in Alba Julia, Romania, who was responsible for a large scale "Phishing" scheme resulting in nearly $500,000 in on-line losses.
The subject forwarded spoofed emails resembling an actual auction web page to the attention of bidders who were not successful in an online auction. On this spoofed page, the subject advised victims of the availability of a similar item for a better price. Upon visiting the "sale" page, victims were asked for personal information including their name, bank account numbers and passwords. The victims were then advised that they "won" the spoofed auction and agreed to send money to the subject through a spoofed escrow site created by the subject.
This investigation had a positive impact in protecting American citizens against on-line fraud emanating from abroad.
SPAM
Allan Eric Carlson was charged with "hacking" into computers around the country. Subsequent to the initial illegal intrusions, Carlson hijacked or "spoofed" return e-mail addresses of reporters at the Philadelphia Inquirer, the Philadelphia Daily News, and the Philadelphia Phillies. Carlson used these accounts to launch spam e-mail attacks. Carlson was also charged with identity theft. This case marks the first use of an identity theft statute against an e-mail spammer. Carlson faces a maximum possible sentence of 471 years imprisonment, $117,250,000 in fines and a special assessment of $7,800.
This case was investigated by the Federal Bureau of Investigation.
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
The Merchant Risk Council is pleased to continue working with Law Enforcement and we are very pleased to establish formal partnerships with the Internet Fraud Complaint Center, FBI, U.S. Postal Inspection Service and other areas of law enforcement.
Through collaboration with law enforcement we firmly believe our organization is helping ensure that on-line shopping continues to be safe and profitable for both consumers and merchants.
Julie Fergerson
Co-Chair, Merchant Risk Council
512-977-5525
About the Merchant Risk Council
The Merchant Risk Council (formerly known as the Merchant Fraud Squad) is a not-for-profit organization founded in September 2000. It provides education about fraud prevention techniques and encourages businesses selling online to adopt best practices and anti-fraud technologies. The Council’s merchant focus distinguishes this group from others that are trying to combat this problem.
To learn more about the Council and sign up to join, visit www.merchantriskcouncil.org.
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
WASHINGTON, D.C. – Nov. 14, 2003 – “The Software & Information Industry Association (SIIA) commends the efforts of the Attorney General, the Department of Justice, CCIPS, FBI as well as the Bureau of Immigration and Customs Enforcement in their steps to help combat the increasing problem of online piracy through effective educational and enforcement programs and initiatives. The Department of Justice’s increased involvement in this war against theft of digital code and content that is exemplified through today’s announcement is both much needed and appreciated.”
“Piracy has become a subculture of criminal activity where criminals believe that the malicious act of digital piracy is a victimless crime that has no punishment. SIIA believes it is essential to send a clear message to digital pirates that stealing copyrighted works is not only wrong but could result in stiff penalties and even jail time. The action announced today – in conjunction with prior enforcement activities – goes a long way toward that goal.”
“SIIA will continue to work closely with law enforcement to actively change the notion that piracy does have victims and that it will carry with it grave consequences.”
About SIIA The Software & Information Industry Association (SIIA) is the principal trade association for the software and digital content industry. SIIA provides global services in government relations, business development, corporate education and intellectual property protection to more than 600 leading software and information companies. For further information, visit http://www.siia.net.
# # # #
Contact: James Kim 202 289 7442, ext. 1362
__________________
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
update When Deborah Fraser's credit card number was stolen, the thief didn't use it to buy a new car or a high-end laptop. Instead, the number was used to buy something potentially much more valuable--a domain name with the word "ebay" in it. [/quote
__________________
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
monsta_mo (29 ) View Listings | Report 13-03-07 18:17 GMT 0y mum has had a sum of money debited from her credit card by a company claiming to be ebay.co.uk. There has been no activity on her ebay or Paypal account...ever. So far she's ahd no feedback from her creditcard company. Anyone else experienced this?
dark_angel_london (1070 ) View Listings | Report 14-03-07 11:04 GMT 2 of 2 If she doesn't recognise the transaction then tell your mum to contact her bank/card company and tell them it's an unauthorised transaction. They'll look into it and the funds should be back on your mum's card.
__________________
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
The British terror cell that allegedly plotted to blow up flights from London to the U.S. helped finance the operation by buying and selling items on eBay, according to an intelligence report obtained by ABC News.
The intelligence update said suspect Assad Sarwar, 26, "used eBay extensively" to raise funds for the plot. "It is believed they would sell and purchase items to make a profit to fund [the] plot." There were no further details in the report. A spokesperson for eBay had no immediate comment.
The report says Sarwar also surfed the Internet to price and purchase supplies, including 20 liters of hydrogen peroxide bought online from a hydroponic gardening center. Hydrogen peroxide is a critical ingredient in several types of homemade explosives.
Police say the plotters, who were arrested in August, intended to blow up as many as nine airplanes using liquid explosives disguised in sports drink bottles, in what would have been the most massive terrorist blow since Sept. 11, 2001.
According to the report, the suspects devised a chillingly effective method to conceal their detonators. They hollowed out AA batteries and experimented with filling them with a small amount of homemade explosives and other components. Numerous AA batteries were seized at a house in High Wycombe, U.K., that investigators describe as "the bomb factory."
Video secretly recorded at that location allegedly shows two suspects at work drilling small holes in the bottom of plastic juice drinks. The update says, "They would then drain the liquid and replace this with [a homemade explosive] mixture."
The report indicates that London counterterrorism officials and police investigators are continuing to gather new evidence in the plot. By late September, at least 97 locations had been searched, and more than 14,000 separate exhibits catalogued by police.
"The enormity of the alleged plot will be matched only by our determination to follow every lead and line of inquiry," Deputy Assistant Commissioner of London's Metropolitan Police, Peter Clarke, said in August. "The meticulous investigation of all this material will take many months. All the data will be analyzed. There will be thousands of forensic examinations and comparisons. Fingerprints, DNA, electronic data, handwriting comparisons, chemical analysis and indeed the full range of forensic disciplines will be used."
A spokesperson for Scotland Yard said it had no comment on this ABC News report.
Thanks for reading this report!
Ciao
[file edit note: edited to fix link]
-- Edited by Cyber Diva at 12:05, 2007-03-16
__________________
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
Update, here is a screenshot of an Orkut Hezbollah group which is serving paid advertisements from eBay and other Google publishers via Google AdWords : Hezbollah Orkut Group Screen Capture.
Sure the argument can be put together that Google is not responsible for the content which is created by members of their Orkut community, which lets registered users set up their own forums, blogs, and groups to connect different users over the Google network.
Pay per click revenue from these ads goes directly to Google.
“There is a destiny that makes us all brothers: None goes his way alone.
What we put into the lives of others,
comes back into our own.”--Edwin Markham
Page 1 of 1 sorted by
CAPP -> CAPP -> PASSION, DO YOU WANT TO TALK ABOUT HOW TERRORISTS FUND THEIR OPERATIONS???