Mobile Technology threats and opportunities for taxation and government payments



Similar documents
Squaring the Circle in Payment Processing

Cyber Security. Securing Your Mobile and Online Banking Transactions

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Egyptian Retail Payments Service Providers

2013 ITU survey on measures taken to raise awareness on cybersecurity

September 20, 2013 Senior IT Examiner Gene Lilienthal

A Cyber Security Integrator s perspective and approach

A2P SMS Market - Global Industry Analysis, Size, Share, Growth, Trends and Forecast,

Bellevue University Cybersecurity Programs & Courses

Certified Cyber Security Analyst VS-1160

Internet Usage (as of November 1, 2011)

Mobile Security Framework; Advances in Mobile Governance in Korea. TaeKyung Kim

INFORMATION TECHNOLOGY ENGINEER V

Loophole+ with Ethical Hacking and Penetration Testing

FORBIDDEN - Ethical Hacking Workshop Duration

How To Get A Cloud Service For A Small Business

2012 GLOBAL PREPAID SIZING STUDY, COMMISSIONED BY MASTERCARD: A LOOK AT THE POTENTIAL FOR GLOBAL PREPAID GROWTH BY 2017

Cyber Security Recommendations October 29, 2002

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

E-Payments & Saudi Arabian e-infrastructure

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Brainloop Cloud Security

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

INFORMATION SECURITY FOR YOUR AGENCY

prepaid Prepaid Launch the ideal prepaid card scheme for your business quickly and efficiently

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

ORGANIZADOR: APOIANTE PRINCIPAL:

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Is your business secure in a hosted world?

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Credential Management for Cloud Computing

NTT R&D s anti-malware technologies

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Data Center security trends

Caribbean Electronic Payments

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

We believe First Data is well positioned to take advantage of all of these trends given the breadth of our solutions and our global operating

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

SHORT MESSAGE SERVICE SECURITY

Looking at the SANS 20 Critical Security Controls

1i. What other gaps or opportunities not mentioned in the paper could be addressed to make improvements to the U.S. payment system?

Transformation of payment systems: channels, technologies and business models

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

MarketsandMarkets. Publisher Sample

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Practical Attacks against Mobile Device Management Solutions

Guiding principles for security in a networked society

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Global Fraud Detection and Prevention (FDP) Market - Trends and Forecasts ( )

What legal aspects are needed to address specific ICT related issues?

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

Trading Floor Online Pty Ltd. Financial Services Guide

ESKISP Conduct security testing, under supervision

Defending Against Data Beaches: Internal Controls for Cybersecurity

Top tips for improved network security

PCI Compliance Overview

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Protecting Organizations from Cyber Attack

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Secure Your Mobile Workplace

1. Economic factors: Positive global market for IDS/IPS security solutions and services.

E-Business, E-Commerce

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Unit 3 Cyber security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Security aspects of e-tailing. Chapter 7

Transcription:

Mobile Technology threats and opportunities for taxation and government payments E/C.18/2012/CRP.13 Chris Williams / Jo Marie Griesgraber 1

Global penetration of mobile technology Key Global Telecom Indicators for the World Telecommunication Service Sector in 2011 (all figures are estimates) Mobile cellular subscriptions (millions) Global Developed nations Developing nations Africa Arab States Asia & Pacific CIS Europe The Americas 5,981 1,461 4,520 433 349 2,897 399 741 969 Per 100 people 86.7% 117.8% 78.8% 53.0% 96.7% 73.9% 143.0% 119.5% 103.3% Fixed telephone lines (millions) 1,159 494 665 12 35 511 74 242 268 Per 100 people 16.6% 39.8% 11.6% 1.4% 9.7% 13.0% 26.3% 39.1% 28.5% Active mobile broadband subscriptions (millions) 1,186 701 484 31 48 421 42 336 286 Per 100 people 17.0% 56.5% 8.5% 3.8% 13.3% 10.7% 14.9% 54.1% 30.5% Fixed broadband subscriptions (millions) 591 319 272 1 8 243 27 160 145 per 100 people 8.5% 25.7% 4.8% 0.2% 2.2% 6.2% 9.6% 25.8% 15.5% Source: International Telecommunication Union (November 2011) http://www.itu.int/itu D/ict/statistics/at_glance/KeyTelecom.html via: mobithinking http://mobithinking.com/mobile marketing tools/latestmobile stats 2

The rise of mobile payments 3

Mobile payments In the developing world in particular, mobile payments and mobile PoS technologies mean new populations are included in electronic payments 4

MasterCard Mobile Readiness Index http://mobilereadiness.mastercard.com 5

MasterCard Mobile Readiness Index http://mobilereadiness.mastercard.com 6

Mobile technology in m Government Innovations In Retail Payments Worldwide: A Snapshot, Financial Inclusion Practice of the World Bank, July 2012 7

Countering fraud 8

Countering fraud Mobile Attack Incentives 9

Countering fraud Mobile Attack Vectors Security apps with malware SMS PDF s with malware Email Auto diallers / spam mailers Mobile phone apps Information stored on phone 10

Countering fraud Security vulnerabilities in mobile transactions Source: Prof. Yong Nuo Shin, Hanyang Cyber University 11

Security threats and countermeasures Mobile Device Applications Platform St orage Hardware (Multiple Sensors) Communication Channels Application Sources Communication Ser vices T1. Phishing program T2. Virus & Malware T3. Keyboard Hooking T4. SM S hooking T5. Memory dump T6. Extraction privacy information T7. software reverse engineering T8. Acquisition by attacker T9. Ro gue AP T10. Infection Route T11. financial fraud using fishing C2 C2, C3 C3 C2, C3 C3 C12-C18 C21, C22, C23 C26-C29 C1, C2 C2, C3 C3, C4, C5 C2, C3 C3, C6, C7, C8 C9, C10, C11 C8 C15, C17, C18 C19, C20, C21, C23 C24, C25 C23, C30, C31 C23 Source: Prof. Yong Nuo Shin, Hanyang Cyber University 12

Countering fraud 13

Countering fraud 14 14

Countering fraud Ensuring the identity of the citizen 15

Countering fraud Anti Money Laundering and Anti Terrorism 16

ssible stakeholders in mobile payments

factors for mobile phone based ment licenses

ctronic Transaction Payment types (ETPs)

quirements for a robust system

Central hub for electronic payments PAYER Central Hub Licensed ETPs Licensed ETPs Banks Banks Credit Card Associations Local card issuers Mobile operators Nontraditional Online PS Calculation of taxes and benefits. Automated payment of taxes and benefits. Payment for purchases. Payroll Payment Fraud scrub Government accounts Credit Card Associations Local card issuers Mobile operators Access to account information / bookkeeping Nontraditional Online PS Firewall Firewall RECIPIENT 21

System components 22

Hub based system Benefits payments: Benefits can be paid on specific goods and services (such as foods, petrol, utilities) for targeted recipients in an entirely confidential manner The merchant is paid full price for the goods with the subsidy added directly at the hub from government funds All regular benefits such as employment, social, housing, pensions etc can also be paid through the system Increased benefits payments can be offset from additional revenue raised by efficient, fraud resistant tax collection 23

Hub based system Payroll control: Employers can submit gross salaries to the central hub reducing workload Employees can submit claims for allowances, dependents etc. in a confidential manner Due taxes extracted automatically in real time and settled to appropriate tax authorities Employees can establish regular payments for utilities, pensions, insurance etc. from a virtual account on the hub Net pay can be transferred directly to nominated bank or mobile phone based accounts for each employee Multiple incomes can be incorporated into the single account 24

Hub based system VAT collection: Merchants given Point of Sale capability via mobile phones or POS terminals Merchants can accept electronic payment, from cards, mobile phones or online VAT is deducted at the server level and paid to the relevant tax authority For applicable Business to Business (B2B) transactions, reclaims can be calculated and issued in real time 25

Benefits of Central Hub System 26

m Government payments for the new millennium 27

Action points 28

The Guernsey model 29