The con artists posed as bank machine repair technicians to victimize the ATM users. The con game involved getting the victims to hand over their access cards, and watching them later when they entered their personal identification numbers. Then, after ... After money was drawn form that account, the con artist simply waited for the next user. ... (The addresses for the groups listed in this paragraph, and in subsequent paragraphs are found in an appendix at the end of this report.) anbsp;...
|Title||:||Introduction to computer crime|