SlideShare a Scribd company logo
#FraudFighterLive
©Kount Inc All Rights Reserved
Panelists
Moderator
Melayna Gabiou
Marketing Director
Kount
Skip Myers
Director of Loss Prevention
MicroCenter
Don Bush
VP of Marketing
Kount
Chad Evans
Manager, Ecommerce Investigations
PetSmart
©Kount Inc All Rights Reserved
Learning Objectives
Understand why it’s important to prosecute
What makes up a digital crime scene
Steps for investigation and due diligence for building a case
Fraud detection strategies to assist with catching a fraudster
Discuss first-hand success stories for criminal prosecution
Answer questions from the audience
Do you currently prosecute people
stealing from you online?
Audience Question
Why Prosecute?
©Kount Inc All Rights Reserved
Today’s Fraudster
*https://securityintelligence.com/media/infographic-the-new-face-of-organized-cybercrime/
80% of hackers leverage crime rings*
Underground websites
Global reach
Stolen card and personal data marketplace
Operates with impunity from law enforcement
Used to spoof and mimic legitimate users
©Kount Inc All Rights Reserved
Why Prosecute
Send a message to fraudsters
Take action on those stealing from you
Stop repeat offenders
You’re not the only victim
Recover financial loss
A Digital Crime Scene
©Kount Inc All Rights Reserved
Digital Crime Scene Method
“A digital crime is a human crime, committed online.” –Skip Myers
Mindset and process
Virtual evidence
Scenario planning
Reverse engineering
Continuous monitoring
DIGITAL CRIME SCENE - DO NOT CROSS
©Kount Inc All Rights Reserved
Elements of a Digital Crime Scene
Device fingerprint
Email address
Geolocation
Payment type
Ship to address
©Kount Inc All Rights Reserved
Reverse Engineer Fraud Analysis
“A method of determining the likely sequence of events before, during, and
after a fraud event through observation and evaluation of processes and
evidence.” –Skip Myers
Crime scene mindset
Root cause analysis
Internal variables
External variables
Process analysis
©Kount Inc All Rights Reserved
CNP Fraud Link Analysis
Fraudster 1:
Device ID: 431167
Device Type: Tablet
Browser: Bing
Flash Version: 9.2
Brower Language: Russian
Device Location: Kiev
OS: Windows 10
IP Address: Dallas, Texas
Device ID: 431167
Email: kiev4ever@gmail.com
Credit Card: Visa
Device ID: 431167
Email: smirnoff@gmail.com
Credit Card: Visa
Device ID: 431167
Email: thebear@gmail.com
Credit Card: AmEx
Device ID: 431167
Email: smirnoff@gmail.com
Credit Card: MasterCard
Bill To: 123 Main St.
Bill To: 456 Pine Ln.
Bill To: 789 Oak Ave.
Bill To: 101 10th Ave.
Bill To: 987 Delk Rd.
Bill To: 16 Park Place
Ship To: Boris Smirnoff
1313 Mockingbird Ln.
Suite 14
Acme Self Storage
1313 Mockingbird Ln.
What data is useful when building
a digital crime scene?
Audience Question
How to Build a Case
©Kount Inc All Rights Reserved
Steps to Building a Case
1. Prove there was criminal intent
2. Show you are the victim of a crime
3. Provide the evidence from the digital crime scene
4. Contact police in jurisdiction where goods were shipped
5. Potential misdemeanor or felony charges
©Kount Inc All Rights Reserved
Am I the right merchant to prosecute?
Any size merchant
Repeat offenders
Shippable goods
“Control Delivery”
Use Cases
©Kount Inc All Rights Reserved
MicroCenter Use Case
“How can we ruin a bad guy’s day?” –Skip Myers
Fraudster exploiting buy online, pick up in store
Using stolen credit cards to buy high end electronics
Found suspect on OK Dpmt of Corrections website
Found suspect’s Facebook page
Bragging about “ripping off” stores
Suspect arrested when attempting a repeat scam
Vehicle search found stolen items from other retailers
©Kount Inc All Rights Reserved
PetSmart Use Case
Credit card fraud via buy online, pickup in-store in Atlanta
Subject was using alias of “Heisenberg” to submit orders
Compiled case file using data from Kount
Deployed on surveillance and partnered with local law enforcement to conduct
controlled in-store pickup
Upon arrival, suspect was detained and searched
Dozen fraudulent credit cards and over 20 personal identities
Suspect was arrested and charged with four felony counts of identity theft,
forgery, and possession of fraudulent document, and was sentenced to ten
years probation even as a first-time offender.
©Kount Inc All Rights Reserved
National Cybercrime Use Case
“In Fraud We Trust” cybercrime forum bust
13 arrested, 36 charges
Started in October 2010
Attracted 11,000 members globally
Stolen identities, credit card accounts
ATM skimmers, botnet hosting, malicious software
Arrests took place in 7 countries
When deciding the jurisdiction to submit a
case, what is the determining factor?
Audience Question
©Kount Inc All Rights Reserved
Summary
Send a message to fraudsters
Pure will power of the merchant
Remember the digital crime scene
Use your data points to tell the story
Know the ground rules and go
Not always easy so be prepared
Provide evidence to motivate law enforcement
Q&A
www.ruinabadguysday.com
fraudfighter@kount.com
Skip Myers
Director of Loss Prevention
MicroCenter
emyers@microcenter.com
Don Bush
VP of Marketing
Kount
don.bush@kount.com
Chad Evans
Manager, Ecommerce Investigations
PetSmart
CEvans@PetSmart.com
How To Catch A Fraudster Live Webinar

More Related Content

What's hot

Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
Steve Mitchinson
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
mbachnak
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
Jonathan Care
 
Fraud in igaming 101
Fraud in igaming 101Fraud in igaming 101
Fraud in igaming 101
Martyn Sukys
 
Terrorist Use of Cryptocurrencies
Terrorist Use of CryptocurrenciesTerrorist Use of Cryptocurrencies
Terrorist Use of Cryptocurrencies
Simone Domenico Casadei Bernardi
 
Advice iq safeguards against id theft
Advice iq safeguards against id theftAdvice iq safeguards against id theft
Advice iq safeguards against id theft
Better Financial Education
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
Sudeshna07
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade
studentinternetdeals33
 
Not "If" but "When"
Not "If" but "When"Not "If" but "When"
Not "If" but "When"
JoAnna Cheshire
 
Data theft
Data theftData theft
Data theft
Laura
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
hewie
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
Internet Law Center
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
Rosetta
 
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Bigger Price
 
1 jun st online pay_pal platform not compromised
1 jun st online pay_pal platform not compromised1 jun st online pay_pal platform not compromised
1 jun st online pay_pal platform not compromised
Bridget Kow
 
Galih technology
Galih technologyGalih technology
Galih technology
tajudinnoer
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
Write My Essay
 
Case study joined
Case study joinedCase study joined
Case study joined
Lijo George
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
Goutama Bachtiar
 

What's hot (19)

Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
 
Fraud in igaming 101
Fraud in igaming 101Fraud in igaming 101
Fraud in igaming 101
 
Terrorist Use of Cryptocurrencies
Terrorist Use of CryptocurrenciesTerrorist Use of Cryptocurrencies
Terrorist Use of Cryptocurrencies
 
Advice iq safeguards against id theft
Advice iq safeguards against id theftAdvice iq safeguards against id theft
Advice iq safeguards against id theft
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade
 
Not "If" but "When"
Not "If" but "When"Not "If" but "When"
Not "If" but "When"
 
Data theft
Data theftData theft
Data theft
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
 
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
 
1 jun st online pay_pal platform not compromised
1 jun st online pay_pal platform not compromised1 jun st online pay_pal platform not compromised
1 jun st online pay_pal platform not compromised
 
Galih technology
Galih technologyGalih technology
Galih technology
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Case study joined
Case study joinedCase study joined
Case study joined
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 

Similar to How To Catch A Fraudster Live Webinar

ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
Donald E. Hester
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
wlynn1
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
Mr SIM Swap Gone Phishing
Mr SIM Swap Gone PhishingMr SIM Swap Gone Phishing
Mr SIM Swap Gone Phishing
Jacqueline Fick
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
Yogi Schulz
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
Nalneesh Gaur
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping4
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card frauds
Vi Tính Hoàng Nam
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)
Neeraj Mahajan
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
KALPITKALPIT1
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
IRJET Journal
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
Pratham Jaiswal
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber breach at target.pptx
Cyber breach at target.pptxCyber breach at target.pptx
Cyber breach at target.pptx
VarunLala2
 
CNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsCNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift Cards
Christopher Uriarte
 
Identity Theft business
Identity Theft businessIdentity Theft business
Identity Theft business
Matt Smith
 
ID Theft
ID TheftID Theft
ID Theft
Willhack
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
Aparajeeta Salu
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
efandeye
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
Martha Brown
 

Similar to How To Catch A Fraudster Live Webinar (20)

ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Mr SIM Swap Gone Phishing
Mr SIM Swap Gone PhishingMr SIM Swap Gone Phishing
Mr SIM Swap Gone Phishing
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card frauds
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber breach at target.pptx
Cyber breach at target.pptxCyber breach at target.pptx
Cyber breach at target.pptx
 
CNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsCNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift Cards
 
Identity Theft business
Identity Theft businessIdentity Theft business
Identity Theft business
 
ID Theft
ID TheftID Theft
ID Theft
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 

Recently uploaded

SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative AnalysisOdoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Envertis Software Solutions
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
aymanquadri279
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 

Recently uploaded (20)

SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative AnalysisOdoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 

How To Catch A Fraudster Live Webinar

  • 2. ©Kount Inc All Rights Reserved Panelists Moderator Melayna Gabiou Marketing Director Kount Skip Myers Director of Loss Prevention MicroCenter Don Bush VP of Marketing Kount Chad Evans Manager, Ecommerce Investigations PetSmart
  • 3. ©Kount Inc All Rights Reserved Learning Objectives Understand why it’s important to prosecute What makes up a digital crime scene Steps for investigation and due diligence for building a case Fraud detection strategies to assist with catching a fraudster Discuss first-hand success stories for criminal prosecution Answer questions from the audience
  • 4. Do you currently prosecute people stealing from you online? Audience Question
  • 6. ©Kount Inc All Rights Reserved Today’s Fraudster *https://securityintelligence.com/media/infographic-the-new-face-of-organized-cybercrime/ 80% of hackers leverage crime rings* Underground websites Global reach Stolen card and personal data marketplace Operates with impunity from law enforcement Used to spoof and mimic legitimate users
  • 7. ©Kount Inc All Rights Reserved Why Prosecute Send a message to fraudsters Take action on those stealing from you Stop repeat offenders You’re not the only victim Recover financial loss
  • 9. ©Kount Inc All Rights Reserved Digital Crime Scene Method “A digital crime is a human crime, committed online.” –Skip Myers Mindset and process Virtual evidence Scenario planning Reverse engineering Continuous monitoring DIGITAL CRIME SCENE - DO NOT CROSS
  • 10. ©Kount Inc All Rights Reserved Elements of a Digital Crime Scene Device fingerprint Email address Geolocation Payment type Ship to address
  • 11. ©Kount Inc All Rights Reserved Reverse Engineer Fraud Analysis “A method of determining the likely sequence of events before, during, and after a fraud event through observation and evaluation of processes and evidence.” –Skip Myers Crime scene mindset Root cause analysis Internal variables External variables Process analysis
  • 12. ©Kount Inc All Rights Reserved CNP Fraud Link Analysis Fraudster 1: Device ID: 431167 Device Type: Tablet Browser: Bing Flash Version: 9.2 Brower Language: Russian Device Location: Kiev OS: Windows 10 IP Address: Dallas, Texas Device ID: 431167 Email: kiev4ever@gmail.com Credit Card: Visa Device ID: 431167 Email: smirnoff@gmail.com Credit Card: Visa Device ID: 431167 Email: thebear@gmail.com Credit Card: AmEx Device ID: 431167 Email: smirnoff@gmail.com Credit Card: MasterCard Bill To: 123 Main St. Bill To: 456 Pine Ln. Bill To: 789 Oak Ave. Bill To: 101 10th Ave. Bill To: 987 Delk Rd. Bill To: 16 Park Place Ship To: Boris Smirnoff 1313 Mockingbird Ln. Suite 14 Acme Self Storage 1313 Mockingbird Ln.
  • 13. What data is useful when building a digital crime scene? Audience Question
  • 14. How to Build a Case
  • 15. ©Kount Inc All Rights Reserved Steps to Building a Case 1. Prove there was criminal intent 2. Show you are the victim of a crime 3. Provide the evidence from the digital crime scene 4. Contact police in jurisdiction where goods were shipped 5. Potential misdemeanor or felony charges
  • 16. ©Kount Inc All Rights Reserved Am I the right merchant to prosecute? Any size merchant Repeat offenders Shippable goods “Control Delivery”
  • 18. ©Kount Inc All Rights Reserved MicroCenter Use Case “How can we ruin a bad guy’s day?” –Skip Myers Fraudster exploiting buy online, pick up in store Using stolen credit cards to buy high end electronics Found suspect on OK Dpmt of Corrections website Found suspect’s Facebook page Bragging about “ripping off” stores Suspect arrested when attempting a repeat scam Vehicle search found stolen items from other retailers
  • 19. ©Kount Inc All Rights Reserved PetSmart Use Case Credit card fraud via buy online, pickup in-store in Atlanta Subject was using alias of “Heisenberg” to submit orders Compiled case file using data from Kount Deployed on surveillance and partnered with local law enforcement to conduct controlled in-store pickup Upon arrival, suspect was detained and searched Dozen fraudulent credit cards and over 20 personal identities Suspect was arrested and charged with four felony counts of identity theft, forgery, and possession of fraudulent document, and was sentenced to ten years probation even as a first-time offender.
  • 20. ©Kount Inc All Rights Reserved National Cybercrime Use Case “In Fraud We Trust” cybercrime forum bust 13 arrested, 36 charges Started in October 2010 Attracted 11,000 members globally Stolen identities, credit card accounts ATM skimmers, botnet hosting, malicious software Arrests took place in 7 countries
  • 21. When deciding the jurisdiction to submit a case, what is the determining factor? Audience Question
  • 22. ©Kount Inc All Rights Reserved Summary Send a message to fraudsters Pure will power of the merchant Remember the digital crime scene Use your data points to tell the story Know the ground rules and go Not always easy so be prepared Provide evidence to motivate law enforcement
  • 23. Q&A www.ruinabadguysday.com fraudfighter@kount.com Skip Myers Director of Loss Prevention MicroCenter emyers@microcenter.com Don Bush VP of Marketing Kount don.bush@kount.com Chad Evans Manager, Ecommerce Investigations PetSmart CEvans@PetSmart.com