Review of slot machines. Examination of gaming equipment

Until recently in the territory Russian Federation, and especially in Moscow, the Moscow region, there were tens of thousands of gambling establishments, casinos, as well as thousands of establishments filled with slot machines. However, from July 1, 2009 came into force the federal law Russian Federation, which prohibits the organization and holding gambling using slot machines(machine guns) throughout Russia, with the exception of four zones specially designated for this: Primorsky, Krasnodar, Altai region and the Kaliningrad region.

Literally all gambling establishments in Moscow and the Moscow Region officially ceased their activities, however, police raids showed that entrepreneurs who did not want to abandon the gambling business began to use the vacuum in the legislation caused by the lack of clear rules and procedures for conducting stimulating lotteries.

It is this vacuum in the legislation that experts of engineering and technological expertise of the NP "Federation of Forensic Experts" are called upon to fill, which specializes, among other things, in the expertise slot machines and examination of lottery equipment. Thus, the owners of gambling houses began to provide gambling services under the guise of stimulating non-circulation lotteries using supposedly a lottery machine.

As a result, Moscow and the Moscow region quickly and quite successfully filled with thousands of lottery clubs. The idea of ​​substitution of concepts is simple and understandable - "slot machines" have slightly changed their appearance and are now called lottery machines. At the same time, the very principle of the clubs began to be called as "electronic lottery", i.e. dissemination of various lottery tickets, with the provision of a prize in the form of a game on an entertainment machine.

Note that this did not help the organizers of a profitable, albeit modified, gambling business. The activities of law enforcement agencies to close the newly created disguised gambling establishments are now difficult, but not closed. Our profile: examination of slot machines and examination of lottery equipment.

Kinds

In cooperation with the NP Federation of Forensic Experts, our experts have developed the latest methods for conducting forensic engineering and technological expertise of pseudo-lottery equipment for the purpose of identifying it as gambling equipment (slot machines).

Based on the results of engineering and technological examinations of gambling equipment (examination of slot machines) carried out by us, law enforcement agencies terminated the activities of a number of “lottery” clubs, revealed about 100 administrative offenses, seized about several thousand pieces of electronic gambling equipment (pseudo lottery equipment).

As a result, law enforcement agencies initiated more than a dozen criminal cases under Art. 171 of the Criminal Code of the Russian Federation "Illegal business". Our profile: examination of slot machines and examination of lottery equipment. Currently, all seized gambling equipment used for gambling, for the purpose of conducting an examination of gambling equipment ( slot machines) is stored in various ATCs of the country.

Holding

Carrying out an examination of slot machines has been and remains a new and rather labor-intensive phenomenon for the internal affairs bodies of the region. The examination requires the removal of heavy slot machines, their storage and preservation of their safety until the completion of the relevant examination by our experts.

As always, the subject of the examination was and continues to be the game board, which the expert must, guided by the methodology, withdraw and send for research to the Federation of Forensic Experts, where specialists of engineering and technological expertise successfully work, conducting examinations of gambling equipment (slot machines).

NP "Federation of Forensic Experts", being a powerful expert center, has developed own methodology withdrawal of computer boards from slot machines and examination of gambling equipment and machines on them. This method of seizing and conducting an examination of gambling equipment and machines has been repeatedly tested and adopted by a number of third-party expert organizations. Our profile: examination of slot machines and examination of lottery equipment.

When conducting examinations, it is striking and even ridiculous that some owners of the gambling business try to avoid the possibility of seizing gaming machines and gaming boards by immuring gambling equipment in concrete, or welding slot machines to the wall so that this gaming equipment could not be removed and carried out on it for examination.

The owners of such gambling establishments should understand that such tricks and attempts to cover up their gambling business with various miserable “masks” can only delay the moment of closing the gambling establishment for a while. If you are interested in conducting an examination of gambling or lottery equipment or gambling machines, please contact NP Federation of Forensic Experts. Our profile: examination of slot machines and examination of lottery equipment.

1 AREA OF USE

1.1. This recommendation is intended for use in slot machine testing centers (CIIA) and contains a description of the methods and procedures for conducting an examination of gaming programs (IP) of slot machines with cash prize(IADV) in order to detect undeclared capabilities in them.

2. REGULATORY REFERENCES

1. "Regulations on licensing activities for the production and sale of special gaming equipment intended for the implementation of the gambling business”, approved by Decree of the Government of the Russian Federation of 06.10.2006, No. 603;

3.4. Examination of gaming programs used in the IADV is carried out by a commission of experts (experts) of the CIIA. TsIIA specialists (experts) who conduct an examination of gaming programs used in the IADV must have documentary evidence of competence to conduct such an examination.

3.5. After the examination, its materials (testing program and test protocol) are submitted to the TsIIA FSUE "VNIIMS" for the preparation of an expert opinion. The final result of the examination is a document (expert opinion), the form of which is given in the Appendix, issued by the TsIIA FSUE "VNIIMS", confirming (or not confirming) the presence of undeclared features in the game programs used in the IADV.

4. TERMS AND DEFINITIONS

4.1. slot machine with cash prize: A special device that, after making a monetary bet, gives the user (player) the right to play a game with the possibility of receiving a monetary gain.

4.2. average winning percentage: The ratio of win to bet, calculated for the total number of games and expressed as a percentage.

4.3. game program: A software tool that allows the gaming machine to respond to the actions of the player.

4.3. undeclared IP capabilities: Functional objects and facilities not listed in the accompanying technical documentation or not corresponding to those specified, the use of which may violate the random nature of the game process (i.e., the appearance of various kinds of trends or patterns in the results of the game), the established average winning percentage, as well as the confidentiality, availability or integrity of the information being processed.

4.4. processed information: Data involved in the functioning of the UI and presented in a form suitable for transmission, interpretation or processing.

4.5. availability of processed information: The state of the processed information, ensuring its receipt in a legitimate way in accordance with the accompanying technical documentation.

4.6. confidentiality of processed information: The state of limited access to the processed information in accordance with the accompanying technical documentation and its protection from unauthorized access.

4.7. integrity of processed information: The state of information being processed, characterized by the absence of changes, intentional or accidental.

5. GENERAL REQUIREMENTS FOR GAMING SOFTWARE USED IN THE IADV

The general requirements for IP are given in the table.

No. p / p

1. Documentation requirements

1.1.

An IP submitted for examination must be accompanied by documentation in accordance with the requirements of this recommendation.

2. Requirements for the randomness of the gameplay

2.1.

The IP used in the gaming machine should ensure that winnings are obtained only depending on the case (i.e., there should be no various kinds of trends or patterns in the results of the game). The average percentage of winnings technologically incorporated in the IP cannot be lower than a certain value established by law.

5.2.

3. Requirements for the availability of processed information

3.1.

The IPs used in the IADV should provide the opportunity to receive the necessary processed information in a timely and complete manner in an authorized manner.

4. Requirements for the integrity of the processed information

4.1.

After the type of gaming machine is approved, the IP used in the gaming machine of this type should not be changed. For each copy of the IADV of the approved type, an exact copy of the IP of the IADV that has been tested for the purpose of type approval is used.

5.4.1

4.2.

The IP contains means of detecting, designating and protecting against failures (functional defects), as well as changes of an accidental or intentional nature that violate the integrity of the information being processed.

5.4.2.

5. Requirements for the confidentiality of processed information

5.1.

The IP used in the IADV contains means for authorizing access to confidential processed information and protecting confidential processed information from unauthorized access.

5.1. DOCUMENTATION REQUIREMENTS

5.1.1. Along with the documentation listed in Appendix B of the metrology rules PR 50.2.023, IP submitted for examination must be accompanied by technical documentation in accordance with the requirements of this recommendation.

5.3. REQUIREMENTS FOR THE AVAILABILITY OF PROCESSED INFORMATION

5.3.1. The IPs used in the IADV should provide the opportunity to receive the necessary processed information in a timely and complete manner in an authorized manner.

5.3.1.1 The processed information may be presented in symbolic, graphic, digital, printed or other form.

5.3.1.2 The IP must ensure that the processed information is presented in such a way that the player has a complete and unambiguous understanding of all the possibilities of the IP related to the gaming process (the amount of credit, the bet per line, the number of active lines, the service menu, the rules of the game, the conditions for receiving bonuses, key assignments, etc.), as well as the state of the gameplay at any given time.

5.3.1.3 The processed information, the possibility of obtaining which is provided by the IP, the completeness of its content, as well as the procedure (method) for its receipt, including using additional software and (or) hardware (protocols), must exactly correspond to the technical documentation accompanying the IP .

5.3.2 The technical documentation must contain an exhaustive list of methods for presenting (receiving) the processed information, as well as a list of software and (or) hardware used to perform these functions.

5.3.3. It is forbidden to use software and (or) hardware for receiving, transmitting, interpreting and using processed information that is not specified in the technical documentation for the IP.

5.3.4. Violation or restriction of the availability of the processed information is allowed only in cases provided for by the technical documentation accompanying the IP (for example, in the event of failure protection).

5.4. REQUIREMENTS FOR THE INTEGRITY OF PROCESSED INFORMATION

5.4.1. After the approval of the IADV type, the IP used in the gaming machine of this type should not be changed. For each copy of the IADV of the approved type, an exact copy of the IP of the IADV that has been tested for the purpose of type approval is used. It is not allowed to change both the entire IP and its individual parts (graphical interface, text messages, sound design, service menu elements, etc.).

5.4.1.1. The IP used in the approved type of IADV should not contain functionality that changes the composition of the program itself and is not described in the accompanying technical documentation.

5.4.1.2. If there are functionalities described in the accompanying technical documentation that allow changing the composition of the IP of an approved type gaming machine (changing the IP version, etc.), the IP examination is carried out again after each change in the IP.

5.4.1.3. The technical documentation accompanying the IP IADV of the approved type must contain an exhaustive list of the functionality of the IP, as well as a list of software and (or) hardware used to perform these functionality.

5.4.1.4. The UI of the gaming machine is designed in such a way that it is not affected by other software.

5.4.2. The IP must contain means for detecting, designating and protecting against failures (functional defects), as well as changes of an accidental or intentional nature that violate the integrity of the information being processed (checksum, digital signature, etc.).

5.4.3. In the event of a failure or changes in the processed information of an accidental or intentional nature, the user is notified about this. The SP issues a warning (visual and (or) audible signal) about the need to complete the work. If it is impossible to designate and (or) eliminate a failure or changes in the processed information of an accidental or intentional nature, the IP must provide for a situation of emergency shutdown.

5.4.4. The SP makes a record in the corresponding log of events related to the violation of the integrity of the processed information as a result of failures or changes of an accidental or intentional nature.

5.5. REQUIREMENTS FOR THE PRIVACY OF PROCESSED INFORMATION

5.5.1. The IP used in the IADV contains means of authorizing access to confidential processed information and protecting confidential processed information from unauthorized access.

5.5.1.1. Means for authorizing access to confidential processed information should provide access to confidential processed information to an authorized user and ensure that access is denied to an unauthorized user.

5.5.1.2. The IP used in the IADV must ensure the protection of confidential processed information during its storage and transmission. Protection of confidential processed information is provided by electronic signature, encryption or other means.

5.5.1.3. All events related to access to confidential information must be recorded in the IP event log.

6. METHODS FOR EXAMINATION OF IE TO DETECT UNDECLARED OPPORTUNITIES

The following methods are used during the examination of the IP IADV in order to detect undeclared capabilities:

1. Type-approval testing by IADS, confirming the random nature of the game process and the absence of violation of the established average winning percentage.

2. Testing of the IE of the IADV in order to detect violations of the requirements for confidentiality, availability and integrity of the processed information.

6.1. Type approval tests by the IABV, confirming the random nature of the game process and the absence of violation of the established average winning percentage, are determined by the system of testing gaming machines with cash prizes and monitoring their compliance with the approved type. IADV tests for the purpose of type approval are regulated by the following regulatory documents: PR 50.2.023, MI 2674, MI 2562, MI 2662.

6.2. The IADV test results are presented in the IADV Test Report, the form of which is given in Appendix D of the Rules for Metrology PR 50.2.023.

6.3. Testing of IP IAADV in order to detect violations of the requirements for confidentiality, availability and integrity of the processed information includes the following steps:

1. Carrying out verification of technical documentation;

2. Testing IP for compliance with the requirements for the availability, integrity and confidentiality of the processed information;

3. Drawing up a protocol for testing IP IADV.

7. CHECK THE TECHNICAL DOCUMENTATION

7.1. Submission of documentation for examination in accordance with paragraph of this recommendation is a necessary condition for its implementation. At the same time, the sufficiency of the set of submitted documentation for the audit is assessed, and an analysis of the structure and completeness of its content is carried out.

At the same time, the following sections of the technical documentation for IP are checked:

7.1.1. General information about IP.

This section should include:

IP name, its version;

Software required for the functioning of IP;

Programming languages, development environment, compilation tools used in the development of IP.

7.1.2. Description of the logical structure of IP.

This section should describe:

The structure of the IP with a description of the functions of the constituent parts and the relationship between them;

Implemented IP algorithms, as well as their block diagrams;

Information processing methods used;

Connections of IP with other software, as well as methods for receiving and transmitting processed information.

For all the described functions of the IP, the input and output data, as well as the result of their execution, must be indicated.

7.1.3. Description of the technical means used.

The section indicates the types of electronic computers and devices that are necessary for the operation of the IP, as well as the types of additional devices with which the IP interacts.

The section contains a description of the methods and procedure for calling the IP from the corresponding data carrier.

7.1.5. Input data.

In the "Input data" section, the description, format and organization of the IP input data should be indicated.

7.1.6. In the "Imprint" section, the description, format and organization of the IP output data should be indicated.

7.1.7 SP maintenance manual. The section should describe the rules of the game, game events (with obligatory illustration) and interfaces of the IP, its service menu with a detailed indication of all its items, methods of accessing and navigating through the items, ways to access the IP event log, as well as diagnostics, settings and IP initialization.

7.1.8. Description of the implemented methods for protecting IP and processed information.

The description of the implemented methods (user authorization, event log, data encoding, etc.) is checked to protect the software and processed information from unacceptable changes and failures.

7.2. Depending on the features of the IP, it is allowed to introduce additional sections or combine individual sections.

7.3. It is allowed to illustrate the content of sections with explanatory examples, tables, diagrams, graphs.

7.4. It is allowed to include various materials in the appendix to the IP description, which are inappropriate to be included in the sections of the description.

7.5. The results of the verification of technical documentation, including identified non-conformities obtained from the analysis of software documentation, are recorded in the testing protocol.

7.6. The list of technical documents accompanying the IP, the scope and methods of checking the documentation can be adjusted by agreement between the contractor and the customer of the IP examination.

8. CONDUCTING IP TESTING FOR COMPLIANCE WITH THE REQUIREMENTS OF AVAILABILITY, INTEGRITY AND CONFIDENTIALITY OF PROCESSED INFORMATION

8.1. IP TESTING FOR COMPLIANCE WITH THE REQUIREMENTS FOR THE AVAILABILITY OF PROCESSED INFORMATION

8.1.1. Based on the analysis of technical documentation, the following is checked:

8.1.1.1. The completeness and timeliness of providing the user with information about the features of the game. It is checked, in particular, in the IP help menu information about the rules of the game, the number pay lines, rates, winning combinations, bonus games etc. At the same time, it is checked (to the extent necessary) that the IP game rules presented to the user correspond to the actual ones.

8.1.1.2. The completeness and timeliness of the presentation to the user of the processed information corresponding to each game state of the IP, the conditions for the transition from one to another, as well as their number.

8.1.1.3 The completeness and timeliness of the receipt by the user of the processed information corresponding to each item of the service menu, as well as ways to access and navigate through the items of the service menu.

8.1.1.4 The procedure (method), completeness and timeliness of obtaining the processed information when using both basic (regular) and additional software and (or) hardware.

8.1.2. IE IADV is considered to have passed testing for compliance with the requirements for the availability of the processed information, if during the testing process the program provides authorized access to the processed information in the ways provided for by the technical documentation.

8.2. IP TESTING FOR COMPLIANCE WITH THE REQUIREMENTS FOR THE INTEGRITY OF PROCESSED INFORMATION

8.2.1. All the functionalities of the IP IADV declared in the technical documentation are checked and their compliance with the submitted technical documentation is determined. IP IADV is being investigated for the presence of functionality not described in the technical documentation (including those that allow changing the composition of the IP), as well as for undeclared influence from other (other) software.

8.2.2. If there are functionalities that allow you to change the composition of the IE IADV of the approved type (changing the version of the IE, etc.) and described in the technical documentation, the possibility of changing the composition of the IE is investigated and its compliance with the submitted technical documentation is determined.

8.2.3. The response of the IP when receiving invalid input data is checked, as well as the possibility of entering invalid data when setting up and initializing the IP.

8.2.4. The presence and sufficiency of means of protecting the integrity of the IP and the information being processed is checked. For this:

8.2.4.1. IP failures are simulated (power off, deliberate introduction of functional defects and changes), which can lead to a violation of the integrity of the IP and the information being processed. The reaction of the IP to the specified failures is checked, including the presence of warnings (visual and (or) sound signal) about the need to complete the work.

8.2.4.2. The IP identification methods (self-identification and (or) using additional software and (or) hardware) and methods of working with them are checked. The compliance of identification methods with the level of required protection of IP and processed information is assessed.

8.2.4.3. Mechanical means of protecting the integrity of the IP and processed information (locks, seals, control labels, etc.) are checked.

8.2.4.4. The presence of the event log and entries in it is checked, fixing the violation of the integrity of the IP and (or) processed information as a result of failures or changes of an accidental or intentional nature, as well as the possibility of editing and deleting entries in the event log.

8.2.5. IP IADV is considered to have passed testing for compliance with the requirements for the integrity of the information being processed, if as a result of testing it is established that the functionality of the IP is described in the technical documentation, as well as the availability of means for detecting, designating and protecting against failures (functional defects) and changes of an accidental or intentional nature in accordance with with the provided technical documentation.

8.3. IP TESTING FOR COMPLIANCE WITH THE REQUIREMENTS FOR THE PRIVACY OF PROCESSED INFORMATION

8.3.1. Based on the analysis of technical documentation, the following is checked:

8.3.1.1. Organization of a way for a user to access confidential processed information, as well as a procedure for changing the parameters of access to it. In the event that access to confidential processed information is multilevel, then the organization of the user's access method to confidential processed information of each access level is checked.

8.3.1.2. Organization of a way to access confidential processed information using both basic (regular) and additional software and (or) hardware, as well as the procedure for changing the parameters of access to it.

8.3.1.3. Availability and sufficiency of means of protecting processed confidential information from unauthorized access and changes.

Remedies may include:

Coding with the organization of the user's access to confidential processed information (for example, the use of passwords);

Coding without organizing a way for a user to access confidential processed information (for example, using an electronic signature (checksum) of files containing confidential processed information);

Software event log;

Mechanical means of protection (locks, seals, labels).

8.3.2. During this test, the following tests may be performed:

The reaction of the IP to the repeated input of incorrect information during authorization is checked;

The procedure for changing authorization parameters is checked.

8.3.2.2. Checking the software event log:

The appearance of the corresponding entry in the event log is checked after accessing and changing confidential processed information;

The possibility of editing and deleting entries in the event log is checked.

8.3.2.3. The response of the power supply to the operation of mechanical means of protection is checked (visual and (or) sound signal, entry in the event log).

8.3.3. Depending on the features of the IP and IADI, other tests of the means of protecting the processed confidential information of the IP can be performed.

8.3.4. IE IADV is considered to have passed testing for compliance with the requirements for confidentiality of processed information, if as a result of testing it is established that there are means of authorizing access and protecting confidential processed information from unauthorized access.

8.4. DEVELOPING A TESTING PROTOCOL

8.4.1. After the examination of the IP IADV in order to detect undeclared capabilities, a testing protocol is drawn up, the form of which is given in the Appendix.

8.4.2. The results of the IADV test for the purpose of type approval, confirming the random nature of the game process and the absence of violation of the established average percentage of winnings, are entered into the protocol for testing the IE IADV.

8.4.3. The results of the verification of technical documentation and testing, establishing the presence or absence of violations of the requirements for confidentiality, accessibility and integrity of the processed information, are entered into the testing protocol of the IP IAVA.

9. PROCEDURE FOR EXAMINATION OF SP TO DETECT UNDECLARED OPPORTUNITIES

9.1. The objectives of the examination of IP IADV, organizations conducting such examination, requirements for experts and the results of the examination are set out in paragraph of this recommendation.

9.2. Documents submitted for examination are drawn up in accordance with the requirements of clause of this recommendation and are submitted both on paper and in in electronic format on CD.

9.3. The procedure for the examination of IP IAADV includes:

Submission of an application for examination, the form of which is given in the Appendix and the necessary documentation to the CIIA;

Making a decision on the application (taking into account the completeness and sufficiency of the submitted documentation) and appointing experts (expert) to conduct the examination (refusal to conduct an examination is possible if the materials submitted by the applicant are insufficient for the examination);

Submission to CIIA IP in electronic form and, if necessary, on the original medium;

Development of a testing program for IP IADV, the form of which is given in the Appendix;

Carrying out verification of technical documentation and IP testing;

Submission of examination materials (testing program, test protocol and IP in electronic form and, if necessary, on the original media) to the TsIIA FSUE "VNIIMS";

Conducting an examination of the examination materials submitted to FSUE “VNIIMS” and issuing an expert opinion to the FSUE “VNIIMS” TsIIA on the absence (or detection) of undeclared capabilities in the IP IARV.

9.4. Information on the issuance of an expert opinion is entered into the register of the IE of the IADV Data Bank, which is maintained by the TsIIA FSUE VNIIMS.

9.5. Works related to the examination of the IP IADV, as well as the verification of examination materials, the preparation and issuance of expert opinions, are carried out on a contractual basis.

9.6. If disagreements arise between the CIIA conducting the examination, FSUE "VNIIMS" and the customer of the examination, they are resolved in accordance with the procedure established by the legislation of the Russian Federation.

Annex A

APPROVE

Head of CIIA

FSUE "VNIIMS"

__________________

"___" _______ 200_

Expert opinion

according to the results of testing the IE IADV for the presence of undeclared capabilities, provided by _____________________________________________________________

(name of the organization that submitted the IP for examination)

1. Commission of experts (expert) CIIA ______________________________________

(name CIIA)

composed of ________________________________________________________________________________

conducted testing of IP IADV for the presence of undeclared capabilities.

Testing was conducted in the period from _____ to ______ _________ 200__ at CIIA

(name CIIA)

2. The CIIA that conducted the testing was presented with the relevant

documentation and IP IADV __________________________________________________________

(including the name of the IP with the version)

3. After reviewing the presented IP and reviewing the accompanying documentation, the commission of experts (expert) of the CIIA recognized the materials provided as sufficient for testing.

4. Commission of CIIA experts _______________________________________________

(name CIIA)

tested IP IADV in accordance with MI 3017-2006 approved by Federal State Unitary Enterprise

"VNIIMS" ___________ 2006, specialists of the CIIA FSUE "VNIIMS" verified the submitted materials of the examination of the IP IADV.

5. As a result of the examination, it was found that there are no undeclared features in the IP IAADV: violation of the randomness of the game process, confidentiality, accessibility and integrity of the processed information (in case of detection of non-declared features, their nature is fixed). The expert opinion is drawn up in 2 copies.

Members of the expert commission (expert)

Annex B

TESTING PROGRAM

_________________________________________________,

(name of IP IADV)

submitted for examination and testing __________

__________________________________________________

(name of the applicant organization)

Location

The program contains a description and sequence of testing procedures for the IP IADI in accordance with the recommendations of this methodology (testing for compliance with the requirements for documentation, for the availability, integrity and confidentiality of the information being processed).

The testing program after the presentation of the content is signed by the developers - the commission of experts (expert) of the CIIA, which conducts the testing of the IP IADV, is approved by the head of the CIIA and agreed with the applicant.

Annex B

_________________________________________________

(name of the organization that conducts testing of IP IAVA)

I approve

Head of CIIA

___________________

"__" ________ 200_

Gaming test protocol IAVA programs

The name of the program ________________________________________________________

___________________________________________________________________________

Version / Identification number ___________________________________________

IP developer organization _________________________________________________

1. Documentation

Requirement

Present

Missing

Note

IP structure, sequence of data processing (text, graph)

Description of functions, IP parameters

Description of IP algorithms

Description of menus, dialogs, list of commands for each interface

Description of IP identification method

Description of methods for protecting IP and data from inadmissible changes

Error and Fault Messages

IP object code introduced

__________________________________________________________________________________

2. Random gameplay

Requirement

Present

Missing

Note

2.2 Average winning percentage (value)

Conclusion: _______________________________________________________________________

__________________________________________________________________________________

__________________________________________________________________________________

3. Availability of processed information

Requirement

Present

Missing

Note

Timely and complete receipt of the necessary processed information in an authorized manner.

Conclusion: _______________________________________________________________________

__________________________________________________________________________________

__________________________________________________________________________________

4. Integrity of processed information

Requirement

Present

Missing

Note

Changing the IP used in an approved gaming machine.

4.2.

Means of detecting, designating and protecting against failures (functional defects) and changes of an accidental or intentional nature that violate the integrity of the information being processed.

Conclusion: _______________________________________________________________________

__________________________________________________________________________________

__________________________________________________________________________________

5. Confidentiality of processed information

Requirement

Present

Missing

Note

Conclusion: _______________________________________________________________________

__________________________________________________________________________________

__________________________________________________________________________________

Conclusion on the results of testing: ____________________________________

___________________________________________________________________________

___________________________________________________________________________

Performers (positions, surnames, initials, signatures):

Date of testing

Familiarized with (position, surname, initials, signature of the applicant):

The documents attached to this application fully reflect the principle of operation (functioning) of the IE IADV. All produced copies of IP are made according to the same technical documentation as the samples submitted for examination and are their exact copies.

The Applicant undertakes to pay all expenses for the examination of IP IADV in accordance with the terms of the concluded agreement.

Examination of gambling equipment is appointed by the court or done in a pre-trial order for the court. With development modern technology it became easier to automate various processes Everyday life, incl. and gambling. It's no secret that the gambling business has always been a profitable business and even in our time remains so. An examination of lottery and gambling equipment is a series of studies that are carried out in order to detect latent algorithms, hidden information software arrays in the hardware of slot machines, as well as some parts of the machinery. Lottery draws and slot machines (one-armed bandit) are often used to generate high incomes by changing the winning algorithm with special software tools. For example, with the help of software (or remotely), the machine is set to a lower percentage of the client's winnings, compared to the average. The thing is that, according to standard probability theory, the client wins in a certain number of cases. According to the rules, the winnings of a classic slot machine must be at least seventy percent in favor of the client. Due to the fact that all such machines are now electronically programmed, the winning percentage can be set to whatever you like, which usually happens. The administration of gaming halls sets a certain percentage of winnings depending on various factors.

Get a free independent expert consultation now!

Send a request for a free qualified consultation of a specialist!


At present, in connection with the development of technology and technology, lotteries have become much easier. Now there is no need to issue special paper tickets. And, although drawing lotteries still exist (television, radio, etc.), electronic lotteries are becoming increasingly popular - by registering through special lottery terminals. Such draws are instantaneous, the winning amount is calculated after receiving the player's participation fee in the lottery. Further, right on the screen of the computer (terminal), the player selects a color field, and numerical combination. Depending on whether it is winning, the player receives or does not receive a prize in the form of a multiplied amount of money. Such lottery terminals use various static algorithms to identify prize combinations. The task of the examination of lottery equipment is to determine the legality of the algorithms used, that is, the compliance of the client's winning percentage with the statistically expected result.

Currently in high demand. This is primarily due to the legislative ban on gambling with the use of slot machines. There are only a few special zones left where such activities are allowed. And in all other regions it is banned.

However, some entrepreneurs began to use some gaps in the laws regarding incentive lotteries, carrying out their activities in the same way. Examination of gaming equipment just designed to determine the legality or illegality of the actions of people conducting non-drawing lotteries.

Lottery clubs or slot machines?

Taking advantage of the obvious gaps in the legislation, many entrepreneurs give out machines for lotteries without circulation, and when faced with checks, they find a way out of this for themselves.

There is also the opposite situation, when, due to inaccuracies in legislative definitions, the owners of non-circulation lotteries are subject to prohibitive actions.

To determine the type of institution and the measures that need to be taken against it, an examination of the machines is needed, which will answer many questions.

Essence of expertise

Examination of equipment for gambling establishments is a complex event that aims to detect algorithms in slot machines, as well as hidden data arrays, mechanisms and other components that are inaccessible from the outside.

Very often, slot machines and lotteries are used to maximize earnings by installing in them such an algorithm for obtaining a win that makes the percentage of wins significantly lower than the average value.

If according to the standard algorithm, which is guided by the theory of probability, there is a certain value of the percentage of cases in which there is a win, then when the algorithm is changed, this percentage is greatly reduced. As a result, the institution receives super profits, and customers lose more than they should.

For example, the One-Armed Bandit has a winning percentage of 75. And given that all machines are programmed electronically, the owners of the establishment can deliberately underestimate this percentage.

Inspection of lottery equipment

Since only lottery equipment may be legal in many regions of the country, then experts most often encounter it in their work. They have to find out if this equipment to permitted.

This may be needed in two cases:

  • Entrepreneurs to prove their case and innocence.
  • Law enforcement and other services to identify violators.

In each case, expertise solves the tasks assigned to certain interested parties. Our experts will help identify violations or prove their absence. We always conduct independent research that is objective.

Considering that tickets are not needed for lotteries today, and technical means are developing significantly, many people today can participate in the lottery using an electronic device.

There are lottery terminals that allow a participant to register for a lottery. Such draws are usually instant, and the amount is calculated after the person has paid the participation fee. After that, the terminal prompts you to select a field with a color, where there is a combination of numbers.

Depending on whether the combination turns out to be winning, the client either receives a win or is left with nothing.

The essence of the devices lies in the fact that they are programmed in a certain way for some algorithms, which determine the frequency and degree of the client's winnings.

When examining this type of equipment, examination of gaming equipment determines the correctness and admissibility of such algorithms. To answer whether the lottery is legal, or with its help, the owners of the establishment receive super profits, actually deceiving their customers, providing them with conditions in which it is impossible to win.

In addition to the percentage of winnings and its compliance with the statistical algorithm, experts also check the randomness of the distribution of winnings. This is important to know in order to answer the question of whether the lottery is fair. Or she can be rigged to win right person.

Play Equipment Inspection

Considering that casinos are allowed in some regions, and even where they are prohibited, law enforcement officers periodically find underground organizations, our experts are from time to time tasked with studying slot machines.

Modern machines are controlled by software algorithms, which makes it possible and tempting for their owners to independently influence the percentage of winnings of visitors. Even where casinos are allowed, such interventions remain illegal, and the examination is designed to determine if there are any technical and software violations that allow you to get super profits by deceiving customers.

Often, dissatisfied customers sue the casino, losing a large sum. This means that the company must prove:

  • That the loss of a person is not associated with a change in algorithms.
  • That in the machines there was no artificial underestimation of the percentage of winnings.

To do this, the most the right way― order our expertise, which is often the only way to maintain your reputation and avoid a major lawsuit.

Having received an expert opinion in court, the client will lose any leverage on your enterprise, since the conclusion will indicate which algorithms you used: standard or modified ones.

Play equipment subject to inspections

All equipment must be checked, in relation to which the owners or technical workers can apply changes to the software or electronic code responsible for the winning algorithms.

In fact, absolutely all slot machines are subject to checks, in which the number of winnings can be set using the program. So, the following types of equipment fall under the checks:

  • Roulette wheels.
  • Wheels of Fortune.
  • Programs for poker and other card games.
  • All kinds of gambling machines.

When do you use the services of an expert?

The services of an expert are required in the event of any dispute or conflict of interest. Also, if problems are found or suspected with gambling equipment, then it makes sense to conduct examinations.

Most often, cases in which you need to resort to expert help come down to:

  • Instructions from authorized government agencies that control lottery or gambling equipment.
  • The emergence of the need to establish whether the equipment has control elements that allow you to change the winning algorithms.
  • The need to establish compliance with the general strategy of the lottery and the program that is embedded in the device.
  • The need to determine the compliance of machines and devices with certificates and technical documentation that the enterprise has.
  • Identification of elements of schemes and programs that allow you to randomize the results of the game.

How is the examination carried out?

In all cases where an examination is required, a general scheme is applied, which is the same for absolutely each individual case of verification. The scheme consists of three main stages:

  • Documentation research.
  • Analysis of equipment, each individual sample.
  • Preparation of expert opinion on the results of the audit.

The first stage requires the study of technical documents that are attached to machines and other equipment. These include descriptions, manuals and instructions, as well as recommendations for special cases.


Slot machines

ANO "Center for Technical Expertise" offers its services for the examination of slot machines. These are devices that are used to play in a casino. The company is engaged in providing this type of service, as it has special technical equipment, as well as a team of specialists who are engaged in the examination of slot machines.

The company conducts such a study after the conclusion of contracts, both with individuals and legal entities. By itself, the examination of slot machines is carried out by order of the court, tax, customs authorities, inquiry, and investigation. The basis for the examination is the submitted official request.

Why are these studies being done?

At present, in the age of development modern technologies, there are dishonest owners of slot machines. To somehow bring them to clean water, conduct an examination of slot machines. Since gaming devices today can be programmed electronically, this provides an excellent opportunity for fraudsters to customize their work in their favor.

Quite often there are cases when many owners of such establishments install interest rate win in your favor. The main goal in the study of gaming installations is to identify machines on which special programs are installed that play more into the hands of the owner than the one who sits at him.

Usually, the examination is appointed by order of special organizations that oversee this equipment. Also, all devices located in the gaming hall can be checked for compliance with the documents provided by the administration, etc.