SlideShare a Scribd company logo
1 of 14
Download to read offline
Too much white noise
You need more than just a bigger „to do‟ list!
SMART Data, not „Big Data‟
Beware of “I am Spartacus”!
Common „noise‟
Process & the “Retreat of Reason”
„Fraud savings‟ & targets
“Police aren’t interested in fraud”
If a claim was a relay baton?...
Continual innovation required to address „hot spots‟
Continual innovation required to address „hot spots‟
thirdeye® Casualty
Screening = swift decisions
Fast. Effective. Evolving…
Are they who they say?
Were they where they said?
Did they do what they said?
How do they live?
Stay in or out of Portal?
Add genuine value
or get out of the way!
Get excited about what you do
or get out of the way!
Keep challenging oneself
– it‟s how we improve
Increasingly important to...
Reduce the noise!
DATE
FRONT LINE
• As an online company we require the maximum amount of information on our clients, besides the usual
personal data. The information that we obtain via our front line IP provider helps us build a better
understanding of the potential client, in addition to the personal information submitted by the client.
Another benefit is the unique device number provided; this device is recorded within their vast database
allowing subscribers to view this database to observe the device history.
• The unique information presented to us from our provider is: Device type, Real IP address, Country,
Region, City and Service Provider. Other information is evidence placed on the device by other
Subscribers as well as ourselves; this can include True ID Theft and Credit Card Fraud among many
other types.
10
DATE
THE BREAKDOWN
• We are also able to set our own rules, with varying output responses e.g. Allow, Review and Deny
depending on a company’s appetite for risk. The below table show some of rules present, evidence
placed by us or other subscribers is shown below including the ratio seen within the applications sent for
Review:
11
Rules Aug-14
Country List 21%
Device ID is Unique 5%
Risky Device 4%
High Risk ISP 3%
High Risk IP 5%
MYJAR Evidence Exists 4%
Mobile Emulator Detected 1%
Potential Financial Difficulties 2%
Proxy in Use 1%
Subscriber Evidence 19%
Timezone vs Geolocation Mismatch 32%
Risky Transactions A 3%
Risky Transactions B 2%
DATE
THE FURTHER BREAKDOWN
• In addition to the above IP database we also use rules within our own database, this mainly looks at
velocity, related clients history and defined known risks. All accounts that fail any of our rule sets are
sent for review by our validation team and our fraud manager.
• There are varying types of fraud seen by us; however, the majority of the fraud seen can be broken
down into different standards of fraud and analysed. A breakdown of this for 2013 and YTD can be seen
below:
12
Fraud Definitions 2013 YTD
Application Fraud 11.50% 2.50%
Account Take-Over/Hijacking 0.50% 0.20%
Fraud Other 1.10% 0.70%
Identity Fraud 50.00% 34.30%
Misuse of Facility Fraud 11.60% 15.00%
Subscriber Evidence Fraud 20.30% 37.70%
Returned as Fraud from DC 5.10% 9.60%
DATE
FRAUD GANGS MO
• Crime gangs like to operate using stolen identities which can be obtained from the ‘dark web’, in tandem
with cloned/stolen cards. Their favoured MO as observed by us is using a dynamic IP or open public
network fraudulently applying for loans using a windows pc. As their patterns are usually consistent we
are usually able to have some impact on their operation however some naturally slip through.
13
Group Head of
Collections, Recoveries
and Fraud
STUART SYKES
14

More Related Content

What's hot

Security Against Fraud In Ecommerce
Security Against Fraud In EcommerceSecurity Against Fraud In Ecommerce
Security Against Fraud In Ecommerce
Larry_Moffatt
 
Detecting and Monitoring: Corruption Across your Operations
Detecting and Monitoring: Corruption Across your Operations  Detecting and Monitoring: Corruption Across your Operations
Detecting and Monitoring: Corruption Across your Operations
Rachel Hamilton
 

What's hot (17)

Police clearance certificate ppt
Police clearance certificate pptPolice clearance certificate ppt
Police clearance certificate ppt
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
Security Against Fraud In Ecommerce
Security Against Fraud In EcommerceSecurity Against Fraud In Ecommerce
Security Against Fraud In Ecommerce
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
 
Detecting and Monitoring: Corruption Across your Operations
Detecting and Monitoring: Corruption Across your Operations  Detecting and Monitoring: Corruption Across your Operations
Detecting and Monitoring: Corruption Across your Operations
 
eCommerce – Fraud
eCommerce – FraudeCommerce – Fraud
eCommerce – Fraud
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email Compromise
 
4 ways rpa can help your business eliminate fraud
4 ways rpa can help your business eliminate fraud4 ways rpa can help your business eliminate fraud
4 ways rpa can help your business eliminate fraud
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce Masterclass
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
 
Simplex - NOAH19 Tel Aviv
Simplex - NOAH19 Tel AvivSimplex - NOAH19 Tel Aviv
Simplex - NOAH19 Tel Aviv
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
AMLMaps - Research & Highlights Report
AMLMaps - Research & Highlights ReportAMLMaps - Research & Highlights Report
AMLMaps - Research & Highlights Report
 
Fraud management optimisation
Fraud management optimisation Fraud management optimisation
Fraud management optimisation
 
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
 
Mexico Registries Registrars Abuse Domains 030309
Mexico Registries Registrars Abuse Domains 030309Mexico Registries Registrars Abuse Domains 030309
Mexico Registries Registrars Abuse Domains 030309
 

Viewers also liked

Fındık Tebliği
Fındık  TebliğiFındık  Tebliği
Fındık Tebliği
lidasder
 
Lidasder tuzuk
Lidasder tuzukLidasder tuzuk
Lidasder tuzuk
lidasder
 
Pamuk tebliği
Pamuk tebliğiPamuk tebliği
Pamuk tebliği
lidasder
 
Lisansli depoculuk kanunu
Lisansli depoculuk kanunuLisansli depoculuk kanunu
Lisansli depoculuk kanunu
lidasder
 
Zeytin tebliği
Zeytin tebliğiZeytin tebliği
Zeytin tebliği
lidasder
 
Yetkili sınıflandırıcı yönetmeliği
Yetkili sınıflandırıcı yönetmeliğiYetkili sınıflandırıcı yönetmeliği
Yetkili sınıflandırıcı yönetmeliği
lidasder
 
Kuru kaysı tebliği
Kuru kaysı tebliğiKuru kaysı tebliği
Kuru kaysı tebliği
lidasder
 

Viewers also liked (16)

Fındık Tebliği
Fındık  TebliğiFındık  Tebliği
Fındık Tebliği
 
Calendario III° Anno TePALL 2014/2015
Calendario III° Anno TePALL 2014/2015Calendario III° Anno TePALL 2014/2015
Calendario III° Anno TePALL 2014/2015
 
برنامه نویسی به چه دردی میخوره؟
برنامه نویسی به چه دردی میخوره؟برنامه نویسی به چه دردی میخوره؟
برنامه نویسی به چه دردی میخوره؟
 
Procedura Iscrizione Esami Online
Procedura Iscrizione Esami OnlineProcedura Iscrizione Esami Online
Procedura Iscrizione Esami Online
 
Calendario I° Anno TePALL 2014/2015
Calendario I° Anno TePALL 2014/2015Calendario I° Anno TePALL 2014/2015
Calendario I° Anno TePALL 2014/2015
 
Linea guida gestione esami
Linea guida gestione esamiLinea guida gestione esami
Linea guida gestione esami
 
Area docente - Gestione Appelli
Area docente - Gestione AppelliArea docente - Gestione Appelli
Area docente - Gestione Appelli
 
CdL TdPALL
CdL TdPALLCdL TdPALL
CdL TdPALL
 
Lidasder tuzuk
Lidasder tuzukLidasder tuzuk
Lidasder tuzuk
 
Pamuk tebliği
Pamuk tebliğiPamuk tebliği
Pamuk tebliği
 
Lisansli depoculuk kanunu
Lisansli depoculuk kanunuLisansli depoculuk kanunu
Lisansli depoculuk kanunu
 
Zeytin tebliği
Zeytin tebliğiZeytin tebliği
Zeytin tebliği
 
Yetkili sınıflandırıcı yönetmeliği
Yetkili sınıflandırıcı yönetmeliğiYetkili sınıflandırıcı yönetmeliği
Yetkili sınıflandırıcı yönetmeliği
 
Kuru kaysı tebliği
Kuru kaysı tebliğiKuru kaysı tebliği
Kuru kaysı tebliği
 
Linux Desktop Environments
Linux Desktop EnvironmentsLinux Desktop Environments
Linux Desktop Environments
 
Callcredit's Fraud Summit 2016 - Anti-money laundering stream
Callcredit's Fraud Summit 2016 - Anti-money laundering streamCallcredit's Fraud Summit 2016 - Anti-money laundering stream
Callcredit's Fraud Summit 2016 - Anti-money laundering stream
 

Similar to Insurance stream - Marc DonFrancesco slides

How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
FraudBusters
 
02/18/2010 Meeting - Data Analytics
02/18/2010 Meeting - Data Analytics02/18/2010 Meeting - Data Analytics
02/18/2010 Meeting - Data Analytics
acfesj
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
Kartik Mehta
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments Fraud
Christopher Uriarte
 

Similar to Insurance stream - Marc DonFrancesco slides (20)

Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Real-time fraud detection
Real-time fraud detectionReal-time fraud detection
Real-time fraud detection
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
 
02/18/2010 Meeting - Data Analytics
02/18/2010 Meeting - Data Analytics02/18/2010 Meeting - Data Analytics
02/18/2010 Meeting - Data Analytics
 
Denied party screening 2016 webinar final
Denied party screening 2016 webinar finalDenied party screening 2016 webinar final
Denied party screening 2016 webinar final
 
Denied party screening 2016 webinar final
Denied party screening 2016 webinar finalDenied party screening 2016 webinar final
Denied party screening 2016 webinar final
 
The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
2011 Intro Bio Lock
2011 Intro Bio Lock2011 Intro Bio Lock
2011 Intro Bio Lock
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments Fraud
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 
A Cure for Ad-Fraud: Turning Fraud Detection into Fraud Prevention
A Cure for Ad-Fraud: Turning Fraud Detection into Fraud PreventionA Cure for Ad-Fraud: Turning Fraud Detection into Fraud Prevention
A Cure for Ad-Fraud: Turning Fraud Detection into Fraud Prevention
 
TrustIDNow broshure
TrustIDNow broshureTrustIDNow broshure
TrustIDNow broshure
 
DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014
 

Recently uploaded

Bhayandar Capable Call Girls ,07506202331,Mira Road Beautiful Call Girl
Bhayandar Capable Call Girls ,07506202331,Mira Road Beautiful Call GirlBhayandar Capable Call Girls ,07506202331,Mira Road Beautiful Call Girl
Bhayandar Capable Call Girls ,07506202331,Mira Road Beautiful Call Girl
Priya Reddy
 
TriStar Gold- 05-13-2024 corporate presentation
TriStar Gold- 05-13-2024 corporate presentationTriStar Gold- 05-13-2024 corporate presentation
TriStar Gold- 05-13-2024 corporate presentation
Adnet Communications
 
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Bhayandar Capable Call Girls ,07506202331,Mira Road Beautiful Call Girl
Bhayandar Capable Call Girls ,07506202331,Mira Road Beautiful Call GirlBhayandar Capable Call Girls ,07506202331,Mira Road Beautiful Call Girl
Bhayandar Capable Call Girls ,07506202331,Mira Road Beautiful Call Girl
 
falcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesfalcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunities
 
Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...
Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...
Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...
 
Kopar Khairane Cheapest Call Girls✔✔✔9833754194 Nerul Premium Call Girls-Navi...
Kopar Khairane Cheapest Call Girls✔✔✔9833754194 Nerul Premium Call Girls-Navi...Kopar Khairane Cheapest Call Girls✔✔✔9833754194 Nerul Premium Call Girls-Navi...
Kopar Khairane Cheapest Call Girls✔✔✔9833754194 Nerul Premium Call Girls-Navi...
 
Indore City REd Light Area Call Girls-✔✔9155612368 Escorts In Indore Female E...
Indore City REd Light Area Call Girls-✔✔9155612368 Escorts In Indore Female E...Indore City REd Light Area Call Girls-✔✔9155612368 Escorts In Indore Female E...
Indore City REd Light Area Call Girls-✔✔9155612368 Escorts In Indore Female E...
 
Bhubaneswar🌹Ravi Tailkes ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ...
Bhubaneswar🌹Ravi Tailkes  ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ...Bhubaneswar🌹Ravi Tailkes  ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ...
Bhubaneswar🌹Ravi Tailkes ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ...
 
Q1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfQ1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdf
 
Collecting banker, Capacity of collecting Banker, conditions under section 13...
Collecting banker, Capacity of collecting Banker, conditions under section 13...Collecting banker, Capacity of collecting Banker, conditions under section 13...
Collecting banker, Capacity of collecting Banker, conditions under section 13...
 
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
 
Strategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationStrategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate Presentation
 
Kurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call GirlsKurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
 
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
 
✂️ 👅 Independent Lucknow Escorts U.P Call Girls With Room Lucknow Call Girls ...
✂️ 👅 Independent Lucknow Escorts U.P Call Girls With Room Lucknow Call Girls ...✂️ 👅 Independent Lucknow Escorts U.P Call Girls With Room Lucknow Call Girls ...
✂️ 👅 Independent Lucknow Escorts U.P Call Girls With Room Lucknow Call Girls ...
 
TriStar Gold- 05-13-2024 corporate presentation
TriStar Gold- 05-13-2024 corporate presentationTriStar Gold- 05-13-2024 corporate presentation
TriStar Gold- 05-13-2024 corporate presentation
 
Solution Manual For Financial Statement Analysis, 13th Edition By Charles H. ...
Solution Manual For Financial Statement Analysis, 13th Edition By Charles H. ...Solution Manual For Financial Statement Analysis, 13th Edition By Charles H. ...
Solution Manual For Financial Statement Analysis, 13th Edition By Charles H. ...
 
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Russian Call Girls New Bhubaneswar Whatsapp Numbers 9777949614 Russian Escor...
Russian Call Girls New Bhubaneswar Whatsapp Numbers 9777949614  Russian Escor...Russian Call Girls New Bhubaneswar Whatsapp Numbers 9777949614  Russian Escor...
Russian Call Girls New Bhubaneswar Whatsapp Numbers 9777949614 Russian Escor...
 
Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024
 
✂️ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
✂️ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...✂️ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
✂️ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 

Insurance stream - Marc DonFrancesco slides

  • 2. You need more than just a bigger „to do‟ list! SMART Data, not „Big Data‟
  • 3. Beware of “I am Spartacus”!
  • 4. Common „noise‟ Process & the “Retreat of Reason” „Fraud savings‟ & targets “Police aren’t interested in fraud”
  • 5. If a claim was a relay baton?...
  • 6. Continual innovation required to address „hot spots‟
  • 7. Continual innovation required to address „hot spots‟ thirdeye® Casualty Screening = swift decisions Fast. Effective. Evolving… Are they who they say? Were they where they said? Did they do what they said? How do they live? Stay in or out of Portal?
  • 8. Add genuine value or get out of the way! Get excited about what you do or get out of the way! Keep challenging oneself – it‟s how we improve Increasingly important to...
  • 10. DATE FRONT LINE • As an online company we require the maximum amount of information on our clients, besides the usual personal data. The information that we obtain via our front line IP provider helps us build a better understanding of the potential client, in addition to the personal information submitted by the client. Another benefit is the unique device number provided; this device is recorded within their vast database allowing subscribers to view this database to observe the device history. • The unique information presented to us from our provider is: Device type, Real IP address, Country, Region, City and Service Provider. Other information is evidence placed on the device by other Subscribers as well as ourselves; this can include True ID Theft and Credit Card Fraud among many other types. 10
  • 11. DATE THE BREAKDOWN • We are also able to set our own rules, with varying output responses e.g. Allow, Review and Deny depending on a company’s appetite for risk. The below table show some of rules present, evidence placed by us or other subscribers is shown below including the ratio seen within the applications sent for Review: 11 Rules Aug-14 Country List 21% Device ID is Unique 5% Risky Device 4% High Risk ISP 3% High Risk IP 5% MYJAR Evidence Exists 4% Mobile Emulator Detected 1% Potential Financial Difficulties 2% Proxy in Use 1% Subscriber Evidence 19% Timezone vs Geolocation Mismatch 32% Risky Transactions A 3% Risky Transactions B 2%
  • 12. DATE THE FURTHER BREAKDOWN • In addition to the above IP database we also use rules within our own database, this mainly looks at velocity, related clients history and defined known risks. All accounts that fail any of our rule sets are sent for review by our validation team and our fraud manager. • There are varying types of fraud seen by us; however, the majority of the fraud seen can be broken down into different standards of fraud and analysed. A breakdown of this for 2013 and YTD can be seen below: 12 Fraud Definitions 2013 YTD Application Fraud 11.50% 2.50% Account Take-Over/Hijacking 0.50% 0.20% Fraud Other 1.10% 0.70% Identity Fraud 50.00% 34.30% Misuse of Facility Fraud 11.60% 15.00% Subscriber Evidence Fraud 20.30% 37.70% Returned as Fraud from DC 5.10% 9.60%
  • 13. DATE FRAUD GANGS MO • Crime gangs like to operate using stolen identities which can be obtained from the ‘dark web’, in tandem with cloned/stolen cards. Their favoured MO as observed by us is using a dynamic IP or open public network fraudulently applying for loans using a windows pc. As their patterns are usually consistent we are usually able to have some impact on their operation however some naturally slip through. 13
  • 14. Group Head of Collections, Recoveries and Fraud STUART SYKES 14