....Salami Techniques

An automated form of crime involving the theft of small amounts of assets
from a large number of sources is identified as a salami technique (taking
small slices without noticeably reducing the whole).  For example, in a bank,
the demand-deposit accounting system for checking accounts could be changed 
(using the Trojan horse method) to reduce a few hundred accounts randomly by
10 or 15 cents disguised as service charges by transferring the money to a
favored account where it can be legitimately withdrawn through normal
methods.  No controls are violated because because the money is not illegally
removed from the system of accounts.  Instead, a small fraction of it is merely
rearranged.  The success of the fraud is based on the idea that each
checking account customer loses so little that it is of little consequence.
Many variations are possible.  The assets attacked may be an inventory of
products or services as well as money.

"Fighting Computer Crime" by Parker, Donn B. (C) 1983 by Donn B. Parker
Charles Scribner's Sons, New York.  pp. 90-91.
-----------------------------------------------------------------------------
Donn P. Parker is Senior Management Systems Consultant and reasearcher 
computer crime and security at SRI International in Menlo Park, California,
for clients worldwide.  The author of "Crime by Computer" and two 
professional books on computer security, he gives about fifty lectures
a year on computer crime and security.
