Soft Computing Tools in Credit card fraud & Detection Rashmi G.Dukhi G.H.Raisoni Institute of Information & Technology, Nagpur rashmidukhi25@gmail.

Size: px
Start display at page:

Download "Soft Computing Tools in Credit card fraud & Detection Rashmi G.Dukhi G.H.Raisoni Institute of Information & Technology, Nagpur rashmidukhi25@gmail."

Transcription

1 Soft Computing Tools in Credit card fraud & Detection Rashmi G.Dukhi G.H.Raisoni Institute of Information & Technology, Nagpur Abstract Fraud is one of the major ethical issues in the credit card industry. The significance of the application of the techniques reviewed here is in the minimization of credit card fraud. Depending on the type of fraud faced by banks or credit card companies, various measures can be adopted and implemented. Neural Network is used to describe a statistical model that evaluates plastic card account and/or transaction data.the Neural Network Model generates a score for each account/transaction. The score separates those accounts/ transactions that are likely to be fraudulent from those that are not. Accounts/transactions that receive higher scores are more likely to be fraudulent.accounts/transactions that receive higher scores are more likely to be fraudelent. Keywords Credit card fraud, Detection techniques, Fraudster,Neural Network,Skimming I. INTRODUCTION Fraud means obtaining services/goods and/or money by unethical means, and is a growing problem all over the world nowadays. Fraud deals with cases involving criminal purposes that, mostly, are difficult to identify. Credit cards are one of the most famous targets of fraud. Credit card fraud may happen in various ways, which depend on the type of fraud concerned; it encapsulates bankruptcy fraud, theft fraud / counterfeit fraud, application fraud and behavioral fraud. Each of these sub-fraud categories has its own definition and specificity.section II describes the various types of frauds.section III explains how neural network can be applied for detecting fraudulent transactions. A. Perception of Risk One reason these numbers remain low is the perception of risk associated with the issuance of debit cards. This risk can be broken down into three categories: 1. Lost/stolen - Crime of opportunity, fraud is usually in small amounts and limited to one account 3. Friendly fraud - Fraud perpetrated by cardholders through system glitches, closing accounts before POS items clear and/or charge backs for valid transactions B. New Fraud Trends It is clear that issuers, especially smaller issuers, simply can't afford to be complacent. Often, criminals prey on institutions that they feel are less sophisticated in their risk management. New trends have emerged and are becoming more widespread in counterfeit fraud[10]. A few of the new methods that criminals are using to perpetuate fraud are: 1.Skimming - Criminals take valid cards and swipe them through a device that is about the size of a pager. The card information is then transferred and encoded onto any card with a magnetic stripe. The card could be a credit card that was recently stolen or found in the trash, any type of loyalty card or even a blank plastic card that can be purchased at a variety of places with no questions asked. The plastic is then used to perform transactions at locations where consumers swipe their own cards, such as gas stations, pay phones, and merchants where the customer passes their card through the POS terminal. Due to the fact that all of the valid track 2 data is reproduced, this type of fraud corrupts the CVV/CVC protection that card associations implemented just a few years ago[3]. ATM skimming is a type of fraud and figure 1 shows how PIN is captured by flashing light. 2.Account Generation Software - This type of software, available on the Internet, is used by criminals to obtain valid BINs and uses the proper algorithms to generate valid 16 digit account numbers that may or may not be issued. Criminals then take all of those valid account numbers and via computer or unmanned point of sale locations, start seeking vulnerable BIN. 2. Counterfeit - Process in which cards or accounts are created by criminals who have no association with the bank or cardholder 60

2 In other words, purchasers use credit cards knowing that they are not able to pay for their purchases. The bank will send them an order to pay. However, the customers will be recognized as being in a state of personal bankruptcy and not able to recover their debts. The bank will have to cover the losses itself. Usually, this type of fraud loss is not included in the calculation of the fraud loss provision as it is considered a chargeoff loss. The only way to prevent this bankruptcy fraud is by doing a pre-check with credit bureaux in order to be informed about the banking history of the customers. 2. Theft fraud/counterfeit fraud- Fig 1.An ATM skimming & Pin Capturing Device. The flashing light is easily observed. 3. Pinging - A method in which criminals try to get an authorization on the account numbers they have generated with account generation software. Once an authorization is given, multiple cards are produced and passed out to other members involved in the fraud ring. 4. Account Takeover - This type of fraud is becoming more prevalent. The criminal calls the bank to change the address on an account and then calls back a few days later explaining that their card was lost and requests a new debit card. Many technology controls and tools are being used today by financial institutions including card activation (cards are mailed inactive and can only be activated by VRU or PIN-based transactions at the ATM), address verification in non face-to-face transactions, CVC/CVV validation and expiration date checking[13]. With these tools in place, most instances of fraud can be avoided. However, it's the implementation of neural networks that has had the strongest effect on the reduction of fraud. 1. Bankruptcy fraud II. TYPES OF FRAUD Bankruptcy fraud is one of the most difficult types of fraud to predict. However, some methods or techniques may help in its prevention. Bankruptcy fraud means using a credit card while being insolvent. 61 Theft fraud means using a card that is not yours. The perpetrator will steal the card of someone else and use it as many times as possible before the card is blocked. The sooner the owner will react and contact the bank, the faster the bank will take measures to stop the thief. Counterfeit fraud occurs when the credit card is used remotely; only the credit card details are needed. At one point, one will copy your card number and codes and use it via certain web-sites, where no signature or physical cards are required On-line merchants are at risk because they have to offer their clients payment by credit card[5]. In cases where fraudsters use stolen or manipulated credit card data the merchant loses money because of so-called "charge-backs"2. Note that charge-backs are generated if credit card holders object to items on their monthly credit card statements because they were not responsible for the purchase transactions. A fraudulent transaction is difficult to detect and to define. Nevertheless, ATM transactions of large amounts are suspicious and demand contact with the customer. Purchases of goods for a larger amount than normal will also be notified to the customer as well as abnormal overseas spending patterns.fraudulent transactions are usually impossible to prevent as they occur in a really short period of time. However, once a card is identified, the card is blocked. 3. Application Fraud Application fraud is when someone applies for a credit card with false information. To detect application fraud, the solution is to implement a fraud system that allows identifying suspicious applications.

3 To detect application fraud, two different situations have to be distinguished: when applications come from a same individual with duplicates, and when applications come from different individuals with similar details, the so-called identity fraudsters.in most banks, to be eligible for a credit card, applicants need to complete an application form. This application form is mandatory except for social fields. The information required includes identification information, location information, contact information, confidential information and additional information. Recurrent information available would be for identification purposes, such as the full name and the date of birth. The applicant would inform the bank about his/her location details: the address, the postal code, the city and the country. The bank would also ask for contact details, such as address, land-line and mobile phone numbers. Confidential information will be the password. In addition, the gender will be given. All those characteristics may be used while searching for duplicates. To identify the so-called duplicates, cross-matching techniques are in common use. Rather than using statistical techniques, another method easy to implement is cross-matching. For instance, simple queries that give fast results are to cross-identify information with location details. Examples would be last name and date of birth and postal code and address or last name and address and and gender. By those queries, individuals with more than one card are identified. Those are quite simplistic queries but will remove most duplicates from the system. Note that duplicates may usually be genuine. Customers can reapply filling in a new address or spelling differently in one of the fields. By contrast, identity crime, as it is named, is perpetrated by real criminals filling wrong application data consciously. 4. Behavioral fraud - Behavioral fraud occurs when details of legitimate cards have been obtained\ fraudulently and sales are made on a cardholder present basis. These sales include telephone sales and e-commerce transactions, where only the card details are required.behavioral fraud can be detected by implementing a fraud scorecard predicting which customers are likely to default. Traditional credit scorecards are used to detect customers who are likely to default, and the reasons for this may include fraud.regarding the process, using scoring for fraud prevention is similar to any other use, including profit, default, and collection. The score reflects experience of past cases, and the result is a binary outcome: a genuine customer or a fraudster. III. NEURAL NETWORK APPROACH Neural networks are extremely important in today's banking world and provide many benefits. Unlike daily reports, all suspect activity is detected immediately and can be tied to the authorization system to deny after the first detection. In addition, neural networks are always adapting to new fraud trends. Criminals can by-pass all of the fraud methods discussed in some manner; however, neural networks are the only systems that help detect unusual activity when all other methods of fraud prevention have been circumvented. "Self-learning" software that builds and learns the characteristics of each cardholder can "predict" if a transaction may be fraudulent. The term for this type of fraud control is Predictive Modeling. This software takes every transaction and provides a score based on previous activity for that account. If the transaction has some element (amount, geography, merchant type, etc.) that causes the software to "predict" that it is probably fraudulent, it gives it a very high score. These neural networks can be installed in tandem with the bank processor's authorization system, so that transactions are scored immediately. Based on the score received, they can be further investigated or declined. In the world of plastic card fraud, the term Neural Network is used to describe a statistical model that evaluates plastic card account and/or transaction data. Typically, the Neural Network Model generates a score for each account/transaction. The score separates those accounts/ transactions that are likely to be fraudulent from those that are not. Accounts/transactions that receive higher scores are more likely to be fraudulent. A robust Neural Network Model helps a fraud investigator focus on those accounts/transactions that are MOST LIKELY to be fraudulent [14]. 62

4 A Neural Network Model is one component of a more complex Fraud Detection System. There are many other tools that are used to deliver and augment the score created by the Neural Network Model. These include: A. Rule Systems allow issuers and processors to focus more specifically on fraudulent accounts/transactions. Rule Systems typically incorporate a Neural Network Model score and allow the issuer to apply their own detailed knowledge to improve the process. For example: If an issuer that typically reviews cases with a Neural Network score of 800 suddenly experiences an outbreak of fraud at electronic stores in Madison, WI, a Rule System would allow them to create a rule that says: IF the MERCHANT is ELECTRONICS AND the zip code is between and AND the Neural Network Score is greater than 600 CREATE A CASE TO REVIEW In this case, the rule allows the issuer to focus on a specific fraud situation that would have been missed using the Neural Network score of 800. The important distinction is that rules can be modified by the user, while the Neural Network Model cannot. B. Case Management Systems- refer to the PC workstation that a fraud analyst uses to review/work each case and determine the action that needs to be taken. A Case Management System usually allows the analyst to see recent transactions on the account, and provides the analyst with contact information so an attempt can be made to reach the cardholder. The Case Management System gives the fraud analyst enough information to make a decision in the event that a cardholder cannot be reached. C.Authorization Systems decide whether or not to approve or decline a transaction. The most basic Authorization Systems will make this decision using elements such as: Available Credit Limit/Account Balance Current Status (is the account overdue?) Open/Closed Indicator Expiration Date Check CVV Validation While the Neural Network Model can help predict which accounts/ transactions are most likely to be fraudulent, it requires followup action to verify the activity or to decide whether or not an account should be blocked. The other components of the Fraud Detection System and Authorization System help credit unions and processors take action to identify and stop fraudulent activity as quickly as possible. IV. CONCLUSION Credit card fraud is an act of criminal dishonesty. This article has reviewed recent findings in the credit card field. This paper has identified the different types of fraud, such as bankruptcy fraud, counterfeit fraud, theft fraud, application fraud and behavioral fraud, and discussed measures to detect them. Such measures have included neural networks. References [1]. Aleskerov, E., Freisleben, B. & B Rao CARDWATCH: A Neural Network-Based Database Mining System for Credit Card Fraud Detection, Proc. of the IEEE/IAFE on Computational Intelligence for Financial Engineering, [2]. Anderson, R The Credit Scoring Toolkit: theory and practice for retail credit risk management and decision automation. New York: Oxford University Press. [3]. APACS, Association for Payment Cleaning Services, no date. Card Fraud Facts and Figures Available at: s_and_figures.html (Accessed: December 2007). [4]. Bentley, P., Kim, J., Jung. G. & J Choi Fuzzy Darwinian Detection of Credit Card Fraud, Proc. of 14 th Annual Fall Symposium of the Korean Information Processing Society. [5]. Bolton, R. & Hand, D Statistical Fraud Detection: A Review. Statistical Science, 17; [6]. Brause R., Langsdorf T. & M Hepp. 1999a. Credit card fraud detection by adaptive neural data mining, Internal Report 7/99 (J. W. Goethe-University, Computer Science Department, Frankfurt, Germany). [7]. Brause, R., Langsdorf, T. & M Hepp. 1999b. Neural Data Mining for Credit Card Fraud Detection, Proc. of 11 th IEEE International Conference on Tools with Artificial Intelligence. 63

5 [8]. Caminer, B Credit card Fraud: The Neglected Crime. The Journal of Criminal Law and Criminology, 76; [9]. Chan, P., Fan, W. Prodromidis, A. & S Stolfo Distributed Data Mining in Credit Card Fraud Detection.IEEE Intelligent Systems, 14; [10]. Chan, P., Stolfo, S., Fan, D., Lee, W. & A Prodromidis Credit card fraud detection using meta learning: Issues and initial results, Working notes of AAAI Workshop on AI Approaches to Fraud Detection and Risk Management. [11]. Chepaitis, E Information Ethics Across Information Cultures. Business Ethics: A European Review, 6: 4, [12]. Chiu, C. & Tsai, C A Web Services-Based Collaborative Scheme for Credit Card Fraud Detection. Proc. Of 2004 IEEE International Conference on e-technology, e-commerce and e- Service. [13]. Clarke, M Fraud and the Politics of Morality. Business Ethics: A European Review, 3: 2, [14]. Dorronsoro, J. Ginel, F. Sanchez, C. & C Cruz Neural Fraud Detection in Credit Card Operations. IEEE Transactions on Neural Networks, 8; [15]. Encyclopedia Britannica, no date. Credit Card. Available at: card (Accessed: October 2008). [16]. Bolton, R. & Hand, D Unsupervised Profiling Methods for Fraud Detection, Credit Scoring and Credit Control VII. 64

Credit card fraud and detection techniques: a review

Credit card fraud and detection techniques: a review Banks and Bank Systems, Volume 4, Issue 2, 2009 Linda Delamaire (UK), Hussein Abdou (UK), John Pointon (UK) Credit card fraud and detection techniques: a review Abstract Fraud is one of the major ethical

More information

Your Single Source. for credit, debit and pre-paid services. Fraud Risk and Mitigation

Your Single Source. for credit, debit and pre-paid services. Fraud Risk and Mitigation Your Single Source for credit, debit and pre-paid services Fraud Risk and Mitigation Agenda Types of Fraud Fraud Identification Notifications Next Steps 11/8/2013 2 Types of Fraud Lost and Stolen Cards

More information

Credit Card Fraud Detection Using Hidden Markov Model

Credit Card Fraud Detection Using Hidden Markov Model International Journal of Soft Computing and Engineering (IJSCE) Credit Card Fraud Detection Using Hidden Markov Model SHAILESH S. DHOK Abstract The most accepted payment mode is credit card for both online

More information

Mitigating Fraud Risk Through Card Data Verification

Mitigating Fraud Risk Through Card Data Verification Risk Management Best Practices 11 September 2014 Mitigating Fraud Risk Through Card Data Verification AP, Canada, CEMEA, LAC, U.S. Issuers, Processors With a number of cardholder payment options (e.g.,

More information

Acceptance to Minimize Fraud

Acceptance to Minimize Fraud Best Practices for Credit Card Acceptance to Minimize Fraud By implementing best practices in credit card processing, you decrease the likelihood of fraudulent transactions and chargebacks. In general,

More information

Payment Fraud Statistics

Payment Fraud Statistics Instrument No. of Fraud Payment Fraud Statistics - Summary of Results Fraud Perpetrated on Australian Issued Payment Instruments (Revised December 2013) Value ($) of Fraud Total No. of all (thousands)

More information

Market Intelligence Cell. Fighting Financial Crime

Market Intelligence Cell. Fighting Financial Crime Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach

More information

Merchant Guide to the Visa Address Verification Service

Merchant Guide to the Visa Address Verification Service Merchant Guide to the Visa Address Verification Service Merchant Guide to the Visa Address Verification Service TABLE OF CONTENTS Table of Contents Merchant Guide to the Visa Address Verification Service

More information

AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA

AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA Australian Payments Clearing Association AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA 214 Australian Payments Clearing Association Limited ABN 12 55 136 519 CONTENTS OVERVIEW 1 SECTION 1 Fraud rates 4 SECTION

More information

BinBase.com REPORT: credit card fraud

BinBase.com REPORT: credit card fraud BinBase.com REPORT: credit card fraud Whether you are a security specialist, an e-commerce web developer, or an online merchant, a knowledge of how credit card fraud works and what you can do to prevent

More information

Designing an Automated Distributed System for Credit Card Fraud Detection

Designing an Automated Distributed System for Credit Card Fraud Detection Designing an Automated Distributed System for Credit Card Fraud Detection Somtoochukwu Ilo, Tochukwu Chiagunye and Amaechi Chineke, Computer Engineering Department Michael Okpara University of Agriculture,

More information

Using Trusted Email to Prevent Credit Card Frauds in Multimedia Products

Using Trusted Email to Prevent Credit Card Frauds in Multimedia Products World Wide Web: Internet and Web Information Systems, 5, 245 256, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. Using Trusted Email to Prevent Credit Card Frauds in Multimedia

More information

PROBLEM REDUCTION IN ONLINE PAYMENT SYSTEM USING HYBRID MODEL

PROBLEM REDUCTION IN ONLINE PAYMENT SYSTEM USING HYBRID MODEL PROBLEM REDUCTION IN ONLINE PAYMENT SYSTEM USING HYBRID MODEL Sandeep Pratap Singh 1, Shiv Shankar P. Shukla 1, Nitin Rakesh 1 and Vipin Tyagi 2 1 Department of Computer Science and Engineering, Jaypee

More information

Avoiding Fraud. Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk.

Avoiding Fraud. Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk. Avoiding Fraud Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk. Intoduction Fraud comes in many forms and hurts merchants of all sizes. Whether

More information

Credit Card PIN & PAY Frequently Asked Questions (FAQ)

Credit Card PIN & PAY Frequently Asked Questions (FAQ) Credit Card PIN & PAY Frequently Asked Questions (FAQ) 1. What is a PIN & PAY card? PIN & PAY card is a PIN - enabled card that allows you to make purchase by keying in a 6-digit PIN, with no signature

More information

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more

More information

AN UPDATE RESEARCH ON CREDIT CARD ON-LINE TRANSACTIONS

AN UPDATE RESEARCH ON CREDIT CARD ON-LINE TRANSACTIONS AN UPDATE RESEARCH ON CREDIT CARD ON-LINE TRANSACTIONS Falaki S. O. Alese B. K. Department of Computer Science, Federal University of Technology, Akure, Ondo State, Nigeria. Ismaila W. O. Department of

More information

Suzanne Lynch Professor of Practice Economic Crime Utica College sl6-15 1

Suzanne Lynch Professor of Practice Economic Crime Utica College sl6-15 1 Suzanne Lynch Professor of Practice Economic Crime Utica College sl6-15 1 The most significant trend is decreasing paper payments and increasing electronic payments. Many organizations are also seeing

More information

The need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal

The need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal The need for a secure & trusted payment instrument in e-commerce Ali AlMeshal In Physical/Real World Hand over card Visual check Swipe in POS Online authorization Receipt with signature panel Sign or Pin

More information

Statistics in Retail Finance. Chapter 7: Fraud Detection in Retail Credit

Statistics in Retail Finance. Chapter 7: Fraud Detection in Retail Credit Statistics in Retail Finance Chapter 7: Fraud Detection in Retail Credit 1 Overview > Detection of fraud remains an important issue in retail credit. Methods similar to scorecard development may be employed,

More information

Credit/Debit Card Processing Requirements and Best Practices. Adele Honeyman Oregon State Treasury Training Specialist

Credit/Debit Card Processing Requirements and Best Practices. Adele Honeyman Oregon State Treasury Training Specialist Credit/Debit Card Processing Requirements and Best Practices Adele Honeyman Oregon State Treasury Training Specialist 1 What? What do I need to know about excepting credit cards? Who s involved, how it

More information

To all GRSB debit and credit card customers:

To all GRSB debit and credit card customers: To all GRSB debit and credit card customers: A data breach at the Target Corporation may have exposed 40 million credit/debit cards to potential fraudulent activity. If you made purchases in a Target store

More information

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009 AIS Webinar Payment Application Security Hap Huynh Business Leader Visa Inc. 1 April 2009 1 Agenda Security Environment Payment Application Security Overview Questions and Comments Payment Application

More information

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if

More information

EMV EMV TABLE OF CONTENTS

EMV EMV TABLE OF CONTENTS 2 TABLE OF CONTENTS Intro... 2 Are You Ready?... 3 What Is?... 4 Why?... 5 What Does Mean To Your Business?... 6 Checklist... 8 3 U.S. Merchants 60% are expected to convert to -enabled devices by 2015.

More information

FIGHTING FRAUD: IMPROVING INFORMATION SECURITY TESTIMONY OF JOHN J. BRADY VICE PRESIDENT, MERCHANT FRAUD CONTROL MASTERCARD INTERNATIONAL

FIGHTING FRAUD: IMPROVING INFORMATION SECURITY TESTIMONY OF JOHN J. BRADY VICE PRESIDENT, MERCHANT FRAUD CONTROL MASTERCARD INTERNATIONAL FIGHTING FRAUD: IMPROVING INFORMATION SECURITY TESTIMONY OF JOHN J. BRADY VICE PRESIDENT, MERCHANT FRAUD CONTROL MASTERCARD INTERNATIONAL Before the Subcommittee on Financial Institutions and Consumer

More information

EMV's Role in reducing Payment Risks: a Multi-Layered Approach

EMV's Role in reducing Payment Risks: a Multi-Layered Approach EMV's Role in reducing Payment Risks: a Multi-Layered Approach April 24, 2013 Agenda EMV Rationale Why is this worth the effort? Guides how we implement it EMV Vulnerability at the POS EMV Impact on CNP

More information

F I C O. February 22, 2011

F I C O. February 22, 2011 F I C O Fair Isaac Corporation 901 Marquette Avenue, Suite 3200 Minneapolis, M N 5 5 4 0 2 U S A T 6 1 2-7 5 8-5 2 0 0 F 6 1 2-7 5 8-5 2 0 1 www.fico.com February 22, 2011 Jennifer J. Johnson, Secretary

More information

How To Understand The Benefits Of It/Is

How To Understand The Benefits Of It/Is THE ROLE OF IT/IS IN COMBATING FRAUD IN THE PAYMENT CARD INDUSTRY Jan Devos, Ghent University Association, Howest Kortrijk, Belgium Igor Pipan, Ss. Cyril and Methodius University in Skopje, Macedonia Abstract

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

IDENTITY THEFT FRAUD

IDENTITY THEFT FRAUD FRAUD ALERT! SYNTHETIC IDENTITY THEFT FRAUD & n How to Protect Yourself n Data Breaches and You n Free Credit Reports SYNTHETIC IDENTITY THEFT and FRAUD It is hardly news that identity thieves and cybercriminals

More information

OpenEdge Research & Development Group April 2015

OpenEdge Research & Development Group April 2015 2015: Security, Merchant Readiness & the Coming Liability Shift OpenEdge Research & Development Group April 2015 solutions@openedgepay.com openedgepay.com 2015: Security, Merchant Table of Contents The

More information

Fraud Prevention and Program Security Gord Jamieson Director Risk Management & Security Visa Canada Association

Fraud Prevention and Program Security Gord Jamieson Director Risk Management & Security Visa Canada Association Fraud Prevention and Program Security Gord Jamieson Director Risk Management & Security Visa Canada Association Evolution of Risk Management Controls Presentation text goes here. Presentation text goes

More information

CREDIT CARD PROCESSING GLOSSARY OF TERMS

CREDIT CARD PROCESSING GLOSSARY OF TERMS CREDIT CARD PROCESSING GLOSSARY OF TERMS 3DES A highly secure encryption system that encrypts data 3 times, using 3 64-bit keys, for an overall encryption key length of 192 bits. Also called triple DES.

More information

Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper 2014. Executive Director, Product Development

Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper 2014. Executive Director, Product Development A Heartland Payment Systems White Paper 2014 Heartland Secure. By: Michael English Executive Director, Product Development 2014 Heartland Payment Systems. All trademarks, service marks and trade names

More information

Artificial Neural Network and Location Coordinates based Security in Credit Cards

Artificial Neural Network and Location Coordinates based Security in Credit Cards Artificial Neural Network and Location Coordinates based Security in Credit Cards 1 Hakam Singh, 2 Vandna Thakur Department of Computer Science Career Point University Hamirpur Himachal Pradesh,India Abstract

More information

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved

More information

Fraud. Wrongful or criminal deception intended to result in financial or personal gain.

Fraud. Wrongful or criminal deception intended to result in financial or personal gain. Fraud Wrongful or criminal deception intended to result in financial or personal gain. Fraud in the Taxi Industry Taxi services are unique our payments occur where the customers are, not at a single place

More information

PayPoint.net Gateway Guide to Identifying Fraud Risks

PayPoint.net Gateway Guide to Identifying Fraud Risks PayPoint.net Gateway Guide to Identifying Fraud Risks Copyright PayPoint.net 2010 This document contains the proprietary information of PayPoint.net and may not be reproduced in any form or disclosed to

More information

Fraud Minimisation Guide ANZ Merchant Business Solutions

Fraud Minimisation Guide ANZ Merchant Business Solutions Fraud Minimisation Guide ANZ Merchant Business Solutions INTRODUCTION Fraud can occur in and is a risk for any business that accepts credit cards and it can have a significant financial impact on your

More information

Risk Management Service Guide. Version 4.2 August 2013 Business Gateway

Risk Management Service Guide. Version 4.2 August 2013 Business Gateway Risk Management Service Guide Version 4.2 August 2013 Business Gateway This page is intentionally blank. Table Of Contents About this Guide... 1 Change History... 1 Copyright... 1 Introduction... 3 What

More information

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09 IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do

More information

The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.

The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online. 1 February 2010 Volume 2, Issue 1 The Merchant Serving Florida State University s Payment Card Community Individual Highlights: Skimming Scam 1 Skimming at Work 2 Safe at Home 3 Read your Statement 4 Useful

More information

EMV and Small Merchants:

EMV and Small Merchants: September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service

More information

Detecting Credit Card Fraud by Decision Trees and Support Vector Machines

Detecting Credit Card Fraud by Decision Trees and Support Vector Machines Detecting Credit Card Fraud by Decision Trees and Support Vector Machines Y. Sahin and E. Duman Abstract With the developments in the Information Technology and improvements in the communication channels,

More information

Card Acceptance Best Practices Playing it Safe at the Point of Sale

Card Acceptance Best Practices Playing it Safe at the Point of Sale White Paper Card Acceptance Best Practices Playing it Safe at the Point of Sale Fraudulent activity costs U.S. businesses billions. And that is just lost revenue. When you consider the associated damage

More information

Application of Hidden Markov Model in Credit Card Fraud Detection

Application of Hidden Markov Model in Credit Card Fraud Detection Application of Hidden Markov Model in Credit Card Fraud Detection V. Bhusari 1, S. Patil 1 1 Department of Computer Technology, College of Engineering, Bharati Vidyapeeth, Pune, India, 400011 Email: vrunda1234@gmail.com

More information

Consumer Decision Making Contest 2001-2002 Study Guide ATM/Debit Cards

Consumer Decision Making Contest 2001-2002 Study Guide ATM/Debit Cards Consumer Decision Making Contest 2001-2002 Study Guide ATM/Debit Cards The popularity of ATM (automated teller machine) and debit cards is rising. ATM cards have a longer history than debit cards, but

More information

Identifying Security. Payment System. Federal Reserve Bank. Ellen Richey Chief Enterprise Risk Officer Visa Inc. Visa Public

Identifying Security. Payment System. Federal Reserve Bank. Ellen Richey Chief Enterprise Risk Officer Visa Inc. Visa Public Identifying Security Issues in the Retail Payment System Federal Reserve Bank Chicago Ellen Richey Chief Enterprise Risk Officer Visa Inc. June 5, 2008 Agenda 1. The Data Security Landscape 2. Recent Trends

More information

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit

More information

The 7 th Balkan Conference on Operational Research BACOR 05 Constanta, May 2005, Romania REDUCING FRAUD IN ELECTRONIC PAYMENT SYSTEMS

The 7 th Balkan Conference on Operational Research BACOR 05 Constanta, May 2005, Romania REDUCING FRAUD IN ELECTRONIC PAYMENT SYSTEMS The 7 th Balkan Conference on Operational Research BACOR 05 Constanta, May 2005, Romania REDUCING FRAUD IN ELECTRONIC PAYMENT SYSTEMS DEJAN SIMIÃ University of Belgrade, Faculty of Organizational Sciences,

More information

Mitigating Fraudulent CNP Transactions

Mitigating Fraudulent CNP Transactions Examination of Safeguards Electronic commerce has become a wildly successful channel for merchants and their customers. While the ability to shop online or through mail order catalogs is not new, the explosion

More information

Fraud Prevention Issuer s Best Practice Guide

Fraud Prevention Issuer s Best Practice Guide Issuer s Best Practice Guide Rev. March 2011 www.fisglobal.com Copyright 2006 by FIS Card Services, Inc., a wholly owned subsidiary of FIS, Inc. All rights reserved. Printed in the United States of America.

More information

About the Federal Reserve

About the Federal Reserve About the Federal Reserve The Federal Reserve Bank of Philadelphia is one of 12 regional Reserve Banks in the United States that, along with the Board of Governors in Washington, D.C., make up the Federal

More information

T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E

T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E A I D E N T I T Y T H E F T G U I D E Prepared and distributed as a Public

More information

important for me Postbank P.O.S. Transact

important for me Postbank P.O.S. Transact important for me Smooth, secure processing of card payments online, by phone or by fax. The benefits of being a Postbank partner for distance selling. Postbank P.O.S. Transact 2 At a glance The benefits

More information

I know what is identity theft but how do I know if mine has been stolen?

I know what is identity theft but how do I know if mine has been stolen? What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card

More information

ATM FRAUD AND COUNTER MEASURES

ATM FRAUD AND COUNTER MEASURES ATM FRAUD AND COUNTER MEASURES GENESIS OF ATMs An automated teller machine was first introduced in 1960 by City Bank of New York on a trial basis. The concept of this machine was for customers to pay utility

More information

Introducing the Credit Card

Introducing the Credit Card Introducing the Credit Card This program was designed with high school students in mind. It goes over everything you need to know before you get your first credit card so you can manage it wisely.» Key

More information

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Contents Welcome... 3 Overview... 4 Definitions... 5 Red Flags... 6 Red Flag 1 Alerts, Notifications or Warnings from a Consumer Reporting Agency... 7 Red Flag 2 Suspicious

More information

Meta Learning Algorithms for Credit Card Fraud Detection

Meta Learning Algorithms for Credit Card Fraud Detection International Journal of Engineering Research and Development e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Volume 6, Issue 6 (March 213), PP. 16-2 Meta Learning Algorithms for Credit Card Fraud Detection

More information

Plastic Card Claims Automation Specifications Document

Plastic Card Claims Automation Specifications Document Plastic Card Claims Automation Specifications Document Version: 1.3 Last modified: April 28, 2009 The Plastic Card Policy is underwritten by CUMIS Insurance Society, Inc., a member of the CUNA Mutual Group.

More information

Payment Cardholder Data Handling Procedures (required to accept any credit card payments)

Payment Cardholder Data Handling Procedures (required to accept any credit card payments) Payment Cardholder Data Handling Procedures (required to accept any credit card payments) Introduction: The Procedures that follow will allow the University to be in compliance with the Payment Card Industry

More information

Actorcard Prepaid Visa Card Terms & Conditions

Actorcard Prepaid Visa Card Terms & Conditions Actorcard Prepaid Visa Card Terms & Conditions These Terms & Conditions apply to your Actorcard prepaid Visa debit card. Please read them carefully. In these Terms & Conditions: "Account" means the prepaid

More information

A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business

A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business Nucharee Premchaiswadi*, James G. Williams** and Wichian Premchaiswadi*** *Faculty of Information Technology Dhurakij

More information

Visa global Compromised Account

Visa global Compromised Account Visa global Compromised Account RECOVERY PROGRAM WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT The Visa Global Compromised Account Recovery (GCAR) program offers

More information

Identity Theft. Emergency Repair Kit

Identity Theft. Emergency Repair Kit Identity Theft Emergency Repair Kit 2012 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Any duplication or reproduction is strictly prohibited. Identity Theft Emergency Repair

More information

Fraud Management in the Credit Card Industry 1

Fraud Management in the Credit Card Industry 1 Fraud Management in the Credit Card Industry 1 Peter Burns Anne Stanley April 2002 Summary: On November 16, 2001, the Payment Cards Center of the Federal Reserve Bank of Philadelphia sponsored a workshop

More information

Security enhancement on HSBC India Debit Card

Security enhancement on HSBC India Debit Card Security enhancement on HSBC India Debit Card A Secure Debit Card HSBC India Debit Cards are more secure and enabled with the Chip and PIN technology. In addition to this you can restrict usage of the

More information

IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority

IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority MEMBER IDENTITY PROTECTION Protect Your Identity Security of Personal Information is Our Top Priority Imagine this Unexpectedly, you get turned down for a loan, you get a call from a collection agency

More information

New Account Reference Guide

New Account Reference Guide New Account Reference Guide Welcome to BBVA Compass Merchant Services Thank you for choosing BBVA Compass as your Merchant Services provider. BBVA Compass is dedicated to providing your business with the

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity

More information

Unsupervised Profiling Methods for Fraud Detection

Unsupervised Profiling Methods for Fraud Detection Unsupervised Profiling Methods for Fraud Detection Richard J. Bolton and David J. Hand Department of Mathematics Imperial College London {r.bolton, d.j.hand}@ic.ac.uk Abstract Credit card fraud falls broadly

More information

(M.S.), INDIA. Keywords: Internet, SQL injection, Filters, Session tracking, E-commerce Security, Online shopping.

(M.S.), INDIA. Keywords: Internet, SQL injection, Filters, Session tracking, E-commerce Security, Online shopping. Securing Web Application from SQL Injection & Session Tracking 1 Pranjali Gondane, 2 Dinesh. S. Gawande, 3 R. D. Wagh, 4 S.B. Lanjewar, 5 S. Ugale 1 Lecturer, Department Computer Science & Engineering,

More information

Plastic Fraud. Debit Cards Debit cards, unlike credit cards, automatically withdraw funds from your account at the time you make a transaction.

Plastic Fraud. Debit Cards Debit cards, unlike credit cards, automatically withdraw funds from your account at the time you make a transaction. Getting a Handle on Debit and Credit Cards Plastic Fraud State-of-the-art thieves are concentrating on plastic cards. In the past, this type of fraud was not very common. Today, it is a big business for

More information

Identity Theft: It CAN Happen to You

Identity Theft: It CAN Happen to You Aging Well: Healthier, Happier and Less Hassled An Educational Series for Seniors and their Caregivers Identity Theft: It CAN Happen to You How would you feel if you were stopped for a traffic violation

More information

STATE EMPLOYEES CREDIT UNION VISA GIFT CARD TERMS AND CONDITIONS Effective September 2013

STATE EMPLOYEES CREDIT UNION VISA GIFT CARD TERMS AND CONDITIONS Effective September 2013 STATE EMPLOYEES CREDIT UNION VISA GIFT CARD TERMS AND CONDITIONS Effective September 2013 This Cardholder Agreement ( Agreement") sets forth the terms and conditions of your SECU Visa Gift Card ( Card

More information

How To Understand The Law Of Credit Card Usage

How To Understand The Law Of Credit Card Usage Glossary Note: All definitions listed in this section are also available in the Course Glossary. You can access the course Glossary online by clicking the Glossary link in the Materials section of the

More information

Why Data Security is Critical to Your Brand

Why Data Security is Critical to Your Brand Why Data Security is Critical to Your Brand Why security is critical to your brand Cybercriminals do not discriminate based on industry or business size. Security is expensive. At least, it is if you wait

More information

Best Practices for Internet Merchants

Best Practices for Internet Merchants Best Practices for Internet Merchants The following best practices, taken from various experts, are offered to help you avoid being victimized by Internet fraud. Experience suggests that there are certain

More information

Sending money abroad. Plain text guide

Sending money abroad. Plain text guide Sending money abroad Plain text guide Contents Introduction 2 Ways to make international payments 3 Commonly asked questions 5 What is the cost to me of sending money abroad? 5 What is the cost to the

More information

Prevention Is Better Than Cure EMV and PCI

Prevention Is Better Than Cure EMV and PCI Prevention Is Better Than Cure EMV and PCI Prevention Is Better Than Cure An independent view on the effectiveness of EMV and PCI in case of large-scale card compromise. Over the past couple of months,

More information

Guideline on Debit or Credit Cards Usage

Guideline on Debit or Credit Cards Usage CMSGu2012-04 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Debit or Credit Cards Usage National Computer Board Mauritius

More information

A multi-layered approach to payment card security.

A multi-layered approach to payment card security. A multi-layered approach to payment card security. CARD-NOT-PRESENT 1 A recent research study revealed that Visa cards are the most widely used payment method at Canadian websites, on the phone, or through

More information

Another Legal Guide from Bonallack & Bishop Solicitors

Another Legal Guide from Bonallack & Bishop Solicitors Another Legal Guide from Bonallack & Bishop Solicitors 80 PRACTICAL TIPS TO HELP COMBAT ALL YOU NEED TO KNOW INTRODUCTION... Over the last few years, identity theft has become one of the fastest growing

More information

IDENTITY THEFT RESOURCE KIT

IDENTITY THEFT RESOURCE KIT IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What

More information

Sample Credit Card Agreement

Sample Credit Card Agreement Credit Cards Sample Credit Card Agreement Please note this is a sample credit card agreement. It does not contain a credit limit, any interest rates, an APR or the Total Amount Payable as this information

More information

Payment Card Security

Payment Card Security Payment Card Security January 31, 2008 Kieran Norton, Senior Manager Security & Privacy Services, Deloitte & Touche LLP Focus of the Presentation PCI Overview Background Current Environment Key Considerations

More information

Clark Brands Payment Methods Manual. First Data Locations

Clark Brands Payment Methods Manual. First Data Locations Clark Brands Payment Methods Manual First Data Locations Table of Contents Introduction... 3 Valid Card Types... 3 Authorization Numbers, Merchant ID Numbers and Request for Copy Fax Numbers... 4 Other

More information

A+FCU GIFT CARD TERMS AND CONDITIONS

A+FCU GIFT CARD TERMS AND CONDITIONS PO Box 14867 Austin, TX 78761-4867 512-302-6800 800-252-8148 www.aplusfcu.org A+FCU GIFT CARD TERMS AND CONDITIONS These terms and conditions ( Agreement ) govern the issuance and use of the A+ FCU Gift

More information

Data Security, Fraud Prevention, and Cost Control. Mike Dorland, CPP Regional Marketing Representative Michigan Retailers Association

Data Security, Fraud Prevention, and Cost Control. Mike Dorland, CPP Regional Marketing Representative Michigan Retailers Association Data Security, Fraud Prevention, and Cost Control Mike Dorland, CPP Regional Marketing Representative Michigan Retailers Association Michigan Retailers Association Incorporated in 1940 Represent retail

More information

FAQ Credit Card (PIN & PAY)

FAQ Credit Card (PIN & PAY) FAQ Credit Card (PIN & PAY) Communication 1. When would communication go out to customers on the implementation? We are in the midst of preparing notification/letter to Cardhoder on the implementation

More information

EMV FAQs. Contact us at: CS@VancoPayments.com. Visit us online: VancoPayments.com

EMV FAQs. Contact us at: CS@VancoPayments.com. Visit us online: VancoPayments.com EMV FAQs Contact us at: CS@VancoPayments.com Visit us online: VancoPayments.com What are the benefits of EMV cards to merchants and consumers? What is EMV? The acronym EMV stands for an organization formed

More information

EDUCATION - TERMS 101

EDUCATION - TERMS 101 EDUCATION - TERMS 101 ACH (Automated Clearing House): A processing organization networked with others to exchange (clear and settle) electronic debit/credit transactions (no physical checks). ABA Routing

More information

FLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015 OVERVIEW TEACHER NOTES TEACHER NOTES

FLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015 OVERVIEW TEACHER NOTES TEACHER NOTES FLIP (Financial Literacy in Practice) February 2015 IDENTITY THEFT OVERVIEW This resource complements the material in Operation Financial Literacy. It has been written to address current issues which specifically

More information

USDA: Handling Fraud and Disputes. Deanna Hanson CPS Fraud Support Analyst

USDA: Handling Fraud and Disputes. Deanna Hanson CPS Fraud Support Analyst USDA: Handling Fraud and Disputes Deanna Hanson CPS Fraud Support Analyst Agenda What is fraud? Fraud trends Fraud case lifecycle Fraud and dispute process Tips to prevent fraud 2 Fraud Overview and Trends

More information

The Credit Card Fraud Detection Analysis With Neural Network Methods

The Credit Card Fraud Detection Analysis With Neural Network Methods The Credit Card Fraud Detection Analysis With Neural Network Methods 1 M.Jeevana Sujitha, 2 K. Rajini Kumari, 3 N.Anuragamayi 1,2,3 Dept. of CSE, A.S.R College of Engineering & Tech., Tetali, Tanuku, AP,

More information

How to Help Prevent Fraud

How to Help Prevent Fraud TD Canada Trust How to Help Prevent Fraud Merchant Services tips to help protect your business Fraud Awareness All credit cards issued in Canada are designed with special security features to help deter

More information

Fraud Detection in Credit Card Using DataMining Techniques Mr.P.Matheswaran 1,Mrs.E.Siva Sankari ME 2,Mr.R.Rajesh 3

Fraud Detection in Credit Card Using DataMining Techniques Mr.P.Matheswaran 1,Mrs.E.Siva Sankari ME 2,Mr.R.Rajesh 3 Fraud Detection in Credit Card Using DataMining Techniques Mr.P.Matheswaran 1,Mrs.E.Siva Sankari ME 2,Mr.R.Rajesh 3 1 P.G. Student, Department of CSE, Govt.College of Engineering, Thirunelveli, India.

More information