•  
  •  
 

Publisher

The Association of Digital Forensics, Security and Law (ADFSL)

Abstract

This paper will review the risks associated with the Federal Reserve's Fedwire network as a key resource necessary for the efficient function of the American financial system. It will examine the business model of the Fedwire system of real-time interbank transfers, the network characteristics of Fedwire, and the possibility of a successful attack on Fedwire and its potential impact on the U.S. financial system.

References

[1] Bech, Morten L., and Atalay, Enghin, (2010), The topology of the federal funds market, Physica A, volume 389, pps. 5223-5246.

[2] Beyeler, Walter E., Glass, Robert J., Bech, Morten L., and Soramaki, Kimmo, (2007), Congestion and cascades in payment systems, Physica A, pps. 693-718.

[3] Bouveret, Antione, (2018), IMF working paper - cyber risk for the financial sector: A framework for quantitative assessment, International Monetary Fund.

[4] Bureau of Economic Analysis, (2019, February 28th), Gross domestic product, fourth quarter and annual 2018 (initial estimate), https://www.bea.gov/news/2019/initial-gross-domestic-product-4th-quarter-and-annual-2018.

[5] Crucciti, Paolo, Latora, Vito, Marchiori, Massimo, & Rapisarda, Andrea, (2004), Error and attack tolerance of complex networks, Physica A, Volume 340, pps. 388-394.

[6] Das, Krishna N., & Spicer, Jonathon, (2016, July 21st), The SWIFT hack: How the New York Fed fumbled over the Bangladesh Bank cyber-heist, Reuters, https://www.reuters.com/investigates/special-report/cyber-heist-federal/.

[7] Federal Reserve, (2008, March 14th), Minutes of the Board of Governors of the Federal Reserve System, https://www.federalreserve.gov/other20080627a1.pdf.

[8] Federal Reserve, (2014), Fedwire Funds Services, https://www.federalreserve.gov/paymentsystems/fedfunds_coreprinciples.htm.

[9] Federal Reserve, (2017), Structure of the Federal Reserve System, https://www.federalreserve.gov/aboutthefed/structure-federal-reserve-system.htm.

[10] Federal Reserve, (2019), Fedwire Funds Service—Annual, https://www.federalreserve.gov/paymentsystems/fedfunds_ann.htm.

[11] Federal Reserve Bank of St. Louis, (2019, March 29th), Deposits, all commercial banks, Federal Reserve Economic Data (FRED), St. Louis Federal Reserve Bank, https://fred.stlouisfed.org/series/DPSACBM027NBOG.

[12] Gilbert, Adam M., Hunt, Dara, and Winch, Kenneth C., (1997, July) Creating an integrated payment system: The evolution of Fedwire, Federal Reserve Bank of New York Economic Policy Review, Volume 3, Number 2. https://www.newyorkfed.org/medialibrary/media/research/epr/97v03n2/9707gilb.pdf

[13] Gimbert, Alaina, & Hunter, Rob, (2018), Cyberthreats and wholesale payment systems, Bank Policy Institute – The Clearing House, https://www.theclearinghouse.org/banking-perspectives/2018/2018-q2-banking-perspectives/articles/cyberthreats-and-wholesale-payment-systems.

[14] Groll, Elias, (2017, March 21st), NSA official suggests North Korea was culprit in Bangladesh bank heist, Foreign Policy, https://foreignpolicy.com/2017/03/21/nsa-official-suggests-north-korea-was-culprit-in-bangladesh-bank-heist/.

[15] Hammer, Joshua, (2018, May 3rd), The billion-dollar bank job, The New York Times Magazine, https://www.nytimes.com/interactive/2018/05/03/magazine/money-issue-bangladesh-billion-dollar-bank-heist.html.

[16] Lewis, Ted G., (2015), Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, Second Edition, John Wiley & Sons, Inc., Hoboken, New Jersey.

[17] McAndrews, James J., & Potter, Simon M., (2002, November), Liquidity effects of the events of September 11, 2001. Federal Reserve Bank of New York Economic Policy Review.

[18] McGlasson, Linda, (2009, January, 15th), Fedwire Hit With Phishing Scam, BankInfoSecurity, https://www.bankinfosecurity.com/fedwire-hit-phishing-scam-a-1160.

[19] Mirchandani, Bhakti, (2018, August 28th), Laughing all the way to the bank: Cybercriminals targeting U.S. financial institutions, Forbes, https://www.forbes.com/sites/bhaktimirchandani/2018/08/28/laughing-all-the-way-to-the-bank-cybercriminals-targeting-us-financial-institutions/#1f9f3a986e90 .

[20] Murad, Mehmet, Wijeskera, Duminda, & Buccholtz, Miguel F., (2013, September 30th), Money Laundering Detection Framework to Link the Disparate and Evolving Schemes, Digital Forensics, Security and Law, Volume 8, Number 3, pps. 41-70.

[21] Quadir, Serajul, (2016, March 10th), How a hacker's typo helped stop a billion dollar bank heist, Reuters Business News, https://www.reuters.com/article/us-usa-fed-bangladesh-typo-insight-idUSKCN0WC0TC.

[22] Statistica, (2019), Gross domestic product (GDP) ranking by country 2017 (in billion U.S. dollars), https://www.statista.com/statistics/268173/countries-with-the-largest-gross-domestic-product-gdp/.

[23] The Straight Times, (2016, June 18th), Dridex malware linked to Bangladesh heist, https://www.straitstimes.com/business/dridex-malware-linked-to-bangladesh-heist.

[24] Soramaki, Kimmo, Bech, Morten L., Arnold, Jeffrey, Glass, Robert J., & Beyeler, Walter E., (2007), The topology of interbank payment flows, Physica A, volume 379, pps. 317-333.

[25] Xu, Tao, He, Jianmin, & Li, Shouwei, (2016), A dynamic network model for interbank market, Physica A, volume 463, pps. 131-138.

[26] Yoder, Robert M., (1951, January 20th), Someday they’ll get slick Willie Sutton, The Saturday Evening Post, Volume 223, Issue 30.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.