The Bulgarian Banking Industry’s Response to Cards Fraud and the Role of the Association in Combating Fraud Nikolay Nedkov Chairman, BASCP.

Slides:



Advertisements
Similar presentations
Lecture 3 Title: Online Payment: Credit Card and PayPal
Advertisements

Current Fraud Trends Kathy Druckenmiller, CFCI, CIRM, ACT Specialist April 29, /29/2014.
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
THE MEMBERS GROUP Safeguard Iowa Partnership – Cybersecurity Webinar Series.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Crime and Security in the Networked Economy Part 4.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
Recommendations on the future of online GyroScope & Databse implementation.
International Card Systems Skopje, Macedonia
Electronic Transaction Security (E-Commerce)
Well, Sort-of.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Electronic Payment By: El Panda. What is an electronic payment? Electronic money (also known as e-currency, e-money, electronic cash, electronic currency,
6 August 2015 Rule of law: implementing a comprehensive and integrated approach in prevention and fight against corruption in the Danube region,
Financial intelligence centre REPUBLIC OF SOUTH AFRICA Presentation to the Portfolio Committee on Trade and Industry on the Report prepared by the Gambling.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
“If you build it, they will come.”. Virtual Business  There is much more that goes into a virtual business than just building the web site.  You will.
Rule of Law: Implementing a comprehensive and integrated approach in prevention and fight against corruption in the Danube region”, November 2013.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
7 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
Bratislava October 2007 PAR - AC CoP Meeting Anti Corruption Regional Programme Regional Programme.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Internet Vulnerabilities & Criminal Activity Phishing, Nigerian 419’s, & High-Yield Investment Programs (HYIP) /31/2011.
Britannia/NET1 Web Seminar 2007 Presented By: NET1 Payment Solutions Presenter: Brian Morabito.
International conference on the future of the postage stamp “How to effectively combat illegal issues,” -What the international philatelic community can.
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
Programming of International Development Assistance Donor Sectoral Meeting Ministry of Interior September 17, 2007.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Phishing: Trends and Countermeasures Blaine Wilson.
Topic 5: Basic Security.
DEION ASSOCIATES & STRATEGIES, INC. 1 USING THE INTERNET AS A STRATEGIC BUSINESS TOOL Presented by: Mark S. Deion Deion Associates & Strategies, Inc.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
CONTROLLING INFORMATION SYSTEMS
Countering Terrorist Use of the Internet – a perspective from the United Nations (Lomonosov Moscow State University) 11 November 2010.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
COORDINATED STRATEGY TO IMPROVE FIGHT against VAT FRAUD in LITHUANIA September 2013, Riga.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Issues for Computer Users, Electronic Devices, Computer and Safety.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
E-C OMMERCE : T HE E -C ONSUMER AND THE ATTACKS AGAINST THE PERSONAL DATA Nomikou Eirini Attorney at Law, Piraeus Bar Association Master Degree in Web.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Kingdom of Cambodia 1 Anti-Corruption Mechanism In Cambodia Presenter: Mr. Try Sothearith Dean of Business Faculty of Business and Economics, Western University,
Part of Legislative Tools and Other Means To Combat Electronic Crime.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Use of Biometric Technology in Payments to avoid Frauds
Computers in Society 12/1/2018.
Business Compromise and Cyber Threat
What is Phishing? Pronounced “Fishing”
Phishing “In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
A Secret Service Perspective on Credit Card Fraud
UNODC and CYBERCRIME October 2009.
Presentation transcript:

The Bulgarian Banking Industry’s Response to Cards Fraud and the Role of the Association in Combating Fraud Nikolay Nedkov Chairman, BASCP

The Bulgarian Banking Industry’s Response to Cards Fraud and the Role of the Association in Combating Fraud INTRODUCTION - BASCP foundation, development and main task - Types of fraud - The current situation - What measures are taken - Conclusions

The Bulgarian Banking Industry’s Response to Cards Fraud and the Role of the Association in Combating Fraud - The Association BASCP was established in December 2005 as a successor of the BFF established in November Joint initiative of all twenty Bulgarian Banks - VISA, MasterCard & American Express plus BORICA, the National Card Operator

The Bulgarian Banking Industry’s Response to Cards Fraud and the Role of the Association in Combating Fraud Main tasks -Combating fraud – forum for experts from Bulgarian Banks and card schemes to discuss fraud prevention related issues -Cooperation and communication with country’s Law Enforcement Authorities, different Police services, Ministry of Interior (MoI), Prosecution, etc to develop tactical initiatives to fight against card fraud across the country -Raising the awareness of payment card fraud within the society and the different levels of the Government and to promote the card fraud prevention tools -Improving and developing contacts and cooperation between the Banks.

Types of fraud -Merchant fraud - goods and services were bought by fake/counterfeited or stolen cards -ATM fraud – skimming, Lebanese Loop, Physical ATM attacks, etc -OnLine fraud/E-commerce fraud: -Phishing – gaining sensitive information for cards and cardholders -Pharming – redirection the traffic in the internet web sites

Types of Fraud - Definition -Merchant fraud – the level of that type of fraud decreased during the BFF/BASCP establishment. During this period an Acquirer Agreement was made, where mutual merchant antifraud activities were implemented and a data is maintained of terminated merchants – Black List for merchants with fraudulent activity. -ATM fraud – this type of fraud escalated last few years, where different types of techniques had been used. In BASCP was created an ATM Working Group where information is exchanged among Member Banks for any type of ATM fraud.

Types of Fraud - Definition Physical Attacks on ATMs is new for Bulgaria and Banks immediately took measures, such as ATM Monitoring Systems, Alarms, Money Maculation Systems, etc. The Skimming Fraud is the newest item among fraudsters – interesting fact is that not only foreign cards are skimmed, but also cards issued by Bulgarian Banks. There is a strong cooperation between the BASCP Banks and information is immediately distributed, so measures can be taken (card blocking, SMS alerting, ATM investigation, etc.)

Types of Fraud - Definition OnLine fraud -Phishing is a form of criminal activity using social engineering techniques, characterized by attempts to fraudulently acquire sensitive information, such as passwords and payment card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an or an instant message. The term phishing arises from the use of increasingly sophisticated lures to "fish" for users' financial information and passwords.

Types of Fraud - Definition -Pharming is the exploitation of a vulnerability in the PNS Server Software that allows a hacker to acquire the domain Name for a site, and to redirect, for instance, that website's traffic to another web site. PNS servers are the machines responsible for resolving internet names into their real (IP) addresses. The term pharming is derived from the term phishing.

Types of Fraud - Definition E-Commerce Fraud - The majority of this type of fraud is concentrated in: -Direct marketing – the payment of adult content sites -Travel Agencies – services bought via fraudulent applications such as airplane tickets as favorite -Online gambling – betting on the internet is becoming more and more profitable both for cardholders and Banks -Electronic equipment – purchasing the necessary software or hardware through internet -MOTO – transactions

The Movement of Crime -Chip vs. MagStripe Environment -Intra Regional  Inter Regional -ATM/POS Integrity -Obtaining Personal Information (misusing open networks) -Data Storage Integrity Breaches -Increased Fraud Applications / Account Takeover / CNP fraud

Crime Prevention in Bulgaria is Team Work between  Government  Investigators  Technology  Industry  Individual users Which combines a mutual efforts aiming towards more effective struggle against cards crime.

The current situation -The development and success of the Cards Business has attracted criminals - The manipulation of ATMs is driven by organized crime -There are on-line criminal groups groups exchange cards data

What measures are taken? -The development and the use of different monitoring programs for preventing fraud - A strong relation between the Issuing bank and the cardholders in terms of education and warning of risk at online use of their cards -Joint forces with law enforcement -International cooperation -Improving technology

The Bulgarian Banking Industry’s Response to Cards Fraud and the Role of the Association in Combating Fraud Conclusions: -Improving the strategy - Keeping the technology up to date developed -Strengthen International contacts -Public and private partnership -Inform cardholders/merchants for their obligations

Conclusions: Fraud Today Needs To Be Viewed Through a New Prism -Today’s corrupt criminals of organized crimes have no national boundaries, have gone hi-tech, and conventional methods of investigation are not good enough to tackle organized crimes -Strong partnership with costumers, merchants, local and overseas Law Enforcement/Regulatory Agencies is essential. International cooperation is vital.

Thank You Nikolay Nedkov Phone: Fax: