SlideShare a Scribd company logo
1 of 31
Download to read offline
GRUPPO TELECOM ITALIA




Tackling Card Not Present fraud
in the mobile business

Rome, 17.04.2012



Stefano M. de’ Rossi
Agenda



  Telecom Italia facts & figure


 Non cash payment & credit card fraud


 Credit card fraud: the mobile experience




                                            2
Agenda



  Telecom Italia facts & figure


 Non cash payment & credit card fraud


 Credit card fraud: the mobile experience




                                            3
Company profile

Employees             Telecom Italy is the Italian leading
                    company in Telecommunications and
84,154                             ICT, and
                      one of the most important in Latin
Customers           America and among the top 10 global
                     telecommunications operators since
135,300,000                          1999.


Revenues (2011 €)

29,958,000,000
                                                             4
Telecom Italia Group: …more than simply a phone company




                                                  Office &
                                              System solutions




                    Web          Television     ICT Services
  Telephony




                                                                 5
Agenda



  Telecom Italia facts & figure


 Non cash payment & credit card fraud


 Credit card fraud: the mobile experience




                                            6
Non cash payment evolution


    Overall non-cash payments volumes
     grew by 5% in 2009 to 260 billion,
     continuing the growth trend from 2008
     of 9%, albeit at a slower pace.


    Globally, cards remain the preferred
     non-cash payment instrument, with
     global transaction volumes up almost
     10% and a market share of more than
     40% in most markets.


                                             7
                                                 7
In the fight against card fraud
• As the use of non-cash payments instruments grows, so does
  concern about the potential for fraud.
• Global card fraud has increased consistently along with card usage
  in recent years




                                                     (World payment report 2011)
                                                                                   8
The evolution of credit card fraud

              1980            1990              2000                Today
Fraudster     Individuals     Teams             Local crime rings   International
                                                                    crime rings

Target        Consumers       Small retailers   Larger retailers    Banks
                                                                    Processors

Leading       Lost/stolen     Domestic          Identity theft      Cross-border data
fraud types   Intercepted     counterfeiting/   Phishing            compromise
                              skimming          Rudimentary data    CNP fraud
                                                compromise          ATM fraud

Type of       Travel &        Premium credit    Mass market         All types of credit cards
cards         Entertainment   cards             credit cards        Debit cards
targeted      cards                                                 Prepaid cards

Necessary     Opportunism     Rudimentary       Technical           Audacity
resources                     knowledge         knowhow             Technical expertise
                                                                    Insider information
                                                                    Global connections


                                                                    (Source Visa Europe)
                                                                                                9
Credit Card Fraud – brief history on video




                                             10
Non cash payment in Italy
While our country is still characterized by a low usage of non cash
payments, credit card usage showed up, in the last years, a steady
increase in transaction volumes (both in number and value of
transactions)
                        Credit card transaction 2006-2010 (volume)




           Source: Osservatorio Assofin - CRIF Decision Solutions - GfK Eurisko sulle carte di credito, vol.9, 2011


                                                                                                                      11
Credit card and e-commerce in Italy
Credit Card has become the mostly used payment method for any on
line transactions




          Credit    PayPal    Cash to      Bank               Other
           card               delivery   Transfer


                                                    Source: Casaleggio Associati, 2011

                                                                                         12
Credit card fraud analysis in 2009 / 2010
As well as in the rest of the world, what can be set in Italy in the last 2
years, is a very close trend between the total number of credit card
transactions and the number of fraudulent operations detected.



          # fraudulent operation (2009-1=100)




                                                     Source: Rapporto statistico sulle frodi con le
                                                     carte di credito 1/2011 - UCAMP
                                                                                                  13
Agenda



  Telecom Italia facts & figure


 Non cash payment & credit card fraud


 Credit card fraud: the mobile experience


  Card not present fraud: our experience




                                            14
2011 CFCA Global Fraud Loss Survey
In tandem with the growth in the use of credit cards fraud has
become a significant problem for GSM operators.



                                           • Compromised PBX/Voicemail systems
                                           • Subscription/Identity (ID) Theft
                                           • International Revenue Share Fraud (IRSF)
                                           • GSM-Box & Bypass Fraud
                                           • Credit Card Fraud



Communications Fraud Control Association
                                                                                    15
2011 CFCA Global Fraud Loss Survey




Communications Fraud Control Association
                                           16
Credit Card Fraud: a GSMA perspective




             Card                  Card
           Present             Not Present POINT
                                          SUB
         Transactions          Transactions




                Credit Card Fraud



                                                   17
Card present transactions

                       Card present transactions for services or products
                        are payments and requests made directly by the
                        cardholder at the point of sale.
                       Counterfeit card fraud
                       Skimming
         Card
                       Lost and stolen card fraud
       Present
                       Mail non-receipt card fraud
     Transactions
                       Identity theft on cards




            Credit Card Fraud


                                                                        18
Card Not Present (CNP) transaction


 Card is not physically present as it would be in a
  retail store.
 First card data is stolen in the real world and then

  criminals use it for the purchases.
                                                             Card
 There’s no face to face contact, no tangible card

  and no physical signature on the sales draft.
                                                         Not Present
                                                         Transactions




                                      Credit Card Fraud


                                                                        19
Card fraud losses split by type
Card-not-present fraud accounts for 64 % of all card fraud
in 2011


         4%                                          7%        15%
  23%           28%                                                    3%

                                                                        11%
         2001                                          2011
                 7%
                                             64%
        38%




                                              Source: FRAUD THE FACTS 2012 – FFA Uk
                                                                                      20
Card fraud losses split by type in Italy

Figures are defintely different in Italy where counterfeit
accounts for the large majority of card fraud


      7% 3%                                              4%
               18%                              11%
                                                                        24%
                     2%
        2009                                             2011                  3%



      70%                                          58%




                                               Source: Rapporto statistico sulle frodi con le
                                               carte di credito 1/2011 - UCAMP             21
Most card details used in CNP Fraud are compromised cards,
not stolen.




                                                        22
Global payment breach – short video




                                      23
CNP Fraud and GSM Operators
Mobile operators offer payment options for a variety of services
that are card-not-present transactions:


                 HANDSET                          PAYMENT OF
                 PURCHASE                         INVOICES




                ACCESS TO                          PREPAY
                PREMIUM                            RECHARGE
                CONTENT



                                                               24
What are the losses?


•   Loss of the value of the transaction (Chargeback's)

•   Costs of processing these transactions

•   Interconnection costs & Revenue share

•   Potential loss of Merchant status




                                                          25
Prevention & Detection measures for CNP transaction

                              Service   Product
                              Payment   Payment

 Pre-registration process


 Restriction


 Unique IMEI association


 Telephone authentication


 Strict delivery procedures


                                                      26
A layered security approach for CNP fraud prevention


                                          Telephone   Mail
                               Internet
                                          Order       Order

Address verification service
(AVS)


 Card Verification Value 2
 (CVV2)


 Verified by VISA (VbV)



 PCI - DSS

                                                              27
Payment Card Industry – Data Security Standard
• The PCI DSS is intended to help protect Visa cardholder data— wherever
  it resides—ensuring that customers, merchants, and service providers
  maintain the highest information security standard.
• It offers a single approach to safeguarding sensitive data for all card
  brands.
• PCI DSS compliance is required of all entities that store, process, or
  transmit Visa cardholder data.




                                                                        28
PCI-DSS main pillars
The core of the PCI DSS is a group of principles and accompanying
requirements, around which the specific elements of the DSS are
organized
                     1      Build and Maintain a Secure Network


                     2           Protect Cardholder Data

                     3      Maintain a Vulnerability Management
                                          Program
 PCI-DSS
 PILLARS             4 Implement Strong Access Control Measures

                     5    Regularly Monitor and Test Networks

                     6   Maintain an Information Security Policy

                                                                    29
Things to take away

• As the use of non-cash payments instruments grows, so does
  concern about the potential for fraud.
• The payments industry is pursuing various innovations to tackle
  fraud and better secure non-cash transactions—and thereby
  bolster consumer confidence.
• Attention is focused most, however, on e-commerce transactions,
  especially as electronic thefts increasingly hit the headlines.
• Managing risk against the threat of credit card fraud is certainly
  not an easy task.
• We remain committed to containing and reducing all areas of fraud
  and will continue to work with key partners to achieve this end.
Tackling Card Not Present fraud in the mobile business

More Related Content

What's hot

Contactless Payment Pp
Contactless Payment PpContactless Payment Pp
Contactless Payment Ppcolleneakard
 
Global Debit Cards Industry
Global Debit Cards IndustryGlobal Debit Cards Industry
Global Debit Cards IndustryReportLinker.com
 
Mobile Payments in The Financial Services Industry
Mobile Payments in The Financial Services IndustryMobile Payments in The Financial Services Industry
Mobile Payments in The Financial Services IndustryPenn Mutual
 
EMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment ProcessEMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment Process- Mark - Fullbright
 
CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011CPPGroup Plc
 
Mobile money, a development tool for benin powerpoint
Mobile money, a development tool for benin powerpointMobile money, a development tool for benin powerpoint
Mobile money, a development tool for benin powerpointAJAVON Samuel
 
Transformation of the Electronic Payments Industry - Strategies for Growth
Transformation of the Electronic Payments Industry - Strategies for GrowthTransformation of the Electronic Payments Industry - Strategies for Growth
Transformation of the Electronic Payments Industry - Strategies for Growthfrancisfoo
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemWarren Smith
 
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce Trends
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce TrendsPrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce Trends
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce TrendsPrestaShop
 
Mobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanMobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanGerhard Fasol
 
PCM_SoftFinance Article_p22and23
PCM_SoftFinance Article_p22and23PCM_SoftFinance Article_p22and23
PCM_SoftFinance Article_p22and23Denise Gee
 
Visa Stock Analysis Report
Visa Stock Analysis ReportVisa Stock Analysis Report
Visa Stock Analysis ReportTrè Cotton
 
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015Arm Igf
 
Payment Systems Business Model & The Way Forward
Payment Systems Business Model & The Way ForwardPayment Systems Business Model & The Way Forward
Payment Systems Business Model & The Way Forwardcatmahir
 
Mobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional BankingMobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional BankingInfosys Finacle
 
management issues in online banking
management issues in online bankingmanagement issues in online banking
management issues in online bankingRanjeet Patel
 
Unleashing The Power of Smart Payment - Contactless
Unleashing The Power of Smart Payment  - ContactlessUnleashing The Power of Smart Payment  - Contactless
Unleashing The Power of Smart Payment - ContactlessSmart Payment Association
 
How we will be paying in 2020 - SPA Technical Director, Lorenzo Gaston at EPC...
How we will be paying in 2020 - SPA Technical Director, Lorenzo Gaston at EPC...How we will be paying in 2020 - SPA Technical Director, Lorenzo Gaston at EPC...
How we will be paying in 2020 - SPA Technical Director, Lorenzo Gaston at EPC...Smart Payment Association
 

What's hot (20)

Contactless Payment Pp
Contactless Payment PpContactless Payment Pp
Contactless Payment Pp
 
Global Debit Cards Industry
Global Debit Cards IndustryGlobal Debit Cards Industry
Global Debit Cards Industry
 
Mobile Payments in The Financial Services Industry
Mobile Payments in The Financial Services IndustryMobile Payments in The Financial Services Industry
Mobile Payments in The Financial Services Industry
 
EMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment ProcessEMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment Process
 
CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011
 
Mobile money, a development tool for benin powerpoint
Mobile money, a development tool for benin powerpointMobile money, a development tool for benin powerpoint
Mobile money, a development tool for benin powerpoint
 
Transformation of the Electronic Payments Industry - Strategies for Growth
Transformation of the Electronic Payments Industry - Strategies for GrowthTransformation of the Electronic Payments Industry - Strategies for Growth
Transformation of the Electronic Payments Industry - Strategies for Growth
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card System
 
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce Trends
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce TrendsPrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce Trends
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce Trends
 
Mobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanMobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in Japan
 
PCM_SoftFinance Article_p22and23
PCM_SoftFinance Article_p22and23PCM_SoftFinance Article_p22and23
PCM_SoftFinance Article_p22and23
 
Visa Stock Analysis Report
Visa Stock Analysis ReportVisa Stock Analysis Report
Visa Stock Analysis Report
 
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
 
Peer to-peer mobile payments
Peer to-peer mobile paymentsPeer to-peer mobile payments
Peer to-peer mobile payments
 
Payment Systems Business Model & The Way Forward
Payment Systems Business Model & The Way ForwardPayment Systems Business Model & The Way Forward
Payment Systems Business Model & The Way Forward
 
Community Bank Jun2015
Community Bank Jun2015Community Bank Jun2015
Community Bank Jun2015
 
Mobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional BankingMobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional Banking
 
management issues in online banking
management issues in online bankingmanagement issues in online banking
management issues in online banking
 
Unleashing The Power of Smart Payment - Contactless
Unleashing The Power of Smart Payment  - ContactlessUnleashing The Power of Smart Payment  - Contactless
Unleashing The Power of Smart Payment - Contactless
 
How we will be paying in 2020 - SPA Technical Director, Lorenzo Gaston at EPC...
How we will be paying in 2020 - SPA Technical Director, Lorenzo Gaston at EPC...How we will be paying in 2020 - SPA Technical Director, Lorenzo Gaston at EPC...
How we will be paying in 2020 - SPA Technical Director, Lorenzo Gaston at EPC...
 

Viewers also liked

GrowthStack 2016 — Rapid Response To Mobile Fraud
GrowthStack 2016 — Rapid Response To Mobile FraudGrowthStack 2016 — Rapid Response To Mobile Fraud
GrowthStack 2016 — Rapid Response To Mobile FraudGrow.co
 
PCI DSS v3 - Protecting Cardholder data
PCI DSS v3 - Protecting Cardholder dataPCI DSS v3 - Protecting Cardholder data
PCI DSS v3 - Protecting Cardholder dataInMobi Technology
 
Electronic transactions 123
Electronic transactions 123Electronic transactions 123
Electronic transactions 123Deva Prasad
 
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingPCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingAlienVault
 
PCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed IntroductionPCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed IntroductionControlCase
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuideAlienVault
 
PCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowPCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowAlienVault
 

Viewers also liked (16)

GrowthStack 2016 — Rapid Response To Mobile Fraud
GrowthStack 2016 — Rapid Response To Mobile FraudGrowthStack 2016 — Rapid Response To Mobile Fraud
GrowthStack 2016 — Rapid Response To Mobile Fraud
 
Cfca Global Fraud Loss Survey2009
Cfca Global Fraud Loss Survey2009Cfca Global Fraud Loss Survey2009
Cfca Global Fraud Loss Survey2009
 
Mind mapping
Mind mapping Mind mapping
Mind mapping
 
PCI DSS v3 - Protecting Cardholder data
PCI DSS v3 - Protecting Cardholder dataPCI DSS v3 - Protecting Cardholder data
PCI DSS v3 - Protecting Cardholder data
 
introduzione al data mining
introduzione al data mining introduzione al data mining
introduzione al data mining
 
Electronic transactions 123
Electronic transactions 123Electronic transactions 123
Electronic transactions 123
 
Merging fraud in a full IP environment
Merging fraud in a full IP environmentMerging fraud in a full IP environment
Merging fraud in a full IP environment
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
CRM Value proposition - smdr
CRM Value proposition - smdrCRM Value proposition - smdr
CRM Value proposition - smdr
 
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingPCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
 
PCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed IntroductionPCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed Introduction
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
 
PCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowPCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to Know
 
Data mart
Data martData mart
Data mart
 
Mobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessmentMobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessment
 
Data mart
Data martData mart
Data mart
 

Similar to Tackling Card Not Present fraud in the mobile business

Uk regional card fraud 2009
Uk regional card fraud 2009Uk regional card fraud 2009
Uk regional card fraud 2009CPPGroup Plc
 
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...Asociación de Marketing Bancario Argentino
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud managementrkappear
 
Will Mobile Payments Ever Replace Cash in the Last Mile? Where, when, and how?
Will Mobile Payments Ever Replace Cash in the Last Mile?  Where, when, and how?Will Mobile Payments Ever Replace Cash in the Last Mile?  Where, when, and how?
Will Mobile Payments Ever Replace Cash in the Last Mile? Where, when, and how?Menekse Gencer
 
hidden payment 2016-Trend 6
hidden payment 2016-Trend 6hidden payment 2016-Trend 6
hidden payment 2016-Trend 6Rahul Yadav
 
Fraud Prevention in International Commerce
Fraud Prevention in International CommerceFraud Prevention in International Commerce
Fraud Prevention in International CommerceSecure Trading
 
Uk lost and stolen cards 2010
Uk lost and stolen cards 2010Uk lost and stolen cards 2010
Uk lost and stolen cards 2010CPPGroup Plc
 
Uk regional card fraud 2010
Uk regional card fraud 2010Uk regional card fraud 2010
Uk regional card fraud 2010CPPGroup Plc
 
EBE 2019 - The end of passwords: Two-factor-authentication and biometrics are...
EBE 2019 - The end of passwords: Two-factor-authentication and biometrics are...EBE 2019 - The end of passwords: Two-factor-authentication and biometrics are...
EBE 2019 - The end of passwords: Two-factor-authentication and biometrics are...E-Commerce Berlin EXPO
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
 
The end of passwords: Two-factor-authentication and biometrics are coming 2019
The end of passwords: Two-factor-authentication and biometrics are coming 2019The end of passwords: Two-factor-authentication and biometrics are coming 2019
The end of passwords: Two-factor-authentication and biometrics are coming 2019JanSobczak5
 
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...ijtsrd
 
Mr Deturche Gemalto The Mobile
Mr Deturche Gemalto The MobileMr Deturche Gemalto The Mobile
Mr Deturche Gemalto The MobileIDATE DigiWorld
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET Journal
 
CNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsCNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsChristopher Uriarte
 
Socialize: Monetizing Social Media - Steve Klebe
Socialize: Monetizing Social Media - Steve KlebeSocialize: Monetizing Social Media - Steve Klebe
Socialize: Monetizing Social Media - Steve KlebeMediabistro
 
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The i-Capital Africa Institute
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraudblogzilla
 

Similar to Tackling Card Not Present fraud in the mobile business (20)

Uk regional card fraud 2009
Uk regional card fraud 2009Uk regional card fraud 2009
Uk regional card fraud 2009
 
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
 
Will Mobile Payments Ever Replace Cash in the Last Mile? Where, when, and how?
Will Mobile Payments Ever Replace Cash in the Last Mile?  Where, when, and how?Will Mobile Payments Ever Replace Cash in the Last Mile?  Where, when, and how?
Will Mobile Payments Ever Replace Cash in the Last Mile? Where, when, and how?
 
hidden payment 2016-Trend 6
hidden payment 2016-Trend 6hidden payment 2016-Trend 6
hidden payment 2016-Trend 6
 
Fraud Prevention in International Commerce
Fraud Prevention in International CommerceFraud Prevention in International Commerce
Fraud Prevention in International Commerce
 
Uk lost and stolen cards 2010
Uk lost and stolen cards 2010Uk lost and stolen cards 2010
Uk lost and stolen cards 2010
 
Uk regional card fraud 2010
Uk regional card fraud 2010Uk regional card fraud 2010
Uk regional card fraud 2010
 
EBE 2019 - The end of passwords: Two-factor-authentication and biometrics are...
EBE 2019 - The end of passwords: Two-factor-authentication and biometrics are...EBE 2019 - The end of passwords: Two-factor-authentication and biometrics are...
EBE 2019 - The end of passwords: Two-factor-authentication and biometrics are...
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
EMV and the consumer Final
EMV and the consumer FinalEMV and the consumer Final
EMV and the consumer Final
 
The end of passwords: Two-factor-authentication and biometrics are coming 2019
The end of passwords: Two-factor-authentication and biometrics are coming 2019The end of passwords: Two-factor-authentication and biometrics are coming 2019
The end of passwords: Two-factor-authentication and biometrics are coming 2019
 
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
 
Mr Deturche Gemalto The Mobile
Mr Deturche Gemalto The MobileMr Deturche Gemalto The Mobile
Mr Deturche Gemalto The Mobile
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid Models
 
CNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsCNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift Cards
 
Taveau cartes2012 speaker
Taveau cartes2012 speakerTaveau cartes2012 speaker
Taveau cartes2012 speaker
 
Socialize: Monetizing Social Media - Steve Klebe
Socialize: Monetizing Social Media - Steve KlebeSocialize: Monetizing Social Media - Steve Klebe
Socialize: Monetizing Social Media - Steve Klebe
 
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
 

More from Stefano Maria De' Rossi

Tecniche di Data Mining a supporto del fraud management
Tecniche di Data Mining a supporto del fraud managementTecniche di Data Mining a supporto del fraud management
Tecniche di Data Mining a supporto del fraud managementStefano Maria De' Rossi
 
Data mining in support of fraud management
Data mining in support of fraud managementData mining in support of fraud management
Data mining in support of fraud managementStefano Maria De' Rossi
 
Storia della bambina e della stella marina
Storia della bambina e della stella marinaStoria della bambina e della stella marina
Storia della bambina e della stella marinaStefano Maria De' Rossi
 
Using business intelligence for competitive advantage
Using business intelligence for competitive advantageUsing business intelligence for competitive advantage
Using business intelligence for competitive advantageStefano Maria De' Rossi
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...Stefano Maria De' Rossi
 
Competitive Intelligence e Risk Managment
Competitive Intelligence e Risk ManagmentCompetitive Intelligence e Risk Managment
Competitive Intelligence e Risk ManagmentStefano Maria De' Rossi
 
Customer Profiling & Predictive Analysis
Customer Profiling & Predictive AnalysisCustomer Profiling & Predictive Analysis
Customer Profiling & Predictive AnalysisStefano Maria De' Rossi
 

More from Stefano Maria De' Rossi (19)

Tecniche di Data Mining a supporto del fraud management
Tecniche di Data Mining a supporto del fraud managementTecniche di Data Mining a supporto del fraud management
Tecniche di Data Mining a supporto del fraud management
 
Crm value proposition
Crm value propositionCrm value proposition
Crm value proposition
 
2015 GALA breve presentazione_12.05
2015 GALA breve presentazione_12.052015 GALA breve presentazione_12.05
2015 GALA breve presentazione_12.05
 
GALA breve presentazione maggio 2015
GALA breve presentazione maggio 2015GALA breve presentazione maggio 2015
GALA breve presentazione maggio 2015
 
2015 GALA presentazione apr2016
2015 GALA presentazione apr20162015 GALA presentazione apr2016
2015 GALA presentazione apr2016
 
slide PROGEDIL PS da paura
slide PROGEDIL  PS da paura slide PROGEDIL  PS da paura
slide PROGEDIL PS da paura
 
Presentazione AD Mind 2012
Presentazione AD Mind 2012Presentazione AD Mind 2012
Presentazione AD Mind 2012
 
Data mining in support of fraud management
Data mining in support of fraud managementData mining in support of fraud management
Data mining in support of fraud management
 
Storia della bambina e della stella marina
Storia della bambina e della stella marinaStoria della bambina e della stella marina
Storia della bambina e della stella marina
 
Presentazione ADM 2011
Presentazione ADM 2011Presentazione ADM 2011
Presentazione ADM 2011
 
Competitive_intelligence
Competitive_intelligenceCompetitive_intelligence
Competitive_intelligence
 
Identifying high value customers
Identifying high value customersIdentifying high value customers
Identifying high value customers
 
Costruire la relazione
Costruire la relazioneCostruire la relazione
Costruire la relazione
 
Using business intelligence for competitive advantage
Using business intelligence for competitive advantageUsing business intelligence for competitive advantage
Using business intelligence for competitive advantage
 
Competitive intelligence overview
Competitive intelligence overviewCompetitive intelligence overview
Competitive intelligence overview
 
Studio Labsus v2009
Studio Labsus v2009Studio Labsus v2009
Studio Labsus v2009
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
 
Competitive Intelligence e Risk Managment
Competitive Intelligence e Risk ManagmentCompetitive Intelligence e Risk Managment
Competitive Intelligence e Risk Managment
 
Customer Profiling & Predictive Analysis
Customer Profiling & Predictive AnalysisCustomer Profiling & Predictive Analysis
Customer Profiling & Predictive Analysis
 

Recently uploaded

12 Week Weight Loss Planner to help with planning weight loss
12 Week Weight Loss Planner to help with planning weight loss12 Week Weight Loss Planner to help with planning weight loss
12 Week Weight Loss Planner to help with planning weight lossSimpleMoneyMaker
 
Group Discussion and panel Discussion
Group Discussion  and   panel DiscussionGroup Discussion  and   panel Discussion
Group Discussion and panel DiscussionAbdulGhaffarGhori
 
Uttoxeter & Cheadle Voice, Issue 122.pdf
Uttoxeter & Cheadle Voice, Issue 122.pdfUttoxeter & Cheadle Voice, Issue 122.pdf
Uttoxeter & Cheadle Voice, Issue 122.pdfNoel Sergeant
 
FUNDAMENTALS OF ARNIS ARNIS ARNIS ARNIS ARNIS
FUNDAMENTALS OF ARNIS ARNIS ARNIS ARNIS ARNISFUNDAMENTALS OF ARNIS ARNIS ARNIS ARNIS ARNIS
FUNDAMENTALS OF ARNIS ARNIS ARNIS ARNIS ARNISe98298697
 
Living in the Light_ A guide to personal transformation ( PDFDrive ).pdf
Living in the Light_ A guide to personal transformation ( PDFDrive ).pdfLiving in the Light_ A guide to personal transformation ( PDFDrive ).pdf
Living in the Light_ A guide to personal transformation ( PDFDrive ).pdfkalpana413121
 
Masjid Ishaq The Mosque of Babo Dehri Swabi
Masjid Ishaq The Mosque of Babo Dehri SwabiMasjid Ishaq The Mosque of Babo Dehri Swabi
Masjid Ishaq The Mosque of Babo Dehri SwabiAlhamdulillah 33
 

Recently uploaded (6)

12 Week Weight Loss Planner to help with planning weight loss
12 Week Weight Loss Planner to help with planning weight loss12 Week Weight Loss Planner to help with planning weight loss
12 Week Weight Loss Planner to help with planning weight loss
 
Group Discussion and panel Discussion
Group Discussion  and   panel DiscussionGroup Discussion  and   panel Discussion
Group Discussion and panel Discussion
 
Uttoxeter & Cheadle Voice, Issue 122.pdf
Uttoxeter & Cheadle Voice, Issue 122.pdfUttoxeter & Cheadle Voice, Issue 122.pdf
Uttoxeter & Cheadle Voice, Issue 122.pdf
 
FUNDAMENTALS OF ARNIS ARNIS ARNIS ARNIS ARNIS
FUNDAMENTALS OF ARNIS ARNIS ARNIS ARNIS ARNISFUNDAMENTALS OF ARNIS ARNIS ARNIS ARNIS ARNIS
FUNDAMENTALS OF ARNIS ARNIS ARNIS ARNIS ARNIS
 
Living in the Light_ A guide to personal transformation ( PDFDrive ).pdf
Living in the Light_ A guide to personal transformation ( PDFDrive ).pdfLiving in the Light_ A guide to personal transformation ( PDFDrive ).pdf
Living in the Light_ A guide to personal transformation ( PDFDrive ).pdf
 
Masjid Ishaq The Mosque of Babo Dehri Swabi
Masjid Ishaq The Mosque of Babo Dehri SwabiMasjid Ishaq The Mosque of Babo Dehri Swabi
Masjid Ishaq The Mosque of Babo Dehri Swabi
 

Tackling Card Not Present fraud in the mobile business

  • 1. GRUPPO TELECOM ITALIA Tackling Card Not Present fraud in the mobile business Rome, 17.04.2012 Stefano M. de’ Rossi
  • 2. Agenda Telecom Italia facts & figure Non cash payment & credit card fraud Credit card fraud: the mobile experience 2
  • 3. Agenda Telecom Italia facts & figure Non cash payment & credit card fraud Credit card fraud: the mobile experience 3
  • 4. Company profile Employees Telecom Italy is the Italian leading company in Telecommunications and 84,154 ICT, and one of the most important in Latin Customers America and among the top 10 global telecommunications operators since 135,300,000 1999. Revenues (2011 €) 29,958,000,000 4
  • 5. Telecom Italia Group: …more than simply a phone company Office & System solutions Web Television ICT Services Telephony 5
  • 6. Agenda Telecom Italia facts & figure Non cash payment & credit card fraud Credit card fraud: the mobile experience 6
  • 7. Non cash payment evolution  Overall non-cash payments volumes grew by 5% in 2009 to 260 billion, continuing the growth trend from 2008 of 9%, albeit at a slower pace.  Globally, cards remain the preferred non-cash payment instrument, with global transaction volumes up almost 10% and a market share of more than 40% in most markets. 7 7
  • 8. In the fight against card fraud • As the use of non-cash payments instruments grows, so does concern about the potential for fraud. • Global card fraud has increased consistently along with card usage in recent years (World payment report 2011) 8
  • 9. The evolution of credit card fraud 1980 1990 2000 Today Fraudster Individuals Teams Local crime rings International crime rings Target Consumers Small retailers Larger retailers Banks Processors Leading Lost/stolen Domestic Identity theft Cross-border data fraud types Intercepted counterfeiting/ Phishing compromise skimming Rudimentary data CNP fraud compromise ATM fraud Type of Travel & Premium credit Mass market All types of credit cards cards Entertainment cards credit cards Debit cards targeted cards Prepaid cards Necessary Opportunism Rudimentary Technical Audacity resources knowledge knowhow Technical expertise Insider information Global connections (Source Visa Europe) 9
  • 10. Credit Card Fraud – brief history on video 10
  • 11. Non cash payment in Italy While our country is still characterized by a low usage of non cash payments, credit card usage showed up, in the last years, a steady increase in transaction volumes (both in number and value of transactions) Credit card transaction 2006-2010 (volume) Source: Osservatorio Assofin - CRIF Decision Solutions - GfK Eurisko sulle carte di credito, vol.9, 2011 11
  • 12. Credit card and e-commerce in Italy Credit Card has become the mostly used payment method for any on line transactions Credit PayPal Cash to Bank Other card delivery Transfer Source: Casaleggio Associati, 2011 12
  • 13. Credit card fraud analysis in 2009 / 2010 As well as in the rest of the world, what can be set in Italy in the last 2 years, is a very close trend between the total number of credit card transactions and the number of fraudulent operations detected. # fraudulent operation (2009-1=100) Source: Rapporto statistico sulle frodi con le carte di credito 1/2011 - UCAMP 13
  • 14. Agenda Telecom Italia facts & figure Non cash payment & credit card fraud Credit card fraud: the mobile experience Card not present fraud: our experience 14
  • 15. 2011 CFCA Global Fraud Loss Survey In tandem with the growth in the use of credit cards fraud has become a significant problem for GSM operators. • Compromised PBX/Voicemail systems • Subscription/Identity (ID) Theft • International Revenue Share Fraud (IRSF) • GSM-Box & Bypass Fraud • Credit Card Fraud Communications Fraud Control Association 15
  • 16. 2011 CFCA Global Fraud Loss Survey Communications Fraud Control Association 16
  • 17. Credit Card Fraud: a GSMA perspective Card Card Present Not Present POINT SUB Transactions Transactions Credit Card Fraud 17
  • 18. Card present transactions  Card present transactions for services or products are payments and requests made directly by the cardholder at the point of sale.  Counterfeit card fraud  Skimming Card  Lost and stolen card fraud Present  Mail non-receipt card fraud Transactions  Identity theft on cards Credit Card Fraud 18
  • 19. Card Not Present (CNP) transaction  Card is not physically present as it would be in a retail store.  First card data is stolen in the real world and then criminals use it for the purchases. Card  There’s no face to face contact, no tangible card and no physical signature on the sales draft. Not Present Transactions Credit Card Fraud 19
  • 20. Card fraud losses split by type Card-not-present fraud accounts for 64 % of all card fraud in 2011 4% 7% 15% 23% 28% 3% 11% 2001 2011 7% 64% 38% Source: FRAUD THE FACTS 2012 – FFA Uk 20
  • 21. Card fraud losses split by type in Italy Figures are defintely different in Italy where counterfeit accounts for the large majority of card fraud 7% 3% 4% 18% 11% 24% 2% 2009 2011 3% 70% 58% Source: Rapporto statistico sulle frodi con le carte di credito 1/2011 - UCAMP 21
  • 22. Most card details used in CNP Fraud are compromised cards, not stolen. 22
  • 23. Global payment breach – short video 23
  • 24. CNP Fraud and GSM Operators Mobile operators offer payment options for a variety of services that are card-not-present transactions: HANDSET PAYMENT OF PURCHASE INVOICES ACCESS TO PREPAY PREMIUM RECHARGE CONTENT 24
  • 25. What are the losses? • Loss of the value of the transaction (Chargeback's) • Costs of processing these transactions • Interconnection costs & Revenue share • Potential loss of Merchant status 25
  • 26. Prevention & Detection measures for CNP transaction Service Product Payment Payment Pre-registration process Restriction Unique IMEI association Telephone authentication Strict delivery procedures 26
  • 27. A layered security approach for CNP fraud prevention Telephone Mail Internet Order Order Address verification service (AVS) Card Verification Value 2 (CVV2) Verified by VISA (VbV) PCI - DSS 27
  • 28. Payment Card Industry – Data Security Standard • The PCI DSS is intended to help protect Visa cardholder data— wherever it resides—ensuring that customers, merchants, and service providers maintain the highest information security standard. • It offers a single approach to safeguarding sensitive data for all card brands. • PCI DSS compliance is required of all entities that store, process, or transmit Visa cardholder data. 28
  • 29. PCI-DSS main pillars The core of the PCI DSS is a group of principles and accompanying requirements, around which the specific elements of the DSS are organized 1 Build and Maintain a Secure Network 2 Protect Cardholder Data 3 Maintain a Vulnerability Management Program PCI-DSS PILLARS 4 Implement Strong Access Control Measures 5 Regularly Monitor and Test Networks 6 Maintain an Information Security Policy 29
  • 30. Things to take away • As the use of non-cash payments instruments grows, so does concern about the potential for fraud. • The payments industry is pursuing various innovations to tackle fraud and better secure non-cash transactions—and thereby bolster consumer confidence. • Attention is focused most, however, on e-commerce transactions, especially as electronic thefts increasingly hit the headlines. • Managing risk against the threat of credit card fraud is certainly not an easy task. • We remain committed to containing and reducing all areas of fraud and will continue to work with key partners to achieve this end.