...Project 1: The Bank Heist 9-4-2014 Is it possible to carry $1,000,000 in cash? My first assumption of the question is it possible to carry $1,000,000 in cash… I say yes. I will outline below with how I support my assumption. I started my research on the internet to compile my answers. I felt in order to explain my thinking, I needed to know what is the largest currency circulated to the public, how much money is in a bundle of bills for the largest bill, and how much equaled $1,000,000.00 of the largest bill printed. So below, I will outline my research and support my result on a graph for further explanation. 1.) The largest currency circulated to the public is the $100.00 bill. (www.treasury.gov) 2.) A bundle equals 100 of $100.00 bills. (www.answers.com) 3.) It takes 10 bundles of $100.00 bills to make $1,000,000.00. 4.) The weight of a single bill is 1 gram. (www.enchantedlearning.com) 5.) The weight of a bundle of 100-$100.00 bills is 100g. 6.) The weight of 10 bundles of $100.00 bills is 10,000g. 7.) Converting 10,000g to lbs.= 22lb (www.convertunits.com) 8.) The weight of $1,000,000.00 is 22lbs in $100.00 bills. If you follow the graph below it shows the weight of $1,000,000.00 if you were to carry it with the highest currency printed of $100.00 which is a total of 22lbs or 10,000 grams. If you would change your currency to the single dollar it would be a weight of 2207.00 lbs. or 1001073 grams, my assumption would change...
Words: 319 - Pages: 2
...thief and con artist as soon as the movie begins. The movie is all about the team and their goal to score the largest heist in history. The teams goal is to rob all of the casinos owned by Terry Benedict, played by Andy Garcia, whom is also dating Oceans ex wife. Knowing the task at hand, the team works through their strategies, relying on one another for knowledge, skills, and their individual abilities. As the movie starts, Ocean is released from prison in New Jersey, and has already planned the heist. Ocean quickly pieces together his team of criminals, from card magicians, to hackers, to pocket pickers, each and every teammate has their place on the team. Once the team is assembled, they all have their own tasks, but the team also has a set of important rules. These rules are; no blood, rob only those who deserve it, and do it as if you had nothing to lose. Once the settings are perfect, the team works together to get their job done, and in the end, they succeed. Evaluation of the Group and Characters: Danny Ocean gets out of prison in New Jersey, on parole. During the parole meeting, it is mentioned that he has been involved in over a dozen confidence schemes and frauds that he was never charged for. He says that he was caught because his wife left him, and he went on a self destructive pattern. Instantly, it is clear that Danny is driven to perform a heist to rebuild his self identity, self-esteem, after the loss of his wife, just before being sent to prison.Now out of...
Words: 985 - Pages: 4
...the strokes of a keyboard. Fearless thugs were replaced by highly accomplished computer hackers whose knowledge and expertise allowed for the infiltration to occur without alerting the authorities. Once the hackers had secured root access to the targeted systems, valid debit card numbers were stolen and distributed to a global network of criminal accomplices. Using these seemingly legitimate cards the thieves went to work targeting ATMs to withdraw cash on an enormous scale. What is truly remarkable about this “heist” was how relatively simple and straight forward the methods employed by the hackers were. This attack has come to be known as an “Unlimited Operation”. How it happened It is extremely difficulty to answer how the hackers managed to steal such an enormous sum of cash with any degree of certainty. Given the very nature of how it was stolen, to publicly reveal specifics on how the heist was accomplished could possibly leave the institutions at the mercy of further attacks. However, the overwhelming online consensus points to SQL Injection as the method most suitable for this form of cyber-attack. [2] Structured Query Language (SQL) is a special-purpose programming language designed for managing data held in a relational database management system (RDBMS). Databases form the backbone of all financial institutions as they are responsible for recording all customer information, transactions and...
Words: 1338 - Pages: 6
...Jewelry Store Job This is a first big heist in the game. This mission is unlocked after completing a friend request. You play as Michael and Franklin too of the main characters in the game both of them have different stories. Grand Theft Auto V is an open world action-adventure video game developed by Rockstar North and published by Rockstar Games. The game is set in Los Santos which is fake Last Angeles. Michael is guy who is playing off his own death in intend which happens ten years ago after robbing a bank in North Yankton. Michael faked his own death so he can spend time with his wife Amanda and his two of his kids Tracey and Jimmy. Now Michael is trying to get back in the game by doing this heist. Franklin on the other hand is trying to get out of the hood. He is trying to change his life which was being a gangbanger doing drugs and going to prison. Franklin lives with his aunt Denise after his mother died from addiction to crack cocaine which led to her death. Now Franklin gets the change that he needs to get out of the hood went he meets Michael. At started of the mission Michael calls his old friend Lester who is computer guy and he is who set up the all the heists missions in the game. Lester asks Michael to meet him at his place he asks Michael to do a mission for him which is a friend request mission. After doing this mission for Lester he agrees to setup the heist. Lester calls you again saying that he had set up the heist and tells you to meet him at his office...
Words: 318 - Pages: 2
...It has been about 8 weeks since the Bangladesh Bank was hit by $101 million heist — $101 million in stolen funds, taken from a secure account, disappeared into a murky world of casinos and money laundering. The caper involves at least four countries, a central bank and a pillar of the U.S. financial system. Last February 1, when banks were closed for the weekend in Bangladesh, criminals executed five transfers from the central bank's account at the Federal Reserve Bank of New York. The requests looked real: They appeared to come from a Bangladesh server, and the thieves supplied the correct bank codes to authenticate the transfers. Most of the stolen funds ended up in accounts located in the Philippines, while roughly $20 million, which has since been recovered, went to Sri Lanka. The robbers tried to steal $850 million more, but the requests were denied by the New York Fed. The stolen funds that ended up in the Philippines were discovered last March 9, after Rizal Commercial Banking Corporation (RCBC) said that a bulk of the laundered money was deposited in its Jupiter branch in Makati City. It was approximately $81 million, which is suspected to have come from the same source, managed to enter the local banking system but was released to local RCBC clients with an alleged help of the bank’s Jupiter branch manager. A number of big names are said to be involved who are mainly from 3 camps: Rizal Commercial Banking Corporation (RCBC), PhilRem Service Corporation, and the...
Words: 2522 - Pages: 11
...uniform entered the Isabella Stewart Gardner Museum in Boston, USA and handcuffed the two guards removing them from the desk where they could alert the police. The pair stole 13 artworks worth 500 million US Dollars in just 81 minutes. Evidence shows that this heist may have been an inside job by the guards working at the museum. Richard E. Abath who was on duty that night has broken museum protocol 2 times before and let in unauthorised people in the museum which may suggest this heist was committed by him however there are some evidence suggesting against it. Another theory is that the heist was committed by the Merlino Crew. Evidence tells that George Reissfelder, Leonard...
Words: 1065 - Pages: 5
...specific episode, which is from season one, episode ten called “Heihei (Race)” is about a group of athletes who have been conducting robberies in different states during the Triathlons. To start off the episode Five-0 hears about a heist on an armored car, not stealing the money they dumped the car into the ocean off the dock. One lead on the case was a group of people in white jumpsuits sitting near the location of the heist were caught on camera. The the excellent equipment that they have at the Five-0 headquarters they use facial recognition to identify that one of the men was an ex-con on parole. They found that someone had posted an ad for people to be doing a painting job. The team finds out that the ad was posted from a chiropractors office. Where they found blood bags in the trash. Using DNA they determined that there was a women who they suspect is part of the heist who becomes a person of interest. Without evidence that conduct surveillance from the house next door to them, which happens to be Danny’s ex-wife's house. Danny breaks into the house after the group leaves and they find a flash drive that brings the team to probable cause that they are the group that will be pulling the heist. As well as one of the women in the group worked at the first bank that was robbed during another triathlon. While the triathlon in Hawaii starts they follow the team with the GPS trackers that everyone in the triathlon received to monitor the time that they complete the race. Five-0 loses the...
Words: 668 - Pages: 3
...personal information space so as to use it for malicious, unwanted purposes. Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks (Haag, Cummings, & Phillips, 2012). According to reports by Gorman and Perez, the total number of records containing sensitive personal information involved in security breaches in the United States is 608,087,870 of the 3,763 data breaches since January 2005 (Gorman & Perez, 2009). In 2009, the Royal Bank of Scotland Group (RBS) was exploited, below is a description of one of the altercation reported above. In an article published, 11 November 2009 in the “Wall Street Journal” titled “Hackers Indicted in Widespread ATM Heist” by Siobhan Gorman and Evan Perez, discussed indicted by the U.S Justice Department on eight computer hackers. These eight hackers from Eastern Europe and Russia alleged hacked into a computer system at Royal Bank of Scotland Group (RBS) and with the help of accomplices stole over $9 million from 2,100 ATM’s from 280 cities...
Words: 787 - Pages: 4
...www.nytimes.com Global Trail of an Online Crime Ring www.nytimes.com The Great Cyber Heist 1. How did the authorities catch Gonzalez the first time? Albert Gonzalez was arrested one day in the month of July 2003. According to www.nytimes.com article “The Great Cyber Heist”. Gonzalez was spotted by an out of uniform officer. The officer had been originally assigned to investigate a rise in car theft occurrences in the upper portion of Manhattan, New York. Gonzalez was not in that line of crime, but was suspicious looking having stringy hair, and a nose ring. The officer followed close behind Gonzalez. Gonzalez led him to an ATM inside of a bank. While pretending to use the machine himself the officer observed Gonzalez using multiple cards one after another. He was arrested, and gave authorities his real name not one of his many aliases, and charged him with fraud. 2. How did the authorities catch Gonzalez the second time? Albert Gonzalez was supposed to be helping authorities investigate his co-conspirators, be he was still highly involved in the crimes. He was arrested on May 7 at the National Hotel in Miami Beach. The authorities tied him to a man named Makem Yastremskiy. Through the forensic analysis Makem Yastremskiy’s computer was found to hold much need information, the roles of the other participants in his circle. E-mails used under soupnazi@efnet.ru were known to belong to Gonzalez this is what led to his arrest. 3. What...
Words: 343 - Pages: 2
...this is not always the case. The quickest way to stop the rumors is to address the event that occurred for the person to leave. This is an easier task for Target unfortunately in light of the recent credit card data heist which was noticed on a global scale there wasn’t a whole lot of light to shed. Something really bad had happened and they looked into it and found and corrected the error and the CEO while not directly responsible for the data heist felt responsible and stepped down. Confirming this would end the need for rumors and then also allow a platform to announce the company’s standpoint moving forward and their plan to replace the CEO. Plan for Replacing the CEO When there is a plan in place for replacing the CEO this may not be all employees need to know but upper management would need to know that there has been forward motion on this topic and how to respond to employees should they ask a question about what’s happening next or where the company is what with selection, granted this is not typical. A general announcement should be given to show that the company is looking for a new CEO and what they are looking for in the next CEO and where they plan for this CEO to take the company. In the case of Target is the road to recovery from the Data Heist and putting Target back on the map again with customers and at the same time freshen up their look and product they sell. This is a great example of tying in what needs to be...
Words: 1406 - Pages: 6
...2012 by computer security firms McAfee and Guardian Analytics. OHR targeted high balance accounts of both individual consumer and business financial institutions, using a new extensive level of automation built on previously known Trojans Zeus and SpyEye. Although no person or group has ever been identified for the conspiracy and execution of the operation, the attackers were traced to servers performing these attacks in Russia, Albania, and China. According to the McAfee/Guardian Analytics report “Dissecting Operation High Roller,” the firms first identified the group’s initial attack in Italy. Analyzing the attack and identifying the new tactics the group used to successfully target the Italian Bank, the firms found strong evidence of a replication attack against a German bank. It wasn’t until subsequent evidence of attack campaigns within Latin American and the United States were found that the global nature of these attacks was validated (Marcus & Sherstobitoff, 2012). Over an undisclosed time period an approximate amount of $78 million, with a potentially maxed attempt of $2 billion, was successfully siphoned during OHR (Quain, 2012). Analysis The group responsible for these attacks built their tactics on previously existing malware, custom malware, and an in-depth awareness of global banking transaction procedures. Their impact on information security set new precedencies in the use of automation during an attack; essentially removing any known manual transaction...
Words: 1345 - Pages: 6
...1- Describe the security vulnerabilities exploited by the hackers. “The 21st century bank heist” was one of the biggest bank robberies that demonstrated by a group of hackers, and a global network of cyber criminals operating more than 26 countries stole 45 million by hacking into a database of prepaid debit cards. Hackers got into bank databases, and eliminated withdrawal limits on all available pre-paid debit cards and created access codes then loaded that data into a plastic card (an old hotel's key card or expired credit card) with a magnetic stripe to that particular card now ready to work as long as the card carried the account data and correct access codes. Prepared a network of operatives then blown out to rapidly withdraw money in multiple cities. The cells would take a cut of the money, then launder it through expensive purchases or ship it wholesale to the global ringleaders. It appears no individuals lost money. The thieves plundered funds held by the banks that back up prepaid credit cards, not individual or business accounts affected. The hackers sought out prepaid debit cards issued by two Middle Eastern banks whose databases afforded another point of lax security: RAK Bank (National Bank of RAS AL-KHAIMAH) in the United Arab Emirates and the Bank of Muscat in Oman. 2- What people, organizational, and technology factors contributed to these problems? People factors are on many levels of the company. First is the security team that is in charge of keeping the...
Words: 560 - Pages: 3
...These Mexican banks and corporations mentioned above play an important role not only in the economy, but also when it comes to setting the country’s political agenda through their ties to the political parties and the government. They pay for the campaign of someone who make them stay there and not remove them from mexico. A few of these corporations if not many have helped put the current president in power Enrique Pena Nieto. The mexican government is not challenging the multinational corporations at all, rather the mexican drug cartels are: When gunmen in Mexico carried out one of the world’s biggest ever gold heists this month, Canadian Gold Mining company: McEwen Mining lost $8.5 million worth of gold.Rob McEwen was forced to reveal...
Words: 409 - Pages: 2
...Plot Busted explosively out of police custody by his sister (Brewster) and best bud (Walker), Dominic Toretto (Diesel) gets to work on a heist in South America. But will crack DSS agent Luke Hobbs (Johnson) let the air out of his tyres once and for all? Review How to re-ignite an ageing franchise? Drop The Rock on it. The best thing, by far, in Fast Five (aka Fast & Furious 5) Dwayne Johnson hulks through the movie leaving testosterone trails in his wake. Clad in a flak jacket and a cage-fighter’s beard, he’s the man hunter “the FBI call when they want to catch someone” His body is hard as marble, his mind as sharp as Marple’s. There is literally nothing believable about the character, least of all his Blade Runner tech, yet from the moment he juggernauts on-screen, barking, “Rule number 2: Stay the fuck out of my way!” at a shrimpy South American cop, this quinquel goes from entertainingly stupid to joyously lunk-headed. In what may or may not be a reappropriation of the script for The Brazilian Job, the aborted Italian Job sequel, the set-up has Diesel’s Toretto in Rio de Janeiro, assembling a crew for the inevitable one last job. Their plan is to jack a corrupt businessman for $100 million — a sum that, in a film this overblown, seems positively unambitious. It requires the talents of all the old franchise ‘favourites’, from Tokyo street racer Han (Sung Kang) to mechanic Tej (Ludacris), though the film’s only street race is hastily skipped over. Don’t expect precision-built...
Words: 372 - Pages: 2
...Only option I had was to call a coworker who I only knew for three years at work. Dawn said “yes I could stay at her home for a night”, without a heist. Second problem have a key made for my car, no dealership could do it, they discontinue the blank key. I need to find a locksmith to come to my vehicle, however only one who in the area, he was in the hospital have surgery. Suzanne gave me a ride back and forward to work. Wayne effort to remove my lock on the passage door, and Phyllis took the lock to locksmith which was 30 miles one way. Then Phyllis brought back same day, and Wayne put lock back in the door that night. I had a vehicle the next day. Three weeks later, my wallet and old keys were found in the field, on my last day for the summer. Summary nonfiction young adult, A woman find that her kindness is brought back from the thoughtfulness of many different people. Through the experience...
Words: 499 - Pages: 2