SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Understanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers  The Problems, Tools, Techniques and Technologies   Christopher Uriarte   Chief Technology Officer &  Head of International Development Retail Decisions PLRT Conference May 1, 2009 Philadelphia, PA
About Retail Decisions:  A Market Leader ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Retail Decisions (ReD) is a London-based specialty provider of transaction and card issuing service to banks, retailers, oil companies and telcos worldwide
Sample of ReD’s Clients and Focus Sectors Travel Telephony Retail Oil Banking Europe America Asia Pacific Other
Where We Sit & Where the Data Comes From Fraud Prevention & Gateway Services (CP&CNP) ReDShield TM ReD1Gateway TM CardExpress TM Fraud Prevention for Acquirers & Processors PRISM TM Fraud Prevention for Issuers PRISM TM Fraud Prevention for Merchants Fraud Prevention for Banking Institutions
Fraud Control Life Cycle Solutions implemented to reduce fraud Time lag for solutions to take affect New solution is implemented to reduce fraud Familiarity with weaknesses in cards and technology increases fraud Fraud begins to rise as new technologies are cracked and new weaknesses are found 2002 2009 ??? ??? Are We Here Now??? Implies Innovation Time Value of fraud
Counterfeit fraud driven by growth of plastic ,[object Object],170,000 cards seized in Taipei, Taiwan
Regular Occurrences of Organized & Social Engineering Efforts Arrests in card scam Wednesday, February 28, 2007 By Paul Grimaldi Journal Staff Writer   Arraigned yesterday in the thefts of credit-card and debit-card information — and more than $100,000  The men allegedly stole the information by switching out checkout lane keypads with one of their own machines and then retrieving the units a few days later so they could copy the account data.  To achieve this, they took shelf stocking positions at the supermarket, which gave them legitimate access to the facility during late hours in the evening.  They recorded the stolen information on blank bank cards that they used to get money from ATMs in the area, the police said.
Implanted chips Criminals implant a chip directly into Point of Sale equipment The chip holds up to 1,000 account numbers Major occurrences in Taiwan, Malaysia and Brazil
Purpose Built Skimmer – Old Technology, But Still Popular ,[object Object],[object Object],[object Object],[object Object]
Personalizing the Card Low tech: Embossing only “ Higher tech”: Transplanting  Skimmed Card Data 3712 345XX8 95004
The Trend:  No Longer a Low-Tech Crime ,[object Object],[object Object],[object Object]
What This Means In Regards to Fraud ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Typical Merchant Fraud Assessment Process Merchant  Order  System, Storefront, Website, etc. ACCEPT  ORDER DENY ORDER CHALLENGE ORDER (Manually Review) Fraud Prevention System and Tools (Proprietary or Outsourced) 90%+ Of All Orders ~2% Of All Orders 2%-8% Of All Orders (Where Applicable) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Examples:
Finding the Balance Between Key Metrics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Highlighted in red :  The most typical and critical results in each respective category When This Happens: This Could Happen: Manual Review Rates Increase   ,[object Object],[object Object],[object Object],[object Object],[object Object],Manual Review Rates Decrease   ,[object Object],[object Object],[object Object],[object Object],Hard Deny Rates Increase   ,[object Object],[object Object],[object Object],[object Object]
Fraud Prevention Systems:  Real-Time or Batch ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Merchants must first decide whether they require a Real-Time or Batch (non-real-time) fraud prevention system:  Sophisticated Systems Can Combine BOTH Techniques
Fraud Prevention Systems:  Tools and Technologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tool Example:  IP Geolocation Instantly compare an online customer's registered address with his real-world location to flag potential fraud Pre-emptively block web site access to certain locales or IP origination points known to be frequent sources of fraud Real-world location
Technique Example:  Combining IP Geolocation with Additional Transaction Analysis  Unusual combinations of location details I.P. address in California  Billing and/or Delivery address in London Card issued in Poland
Technique Example: Tumbling & Swapping
Technique Example: Email Tumbling & Swapping and Pattern Detection  John1 John2 John3 John4 John5 John6 John7 John8 John9 John10 @hotmail.com [email_address] [email_address] [email_address] [email_address] [email_address] [email_address] [email_address] [email_address] [email_address] [email_address] Up to10% fraud rate on free email domains
Technology Example:  Neural Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],Neural Model Transaction Details Where does this fall?? GOOD??  BAD??  Score: 743 Scale:  0 to 999 0 = Good, 999=Fraud Transaction Details  (Required fields varies depending on features  & purpose of neural model) Score: 0 Score: 999 Good  (Non-Fraud) Historical Transactions Bad  (Confirmed Fraud) Historical Transactions Model Building And Training
The "More Tools Create Greater Complexity" Challenge No Matches Negative Data Device ID Check Address Validation Proxy Detection Neural Score Transaction Data Everything’ s  OK;  First time buyer Business Rules No History Address is Good;  No match of Name to Address Could be behind a University proxy Score: 362 NOW WHAT? Should you accept it?  Should you outright deny it?  Should you manually review it? Challenge:  Not just managing the individual components, but the sum of the parts!
The Real World Challenge ,[object Object],[object Object],[object Object],“ Islands of Fraud in a Sea of Good Transactions” Suspicious AVS Order Amount
The Real World Challenge:  Example ,[object Object],[object Object],Suspicious AVS Order Amount
The Real World Challenge:  Example ,[object Object],[object Object],Suspicious AVS Order Amount
The Real World Challenge:  Example ,[object Object],[object Object],[object Object],[object Object],Problem: Strong  Detection at the Cost of High False Positives! Rule 1 Rule 2 IP Geolocation Coverage Suspicious AVS Order Amount
The Real World Challenge:  What a Fraud Prevention System Should Do ,[object Object],[object Object],[object Object],[object Object],Suspicious AVS Order Amount
New Tools and Techniques Can Bring New Challenges ,[object Object],[object Object],[object Object],[object Object],Some may require additional customer data, such as SSN/last 4 or ask personal validation questions Cost per transaction increases when more techniques and technologies are added to the suite of fraud tools Fraud Evolves.  Will these be valid in 2 years?  1 year?  6 Months? Could lead to increased manual review costs, false positives and customer dissatisfaction
Merchant vs. Issuer Fraud Prevention ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Private Label transactions offer a unique “Issuer/Merchant” perspective, but consolidated Merchant / Issuing fraud prevention systems do not exist today!
Private Label Card Fraud Examples ,[object Object],[object Object],[object Object],[object Object],Private Label Cards Other Cards Types Fraud Rate: % of Transactions % of Overall $ Value % of Transactions % of Overall $ Value Large Retailer “A”  (Apparel, Home Goods) 0.08% 0.23% 0.16% 0.34% Large Retailer “B” (Mixed Retail) 0.44% 1.56% 0.41% 1.30% Large Retailer “C” (Mixed Retail) 0.50% 0.98% 1.5% 3.2%
Private Label Fraud:  So What Does This Mean? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Latest Trends:  Private Label Gift Card and Stored Value Card Fraud on The Rise ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Key: June – December  2008 [January-February 2009] Virtual Gift Cards Plastic Gift Cards Other Cards Types (Non-PL) Fraud Rate: % of Transactions % of Overall $ Value % of Transactions % of Overall $ Value % of Transactions % of Overall $ Value Large Retailer “A”  (Apparel, Home Goods) 0.80% [1.50%] 1.00% [1.70%] 0.03% [0.60%] 0.03% [0.90%] 0.16% 0.34% Large Retailer “B” (Mixed Retail) 4.10% 10.6% 2.10% 3.05% 0.41% 1.30% Large Retailer “C” (Mixed Retail) 1.70% [6.70%] 2.60% [5.5%] 0.70% [2.7%] 2.80% [2.6%] 1.5% 3.2%
What can be accomplished? Customer Case Study – Top 10 Retailer ,[object Object],[object Object],[object Object],23 Retailer Chargeback Data
Customer  Case Study – Top 5 Digital Download / Gaming 24 ,[object Object],[object Object],[object Object],[object Object]
Customer Case Study  – Top 5 Global Travel Site (£ ‘000) 25 ,[object Object],Country Total Fraud Total Fraud stopped by ReD Percentage Stopped UK 1,356 1,186 88%  Germany 356 330 93%  France 504 476 95%  Italy 6 4 60%  TOTAL 2,221 1,996 90%
Day 1 Customer Case Study – Fraud Ring for Top 5 Jeweller  Individual IP address, phone numbers, email address, card numbers & shipping addresses all shared and used in one attack 26
Day 3 Customer Case Study – Fraud Ring  for Top 5 Jeweller  Individual IP address, phone numbers, email address, card numbers & shipping addresses all shared and used in one attack 27
Day 7 Tried to get  £30,000  worth of goods in just  7  days Customer Case Study – Fraud Ring  for Top 5 Jeweller  Individual IP address, phone numbers, email address, card numbers & shipping addresses all shared and used in one attack ,[object Object],28
Customer Case Study – ReD Shield Consistent Results  ,[object Object],[object Object],Total Chargeback Rate Total Chargeback Rate 29 Mobile Phone Operator Major High Street Retailer  (Pharmacy/Cosmetics, etc.)
Christopher Uriarte [email_address] US: +1 732.452.2440 UK: +44 (0) 1483 728700 Thank You! Please feel free to contact me with any questions!

Weitere ähnliche Inhalte

Was ist angesagt?

Insurance anti money laundering
Insurance   anti money launderingInsurance   anti money laundering
Insurance anti money laundering
Mohit Singla
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
Blackbaud
 
Electronic Payment Systems Shortened
Electronic Payment Systems ShortenedElectronic Payment Systems Shortened
Electronic Payment Systems Shortened
Ritesh Verma
 
Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...
Danail Yotov
 
Knowyourcustomer
KnowyourcustomerKnowyourcustomer
Knowyourcustomer
mohitronnie
 

Was ist angesagt? (20)

Mobile Wallet functions
Mobile Wallet functionsMobile Wallet functions
Mobile Wallet functions
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
Payment fraud
Payment fraudPayment fraud
Payment fraud
 
E walllet / Digital Wallet
E walllet / Digital WalletE walllet / Digital Wallet
E walllet / Digital Wallet
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)
 
Insurance anti money laundering
Insurance   anti money launderingInsurance   anti money laundering
Insurance anti money laundering
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
Future of Banking
Future of BankingFuture of Banking
Future of Banking
 
Electronic Payment Systems Shortened
Electronic Payment Systems ShortenedElectronic Payment Systems Shortened
Electronic Payment Systems Shortened
 
Electronic payment systems
Electronic payment systemsElectronic payment systems
Electronic payment systems
 
Payment Card System Overview
Payment Card System OverviewPayment Card System Overview
Payment Card System Overview
 
Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Payment Gateway
Payment Gateway Payment Gateway
Payment Gateway
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
Knowyourcustomer
KnowyourcustomerKnowyourcustomer
Knowyourcustomer
 
Credit card fraud(1)
Credit card fraud(1)Credit card fraud(1)
Credit card fraud(1)
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 

Andere mochten auch

Payments Card Fraud Challenges in Digital and Online Sales
Payments Card Fraud Challenges in Digital and Online SalesPayments Card Fraud Challenges in Digital and Online Sales
Payments Card Fraud Challenges in Digital and Online Sales
Christopher Uriarte
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
kalpesh1908
 
Credit Card Fraud
Credit Card FraudCredit Card Fraud
Credit Card Fraud
MONEXgroup
 
How Your Customer Thinks About Payments Fraud
How Your Customer Thinks About Payments FraudHow Your Customer Thinks About Payments Fraud
How Your Customer Thinks About Payments Fraud
Vivastream
 
Understanding Dynamic Chinese Online Payments Market
Understanding Dynamic Chinese Online Payments MarketUnderstanding Dynamic Chinese Online Payments Market
Understanding Dynamic Chinese Online Payments Market
Christopher Uriarte
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments Fraud
Christopher Uriarte
 

Andere mochten auch (20)

The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments Fraud
 
Payments Card Fraud Challenges in Digital and Online Sales
Payments Card Fraud Challenges in Digital and Online SalesPayments Card Fraud Challenges in Digital and Online Sales
Payments Card Fraud Challenges in Digital and Online Sales
 
The Impact of Fraud and Chargeback Management on Operations
The Impact of Fraud and Chargeback Management on OperationsThe Impact of Fraud and Chargeback Management on Operations
The Impact of Fraud and Chargeback Management on Operations
 
Online fraud in the Digital Gift Card Space
Online fraud in the Digital Gift Card SpaceOnline fraud in the Digital Gift Card Space
Online fraud in the Digital Gift Card Space
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Chicago Talk Pdf
Chicago Talk PdfChicago Talk Pdf
Chicago Talk Pdf
 
Lectia Antifrauda
Lectia AntifraudaLectia Antifrauda
Lectia Antifrauda
 
Credit Card Fraud
Credit Card FraudCredit Card Fraud
Credit Card Fraud
 
Balancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile WorldBalancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile World
 
How Your Customer Thinks About Payments Fraud
How Your Customer Thinks About Payments FraudHow Your Customer Thinks About Payments Fraud
How Your Customer Thinks About Payments Fraud
 
Protecting Digital Cash on the Move - Stories from the Field​
Protecting Digital Cash on the Move - Stories from the Field​Protecting Digital Cash on the Move - Stories from the Field​
Protecting Digital Cash on the Move - Stories from the Field​
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
Consumer protection and the internet
Consumer protection and the internetConsumer protection and the internet
Consumer protection and the internet
 
How the Stolen Credit Card Black Market Works
How the Stolen Credit Card Black Market WorksHow the Stolen Credit Card Black Market Works
How the Stolen Credit Card Black Market Works
 
Prepaid Card Fraud: Understanding the Problem, Developing a Solution
Prepaid Card Fraud:  Understanding the Problem, Developing a SolutionPrepaid Card Fraud:  Understanding the Problem, Developing a Solution
Prepaid Card Fraud: Understanding the Problem, Developing a Solution
 
Understanding Dynamic Chinese Online Payments Market
Understanding Dynamic Chinese Online Payments MarketUnderstanding Dynamic Chinese Online Payments Market
Understanding Dynamic Chinese Online Payments Market
 
The Digital Battleground - Protecting the Customer Experience in the midst of...
The Digital Battleground - Protecting the Customer Experience in the midst of...The Digital Battleground - Protecting the Customer Experience in the midst of...
The Digital Battleground - Protecting the Customer Experience in the midst of...
 
Payments Key Performance Indicators (KPIs): A Basic Perspective
Payments Key Performance Indicators (KPIs):  A Basic PerspectivePayments Key Performance Indicators (KPIs):  A Basic Perspective
Payments Key Performance Indicators (KPIs): A Basic Perspective
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments Fraud
 

Ähnlich wie Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers

CNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsCNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift Cards
Christopher Uriarte
 
Security Against Fraud In Ecommerce
Security Against Fraud In EcommerceSecurity Against Fraud In Ecommerce
Security Against Fraud In Ecommerce
Larry_Moffatt
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fms
kkvences
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
Kartik Mehta
 

Ähnlich wie Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers (20)

Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy
 
CNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsCNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift Cards
 
Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update Webinar
 
Security Against Fraud In Ecommerce
Security Against Fraud In EcommerceSecurity Against Fraud In Ecommerce
Security Against Fraud In Ecommerce
 
Telecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopTelecom Revenue Assurance Workshop
Telecom Revenue Assurance Workshop
 
Fraud management optimisation
Fraud management optimisation Fraud management optimisation
Fraud management optimisation
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Risk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTechRisk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTech
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact Centers
 
CorgiAI Seed Deck
CorgiAI Seed DeckCorgiAI Seed Deck
CorgiAI Seed Deck
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fms
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
 
Fraud Detector - The easy-to-customize, high ROI, IT solution for detecting ...
Fraud Detector - The easy-to-customize, high ROI,  IT solution for detecting ...Fraud Detector - The easy-to-customize, high ROI,  IT solution for detecting ...
Fraud Detector - The easy-to-customize, high ROI, IT solution for detecting ...
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
 
Krupin kirill (fraud) research proposal
Krupin kirill (fraud) research proposalKrupin kirill (fraud) research proposal
Krupin kirill (fraud) research proposal
 

Kürzlich hochgeladen

QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
hyt3577
 
+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
Health
 
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdfMASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
Cocity Enterprises
 
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammamAbortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
samsungultra782445
 
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdfFOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
Cocity Enterprises
 

Kürzlich hochgeladen (20)

7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options
 
fundamentals of corporate finance 11th canadian edition test bank.docx
fundamentals of corporate finance 11th canadian edition test bank.docxfundamentals of corporate finance 11th canadian edition test bank.docx
fundamentals of corporate finance 11th canadian edition test bank.docx
 
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
 
+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
 
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdfMASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
 
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammamAbortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
 
Business Principles, Tools, and Techniques in Participating in Various Types...
Business Principles, Tools, and Techniques  in Participating in Various Types...Business Principles, Tools, and Techniques  in Participating in Various Types...
Business Principles, Tools, and Techniques in Participating in Various Types...
 
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsMahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Group 8 - Goldman Sachs & 1MDB Case Studies
Group 8 - Goldman Sachs & 1MDB Case StudiesGroup 8 - Goldman Sachs & 1MDB Case Studies
Group 8 - Goldman Sachs & 1MDB Case Studies
 
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & RequirementsExplore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirements
 
Q1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfQ1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdf
 
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize ThemSignificant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them
 
Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024
 
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdfFOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
 
劳伦森大学毕业证
劳伦森大学毕业证劳伦森大学毕业证
劳伦森大学毕业证
 
Collecting banker, Capacity of collecting Banker, conditions under section 13...
Collecting banker, Capacity of collecting Banker, conditions under section 13...Collecting banker, Capacity of collecting Banker, conditions under section 13...
Collecting banker, Capacity of collecting Banker, conditions under section 13...
 
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
 
Avoidable Errors in Payroll Compliance for Payroll Services Providers - Globu...
Avoidable Errors in Payroll Compliance for Payroll Services Providers - Globu...Avoidable Errors in Payroll Compliance for Payroll Services Providers - Globu...
Avoidable Errors in Payroll Compliance for Payroll Services Providers - Globu...
 
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
 
Pension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfPension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdf
 

Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers

  • 1. Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers The Problems, Tools, Techniques and Technologies Christopher Uriarte Chief Technology Officer & Head of International Development Retail Decisions PLRT Conference May 1, 2009 Philadelphia, PA
  • 2.
  • 3. Sample of ReD’s Clients and Focus Sectors Travel Telephony Retail Oil Banking Europe America Asia Pacific Other
  • 4. Where We Sit & Where the Data Comes From Fraud Prevention & Gateway Services (CP&CNP) ReDShield TM ReD1Gateway TM CardExpress TM Fraud Prevention for Acquirers & Processors PRISM TM Fraud Prevention for Issuers PRISM TM Fraud Prevention for Merchants Fraud Prevention for Banking Institutions
  • 5. Fraud Control Life Cycle Solutions implemented to reduce fraud Time lag for solutions to take affect New solution is implemented to reduce fraud Familiarity with weaknesses in cards and technology increases fraud Fraud begins to rise as new technologies are cracked and new weaknesses are found 2002 2009 ??? ??? Are We Here Now??? Implies Innovation Time Value of fraud
  • 6.
  • 7. Regular Occurrences of Organized & Social Engineering Efforts Arrests in card scam Wednesday, February 28, 2007 By Paul Grimaldi Journal Staff Writer Arraigned yesterday in the thefts of credit-card and debit-card information — and more than $100,000 The men allegedly stole the information by switching out checkout lane keypads with one of their own machines and then retrieving the units a few days later so they could copy the account data. To achieve this, they took shelf stocking positions at the supermarket, which gave them legitimate access to the facility during late hours in the evening. They recorded the stolen information on blank bank cards that they used to get money from ATMs in the area, the police said.
  • 8. Implanted chips Criminals implant a chip directly into Point of Sale equipment The chip holds up to 1,000 account numbers Major occurrences in Taiwan, Malaysia and Brazil
  • 9.
  • 10. Personalizing the Card Low tech: Embossing only “ Higher tech”: Transplanting Skimmed Card Data 3712 345XX8 95004
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Tool Example: IP Geolocation Instantly compare an online customer's registered address with his real-world location to flag potential fraud Pre-emptively block web site access to certain locales or IP origination points known to be frequent sources of fraud Real-world location
  • 18. Technique Example: Combining IP Geolocation with Additional Transaction Analysis Unusual combinations of location details I.P. address in California Billing and/or Delivery address in London Card issued in Poland
  • 20. Technique Example: Email Tumbling & Swapping and Pattern Detection John1 John2 John3 John4 John5 John6 John7 John8 John9 John10 @hotmail.com [email_address] [email_address] [email_address] [email_address] [email_address] [email_address] [email_address] [email_address] [email_address] [email_address] Up to10% fraud rate on free email domains
  • 21.
  • 22. The "More Tools Create Greater Complexity" Challenge No Matches Negative Data Device ID Check Address Validation Proxy Detection Neural Score Transaction Data Everything’ s OK; First time buyer Business Rules No History Address is Good; No match of Name to Address Could be behind a University proxy Score: 362 NOW WHAT? Should you accept it? Should you outright deny it? Should you manually review it? Challenge: Not just managing the individual components, but the sum of the parts!
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Day 1 Customer Case Study – Fraud Ring for Top 5 Jeweller Individual IP address, phone numbers, email address, card numbers & shipping addresses all shared and used in one attack 26
  • 37. Day 3 Customer Case Study – Fraud Ring for Top 5 Jeweller Individual IP address, phone numbers, email address, card numbers & shipping addresses all shared and used in one attack 27
  • 38.
  • 39.
  • 40. Christopher Uriarte [email_address] US: +1 732.452.2440 UK: +44 (0) 1483 728700 Thank You! Please feel free to contact me with any questions!

Hinweis der Redaktion

  1. Slides 1-4 (3 Minutes) Brief Introduction to Retail Decisions to provide the context of who we are, why we see so many transactions and where my data is coming from Slide 5 (3 Minutes) Explain the “Fraud Control Lifecycle” and the correlation between fraud prevention tools and overall industry fraud rates Slides 7-12 (4 Minutes) Examples of how criminals obtain card data and how the cards are monetized Demonstrate the current complexity of fraud rings against merchants Slide 13-14 (4 minutes) Overview of the typical merchant fraud assessment process Introduction to the key metrics that merchants user in fraud prevention processes Slides 15-20 (10 Minutes) Examples of current fraud prevention system types and fraud prevention tools Slides 21-27 (5 minutes) Real-world examples of the complexities faced when using fraud prevention tools Slide 28-30 (10 minutes) Fraud in the Private Label space Slides 31-37 (5 minutes) Case studies – What can be accomplished when merchant fraud prevention systems are put in place Estimated time: 45 Minutes
  2. MG
  3. MG Seven Day Attack using 55 delivery addresses, 30 computers, 64 email addresses, 55 credit cards and 50 telephone numbers. Attempted to steal £30,000 worth of fraud Day One, two, three, four, five, six seven. As more fraudsters share details see the picture growing Start with one phone number the use of 14 credit cards Day two
  4. MG Seven Day Attack using 55 delivery addresses, 30 computers, 64 email addresses, 55 credit cards and 50 telephone numbers. Attempted to steal £30,000 worth of fraud Day One, two, three, four, five, six seven. As more fraudsters share details see the picture growing Start with one phone number the use of 14 credit cards Day two
  5. Seven Day Attack using 55 delivery addresses, 30 computers, 64 email addresses, 55 credit cards and 50 telephone numbers. Attempted to steal £30,000 worth of fraud Day One, two, three, four, five, six seven. As more fraudsters share details see the picture growing Start with one phone number the use of 14 credit cards Day two