SlideShare a Scribd company logo
1 of 7
Download to read offline
Insight Guide
FRAUD DE TECTI ON
NOW IS THE TIME
FOR A FRESH APPROACH
TO DETECTING FRAUD
Learn where today’s fraud detection falls
short and what to do about it. Read on >>
Insight Guide
FRAUD DE TECTI ON
– 2 –
W
hile adequate for verification and screening,
traditional fraud detection systems for new
accounts are no match for today’s sophisti-
cated fraudsters. Worse, they force customers through
confusing verification steps and unnecessarily delay
access to their accounts, oftentimes for days.
Afreshapproachcanmakesystemsevenmoreeffective.
So, instead of asking more questions, gathering more
personal details, and forever adding more steps, let’s
rethink how we approach fraud detection so it prevents
more fraud even as it lowers customer frustration. This
guide explains how.
Times have changed, so why hasn’t
fraud detection?
Traditional fraud-detection methods must now contend
with vast changes in the financial services landscape,
many of which have been driven by the opportunities—
and threats—from our hyper-connected economy:
•	ACTIVITY: 61% of Internet users did their banking
online in 2013, compared to fewer than 18% in
2000, according to the Pew Research Center.1
•	CUSTOMER EXPECTATIONS: Today, people
expect near-instant access to their new accounts,
yet frequently must wait for days after they first
apply online because current methods weren’t
designed for such speed.
•	IDENTITY THEFT: Last year, 13.1 million
consumers experienced identity fraud—500,000
more than just a year earlier, according to a study
conducted by Javelin Strategy & Research.2
•	SUPER-EMPOWERED FRAUDSTERS: Using
masked computers, stolen identities, and clean
addresses, a single person can apply for dozens of
accounts across the country in just a few hours.
Traditional verification systems: Not
made for these times
Traditional approaches to new-account fraud detection
are verification systems. They were first created in the
early 2000s, when opening accounts online was in its
infancy and in the wake of new know-your-customer
(KYC) rules. In addition to verifying consumer details,
they check consortium data or other sources of sus-
NOW IS THE TIME FOR A FRESH APPROACH
TO DETECTING FRAUD
Times have changed, but fraud detection hasn’t. Learn why most traditional
fraud detection systems are falling short of financial services’ needs and
consumers’ expectations.
View our on-demand webinar		
to learn how smart financial institutions are improving
the customer experience AND preventing fraud.
Insight Guide
FRAUD DE TECTI ON
– 3 –
pect information—addresses associated with fraud,
consumers with a history of fraud, Social Security
Numbers of deceased people, addresses that are mail
drops or high risk, and credit files with alerts—to iden-
tify red flags.
While this process for satisfying KYC regulations does
avert some fraud, it was not designed for today’s
businesschallengesandconsumerpreferences.Rather,
it was developed to meet FACT Act requirements that
institutions check personal information and factors,
including alerts consumers place on their credit files
before opening an account; as well as USA PATRIOT
Act requirements that institutions document reasonable
belief that the person with whom they are entering into
a relationship is who she or he claims to be.
A new address: Red flag or false alarm?
To see these shortcomings in action, consider the
path of two consumers applying for a line of credit,
as seen with a traditional fraud detection system:
Consumer One Consumer Two
All application data matches
verification databases
except the address
All application data matches
verification databases
No high-risk flags
for past fraud
No high-risk flags
for past fraud
Using a new address—one
that’s 500 miles from where he
has lived for the past six years
Which of the two presents a higher fraud risk? Tra-
ditional approaches would require manual interven-
tion with Consumer One, but would let Consumer
Two pass through.
Now, consider additional unrevealed information
about Consumer Two:
•	The identity has existed for only about a year,
despite a stated birth year of 1974
•	The identity has been used to apply for multiple
credit products and mobile phones in the past
30 days
•	The identity’s address is not on a hot list, but
is being used by six other identities, all actively
seeking new accounts
•	He is applying with a computer that has opened
nine other accounts in the past week
•	His computer has been configured to evade tracking
and profiling
Given this more complete picture, what initial-
ly looked like a low fraud risk is almost certainly a
fraudster. And yet, although the financial institution
met its compliance obligations, it was nonetheless
exposed to fraud.
Meanwhile, Consumer One endures a negative ex-
perience right from the start, despite the following
facts in his favor that a traditional approach could
not detect:
•	His identity has been used consistently and in
a way that’s low risk
•	He is using a known and trusted computer
•	He’s applying using a mobile phone that’s been
tied to him for at least five years
But without knowing such favorable factors, Con-
sumer One’s line of credit cannot be opened right
away; he may be required to speak with a customer
service representative; and he’ll probably need to
email or fax additional documents to prove that he
– 4 –
has indeed moved from the address on file to the
address on his application.
Asking people to wait is asking them
to leave
The plight of Consumer One clashes with the ex-
pectations of today’s digital consumer: When online,
people expect rapid responses and easy ways to ac-
cess new accounts, whether for banking, social me-
dia, online shopping, and the like.
If required to jump through hoops or wait days for ac-
cess to their new accounts, many applicants give up
in frustration, never to return. Honest people pay the
price in time lost and rising anxiety as we pile more
and more steps onto the application process.
Given that the majority of cross-selling occurs within
90 days of a new customer opening his or her first
account,4
will a new customer who just endured an
unfavorable experience be willing to engage in cross-
sell conversations?
Super-empowered fraudsters: Exploiting
weaknesses
Many institutions feel their fraud losses are under
control, but today’s fraudsters have more opportu-
nities for criminal activity than ever before. In fact,
many institutions are ill equipped to detect threats
from sophisticated organized crime rings. Criminals
are increasingly aware of how to exploit weak links
to maximize financial gain. Here are a few examples:
•	MINING FOR GOLD: Millions of pieces of
personal information are now stored collectively
in databases, which are goldmines for hackers.
In addition, social media encourages people
to publicly expose personal details—even
addresses, phone numbers and birthdays. In
fact, the price of black-market “fullz”—consumer
profiles with personal and financial data bought
and sold by fraudsters—has plummeted by 40%
in recent months, indicating a glut of supply.5
•	EXPLOITING HUMAN NATURE: Fraudulent
transactions are increasingly perpetrated using
the call-center channel. The combination of
relatively weak fraud detection, simple human
error, and the natural tendency to want to help
make call centers a prime target for manipulating
account holder information or establishing
accounts that are later used fraudulently.
•	CRIMINALS CAN AFFORD TO WAIT: One tactic
of criminals is to open a mobile phone account
and other low-barrier accounts using a phony
name and unused Social Security Number. This
New address: Big opportunity or
big miss?
When people move, they often apply for new
checking and savings accounts, new cable
TV accounts, or new credit to finance home
improvements. In 2013, 36 million Americans
moved, and up to 40% of some new account
applications come from people with new
addresses, according to TransUnion.3
This is a big opportunity for companies who
offer a smooth, fast application experience—
and a big miss for companies who don’t.
When an address can’t be verified, with a more
holistic approach you have the ability to look to
other factors—such as recent activity, cross-
industry data, and the reputation and location
of the applicant’s computer—that help mitigate
the unverified address.
Insight Guide
FRAUD DE TECTI ON
Insight Guide
FRAUD DE TECTI ON
– 5 –
allows them to slowly build up the identity’s
credit reputation, eventually putting them in
a position to open—and defraud—multiple
lucrative credit lines.
What will a fresh approach look like?
Given all the limitations of traditional methods, we
must analyze how a customer is applying, and look
deeper into who he or she is. And with more predic-
tive tools, financial institutions can spend less time on
manual reviews, confidently make quick approvals,
and reduce fraud losses.
Our goal must be to dramatically improve the cus-
tomer experience while also preventing more fraud by
meeting these objectives:
•	Prevent sophisticated fraud techniques,
especially in faceless channels
•	Check against real-time information
•	Act behind the scenes, invisible to customers
•	Require fewer steps for customers
•	Give customers much faster access to new
accounts
Next, we need methods that accomplish those goals
and objectives. Here’s a glimpse at how that can work,
again using tools available today:
• IDENTITY BEHAVIORS: We can now analyze
identities, using real-time cross-industry data, to
detect fraud that goes unnoticed by traditional
verification tools. Gaining insight into how an identity
is being used, how it relates to other identities, and
examining other behavior patterns helps us pinpoint
fraud risk and prioritize manual reviews.
• DEVICE VERIFICATION: Why not turn criminals’
own devices against them? We can look at the
computer or mobile phone used to open an
account to examine hundreds of variables for
anomalies and risk. Assessing risk factors and
examining a device’s reputation, then combining
the data with what’s known about a consumer,
lets us make informed, contextual decisions.
Importantly, it’s done behind the scenes with little
interruption to consumer transactions.
• IDENTITY AUTHENTICATION: Quick yet
effective, we can authenticate identities by using
something applicants have (send their mobile
phone one-time passcodes via SMS text) or by
asking applicants something they know (using
knowledge-based questions). This dramatically
reduces customer friction by employing proven
verification technologies for low-risk transactions.
Consider again Consumer One opening an account
with an address that doesn’t match his historical re-
cord. If an institution sees he’s applying for only one
or two accounts, is using a computer long associated
with legitimate transactions, and he easily enters a
verification code sent to his mobile phone, then the
risk decision is much easier.
Although follow-up will still be necessary to complete
compliance requirements, the process has moved
Our goal must be
to dramatically improve
the customer experience
while also preventing
more fraud.
Insight Guide
FRAUD DE TECTI ON
– 6 –
from “we’ll get back to you,” to a decision to imme-
diately approve the application. The results are fewer
steps for the customer, faster approval (and fewer
abandonments), and a far better experience overall.
Now is the time to start the conversations within your
organization to take advantage of the new tools that
could make your fraud detection system not just one
that keeps fraudsters in check—but that also sup-
ports positive customer experiences.
QA
Q: WE HAVE THE ABILITY TODAY
TO DETECT WHICH OF THE
FOLLOWING?
a. That an identity of a person claiming
to be 40 years old has existed for
only 13 months
b. That an identity has been used to
apply for multiple credit products in
the past month
c. That an address tied to an identity
is being used by six other identities,
and all are actively acquiring credit
A: ALL OF THE ABOVE.
More information on this topic at
SOLUTIONS.TRANSUNION.COM/FRAUDPREVENTION
View our on-demand webinar
to learn how smart financial institutions are improving
the customer experience AND preventing fraud.
Insight Guide
FRAUD DE TECTI ON
– 7 –
A
s a global leader in credit and information management, TransUnion creates advantages for millions of
people around the world by gathering, analyzing and delivering information. For businesses, TransUnion
helps improve efficiency, manage risk, reduce costs and increase revenue by delivering comprehensive
data and advanced analytics and decisioning. For consumers, TransUnion provides the tools, resources and
education to help them manage their credit health and achieve their financial goals. Through these and other
efforts, TransUnion is working to build stronger economies worldwide. Founded in 1968 and headquartered in
Chicago, TransUnion reaches businesses and consumers in 33 countries around the world on five continents.
More information at www.transunion.com/business
or on Twitter at @TransUnionFS
© 2014 TransUnion LLC. All rights reserved.
Works cited
1 Fox, Susannah. “51% of U.S. Adults Bank Online.” Pew Research Internet Project. August 7, 2013. http://www.
pewinternet.org/2013/08/07/51-of-u-s-adults-bank-online/ (accessed May 22, 2014).
2 Javelin Strategy  Research. “A New Identity Fraud Victim Every Two Seconds in 2013 According to Lat-
est Javelin Strategy  Research Study.” February 5, 2014. https://www.javelinstrategy.com/news/1467/92/A-
New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-
Study/d,pressRoomDetail (accessed May 22, 2014).
3 TransUnion. From data in the TransUnion consumer credit database.
4 Tschida, Teresa. “The Importance of That First Embrace.” Gallup Business Journal. November 10, 2005. http://
businessjournal.gallup.com/content/19606/importance-first-embrace.aspx (accessed May 22, 2014).
5 Clarke, Elizabeth. “The Underground Hacking Economy Is Alive and Well.” Dell SecureWorks. November 18, 2013.
http://www.secureworks.com/resources/blog/the-underground-hacking-economy-is-alive-and-well/ (accessed
May 22, 2014).

More Related Content

Recently uploaded

obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
yulianti213969
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 

Recently uploaded (20)

Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
 
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableNanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
Simplilearn
 

Featured (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

Insight guide

  • 1. Insight Guide FRAUD DE TECTI ON NOW IS THE TIME FOR A FRESH APPROACH TO DETECTING FRAUD Learn where today’s fraud detection falls short and what to do about it. Read on >>
  • 2. Insight Guide FRAUD DE TECTI ON – 2 – W hile adequate for verification and screening, traditional fraud detection systems for new accounts are no match for today’s sophisti- cated fraudsters. Worse, they force customers through confusing verification steps and unnecessarily delay access to their accounts, oftentimes for days. Afreshapproachcanmakesystemsevenmoreeffective. So, instead of asking more questions, gathering more personal details, and forever adding more steps, let’s rethink how we approach fraud detection so it prevents more fraud even as it lowers customer frustration. This guide explains how. Times have changed, so why hasn’t fraud detection? Traditional fraud-detection methods must now contend with vast changes in the financial services landscape, many of which have been driven by the opportunities— and threats—from our hyper-connected economy: • ACTIVITY: 61% of Internet users did their banking online in 2013, compared to fewer than 18% in 2000, according to the Pew Research Center.1 • CUSTOMER EXPECTATIONS: Today, people expect near-instant access to their new accounts, yet frequently must wait for days after they first apply online because current methods weren’t designed for such speed. • IDENTITY THEFT: Last year, 13.1 million consumers experienced identity fraud—500,000 more than just a year earlier, according to a study conducted by Javelin Strategy & Research.2 • SUPER-EMPOWERED FRAUDSTERS: Using masked computers, stolen identities, and clean addresses, a single person can apply for dozens of accounts across the country in just a few hours. Traditional verification systems: Not made for these times Traditional approaches to new-account fraud detection are verification systems. They were first created in the early 2000s, when opening accounts online was in its infancy and in the wake of new know-your-customer (KYC) rules. In addition to verifying consumer details, they check consortium data or other sources of sus- NOW IS THE TIME FOR A FRESH APPROACH TO DETECTING FRAUD Times have changed, but fraud detection hasn’t. Learn why most traditional fraud detection systems are falling short of financial services’ needs and consumers’ expectations. View our on-demand webinar to learn how smart financial institutions are improving the customer experience AND preventing fraud.
  • 3. Insight Guide FRAUD DE TECTI ON – 3 – pect information—addresses associated with fraud, consumers with a history of fraud, Social Security Numbers of deceased people, addresses that are mail drops or high risk, and credit files with alerts—to iden- tify red flags. While this process for satisfying KYC regulations does avert some fraud, it was not designed for today’s businesschallengesandconsumerpreferences.Rather, it was developed to meet FACT Act requirements that institutions check personal information and factors, including alerts consumers place on their credit files before opening an account; as well as USA PATRIOT Act requirements that institutions document reasonable belief that the person with whom they are entering into a relationship is who she or he claims to be. A new address: Red flag or false alarm? To see these shortcomings in action, consider the path of two consumers applying for a line of credit, as seen with a traditional fraud detection system: Consumer One Consumer Two All application data matches verification databases except the address All application data matches verification databases No high-risk flags for past fraud No high-risk flags for past fraud Using a new address—one that’s 500 miles from where he has lived for the past six years Which of the two presents a higher fraud risk? Tra- ditional approaches would require manual interven- tion with Consumer One, but would let Consumer Two pass through. Now, consider additional unrevealed information about Consumer Two: • The identity has existed for only about a year, despite a stated birth year of 1974 • The identity has been used to apply for multiple credit products and mobile phones in the past 30 days • The identity’s address is not on a hot list, but is being used by six other identities, all actively seeking new accounts • He is applying with a computer that has opened nine other accounts in the past week • His computer has been configured to evade tracking and profiling Given this more complete picture, what initial- ly looked like a low fraud risk is almost certainly a fraudster. And yet, although the financial institution met its compliance obligations, it was nonetheless exposed to fraud. Meanwhile, Consumer One endures a negative ex- perience right from the start, despite the following facts in his favor that a traditional approach could not detect: • His identity has been used consistently and in a way that’s low risk • He is using a known and trusted computer • He’s applying using a mobile phone that’s been tied to him for at least five years But without knowing such favorable factors, Con- sumer One’s line of credit cannot be opened right away; he may be required to speak with a customer service representative; and he’ll probably need to email or fax additional documents to prove that he
  • 4. – 4 – has indeed moved from the address on file to the address on his application. Asking people to wait is asking them to leave The plight of Consumer One clashes with the ex- pectations of today’s digital consumer: When online, people expect rapid responses and easy ways to ac- cess new accounts, whether for banking, social me- dia, online shopping, and the like. If required to jump through hoops or wait days for ac- cess to their new accounts, many applicants give up in frustration, never to return. Honest people pay the price in time lost and rising anxiety as we pile more and more steps onto the application process. Given that the majority of cross-selling occurs within 90 days of a new customer opening his or her first account,4 will a new customer who just endured an unfavorable experience be willing to engage in cross- sell conversations? Super-empowered fraudsters: Exploiting weaknesses Many institutions feel their fraud losses are under control, but today’s fraudsters have more opportu- nities for criminal activity than ever before. In fact, many institutions are ill equipped to detect threats from sophisticated organized crime rings. Criminals are increasingly aware of how to exploit weak links to maximize financial gain. Here are a few examples: • MINING FOR GOLD: Millions of pieces of personal information are now stored collectively in databases, which are goldmines for hackers. In addition, social media encourages people to publicly expose personal details—even addresses, phone numbers and birthdays. In fact, the price of black-market “fullz”—consumer profiles with personal and financial data bought and sold by fraudsters—has plummeted by 40% in recent months, indicating a glut of supply.5 • EXPLOITING HUMAN NATURE: Fraudulent transactions are increasingly perpetrated using the call-center channel. The combination of relatively weak fraud detection, simple human error, and the natural tendency to want to help make call centers a prime target for manipulating account holder information or establishing accounts that are later used fraudulently. • CRIMINALS CAN AFFORD TO WAIT: One tactic of criminals is to open a mobile phone account and other low-barrier accounts using a phony name and unused Social Security Number. This New address: Big opportunity or big miss? When people move, they often apply for new checking and savings accounts, new cable TV accounts, or new credit to finance home improvements. In 2013, 36 million Americans moved, and up to 40% of some new account applications come from people with new addresses, according to TransUnion.3 This is a big opportunity for companies who offer a smooth, fast application experience— and a big miss for companies who don’t. When an address can’t be verified, with a more holistic approach you have the ability to look to other factors—such as recent activity, cross- industry data, and the reputation and location of the applicant’s computer—that help mitigate the unverified address. Insight Guide FRAUD DE TECTI ON
  • 5. Insight Guide FRAUD DE TECTI ON – 5 – allows them to slowly build up the identity’s credit reputation, eventually putting them in a position to open—and defraud—multiple lucrative credit lines. What will a fresh approach look like? Given all the limitations of traditional methods, we must analyze how a customer is applying, and look deeper into who he or she is. And with more predic- tive tools, financial institutions can spend less time on manual reviews, confidently make quick approvals, and reduce fraud losses. Our goal must be to dramatically improve the cus- tomer experience while also preventing more fraud by meeting these objectives: • Prevent sophisticated fraud techniques, especially in faceless channels • Check against real-time information • Act behind the scenes, invisible to customers • Require fewer steps for customers • Give customers much faster access to new accounts Next, we need methods that accomplish those goals and objectives. Here’s a glimpse at how that can work, again using tools available today: • IDENTITY BEHAVIORS: We can now analyze identities, using real-time cross-industry data, to detect fraud that goes unnoticed by traditional verification tools. Gaining insight into how an identity is being used, how it relates to other identities, and examining other behavior patterns helps us pinpoint fraud risk and prioritize manual reviews. • DEVICE VERIFICATION: Why not turn criminals’ own devices against them? We can look at the computer or mobile phone used to open an account to examine hundreds of variables for anomalies and risk. Assessing risk factors and examining a device’s reputation, then combining the data with what’s known about a consumer, lets us make informed, contextual decisions. Importantly, it’s done behind the scenes with little interruption to consumer transactions. • IDENTITY AUTHENTICATION: Quick yet effective, we can authenticate identities by using something applicants have (send their mobile phone one-time passcodes via SMS text) or by asking applicants something they know (using knowledge-based questions). This dramatically reduces customer friction by employing proven verification technologies for low-risk transactions. Consider again Consumer One opening an account with an address that doesn’t match his historical re- cord. If an institution sees he’s applying for only one or two accounts, is using a computer long associated with legitimate transactions, and he easily enters a verification code sent to his mobile phone, then the risk decision is much easier. Although follow-up will still be necessary to complete compliance requirements, the process has moved Our goal must be to dramatically improve the customer experience while also preventing more fraud.
  • 6. Insight Guide FRAUD DE TECTI ON – 6 – from “we’ll get back to you,” to a decision to imme- diately approve the application. The results are fewer steps for the customer, faster approval (and fewer abandonments), and a far better experience overall. Now is the time to start the conversations within your organization to take advantage of the new tools that could make your fraud detection system not just one that keeps fraudsters in check—but that also sup- ports positive customer experiences. QA Q: WE HAVE THE ABILITY TODAY TO DETECT WHICH OF THE FOLLOWING? a. That an identity of a person claiming to be 40 years old has existed for only 13 months b. That an identity has been used to apply for multiple credit products in the past month c. That an address tied to an identity is being used by six other identities, and all are actively acquiring credit A: ALL OF THE ABOVE. More information on this topic at SOLUTIONS.TRANSUNION.COM/FRAUDPREVENTION View our on-demand webinar to learn how smart financial institutions are improving the customer experience AND preventing fraud.
  • 7. Insight Guide FRAUD DE TECTI ON – 7 – A s a global leader in credit and information management, TransUnion creates advantages for millions of people around the world by gathering, analyzing and delivering information. For businesses, TransUnion helps improve efficiency, manage risk, reduce costs and increase revenue by delivering comprehensive data and advanced analytics and decisioning. For consumers, TransUnion provides the tools, resources and education to help them manage their credit health and achieve their financial goals. Through these and other efforts, TransUnion is working to build stronger economies worldwide. Founded in 1968 and headquartered in Chicago, TransUnion reaches businesses and consumers in 33 countries around the world on five continents. More information at www.transunion.com/business or on Twitter at @TransUnionFS © 2014 TransUnion LLC. All rights reserved. Works cited 1 Fox, Susannah. “51% of U.S. Adults Bank Online.” Pew Research Internet Project. August 7, 2013. http://www. pewinternet.org/2013/08/07/51-of-u-s-adults-bank-online/ (accessed May 22, 2014). 2 Javelin Strategy Research. “A New Identity Fraud Victim Every Two Seconds in 2013 According to Lat- est Javelin Strategy Research Study.” February 5, 2014. https://www.javelinstrategy.com/news/1467/92/A- New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research- Study/d,pressRoomDetail (accessed May 22, 2014). 3 TransUnion. From data in the TransUnion consumer credit database. 4 Tschida, Teresa. “The Importance of That First Embrace.” Gallup Business Journal. November 10, 2005. http:// businessjournal.gallup.com/content/19606/importance-first-embrace.aspx (accessed May 22, 2014). 5 Clarke, Elizabeth. “The Underground Hacking Economy Is Alive and Well.” Dell SecureWorks. November 18, 2013. http://www.secureworks.com/resources/blog/the-underground-hacking-economy-is-alive-and-well/ (accessed May 22, 2014).