SlideShare a Scribd company logo
1 of 3
Download to read offline
21ct.com http://www.21ct.com/blog/have-we-reached-the-limits-of-predictive-analytics-in-pos-fraud-detection/
Have We Reached the Limits of Predictive Analytics in POS Fraud
Detection?
We’ve seen over the past year that cyber attacks are big
business. Attackers are not just breaking into corporate
systems for competitive or ideological espionage
anymore. For many attackers, the personal and financial
information stored in these systems is the raw material
for their identity theft and fraud businesses.
The availability of this data is increasing too. As
ecommerce volume continues to rise and the visibility of
Apple Pay is likely to increase mobile payments,
consumers are also disseminating their financial and
personal information more broadly than ever before, thus
providing even greater numbers of data-rich targets for
attackers.
Defenders must be continually vigilant in seeking new
and innovative ways to, first, detect point-of-sale (POS)
fraud in real time with more advanced predictive
analytics, but also with new payment system practices
that greatly decrease the opportunities available to
attackers for stealing credit card or identity information in
the first place.
POS Fraud Detection: Acceptable Snooping
Current POS fraud detection systems have gotten very good at detecting fraudulent transactions. In many ways they
are at the pinnacle of predictive analytics technology. They work largely through various kinds of anomaly detection.
Anomaly detection works by tracking your purchase history to define your "normal" behavior, then flagging anything
that appears abnormal:
Geographic anomalies like whether the physical locations or IP addresses of purchases are impossible based
on the time and place relative to other transactions.
Behavioral anomalies such as rapid-fire or automated purchases.
Purchase anomalies such as items that don’t fit a cardholder’s purchase profile or bulk purchases of high-
value items not usually purchased in bulk.
Collective intelligence that detects activity similar to suspicious activity reported by other customers.
Out of concerns for their privacy, many people (myself included) balk at the idea of companies snooping on them, and
they have a point when it comes to Google profiting off your personal data or stores tracking you via WiFi through
their store or so they can feed you ads. But the form of tracking we’re talking about here actually protects us. Because
the card issuer tracks your purchases (what, where, when, and how much), they can know, for example, that you’re a
single man and mostly use your card at Best Buy, Lowe’s, grocery stores, gas stations, and restaurants, so when they
see a $1500 shopping spree at the Coach store show up, that’s a red flag and they can contact you to confirm the
charge.
Unfortunately, though, while we’re getting better at defending against POS fraud, Newton’s Third Law of Motion
applies to cybersecurity and fraud detection as well as physics: every action has an equal and opposite reaction. The
continued improvement of POS fraud detection systems leads the fraudsters to innovate ways to evade them, and
the cyber arms race escalates.
So, here’s the question: Have we reached the limits of predictive analytics in POS fraud detection?
Perhaps. Fraudsters are evading anomaly-based POS fraud detection systems in a number of ways with innovations
in both technology and tactics. For example, they are using stolen and fraudulent cards in the home area of the
cardholder to avoid creating geographic anomalies. Some are also using new software that simulates the way
humans shop online, thus evading the behavioral and purchase anomaly defenses.
Potentially more serious, though, is that the sheer volume of fraudulent transactions may be overwhelming the fraud
detection systems. After the Target breach, Avivah Litanthe at Gartner suggested that “anomaly detection – which
most card fraud detection systems rely on – fails when there are too many anomalies or outliers as the outliers all
start looking normal.” Pretty chilling.
So again, we ask: Have we reached the limits of predictive analytics in POS fraud detection?
Probably not. The developers of these systems are as creative and motivated to defend against POS fraud as the
fraudsters are to commit it. At a minimum, though, the escalating cyber arms race will continue to increase costs
across the economy as defenders spend increasing resources defending against POS fraud.
If You Don’t Have It, No One Can Steal It
One promising development in stemming the tide of POS fraud has been the launch of Apple Pay. As we mentioned
above, mobile payment systems in general increase the attack surface by increasing the number of systems that
store sensitive data. Apple Pay, however, breaks that mold. Their innovative approach may provide a model for other
systems to help stem the tide of POS fraud.
As we discussed last week in our security and privacy review of Apple Pay, Google Wallet, and CurrentC, Apple Pay
does not store any financial or identity data in its system. This eliminates completely the potential for attackers to
breach the Apple Pay system and steal this sensitive information. You could say this is a kind of security by scarcity:
If you don’t have it, no one can steal it.
If Apple Pay becomes a huge success, other mobile payment systems and card issuers may take Apple’s lead and
not store financial or identity information at all. If these mobile payment systems serve only as a bridge to pass
payments through to the processing network using virtual, device-dependent card numbers, we can limit the number
of entities storing sensitive information (i.e., potential targets for attack). Restricting the storage of sensitive data to
only the card issuers and payment processors—for whom data security is a core competency and an essential part of
their business—would greatly reduce POS fraud and identity theft overall, which should be an incentive for card
issuers to consider this approach more generally.
Unfortunately, this would require mobile payment systems to accept the loss of user data in favor of these
“anonymous” tokenized cards. This is probably a non-starter for Google and others for whom data monetization is a
core business and retailers like those behind CurrentC who mine customer data for intelligence.
We’re unlikely to rid ourselves of physical credit cards in the near future, but if more mobile payment systems take
Apple’s lead and use device dependent virtual cards without storing sensitive data, we could go a long way toward
significantly reducing the incidence of identity theft and credit card fraud.
About Scott
Scott is a veteran technology writer, focusing on security, analytics, and fraud detection.
He also writes short stories, has a near encyclopedic knowledge of early eighties rock
music, is a sucker for liner notes, and owns a guitar signed by the late great Bo Diddley.
Connect: @ATXWriter | Google+
View all posts by Scott »

More Related Content

Viewers also liked

Smart Solutions: Data Analytics Substantial to Support Fraud Investigations
Smart Solutions: Data Analytics Substantial to Support Fraud InvestigationsSmart Solutions: Data Analytics Substantial to Support Fraud Investigations
Smart Solutions: Data Analytics Substantial to Support Fraud Investigationscorma GmbH
 
Data Analytics on Healthcare Fraud
Data Analytics on Healthcare FraudData Analytics on Healthcare Fraud
Data Analytics on Healthcare FraudNicholas Szeto
 
Fraud Prevention - Experian
Fraud Prevention - ExperianFraud Prevention - Experian
Fraud Prevention - ExperianAlex Robbins
 
Introduction to Spark - DataFactZ
Introduction to Spark - DataFactZIntroduction to Spark - DataFactZ
Introduction to Spark - DataFactZDataFactZ
 
Fraud Analytics with Machine Learning and Big Data Engineering for Telecom
Fraud Analytics with Machine Learning and Big Data Engineering for TelecomFraud Analytics with Machine Learning and Big Data Engineering for Telecom
Fraud Analytics with Machine Learning and Big Data Engineering for TelecomSudarson Roy Pratihar
 
Data Fraud Analytics Industry
Data Fraud Analytics Industry Data Fraud Analytics Industry
Data Fraud Analytics Industry Cole Secor
 
Using Analytics to Detect Possible Fraud: Overview of Tools and Techniques
Using Analytics to Detect Possible Fraud: Overview of Tools and TechniquesUsing Analytics to Detect Possible Fraud: Overview of Tools and Techniques
Using Analytics to Detect Possible Fraud: Overview of Tools and TechniquesDecosimoCPAs
 
Behavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and TomorrowBehavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and TomorrowGuardian Analytics
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsAlejandro Correa Bahnsen, PhD
 
Online Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics WebinarOnline Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics WebinarDatameer
 

Viewers also liked (15)

Smart Solutions: Data Analytics Substantial to Support Fraud Investigations
Smart Solutions: Data Analytics Substantial to Support Fraud InvestigationsSmart Solutions: Data Analytics Substantial to Support Fraud Investigations
Smart Solutions: Data Analytics Substantial to Support Fraud Investigations
 
Data Analytics on Healthcare Fraud
Data Analytics on Healthcare FraudData Analytics on Healthcare Fraud
Data Analytics on Healthcare Fraud
 
Fraud Prevention - Experian
Fraud Prevention - ExperianFraud Prevention - Experian
Fraud Prevention - Experian
 
Introduction to Spark - DataFactZ
Introduction to Spark - DataFactZIntroduction to Spark - DataFactZ
Introduction to Spark - DataFactZ
 
Ad Fraud Blocking Analytics Webinar
Ad Fraud Blocking Analytics WebinarAd Fraud Blocking Analytics Webinar
Ad Fraud Blocking Analytics Webinar
 
Fraud Analytics with Machine Learning and Big Data Engineering for Telecom
Fraud Analytics with Machine Learning and Big Data Engineering for TelecomFraud Analytics with Machine Learning and Big Data Engineering for Telecom
Fraud Analytics with Machine Learning and Big Data Engineering for Telecom
 
Fraud Analytics
Fraud AnalyticsFraud Analytics
Fraud Analytics
 
1609 Fraud Data Science
1609 Fraud Data Science1609 Fraud Data Science
1609 Fraud Data Science
 
Data Fraud Analytics Industry
Data Fraud Analytics Industry Data Fraud Analytics Industry
Data Fraud Analytics Industry
 
Using Analytics to Detect Possible Fraud: Overview of Tools and Techniques
Using Analytics to Detect Possible Fraud: Overview of Tools and TechniquesUsing Analytics to Detect Possible Fraud: Overview of Tools and Techniques
Using Analytics to Detect Possible Fraud: Overview of Tools and Techniques
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Behavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and TomorrowBehavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and Tomorrow
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive Analytics
 
Online Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics WebinarOnline Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics Webinar
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
 

Recently uploaded

定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 

Recently uploaded (20)

定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 

Have We Reached the Limits of Predictive Analytics in POS Fraud Detection?

  • 1. 21ct.com http://www.21ct.com/blog/have-we-reached-the-limits-of-predictive-analytics-in-pos-fraud-detection/ Have We Reached the Limits of Predictive Analytics in POS Fraud Detection? We’ve seen over the past year that cyber attacks are big business. Attackers are not just breaking into corporate systems for competitive or ideological espionage anymore. For many attackers, the personal and financial information stored in these systems is the raw material for their identity theft and fraud businesses. The availability of this data is increasing too. As ecommerce volume continues to rise and the visibility of Apple Pay is likely to increase mobile payments, consumers are also disseminating their financial and personal information more broadly than ever before, thus providing even greater numbers of data-rich targets for attackers. Defenders must be continually vigilant in seeking new and innovative ways to, first, detect point-of-sale (POS) fraud in real time with more advanced predictive analytics, but also with new payment system practices that greatly decrease the opportunities available to attackers for stealing credit card or identity information in the first place. POS Fraud Detection: Acceptable Snooping Current POS fraud detection systems have gotten very good at detecting fraudulent transactions. In many ways they are at the pinnacle of predictive analytics technology. They work largely through various kinds of anomaly detection. Anomaly detection works by tracking your purchase history to define your "normal" behavior, then flagging anything that appears abnormal: Geographic anomalies like whether the physical locations or IP addresses of purchases are impossible based on the time and place relative to other transactions. Behavioral anomalies such as rapid-fire or automated purchases. Purchase anomalies such as items that don’t fit a cardholder’s purchase profile or bulk purchases of high- value items not usually purchased in bulk. Collective intelligence that detects activity similar to suspicious activity reported by other customers. Out of concerns for their privacy, many people (myself included) balk at the idea of companies snooping on them, and they have a point when it comes to Google profiting off your personal data or stores tracking you via WiFi through their store or so they can feed you ads. But the form of tracking we’re talking about here actually protects us. Because the card issuer tracks your purchases (what, where, when, and how much), they can know, for example, that you’re a single man and mostly use your card at Best Buy, Lowe’s, grocery stores, gas stations, and restaurants, so when they see a $1500 shopping spree at the Coach store show up, that’s a red flag and they can contact you to confirm the
  • 2. charge. Unfortunately, though, while we’re getting better at defending against POS fraud, Newton’s Third Law of Motion applies to cybersecurity and fraud detection as well as physics: every action has an equal and opposite reaction. The continued improvement of POS fraud detection systems leads the fraudsters to innovate ways to evade them, and the cyber arms race escalates. So, here’s the question: Have we reached the limits of predictive analytics in POS fraud detection? Perhaps. Fraudsters are evading anomaly-based POS fraud detection systems in a number of ways with innovations in both technology and tactics. For example, they are using stolen and fraudulent cards in the home area of the cardholder to avoid creating geographic anomalies. Some are also using new software that simulates the way humans shop online, thus evading the behavioral and purchase anomaly defenses. Potentially more serious, though, is that the sheer volume of fraudulent transactions may be overwhelming the fraud detection systems. After the Target breach, Avivah Litanthe at Gartner suggested that “anomaly detection – which most card fraud detection systems rely on – fails when there are too many anomalies or outliers as the outliers all start looking normal.” Pretty chilling. So again, we ask: Have we reached the limits of predictive analytics in POS fraud detection? Probably not. The developers of these systems are as creative and motivated to defend against POS fraud as the fraudsters are to commit it. At a minimum, though, the escalating cyber arms race will continue to increase costs across the economy as defenders spend increasing resources defending against POS fraud. If You Don’t Have It, No One Can Steal It One promising development in stemming the tide of POS fraud has been the launch of Apple Pay. As we mentioned above, mobile payment systems in general increase the attack surface by increasing the number of systems that store sensitive data. Apple Pay, however, breaks that mold. Their innovative approach may provide a model for other systems to help stem the tide of POS fraud. As we discussed last week in our security and privacy review of Apple Pay, Google Wallet, and CurrentC, Apple Pay does not store any financial or identity data in its system. This eliminates completely the potential for attackers to breach the Apple Pay system and steal this sensitive information. You could say this is a kind of security by scarcity: If you don’t have it, no one can steal it. If Apple Pay becomes a huge success, other mobile payment systems and card issuers may take Apple’s lead and not store financial or identity information at all. If these mobile payment systems serve only as a bridge to pass payments through to the processing network using virtual, device-dependent card numbers, we can limit the number of entities storing sensitive information (i.e., potential targets for attack). Restricting the storage of sensitive data to only the card issuers and payment processors—for whom data security is a core competency and an essential part of their business—would greatly reduce POS fraud and identity theft overall, which should be an incentive for card issuers to consider this approach more generally. Unfortunately, this would require mobile payment systems to accept the loss of user data in favor of these “anonymous” tokenized cards. This is probably a non-starter for Google and others for whom data monetization is a core business and retailers like those behind CurrentC who mine customer data for intelligence. We’re unlikely to rid ourselves of physical credit cards in the near future, but if more mobile payment systems take Apple’s lead and use device dependent virtual cards without storing sensitive data, we could go a long way toward significantly reducing the incidence of identity theft and credit card fraud.
  • 3. About Scott Scott is a veteran technology writer, focusing on security, analytics, and fraud detection. He also writes short stories, has a near encyclopedic knowledge of early eighties rock music, is a sucker for liner notes, and owns a guitar signed by the late great Bo Diddley. Connect: @ATXWriter | Google+ View all posts by Scott »