Prior Publisher
The Association of Digital Forensics, Security and Law (ADFSL)
Abstract
This paper will review the risks associated with the Federal Reserve's Fedwire network as a key resource necessary for the efficient function of the American financial system. It will examine the business model of the Fedwire system of real-time interbank transfers, the network characteristics of Fedwire, and the possibility of a successful attack on Fedwire and its potential impact on the U.S. financial system.
References
[1] Bech, Morten L., and Atalay, Enghin, (2010), The topology of the federal funds market, Physica A, volume 389, pps. 5223-5246.
[2] Beyeler, Walter E., Glass, Robert J., Bech, Morten L., and Soramaki, Kimmo, (2007), Congestion and cascades in payment systems, Physica A, pps. 693-718.
[3] Bouveret, Antione, (2018), IMF working paper - cyber risk for the financial sector: A framework for quantitative assessment, International Monetary Fund.
[4] Bureau of Economic Analysis, (2019, February 28th), Gross domestic product, fourth quarter and annual 2018 (initial estimate), https://www.bea.gov/news/2019/initial-gross-domestic-product-4th-quarter-and-annual-2018.
[5] Crucciti, Paolo, Latora, Vito, Marchiori, Massimo, & Rapisarda, Andrea, (2004), Error and attack tolerance of complex networks, Physica A, Volume 340, pps. 388-394.
[6] Das, Krishna N., & Spicer, Jonathon, (2016, July 21st), The SWIFT hack: How the New York Fed fumbled over the Bangladesh Bank cyber-heist, Reuters, https://www.reuters.com/investigates/special-report/cyber-heist-federal/.
[7] Federal Reserve, (2008, March 14th), Minutes of the Board of Governors of the Federal Reserve System, https://www.federalreserve.gov/other20080627a1.pdf.
[8] Federal Reserve, (2014), Fedwire Funds Services, https://www.federalreserve.gov/paymentsystems/fedfunds_coreprinciples.htm.
[9] Federal Reserve, (2017), Structure of the Federal Reserve System, https://www.federalreserve.gov/aboutthefed/structure-federal-reserve-system.htm.
[10] Federal Reserve, (2019), Fedwire Funds Service—Annual, https://www.federalreserve.gov/paymentsystems/fedfunds_ann.htm.
[11] Federal Reserve Bank of St. Louis, (2019, March 29th), Deposits, all commercial banks, Federal Reserve Economic Data (FRED), St. Louis Federal Reserve Bank, https://fred.stlouisfed.org/series/DPSACBM027NBOG.
[12] Gilbert, Adam M., Hunt, Dara, and Winch, Kenneth C., (1997, July) Creating an integrated payment system: The evolution of Fedwire, Federal Reserve Bank of New York Economic Policy Review, Volume 3, Number 2. https://www.newyorkfed.org/medialibrary/media/research/epr/97v03n2/9707gilb.pdf
[13] Gimbert, Alaina, & Hunter, Rob, (2018), Cyberthreats and wholesale payment systems, Bank Policy Institute – The Clearing House, https://www.theclearinghouse.org/banking-perspectives/2018/2018-q2-banking-perspectives/articles/cyberthreats-and-wholesale-payment-systems.
[14] Groll, Elias, (2017, March 21st), NSA official suggests North Korea was culprit in Bangladesh bank heist, Foreign Policy, https://foreignpolicy.com/2017/03/21/nsa-official-suggests-north-korea-was-culprit-in-bangladesh-bank-heist/.
[15] Hammer, Joshua, (2018, May 3rd), The billion-dollar bank job, The New York Times Magazine, https://www.nytimes.com/interactive/2018/05/03/magazine/money-issue-bangladesh-billion-dollar-bank-heist.html.
[16] Lewis, Ted G., (2015), Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, Second Edition, John Wiley & Sons, Inc., Hoboken, New Jersey.
[17] McAndrews, James J., & Potter, Simon M., (2002, November), Liquidity effects of the events of September 11, 2001. Federal Reserve Bank of New York Economic Policy Review.
[18] McGlasson, Linda, (2009, January, 15th), Fedwire Hit With Phishing Scam, BankInfoSecurity, https://www.bankinfosecurity.com/fedwire-hit-phishing-scam-a-1160.
[19] Mirchandani, Bhakti, (2018, August 28th), Laughing all the way to the bank: Cybercriminals targeting U.S. financial institutions, Forbes, https://www.forbes.com/sites/bhaktimirchandani/2018/08/28/laughing-all-the-way-to-the-bank-cybercriminals-targeting-us-financial-institutions/#1f9f3a986e90 .
[20] Murad, Mehmet, Wijeskera, Duminda, & Buccholtz, Miguel F., (2013, September 30th), Money Laundering Detection Framework to Link the Disparate and Evolving Schemes, Digital Forensics, Security and Law, Volume 8, Number 3, pps. 41-70.
[21] Quadir, Serajul, (2016, March 10th), How a hacker's typo helped stop a billion dollar bank heist, Reuters Business News, https://www.reuters.com/article/us-usa-fed-bangladesh-typo-insight-idUSKCN0WC0TC.
[22] Statistica, (2019), Gross domestic product (GDP) ranking by country 2017 (in billion U.S. dollars), https://www.statista.com/statistics/268173/countries-with-the-largest-gross-domestic-product-gdp/.
[23] The Straight Times, (2016, June 18th), Dridex malware linked to Bangladesh heist, https://www.straitstimes.com/business/dridex-malware-linked-to-bangladesh-heist.
[24] Soramaki, Kimmo, Bech, Morten L., Arnold, Jeffrey, Glass, Robert J., & Beyeler, Walter E., (2007), The topology of interbank payment flows, Physica A, volume 379, pps. 317-333.
[25] Xu, Tao, He, Jianmin, & Li, Shouwei, (2016), A dynamic network model for interbank market, Physica A, volume 463, pps. 131-138.
[26] Yoder, Robert M., (1951, January 20th), Someday they’ll get slick Willie Sutton, The Saturday Evening Post, Volume 223, Issue 30.
Recommended Citation
Bilger, Mark J.
(2020)
"Cyber-Security Risks of Fedwire,"
Journal of Digital Forensics, Security and Law: Vol. 14
, Article 2.
DOI: https://doi.org/10.15394/jdfsl.2019.1590
Available at:
https://commons.erau.edu/jdfsl/vol14/iss4/2