Preview

Atm Skimming

Better Essays
Open Document
Open Document
1252 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Atm Skimming
-------------------------------------------------
ATM Skimming
An Ethical Look
April 16, 2013

In the world we live in today our currency is promises. Our money is just paper backed by the promise of the United States government to back it up with hard currency, i.e. gold. Due to our lack of hard currency in everyday life there are many different ways to pay for things. These include: checks, credit cards, paper currency, and bank cards. One thing that has not changed about money is that, like every other thing valuable, people will try to steal it no matter its form. One of the most damaging types of thefts now is that of ATM (Automated Teller Machine) Skimming. Most people keep the bulk of their capital in banks. They use ATMs to access that money. Thieves have a way to conspicuously steal the information unique to their accounts so they can access others’ money. This is devastating to people and it is this issue on which I write.
On February 12, 2013 an article was written. It was entitled ‘How alleged crooks used ATM skimmers to compromise thousands of accounts’. Federal Authorities have charged two men with running an operation to gain control of over 6,000 bank accounts. The banks targeted included: Capital One, J.P. Morgan Chase, among others. These criminals bought card readers and installed them on top of ATMs and doors to ATMs. They also made hidden pinhole cameras to watch people put in their pins. These people supposedly led a group of 9 or more people who put these devices all over cities. These cities included Manhattan, Chicago, and Milwaukee. The people would then use the information to make fake cards, which would be used for false purchases and withdrawals. This operation had “stash locations” to manage the information. One such facility had hundreds of hours of footage showing PINs being input. More than 1,000 blank cards were also found here. Due to the gravity of the crimes these men face around 40 years in jail. Prosecutors are also



Bibliography: Council, ACM. ACM Code of Ethics. 16 10 1992. Web Site. 16 April 2013. Goodin, Dan. "How alleged crooks used ATM skimmers to compromise thousands of accounts." Ars Technica (2013). Internet. Hampton University. Student Technology Guide. n.d. PDF File. 16 April 2013.

You May Also Find These Documents Helpful

  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security numbers, and military identification of 451,000 customers. The data theft took place over an eighteen month period without anyone’s knowledge. The security controls in place out grew the total size of the company. The system was way overdue for a complete overhaul, because the system was so far out of date with the new technology. I read further about this on the internet and came to find out that the hackers went undetected for seventeen months. This time frame gave the hackers plenty of time to take forty-five…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: ACM Code of Ethics and Professional Conduct. (1992, October 16). Retrieved December 17, 2011, from Association for Computing Machinery: http://www.acm.org/about/code-of-ethics…

    • 578 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Randy Vanderhoof Summary

    • 1496 Words
    • 6 Pages

    In 2012, citizens in the United States incurred 47.3% of global fraud. Imagine being one of the 47% who nearly lost everything (Vanderhoof, 213). One has the option to stand up to fraud or sit back and become a victim. Randy Vanderhoof explains the importance of technology in the fight against fraud at length in his article, “Can Technology Protect Americans from International Cybercriminals?” In his testimony, Vanderhoof expresses the importance of EMV (Europay, Mastercard, and Visa) chip technology in the fight against bankcard fraud (Vanderhoof, 212). Vanderhoof cites the high amount of security that EMV chips have beyond traditional magnetic stripe cards. In addition, Vanderhoof cites recent hacking events to illustrate the need for EMV…

    • 1496 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    A business fraud I came across is known as "Wells Fargo's Fake Accounts". As everyone knows Wells Fargo is one of the most used banks even back when it was known as Washington Mutual. This business fraud is quite interesting because I didn't think this kind of fraud could happen. Back in December 28,2016 Wells Fargo was caught with fake accounts. The employees for this bank had a quota that had to be submitted by a certain date and time. In order for the employees to meet their quota they thought of opening fraudulent customer accounts, but, in order not to be caught most of the accounts were closed before customers had a chance to notice. Until one day the customer had to pay associated fees and their credit rating started to drop. Due to…

    • 183 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    The increasing popularity of online shopping, automated teller machines (ATMs), online banking, point-of-sale terminals, telephone bill payments, and many other monetary devices that use the internet created major security issues. The threat of identity theft, stolen banking information, and other personal information was cause for major concern. With these threats looming, the Electronic Fund Transfer Act (EFTA) was created to protect people who were entering a new age of technology. This act protects people while using access devices. According to The Federal Reserve (2008), an “Access device is a card, code, or other means of access to a consumer’s account or a combination used by the consumer to initiate EFTs. Access devised include debit cards, personal…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Legal/Ethical Boundaries

    • 860 Words
    • 4 Pages

    References: American Association of Medical Assistant (AAMA). (1996-2013). Medical assistant code of ethics. Retrieved from http://www.aama-ntl.org/about/code_creed.aspx.…

    • 860 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Horner, J.S. ‘Reply from chairman of BMA’s Medical Ethics Committee’ (1996) 313 British Medical Journal 1477…

    • 2744 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Siegler, M., and W. Winslade. "Ethics in Medicine." Clinical Ethics. By A. R. Jonsen. 7th ed. N.p.: McGraw-Hill, 2010, N. pag.…

    • 478 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    . Ethics. Noël Merino, Ed. Current Controversies Series. Greenhaven Press, . . . . 2010.…

    • 671 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Rough Draft

    • 567 Words
    • 3 Pages

    Imagine if someone is pretending to be you, using your credit card to indulge themselves in items that they would never be able to afford. Credit card fraud is far too common today, losing a wallet can mean losing your identity. A credit card can be a positive or negative thing, depending whose hands it’s in. Credit card fraud is a problem, that I believe, I have found the solution to.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cbt Essay

    • 5237 Words
    • 21 Pages

    British Association for Behavioural and Cognitive Psychotherapies. (2010), ‘Standards of Conduct, Performance and Ethics’, pg 7, point 3. http://www.babcp.com/Membership/files/conduct-and-ethics.pdf [accessed 8 November 2011].…

    • 5237 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    Racial Profiling

    • 1321 Words
    • 6 Pages

    By Jesper Ryberg within the Journal of Ethics; March 2011. This journal article was discovered…

    • 1321 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Personal Ethics Paper

    • 1186 Words
    • 5 Pages

    References: Barrocas, A.,Yarbrough, G., Becnel, P., & Nelson, J. E. (2003). Ethical and legal issues in…

    • 1186 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Data Breach

    • 3998 Words
    • 16 Pages

    A “global cyber fraud operation” sounds like something straight out of a James Bond movie. But when cyber crooks recently infiltrated Heartland Payment Systems’ processing system and accessed potentially tens of millions of credit card numbers, company executives learned that type of criminal activity is very real.…

    • 3998 Words
    • 16 Pages
    Better Essays
  • Best Essays

    Kreie, J., Cronan, T. (2000). Making ethical decisions. Communications of the ACM, 43(12), 66-71. Retrieved from http://cacm.acm.org…

    • 1849 Words
    • 8 Pages
    Best Essays