catching bust-out fraud

17
Catching Bust-Out Fraud To stop the criminals, find the connections

Upload: fico-decisions

Post on 24-May-2015

971 views

Category:

Technology


1 download

DESCRIPTION

As organized financial crime spreads into more industries, FICO Identity Resolution Engine adds a critical dimension to evaluating fraud and other financial crimes by resolving the true identities of participants—“who’s who”—and by uncovering suspicious relationships between individuals—“who knows whom across the enterprise and third-party data.” It searches a variety of personal attributes (name, address, phone number, account number, etc.) across widespread data sources to resolve individuals’ identities and reveal criminal rings. Learn more at: http://bit.ly/XlsCXE

TRANSCRIPT

Page 1: Catching Bust-Out Fraud

Catching Bust-Out FraudTo stop the criminals, find the connections

Page 2: Catching Bust-Out Fraud

©2014 Fair Isaac Corporation. All rights reserved. 2

Sonia and Francesca are both applying for credit cards

Both applicants appear the same. They have similar profiles and personal characteristics. Yet Sonia is connected to other members of a criminal fraud network that is launching a bust-out fraud scheme.

By the time it’s clear that one of these applicants is a good customer and the other is a criminal it may be too late to stop huge losses.

Sonia Francesca

Page 3: Catching Bust-Out Fraud

©2014 Fair Isaac Corporation. All rights reserved. 3

And the risk is growing…

Here’s an example of how massive and sophisticated bust-out fraud can be

>$200M In losses

Clear out all accounts and suddenly disappear

25,000 Fraudulent cards

Create accounts and credit lines

1,800 Drop addresses

Use a variety of locations to receive mail

50 Complicit businesses

Make purchases and build credit balances

7,000 Synthetic identities

Steal or acquire valid identity information

18,000 Individuals

Organized fraudsters and insiders

Page 4: Catching Bust-Out Fraud

©2014 Fair Isaac Corporation. All rights reserved. 4

Fraudsters like Sonia are dipping into an ocean of opportunity

With today’s instant transactions and growing online and mobile channels, there are many ways to perpetrate and disguise bust-out fraud schemes.

Already such schemes account for

10–15% of banks’ unsecured bad debt, amounting to tens of billions in losses a year

Page 5: Catching Bust-Out Fraud

©2014 Fair Isaac Corporation. All rights reserved. 5

Will the bank be able to spot Sonia’s scheme and stop it before losses mount?

Perpetrators look like normal customers

Applicants generally use valid identity information (stolen or acquired) to apply for the credit.

If fraud systems look only at individual applicants, they probably won’t see anything wrong.

Their schemes cross product lines and geographies

Fraudsters keep accounts current while increasing credit limits and applying for additional cards and credit lines.

If fraud systems are focused on lines of business, they probably won’t be able to detect this cross-channel fraud.

At the moment of bust-out, they execute very fast

Once fraudsters reach a target amount of credit or time, they rapidly increase spending and build balances.

Because escalation usually occurs over just a day or two—bank systems probably won’t react in time to stop it.

Page 6: Catching Bust-Out Fraud

©2014 Fair Isaac Corporation. All rights reserved. 6

YES, the bank can stop Sonia by using social network analysis. This analytic technique detects bust-out fraud schemes before the chain of events leading to big losses can unfold.

How? By going after the fraud ring’s greatest vulnerability…

Page 7: Catching Bust-Out Fraud

©2014 Fair Isaac Corporation. All rights reserved. 7

Sonia’s fraud ring is vulnerable because, like other criminal networks, it reuses identity informationTo pass verification checks and regulation, Sonia uses synthetic identities combining real and fake information. She varies spelling and makes other small changes.

Social network analysis matches the various permutations across data sources to link and identify a single individual related to risk.

Cards

Sonia A. Smith1 Edison RdBedford Park SA 5042T: 08 8177 0035LIC: 1702188364DOB: 07/09/84

DDA/CA

A. Sonia Smith1067 6th AveBedford SA 01510T: 08 8356 4131LIC: 1702188364DOB: 07/09/84

Bad Guys

Sonia Carr-Smith1 Wallace AveBedford SA 1510T: 06 8177 0035LIC: 17-OUYRE-+8364DOB: 07/08/84

Employees

Sonia A. CarrOne Edison RdBelfort SA 1510T: +64 8 8177 0035LIC: 7102188364

Page 8: Catching Bust-Out Fraud

©2014 Fair Isaac Corporation. All rights reserved. 8

Next link analysis matches Sonia’s information with that of other individuals to reveal the fraud ring.Because creating and maintaining identities involves effort and expense, fraud rings usually recycle bits and pieces among members.

Address:One Edison RoadCherry Hill, NJ 08034

Telephone:908-555-1234

John Benton

Bad List

Charge Off Credit Cards

Charge off loan

Jordana Mack

Jordan Mako

Investigator mortgage fraud

Email: [email protected]

Sonia A. Smith

License Number: 1543987223@

Page 9: Catching Bust-Out Fraud

©2014 Fair Isaac Corporation. All rights reserved. 9

Social Risk Scoring and Triage

Social LInk Visualization

Alert Processing

ActActs, via automated alerts and rules-driven triage to focus investigator attention on highest risk cases

5 AnalyzeAnalyzes networks for patterns indicative of fraud rings

4 LinkLink entities into networks via shared or similar attributes (names, phone numbers, etc.)

3 MatchMatches attributes to create a single view of entities (people, places, things)

2

� Customer Data

� Employee

� SARS

� Case Management

� Third-Party LexisNexis CFAC

� Vendor

� Applicants

SearchSearches across disparate internal and external sources

1

FICO® Identity Resolution EngineThe process that reveals Sonia’s network and stops the bust-out fraud scheme

Page 10: Catching Bust-Out Fraud

©2014 Fair Isaac Corporation. All rights reserved. 10

� Customer Data

� Employee

� SARS

� Case Management

� Third-Party LexisNexis CFAC

� Vendor

� Applicants

SearchSearches across disparate internal and external sources

1

FICO® Identity Resolution EngineThe process that reveals Sonia’s network and stops the bust-out fraud scheme

Because bust-out schemes may involve more than one product, business line and geography, FICO® Identity Resolution Engine glides across multiple sources, examining data where it is, as it is (without extraction, cleansing normalization), piecing together relevant bits into the bigger picture, while complying with privacy regulations and requirements.

This “federated data search” can take place in batch or in real time as credit applications and transactions stream in.

Page 11: Catching Bust-Out Fraud

©2014 Fair Isaac Corporation. All rights reserved. 11

MatchMatches attributes to create a single view of entities (people, places, things)

2

� Customer Data

� Employee

� SARS

� Case Management

� Third-Party LexisNexis CFAC

� Vendor

� Applicants

SearchSearches across disparate internal and external sources

1

FICO® Identity Resolution EngineThe process that reveals Sonia’s network and stops the bust-out fraud scheme

To determine who is really whom, FICO® Identity Resolution Engine recognizes attribute relationships that are similar enough to be a match, though not exact. This step, called “entity resolution,” requires seeing through the inaccuracies and formatting peculiarities of the numerous data sources to recognize that the same entity is being described.

Page 12: Catching Bust-Out Fraud

©2014 Fair Isaac Corporation. All rights reserved. 12

LinkLink entities into networks via shared or similar attributes (names, phone numbers, etc.)

3 MatchMatches attributes to create a single view of entities (people, places, things)

2

� Customer Data

� Employee

� SARS

� Case Management

� Third-Party LexisNexis CFAC

� Vendor

� Applicants

SearchSearches across disparate internal and external sources

1

FICO® Identity Resolution EngineThe process that reveals Sonia’s network and stops the bust-out fraud scheme

This step identifies who shares attribute data. As FICO® Identity Resolution Engine uncovers shared data, a network of connections emerges. Links between individuals who have no attribute data in common, but are connected to other people who do, are also revealed.

Page 13: Catching Bust-Out Fraud

©2014 Fair Isaac Corporation. All rights reserved. 13

Social Risk Scoring and Triage

Social LInk Visualization

Alert Processing

ActActs, via automated alerts and rules-driven triage to focus investigator attention on highest risk cases

5 AnalyzeAnalyzes networks for patterns indicative of fraud rings

4

FICO® Identity Resolution EngineThe process that reveals Sonia’s network and stops the bust-out fraud scheme

FICO® Identity Resolution Engine determines the level of fraud risk represented by a network of connections, quanitifying it in the form of a score. Some factors that raise fraud risk scores include:

� Links with known fraudsters in a bank’s fraud or anti-money laundering (AML) databases

� Links with bank insiders (a large percentage of bust-out fraud is facilitated by employees)

� Unusually large networks with many customers and accounts (indicative of a growing scheme ready to bust out)

Page 14: Catching Bust-Out Fraud

©2014 Fair Isaac Corporation. All rights reserved. 14

Social Risk Scoring and Triage

Social LInk Visualization

Alert Processing

ActActs, via automated alerts and rules-driven triage to focus investigator attention on highest risk cases

5

FICO® Identity Resolution EngineThe process that reveals Sonia’s network and stops the bust-out fraud scheme

FICO® Identity Resolution Engine can generate alerts in real time as data from incoming credit applications is analyzed. Thresholds and rules can be set up to automatically refer applications scoring above a certain threshold to an investigator. Scoring also enables cases to be prioritized within queues.

Visualization tools help investigators quickly comprehend and explore the network of connections to judge the nature and extent of the threat.

Page 15: Catching Bust-Out Fraud

©2014 Fair Isaac Corporation. All rights reserved. 15

Moral of the story: The sooner you can recognize fraudsters, the better you can protect your customers and institution from organized criminals

Some FICO client results:A bank that added social network analysis to its existing rules-based fraud detection improved performance by.............

Another, adding it to analytics-based detection, achieved an additional....................

50%30%

Page 16: Catching Bust-Out Fraud

©2014 Fair Isaac Corporation. All rights reserved. 16

Francesca

These two consumers are applying for a credit card.

One of them will become a profitable customer for years to come. The other will try to steal millions.

Tell the difference sooner.

Sonia

Page 17: Catching Bust-Out Fraud

For more information North America toll-free Latin America & Caribbean Europe, Middle East & Africa Asia Pacificwww.fico.com +1 888 342 6336 +55 11 5189 8222 +44 (0) 207 940 8718 +65 6422 7700 [email protected] [email protected] [email protected] [email protected]

FICO is a trademark or registered trademark of Fair Isaac Corporation in the United States and in other countries. Other product and company names herein may be trademarks of their respective owners. © 2014 Fair Isaac Corporation. All rights reserved.

4036K 7/14 PDF

Stop bust-out fraudNow the very networks fraud rings use to perpeturate their crimes become their downfall

Learn more:Download the white paper on this topic:

Uncovering Bust-Out Fraud with FICO® Identity Resolution EngineCheck out our blog:

Banking Analytics Blog