mercoledì 13 luglio 2011

car crash


A common technique in the parking lots of malls is delfalso accident. While the victim is switching to exit or enter the parking lot, the accomplice of the scammergives the car a hit with the hand or with a rock, giving the driver the impression that there was a small buffer. The other shows a scratch or a dent fraudster on your car.The damage, of course, was there before. But the victim can not know, so you donot convince you to call your insurance: damage to this small not worth ending up in a higher risk class. So shall obtain 100, 50 euros - depending on how the elderlyhave in the portfolio at that time - the "cost of repair."

FRAUD Lebanese LOOP



The cash debit will be applied to a device that, once inserted the paper holds so that the distributor can no longer return




the customer is confused, can not complete the transaction will get back the paper.
At this point you can take the fraudster, pretending to provide assistance to the customer in front of the door, invited him to re-enter the PIN so allowing them to memorize
After removal of the victim the criminal can retrieve the card and use it with the pin when stored

Skimming over ATM
It 'much more diffuse and above all more effective than "Lebanese Loop", as the customer uses the ATM usually without realizing that the data are copied to the new card. This is made ​​possible by a device mounted in the card insertion slot and a small camera mounted on the control panel,
that films the PIN code.

Everything seems normal ...


In fact, the insertion of the card slot is covered by a panel created to capture information on the magnetic stripe ..

This brochure does not arouse suspicion leads
.



In fact hides a camera that records the PIN code

The pin can be captured through a dummy keyboard applied to the real


Just to avoid this type of attack many vending machines now use an Encrypted Pin Pad.
Interception of the PIN
The pin is detected internally in the transition from the numeric keypad to the circuit where he will be encrypted and sent for testing. This type of fraud is more sophisticated but less common. 


CREDIT CARD 1


First of all cloning, which allows you to capture data from a card and obviously the owner does not know if the POS or ATM has been tampered with.




Another danger is the phishing scammers likely to reproduce a letter from your bank asking you to provide certain information such as PIN, expiry date. Warning! This refers to information that should never be transmitted over the network nor nor in reality. Also be careful not to throw this information in the bins, by 
which could be retrieved.
Finally, cloning is based on the acquisition of information from 
holder. 

For purchases over the network just will not use the card of unknown sites and take advantage of the protection system made ​​available by the Italian and international banking. Unfortunately, in real life we can not know whether the equipment of 
operators were counterfeit. 
However, we can do something! We can activate a notification service through which 
sms alerts us if the card was used. Sure, it can prevent the damage, but the limit if we block the card promptly.


But technology advances are making progress and analysis of operations systems and predictive systems: monitoring the operations performed, the system detects abnormal use and in this case it does the verification procedure, until 
card lock.
In addition, it is introducing the "liability shift" in case of fraud is addebiatato the economic damage to those who, although they may not have activated control procedures. The most important change, however, is the transition from stripe cards 
the magnetic microchip, which ensures greater safety.
In the future, there will be an additional shield offered by the "token", the mechanisms by which we obtain passwords disposable

CONTROLLER MONEY


Again calculate the money: 

Our dear grandfather is at the post office to collect his pension, a tidy sum this month, four exchanges usual chatter and if it goes quiet institution. At a certain point is reached, on the street, a gentleman, very elegant, which is identified as the boss of the email, tell the grandfather that the employee has made ​​a bit 'of confusion, made ​​a mistake in counting the money and then must recount. Well, the grandfather in good faith gives him the money and they begin to count them one by one ... all right, there is no error and return the money back. The grandfather goes to the expense and time to pay a nice surprise, the money is all fake! 

But how did this happen? Simple really the boss was a con man who has followed every move of his grandfather in the mail ... then when the count, taking advantage of the traffic and confusion, with a clever sleight of hand has replaced real money with fake ones !

False gems: 

The classic foreign man must return to his country of origin, but has run out of money and to recover a few dollars is forced to sell off some of its precious stones. Start the deal, the price is really very interesting, but the buyer has any doubts, until at a certain point comes another man who says he is very interested in the goods, because it qualifies as a major jeweler (the 's buyer thinks, "then it is true, the stones are of great value, what a bargain the deal !")... goes on for a little 'and the buyer to check at the end, the stones are his! He went happily in jewelry, but there he discovers that the stones are fake! And he understands all the deception!

NIGERIAN FRAUD AND VARIATIONS "419 scam"


There are hundreds of variations to this scam, but more or less the way it is always the same: a stranger would not be able to unlock a bank account of millions of dollars, and because he is a famous person would need a nominee who would fulfill the discrete task in its place. He offered him some users by giving them this opportunity in exchange for a promised share of the spoils. The scam is also called the 419 scam (419 is the reference number of the Nigerian law, casually ignored by Nigerians, making these illegal calls).

Why is it a scam
It is easy to see that this is just an attempt to defraud. Beyond the ordinary common sense, the operation would take place if it were not true e-mail, and certainly would not use a complete stranger as an intermediary. There are also many elements that attempt to expose the scam:
The same invitation was sent to many other people (million), always using the same formula.
The text of the message uses often (but not always) a generic and imprecise language (such as Dear Friend, Dear currents, etc. ...). Technological advances have reduced this aspect, however.
Online literature is full of these cases and documented.
The opportunity is too good to be true, and the sender puts pressure on the victim to end it.
MECHANISMS
The 'investors' are usually contacted with an offer like this: "In this poor country there would be a very rich person who would need to move money abroad with the utmost discretion, could use his account?".


The sums involved are usually in the millions of dollars, and the investor is promised a large percentage, often 40%. The proposed agreement is often presented as a harmless crime, in order to dissuade participants from contacting the authorities. In Nigeria, the operation is professionally organized, with offices, fax numbers, and often working with contacts in government offices. Investors who try to find out what is in front of the offer, they often find an organized system, in which all the pieces are combined.


At a time when the victim agrees to participate in the deal, the fraudster sends some first fake documents stamped with stamps and official seals of the government, or alternatively send some mail to inform the member of "progress." Soon, however, begins to talk of delays, related to corruption or bureaucratic requirements that require a large cash advance. The deadlines are extended and gradually increase costs, but is kept alive the promise of the imminent transfer of money. The psychological pressure is kept high, to stimulate cheated to conclude quickly without involving other people.


In some cases the victims are invited to meet with government officials in Nigeria, often false. Some are victims once they have reached even taken hostage until a ransom, or are brought into the country illegally without a visa and then blackmailed to be able to get out. In extreme cases the victim may also be killed.


In any case, the vaunted money transfer never happens, of course, since the money or gold does not exist.
VARIANT

A variant of the scam can be carried out by a fake lawyer who represents the heritage of distant relatives never knew the victim of the scam. The relatives were killed in a car accident or plane.The fake lawyer revealed the victim went to meet to be insurmountable problems but they can find it. It only needs that the victim forwards the information of his bank account to send potergli of the millions of dollars they deserve. (Mechanism taken almost entirely from an episode of the famous films TOTO


Another variant is sold as 'winning notification' of a lottery company, especially in the United Kingdom and the Netherlands, which requires payment in advance to raise the money that the victim has 'won'.


Still, the scam is revived several times in hotels with more plausible amounts of money. In this version, the con artist offers to book a large number of rooms, gala dinners etc.. and promises to pay hefty advances, but for different reasons (from the Revolution to the credit card blocked) calls for the landlord to pay a certain sum initially in its favor.


SCAM OF THE SALE OF GOODS
More modest but no less profitable, is another scam perpetrated in the sale of used goods. The attempt of fraud is especially (but not exclusively) for goods rather rare, niche, or exclusive. The typical situation is where a real person (the potential cheated) sells an asset (car, motorcycle or other goods) by placing ads on the most popular sales channels. The scammer is almost always available immediately to pay the full price, without haggling. At this point there are different versions:
Is sent a check for more foreign bank to the seller the agreed price, and after a few days is required to return the excess. The international counterfeit check is difficult to verify, and banks themselves may have difficulty in verifying the authenticity.
Are required by the fraudster payment details, and, once received, you are informed that for various reasons he can not make payment until he is sent to a small sum of money (for example, if the country is African, prompted for a sum of money as payment of a fee for phantom purchases abroad, and promises to repay the amount with the final payment).
The scammer / buyer claims to be in a country, but had packed up in another country, and almost always have a contact in Italy, and creates one thousand subterfuges to get to send some money.


SALE OF PROPERTY FRAUD



More modest but no less profitable, is another scam perpetrated in the sale of used goods. The attempt of fraud is especially (but not exclusively) for goods rather rare, niche, or exclusive. The typical situation is where a real person (the potential cheated) sells an asset (car, motorcycle or other goods) by placing ads on the most popular sales channels. The scammer is almost always available immediately to pay the full price, without haggling. At this point there are different versions:
Is sent a check for more foreign bank to the seller the agreed price, and after a few days is required to return the excess. The international counterfeit check is difficult to verify, and banks themselves may have difficulty in verifying the authenticity.
Are required by the fraudster payment details, and, once received, you are informed that for various reasons he can not make payment until he is sent to a small sum of money (for example, if the country is African, prompted for a sum of money as payment of a fee for phantom purchases abroad, and promises to repay the amount with the final payment).
The scammer / buyer claims to be in a country, but had packed up in another country, and almost always have a contact in Italy, and creates one thousand subterfuges to get to send some money.


There is a community, Artists Against 419, which collects reports of sites that perpetrate this scam to report it to the host and the police and have it removed or make deiflash mobs to exhaust the available bandwidth. Other communities, such as 419eater, organize themselves to fool the scammers pretending to believe their message to make him lose time or even money (for example, asking to rent a hotel room for the trip to Nigeria).