06.04.2013 Views

convergence

convergence

convergence

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threat Finance<br />

benefits offered by prepaid access.” 23 There are plans in place to begin regulating the international<br />

transport of prepaid access products, as well, per a notice of proposed rulemaking issued<br />

on October 11, 2011. 24<br />

Mobile Payments<br />

For many years, consumers worldwide have been using their mobile phones to make basic<br />

monetary exchanges through simple transactions such as trading phone minutes and downloading<br />

ringtones. The availability and variety of payment options and services are proliferating<br />

as smart phone usage with Web access increases (especially in developed countries with disposable<br />

income). Studies suggest that 35 percent of Americans currently own smart phones, 25<br />

an increase from 17 percent of adults in 2009. 26 Whether one uses a phone as a mobile wallet<br />

that is preloaded with currency, or as a tool to access bank or phone accounts for payments, or<br />

as a vehicle for financial transactions via text/SMS, Web browsers, or applications (“apps”),<br />

the phone may become the consumer’s financial settlement method of choice. Long available in<br />

countries like India, Mexico, Kenya, and Afghanistan (with varying models and degrees of use),<br />

the explosion of mobile services in the United States and globally is imminent. One projection<br />

sets the mobile payments market at U.S. $630 billion globally by 2014. 27<br />

The extent of criminal abuse of mobile payments is unknown at this time. What is certain<br />

is that where there is money, there are criminals. Phone-based transactions can be more secure<br />

than other means of financial transfer (for example, credit cards, which often leave the account<br />

holder for use and are widely targeted by criminals who copy or steal the account access).<br />

Nonetheless, the same malware that infects a desktop computer can and increasingly will affect<br />

smart phones, making transactions vulnerable to abuse. “Apps” can be infected, passwords can<br />

be stolen, and “phishing” emails and “smishing” texts can solicit personal information. (Antivirus<br />

software is not widely used on smart phones because, at this stage in product history, to<br />

run it constantly would drain the phone battery and limit the device’s convenience.) A new<br />

study found that mobile malware for Android phones alone increased by 400 percent in the<br />

18 months between the summer of 2010 and the report’s release in May 2011. 28 The biggest<br />

vulnerability, however, may be the user who is unaware of the threat or is typically more relaxed<br />

with connections made via social-networking tools. For example, a SANS Technology Institute<br />

poll determined that 85 percent of smart phone users do not scan their devices to search for<br />

malware from downloads and other sources. 29 There is a concern, too, that monetary sums<br />

aside, some mobile transactions are not traceable or recordable to the extent needed by law enforcement<br />

or intelligence to disrupt or prosecute those committing illicit activities. Simply put,<br />

mobile payment systems can be considered the “Wild West” for savvy criminal organizations.<br />

Virtual Payments<br />

It may sound odd that virtual currency in a cartoon-like Internet space could have real-world<br />

monetary value. This is the case, however, with Linden Dollars, the monetary unit within<br />

the “Second Life” online community. Players in these worlds can earn or pass virtual dollars<br />

through activities online (for example, by creating a virtual bar at which your virtual customers<br />

119

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!