PREDVIĐANJE PRIJEVARA: OPIS PROBLEMA



Similar documents
FREQUENTLY ASKED QUESTIONS - CHARGEBACKS

The need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal

How To Spot & Prevent Fraudulent Credit Card Activity

Fraud Alert Management The Power of an Integrated Approach. Eric Kraus, Sr. Director Fraud Product Management

Your Single Source. for credit, debit and pre-paid services. Fraud Risk and Mitigation

Merchant Business Solutions. Protecting business against credit card fraud.

EMV EMV TABLE OF CONTENTS

Dates VISA MasterCard Discover American Express. support EMV. International ATM liability shift 2

A Guide to EMV. Version 1.0 May Copyright 2011 EMVCo, LLC. All rights reserved.

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.

Fall Conference November 19 21, 2013 Merchant Card Processing Overview

Risk Mitigation in Travel. New Trends to Reduce Fraud and Increase Revenue

PCI DSS Payment Card Industry Data Security Standard. Merchant compliance guidelines for level 4 merchants

Visa global Compromised Account

Modern Fraud Prevention from a Bank s Point of View

CREDIT CARD FRAUD PROTECTION. how to protect your business and your customers

EMV: Integrated Circuit Card Specifications for Payment Systems

EMV's Role in reducing Payment Risks: a Multi-Layered Approach

USDA: Handling Fraud and Disputes. Deanna Hanson CPS Fraud Support Analyst

RSA Adaptive Authentication For ecommerce

Mitigating Fraud Risk Through Card Data Verification

EMV and Small Merchants:

Fraud Prevention and Program Security Gord Jamieson Director Risk Management & Security Visa Canada Association

BinBase.com REPORT: credit card fraud

SOLUTION BRIEF PAYMENT SECURITY. How do I Balance Robust Security with a Frictionless Online Shopping Experience for Cardholders?

Merchant Services. How to help protect your business

Understand the Business Impact of EMV Chip Cards

M/Chip Functional Architecture for Debit and Credit

AccessOnline Merchant Authorization Control Maintenance

Changing Consumer Purchasing Patterns. John Mayleben, CPP SVP, Technology and Product Development Michigan Retailers Association

Card Not Present Fraud Webinar Transcript

Fraud Minimisation Guide ANZ Merchant Business Solutions

Global Airline Merchant Best Practices Guide

How To Understand The Law Of Credit Card Usage

TRANSAXpay Online Safer ecommerce & MOTO Payments FIS RETAIL PAYMENTS

Merchant e-solutions Payment Gateway Back Office User Guide. Merchant e-solutions January 2011 Version 2.5

What Merchants Need to Know About EMV

PayPass M/Chip Requirements. 10 April 2014

EMV in Hotels Observations and Considerations

RETHINKING CARDS BUSINESS. Erick Ho, Head of Payment Services, SunGard 17 September Break through.

Risk & Fraud Management Solutions

Agent Registration. Program Guidelines. (For use in Asia Pacific, Central Europe, Middle East and Africa)

Prevention Is Better Than Cure EMV and PCI

Preparing for EMV chip card acceptance

Franchise Data Compromise Trends and Cardholder. December, 2010

MySagePay. User Manual. Page 1 of 48

PayDollar. Merchant User Guide

EMV and Restaurants: What you need to know. Mike English. October Executive Director, Product Development Heartland Payment Systems

PCI and EMV Compliance Checkup

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

Blackbaud Merchant Services Web Portal Guide

6. REPONSE CODE DEFINITION

Protecting the POS Answers to Your Frequently Asked Questions

Merchant Guide to the Visa Address Verification Service

Fraud Prevention Guide

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER

FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper

US Bank Access Online. Glossary User Guide

EMV FAQs. Contact us at: Visit us online: VancoPayments.com

New Account Reference Guide

Dates Visa MasterCard Discover American Express. Acquirers, subprocessors. support EMV International ATM liability shift 2

General Industry terms

Cardholder Authentication Guide. Version 4.3 August 2013 Business Gateway

Credit/Debit Card Processing Requirements and Best Practices. Adele Honeyman Oregon State Treasury Training Specialist

Payment Card Industry Data Security Standard PCI DSS

Prepaid Fraud Mitigation: Leveraging the Processing Relationship to Prevent Fraud Throughout the Prepaid Lifecycle

Payments Transformation - EMV comes to the US

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the

Merchant Operating Guide

Fraud Prevention Issuer s Best Practice Guide

EMV Frequently Asked Questions for Merchants May, 2014

PayPoint.net Gateway Guide to Identifying Fraud Risks

EMV ADOPTION AND ITS IMPACT ON FRAUD MANAGEMENT WORLDWIDE

EMV : Frequently Asked Questions for Merchants

Chargebacks & Retrievals. Expand Your Knowledge

smartdata.gen2 Corporate Company Standard Reports Guide July 2012

Credit Card Processing Glossary

Securing Internet Payments. The current regulatory state of play

Chargeback Reason Code List - U.S.

EMV and Restaurants What you need to know! November 19, 2014

Data Security Basics for Small Merchants

Chip Card (EMV ) CAL-Card FAQs

Transcription:

Fakultet elektrotehnike i računarstva Poslijediplomski znanstveni studij - Računarstvo KVANTITATIVNE METODE UPRAVLJANJA RIZICIMA - 3. dio PREDVIĐANJE PRIJEVARA: OPIS PROBLEMA dr Zoran Bohaček

Fraud types in Europe as Issuer END 1998, volumes A/C Take Over 0,1% Multiple Imprint 2% MO/TO 22% Lost14% Other 1% Counterfeit 29% NRI 6% Fraud App.3% Stolen 28% Podaci: Europay

Fraud types in Europe as Acquirer END 1998, volumes A/C Take Over 0,3% Multiple Imprint 1% MO/TO 17% Lost 16% Other 3% Counterfeit 20% Fraud App. 3% NRI 6% Stolen 34% Podaci: Europay

Fraud trends in Europe % vs. turnover 111 US m$ Issuers 105,8 US m$ Acquirers 91% authorized 0.0064% Lost & Stolen 40% Counterfeit MO/TO 25% 20% 98

Fraud types Different fraud types: Lost Stolen Counterfeit (Account generated, Skimming) MO/TO... Each type of fraud can have several patterns Each fraud pattern will determine the most adequate fraud prediction tool configuration

Example: Lost & Stolen

Lost & Stolen fraud pattern Tx Amount High spending until credit limit reached Below FL until BL distributed Card is sold to another fraudster Spending: Risky MCCs High avg value Particular cities Floor limit Time C/h notification Black List distribution Liability switch +/- 24 hours

Lost & Stolen fraud prediction Tx Amount Detection Time Span (<24h) Authorized transactions Different c/h behaviour Short detection time, Different c/h patterns Neural net. on auth data RBS on auth data Credit limit reached Floor limit Time C/h notification Black List distribution

Prevention: Lost & Stolen fraud prediction Issuer: Call center, Account blocking, Black list reporting Acquirer: On-line authorization, Black list distribution Prediction (Issuer): a) Neural network based on authorization data b) RBS based on authorization data and past known patterns: Risky MCCs, different city than usual, amounts above average, high velocity, etc.

Lost & Stolen fraud detection Tx Amount High spending until credit limit reached C/h notification On-line transactions stopped Off-line transactions stopped Floor limit Time Detection, Call c/h Block card Black List Distribution

Example: Counterfeit

Counterfeit fraud pattern (Account generated cards) Tx Amount Card nr generated no CVC, wrong exp.date High spending until credit limit Below FL until BL distributed 1$ txs to test card nr; in sequence card nrs Spending: Risky MCCs High avg value Part. countries Floor limit Time +/- 4-5 business days Issuer detection + BL distribution

Counterfeit fraud pattern (Skimmed cards) Tx Amount Card compromised High spending until credit limit reached Spending: Risky MCCs High avg value Part. countries Floor limit Time C/h notification + BL after monthly statement +/- 30-60 business days

Counterfeit fraud prediction Prevention (Account generated): Issuer: Prediction: Authorization system to react to and report wrong CVC, wrong exp. Date Positive files Detection of 1$ txs a) Neural network based on auth or clearing data b) RBS based on: Auth. or clearing data Past known patterns (MCC, value, merchant country) Transaction velocity (BIN generated) Transactions in different cities/countries (skimming)

Counterfeit fraud detection (Skimmed cards) Tx Amount Card compromised High spending until credit limit reached C/h notification + BL after monthly statement On-line transactions stopped Off-line transactions stopped Floor limit Time Detection, Call c/h Block card Black List Distribution +/- 30-60 business days

Which tools to use? Conclusions: Need to use a combination of fraud prevention and prediction tools Fraud patterns are many and evolve Selection of tools will depend on your fraud patterns, your operational environment and your available resources

Two profiles: Pro-active: Fraud patterns and trends continued analysis Definition and configuration of fraud prevention and prediction tools On-going monitoring of fraud reports Re-active: Reports analysis Cardholder contact (call center) Investigation, liaison with other bodies Fraud report Which alternatives?

Prediction environment life cycle ANALYZE Operational environment Fraud patterns Fraud trends Resources OPERATE Analyze reports Investigate Contact c/h Case creation Report fraud BUILD TOOLS Select Configure Test

Operating a fraud prediction environment Systems Auth System Clearing System Customer Care Tx Data Black List Masterfile Fraud Prediction Systems Input Reports Fraud prevention Monitoring reports Lost Stolen NR Fraud prediction reports / alerts! NEWS Fraud Department

Operating a fraud prediction environment Systems Input Reports Fraud Department Daily Monitoring Configuration review Create case Contact cardholder Block card, BIN, merchant Investigate Output Fraud Reports Black List, Chargeback, SAFE, MATCH

Conclusions Fraud prediction is very linked to prevention Fraud prediction tools need to be adapted to the context (fraud, operations, resources) An effective fraud prediction environment, will require analysis, monitoring and investigation resources