Bustout Fraud: Catch it fast with advanced analytics



Similar documents
OPERA SOLUTIONS CAPABILITIES. ACH and Wire Fraud: advanced anomaly detection to find and stop costly attacks

OPERA SOLUTIONS CAPABILITIES. Automotive Solutions: applying advanced analytics throughout the automotive life cycle

Hospital Billing Optimizer: Advanced Analytics Solution to Minimize Hospital Systems Revenue Leakage

Supply Chain: improving performance in pricing, planning, and sourcing

Signal Hub for Wealth Management

Profit from Big Data flow. Hospital Revenue Leakage: Minimizing missing charges in hospital systems

The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age

Fraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper

Bust-out fraud. Knowing what to look for can safeguard the bottom line. An Experian white paper

OPERA SOLUTIONS CAPABILITIES. Collections: reducing charge-offs with advanced analytics

Hospital Staffing Optimizer. Forecasting patient demand for better hospital staffing. Profit from Big Data flow

NVALUE BEYOND THE NUMBERS

David Fish. Senior Analyst; Fraud, Risk & Analytics Advisory Service dfish@mercatoradvisorygroup.com

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics

Fraud detection in newly opened accounts. Connecting data helps predict identity theft

The Six Critical Considerations of Social Media Threat Intelligence

SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF

on behalf of the National Retail Federation before the

Busting Bust-Out Fraud Five steps for combatting bust-out business fraud

IDENTITY THEFT. Public Advisory. This Public Advisory is a publication of the Nassau County Police Department.

WHITE PAPER. Internet Gambling Sites. Expose Fraud Rings and Stop Repeat Offenders with Device Reputation

Preventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations

Fraud from the Inside: Effectively Detecting and Preventing Employee Fraud. Phil Collins and Jacob Gutting FIS Risk, Fraud and Compliance Solutions

About Credit. Financial Literacy

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E

Key Factors for Payers in Fraud and Abuse Prevention. Protect against fraud and abuse with a multi-layered approach to claims management.

Preventing Health Care Fraud

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

OIG Fraud Alert Phishing

How to Deal With Telemarketing Scams

Identity Theft Assistance: Information for Recovering Your Good Name

Client Education. Learn About Identity Theft

Facts. Your Credit Card Rights

I know what is identity theft but how do I know if mine has been stolen?

Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud

Health Insurance Fraud Prevention. Using technology to prevent and detect billing and claims fraud

Citi Identity Theft Solutions

A Unique Perspective into the World of Identity Fraud

What You Should Know About Your Credit Report

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

PREDICTIVE ANALYTICS IN FRAUD

Now is the time for a fresh approach to detecting fraud

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules

An effective approach to preventing application fraud. Experian Fraud Analytics

Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution

Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions

CashShield. Fraud Protection Solution. Singapore Switzerland Germany China United States. Fraud Protection & Safe Payment Solutions

The Facets of Fraud. A layered approach to fraud prevention

The elderly are often specifically targeted for identity theft. Identity

Statement of. Mark Nelsen. Senior Vice President, Risk Products and Business Intelligence. Visa Inc. House Ways & Means Subcommittee.

Child Identity Fraud - Current Trends and Advantages

DVD Companion Learning Guide

Prevention is Better than Cure: Protect Your Medical Identity

EL/Civics Lesson Plan

CORPORATE IDENTITY FRAUD: A PRIMER

CyberArk Privileged Threat Analytics. Solution Brief

Why Data Security is Critical to Your Brand

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

MONEY MISTAKES. Consolidated Credit 5701 West Sunrise Boulevard Fort Lauderdale, FL

Synthetic ID Fraud. Pervasive, Misunderstood, and Unknown. Monday, April 20th 10:15-11:15 AM

Internet Insurance Fraud Rings

Life Settlement Financial, LLC San Rafael, California. Anti-Money Laundering Policy January 1, 2009

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology

White Paper. Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper

Warranty Fraud Detection & Prevention

Internet Advertising: Is Your Browser Putting You at Risk?

Fight identity-theft tax fraud with integrated layers of authentication

The Changing World of Big Data. And How to Profit from It

IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority

Information to Protect Our Customers From Identity Theft

The Long Con: An Analysis of Synthetic Identities

Driving profitability and minimizing risk through portfolio management

Mass Marketing Fraud Affecting Canadian Businesses

Best Practices in Account Takeover

Identity Theft and Strategies for Crime Prevention

Smarter Analytics Leadership Summit Content Review

WHITE PAPER. Credit Issuers. Stop Application Fraud at the Source With Device Reputation

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

Online Gambling Company Reduces Credit Card Fraud by a Factor of Ten Using iovation ReputationManager

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG

Fraud Analytics Monitor, Detect and Mitigate Risks. White Paper FRAUD ANALYTICS

Billing for services or medical equipment not received or medically unnecessary

WORKSHEETS 20B-IC (08-12)

FRAUD DETECTION AND PREVENTION: A DATA ANALYTICS APPROACH BY SESHIKA FERNANDO TECHNICAL LEAD, WSO2

Handling a Crime Committed by Someone You Know

When a parent steals your identity

Strategies for businesses to stop fraud without slowing commerce

Combating Corporate ID Theft & Fraud

Identity Theft Repair Kit

PNC Financial Education FINANCIAL OPS. Banking Solutions for Military Personnel. Credit: Self study Guide

FICO Falcon Fraud Manager for Retail Banking


Identity Theft: Your Good Name Gone Bad!

Technology Advances that Help Stop Tax Refund Fraud and EITC Abuse

Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the National Community Reinvestment Coalition. Washington, D.C.

Child Identity Theft Education Kit

Your Credit Score What It Means to You as a Prospective Home Buyer

Transcription:

Bustout Fraud: Catch it fast with advanced analytics

2 The longer it takes to identify bustout fraud, the more you lose. That s where we come in Tough times are a challenge in more ways than one. Lenders, for instance, usually see increases in bustout fraud, also often referred to as first party fraud. Perpetrators apply for credit using many elements of their real identities, so their applications are not caught by traditional application fraud models. In addition, there are multiple, complex patterns by which bustouts develop after accounts are booked. Part of perpetrators bustout strategy is to appear as legitimate consumers in order to increase their credit limits over time. They typically make purchases and timely payments during the early life of their accounts, and avoid scrutiny by acting like model customers. As a result, even the most sophisticated lenders often struggle to understand the true size of their first-party fraud problem, as many of their losses are masked as collections charge-offs. That s why we created the Opera Solutions Bustout Application, a unique, advanced analytic approach that rides on our Credit & Risk Signal Hub to help lenders understand the actual size of their bustout fraud problem and implement new analytic tools to identify and prevent it earlier than ever before possible. And it s already realizing significant savings: we re delivering $4-$8MM a year for each $10B in receivables for issuers that already have a bureau-based bustout scoring system in place, and even more for those without any scoring system. The problem: bad actors who look like model citizens In many ways, bustout fraud is a crime of opportunity. Sometimes, consumers in dire financial straits desperately apply for credit while their profiles are still adequate to get the accounts approved. In other cases, something far more nefarious is at work: organized crime rings, based here and abroad, recruit consumers to perpetrate this fraud. Whatever the impetus, these consumers typically make modifications or embellishments to their application information, creating a fragmented file at the credit bureaus and allowing them to claim they have been victims of identity theft once their accounts go delinquent and collectors begin to call. Opera Solutions Credit & Risk Signal Hub technologies have the capability to identify the Signals these activities create, quickly and accurately differentiating between the commonplace and the criminal.

3 Find more bustout, earlier Savings achieved by detecting bustout earlier 50-55% 25-30% New cases identified using behavioral signatures 10-55% 100% New cases identified using link analysis The sophisticated algorithms of our Credit & Risk Signal Hub technologies pick up the faint Signals of high-risk behavioral signatures for each of the bustout patterns, and do so earlier enabling lenders to take swift action on more bustout activity, and thereby prevent many millions of dollars in losses. Currently Detected Currently Undetected Detected Through Linking Total There are three typical patterns to bustout cases: Rapid, Collusive Merchant, and Long Play. In each, fraudsters spend and pay normally for the first few months, seeking to appear as a typical consumer. Then the patterns change. Rapid Fraudsters rapidly increase spending through purchases, balance transfers, and/or convenience checks. A large payment is made, which frees up even more opportunity to buy. Collusive Merchant Large purchases are made at a single (often newer) merchant. Then payments cease. Long Play Spending and payments increase over many months. Credit limit increases are requested and granted. The customer makes several payments by check and continues to spend up to his or her full credit limit. Then, payments bounce. The solution: better and earlier identification through advanced analytics Each of these schemes has a unique behavioral signature, but each is hard to detect before the damage is done. Indeed, many lenders don t even realize they have been victimized; up to 50% of all bustout cases currently go completely undetected. Using advanced analytics, however, the Opera Solutions Bustout Application offers a far more comprehensive and effective solution to identify nefarious activity and stop bustout in its tracks.

4 We apply an advanced, highly-tuned ensemble model that brings together some of the world s most advanced pattern and anomaly detection algorithms against your daily flow of transaction activity, payment activity, and non-monetary transactions. Our approach allows us to pick up the earliest, subtlest signs of bustout, while defining dozens of metrics to serve as objective criteria for taking action and giving lenders the ability to accurately and quickly restrict future authorizations, or suspend suspect accounts. Opera Solutions Bustout Application finds the Signals that tell you what s really going on with your accounts. Purchase Patterns Payment Patterns Shut off Behavior Over Time Purchase Payment Credit line Increase Request Alert Bustout and credit abuse savings Earlier Detection (Days) 7 6 5 4 3 2 1 Reducing the time to detection has major impact on loss avoidance for lenders. For example, Opera Solutions helped one client save over $60MM annually by identifying bustout cases seven days earlier. 0 10 20 30 40 50 60 Dollars (Millions) When it comes to bustouts and other frauds, make sure you re on the right side of Gotcha! For more information about the Opera Solutions Bustout Application, and to learn how our Credit & Risk Signal Hub technologies can help you combat other frauds, please contact us at CreditandRiskServices@operasolutions.com.

ABOUT OPERA SOLUTIONS, LLC: Opera Solutions drives productivity for enterprise and government through advanced Big Data predictive analytics that create machine-generated directed actions to significantly improve front-line decisions. Its Signal Hub technologies provide organizations an enterprise-wide capability to continually extract and put to use newly available predictive information from outside their firewalls, creating a revolutionary pathway to productivity, profit, and advantage. With 230+ data scientists among its 700 employees, the company is an internationally recognized leader in machine learning. It serves enterprises in Financial Services, Healthcare, Government, Supply Chain, Marketing, and other sectors, with offices in North America, Europe, India, and China. www.operasolutions.com New York Jersey City Boston Washington, DC San Diego London Shanghai New Delhi