Академический Документы
Профессиональный Документы
Культура Документы
Table of Contents
Introduction......................................................................................................1
Outwitting the Criminal Mind – The Challenges..............................................3
Bank Fraud Is Increasing in Volume and Sophistication ..............................3
The Fastest-Growing Channels Are Also the Ones Most at Risk...................3
Fraud Is Usually Managed in Business Unit Silos.........................................4
Cross-Channel Fraud Is Widespread.............................................................4
Fraud Detection Has Been Sketchy..............................................................5
Slow Detection Leads to Higher Losses.......................................................5
The Trouble with Traditional Fraud Management...........................................6
Best Practices in Fraud Management – Combating Fraud with the
Technology Available Today.............................................................................7
Step 1: Create an Enterprisewide View of Patterns and Perpetrators..........7
Step 2: Prevent and Detect Fraud in an Enterprisewide Context..................7
Step 3: Investigate and Resolve Fraud in an Integrated Environment........11
Future Trends in Enterprise Fraud Management...........................................11
Closing Thoughts............................................................................................12
About SAS.......................................................................................................14
i
ENTERPRISEWIDE FRAUD MANAGEMENT
ii
ENTERPRISEWIDE FRAUD MANAGEMENT
Introduction
Sue was just buying pillowcases, paying with the store’s own credit card. But
within days, that card number would reach a fraudster in Florida, who would punch
out new plastic with her number – later, it would be used to buy dozens of store gift
cards at a time, each for an amount just under the review limit.
The debit card came back to the table in no time, and Robert signed the tab for
dinner. He made sure only the last four digits of his card number were displayed on
the merchant’s copy. But Robert didn’t know that in the 30 seconds the waiter had
the card, he had photographed both sides with his cell phone – and would later
use the account to order merchandise and concert tickets by phone.
These events are everyday occurrences – thousands of times a day, actually. In the
first case, the store’s parent company detected the security breach, but only after
three years, 200,000 counterfeit cards and US$1 million in fraudulent purchases.
And if Robert opened his bill to find surprise charges he didn’t make, he was in
very good company; identity fraud is an estimated US$54 billion crime. Some
11.2 million Americans were victimized by card fraud in 2010 – an increase of
12 percent – which was the highest level since the Identity Fraud Survey Report
survey began in 2003, according to Javelin research.1 His bank’s zero liability policy
meant Robert didn’t have to pay the charges, but the bank did.2
1 Kim, Rachel and Monahan, Mary. Javelin Strategy and Research, Identity Fraud Survey Report.
February 2010.
1
ENTERPRISEWIDE FRAUD MANAGEMENT
Skimming and phishing attacks are becoming more common across the globe.
Recent pay-at-the pump scams have also increased in the US and Europe, and it
requires some help from civilians to fight these types of crimes. No one is safe with the
sophistication of technology and fraudsters today. They can operate globally, within a
matter of seconds, so it’s essential to increase public awareness as financial institutions
enhance their fraud technology and enterprise processes.
(USD in Millions)
$4,000 $3,773
CAGR = 12.4 %
2008–12
1,157 TRANSACTION MONITORING CAGR
3,000
19.1%
$2,403
CHECK FRAUD
718 6.6%
2,000 575
$1,677
772 INFORMATION SECURITY
398 556 7.4%
Of course, fraud is not a domestic product. It’s everywhere. Fraud was estimated to
cost the UK economy £38.4 billion (US$62.4 billion) during 2010. This amounts to
£765 for every adult.2
According to the National Fraud Authority’s Annual Fraud Indicator, fraud cost the
UK private sector £12 billion, the public sector £21.2 billion, the charity sector £1.3
billion, and individuals £4 billion in 2010.3 According to Caroline Pearce, the Australian
Payments Clearing Association’s head of fraud, risk and compliance, the industry
needed to “lift our game” to combat a growing criminal threat. The Association found
debit card fraud to have increased 50 percent in fiscal 2010, costing the industry
$0.59 per $1,000 for magnetic strip cards and $0.11 per $1,000 for chip and
PIN technology.4
The good news is that the numbers tend to be slightly down from previous years,
especially in the US. The bad news is that hackers, identity thieves and money
launderers are fighting back by focusing on different channels and spawning new types
of attacks that traditional fraud management strategies were not designed to address.
2
ENTERPRISEWIDE FRAUD MANAGEMENT
Financial services institutions are well aware of the negative impact of fraud. Even
at industry average levels, fraud hurts an institution’s reputation, customer loyalty,
regulatory compliance and the bottom line. But even the most well-intentioned financial
“Interestingly, while FSIs struggle
institutions face some daunting challenges in this area.
to capture a full view of each
customer’s relationship with the
Bank Fraud Is Increasing in Volume and Sophistication institution, enterprising fraudsters
are already achieving this
“The credit and debit card fraud category of financial services is among the fastest-
growing and best-known means of criminal profit,” says Rodney Nelsestuen of understanding as they strive to gain
TowerGroup. “What makes card fraud of great concern is the fact that international more information about financial
organized crime rings are often involved, turning card fraud from random criminal services and products to exploit.”
activity into industrial-strength enterprises.”5
Rodney Nelsestuen
Senior Analyst, Financial Strategies
The sophistication of their tactics makes detecting fraud difficult and preventing it and IT Investments, TowerGroup
nearly impossible, especially as the volume of bank transactions grows by about 10
percent a year.
ATM and branch office transaction volumes are flat (as a percent of total transactions), “A broad approach will avoid
while call center channels are growing modestly, and electronic access (online and
redundant project work, minimize
mobile) is booming. According to research firm IDC, the number of mobile devices –
from smartphones to tablet PCs – accessing the Internet by 2013 will surpass 1 billion, system platforms and the number
creating more opportunities for cybercrime.6 of vendor partners, increase
staff productivity, and – most
Unfortunately, these fastest-growing channels are also the most vulnerable. The
importantly – catch more fraud.”
FBI has observed a trend in which cybercriminals — using the compromised online
Gartner, Inc.
banking credentials of US businesses — sent unauthorized wire transfers to Chinese
Avivah Litan
economic and trade companies located near the Russian border. As of April 2011, the Gartner Research Enterprise Fraud
total attempted fraud amounts to approximately $20 million; the actual victim losses and Misuse Management Solutions:
are $11 million.77 2010 Critical Capabilities
October 2010
5 Nelsestuen, Rodney. TowerGroup. Surrounded by the Enemy: The Case for Enterprise Fraud
Management. March 2008.
6 Shah, Agam. “IDC: 1 Billion Mobile Devices Will Go Online by 2013.” CIO.com.
www.cio.com/article/510440/IDC_1_Billion_Mobile_Devices_Will_Go_Online_By_2013.
Dec. 9, 2009.
7 Fraud Alert Involving Unauthorized Wire Transfers to China. Internet Crime Complaint Center.
April 26, 2011.
3
ENTERPRISEWIDE FRAUD MANAGEMENT
Customers – legitimate and otherwise – tend to see the institution as a single brand
represented across various contact channels: phone, automated contact center, ATM,
branch office and online. But the institution tends to see its customers as diverse
entities based on product: mortgage, credit card, DDA, home equity, consumer
banking, small business, etc. This disparity creates inefficiencies that fraudsters
can exploit.
Figure 2. All size banks see the highest threats for debit card fraud, while organized
ring attempts and customer victimization scams will require organizations to put fraud
measures in place that monitor fraud attempts across product lines and channels.
8 Nelsestuen, Rodney. TowerGroup. Surrounded by the Enemy: The Case for Enterprise Fraud
Management. March 2008.
4
ENTERPRISEWIDE FRAUD MANAGEMENT
About half the time, fraud is detected by the victims themselves when they review a
monthly statement or are turned down for credit. Imagine the loss of confidence a
consumer would feel to discover fraud before the bank did. Only about 25 percent of
the time does the bank detect the fraud first.
Speed is crucial. According to the 2010 Identity Fraud Survey Report, victims who
detected the fraud within 21 hours were defrauded for an average of $373. Victims
who did not discover the fraud up to a month later suffered an average loss of $572.
Those who took up to five months lost nearly three times as much ($1,207) as victims
who detected the fraud within one day.9 This, of course, is no surprise. What can be
a surprise is how much that figure escalates when you add associated costs, such as
lost wages, loss of goodwill and legal fees.
Collectively, these realities create a daunting environment for financial “EFM also analyzes behavior among
services institutions: related users, accounts or other
• They would like to accurately identify the patterns and perpetrators, but they entities, looking for organized
usually lack the analytical modeling rigor to establish a strong defense. criminal activity, fraud rings,
• They would like to identify cross-channel fraud, but their operational systems corruption or misuse.”
often don’t cooperate well across organizational boundaries. Gartner, Inc.
Avivah Litan
• They would like to monitor every transaction in real time, but they can’t alienate Gartner Research Enterprise Fraud
customers and merchants with long processing times. and Misuse Management Solutions:
2010 Critical Capabilities
• They would like to implement rigorous rules to detect fraud, but they know they October 2010
would turn up a lot of false positives that are costly and fruitless to investigate.
• They would like to unify the fraud management process, but disparate data sources
and cryptic interfaces make the system inaccessible to all but a few people.
5
ENTERPRISEWIDE FRAUD MANAGEMENT
To detect fraudulent activity, many banks use transaction monitoring systems – often
homegrown, niche software that requires manual intervention. Still, traditional systems
can work well for detecting individual real-time, point-of-sale fraud. But that’s only one
slice of the fraud pie, and not the biggest slice either.
Let’s take a look at how a robust, enterprisewide fraud management system can
redefine the economics of fraud. We’ll walk through the process with a hypothetical
bank based on a real one – we’ll call it First Best Practice Bank (FBPB) – a multiservice
institution with more than a million active cardholder accounts.
10 Nelsestuen, Rodney; TowerGroup, Surrounded by the Enemy: The Case for Enterprise Fraud
Management, March 2008.
11 Nelsestuen, TowerGroup, Surrounded by the Enemy.
6
ENTERPRISEWIDE FRAUD MANAGEMENT
FBPB’s fraud system goes beyond the typical customer view to provide a holistic view
of fraudulent activity – including related perpetrators and unrelated channels – and
enables a much deeper understanding of customer behavior.
Each transaction – account opening, ATM access, online banking transaction, wire,
ACH, call center encounter, etc. – is passed through a set of rules and predictive
models. In real time, the system checks transaction activity against vast, enterprisewide
intelligence about the customer and potentially suspicious behaviors. Is this an
unusually large deposit for this individual? Is this account linked to another known to be
in a suspected fraud ring? Does this entity hold multiple accounts or similar identities in
unusual ways?
Within milliseconds (for most transactions), the system delivers a score that accurately
predicts fraudulent activity – within or across channels. Even though the system can
operate on billions of records, this transaction monitoring doesn’t bog down real-time
decision making and authorization.
7
ENTERPRISEWIDE FRAUD MANAGEMENT
Every night, FBPB also runs a batch process of existing customer accounts to
detect and investigate existing fraud as well as prevent new fraud. The system
parses the data and creates a complete update of all account holders and their
key linking attributes. Driven by metadata, all records are exhaustively linked based
on combinations of attributes within the data. Then, using statistical techniques,
common entities are identified and collapsed to produce single views of entities within
networks. Discrete bounded networks within the data are also generated, representing
statistically relevant groups of activities and relationships.
An advanced scoring engine uses independent and combined scores based on three
core processes:
Customers are not static. Their personal or professional conditions change. A fraud “Real-time transaction monitoring
management system should recognize and work within this dynamic reality. But how is key to mitigating fraud.”
do you capture it? It would be unrealistic to try to assess every data point around a
George Tubin
customer with every transaction. And if you wait 90 days for a quarterly report, the
TowerGroup
opportunity to respond to a change of state may have passed.
Consumer Banking Fraud Trends:
Welcome to the No-Hype Zone
The answer can be to use customer signatures – sets of data elements that sufficiently May 2008
capture a customer’s state. Examples might be dollars spent on airfare, cash
withdrawals from a credit account or transactions over the median for the cluster.
These data elements are established using regression and correlation analysis. They
then can be used in a shorthand method of identifying the customer’s state – and the
associated marketing opportunities or risk.12
12 Tubin, George. TowerGroup. Consumer Banking Fraud Trends: Welcome to the No-Hype Zone.
May 2008.
8
ENTERPRISEWIDE FRAUD MANAGEMENT
For example, a bank with 30 million active cardholders in the US adopted SAS® Fraud
Management to check every credit card transaction. In the first three months, this bank
reported the following results:
• A 10 percent increase in efficiency by agents investigating potentially “ In many cases, the lack of
fraudulent cases.
transparency into the risks a
Furthermore, the bank reduced IT costs by eliminating three software applications that company takes is due to poor
were no longer needed with their new, integrated fraud management system.
operational control and reporting. …
Technologies are available that can
Alerts from multiple systems are aggregated and help overcome these challenges. …
systematically managed These technologies [include] flexible,
broader approaches such as SAS’
FBPB’s fraud management system aggregates and prioritizes alerts from the bank’s
various fraud detection and money laundering tools. Alerts from all these different enterprise case management.”
systems are correlated to provide a full picture of the risk associated with an account Rodney Nelsestuen
or relationship. Analytics can be applied to the alerts to post-score, determine how to TowerGroup
The Global Imperative for Better
route alerts and support other case management decisions.
Operational Risk Management: EU
Financial Industry Leads the Way
An alert database stores the alerts and the results of their disposition. This database May 2, 2011
itself becomes a valuable resource for fraud management in several ways:
• Analysts can mine this alert data to determine how well fraud management
tools are generating and feeding the alert management system and to better
understand the nature of false positives.
• The database can automatically communicate with the bank’s host systems
about interventions that have taken place, such as holds placed on funds’
availability, account closure or other actions.
• Performance management systems can use the statistics and metrics associated
with alerts to assess the success of fraud detection and prevention initiatives.
9
ENTERPRISEWIDE FRAUD MANAGEMENT
Figure 3. SAS® Fraud Network Analysis allows organizations to use analytics and
network visualization capabilities to help identify key hidden relationships, such as where
1
organized crime rings are emerging and whether an employee is involved in an internal
Copyright © 2009, SAS Institute Inc. All rights reserved.
fraud scheme.
Advanced Analytics Lab
2
Figure 4. Using dashboards, case managers and executives can check the status of
Copyright © 2009, SAS Institute Inc. All rights reserved.
investigations and prioritize workloads to be more effective and efficient with resources.
10
ENTERPRISEWIDE FRAUD MANAGEMENT
Entities and transactions that have been flagged for review are automatically sent to
“Case management not only provides
an integrated case management component. Suspicious cases are automatically
assigned to an investigator. When an investigator logs into the system, he or she is a tool for corporate security to
presented with a list of tasks and a structured environment in which to manage them. record losses and develop cases
Information is entered in smartforms that are dynamically linked to workflows. The for civil and criminal litigation; it also
investigator can:
provides a repository for detailed
• See active and pending tasks in context in a visual workflow diagram. information about fraud exposure
• Display details by case. that is essential for maximizing the
• Add freeform notes to the case diary. effectiveness of fraud detection tools
across the organization.”
• Auto-generate letters from predefined templates and customer
database information. Dan Barta
Director, Enterprise Fraud and
• Generate summary and detail reports on demand. Risk Strategy, SAS
Investigators know their time will not be wasted. Between real-time transaction
monitoring and batch processing, FBPB now sees far fewer false positives. Whereas
traditional approaches yielded one accurate fraud hit for every 30 cases referred for
investigation, the new solution can accurately identify one instance of fraud in every “Banks are increasingly looking
three – a big improvement. to buy EFM and financial crime
software that helps them manage
The case management component also measures productivity and other information
to help direct the fraud management function more effectively. For FBPB, the financial regulatory programs from
automated system with network visualization has reduced the time and effort of the same vendor.”
investigating organized fraud by 50 percent to 66 percent. A securities firm reported Gartner, Inc.
that the increase in productivity has enabled them to conduct the same volume of Avivah Litan
investigative activity with 26 percent fewer work-hours. MarketScope for Enterprise Fraud
and Misuse Management
January 14, 2011
To more effectively prevent future losses, fraud management systems will have
to become self-learning, adaptable to a dynamic environment and evolving
fraud techniques.
11
ENTERPRISEWIDE FRAUD MANAGEMENT
This combination of adaptation and visibility would enable financial institutions to better
understand emerging threats, so they can take action to prevent substantial losses
before they happen.
Moving into 2012 and beyond, financial services organizations are looking to use
critical data and information that seem related when working fraud and anti-money
laundering cases. In December 2010, the Association of Certified Anti-Money
Laundering Specialists (ACAMS) and Ernst & Young published a joint survey of 250
global respondents from financial services, law enforcement and regulatory agencies.
The survey topic was “Linking anti-fraud and anti-money laundering programs –
unrealized opportunity or unnecessary complexity?” It noted that 52 percent of financial
services firms had integrated some aspects of their anti-money laundering and anti-
fraud functions. The perfect storm of heightened regulatory pressures and increasingly
sophisticated fraud attacks has created an opportunity for fraud and compliance
Trend in Fraud Detection - Upstream Integration
departments to pool budgets and resources to reduce a shared exposure –
reputation risk.13
Data
Data
Data Data Access Alert Case
Analysis
& Integration Management Management
& Detection
Data
Data
The prospects for the future also extend beyond the scope of any single enterprise. As 1
more organizations adopt integrated, automated fraud and financial crimes systems,
Copyright © 2010, SAS Institute Inc. All rights reserved.
the potential is there to create a broad consortium of financial institutions that can draw
on their collective experiences to improve fraud detection across the industry.
Closing Thoughts
13 Stewart, David. “Financial Crimes Convergence: Tipping Point.” sascom® voices blog. March 2011.
12
ENTERPRISEWIDE FRAUD MANAGEMENT
• Data analysis and alert generation: The ability to assimilate data from multiple
sources and apply predictive analytics to accurately assess transactions, activities
and customer state in real time.
The technology to implement this approach is available today. The right platform will:
• Make information and alerts immediately available to the people who need
this information.
• Increase ROI per investigator through fewer false positives, prioritization of higher- Information Security Media Group
value networks and more accurate investigations. 2010 Survey Results: The Faces
of Fraud: Fighting Back
• Prevent future fraud by better understanding emerging threats and taking the right December 2010
proactive action.
• Extend the value of the fraud management solution by using it to prioritize alerts
for anti-money laundering, credit risk and marketing applications.
Losses stopped. Fraud avoided. Time saved. The ROI comes from many directions.
TowerGroup estimates that for every dollar spent on fraud management, the enterprise
gains back as much as $8. If enterprisewide fraud management sounds like a good
answer for your financial services institution, flag it for investigation.
13
ENTERPRISEWIDE FRAUD MANAGEMENT
About SAS
SAS provides the capabilities described in this document based on the proven SAS
Enterprise Financial Crimes Framework for Banking. This solution takes a unique
approach that blends multiple alerting techniques in both real time and batch and
provides a systematic framework for investigating and managing fraud cases. A hybrid
solution, it detects and prevents both opportunistic and professional/organized fraud –
including emerging threats such as ACH, wire and mobile. Financial institutions can
significantly reduce losses by detecting more fraud with fewer investigators.
SAS has worked closely with top financial institutions for 35 years to create solutions
to address critical business needs. In the financial services industry alone, SAS data
integration, fraud detection, risk management, regulatory compliance, CRM and
other software is used by more than 3,100 financial institutions worldwide, including
97 percent of banks in the Fortune Global 500®. Our award-winning solutions handle
the challenges specifically associated with the volatile financial services industry,
and we can help institutions better manage their strategy, risk, customers and
channels to maximize profitability, achieve greater shareholder value and gain a clear
competitive advantage.
SAS is the leader in business analytics software and services, and the largest
independent vendor in the business intelligence market. Through innovative solutions
delivered within an integrated framework, SAS helps customers at more than 50,000
sites improve performance and deliver value by making better decisions faster. Since
1976 SAS has been giving customers around the world THE POWER TO KNOW®.
14
SAS Institute Inc. World Headquarters +1 919 677 8000
To contact your local SAS office, please visit: www.sas.com/offices
SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA
and other countries. ® indicates USA registration. Other brand and product names are trademarks of their respective companies.
Copyright © 2011, SAS Institute Inc. All rights reserved. 104003_S70639.0611