Credit card fraud: Difference between revisions
Thylacine24 (talk | contribs) |
|||
Line 1: | Line 1: | ||
{{Short description|Financial crime}} |
|||
{{not verified}} |
|||
{{About|all types of credit card fraud|organised trade and laundering of credit card information|Carding (fraud)}} |
|||
{{cleanup-date|February 2006}} |
|||
{{Use dmy dates|date=September 2018}} |
|||
[[File:NS skimapparaat.jpg|thumb|right|200px|A fake [[automated teller]] slot used for "[[Skimmer (device)|skimming]]"]] |
|||
'''Credit card fraud''' is an inclusive term for [[fraud]] committed using a [[payment card]], such as a [[credit card]] or [[debit card]].<ref>{{cite web|url=http://www.consumer-action.org/downloads/english/Chase_CC_Fraud_Leaders.pdf |title= Credit Card Fraud - Consumer Action| publisher = [[Consumer Action]]|access-date=2017-11-28}}</ref> The purpose may be to obtain goods or services or to make payment to another account, which is controlled by a criminal. The [[Payment Card Industry Data Security Standard]] (PCI DSS) is the data security standard created to help financial institutions process card payments securely and reduce card fraud.<ref>{{Cite web|title=Official PCI Security Standards Council Site - Verify PCI Compliance, Download Data Security and Credit Card Security Standards|url=https://www.pcisecuritystandards.org/pci_security/|access-date=2021-10-01|website=www.pcisecuritystandards.org}}</ref> |
|||
Credit card fraud can be authorised, where the genuine customer themselves processes payment to another account which is controlled by a criminal, or unauthorised, where the account holder does not provide authorisation for the payment to proceed and the transaction is carried out by a third party. In 2018, unauthorised financial fraud losses across payment cards and remote banking totalled £844.8 million in the United Kingdom. Whereas banks and card companies prevented £1.66 billion in unauthorised fraud in 2018. That is the equivalent to £2 in every £3 of attempted fraud being stopped.<ref>{{Cite journal|title=FRAUD THE FACTS 2019 - The definitive overview of payment industry fraud|url=https://www.ukfinance.org.uk/system/files/Fraud%20The%20Facts%202019%20-%20FINAL%20ONLINE.pdf|journal=UK Finance}}</ref> |
|||
'''Credit card fraud''' is a kind of [[fraud]] where a [[merchant]] (business, service provider, seller, etc.) is "tricked" into releasing merchandise or rendering services, believing that a [[credit card]] account will provide [[payment]] for goods/services. The merchant later learns that they will not be paid, or the payment they received will be reclaimed by the card's issuing [[bank]]. |
|||
Credit card fraud can occur when unauthorized users gain access to an individual's credit card information in order to make purchases, other transactions, or open new accounts. A few examples of credit card fraud include account takeover fraud, new account fraud, cloned cards, and cards-not-present schemes. This unauthorized access occurs through phishing, skimming, and information sharing by a user, oftentimes unknowingly. However, this type of fraud can be detected through means of artificial intelligence and machine learning as well as prevented by issuers, institutions, and individual cardholders. According to a 2021 annual report, about 50% of all Americans have experienced a fraudulent charge on their credit or debit cards, and more than one in three credit or debit card holders have experienced fraud multiple times. This amounts to 127 million people in the US that have been victims of credit card theft at least once. |
|||
Typically, the fraudster causes a credit card of another person to be charged for a purchase. Today, half of all credit card fraud is conducted online, meaning that the fraudsters make online purchases with the credit card details of other people. |
|||
Regulators, card providers and banks take considerable time and effort to collaborate with investigators worldwide with the goal of ensuring fraudsters are not successful. Cardholders' money is usually protected from scammers with regulations that make the card provider and bank accountable. The technology and security measures behind credit cards are continuously advancing, adding barriers for fraudsters attempting to steal money.<ref>{{Cite web|url=https://www.uswitch.com/credit-cards/guides/credit-card-fraud-the-biggest-card-frauds-in-history/|title=Credit card fraud: the biggest card frauds in history|website=uSwitch|language=en|access-date=2019-12-29}}</ref> |
|||
==Types of Fraud== |
|||
==Means of payment card fraud== |
|||
{{ Expandsection }} |
|||
There are two kinds of card fraud: card-present fraud (not so common nowadays) and [[Card not present transaction|card-not-present fraud]] (more common). The compromise can occur in a number of ways and can usually occur without the knowledge of the cardholder. The internet has made database security lapses particularly costly, in some cases, millions of accounts have been compromised.<ref>{{cite web|title=Court filings double estimate of TJX breach |year=2007 |url=http://www.securityfocus.com/news/11493}}</ref> |
|||
===Stolen Card Fraud=== |
|||
When a card holder loses or has their credit card stolen, it is possible for the thief to make unauthorized purchases on that card up until the card is cancelled. Businesses that accept credit cards are required to check the ID of the card holder against the card, but this is rarely what actually happens. A thief can potentially purchase thousands of dollars in merchandise or services before the card holder or the bank realize that the card is in the wrong hands. Self serve payment systems such as gas stations are also highly prone to accepting a stolen credit card, as there is no verification of the card holder's identity. |
|||
Stolen cards can be reported quickly by cardholders, but a compromised account's details may be held by a fraudster for months before any theft, making it difficult to identify the source of the compromise. The cardholder may not discover fraudulent use until receiving a statement. Cardholders can mitigate this fraud risk by checking their account frequently to ensure there are not any suspicious or unknown transactions.<ref>{{Cite web|url=https://www.thebalance.com/ways-avoid-credit-card-fraud-960797|title=9 Ways to Keep Credit Card Fraud From Happening to You|last=Irby|first=LaToya|website=The Balance|language=en|access-date=2019-12-29|archive-url=https://web.archive.org/web/20201130235346/https://www.thebalance.com/ways-avoid-credit-card-fraud-960797|archive-date=30 November 2020}}</ref> |
|||
===Credit Card Mail Order Fraud=== |
|||
Using a stolen credit card number, or computer generated card number, a thief will order merchandise from a website and have it shipped to a fake or forwarding address. The thief then takes the merchandise and disappears with it. When the real cardholder realized that they did not make the purchase, they call their credit card issuer and request a chargeback. The merchant then loses the money from the transaction, in addition to the merchandise that they do not recover. This is the most common type of credit card fraud. |
|||
When a credit card is lost or stolen, it may be used for illegal purchases until the holder notifies the issuing bank and the bank puts a block on the account. Most banks have free 24-hour telephone numbers to encourage prompt reporting. Still, it is possible for a thief to make unauthorized purchases on a card before the card is cancelled. |
|||
===Mail Non-Receipt Fraud=== |
|||
Mail non-receipt fraud occurs when a thief intercepts a replacement card sent to the legitimate cardholder and uses it. However, many [[bank]]s increasingly send out ''inactive'' cards that cannot be used until the legitimate account holder confirms his or her identity to the bank using the person's [[Social Security number]], home address, mother's [[maiden name]], the number on the card and where the person got it. |
|||
== Prevention of payment card fraud == |
|||
===Chargeback Fraud=== |
|||
Card information is stored in a number of formats. Card numbers – formally the [[Primary Account Number]] (PAN) – are often embossed or imprinted on the card, and a [[magnetic stripe]] on the back contains the data in a machine-readable format. Fields can vary, but the most common include the Name of the cardholder; Card number; Expiration date; and Verification [[Card Security Code|CVV code]]. |
|||
Chargeback fraud occurs when a legitimate cardholder pays for a good or service, but then claims never to have authorized the transaction, or that the good or service was never received. This is also known as first-party fraud. |
|||
In Europe and Canada, most cards are equipped with an [[EMV]] chip which requires a 4 to 6 digit PIN to be entered into the merchant's terminal before payment will be authorized. However, a PIN is not required for online transactions. In some European countries, buyers using a card without a chip may be asked for photo ID at the [[point of sale]]. |
|||
In some countries, a credit card holder can make a [[contactless payment]] for goods or services by tapping their card against a [[RFID]] or [[Near field communication|NFC]] reader without the need for a PIN or signature if the cost falls under a pre-determined limit. However, a stolen credit or debit card could be used for a number of smaller transactions prior to the fraudulent activity being flagged. |
|||
Card issuers maintain several countermeasures, including software that can estimate the probability of fraud. For example, a large transaction occurring a great distance from the cardholder's home might seem suspicious. The merchant may be instructed to call the card issuer for verification or to decline the transaction, or even to hold the card and refuse to return it to the customer.<ref>{{Cite web|url=https://www.barclaycard.co.uk/business/accepting-payments/learn-about-taking-payments/beginners-guide-preventing-fraud|title=Preventing payment fraud {{!}} Barclaycard Business|website=www.barclaycard.co.uk|access-date=2019-12-29}}</ref> |
|||
== Detecting credit card fraud using technology == |
|||
=== Artificial and Computational intelligence === |
|||
Given the immense difficulty of detecting credit card fraud, artificial and computational intelligence was developed in order to make machines attempt tasks in which humans are already doing well. Computation intelligence is simply a subset of AI enabling intelligence in a changing environment. Due to advances in both artificial and computational intelligence, the most commonly used and suggested ways to detect credit card fraud are rule induction techniques, decision trees, neural networks, Support Vector Machines, logistic regression, and meta heuristics. There are many different approaches that may be used to detect credit card fraud. For example, some "suggest a framework which can be applied real time where first an outlier analysis is made separately for each customer using self-organizing maps and then a predictive algorithm is utilized to classify the abnormal looking transactions." Some problems that arise when detecting credit card fraud through computational intelligence is the idea of misclassifications such as false negatives/positives, as well as detecting fraud on a credit card having a larger available limit is much more prominent than detecting a fraud with a smaller available limit. One algorithm that helps detect these sorts of issues is determined as the MBO Algorithm. This is a search technique that brings upon improvement by its "neighbor solutions". Another algorithm that assists with these issues is the GASS algorithm. In GASS, it is a hybrid of genetic algorithms and a scatter search.<ref>{{Cite web |title=Advances in Computational Intelligence {{!}} Volume 2, issue 2 |url=https://link.springer.com/journal/43674/volumes-and-issues/2-2 |access-date=2022-04-28 |website=SpringerLink |language=en}}</ref> |
|||
=== Machine learning === |
|||
Touching a little more on the difficulties of credit card fraud detection, even with more advances in learning and technology every day, companies refuse to share their algorithms and techniques to outsiders. Additionally, fraud transactions are only about 0.01–0.05% of daily transactions, making it even more difficult to spot. Machine learning is similar to artificial intelligence where it is a sub field of AI where statistics is a subdivision of mathematics. With regards to machine learning, the goal is to find a model that yields that highest level without overfitting at the same time. Overfitting means that the computer system memorized the data and if a new transaction differs in the training set in any way, it will most likely be misclassified, leading to an irritated cardholder or a victim of fraud that was not detected. The most popular programming used in machine learning are Python, R, and MatLab. At the same time, SAS is becoming an increasing competitor as well. Through these programs, the easiest method used in this industry is the Support Vector Machine. R has a package with the SVM function already programmed into it. When Support Vector Machines are employed, it is an efficient way to extract data. SVM is considered active research and successfully solves classification issues as well. Playing a major role in machine learning, it has "excellent generalization performance in a wide range of learning problems, such as handwritten digit recognition, classification of web pages and face detection." SVM is also a successful method because it lowers the possibility of overfitting and dimensionality.<ref>{{Cite web |last=Woolston |first=Sarah |date=2017 |title=Machine Learning Methods for Credit Card Fraud Detection |url=https://www.proquest.com/docview/1954696965 |website=Proquest|id={{ProQuest|1954696965}} }}</ref> |
|||
== Types of payment card fraud == |
|||
=== Application fraud === |
|||
Application fraud takes place when a person uses stolen or fake documents to open an account in another person's name. Criminals may steal or fake documents such as utility bills and bank statements to build up a personal profile. When an account is opened using fake or stolen documents, the fraudster could then withdraw cash or obtain credit in the victim's name.<ref>{{Cite web|url=https://www.actionfraud.police.uk/a-z-of-fraud/application-fraud|title=Application fraud|website=Action Fraud|language=en-GB|access-date=2019-12-29}}</ref> |
|||
Application fraud can also occur using a synthetic identity which is similar to the fake documents mentioned above. A synthetic identity is personal information gathered from many different identities to create one fake identity.<ref>{{Cite web |title=Watching Out for New Account Fraud |url=https://www.chargebackgurus.com/blog/new-account-fraud |access-date=2022-05-05 |website=www.chargebackgurus.com |date=14 August 2021 |language=en-us}}</ref> Once the identity and the account is established, the fraudster has a few different options to take advantage of the bank. They can maximize their credit card spending by spending as much money as possible on their new credit card. Many fraudsters will use the new credit card to purchase items that have a high resale value so they can turn it into cash.<ref>{{Cite journal |last1=Han |first1=Yaodong |last2=Yao |first2=Shun |last3=Wen |first3=Tie |last4=Tian |first4=Zhenyu |last5=Wang |first5=Changyu |last6=Gu |first6=Zheyuan |date=December 2020 |title=Detection and Analysis of Credit Card Application Fraud Using Machine Learning Algorithms |journal=Journal of Physics: Conference Series |language=en |volume=1693 |issue=1 |pages=012064 |doi=10.1088/1742-6596/1693/1/012064 |issn=1742-6596|doi-access=free |bibcode=2020JPhCS1693a2064H }}</ref> |
|||
===Account takeover=== |
|||
An account takeover refers to the act by which fraudsters will attempt to assume control of a customer's account (i.e. credit cards, email, banks, SIM card and more). Control at the account level offers high returns for fraudsters. According to Forrester, risk-based authentication (RBA) plays a key role in risk mitigation.<ref>{{Cite web|url=https://www.threatmetrix.com/digital-identity-blog/risk-based-authentication/forrester-wave-report-threatmetrix-revolution-risk-based-user-authentication/|title=Forrester Wave Report: ThreatMetrix and the Revolution in Risk-Based User Authentication|last=Pandey|first=Vanita|date=2017-07-19|website=ThreatMatrix|access-date=2017-11-28}}</ref> |
|||
A fraudster uses parts of the victim's identity such as an email address to gain access to financial accounts. This individual then intercepts communication about the account to keep the victim blind to any threats. Victims are often the first to detect account takeover when they discover charges on monthly statements they did not authorize or multiple questionable withdrawals.<ref>{{Cite web|url=https://www.thebalance.com/what-is-account-takeover-fraud-1947476|title=What Is Account Takeover Fraud?|last=Siciliano|first=Robert|date=2016-10-27|website=the balance|access-date=2017-11-28|archive-date=12 September 2017|archive-url=https://web.archive.org/web/20170912103303/https://www.thebalance.com/what-is-account-takeover-fraud-1947476|url-status=dead}}</ref> There has been an increase in the number of account takeovers since the adoption of EMV technology, which makes it more difficult for fraudsters to clone physical credit cards.<ref>{{Cite web|url=https://usa.visa.com/dam/VCOM/global/visa-everywhere/documents/chip-technology-infographic-jun16.pdf|title=Visa U.S. Chip Update: June 2016 Steady progress in chip adoption|date=2016-06-01|website=VISA|access-date=2017-11-28}}</ref> |
|||
Among some of the most common methods by which a fraudster will commit an account, takeover includes proxy-based "checker" one-click apps, brute-force botnet attacks, phishing,<ref>[https://www.bbc.com/worklife/article/20170711-credit-card-fraud-what-you-need-to-know Credit card fraud: What you need to know]</ref> and malware. Other methods include dumpster diving to find personal information in discarded mail, and outright buying lists of 'Fullz', a slang term for full packages of identifying information sold on the black market.<ref>{{Cite web|url=http://blog.credit.com/2015/09/what-hackers-want-more-than-your-credit-card-number-124442/|title=What Hackers Want More Than Your Credit Card Number {{!}} Credit.com|date=2015-09-01|website=Credit.com|language=en-US|access-date=2016-05-16|archive-url=https://web.archive.org/web/20160530210308/http://blog.credit.com/2015/09/what-hackers-want-more-than-your-credit-card-number-124442/|archive-date=30 May 2016|url-status=dead}}</ref> |
|||
Once logged in, fraudsters have access to the account and can make purchases and withdraw money from bank accounts.<ref>{{Cite web |last=By |date=2021-08-21 |title=What Is Account Takeover Fraud and How to Prevent It |url=https://www.experian.com/blogs/ask-experian/what-is-account-takeover-fraud-how-to-prevent-it/ |access-date=2022-05-05 |website=www.experian.com |language=en-US}}</ref> They have access to any information that is tied to the account, they can steal credit card numbers along with social security numbers. They can change the passwords to prevent the victim from accessing their account. Cybercriminals have the opportunity to open other accounts, utilize rewards and benefits from the account, and sell this information to other hackers.<ref>{{Cite book |last1=Kawase |first1=Ricardo |last2=Diana |first2=Francesca |last3=Czeladka |first3=Mateusz |last4=Schüler |first4=Markus |last5=Faust |first5=Manuela |chapter=Internet Fraud: The Case of Account Takeover in Online Marketplace |date=2019-09-12 |title=Proceedings of the 30th ACM Conference on Hypertext and Social Media |chapter-url=https://doi.org/10.1145/3342220.3343651 |series=HT '19 |location=New York, NY, USA |publisher=Association for Computing Machinery |pages=181–190 |doi=10.1145/3342220.3343651 |isbn=978-1-4503-6885-8}}</ref> |
|||
=== Social engineering fraud === |
|||
[[Social engineering (security)|Social engineering]] fraud can occur when a criminal poses as someone else which results in a voluntary transfer of money or information to the fraudster.<ref>{{Cite web |title=Social engineering scams |url=https://www.interpol.int/en/Crimes/Financial-crime/Social-engineering-scams |access-date=2024-03-05 |website=www.interpol.int |language=en}}</ref> Fraudsters are turning to more sophisticated methods of scamming people and businesses out of money. A common tactic is sending spoof emails impersonating a senior member of staff and trying to deceive employees into transferring money to a fraudulent bank account.<ref>{{Cite web|title=Business Advice|url=https://takefive-stopfraud.org.uk/business-advice/|url-status=dead|archive-url=https://web.archive.org/web/20180905141558/https://takefive-stopfraud.org.uk/business-advice/|archive-date=September 5, 2018|access-date=2019-12-29|website=Take Five|language=en-GB}}</ref> |
|||
Fraudsters may use a variety of techniques in order to solicit personal information by pretending to be a bank or payment processor. Telephone phishing is the most common social engineering technique to gain the trust of the victim. |
|||
Businesses can protect themselves with a dual authorisation process for the transfer of funds that requires authorisation from at least two persons, and a call-back procedure to a previously established contact number, rather than any contact information included with the payment request. The bank must refund any unauthorised payment; however, they can refuse a refund if they can prove the customer authorised the transaction, or it can prove the customer is at fault because they acted deliberately, or failed to protect details that allowed the transaction.<ref>{{Cite web|url=https://getindemnity.co.uk/business-insurance/crime/social-engineering-fraud|title=Social Engineering Fraud Explained {{!}} - with Get Indemnity |website=getindemnity.co.uk|access-date=2019-12-29}}</ref> |
|||
===Skimming=== |
===Skimming=== |
||
{{Redirect|Skimmer (device)|other uses|Skimmer (disambiguation)}} |
|||
Skimming is the theft of credit card information by a dishonest employee of a legitimate merchant, manually copying down numbers, or using a magnetic stripe reader on a pocket-sized electronic device. Common scenarios for skimming are restaurants or bars where the skimmer has posession of the victim's credit card out of their immediate view. The skimmer will typically use a small keypad to unobtrusively transcribe the 3 or 4 digit [[Card Security Code]] which is not present on the magnetic stripe. |
|||
[[File:Extra stukje op beveiligde pinautomaat tegen skimmen.jpg|thumb|Green plastic unit on an ATM slot, intended to stop thieves from installing a skimmer device on the machine]] |
|||
Skimming is the theft of personal information which has been used in an otherwise normal transaction. The thief can procure a victim's card number using basic methods such as photocopying receipts or more advanced methods such as using a small electronic device (skimmer) to swipe and store hundreds of victims' card numbers.<ref>{{Cite web |last=Masjedi |first=Yaniv |editor-last=Benny |editor-first=Alina |title=How Does Debit Card Fraud Happen? Can You Avoid It? |url=https://www.aura.com/learn/debit-card-fraud |access-date=2024-03-05 |website=Aura |language=en}}</ref> Common scenarios for skimming are taxis, restaurants or bars where the skimmer has possession of the victim's payment card out of their immediate view.<ref>[https://web.archive.org/web/20090727093631/http://www.thereporteronline.com/articles/2009/02/20/news/doc499ea6f34cf0c881626736.txt Inside Job/Restaurant card skimming]. ''[[Journal Register]]''.</ref> The thief may also use a small keypad to unobtrusively transcribe the three or four-digit [[card security code]], which is not present on the magnetic strip. |
|||
[[Call centers]] are another area where skimming can easily occur.<ref>{{cite news | url=http://news.bbc.co.uk/2/hi/uk_news/7953401.stm| title= Overseas credit card scam exposed| work= bbc.co.uk.com |date= 19 March 2009| first=Allan| last=Little}}</ref> Skimming can also occur at merchants when a third-party card-reading device is installed either outside a card-swiping terminal. This device allows a thief to capture a customer's card information, including their PIN, with each card swipe.<ref>[http://www.nacsonline.com/NACS/Magazine/PastIssues/2011/October2011/Pages/Feature5.aspx NACS Magazine – Skimmming] {{Webarchive|url=https://web.archive.org/web/20120227025440/http://www.nacsonline.com/NACS/Magazine/PastIssues/2011/October2011/Pages/Feature5.aspx |date=27 February 2012 }}. nacsonline.com</ref> |
|||
Cards in countries such as the UK are issued featuring a smart chip with public key encryption. The chip cannot be copied, but the card number, expiry date and security code can be, and this set of data is often sufficient to use the the victim's credit card account for fraudulent purposes with so-called "card not present" transactions, i.e. over the telephone or internet. |
|||
Skimming is difficult for the typical cardholder to detect, but given a large enough sample, it is fairly easy for the card issuer to detect. The issuer collects a list of all the cardholders who have complained about fraudulent transactions, and then uses [[data mining]] to discover relationships among them and the merchants they use. Sophisticated algorithms can also search for patterns of fraud. Merchants must ensure the physical security of their terminals, and penalties for merchants can be severe if they are compromised, ranging from large fines by the issuer to complete exclusion from the system, which can be a death blow to businesses such as restaurants where credit card transactions are the norm. |
|||
===Carding=== |
|||
Carding is a term used by fraudsters for a process they use to verify that sets of stolen credit card data are still valid. The fraudster will present each set of credit card details in turn on a website that has real-time transaction processing, making a purchase for a very small monetary amount so as not to use up the card's credit limit, and so as not to attract the attention of a human reviewer to the transaction. |
|||
Instances of skimming have been reported where the perpetrator has put over the card slot of an [[automated teller machine]], a device that reads the magnetic strip as the user unknowingly passes their card through it.<ref> |
|||
Often, an online donation site for a charity is used instead of an eCommerce merchant, since there is no need to find an item of a suitable price to put in the virtual shopping cart, nor to supply shipping details. The carder may do this manually with a web browser, or may write automated software to interface to the website's checkout or billing forms. |
|||
{{cite web |url=http://www.dailyrecord.com/story/news/2016/11/17/theft-ring-rigged-florham-park-atm-attorney-general-says/94020118/ |access-date=18 November 2016|title=Theft ring rigged Florham Park ATM, attorney general says |date=17 November 2016 |author=William Westhoven|publisher=[[Daily Record (Morristown)]]}} |
|||
</ref> These devices are often used in conjunction with a miniature camera to read the user's [[personal identification number]] at the same time.<ref>[http://www.snopes.com/fraud/atm/atmcamera.asp ATM Camera] Snopes.com</ref> This method is being used in many parts of the world, including South America, Argentina,<ref>{{cite web|title=Piden la captura internacional de un estudiante de Ingeniería|date=2 November 2010|url=http://www.clarin.com/policiales/Piden-captura-internacional-estudiante-Ingenieria_0_364763613.html|language=es}}</ref> and Europe.<ref>{{Cite web|url=http://krebsonsecurity.com/2016/04/a-dramatic-rise-in-atm-skimming-attacks/|title=A Dramatic Rise in ATM Skimming Attacks|year=2016|website=Krebs on Security}}</ref> |
|||
===Unexpected repeat billing=== |
|||
In the past, carders used to use computer programs called "generators" to produce a sequence of credit card numbers, and then test them to see which were valid accounts. However, this process is no longer viable due to widespread requirement by internet credit card processing systems for additional data such as the billing address, the 3 to 4 digit [[Card Security Code]] and/or the card's expiry date. Nowadays, carding is more typically used to verify credit card data obtained directly from the victims by [[Credit Card Fraud#Skimming|Skimming]] or [[Phishing]]. |
|||
Online bill paying or internet purchases utilizing a bank account are a source for repeat billing known as "recurring bank charges". These are [[Standing order (banking)|standing orders]] or banker's orders from a customer to honour and pay a certain amount every month to the payee. With [[E-commerce]], especially in the [[United States]], a vendor or payee can receive payment by [[Direct debit#United States|direct debit]] through the [[ACH Network]]. While many payments or purchases are valid, and the customer has intentions to pay the bill monthly, some are known as ''Rogue Automatic Payments''.<ref>[http://bucks.blogs.nytimes.com/2010/10/04/how-to-stop-rogue-automatic-payments/?_r=0 "Rogue automatic payments"]- Retrieved 2016-02-07</ref> |
|||
Another type of credit card fraud targets utility customers. Customers receive unsolicited in-person, telephone, or electronic communication from individuals claiming to be representatives of [[Public utility|utility companies]]. The scammers alert customers that their utilities will be disconnected unless an immediate payment is made, usually involving the use of a reloadable debit card to receive payment. Sometimes the scammers use authentic-looking phone numbers and graphics to deceive victims. |
|||
A set of credit card details that has been verified in this way is known in fraud circles as a phish (see [[Phishing]]). A carder will typically sell data files of phish to other individuals who will carry out the actual fraud. Market price for a phish ranges from US$1.00 to US$50.00 depending on the type of card, freshness of the data and financial |
|||
=== Phishing === |
|||
==Credit Card Crime Profits, Losses & Punishment== |
|||
Phishing is one of the most common methods used to steal personal data. It is a type of cyber attack in which the attacker acts as a credible person, institution, or entity and attempts to lure the victim into accepting a message or taking action with the specific request. Often, the target of the attack will receive an email or text message about something they would possibly want or need with the hope of tricking them into opening or downloading the message. During the COVID-19 pandemic, phishing has been on the rise as our world turned even more virtual. To give perspective, "researchers noted a substantial spike of 667% in COVID-19 phishing attacks in the first months of the pandemic.".<ref>Kikerpill, Kristjan, and Andra Siibak. "MAZEPHISHING: THE COVID-19 PANDEMIC AS CREDIBLE SOCIAL CONTEXT FOR SOCIAL ENGINEERING ATTACKS." ''Trames'', vol. 25, no. 4, Dec. 2021, pp. 371+. ''Gale Academic OneFile'', link.gale.com/apps/doc/A685710807/AONE?u=udel_main&sid=bookmark-AONE&xid=2f58412d. Accessed 28 Apr. 2022.</ref> Also, given the significance of health care systems over these recent years health care companies have been the main targets of phishing attacks. These companies have tons of personal data stored that can be extremely valuable to the attacker. |
|||
=== Information sharing === |
|||
{{globalize}} |
|||
Information sharing is the transfer or exchange of data between individuals, companies, organizations, and technologies. Advances in technology, the internet, and networks have accelerated the growth of information sharing. Information is spread and shared in the matter of seconds, and is being accumulated and digested at speeds faster than ever before. People are often not aware of how much sensitive and personal information they share every day. For example, when purchasing goods online, the buyer's name, email address, home address, and credit card information are stored and shared with third parties to track them and their future purchases. Organizations work hard to keep individuals' personal information secure in their databases, but sometimes hackers are able to compromise its security and gain access to an immense amount of data. One of the largest data breaches occurred at the discount retailer Target. In this breach about 40 million shopper were affected. In this specific case, the hackers targeted their point-of-sale system – meaning "they either slipped malware into the terminals where customers swipe their credit cards, or they collected customer data while it was on route from Target to its credit card processors."<ref>{{Cite web |date=2013-12-18 |title=Target: 40 million credit cards compromised |url=https://money.cnn.com/2013/12/18/news/companies/target-credit-card/index.html |access-date=2022-05-09 |website=CNNMoney}}</ref> In just one single purchase at the register, masses of personal data is collected which when stolen has major ramifications. The [[financial market infrastructure]] and payment system will continue to be a work-in-progress as it constantly is at battle with security hackers. |
|||
==Regulation and governance== |
|||
===Losses=== |
|||
U.S. Federal Law can hold the cardholder victim responsible for up to $50, but the merchant victim is held responsible for 100% plus research and investigation fees levied by the banks. Merchants risk losing their merchandise or services, as well as the research and investigation fees charged by the banks. Merchants in high-risk industries, like unattended automated fuel pumps or Internet sales, anticipate a certain amount of credit card fraud, and set prices accordingly. These higher costs are then passed onto the customer. |
|||
=== |
===United States=== |
||
While not federally mandated in the United States [[Payment Card Industry Data Security Standard|PCI DSS]] is mandated by the Payment Card Industry Security Standard Council, which is composed of major credit card brands and maintains this as an industry standard. Some states have incorporated the standard into their laws. |
|||
In 2003 the Wall Street Journal estimated that the credit card industry generated $500,000,000 in annual revenue in research and investigation fees paid by consumers and businesses. This additional revenue offsets some of the costs incurred by credit card issuing and processing companies' when investigating chargeback claims. Some merchants believe the high revenue generation by the banks from the crime victims, reduce the incentive for the credit card banks to implement procedures to reduce credit card crime. However, the companies which collect these fees are not capable of dictating fraud prevention policies to the rest of the world. Payment transfer associations, like Visa and Mastercard, receive profit from transaction fees calculated as a percentage of the amount of money they transfer. These associations are motivated to enact policies which increase the amount of money transferred by their systems. Credit card fraud has a chilling effect on merchant acceptance of credit cards, motivating merchants to not accept credit card payments to mitigate their risk of loss. These payment transfer associations are therefore motivated to enact policies and enforce regulations which reduce credit card fraud. |
|||
====Proposed toughening of federal law==== |
|||
Merchants have begun to request changes in State and Federal Laws to protect consumers and merchants from fraud, but the credit card industry has opposed many of the requested laws. |
|||
The [[US Department of Justice]] announced in September 2014 that it will seek to impose a tougher law to combat overseas credit card trafficking. Authorities say the current statute is too weak because it allows people in other countries to avoid prosecution if they stay outside the United States when buying and selling the data and do not pass their illicit business through the U.S. The Department of Justice asks [[US Congress]] to amend the current law that would make it illegal for an international criminal to possess, buy or sell a stolen credit card issued by a U.S. bank independent of geographic location.<ref>{{cite web|last1=Tucker|first1=Eric|title=Prosecutors target credit card thieves overseas|url=http://hosted.ap.org/dynamic/stories/U/US_CREDIT_CARD_THEFT?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2014-09-12-17-56-33|publisher=AP|access-date=13 September 2014}}</ref> |
|||
====Cardholder liability==== |
|||
Because all card-accepting merchants and card-carrying customers are bound by contract law, according to the agreements they sign with their processing / issuing banks, respectively, State and Federal law has a smaller role in preventing merchants from being tricked. Payment transfer associations enact regulatory changes, and issuing / acquiring banks, merchants, and cardholders are contractually bound to these new regulations. |
|||
In the US, federal law limits the liability of cardholders to $50 in the event of theft of the actual credit card, regardless of the amount charged on the card, if reported within 60 days of receiving the statement.<ref>{{cite web|title=Section 901 of title IX of the Act of May 29, 1968 (Pub. L. No. 90-321), as added by title XX of the Act of November 10, 1978 (Pub. L. No. 95-630; 92 Stat. 3728), effective May 10, 1980|url=http://www.fdic.gov/regulations/laws/rules/6500-1350.html|url-status=dead|archive-url=https://web.archive.org/web/20020414225514/http://www.fdic.gov/regulations/laws/rules/6500-1350.html|archive-date=April 14, 2002|access-date=25 May 2017}}</ref> In practice, many issuers will waive this small payment and simply remove the fraudulent charges from the customer's account if the customer signs an [[affidavit]] confirming that the charges are indeed fraudulent. If the physical card is not lost or stolen, but rather just the credit card account number itself is stolen, then federal law guarantees cardholders have zero liability to the credit card issuer.<ref>{{cite web|url=http://www.consumer.ftc.gov/articles/0213-lost-or-stolen-credit-atm-and-debit-cards |title=Lost or Stolen Credit, ATM, and Debit Cards |date=6 August 2012 |publisher=Ftc.gov |access-date=2 August 2014}}</ref> |
|||
=== |
===United Kingdom=== |
||
In the UK, credit cards are regulated by the [[Consumer Credit Act 1974]] (amended [[Consumer Credit Act 2006|2006]]). This provides a number of protections and requirements. Any misuse of the card, unless deliberately criminal on the part of the cardholder, must be refunded by the merchant or card issuer. |
|||
Persons that commit credit card crime largely go unpunished and repeatedly victimize consumers and businesses. The [[Secret Service]] handles crimes involving the US money supply, they have a limit of $2,000 before investigating each crime. Most credit card criminals know this and keep purchases from any one business below $2,000. With credit card crime occurring across state lines, criminals often are never prosecuted because the dollar amounts are too low for local law enforcement to pay for extradition. |
|||
The regulation of banks in the United Kingdom is undertaken by the: [[Bank of England]] (BoE); [[Prudential Regulation Authority (United Kingdom)|Prudential Regulation Authority]] (PRA) a division of the BoE; and the [[Financial Conduct Authority]] (FCA) who manages the day to day oversight. There is no specific legislation or regulation that governs the credit card industry. However, the [[Association for Payment Clearing Services]] (APACS) is the institution that all settlement members are a part of. The organisation works under the Banking Consolidation Directive to provide a means by which transactions can be monitored and regulated.<ref>{{Cite web|url=https://www.gbpayments.co.uk/blog/2019/1/23/who-regulates-credit-card-merchant-services-in-uk|title=Who Regulates Credit Card Merchant Services in the UK?|website=GB Payments|date=23 January 2019 |language=en-US|access-date=2019-12-29}}</ref> [[UK Finance]] is the association for the UK banking and financial services sector, representing more than 250 firms providing credit, banking and payment-related services. |
|||
==Reporting Credit Card Fraud== |
|||
If you lose or have your credit card stolen, you should immediately report it to your card issuer. Once you report the incident, you are no longer responsible for unauthorized charges made on your card. |
|||
===Australia=== |
|||
Credit card fraud can be reported to the FTC and to local and regional authorities. It is the standing policy of the FTC not to investigate reports where the value of fraud does not exceed $2000. Local law enforcement may or may not further investigate a credit card fraud, depending on the amount, type of fraud, and where the fraud originated from. |
|||
[[File: Number of victims and proportion of population or household, by offence type.png|thumb|A graph showing the number of victims and proportion of the population or household affected by different offences]] |
|||
In [[Australia]], credit card fraud is considered a form of ''identity crime''. The [[Australian Transaction Reports and Analysis Centre]] has established standard definitions in relation to identity crime for use by law enforcement across Australia: |
|||
* The term '''identity''' encompasses the identity of natural persons (living or deceased) and the identity of bodies corporate |
|||
* '''Identity fabrication''' describes the creation of a fictitious identity |
|||
* '''Identity manipulation''' describes the alteration of one's own identity |
|||
* '''Identity theft''' describes the theft or assumption of a pre-existing identity (or significant part thereof), with or without consent and whether, in the case of an individual, the person is living or deceased |
|||
* '''Identity crime''' is a generic term to describe activities/offences in which a perpetrator uses a fabricated identity, a manipulated identity, or a stolen/assumed identity to facilitate the commission of a crime(s).<ref name=":0">{{Cite web|url=http://www.afp.gov.au/policing/fraud/identity-crime|title=Identity Crime|year=2015|website=Australian Federal Police|publisher=Commonwealth of Australia}}</ref> |
|||
===Hong Kong=== |
|||
Given increasing number of unauthorised payment card transactions involving frauds and scams, the Hong Kong Monetary Authority issued two Circulars on 25 April 2023.<ref>{{Cite web|url=https://www.mayerbrown.com/en/perspectives-events/publications/2023/04/hong-kong-monetary-authority-issued-two-circulars-to-authorized-institutions-regarding-payment-cards|title=Hong Kong Monetary Authority Issued Two Circulars to Authorized Institutions Regarding Payment Cards|website=Mayer Brown|language=en-US|access-date=2023-04-27}}</ref> |
|||
====Losses==== |
|||
Estimates created by the Attorney-General's Department show that identity crime costs Australia upwards of $1.6 billion each year, with the majority of about $900 million being lost by individuals through credit card fraud, identity theft and scams.<ref name=":0" /> In 2015, the Minister for Justice and Minister Assisting the Prime Minister for Counter-Terrorism, Michael Keenan, released the report Identity Crime and Misuse in Australia 2013–14. This report estimated that the total direct and indirect cost of identity crime was closer to $2 billion, which includes the direct and indirect losses experienced by government agencies and individuals, and the cost of identity crimes recorded by police.<ref>{{Cite web|url=https://www.ag.gov.au/RightsAndProtections/IdentitySecurity/Pages/Trends-in-Identity-Crime.aspx|title=Identity crime in Australia|year=2015|website=www.ag.gov.au|publisher=Commonwealth of Australia Attorney-General's Department}}</ref> |
|||
====Cardholder liability==== |
|||
The victim of credit card fraud in Australia, still in possession of the card, is not responsible for anything bought on it without their permission. However, this is subject to the terms and conditions of the account. If the card has been reported physically stolen or lost the cardholder is usually not responsible for any transactions not made by them, unless it can be shown that the cardholder acted dishonestly or without reasonable care.<ref name=":0" /> |
|||
==Vendors vs merchants== |
|||
To prevent vendors from being "charged back" for fraud transactions, merchants can sign up for services offered by Visa and MasterCard called Verified by Visa and MasterCard SecureCode, under the umbrella term [[3-D Secure]]. This requires consumers to add additional information to confirm a transaction.{{citation needed|date=December 2019}} |
|||
Often enough online merchants do not take adequate measures to protect their websites from fraud attacks, for example by being blind to sequencing. In contrast to more automated product transactions, a clerk overseeing "card present" authorization requests must approve the customer's removal of the goods from the premises in real time.{{citation needed|date=December 2019}} |
|||
If the merchant loses the payment, the fees for processing the payment, any currency conversion commissions, and the amount of the chargeback penalty. For obvious reasons, many merchants take steps to avoid chargebacks – such as not accepting suspicious transactions. This may spawn collateral damage, where the merchant additionally loses legitimate sales by incorrectly blocking legitimate transactions. Mail Order/Telephone Order (MOTO) merchants are implementing [[agent-assisted automation]] which allows the [[call center]] agent to collect the credit card number and other [[personally identifiable information]] without ever seeing or hearing it. This greatly reduces the probability of chargebacks and increases the likelihood that fraudulent chargebacks will be overturned.<ref name="adsit">{{cite news|last=Adsit|first=Dennis|date=21 February 2011|title=Error-proofing strategies for managing call center fraud|work=isixsigma.com|url=http://www.isixsigma.com/index.php?option=com_k2&view=item&id=1854&Itemid=1&Itemid=1|url-status=dead|archive-url=https://web.archive.org/web/20110615000035/http://www.isixsigma.com/index.php?option=com_k2&view=item&id=1854&Itemid=1&Itemid=1|archive-date=June 15, 2011}}</ref> |
|||
==Famous credit fraud attacks== |
|||
<!-- Oldest on top --> |
|||
Between July 2005 and mid-January 2007, a breach of systems at [[TJX Companies]] exposed data from more than 45.6 million credit cards. [[Albert Gonzalez]] is accused of being the ringleader of the group responsible for the thefts.<ref>{{Cite magazine|url=https://www.wired.com/2010/03/tjx-sentencing/|title=TJX Hacker Gets 20 Years in Prison|last=Zetter|first=Kim|date=2010-03-25|magazine=WIRED|publisher=Wired Magazine}}</ref> In August 2009 Gonzalez was also indicted for the biggest known credit card theft to date – information from more than 130 million credit and debit cards was stolen at [[Heartland Payment Systems]], retailers [[7-Eleven]] and [[Hannaford Brothers]], and two unidentified companies.<ref>{{cite web|url=https://www.theregister.co.uk/2009/08/17/heartland_payment_suspect/|title=TJX suspect indicted in Heartland, Hannaford breaches|date=17 August 2009|first=Dan|last=Goodin|website=[[The Register]]}}</ref> |
|||
In 2012, about 40 million sets of payment card information were compromised by a hack of [[Adobe Systems]].<ref name="Top 2014">Skimming Off the Top; Why America has such a high rate of payment-card fraud, 15 February 2014, The Economist</ref> The information compromised included customer names, encrypted payment card numbers, expiration dates, and information relating to orders, Chief Security Officer Brad Arkin said.<ref>{{Cite web|url=http://www.smh.com.au/it-pro/security-it/adobe-hacked-customer-data-source-code-compromised-20131004-hv1wl.html|title=Adobe hacked: customer data, source code compromised|last=Krebs|first=Brian|date=2014-10-04|website=The Sydney Morning Herald|publisher=The Sydney Morning Herald Newspaper}}</ref> |
|||
In July 2013, press reports indicated four Russians and a Ukrainian were indicted in the [[U.S. state]] of New Jersey for what was called "the largest hacking and data breach scheme ever prosecuted in the United States."<ref>Russian hackers charged in 'biggest' data breach case, 160mn credit card numbers stolen, 25 July 2013, Catherine Benson, Reuters</ref> Albert Gonzalez was also cited as a co-conspirator of the attack, which saw at least 160 million credit card losses and excess of $300 million in losses. The attack affected both American and European companies including Citigroup, Nasdaq OMX Group, PNC Financial Services Group, Visa licensee Visa Jordan, Carrefour, JCPenney and JetBlue Airways.<ref>{{Cite web|url=https://www.cnbc.com/id/100913932|title=Six charged in biggest credit card hack on record|agency=Reuters|date=2013-07-25|website=CNBC}}</ref> |
|||
Between 27 November 2013 and 15 December 2013, a breach of systems at [[Target Corporation]] exposed data from about 40 million credit cards. The information stolen included names, account numbers, expiry dates, and [[card security code]]s.<ref>{{cite news| url=https://www.wsj.com/news/articles/SB10001424052702304367204579267992268980478 |title=Target Faces Backlash After 20-Day Security Breach| work=The Wall Street Journal}}</ref> |
|||
From 16 July to 30 October 2013, a hacking attack compromised about a million sets of payment card data stored on computers at [[Neiman-Marcus]].<ref name="Top 2014"/><ref>Neiman Marcus Data Breach FAQ: What to Do Now, by Paul Wagenseil, 27 January 2014, Tom's guide</ref> A malware system, designed to hook into cash registers and monitor the credit card authorisation process (RAM-scraping malware), infiltrated Target's systems and exposed information from as many as 110 million customers.<ref>{{Cite news|last1=Perlroth|first1=Elizabeth A.|last2=Popper|first2=Nathaniel|last3=Perlroth|first3=Nicole|date=2014-01-23|title=Neiman Marcus Data Breach Worse Than First Said|newspaper=[[The New York Times]]|url=https://www.nytimes.com/2014/01/24/business/neiman-marcus-breach-affected-1-1-million-cards.html|issn=0362-4331}}</ref> |
|||
On 8 September 2014, [[The Home Depot]] confirmed that their payment systems were compromised. They later released a statement saying that the hackers obtained a total of 56 million credit card numbers as a result of the breach.<ref>{{Cite news|last=Stempel|first=Jonathan|date=2020-11-24|title=Home Depot reaches $17.5 million settlement over 2014 data breach|language=en|work=Reuters|url=https://www.reuters.com/article/us-home-depot-cyber-settlement-idUSKBN2842W5|access-date=2021-04-15}}</ref> |
|||
On 15 May 2016, in a coordinated attack, a group of around 100 individuals used the data of 1600 South African credit cards to steal US$12.7 million from 1400 convenience stores in [[Tokyo]] within three hours. By acting on a Sunday and in another country than the bank which issued the cards, they are believed to have won enough time to leave Japan before the heist was discovered.<ref>{{Cite news|url=https://www.theguardian.com/world/2016/may/23/japan-cash-machine-100-thieves-steal-13m-dollars-three-hours|title=100 thieves steal $13m in three hours from cash machines across Japan|last=McCurry|first=Justin|date=2016-05-23|newspaper=The Guardian|access-date=2016-05-23}}</ref> |
|||
==Countermeasures to combat card payment fraud== |
|||
Countermeasures to combat credit card fraud include the following. |
|||
=== By merchants === |
|||
* [[PAN truncation]] – not displaying the full '''p'''rimary '''a'''ccount '''n'''umber on receipts |
|||
* [[Tokenization (data security)]] – using a reference (token) to the card number rather than the real card number |
|||
* Requesting additional information, such as a PIN, ZIP code, or [[Card Security Code]] |
|||
* Performing geolocation validation, such as IP address |
|||
* Use of [[Reliance authentication|Reliance Authentication]], indirectly via PayPal, or directly via iSignthis or {{proper name|miiCard}}. |
|||
=== By card issuers === |
|||
* Fraud detection and prevention software<ref>{{cite web|last1=Le Borgne|first1=Yann-Aël|last2=Bontempi|first2=Gianluca|title=Machine Learning for Credit Card Fraud Detection - Practical Handbook|year=2021|url=https://fraud-detection-handbook.github.io/fraud-detection-handbook/Foreword.html|access-date=26 April 2021}}</ref><ref name=Falcon>{{cite book|last=Hassibi PhD|first=Khosrow|title=Detecting Payment Card Fraud with Neural Networks in the book titled "Business Applications of Neural Networks"|year=2000|url=https://books.google.com/books?id=ZQDgRmQwvN4C&q=Khosrow+Hassibi+Detecting+PAyment&pg=PA141|publisher=World Scientific|isbn=9789810240899|access-date=10 April 2013}}</ref><ref>{{cite web|title=Risk — Smarter Risk Management for Financial Services|url=http://agility.financetech.com/risk-management|access-date=14 July 2011|archive-url=https://web.archive.org/web/20110925060937/http://agility.financetech.com/risk-management|archive-date=25 September 2011|url-status=dead}}</ref><ref>{{cite web|last=Richardson|first=Robert J.|title=Monitoring Sale Transactions for Illegal Activity|url=http://www.iima.org/CIIMA/13%20CIIMA%206-1%20105-114%20Richardson.pdf|access-date=14 July 2011|archive-url=https://web.archive.org/web/20120327161739/http://www.iima.org/CIIMA/13%20CIIMA%206-1%20105-114%20Richardson.pdf|archive-date=27 March 2012|url-status=dead}}</ref> that analyzes patterns of normal and unusual behavior as well as individual transactions in order to flag likely fraud. Profiles include such information as IP address.<ref>{{cite web|title=10 Measures to Reduce Credit Card Fraud|url=https://www.fraudlabspro.com/resources/tutorials/10-measures-to-reduce-credit-card-fraud-for-internet-merchants/|url-status=live|archive-url=https://web.archive.org/web/20110716180053/https://www.fraudlabspro.com/resources/tutorials/10-measures-to-reduce-credit-card-fraud-for-internet-merchants/|archive-date=16 July 2011|access-date=14 July 2011|work=10 Measures to Reduce Credit Card Fraud for Internet Merchants|publisher=FraudLabs Pro|df=dmy-all}}</ref> Technologies have existed since the early 1990s to detect potential fraud. One early market entrant was Falcon;<ref name="Falcon"/> other leading software solutions for card fraud include Actimize, SAS, BAE Systems Detica, and IBM. |
|||
* Fraud detection and response business processes such as: |
|||
** Contacting the cardholder to request verification |
|||
** Placing preventative controls/holds on accounts that may have been victimized |
|||
** Blocking card until transactions are verified by the cardholder |
|||
** Investigating fraudulent activity |
|||
* [[Strong authentication|Strong Authentication]] measures such as: |
|||
** [[Multi-factor authentication|Multi-factor Authentication]], verifying that the account is being accessed by the cardholder through requirement of additional information such as account number, PIN, ZIP, [[challenge–response authentication|challenge questions]]. There are five main factors to multi-factor authentication and they include:<ref>{{Citation |last1=Dasgupta |first1=Dipankar |title=Multi-Factor Authentication |date=2017 |url=https://doi.org/10.1007/978-3-319-58808-7_5 |work=Advances in User Authentication |pages=185–233 |editor-last=Dasgupta |editor-first=Dipankar |place=Cham |publisher=Springer International Publishing |language=en |doi=10.1007/978-3-319-58808-7_5 |isbn=978-3-319-58808-7 |access-date=2022-04-28 |last2=Roy |first2=Arunava |last3=Nag |first3=Abhijit |series=Infosys Science Foundation Series |s2cid=63285720 |editor2-last=Roy |editor2-first=Arunava |editor3-last=Nag |editor3-first=Abhijit}}</ref> |
|||
**# Knowledge - things a user knows such as passwords or answers to secret questions. |
|||
**# Possession - an object the user should have in their possession such as the actual credit card. |
|||
**# Inherence - a biological trait of the user such as finger-print or facial recognition. |
|||
**# Location - where the user is at the time of the authentication - verify the user was the one to use the card. |
|||
**# Time - when the authentication is taking place - is it a strange hour or multiple times? |
|||
** Multi possession-factor authentication, verifying that the account is being accessed by the cardholder through requirement of additional personal devices such as smart watch, smart phone [[challenge–response authentication]]<ref name="AlhothailyAlrawais2014">{{cite book|last1=Alhothaily|first1=Abdulrahman|last2=Alrawais|first2=Arwa|last3=Cheng|first3=Xiuzhen|author3-link= Xiuzhen Cheng |last4=Bie|first4=Rongfang|title=Wireless Algorithms, Systems, and Applications |chapter=Towards More Secure Cardholder Verification in Payment Systems |volume=8491|year=2014|pages=356–367|issn=0302-9743|doi=10.1007/978-3-319-07782-6_33|series=Lecture Notes in Computer Science|isbn=978-3-319-07781-9}}</ref> |
|||
** Out-of-band Authentication,<ref>{{cite web|title=FFIEC: Out-of-Band Authentication|url=http://www.bankinfosecurity.asia/articles.php?art_id=3823|publisher=BankInfoSecurity|access-date=14 July 2011}}</ref> verifying that the transaction is being done by the cardholder through a "known" or "trusted" communication channel such as text message, phone call, or [[Security token|security token device]] |
|||
* Industry collaboration and information sharing about known fraudsters and emerging threat vectors<ref>{{cite web|title=Early Warning Systems|url=http://www.earlywarning.com/042811.asp|publisher=Early Warning Systems|access-date=14 July 2011|archive-url=https://web.archive.org/web/20110724090419/http://www.earlywarning.com/042811.asp|archive-date=24 July 2011|url-status=dead}}</ref><ref>{{cite web|title=Financial Services - Information Sharing and Analysis Center|url=http://www.fsisac.com/|publisher=FS-ISAC|access-date=14 July 2011}}</ref> |
|||
* Automated Data Controls: |
|||
# The use of automated data controls which are used to recognize when unusual activity or spending occur with a credit card. These controls can be used in real time to react "...to anything suspicious they come upon, so the flow of fraudulent activity is stopped as soon as possible..." (Johnston).<ref>{{Cite web |title=Payment Card Industry Security: Importance of Data Integrity {{!}} ISACA Journal |url=https://www.isaca.org/resources/isaca-journal/issues/2016/volume-1/security-in-the-payment-card-industry-the-importance-of-data-integrity |access-date=2022-04-28 |website=ISACA}}</ref> The three main ways automated data controls protect information includes: |
|||
## Reconciliation and verification to ensure that the controls are working properly. |
|||
## Continuous monitoring and alerting which alerts the cardholder/bank when unusual activity is taking place. |
|||
## Reporting which ensures organizations have proper controls in place to prevent fraudulent activity |
|||
=== By banks and financial institutions === |
|||
* Internal self-banking area for the customer to carry out the transactions regardless of the weather conditions. The access door: |
|||
** Identifies every cardholder that gains access to the designated area |
|||
** Increases protection for customers during self-service procedures |
|||
** Protects the ATMs and banking assets against unauthorized usage |
|||
** The protected area can also be monitored by the bank's CCTV system |
|||
** Cards use CHIP identification (ex PASSCHIP <ref>{{Cite web|url=https://passchip.com/en/products/passchip-reader.html|title=ATM Access Control Solution - PASSCHIP|website=passchip.com|language=en|access-date=2018-07-20}}</ref>) to decrease the possibility of card skimming |
|||
=== By governmental and regulatory bodies === |
|||
* Enacting [[consumer protection]] laws related to card fraud |
|||
* Performing regular examinations and risk assessments of credit card issuers<ref>{{cite web|title=IT Booklets » Information Security » Introduction » Overview|url=http://ithandbook.ffiec.gov/it-booklets/information-security/introduction/overview.aspx|work=FFIEC IT Examination Handbook - Credit Cards|publisher=FFIEC|access-date=14 July 2011|archive-url=https://web.archive.org/web/20110707125514/http://ithandbook.ffiec.gov/it-booklets/information-security/introduction/overview.aspx|archive-date=7 July 2011|url-status=dead}}</ref> |
|||
* Publishing standards, guidance, and guidelines for protecting cardholder information and monitoring for fraudulent activity<ref>{{cite web|title=IT Booklets » Retail Payment Systems » Retail Payment Systems Risk Management » Retail Payment Instrument Specific Risk Management Controls|url=http://ithandbook.ffiec.gov/it-booklets/retail-payment-systems/retail-payment-systems-risk-management/retail-payment-instrument-specific-risk-management-controls/credit-cards.aspx|work=FFIEC IT Examination Handbook - Credit Cards|publisher=FFIEC|access-date=14 July 2011|archive-url=https://web.archive.org/web/20110708165823/http://ithandbook.ffiec.gov/it-booklets/retail-payment-systems/retail-payment-systems-risk-management/retail-payment-instrument-specific-risk-management-controls/credit-cards.aspx|archive-date=8 July 2011|url-status=dead}}</ref> |
|||
*Regulation, such as that introduced in the [[Single Euro Payment Area|SEPA]] and EU28 by the European Central Bank's 'SecuRe Pay'<ref>{{cite web|url=http://www.ecb.europa.eu/press/pr/date/2013/html/pr130131_1.en.html|title=ECB releases final Recommendations for the security of internet payments and starts public consultation on payment account access services|date=31 January 2013}}</ref> requirements and the Payment Services Directive 2<ref>{{cite web|url=http://www.europarl.europa.eu/oeil/popups/summary.do?id=1289956&t=d&l=en|title=2013/0264(COD) - 24/07/2013 Legislative proposal}}</ref> legislation. |
|||
=== By cardholders === |
|||
* Reporting lost or stolen cards |
|||
* Reviewing charges regularly and reporting unauthorized transactions immediately |
|||
* Keeping a credit card within the cardholder's view at all times, such as in restaurants and taxis |
|||
* Installing virus protection software on personal computers |
|||
* Using caution when using credit cards for online purchases, especially on non-trusted websites, make sure site is reputable |
|||
* Keeping a record of account numbers, their expiration dates, and the phone number and address of each company in a secure place.<ref>{{cite web|url=http://www.ftc.gov/bcp/edu/pubs/consumer/credit/cre07.shtm|title=Consumer Information - Federal Trade Commission}}</ref> |
|||
* Not sending credit card information by unencrypted email |
|||
* Not keeping written PIN numbers with the credit card. |
|||
* Not giving out credit card numbers and other information online |
|||
* Sign up for transaction alerts when card is used |
|||
* Be aware of phishing schemes |
|||
== Disparities and Ethical Dilemmas in Credit Card Fraud == |
|||
'''Generation Differences''' |
|||
# Millennials are the biggest victims of all fraud, including credit and debit card fraud, digital wallet, digital payment, banking and tax fraud. Followed by them are the GenXers and then the GenZers. |
|||
# Millennials spend the most time trying to recover money lost due to fraudulent charges, disputing fraudulent charges, and checking accounts for fraudulent or unusual activity out of any of the generational groups.<ref>{{Cite press release |last=IBM |title=IBM Study Finds Broad Differences in Geographical, Generational Impact of Financial Fraud and Attitudes Toward Financial Institutions |url=https://www.prnewswire.com/news-releases/ibm-study-finds-broad-differences-in-geographical-generational-impact-of-financial-fraud-and-attitudes-toward-financial-institutions-301517409.html |access-date=2022-05-09 |website=www.prnewswire.com |language=en}}</ref> |
|||
# GenZers experienced fraud most often through digital payment apps such as PayPal, Venmo and Square. The other generations experienced most of their issues through credit card fraud. |
|||
# Baby Boomers were found to have the lowest instances of fraudulent charges, and also spent the least amount of time trying to recover money due to fraudulent charges or to dispute these charges. |
|||
'''Racial Differences''' |
|||
# "The Federal Trade Commission ("FTC") and the Consumer Financial Protection Bureau ("CFPB") produced reports on the connection between minority populations and consumer issues. Each report came to the same conclusion: unfair and deceptive practices have unique and disproportionate impacts on communities of color. These findings suggest that more needs to be done to protect these communities from fraud."<ref name=":02">{{Cite web |date=2022-02-01 |title=Communities of Color, Fraud, and Consumer Protection Agencies |url=https://www.naag.org/attorney-general-journal/communities-of-color-fraud-and-consumer-protection-agencies/ |access-date=2022-05-09 |website=National Association of Attorneys General |language=en-US}}</ref> On top of this, hackers specifically target communities of color for reasons such as their need for additional income or credit, or their tendency to use certain types of financial products. |
|||
# Additional report findings:<ref name=":02" /> |
|||
## While Black and Latino consumers are more likely to experience fraud, Latino communities predominantly underreport compared with Black and White communities. |
|||
## Latino and Black consumers report different rates of fraud concerning distinct categories of problem. The FTC found that their complaint database showed Black, and to a lesser extent Latino, communities experience higher rates of problems with credit bureaus and debt collections than White communities. |
|||
## White and Latino communities experience higher rates of impersonator scams than Black communities. Also, according to FTC payment method data, Black and Latino communities use credit cards, with their accompanying legal protections, at a substantially lower rate than in White communities. |
|||
== Additional technological features == |
|||
* [[3-D Secure]] |
|||
* [[EMV]] |
|||
* [[Point to Point Encryption]] |
|||
* [[Strong authentication]] |
|||
* [[True Link]] |
|||
==See also== |
==See also== |
||
<!-- new links in alphabetical order please --> |
|||
{{div col|colwidth=50em}} |
|||
* [[Carding (fraud)]] |
|||
* [[Chargeback fraud]] |
|||
* [[Chargeback insurance]] |
|||
* [[FBI]] |
|||
* [[Financial crimes]] |
|||
* [[Identity theft]] |
|||
* [[Immigration and Customs Enforcement]] (ICE) |
|||
* [[Internet fraud]] |
* [[Internet fraud]] |
||
* [[Organized crime]] |
|||
* [[Phishing]] |
* [[Phishing]] |
||
* [[Carder]] |
|||
* [[Predictive analytics]] |
* [[Predictive analytics]] |
||
* [[ |
* [[Reimbursement]] |
||
* [[Social engineering (security)|Social Engineering]] |
|||
* [[Friendly Fraud]] |
|||
* [[Traffic analysis]] |
|||
* [[United States Postal Inspection Service]] |
|||
* [[United States Secret Service]] |
|||
* [[White-collar crime]] |
|||
{{div col end}} |
|||
==References== |
|||
{{Reflist}} |
|||
==External links== |
==External links== |
||
{{external links|date=March 2016}} |
|||
*Fraud Reporting |
|||
*[https://web.archive.org/web/20110707125510/http://ithandbook.ffiec.gov/it-booklets/information-security/appendix-c-laws,-regulations,-and-guidance.aspx Federal Financial Institutions Examination Council (FFIEC) IT Booklets » Information Security » Appendix C: Laws, Regulations, and Guidance] |
|||
**[https://rn.ftc.gov/pls/dod/wsolcq$.startup FTC Consumer Complaint Form] |
|||
*[https://web.archive.org/web/20100105035154/http://usa.visa.com/merchants/risk_management/fraud_control_basics.html Visa's fraud control basics for merchants] |
|||
*[http://www.ic3.gov The Internet Crime Complaint Center (IC3)] is a partnership between the Federal Bureau of Investigation (FBI) and the [[National White Collar Crime Center]](NW3C). |
|||
*[https://web.archive.org/web/20021003012603/https://www.fbi.gov/majcases/fraud/internetschemes.htm Internet Fraud], with a section "Avoiding Credit Card Fraud", at the [[Federal Bureau of Investigation]] website |
|||
*[https://web.archive.org/web/20100331031014/http://www.ftc.gov/sentinel/reports/sentinel-annual-reports/sentinel-cy2009.pdf US Federal Trade Commission Consumer Sentinel Network Report] |
|||
{{fraud}}{{Credit cards}} |
|||
*General Fraud Information |
|||
{{Authority control}} |
|||
**[http://www.consumer.gov/sentinel/ Consumer Sentinel] Fraud tips, reporting, trends and other general information. |
|||
**[http://www.phantomwithdrawals.com/ Description of ATM cameras and phantom withdrawals] |
|||
**[http://www.iafci.org/ International Association of Financial Crimes Investigators (IAFCI)] |
|||
**[http://www.merchantaccountblog.com/archives/36 What does a fraudulent transaction look like?] from merchantaccountblog.com |
|||
[[Category:Credit cards]] |
|||
[[Category:Fraud]] |
|||
{{DEFAULTSORT:Credit card fraud}} |
|||
[[nl:Skimmen]] |
|||
[[Category:Credit cards]] |
|||
[[ru:Кардинг]] |
|||
[[Category:Identity theft]] |
|||
[[sv:Kreditkortsbedrägeri]] |
|||
[[Category:Organized crime activity]] |
|||
[[Category:Carding (fraud)]] |
Latest revision as of 20:19, 13 December 2024
Credit card fraud is an inclusive term for fraud committed using a payment card, such as a credit card or debit card.[1] The purpose may be to obtain goods or services or to make payment to another account, which is controlled by a criminal. The Payment Card Industry Data Security Standard (PCI DSS) is the data security standard created to help financial institutions process card payments securely and reduce card fraud.[2]
Credit card fraud can be authorised, where the genuine customer themselves processes payment to another account which is controlled by a criminal, or unauthorised, where the account holder does not provide authorisation for the payment to proceed and the transaction is carried out by a third party. In 2018, unauthorised financial fraud losses across payment cards and remote banking totalled £844.8 million in the United Kingdom. Whereas banks and card companies prevented £1.66 billion in unauthorised fraud in 2018. That is the equivalent to £2 in every £3 of attempted fraud being stopped.[3]
Credit card fraud can occur when unauthorized users gain access to an individual's credit card information in order to make purchases, other transactions, or open new accounts. A few examples of credit card fraud include account takeover fraud, new account fraud, cloned cards, and cards-not-present schemes. This unauthorized access occurs through phishing, skimming, and information sharing by a user, oftentimes unknowingly. However, this type of fraud can be detected through means of artificial intelligence and machine learning as well as prevented by issuers, institutions, and individual cardholders. According to a 2021 annual report, about 50% of all Americans have experienced a fraudulent charge on their credit or debit cards, and more than one in three credit or debit card holders have experienced fraud multiple times. This amounts to 127 million people in the US that have been victims of credit card theft at least once.
Regulators, card providers and banks take considerable time and effort to collaborate with investigators worldwide with the goal of ensuring fraudsters are not successful. Cardholders' money is usually protected from scammers with regulations that make the card provider and bank accountable. The technology and security measures behind credit cards are continuously advancing, adding barriers for fraudsters attempting to steal money.[4]
Means of payment card fraud
[edit]There are two kinds of card fraud: card-present fraud (not so common nowadays) and card-not-present fraud (more common). The compromise can occur in a number of ways and can usually occur without the knowledge of the cardholder. The internet has made database security lapses particularly costly, in some cases, millions of accounts have been compromised.[5]
Stolen cards can be reported quickly by cardholders, but a compromised account's details may be held by a fraudster for months before any theft, making it difficult to identify the source of the compromise. The cardholder may not discover fraudulent use until receiving a statement. Cardholders can mitigate this fraud risk by checking their account frequently to ensure there are not any suspicious or unknown transactions.[6]
When a credit card is lost or stolen, it may be used for illegal purchases until the holder notifies the issuing bank and the bank puts a block on the account. Most banks have free 24-hour telephone numbers to encourage prompt reporting. Still, it is possible for a thief to make unauthorized purchases on a card before the card is cancelled.
Prevention of payment card fraud
[edit]Card information is stored in a number of formats. Card numbers – formally the Primary Account Number (PAN) – are often embossed or imprinted on the card, and a magnetic stripe on the back contains the data in a machine-readable format. Fields can vary, but the most common include the Name of the cardholder; Card number; Expiration date; and Verification CVV code.
In Europe and Canada, most cards are equipped with an EMV chip which requires a 4 to 6 digit PIN to be entered into the merchant's terminal before payment will be authorized. However, a PIN is not required for online transactions. In some European countries, buyers using a card without a chip may be asked for photo ID at the point of sale.
In some countries, a credit card holder can make a contactless payment for goods or services by tapping their card against a RFID or NFC reader without the need for a PIN or signature if the cost falls under a pre-determined limit. However, a stolen credit or debit card could be used for a number of smaller transactions prior to the fraudulent activity being flagged.
Card issuers maintain several countermeasures, including software that can estimate the probability of fraud. For example, a large transaction occurring a great distance from the cardholder's home might seem suspicious. The merchant may be instructed to call the card issuer for verification or to decline the transaction, or even to hold the card and refuse to return it to the customer.[7]
Detecting credit card fraud using technology
[edit]Artificial and Computational intelligence
[edit]Given the immense difficulty of detecting credit card fraud, artificial and computational intelligence was developed in order to make machines attempt tasks in which humans are already doing well. Computation intelligence is simply a subset of AI enabling intelligence in a changing environment. Due to advances in both artificial and computational intelligence, the most commonly used and suggested ways to detect credit card fraud are rule induction techniques, decision trees, neural networks, Support Vector Machines, logistic regression, and meta heuristics. There are many different approaches that may be used to detect credit card fraud. For example, some "suggest a framework which can be applied real time where first an outlier analysis is made separately for each customer using self-organizing maps and then a predictive algorithm is utilized to classify the abnormal looking transactions." Some problems that arise when detecting credit card fraud through computational intelligence is the idea of misclassifications such as false negatives/positives, as well as detecting fraud on a credit card having a larger available limit is much more prominent than detecting a fraud with a smaller available limit. One algorithm that helps detect these sorts of issues is determined as the MBO Algorithm. This is a search technique that brings upon improvement by its "neighbor solutions". Another algorithm that assists with these issues is the GASS algorithm. In GASS, it is a hybrid of genetic algorithms and a scatter search.[8]
Machine learning
[edit]Touching a little more on the difficulties of credit card fraud detection, even with more advances in learning and technology every day, companies refuse to share their algorithms and techniques to outsiders. Additionally, fraud transactions are only about 0.01–0.05% of daily transactions, making it even more difficult to spot. Machine learning is similar to artificial intelligence where it is a sub field of AI where statistics is a subdivision of mathematics. With regards to machine learning, the goal is to find a model that yields that highest level without overfitting at the same time. Overfitting means that the computer system memorized the data and if a new transaction differs in the training set in any way, it will most likely be misclassified, leading to an irritated cardholder or a victim of fraud that was not detected. The most popular programming used in machine learning are Python, R, and MatLab. At the same time, SAS is becoming an increasing competitor as well. Through these programs, the easiest method used in this industry is the Support Vector Machine. R has a package with the SVM function already programmed into it. When Support Vector Machines are employed, it is an efficient way to extract data. SVM is considered active research and successfully solves classification issues as well. Playing a major role in machine learning, it has "excellent generalization performance in a wide range of learning problems, such as handwritten digit recognition, classification of web pages and face detection." SVM is also a successful method because it lowers the possibility of overfitting and dimensionality.[9]
Types of payment card fraud
[edit]Application fraud
[edit]Application fraud takes place when a person uses stolen or fake documents to open an account in another person's name. Criminals may steal or fake documents such as utility bills and bank statements to build up a personal profile. When an account is opened using fake or stolen documents, the fraudster could then withdraw cash or obtain credit in the victim's name.[10]
Application fraud can also occur using a synthetic identity which is similar to the fake documents mentioned above. A synthetic identity is personal information gathered from many different identities to create one fake identity.[11] Once the identity and the account is established, the fraudster has a few different options to take advantage of the bank. They can maximize their credit card spending by spending as much money as possible on their new credit card. Many fraudsters will use the new credit card to purchase items that have a high resale value so they can turn it into cash.[12]
Account takeover
[edit]An account takeover refers to the act by which fraudsters will attempt to assume control of a customer's account (i.e. credit cards, email, banks, SIM card and more). Control at the account level offers high returns for fraudsters. According to Forrester, risk-based authentication (RBA) plays a key role in risk mitigation.[13]
A fraudster uses parts of the victim's identity such as an email address to gain access to financial accounts. This individual then intercepts communication about the account to keep the victim blind to any threats. Victims are often the first to detect account takeover when they discover charges on monthly statements they did not authorize or multiple questionable withdrawals.[14] There has been an increase in the number of account takeovers since the adoption of EMV technology, which makes it more difficult for fraudsters to clone physical credit cards.[15]
Among some of the most common methods by which a fraudster will commit an account, takeover includes proxy-based "checker" one-click apps, brute-force botnet attacks, phishing,[16] and malware. Other methods include dumpster diving to find personal information in discarded mail, and outright buying lists of 'Fullz', a slang term for full packages of identifying information sold on the black market.[17]
Once logged in, fraudsters have access to the account and can make purchases and withdraw money from bank accounts.[18] They have access to any information that is tied to the account, they can steal credit card numbers along with social security numbers. They can change the passwords to prevent the victim from accessing their account. Cybercriminals have the opportunity to open other accounts, utilize rewards and benefits from the account, and sell this information to other hackers.[19]
Social engineering fraud
[edit]Social engineering fraud can occur when a criminal poses as someone else which results in a voluntary transfer of money or information to the fraudster.[20] Fraudsters are turning to more sophisticated methods of scamming people and businesses out of money. A common tactic is sending spoof emails impersonating a senior member of staff and trying to deceive employees into transferring money to a fraudulent bank account.[21]
Fraudsters may use a variety of techniques in order to solicit personal information by pretending to be a bank or payment processor. Telephone phishing is the most common social engineering technique to gain the trust of the victim.
Businesses can protect themselves with a dual authorisation process for the transfer of funds that requires authorisation from at least two persons, and a call-back procedure to a previously established contact number, rather than any contact information included with the payment request. The bank must refund any unauthorised payment; however, they can refuse a refund if they can prove the customer authorised the transaction, or it can prove the customer is at fault because they acted deliberately, or failed to protect details that allowed the transaction.[22]
Skimming
[edit]Skimming is the theft of personal information which has been used in an otherwise normal transaction. The thief can procure a victim's card number using basic methods such as photocopying receipts or more advanced methods such as using a small electronic device (skimmer) to swipe and store hundreds of victims' card numbers.[23] Common scenarios for skimming are taxis, restaurants or bars where the skimmer has possession of the victim's payment card out of their immediate view.[24] The thief may also use a small keypad to unobtrusively transcribe the three or four-digit card security code, which is not present on the magnetic strip.
Call centers are another area where skimming can easily occur.[25] Skimming can also occur at merchants when a third-party card-reading device is installed either outside a card-swiping terminal. This device allows a thief to capture a customer's card information, including their PIN, with each card swipe.[26]
Skimming is difficult for the typical cardholder to detect, but given a large enough sample, it is fairly easy for the card issuer to detect. The issuer collects a list of all the cardholders who have complained about fraudulent transactions, and then uses data mining to discover relationships among them and the merchants they use. Sophisticated algorithms can also search for patterns of fraud. Merchants must ensure the physical security of their terminals, and penalties for merchants can be severe if they are compromised, ranging from large fines by the issuer to complete exclusion from the system, which can be a death blow to businesses such as restaurants where credit card transactions are the norm.
Instances of skimming have been reported where the perpetrator has put over the card slot of an automated teller machine, a device that reads the magnetic strip as the user unknowingly passes their card through it.[27] These devices are often used in conjunction with a miniature camera to read the user's personal identification number at the same time.[28] This method is being used in many parts of the world, including South America, Argentina,[29] and Europe.[30]
Unexpected repeat billing
[edit]Online bill paying or internet purchases utilizing a bank account are a source for repeat billing known as "recurring bank charges". These are standing orders or banker's orders from a customer to honour and pay a certain amount every month to the payee. With E-commerce, especially in the United States, a vendor or payee can receive payment by direct debit through the ACH Network. While many payments or purchases are valid, and the customer has intentions to pay the bill monthly, some are known as Rogue Automatic Payments.[31]
Another type of credit card fraud targets utility customers. Customers receive unsolicited in-person, telephone, or electronic communication from individuals claiming to be representatives of utility companies. The scammers alert customers that their utilities will be disconnected unless an immediate payment is made, usually involving the use of a reloadable debit card to receive payment. Sometimes the scammers use authentic-looking phone numbers and graphics to deceive victims.
Phishing
[edit]Phishing is one of the most common methods used to steal personal data. It is a type of cyber attack in which the attacker acts as a credible person, institution, or entity and attempts to lure the victim into accepting a message or taking action with the specific request. Often, the target of the attack will receive an email or text message about something they would possibly want or need with the hope of tricking them into opening or downloading the message. During the COVID-19 pandemic, phishing has been on the rise as our world turned even more virtual. To give perspective, "researchers noted a substantial spike of 667% in COVID-19 phishing attacks in the first months of the pandemic.".[32] Also, given the significance of health care systems over these recent years health care companies have been the main targets of phishing attacks. These companies have tons of personal data stored that can be extremely valuable to the attacker.
Information sharing
[edit]Information sharing is the transfer or exchange of data between individuals, companies, organizations, and technologies. Advances in technology, the internet, and networks have accelerated the growth of information sharing. Information is spread and shared in the matter of seconds, and is being accumulated and digested at speeds faster than ever before. People are often not aware of how much sensitive and personal information they share every day. For example, when purchasing goods online, the buyer's name, email address, home address, and credit card information are stored and shared with third parties to track them and their future purchases. Organizations work hard to keep individuals' personal information secure in their databases, but sometimes hackers are able to compromise its security and gain access to an immense amount of data. One of the largest data breaches occurred at the discount retailer Target. In this breach about 40 million shopper were affected. In this specific case, the hackers targeted their point-of-sale system – meaning "they either slipped malware into the terminals where customers swipe their credit cards, or they collected customer data while it was on route from Target to its credit card processors."[33] In just one single purchase at the register, masses of personal data is collected which when stolen has major ramifications. The financial market infrastructure and payment system will continue to be a work-in-progress as it constantly is at battle with security hackers.
Regulation and governance
[edit]United States
[edit]While not federally mandated in the United States PCI DSS is mandated by the Payment Card Industry Security Standard Council, which is composed of major credit card brands and maintains this as an industry standard. Some states have incorporated the standard into their laws.
Proposed toughening of federal law
[edit]The US Department of Justice announced in September 2014 that it will seek to impose a tougher law to combat overseas credit card trafficking. Authorities say the current statute is too weak because it allows people in other countries to avoid prosecution if they stay outside the United States when buying and selling the data and do not pass their illicit business through the U.S. The Department of Justice asks US Congress to amend the current law that would make it illegal for an international criminal to possess, buy or sell a stolen credit card issued by a U.S. bank independent of geographic location.[34]
Cardholder liability
[edit]In the US, federal law limits the liability of cardholders to $50 in the event of theft of the actual credit card, regardless of the amount charged on the card, if reported within 60 days of receiving the statement.[35] In practice, many issuers will waive this small payment and simply remove the fraudulent charges from the customer's account if the customer signs an affidavit confirming that the charges are indeed fraudulent. If the physical card is not lost or stolen, but rather just the credit card account number itself is stolen, then federal law guarantees cardholders have zero liability to the credit card issuer.[36]
United Kingdom
[edit]In the UK, credit cards are regulated by the Consumer Credit Act 1974 (amended 2006). This provides a number of protections and requirements. Any misuse of the card, unless deliberately criminal on the part of the cardholder, must be refunded by the merchant or card issuer.
The regulation of banks in the United Kingdom is undertaken by the: Bank of England (BoE); Prudential Regulation Authority (PRA) a division of the BoE; and the Financial Conduct Authority (FCA) who manages the day to day oversight. There is no specific legislation or regulation that governs the credit card industry. However, the Association for Payment Clearing Services (APACS) is the institution that all settlement members are a part of. The organisation works under the Banking Consolidation Directive to provide a means by which transactions can be monitored and regulated.[37] UK Finance is the association for the UK banking and financial services sector, representing more than 250 firms providing credit, banking and payment-related services.
Australia
[edit]In Australia, credit card fraud is considered a form of identity crime. The Australian Transaction Reports and Analysis Centre has established standard definitions in relation to identity crime for use by law enforcement across Australia:
- The term identity encompasses the identity of natural persons (living or deceased) and the identity of bodies corporate
- Identity fabrication describes the creation of a fictitious identity
- Identity manipulation describes the alteration of one's own identity
- Identity theft describes the theft or assumption of a pre-existing identity (or significant part thereof), with or without consent and whether, in the case of an individual, the person is living or deceased
- Identity crime is a generic term to describe activities/offences in which a perpetrator uses a fabricated identity, a manipulated identity, or a stolen/assumed identity to facilitate the commission of a crime(s).[38]
Hong Kong
[edit]Given increasing number of unauthorised payment card transactions involving frauds and scams, the Hong Kong Monetary Authority issued two Circulars on 25 April 2023.[39]
Losses
[edit]Estimates created by the Attorney-General's Department show that identity crime costs Australia upwards of $1.6 billion each year, with the majority of about $900 million being lost by individuals through credit card fraud, identity theft and scams.[38] In 2015, the Minister for Justice and Minister Assisting the Prime Minister for Counter-Terrorism, Michael Keenan, released the report Identity Crime and Misuse in Australia 2013–14. This report estimated that the total direct and indirect cost of identity crime was closer to $2 billion, which includes the direct and indirect losses experienced by government agencies and individuals, and the cost of identity crimes recorded by police.[40]
Cardholder liability
[edit]The victim of credit card fraud in Australia, still in possession of the card, is not responsible for anything bought on it without their permission. However, this is subject to the terms and conditions of the account. If the card has been reported physically stolen or lost the cardholder is usually not responsible for any transactions not made by them, unless it can be shown that the cardholder acted dishonestly or without reasonable care.[38]
Vendors vs merchants
[edit]To prevent vendors from being "charged back" for fraud transactions, merchants can sign up for services offered by Visa and MasterCard called Verified by Visa and MasterCard SecureCode, under the umbrella term 3-D Secure. This requires consumers to add additional information to confirm a transaction.[citation needed]
Often enough online merchants do not take adequate measures to protect their websites from fraud attacks, for example by being blind to sequencing. In contrast to more automated product transactions, a clerk overseeing "card present" authorization requests must approve the customer's removal of the goods from the premises in real time.[citation needed]
If the merchant loses the payment, the fees for processing the payment, any currency conversion commissions, and the amount of the chargeback penalty. For obvious reasons, many merchants take steps to avoid chargebacks – such as not accepting suspicious transactions. This may spawn collateral damage, where the merchant additionally loses legitimate sales by incorrectly blocking legitimate transactions. Mail Order/Telephone Order (MOTO) merchants are implementing agent-assisted automation which allows the call center agent to collect the credit card number and other personally identifiable information without ever seeing or hearing it. This greatly reduces the probability of chargebacks and increases the likelihood that fraudulent chargebacks will be overturned.[41]
Famous credit fraud attacks
[edit]Between July 2005 and mid-January 2007, a breach of systems at TJX Companies exposed data from more than 45.6 million credit cards. Albert Gonzalez is accused of being the ringleader of the group responsible for the thefts.[42] In August 2009 Gonzalez was also indicted for the biggest known credit card theft to date – information from more than 130 million credit and debit cards was stolen at Heartland Payment Systems, retailers 7-Eleven and Hannaford Brothers, and two unidentified companies.[43]
In 2012, about 40 million sets of payment card information were compromised by a hack of Adobe Systems.[44] The information compromised included customer names, encrypted payment card numbers, expiration dates, and information relating to orders, Chief Security Officer Brad Arkin said.[45]
In July 2013, press reports indicated four Russians and a Ukrainian were indicted in the U.S. state of New Jersey for what was called "the largest hacking and data breach scheme ever prosecuted in the United States."[46] Albert Gonzalez was also cited as a co-conspirator of the attack, which saw at least 160 million credit card losses and excess of $300 million in losses. The attack affected both American and European companies including Citigroup, Nasdaq OMX Group, PNC Financial Services Group, Visa licensee Visa Jordan, Carrefour, JCPenney and JetBlue Airways.[47]
Between 27 November 2013 and 15 December 2013, a breach of systems at Target Corporation exposed data from about 40 million credit cards. The information stolen included names, account numbers, expiry dates, and card security codes.[48]
From 16 July to 30 October 2013, a hacking attack compromised about a million sets of payment card data stored on computers at Neiman-Marcus.[44][49] A malware system, designed to hook into cash registers and monitor the credit card authorisation process (RAM-scraping malware), infiltrated Target's systems and exposed information from as many as 110 million customers.[50]
On 8 September 2014, The Home Depot confirmed that their payment systems were compromised. They later released a statement saying that the hackers obtained a total of 56 million credit card numbers as a result of the breach.[51]
On 15 May 2016, in a coordinated attack, a group of around 100 individuals used the data of 1600 South African credit cards to steal US$12.7 million from 1400 convenience stores in Tokyo within three hours. By acting on a Sunday and in another country than the bank which issued the cards, they are believed to have won enough time to leave Japan before the heist was discovered.[52]
Countermeasures to combat card payment fraud
[edit]Countermeasures to combat credit card fraud include the following.
By merchants
[edit]- PAN truncation – not displaying the full primary account number on receipts
- Tokenization (data security) – using a reference (token) to the card number rather than the real card number
- Requesting additional information, such as a PIN, ZIP code, or Card Security Code
- Performing geolocation validation, such as IP address
- Use of Reliance Authentication, indirectly via PayPal, or directly via iSignthis or miiCard.
By card issuers
[edit]- Fraud detection and prevention software[53][54][55][56] that analyzes patterns of normal and unusual behavior as well as individual transactions in order to flag likely fraud. Profiles include such information as IP address.[57] Technologies have existed since the early 1990s to detect potential fraud. One early market entrant was Falcon;[54] other leading software solutions for card fraud include Actimize, SAS, BAE Systems Detica, and IBM.
- Fraud detection and response business processes such as:
- Contacting the cardholder to request verification
- Placing preventative controls/holds on accounts that may have been victimized
- Blocking card until transactions are verified by the cardholder
- Investigating fraudulent activity
- Strong Authentication measures such as:
- Multi-factor Authentication, verifying that the account is being accessed by the cardholder through requirement of additional information such as account number, PIN, ZIP, challenge questions. There are five main factors to multi-factor authentication and they include:[58]
- Knowledge - things a user knows such as passwords or answers to secret questions.
- Possession - an object the user should have in their possession such as the actual credit card.
- Inherence - a biological trait of the user such as finger-print or facial recognition.
- Location - where the user is at the time of the authentication - verify the user was the one to use the card.
- Time - when the authentication is taking place - is it a strange hour or multiple times?
- Multi possession-factor authentication, verifying that the account is being accessed by the cardholder through requirement of additional personal devices such as smart watch, smart phone challenge–response authentication[59]
- Out-of-band Authentication,[60] verifying that the transaction is being done by the cardholder through a "known" or "trusted" communication channel such as text message, phone call, or security token device
- Multi-factor Authentication, verifying that the account is being accessed by the cardholder through requirement of additional information such as account number, PIN, ZIP, challenge questions. There are five main factors to multi-factor authentication and they include:[58]
- Industry collaboration and information sharing about known fraudsters and emerging threat vectors[61][62]
- Automated Data Controls:
- The use of automated data controls which are used to recognize when unusual activity or spending occur with a credit card. These controls can be used in real time to react "...to anything suspicious they come upon, so the flow of fraudulent activity is stopped as soon as possible..." (Johnston).[63] The three main ways automated data controls protect information includes:
- Reconciliation and verification to ensure that the controls are working properly.
- Continuous monitoring and alerting which alerts the cardholder/bank when unusual activity is taking place.
- Reporting which ensures organizations have proper controls in place to prevent fraudulent activity
By banks and financial institutions
[edit]- Internal self-banking area for the customer to carry out the transactions regardless of the weather conditions. The access door:
- Identifies every cardholder that gains access to the designated area
- Increases protection for customers during self-service procedures
- Protects the ATMs and banking assets against unauthorized usage
- The protected area can also be monitored by the bank's CCTV system
- Cards use CHIP identification (ex PASSCHIP [64]) to decrease the possibility of card skimming
By governmental and regulatory bodies
[edit]- Enacting consumer protection laws related to card fraud
- Performing regular examinations and risk assessments of credit card issuers[65]
- Publishing standards, guidance, and guidelines for protecting cardholder information and monitoring for fraudulent activity[66]
- Regulation, such as that introduced in the SEPA and EU28 by the European Central Bank's 'SecuRe Pay'[67] requirements and the Payment Services Directive 2[68] legislation.
By cardholders
[edit]- Reporting lost or stolen cards
- Reviewing charges regularly and reporting unauthorized transactions immediately
- Keeping a credit card within the cardholder's view at all times, such as in restaurants and taxis
- Installing virus protection software on personal computers
- Using caution when using credit cards for online purchases, especially on non-trusted websites, make sure site is reputable
- Keeping a record of account numbers, their expiration dates, and the phone number and address of each company in a secure place.[69]
- Not sending credit card information by unencrypted email
- Not keeping written PIN numbers with the credit card.
- Not giving out credit card numbers and other information online
- Sign up for transaction alerts when card is used
- Be aware of phishing schemes
Disparities and Ethical Dilemmas in Credit Card Fraud
[edit]Generation Differences
- Millennials are the biggest victims of all fraud, including credit and debit card fraud, digital wallet, digital payment, banking and tax fraud. Followed by them are the GenXers and then the GenZers.
- Millennials spend the most time trying to recover money lost due to fraudulent charges, disputing fraudulent charges, and checking accounts for fraudulent or unusual activity out of any of the generational groups.[70]
- GenZers experienced fraud most often through digital payment apps such as PayPal, Venmo and Square. The other generations experienced most of their issues through credit card fraud.
- Baby Boomers were found to have the lowest instances of fraudulent charges, and also spent the least amount of time trying to recover money due to fraudulent charges or to dispute these charges.
Racial Differences
- "The Federal Trade Commission ("FTC") and the Consumer Financial Protection Bureau ("CFPB") produced reports on the connection between minority populations and consumer issues. Each report came to the same conclusion: unfair and deceptive practices have unique and disproportionate impacts on communities of color. These findings suggest that more needs to be done to protect these communities from fraud."[71] On top of this, hackers specifically target communities of color for reasons such as their need for additional income or credit, or their tendency to use certain types of financial products.
- Additional report findings:[71]
- While Black and Latino consumers are more likely to experience fraud, Latino communities predominantly underreport compared with Black and White communities.
- Latino and Black consumers report different rates of fraud concerning distinct categories of problem. The FTC found that their complaint database showed Black, and to a lesser extent Latino, communities experience higher rates of problems with credit bureaus and debt collections than White communities.
- White and Latino communities experience higher rates of impersonator scams than Black communities. Also, according to FTC payment method data, Black and Latino communities use credit cards, with their accompanying legal protections, at a substantially lower rate than in White communities.
Additional technological features
[edit]See also
[edit]- Carding (fraud)
- Chargeback fraud
- Chargeback insurance
- FBI
- Financial crimes
- Identity theft
- Immigration and Customs Enforcement (ICE)
- Internet fraud
- Organized crime
- Phishing
- Predictive analytics
- Reimbursement
- Social Engineering
- Traffic analysis
- United States Postal Inspection Service
- United States Secret Service
- White-collar crime
References
[edit]- ^ "Credit Card Fraud - Consumer Action" (PDF). Consumer Action. Retrieved 28 November 2017.
- ^ "Official PCI Security Standards Council Site - Verify PCI Compliance, Download Data Security and Credit Card Security Standards". www.pcisecuritystandards.org. Retrieved 1 October 2021.
- ^ "FRAUD THE FACTS 2019 - The definitive overview of payment industry fraud" (PDF). UK Finance.
- ^ "Credit card fraud: the biggest card frauds in history". uSwitch. Retrieved 29 December 2019.
- ^ "Court filings double estimate of TJX breach". 2007.
- ^ Irby, LaToya. "9 Ways to Keep Credit Card Fraud From Happening to You". The Balance. Archived from the original on 30 November 2020. Retrieved 29 December 2019.
- ^ "Preventing payment fraud | Barclaycard Business". www.barclaycard.co.uk. Retrieved 29 December 2019.
- ^ "Advances in Computational Intelligence | Volume 2, issue 2". SpringerLink. Retrieved 28 April 2022.
- ^ Woolston, Sarah (2017). "Machine Learning Methods for Credit Card Fraud Detection". Proquest. ProQuest 1954696965.
- ^ "Application fraud". Action Fraud. Retrieved 29 December 2019.
- ^ "Watching Out for New Account Fraud". www.chargebackgurus.com. 14 August 2021. Retrieved 5 May 2022.
- ^ Han, Yaodong; Yao, Shun; Wen, Tie; Tian, Zhenyu; Wang, Changyu; Gu, Zheyuan (December 2020). "Detection and Analysis of Credit Card Application Fraud Using Machine Learning Algorithms". Journal of Physics: Conference Series. 1693 (1): 012064. Bibcode:2020JPhCS1693a2064H. doi:10.1088/1742-6596/1693/1/012064. ISSN 1742-6596.
- ^ Pandey, Vanita (19 July 2017). "Forrester Wave Report: ThreatMetrix and the Revolution in Risk-Based User Authentication". ThreatMatrix. Retrieved 28 November 2017.
- ^ Siciliano, Robert (27 October 2016). "What Is Account Takeover Fraud?". the balance. Archived from the original on 12 September 2017. Retrieved 28 November 2017.
- ^ "Visa U.S. Chip Update: June 2016 Steady progress in chip adoption" (PDF). VISA. 1 June 2016. Retrieved 28 November 2017.
- ^ Credit card fraud: What you need to know
- ^ "What Hackers Want More Than Your Credit Card Number | Credit.com". Credit.com. 1 September 2015. Archived from the original on 30 May 2016. Retrieved 16 May 2016.
- ^ By (21 August 2021). "What Is Account Takeover Fraud and How to Prevent It". www.experian.com. Retrieved 5 May 2022.
- ^ Kawase, Ricardo; Diana, Francesca; Czeladka, Mateusz; Schüler, Markus; Faust, Manuela (12 September 2019). "Internet Fraud: The Case of Account Takeover in Online Marketplace". Proceedings of the 30th ACM Conference on Hypertext and Social Media. HT '19. New York, NY, USA: Association for Computing Machinery. pp. 181–190. doi:10.1145/3342220.3343651. ISBN 978-1-4503-6885-8.
- ^ "Social engineering scams". www.interpol.int. Retrieved 5 March 2024.
- ^ "Business Advice". Take Five. Archived from the original on 5 September 2018. Retrieved 29 December 2019.
- ^ "Social Engineering Fraud Explained | - with Get Indemnity". getindemnity.co.uk. Retrieved 29 December 2019.
- ^ Masjedi, Yaniv. Benny, Alina (ed.). "How Does Debit Card Fraud Happen? Can You Avoid It?". Aura. Retrieved 5 March 2024.
- ^ Inside Job/Restaurant card skimming. Journal Register.
- ^ Little, Allan (19 March 2009). "Overseas credit card scam exposed". bbc.co.uk.com.
- ^ NACS Magazine – Skimmming Archived 27 February 2012 at the Wayback Machine. nacsonline.com
- ^ William Westhoven (17 November 2016). "Theft ring rigged Florham Park ATM, attorney general says". Daily Record (Morristown). Retrieved 18 November 2016.
- ^ ATM Camera Snopes.com
- ^ "Piden la captura internacional de un estudiante de Ingeniería" (in Spanish). 2 November 2010.
- ^ "A Dramatic Rise in ATM Skimming Attacks". Krebs on Security. 2016.
- ^ "Rogue automatic payments"- Retrieved 2016-02-07
- ^ Kikerpill, Kristjan, and Andra Siibak. "MAZEPHISHING: THE COVID-19 PANDEMIC AS CREDIBLE SOCIAL CONTEXT FOR SOCIAL ENGINEERING ATTACKS." Trames, vol. 25, no. 4, Dec. 2021, pp. 371+. Gale Academic OneFile, link.gale.com/apps/doc/A685710807/AONE?u=udel_main&sid=bookmark-AONE&xid=2f58412d. Accessed 28 Apr. 2022.
- ^ "Target: 40 million credit cards compromised". CNNMoney. 18 December 2013. Retrieved 9 May 2022.
- ^ Tucker, Eric. "Prosecutors target credit card thieves overseas". AP. Retrieved 13 September 2014.
- ^ "Section 901 of title IX of the Act of May 29, 1968 (Pub. L. No. 90-321), as added by title XX of the Act of November 10, 1978 (Pub. L. No. 95-630; 92 Stat. 3728), effective May 10, 1980". Archived from the original on 14 April 2002. Retrieved 25 May 2017.
- ^ "Lost or Stolen Credit, ATM, and Debit Cards". Ftc.gov. 6 August 2012. Retrieved 2 August 2014.
- ^ "Who Regulates Credit Card Merchant Services in the UK?". GB Payments. 23 January 2019. Retrieved 29 December 2019.
- ^ a b c "Identity Crime". Australian Federal Police. Commonwealth of Australia. 2015.
- ^ "Hong Kong Monetary Authority Issued Two Circulars to Authorized Institutions Regarding Payment Cards". Mayer Brown. Retrieved 27 April 2023.
- ^ "Identity crime in Australia". www.ag.gov.au. Commonwealth of Australia Attorney-General's Department. 2015.
- ^ Adsit, Dennis (21 February 2011). "Error-proofing strategies for managing call center fraud". isixsigma.com. Archived from the original on 15 June 2011.
- ^ Zetter, Kim (25 March 2010). "TJX Hacker Gets 20 Years in Prison". WIRED. Wired Magazine.
- ^ Goodin, Dan (17 August 2009). "TJX suspect indicted in Heartland, Hannaford breaches". The Register.
- ^ a b Skimming Off the Top; Why America has such a high rate of payment-card fraud, 15 February 2014, The Economist
- ^ Krebs, Brian (4 October 2014). "Adobe hacked: customer data, source code compromised". The Sydney Morning Herald. The Sydney Morning Herald Newspaper.
- ^ Russian hackers charged in 'biggest' data breach case, 160mn credit card numbers stolen, 25 July 2013, Catherine Benson, Reuters
- ^ "Six charged in biggest credit card hack on record". CNBC. Reuters. 25 July 2013.
- ^ "Target Faces Backlash After 20-Day Security Breach". The Wall Street Journal.
- ^ Neiman Marcus Data Breach FAQ: What to Do Now, by Paul Wagenseil, 27 January 2014, Tom's guide
- ^ Perlroth, Elizabeth A.; Popper, Nathaniel; Perlroth, Nicole (23 January 2014). "Neiman Marcus Data Breach Worse Than First Said". The New York Times. ISSN 0362-4331.
- ^ Stempel, Jonathan (24 November 2020). "Home Depot reaches $17.5 million settlement over 2014 data breach". Reuters. Retrieved 15 April 2021.
- ^ McCurry, Justin (23 May 2016). "100 thieves steal $13m in three hours from cash machines across Japan". The Guardian. Retrieved 23 May 2016.
- ^ Le Borgne, Yann-Aël; Bontempi, Gianluca (2021). "Machine Learning for Credit Card Fraud Detection - Practical Handbook". Retrieved 26 April 2021.
- ^ a b Hassibi PhD, Khosrow (2000). Detecting Payment Card Fraud with Neural Networks in the book titled "Business Applications of Neural Networks". World Scientific. ISBN 9789810240899. Retrieved 10 April 2013.
- ^ "Risk — Smarter Risk Management for Financial Services". Archived from the original on 25 September 2011. Retrieved 14 July 2011.
- ^ Richardson, Robert J. "Monitoring Sale Transactions for Illegal Activity" (PDF). Archived from the original (PDF) on 27 March 2012. Retrieved 14 July 2011.
- ^ "10 Measures to Reduce Credit Card Fraud". 10 Measures to Reduce Credit Card Fraud for Internet Merchants. FraudLabs Pro. Archived from the original on 16 July 2011. Retrieved 14 July 2011.
- ^ Dasgupta, Dipankar; Roy, Arunava; Nag, Abhijit (2017), Dasgupta, Dipankar; Roy, Arunava; Nag, Abhijit (eds.), "Multi-Factor Authentication", Advances in User Authentication, Infosys Science Foundation Series, Cham: Springer International Publishing, pp. 185–233, doi:10.1007/978-3-319-58808-7_5, ISBN 978-3-319-58808-7, S2CID 63285720, retrieved 28 April 2022
- ^ Alhothaily, Abdulrahman; Alrawais, Arwa; Cheng, Xiuzhen; Bie, Rongfang (2014). "Towards More Secure Cardholder Verification in Payment Systems". Wireless Algorithms, Systems, and Applications. Lecture Notes in Computer Science. Vol. 8491. pp. 356–367. doi:10.1007/978-3-319-07782-6_33. ISBN 978-3-319-07781-9. ISSN 0302-9743.
- ^ "FFIEC: Out-of-Band Authentication". BankInfoSecurity. Retrieved 14 July 2011.
- ^ "Early Warning Systems". Early Warning Systems. Archived from the original on 24 July 2011. Retrieved 14 July 2011.
- ^ "Financial Services - Information Sharing and Analysis Center". FS-ISAC. Retrieved 14 July 2011.
- ^ "Payment Card Industry Security: Importance of Data Integrity | ISACA Journal". ISACA. Retrieved 28 April 2022.
- ^ "ATM Access Control Solution - PASSCHIP". passchip.com. Retrieved 20 July 2018.
- ^ "IT Booklets » Information Security » Introduction » Overview". FFIEC IT Examination Handbook - Credit Cards. FFIEC. Archived from the original on 7 July 2011. Retrieved 14 July 2011.
- ^ "IT Booklets » Retail Payment Systems » Retail Payment Systems Risk Management » Retail Payment Instrument Specific Risk Management Controls". FFIEC IT Examination Handbook - Credit Cards. FFIEC. Archived from the original on 8 July 2011. Retrieved 14 July 2011.
- ^ "ECB releases final Recommendations for the security of internet payments and starts public consultation on payment account access services". 31 January 2013.
- ^ "2013/0264(COD) - 24/07/2013 Legislative proposal".
- ^ "Consumer Information - Federal Trade Commission".
- ^ IBM. "IBM Study Finds Broad Differences in Geographical, Generational Impact of Financial Fraud and Attitudes Toward Financial Institutions". www.prnewswire.com (Press release). Retrieved 9 May 2022.
- ^ a b "Communities of Color, Fraud, and Consumer Protection Agencies". National Association of Attorneys General. 1 February 2022. Retrieved 9 May 2022.
External links
[edit]This article's use of external links may not follow Wikipedia's policies or guidelines. (March 2016) |
- Federal Financial Institutions Examination Council (FFIEC) IT Booklets » Information Security » Appendix C: Laws, Regulations, and Guidance
- Visa's fraud control basics for merchants
- The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center(NW3C).
- Internet Fraud, with a section "Avoiding Credit Card Fraud", at the Federal Bureau of Investigation website
- US Federal Trade Commission Consumer Sentinel Network Report