Cops and Robbers – Las Vegas Stylejohnjay.jjay.cuny.edu/files/centers/cybercrime_studies/... ·...

Post on 31-Mar-2020

1 views 0 download

Transcript of Cops and Robbers – Las Vegas Stylejohnjay.jjay.cuny.edu/files/centers/cybercrime_studies/... ·...

Cops and Robbers – Las Vegas Style

(And Other Stuff I Think About)

© 2009 IBM Corporation1

Backgroundac groun

1983: Founded Systems Research & Development (SRD)

1992: Assisted Vegas casinos in detecting the subjects of interest –resulting in a technology known as Non-Obvious Relationship Awareness (NORA)(NORA)

1996: Created an identity-centric customer repository based on 4,200 disparate systems … >100 million resolved identities

2001/2003: Funded by In-Q-Tel, the CIA’s venture capital arm

2003: Demoted self, hired a CEO

2005: SRD acquired by IBM, now Chief Scientist, IBM Entity Analytics

Today: Focus is in the area of ‘sensemaking on streams’ with special

© 2009 IBM Corporation2

Today: Focus is in the area of sensemaking on streams with special attention towards privacy and civil liberties protections

Macro TrendsMacro Trends

© 2009 IBM Corporation3

Web 2 0Web 2.0

© 2009 IBM Corporation4

© 2009 IBM Corporation5

http://web.archive.org/web/20070621234750/www.e-sheep.com/spiders/02/index.html

Good News: The World is Not More DangerousGoo N ws h Wor s Not Mor Dang rous

67

vg A

ge 75M~17+%d

37

Av

300Mmbe

r D

ead

1900:WesternEurope

Today:Global

Average

300M~4.5%N

um

1300’s:“Black Death”

Today:If America

sunk into ocean

© 2009 IBM Corporation6

and everyone dies

“More Death Cheaper in Future” Graph

10 Kil t n

Mor D ath h ap r n Futur Graphec

utio

n 10 Kiloton Nuke

of

Exe

plex

ity 1918

Spanish Influenza

Com

© 2009 IBM Corporation7

Death

1918 Spanish Influenza Genome9 pan sh nf u nza G nom

© 2009 IBM Corporation8

“More Death Cheaper in Future” Graph

10 Kil t n = BadMor D ath h ap r n Futur Graph

ecut

ion 10 Kiloton

Nuke = Bad o

f Ex

e

E si

plex

ity 1918

Spanish Influenza

Easier

Com More Death

© 2009 IBM Corporation9

Death

Jerome Kerviel – US$7BJ rom K r $7

© 2009 IBM Corporation10

www.chinapost.com.tw/news_images/20080127/p1d.jpg

Jerome Kerviel – US$7BJ rom K r $7

Back it out Back it in Back it out Back it in

AnalyticCheckpoint

AnalyticCheckpoint

© 2009 IBM Corporation111 Day

Domains for Competitive AdvantageDoma ns for omp t t antag

Human Human Capital

FastestS ki

FirstSensemaking

T lD© 2009 IBM Corporation12

ToolsData

“Every millisecond gained in Every millisecond gained in our program trading p g gapplications is worth $100 million a year ”million a year.

Goldman Sachs, 2007 * Source Automated Trader Magazine 2007

© 2009 IBM Corporation13

L s V s: Las Vegas: An Ideal Laboratoryy

© 2009 IBM Corporation14

Fact or Fiction?Fact or F ct on?

Does the Bellagio Hotel and Casino really have a “vault” as depicted in movie Ocean’s 11?

Have casinos specifically targeted x-felons for employment?

Do casinos perform background checks of guests against public records?

Is facial recognition technology being used to monitor the doors for the early detection of cheaters?

Is there a gaming related watch list you can put yourself on … but not cannot take yourself off?

© 2009 IBM Corporation15

Does the gaming industry offer assistance in the creation of false identities and cover stories?

Las Vegas: StatsLas V gas tats

Fastest growing city in the United Statesg g y

38 million visitors a year

18 of the 20 largest hotels in the world

A mega-resort can support in excess of 100,000 g ppcustomers a day

Each resort contains 100+ system and with 20,000+ ysensors (data collection points)

Lateral information sharing to enhance prediction

© 2009 IBM Corporation16

g p(known cheaters, credit worthiness, etc.)

The Las Vegas Labh Las V gas La

False identitiesFalse identities

Distant recruiting

Internet-based sharing of vulnerabilities and tradecraft (inc device production)tradecraft (inc. device production)

Recruitment of trusted entitiesRecruitment of trusted entities

Insider threats are highest risk

© 2009 IBM Corporation17

g

The Scams …h cams …

Cheaters

Advantage players (e.g., card counters)

Insider threats/collusionInsider threats/collusion

Money laundering

Credit and check fraud

Insurance scams (e.g., slip and falls)

Armed cage takeovers

Executive kidnapping

© 2009 IBM Corporation18

Executive kidnapping

Ch ti L VCheating Las Vegas

© 2009 IBM Corporation19

Hardware VulnerabilitiesHar war Vu n ra t s

© 2009 IBM Corporation20

Card Counting “101”ar ount ng

Card ValueCard Value MathMath2 - 6 +167 - 9 010,J,Q,K & Ace -1,J,Q,K &

+1 -1 +1-1+1+1 -1 0

© 2009 IBM Corporation21

+1 -1 +1-1+1+1 -1 0

Card Counting Bet Variationar ount ng t Var at on

Count Count Count Count-2 +1 +4 +6

$5$1,000

$5 $5

© 2009 IBM Corporation22

Count Teamsount ams

© 2009 IBM Corporation23

Other HacksOth r Hac s

Card bendingCard bendingCard daubing/markingConcealed card counting devicesVideo poker Royal Flush generatorKeno random number defectReal time roulette physics for predictionReal-time roulette physics for predictionTraffic analysis of roulette wheel biasShuffle trackingShuffle trackingManufactured marked cardsPoker teams

© 2009 IBM Corporation24

Rigged poker game

Information in Isolationnformat on n so at on

EmployeesCustomers Arrests

Database Database DatabaseDatabase Database Database

Th l hi d l h d i l b

© 2009 IBM Corporation25

The newly hired employee had previously been arrested for stealing from you … same store!

And Sometimes Tragicn om t m s rag c

Foster Parent Applicant Violent Criminals

Ryan Dexter George

Sherry Charlie – She died less than Sherry Charlie She died less than one month after being placed in the home of Ryan Dexter George.

© 2009 IBM Corporation26

Who is Who? Who is Related to Who?

Good Guys Subjects of Interest

Who s Who? Who s at to Who?

Good Guys Subjects of InterestCustomers

P t

Exclusionary List

F d ll B nn dProspects

Employees

Vendors

Federally Banned

Gaming Felons

Card Counters

Victims

© 2009 IBM Corporation27

C St d L V C iCase Study: Las Vegas Casino

Detected Relationships

• 24 active players were known

Data Sources

• 20,000 plus employeescheaters

• 23 players had relationships to prior arrests/incidents

• 12 employees were themselves

, p p y• All vendors• All slot club & table

games-related players 12 employees were themselves the player

• 192 employees had possible vendor relationships

• 7 employees were the vendor

• In-house arrests/incidents

• Known cheaters• 7 employees were the vendor

© 2009 IBM Corporation28

C St d US F d l ACase Study: US Federal Agency

Detected Relationships

• 140 employee relationships to

Data Sources

• 20,000 plus employeesvendors

• 1451 potential vendor relationships to security risks

• 253 employee relationships to

, p p y• 75,000 plus vendors• 200,000 plus Type 1

security risk entities 53 employee relat onsh ps to security risk entities

• 2 vendors were the security risk• “n” employees were the security

risk/vendor

• 200,000 plus Type 2 security risk entities

risk/vendor

© 2009 IBM Corporation29

In ClosingIn Closing

© 2009 IBM Corporation30

Trend: Organizations are Getting Dumberr n Organ zat ons ar G tt ng Dum r

All Digital Data

owth

Data

wer

Gro Growing

Dumber

ting

Pow

Com

put

Sensemaking Algorithms

© 2009 IBM Corporation31

Time

The Way Forwardh Way Forwar

All Digital DataData

ContextEnginesow

th

Engines

wer

Gro

ting

Pow

Sensemaking Algorithms

Com

put

© 2009 IBM Corporation32

Time

Related Blog Postsat og osts

Puzzling: How Observations Are Accumulated Into Context

The Fast Last Puzzle Piece

d h h G Context: A Must-Have and Thoughts on Getting Some …

Algorithms At Dead-End: Cannot Squeeze Knowledge Out Of A Pi lA Pixel

How to Use a Glue Gun to Catch a Liar

It Turns Out Both Bad Data and a Teaspoon of Dirt May Be Good For You

© 2009 IBM Corporation33

Fact or Fiction?Fact or F ct on?Does the Bellagio Hotel and Casino really have a “vault” as depicted in the movie Ocean’s 11?

Have casinos specifically targeted x-felons for employment?

Do casinos perform background checks of guests against public Do casinos perform background checks of guests against public records?

Is facial recognition technology being used to monitor the Is facial recognition technology being used to monitor the doors for the early detection of cheaters?

Is there a watch list you can put yourself on, but not cannot y p y ,take yourself off?

Does the gaming industry offer assistance in the creation of l

© 2009 IBM Corporation34

false identities and cover stories?

Blogging At:ogg ng t

www JeffJonas TypePad comwww.JeffJonas.TypePad.com

Information ManagementgPrivacy

National Security and Triathlons

Questions?© 2009 IBM Corporation35

Cops and Robbers – Las Vegas Style

(And Other Stuff I Think About)

© 2009 IBM Corporation36