Fraud Mobility Ken Meiser VP- Identity Solutions.

Slides:



Advertisements
Similar presentations
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
Advertisements

Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
My Name is Todd Davis My Social Security # is
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
About ONLINE Industry leader for more than 50 years Headquartered in North Carolina Originally a small merchant credit bureau In 1997, focus shifted from.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
1 Personal Health Information Data Breach. What Happened? March 10, 2012: Computer hackers illegally access a Department of Technology Services (DTS)
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
2015 ANNUAL TRAINING By: Denise Goff
Secure Electronic Transaction (SET)
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Protecting Your Information Assets
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
1 Transaction or Issue Clean Up. 2 Customer Protection and 814_08 Issue (Phase 2 – Potentially Late 08s) Background Completed Items Next Steps.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Your Assets By Preventing Identity Theft 1.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Fraud Procedures Tips for Mitigation Fraud Case Process.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
BaiRong Financial Information Services, Ltd. (100Credit.com)
2016 FRAUD.
Family Economics & Financial Education G1 © Family Economics & Financial Education – Revised October 2004 – Credit Unit – Selecting a Credit Card.
Bringing Business Fraud to Life: The stories behind the numbers
Protecting Your Assets By Preventing Identity Theft
What’s a Credit Score? And how to use credit wisely.
GRAMEEN in the UK Set up, mission and future development Background
Maximizing Sales Call Center Agents: Shared Services Model
Combating Identity Fraud In A Virtual World
Take Charge of your Finances
Fraud Protection.
Fraud protection.
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Gift Card Risk Mitigation – Presentation A
Fraud Prevention Solutions Make it secure, keep it simple!
Presentation on Unsecured Personal Loan (UPL) Market
Protecting What’s Yours: Your Identity
EMV & Parking – 6 Months On
Chapter 11 Building a Customer-Centric Organization – Customer Relationship Management 11-1.
Take Charge of your Finances
Biometric Identity Misrepresentation Risk in Transactional Processes
Tax Identity Theft Presenter Date
BY GAWARE S.R. DEPT.OF COMP.SCI
Winnetka Police Department
Understanding best practices in classifying sensitive data
Personal Finance Portfolio Management App for Better ROI and Control As portfolios become more diverse, they naturally become more complex. This increased.
Michael Brauneis Managing Director Chicago Office
Red Flags Rule An Introduction County College of Morris
Session 15: The Pricing imperative
2013 Terex HR Process Timetable (1st half)
Federal Reserve Retail Payments Risk Forum
Clemson University Red Flags Rule Training
Protecting Your Credit Identity
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Take Charge of your Finances
Selecting a Credit Card
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
IBM Software A financial services company speeds up fraud detection Protecting customers and innovating new product offerings with an IBM business rules.
Is someone pretending to be you?
Jeremy Grant Coordinator Better Identity Coalition
Strategic Business Services – Operations
Presentation transcript:

Fraud Mobility Ken Meiser VP- Identity Solutions

LifeLock: Layers Of Protection DETECT Stopping Fraud Before Financial Harm to Consumer or Company ALERT Providing Consumers with visibility into how and where their identity is being used RESTORE Trained experts to assist you when compromise occurs Education Security Technology

Two Critical Areas of Focus for ID Analytics 1 Enable better fraud, identity and risk decisions for leading U.S. organizations 300+ Companies, including most Top Credit Card Issuers, Banks and Wireless Carriers 2 Protect consumers from fraud by generating unique alerts, innovations and insights As part of LifeLock, ID Analytics is heavily focused on protecting consumers from fraud and identity theft. We approach this in two distinct and critical ways. We work with leading financial institutions, lenders, and businesses to stop fraud attempts before new accounts are booked. We send new account opening alerts directly to consumers through LifeLock. This combined approach enables ID Analytics to stop some fraud before it happens and empower consumers to protect themselves if it gets through.

An ecosystem to protect consumers & enterprises 1 2 3 Name SSN Date of Birth Address Phone Email Application ID Analytics’ Client ID Analytics sends back risk assessment Alert 5 4 Consumer Alert To help our clients control fraud, they send application data to ID Analytics for evaluation nearly a million times a day. We return a risk assessment of the application to the client. Consumers cannot be declined credit based on fraud risk, but the lenders are able to investigate the application more carefully to ensure it is legitimate. This is critical to protecting at risk populations, such as the elderly. In addition, clients ask us to notify LifeLock members of all applications matching their identity.

Study Goals and Methodology Q: Do fraudsters follow a pattern within and across industries? What behavior does a victim’s identity exhibit before and after a fraudulent event? What are the long-term implications for a consumer with a compromised identity? Extract from four industries: Telecom Bank Card Retail Card Auto & Consumer Seen at least twice between: SSNs 68M 2.9M Fraudulent Events Extract from telecom, Credit Card, Retail Card, Auto Consumer lending 68million SSNs seen AT LEAST twice between July 2010 and July 2015 2.9M fraudulent events

Normal Application Cadence Non-Compromised Identity Retail Retail Retail Telco Bankcard 2004 2006 2008 2010 2012 2014 2016 - Tony has been seen in the ID Network five times over eleven years with an overall application rate of roughly one application every two years Tony’s SSN was never associated with a client-confirmed fraud The event of Tony’s non-compromised application (randomly chosen from all the non-compromised applications) was seen in December 2008 on a retail credit-card application Prior to this event, Tony was seen submitting two applications, approximately one every two and a half years (both seen in the retail credit card industry) After the 2008 event, Tony’s behavior remained consistent, submitting two more applications over the next six years at an average rate one new application every three years. These subsequent applications crossed multiple industries (e.g., one telecommunications, one bankcard)

Fraudulent Application Cadence Compromised Identity Bankcard Telco Retail March 12, 2006 July 7, 2011 February 21, 2014 February 22, 2014 October 18, 2014 - Applications with Fred’s SSN were seen in the ID Network without any associations to fraud for 11 years averaging roughly one new application every five years. During this time Fred was seen applying to two bankcard enterprises In February 2014, Fred’s SSN was first reported by a telecommunications client as being associated with a fraudulent application Later that same day, Fred’s SSN was seen in a new account application that went on to be confirmed as a fraudulent event in the retail credit card industry and there were three additional new-account applications with three different telecommunication enterprises (one of which resulted in a third instance of confirmed fraud) The following day, Fred’s SSN was seen on an application for a retail credit card October 2014, two new applications with Fred’s SSN are submitted to retail card issuers and later confirmed as associated with fraud by the enterprises

Aggregated Cadence Comparison Once a SSN has been compromised, it remains at risk Pre and Post Application Velocity for a Compromised Application vs a Non-Compromised Application Compromised identity 6xs higher within the first day Compromised identity 5xs higher after 360 days Compromised SSN Non-Compromised SSN Compromised SSN Non-Compromised SSN Similar behavior seen until 10 days prior to the event Blue line 180-360 before and after as examples of a pretty symmetrical line Increase in traffic toward the end is partially explained by growth of the network In general, transactions cluster Orange line higher than blue because fraud behavior begets a higher overall volume over the entire window Blue l Compromised identities are seen 7xs 10 days after the event 46% of the 0-10 day events happen in the first 24 hours A second spike in the non-compromised identities is seen after 180 days

Market concentration patterns suggest fraud specialization Victims Remain Vulnerable within Specific Markets in the Short-Term Probability of Crossing Industry 0% 10% 20% 30% 40% 50% 60% 70% 0-10 10-30 30-90 90-180 180-360 360+ Days 21% 48% 53% 55% 57% 62% 63% Compromised SSN Non-Compromised SSN Compromised SSN 23% 7% 13% 16% Non-Compromised SSN During the first 10 days, 93% of multiple fraud occurrences took place within the same industry