A Secret Service Perspective on Credit Card Fraud

Slides:



Advertisements
Similar presentations
Current Fraud Trends Kathy Druckenmiller, CFCI, CIRM, ACT Specialist April 29, /29/2014.
Advertisements

Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Introduction and Overview of Digital Crime and Digital Terrorism
Credit Card Fraud The Scale of the Problem Michael Moore Regional Security & Fraud Investigation Manager 14 – 17 Nov 2005 Security & Safety – Middle East.
1 U.S. EMV Migration Update and Best Practices Hap Huynh, Senior Director Risk Products April 2015.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Target Data Breach – Cost of the Learning Curve Discuss the recent Target data breach and its impact on the industry as well as individuals January 29/30,
Identity Theft and the Impact on the Telecom Industry Debbie Ogle Corporate Security Fraud Manager January 27, 2005.
Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 7.2 October 24, 2011.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Bank Card Protector Policy Frates Insurance & Risk Management By Thomas P Mulligan
Anti-Fraud Committee ICT Symposium. “ To play a core role in the growth and stability of the financial sector, through advocacy and representation; and.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
RISK MANAGEMENT. RISK IS INEVITABLE  From your research of local businesses, what Risk was unavoidable and why?  Speculative Vs. Pure Risk  Speculative=
CREDIT CARD FRAUD. TYPES OF CREDIT CARD FRAUD Counterfeit credit card use. Card lost or stolen by the card holder. Fraud committed without the actual.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Getnationwide.com Let’s Talk about EMV Danielle Rourke.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Security A Payments Perspective Terry Dooley EVP & CIO SHAZAM Network.
Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 6.1 March 1, 2010 Identity Theft & Credit Card Fraud 6.1 March 1, 2010.
Midsouth User Group Annual Conference
Protecting Yourself from Fraud including Identity Theft Personal Finance.
EMV: What is it and how will it impact your business.
1. CONSUMER FINANCES FCS-CA-8. Students will investigate various financial aspects of consumer life.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
U.S. Department of Homeland Security United States Secret Service MCPF PRESENTATION Evolving Financial CrimeTrends & The Gateway ECTF ASAIC Doug Roberts.
IRS, CRIMINAL INVESTIGATION AND IDENTITY THEFT/DATA BREACHES
CREDIT CARD PAYMENT SYSTEM System involves Several major participants Purchaser that is cardholder Card Issuer that issues credit card Merchant that makes.
Fraud Prevention  In today’s world net banking is providing a better and faster way to carry out business. In the real world, everyone is looking for.
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Credit and Insurance Credit Principles and Practices Managing.
EMV Operation and Attacks Tyler Moore CS7403, University of Tulsa Reading: Anderson Security Engineering, Ch (136—138), (328—343) Papers.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Business Technology Mr. Bernstein Greene, pp : Insure Against Risks January 15, 2013.
You’ve Been Hacked! What to do when your personal information has been compromised Paul T. Yoder, Information Systems Security Specialist.
Antisocial use of ICT and Computer Fraud
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Gift Card Risk Mitigation – Presentation A
EMV & Parking – 6 Months On
A Project on CYBER SECURITY
Consider cards over cash
#1 Consumer Fraud Complaint – 5th straight year!
Consider cards over cash
cybercrime Presented to you by : NAMES MATRIC NO
Chapter 11 crime and security in the networked economy
UNDERSTANDING THE COST OF A CHARGEBACK The entire merchant industry has been suffering in terms of revenue due to fraud. According to annual study, the.
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Partnering to Minimize the Impact of Data Compromises
What every consumer should know
Consider cards over cash
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Protecting Yourself from Fraud including Identity Theft
Chip & Pin and Apple Pay: Vulnerabilities of the Changing Payment Systems Jay Isaacson.
Threats Facing Industry –
Protecting Your Company’s Most Valuable Asset
Protecting Yourself from Fraud including Identity Theft
Identity Theft.
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Protecting Yourself from Fraud including Identity Theft
2019 AFP Payments Fraud & Control Survey
Presentation transcript:

A Secret Service Perspective on Credit Card Fraud With losses estimated at over $20 Billion Worldwide last year, fraud involving credit cards has become both prolific and incredibly profitable for both the common criminal and international organized crime operations. This presentation will break down the multiple aspects of modern credit card fraud by looking at the various elements of the crime, the methods and means used by criminals, and the day to day risks for consumers when using debit or credit cards. Specific areas discussed will be the nature of data breaches or the “hacking” of computer networks for financial information, the international black markets for that data, and ultimately, how that data is used for fraudulent activity. In addition to network hacking, other illicit methods utilized to obtain credit card and other financial account information, such as “skimming” and “phishing,” will also be discussed. Other topics to be covered will include shifts in liability for fraud loss, the implementation of the EMV chip, and other changes on the horizon for those in the credit card industry. The old adage “to be forewarned is to be forearmed” is applicable to most forms of financial crime. Yet the reality is that the purchase card issuer, card administrator, and card holder have little control over their card data once it hits “cyber space.” Understanding the “how’s” and “why’s” of this type of criminal activity can not only reduce your chances of being victimized, but can also help your organization to prepare and plan should it occur. A Secret Service Perspective on Credit Card Fraud Credit Card Anatomy and Features Credit Card Numbers – what they really mean Embossed Data Magnetic Strip Data Card Verification Values (CVV) The “EMV” Chip Card Transaction Process Point of Sale to Issuing Bank – Flow of the data for each transaction How the Chip changed everything How the Criminal Element Collects Credit Card Data Point of Sale Compromises Data Breaches and Hacking – The Burglar Analogy Social Engineering and Phishing Data Skimmers EMV Chip Fraud and how the bad guys are dealing with it How the Criminals Distribute and Utilize Stolen Credit Card Data The “Dark Web” and Its Market Places Tracking how the data and money flows from Hacker to Counterfeit Credit Card Carding Forums – What they look like and what they do Law Enforcement Functions Finding the intrusion “Top Down” and “Bottom Up” methods of investigating Credit Card Fraud Avoiding Compromise Planning for and dealing with the inevitable