SlideShare a Scribd company logo
1 of 38
My Phone Stole My Bank Card.
(But my carrier saved me.)

Location in Mobile Payment Fraud


Rip Gerber CEO, Locaid
Mobile Payments Conference 2012
March 9, 2012 San Jose, CA
My phone and my bank card
    used to be friends
My bank got on my phone
My phone would let me bank
They travelled everywhere together
Then my phone got a new chip.
My phone got greedy.
NFC is coming to a handset on you
Across the world
Death of the bank card
It was never about the plastic
R.I.P.
But what’s not going away?
610M
 3.5
 12%
  #1
$4,607
 $10B
Declines hurt

                        Expect greater card abandonment as a result of a decline



        3x                              Cardholders declined in a cross-border POS transaction were
                                        three times more likely to stop using their cards



        6x                              Premium (high-limit) cardholders are six times more likely to
                                        abandon their cards




Source: High Spenders defined the top 10% of accounts, ranked by dollar spend from September – October 2010
Source: Visa White Paper - Effects of Declines on Cardholder Behavior 2010 and Visa Decision Sciences & Analytics

                                                                                                                    22
$25-$40
 Cost of a False Positive
without Mobile Location
Cost of a False Positive
 with Mobile Location
no location   location
Location and payment fraud
Location Based Services allow issuers to utilize the location of a cardholder’s wireless
device as an added layer of authentication.


                    BENEFITS

 •   Optimize approve/ decline decisions
 •   Reduce unnecessary customer contact
     and intervention
 •   Increase issuer operational efficiency
 •   Improve the customer experience




                                                                                           27
This doesn’t authenticate presence
This does.
How location works in payments.
 Compare Merchant Location & Phone
 Provide a Fraud Indication Score
 Significantly Reduce Fraud Costs



                 Bank Benefits
   • Reduce false positive Cases
   • Reduce case management load
   • Reduce customer service interventions
   • Work further down the score range
   • Improve algorithms of other fraud
    detections/metrics
   • Enhances bank brand (security, trust)
   • Reduces cardholder interventions
   • Improves cardholder experience
                                              vs                      =


                                             Location matching results in close proximity
How location stops ATM skims.
 Compare ATM Location & Phone
 Provide a Fraud Indication Score
 Identifies Fraudulent Activity



               Bank Benefits
   Qualifies transactions as fraudulent
   Justifies fraud investigation investment
   Focuses resources on problem areas
   Improves ROI of fraud pursuits
   Run away Fraud is mitigated




                                                  vs                     =


                                               Location matching results not close proximity
How do you get location?
Does location do more than
         fraud prevention?


33
Locaid is Location-as-a-Service

Locaid Locates             Every Device                On Every                For Any
                                                       Network              Location Need

   Locaid runs the                                   Locaid reach covers        Locaid delivers
                            Locaid finds every
largest LaaS gateway                                   350M devices.         ubiquitous location.
                          device on the network.
  and carrier reach                                 No app to download.        Indoors and out.
                              For any mobile
                                                   No user action needed.    Geofencing, location-
                               application.
                                                         Any device.          based SMS, Global
                                                         Anywhere.            coverage, location
                                                                            analytics. Any location
                                                                                     need.




                                                             The world’s first and largest
                                                                   LaaS company
Credit Card Fraud
Authenticating phone location
reduces false positives of $400M/yr.

Mobile Marketing
Proximity marketing without battery
drain, anywhere.
                                        Device
Shipment Tracking                        APIs
Locating packages in over 160
countries reduces logistics costs.

Mobile Gaming                 Only
                                             The world’s largest
       NavBuilder
network location permits wagers on
                                               LaaS company
             Inside
consumer mobile phones.

Family Safety                    Able
to find loved ones without app
download, on any device.



                                                                   35
Locaid Technologies




                       This is not me.
                       (But we can locate her phone.)




Thank you.

   Rip Gerber
President & CEO

More Related Content

What's hot

4. FOMS _ Pervasive Services _ John_McGovern
4. FOMS _ Pervasive  Services _ John_McGovern4. FOMS _ Pervasive  Services _ John_McGovern
4. FOMS _ Pervasive Services _ John_McGovernFOMS011
 
Ad:Tech Conference 2014
Ad:Tech Conference 2014Ad:Tech Conference 2014
Ad:Tech Conference 2014Argus Labs
 
NFC For Usability Professionals
NFC For Usability ProfessionalsNFC For Usability Professionals
NFC For Usability ProfessionalsRachel Youens
 
InSTEDD GeoChat for Crisis Mapping
InSTEDD GeoChat for Crisis MappingInSTEDD GeoChat for Crisis Mapping
InSTEDD GeoChat for Crisis MappingInSTEDD
 
Cannes Lions Innovation, unlocking mobile personalisation using sensors
Cannes Lions Innovation, unlocking mobile personalisation using sensorsCannes Lions Innovation, unlocking mobile personalisation using sensors
Cannes Lions Innovation, unlocking mobile personalisation using sensorsFilip Maertens
 
Being a mobile entrepreneur
Being a mobile entrepreneurBeing a mobile entrepreneur
Being a mobile entrepreneurgetsocialize
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Profilr toward preserving privacy an...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Profilr toward preserving privacy an...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Profilr toward preserving privacy an...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Profilr toward preserving privacy an...IEEEGLOBALSOFTSTUDENTPROJECTS
 
The Age of Empathic Devices - Beyond Fusion 2014 Conference
The Age of Empathic Devices - Beyond Fusion 2014 ConferenceThe Age of Empathic Devices - Beyond Fusion 2014 Conference
The Age of Empathic Devices - Beyond Fusion 2014 ConferenceFilip Maertens
 

What's hot (8)

4. FOMS _ Pervasive Services _ John_McGovern
4. FOMS _ Pervasive  Services _ John_McGovern4. FOMS _ Pervasive  Services _ John_McGovern
4. FOMS _ Pervasive Services _ John_McGovern
 
Ad:Tech Conference 2014
Ad:Tech Conference 2014Ad:Tech Conference 2014
Ad:Tech Conference 2014
 
NFC For Usability Professionals
NFC For Usability ProfessionalsNFC For Usability Professionals
NFC For Usability Professionals
 
InSTEDD GeoChat for Crisis Mapping
InSTEDD GeoChat for Crisis MappingInSTEDD GeoChat for Crisis Mapping
InSTEDD GeoChat for Crisis Mapping
 
Cannes Lions Innovation, unlocking mobile personalisation using sensors
Cannes Lions Innovation, unlocking mobile personalisation using sensorsCannes Lions Innovation, unlocking mobile personalisation using sensors
Cannes Lions Innovation, unlocking mobile personalisation using sensors
 
Being a mobile entrepreneur
Being a mobile entrepreneurBeing a mobile entrepreneur
Being a mobile entrepreneur
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Profilr toward preserving privacy an...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Profilr toward preserving privacy an...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Profilr toward preserving privacy an...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Profilr toward preserving privacy an...
 
The Age of Empathic Devices - Beyond Fusion 2014 Conference
The Age of Empathic Devices - Beyond Fusion 2014 ConferenceThe Age of Empathic Devices - Beyond Fusion 2014 Conference
The Age of Empathic Devices - Beyond Fusion 2014 Conference
 

Viewers also liked

Identifying Sevengill Sharks with Wildbook
Identifying Sevengill Sharks with Wildbook Identifying Sevengill Sharks with Wildbook
Identifying Sevengill Sharks with Wildbook Mike Bear
 
The tier application
The tier applicationThe tier application
The tier applicationalyciak33
 
Battle of Normandy WWII
Battle of Normandy WWIIBattle of Normandy WWII
Battle of Normandy WWIIsubrajits
 
EL CUIDADO DE NUESTRO MEDIO AMBIENTE
EL CUIDADO DE NUESTRO MEDIO AMBIENTEEL CUIDADO DE NUESTRO MEDIO AMBIENTE
EL CUIDADO DE NUESTRO MEDIO AMBIENTERicardo Rodriguez
 
Geofencing and Location Marketing Success Stories
Geofencing and Location Marketing Success StoriesGeofencing and Location Marketing Success Stories
Geofencing and Location Marketing Success StoriesLocaid Technologies
 

Viewers also liked (6)

Up in smoke
Up in smokeUp in smoke
Up in smoke
 
Identifying Sevengill Sharks with Wildbook
Identifying Sevengill Sharks with Wildbook Identifying Sevengill Sharks with Wildbook
Identifying Sevengill Sharks with Wildbook
 
The tier application
The tier applicationThe tier application
The tier application
 
Battle of Normandy WWII
Battle of Normandy WWIIBattle of Normandy WWII
Battle of Normandy WWII
 
EL CUIDADO DE NUESTRO MEDIO AMBIENTE
EL CUIDADO DE NUESTRO MEDIO AMBIENTEEL CUIDADO DE NUESTRO MEDIO AMBIENTE
EL CUIDADO DE NUESTRO MEDIO AMBIENTE
 
Geofencing and Location Marketing Success Stories
Geofencing and Location Marketing Success StoriesGeofencing and Location Marketing Success Stories
Geofencing and Location Marketing Success Stories
 

Similar to My Phone Stole My Credit Card

PlaceConf London 2018: Getting to Scale - Crowdsourcing Indoor Location (Sens...
PlaceConf London 2018: Getting to Scale - Crowdsourcing Indoor Location (Sens...PlaceConf London 2018: Getting to Scale - Crowdsourcing Indoor Location (Sens...
PlaceConf London 2018: Getting to Scale - Crowdsourcing Indoor Location (Sens...Localogy
 
DAS Verve Pitch-a-Kucha
DAS Verve Pitch-a-Kucha DAS Verve Pitch-a-Kucha
DAS Verve Pitch-a-Kucha Digiday
 
1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication
1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication
1+1=3 Combining IP Intelligence and Mobile Network Location for AuthenticationLocaid Technologies
 
Bricks + Mobile 2011 - mCommerce - Why User Experience Matter More With Onlin...
Bricks + Mobile 2011 - mCommerce - Why User Experience Matter More With Onlin...Bricks + Mobile 2011 - mCommerce - Why User Experience Matter More With Onlin...
Bricks + Mobile 2011 - mCommerce - Why User Experience Matter More With Onlin...Remodista
 
StreetHawk for ISV SpeakEasy
StreetHawk for ISV SpeakEasyStreetHawk for ISV SpeakEasy
StreetHawk for ISV SpeakEasyDavid Jones
 
Emerging Payments: Understanding and Leveraging the Opportunities (Credit Uni...
Emerging Payments: Understanding and Leveraging the Opportunities (Credit Uni...Emerging Payments: Understanding and Leveraging the Opportunities (Credit Uni...
Emerging Payments: Understanding and Leveraging the Opportunities (Credit Uni...NAFCU Services Corporation
 
Oracle ATG Mobile Trends
Oracle ATG Mobile TrendsOracle ATG Mobile Trends
Oracle ATG Mobile TrendsInfor
 
Verve overview5.19.12
Verve overview5.19.12Verve overview5.19.12
Verve overview5.19.12caseydennehy
 
Cove3 Mobile Marketing
Cove3 Mobile MarketingCove3 Mobile Marketing
Cove3 Mobile MarketingPropel!Apps
 
Movocity - Everywhere Your Customers Are
Movocity - Everywhere Your Customers AreMovocity - Everywhere Your Customers Are
Movocity - Everywhere Your Customers AreEdward Niu
 
Qr code presentation-april2011
Qr code presentation-april2011Qr code presentation-april2011
Qr code presentation-april2011Maestro
 
Mobile Banking Conference Southern Africa 130312
Mobile Banking Conference Southern Africa  130312Mobile Banking Conference Southern Africa  130312
Mobile Banking Conference Southern Africa 130312DSG
 
WITI Summit 2013 Mobile Technology Trends & Strategy
WITI Summit 2013 Mobile Technology Trends & StrategyWITI Summit 2013 Mobile Technology Trends & Strategy
WITI Summit 2013 Mobile Technology Trends & StrategyAmanda McConnell
 
Identity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSincIdentity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSincViolet Le, MBA MIS
 
Complete Merchant Services (1)
Complete Merchant Services (1)Complete Merchant Services (1)
Complete Merchant Services (1)trubuy
 
Is Visibility The Next Big Thing V3
Is Visibility The Next Big Thing   V3Is Visibility The Next Big Thing   V3
Is Visibility The Next Big Thing V3Jeffrey Irland
 

Similar to My Phone Stole My Credit Card (20)

PlaceConf London 2018: Getting to Scale - Crowdsourcing Indoor Location (Sens...
PlaceConf London 2018: Getting to Scale - Crowdsourcing Indoor Location (Sens...PlaceConf London 2018: Getting to Scale - Crowdsourcing Indoor Location (Sens...
PlaceConf London 2018: Getting to Scale - Crowdsourcing Indoor Location (Sens...
 
DAS Verve Pitch-a-Kucha
DAS Verve Pitch-a-Kucha DAS Verve Pitch-a-Kucha
DAS Verve Pitch-a-Kucha
 
1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication
1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication
1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication
 
Bricks + Mobile 2011 - mCommerce - Why User Experience Matter More With Onlin...
Bricks + Mobile 2011 - mCommerce - Why User Experience Matter More With Onlin...Bricks + Mobile 2011 - mCommerce - Why User Experience Matter More With Onlin...
Bricks + Mobile 2011 - mCommerce - Why User Experience Matter More With Onlin...
 
Locaid Mma Webinar Final
Locaid Mma Webinar FinalLocaid Mma Webinar Final
Locaid Mma Webinar Final
 
Mobile Marketing-the 3rd Screen, an introduction
Mobile Marketing-the 3rd Screen, an introductionMobile Marketing-the 3rd Screen, an introduction
Mobile Marketing-the 3rd Screen, an introduction
 
StreetHawk for ISV SpeakEasy
StreetHawk for ISV SpeakEasyStreetHawk for ISV SpeakEasy
StreetHawk for ISV SpeakEasy
 
Emerging Payments: Understanding and Leveraging the Opportunities (Credit Uni...
Emerging Payments: Understanding and Leveraging the Opportunities (Credit Uni...Emerging Payments: Understanding and Leveraging the Opportunities (Credit Uni...
Emerging Payments: Understanding and Leveraging the Opportunities (Credit Uni...
 
Oracle ATG Mobile Trends
Oracle ATG Mobile TrendsOracle ATG Mobile Trends
Oracle ATG Mobile Trends
 
Verve overview5.19.12
Verve overview5.19.12Verve overview5.19.12
Verve overview5.19.12
 
Mobile Marketing Intro-Flagstaff_Chamber_Cafe-Mar2012
Mobile Marketing Intro-Flagstaff_Chamber_Cafe-Mar2012Mobile Marketing Intro-Flagstaff_Chamber_Cafe-Mar2012
Mobile Marketing Intro-Flagstaff_Chamber_Cafe-Mar2012
 
Cove3 Mobile Marketing
Cove3 Mobile MarketingCove3 Mobile Marketing
Cove3 Mobile Marketing
 
NFC In Mobile Commerce
NFC In Mobile CommerceNFC In Mobile Commerce
NFC In Mobile Commerce
 
Movocity - Everywhere Your Customers Are
Movocity - Everywhere Your Customers AreMovocity - Everywhere Your Customers Are
Movocity - Everywhere Your Customers Are
 
Qr code presentation-april2011
Qr code presentation-april2011Qr code presentation-april2011
Qr code presentation-april2011
 
Mobile Banking Conference Southern Africa 130312
Mobile Banking Conference Southern Africa  130312Mobile Banking Conference Southern Africa  130312
Mobile Banking Conference Southern Africa 130312
 
WITI Summit 2013 Mobile Technology Trends & Strategy
WITI Summit 2013 Mobile Technology Trends & StrategyWITI Summit 2013 Mobile Technology Trends & Strategy
WITI Summit 2013 Mobile Technology Trends & Strategy
 
Identity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSincIdentity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSinc
 
Complete Merchant Services (1)
Complete Merchant Services (1)Complete Merchant Services (1)
Complete Merchant Services (1)
 
Is Visibility The Next Big Thing V3
Is Visibility The Next Big Thing   V3Is Visibility The Next Big Thing   V3
Is Visibility The Next Big Thing V3
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

My Phone Stole My Credit Card

  • 1. My Phone Stole My Bank Card. (But my carrier saved me.) Location in Mobile Payment Fraud Rip Gerber CEO, Locaid Mobile Payments Conference 2012 March 9, 2012 San Jose, CA
  • 2.
  • 3.
  • 4. My phone and my bank card used to be friends
  • 5. My bank got on my phone
  • 6. My phone would let me bank
  • 8. Then my phone got a new chip.
  • 9. My phone got greedy.
  • 10.
  • 11. NFC is coming to a handset on you
  • 13. Death of the bank card
  • 14. It was never about the plastic
  • 16.
  • 17. But what’s not going away?
  • 18.
  • 19.
  • 22. Declines hurt Expect greater card abandonment as a result of a decline 3x Cardholders declined in a cross-border POS transaction were three times more likely to stop using their cards 6x Premium (high-limit) cardholders are six times more likely to abandon their cards Source: High Spenders defined the top 10% of accounts, ranked by dollar spend from September – October 2010 Source: Visa White Paper - Effects of Declines on Cardholder Behavior 2010 and Visa Decision Sciences & Analytics 22
  • 23. $25-$40 Cost of a False Positive without Mobile Location
  • 24. Cost of a False Positive with Mobile Location
  • 25. no location location
  • 26.
  • 27. Location and payment fraud Location Based Services allow issuers to utilize the location of a cardholder’s wireless device as an added layer of authentication. BENEFITS • Optimize approve/ decline decisions • Reduce unnecessary customer contact and intervention • Increase issuer operational efficiency • Improve the customer experience 27
  • 30. How location works in payments.  Compare Merchant Location & Phone  Provide a Fraud Indication Score  Significantly Reduce Fraud Costs Bank Benefits • Reduce false positive Cases • Reduce case management load • Reduce customer service interventions • Work further down the score range • Improve algorithms of other fraud detections/metrics • Enhances bank brand (security, trust) • Reduces cardholder interventions • Improves cardholder experience vs = Location matching results in close proximity
  • 31. How location stops ATM skims.  Compare ATM Location & Phone  Provide a Fraud Indication Score  Identifies Fraudulent Activity Bank Benefits  Qualifies transactions as fraudulent  Justifies fraud investigation investment  Focuses resources on problem areas  Improves ROI of fraud pursuits  Run away Fraud is mitigated vs = Location matching results not close proximity
  • 32. How do you get location?
  • 33. Does location do more than fraud prevention? 33
  • 34. Locaid is Location-as-a-Service Locaid Locates Every Device On Every For Any Network Location Need Locaid runs the Locaid reach covers Locaid delivers Locaid finds every largest LaaS gateway 350M devices. ubiquitous location. device on the network. and carrier reach No app to download. Indoors and out. For any mobile No user action needed. Geofencing, location- application. Any device. based SMS, Global Anywhere. coverage, location analytics. Any location need. The world’s first and largest LaaS company
  • 35. Credit Card Fraud Authenticating phone location reduces false positives of $400M/yr. Mobile Marketing Proximity marketing without battery drain, anywhere. Device Shipment Tracking APIs Locating packages in over 160 countries reduces logistics costs. Mobile Gaming Only The world’s largest NavBuilder network location permits wagers on LaaS company Inside consumer mobile phones. Family Safety Able to find loved ones without app download, on any device. 35
  • 36.
  • 37.
  • 38. Locaid Technologies This is not me. (But we can locate her phone.) Thank you. Rip Gerber President & CEO

Editor's Notes

  1. The mobile space is fraudsters' biggest opportunity for the future, largely because many people still see their phone as a communication device, rather than something that they have to keep secure."
  2. The number of U.S. identity fraud victims rose 12 percent to 11.1 million adults last year, the highest level since the survey began in 2003. (Source: Javelin Strategy & Research, "Identity Fraud Survey Report," February 2010)  The average fraud resolution time dropped 30 percent to 21 hours. (Source: Javelin Strategy & Research, "Identity Fraud Survey Report," February 2010)Nearly half of fraud victims now file police reports, resulting in double the reported arrests, triple the prosecutions and double the percentage of convictions in 2009. (Source: Javelin Strategy & Research, "Identity Fraud Survey Report," February 2010)The number of U.S. identity fraud victims increased 22 percent in 2008 to 9.9 million adults. However, the total annual fraud amount jumped just 7 percent to $48 billion. The report said this is because "consumers and businesses are detecting and resolving fraud more quickly." (Source: Javelin Strategy & Research, February 2009 study.)Women were 26 percent more likely to be victims of identity fraud than men in 2008. (Source: Javelin Strategy & Research, February 2009 study.)71 percent of fraud incidents "began occurring in less than one week from when the data was first stolen, up from 33 percent in 2005." (Source: Javelin Strategy & Research, February 2009 study.)"Lost or stolen wallets, checkbooks and credit and debit cards" made up 43 percent of all ID theft incidents in which the "method of access" was known. (Source: Javelin Strategy & Research, February 2009 study.)Credit and debit card fraud is the No. 1 fear of Americans in the midst of the global financial crisis. Concern about fraud supersedes that of terrorism, computer and health viruses and personal safety. (Source: Unisys Security Index: United States, March 2009)Arizona leads the nation in identity theft complaints per 100,000 people. In 2008, the state had 149 complaints about ID theft per 100,000 people. California (139.1), Florida (133.3), Texas (130.3) and Nevada (126.0) rounded out the top five. (Source: Federal Trade Commission, February 2009 survey)South Dakota has the fewest identity theft complaints per 100,000 people in the nation. In 2008, the state had 33.8 complaints about ID theft per 100,000 people. North Dakota (35.7), Iowa (44.9), Montana (46.5) and Wyoming (46.9) rounded out the bottom five. (Source: Federal Trade Commission, February 2009 survey)Brownsville-Harlingen, Texas, is the metropolitan area with the largest number of ID theft complaints per 100,000 people. In 2008, the area had 366.8 complaints per 100,000 people. Napa, Calif., was second with 351.3. (Source: Federal Trade Commission, February 2009 survey)Read more: http://www.creditcards.com/credit-card-news/credit-card-industry-facts-personal-debt-statistics-1276.php#ixzz1oYOKbcfJCompare credit cards here - CreditCards.com
  3. Declines Negatively Affect Cardholder Behavior
  4. The number of U.S. identity fraud victims rose 12 percent to 11.1 million adults last year, the highest level since the survey began in 2003. (Source: Javelin Strategy & Research, "Identity Fraud Survey Report," February 2010)  The average fraud resolution time dropped 30 percent to 21 hours. (Source: Javelin Strategy & Research, "Identity Fraud Survey Report," February 2010)Nearly half of fraud victims now file police reports, resulting in double the reported arrests, triple the prosecutions and double the percentage of convictions in 2009. (Source: Javelin Strategy & Research, "Identity Fraud Survey Report," February 2010)The number of U.S. identity fraud victims increased 22 percent in 2008 to 9.9 million adults. However, the total annual fraud amount jumped just 7 percent to $48 billion. The report said this is because "consumers and businesses are detecting and resolving fraud more quickly." (Source: Javelin Strategy & Research, February 2009 study.)Women were 26 percent more likely to be victims of identity fraud than men in 2008. (Source: Javelin Strategy & Research, February 2009 study.)71 percent of fraud incidents "began occurring in less than one week from when the data was first stolen, up from 33 percent in 2005." (Source: Javelin Strategy & Research, February 2009 study.)"Lost or stolen wallets, checkbooks and credit and debit cards" made up 43 percent of all ID theft incidents in which the "method of access" was known. (Source: Javelin Strategy & Research, February 2009 study.)Credit and debit card fraud is the No. 1 fear of Americans in the midst of the global financial crisis. Concern about fraud supersedes that of terrorism, computer and health viruses and personal safety. (Source: Unisys Security Index: United States, March 2009)Arizona leads the nation in identity theft complaints per 100,000 people. In 2008, the state had 149 complaints about ID theft per 100,000 people. California (139.1), Florida (133.3), Texas (130.3) and Nevada (126.0) rounded out the top five. (Source: Federal Trade Commission, February 2009 survey)South Dakota has the fewest identity theft complaints per 100,000 people in the nation. In 2008, the state had 33.8 complaints about ID theft per 100,000 people. North Dakota (35.7), Iowa (44.9), Montana (46.5) and Wyoming (46.9) rounded out the bottom five. (Source: Federal Trade Commission, February 2009 survey)Brownsville-Harlingen, Texas, is the metropolitan area with the largest number of ID theft complaints per 100,000 people. In 2008, the area had 366.8 complaints per 100,000 people. Napa, Calif., was second with 351.3. (Source: Federal Trade Commission, February 2009 survey)Read more: http://www.creditcards.com/credit-card-news/credit-card-industry-facts-personal-debt-statistics-1276.php#ixzz1oYOKbcfJCompare credit cards here - CreditCards.com
  5. The number of U.S. identity fraud victims rose 12 percent to 11.1 million adults last year, the highest level since the survey began in 2003. (Source: Javelin Strategy & Research, "Identity Fraud Survey Report," February 2010)  The average fraud resolution time dropped 30 percent to 21 hours. (Source: Javelin Strategy & Research, "Identity Fraud Survey Report," February 2010)Nearly half of fraud victims now file police reports, resulting in double the reported arrests, triple the prosecutions and double the percentage of convictions in 2009. (Source: Javelin Strategy & Research, "Identity Fraud Survey Report," February 2010)The number of U.S. identity fraud victims increased 22 percent in 2008 to 9.9 million adults. However, the total annual fraud amount jumped just 7 percent to $48 billion. The report said this is because "consumers and businesses are detecting and resolving fraud more quickly." (Source: Javelin Strategy & Research, February 2009 study.)Women were 26 percent more likely to be victims of identity fraud than men in 2008. (Source: Javelin Strategy & Research, February 2009 study.)71 percent of fraud incidents "began occurring in less than one week from when the data was first stolen, up from 33 percent in 2005." (Source: Javelin Strategy & Research, February 2009 study.)"Lost or stolen wallets, checkbooks and credit and debit cards" made up 43 percent of all ID theft incidents in which the "method of access" was known. (Source: Javelin Strategy & Research, February 2009 study.)Credit and debit card fraud is the No. 1 fear of Americans in the midst of the global financial crisis. Concern about fraud supersedes that of terrorism, computer and health viruses and personal safety. (Source: Unisys Security Index: United States, March 2009)Arizona leads the nation in identity theft complaints per 100,000 people. In 2008, the state had 149 complaints about ID theft per 100,000 people. California (139.1), Florida (133.3), Texas (130.3) and Nevada (126.0) rounded out the top five. (Source: Federal Trade Commission, February 2009 survey)South Dakota has the fewest identity theft complaints per 100,000 people in the nation. In 2008, the state had 33.8 complaints about ID theft per 100,000 people. North Dakota (35.7), Iowa (44.9), Montana (46.5) and Wyoming (46.9) rounded out the bottom five. (Source: Federal Trade Commission, February 2009 survey)Brownsville-Harlingen, Texas, is the metropolitan area with the largest number of ID theft complaints per 100,000 people. In 2008, the area had 366.8 complaints per 100,000 people. Napa, Calif., was second with 351.3. (Source: Federal Trade Commission, February 2009 survey)Read more: http://www.creditcards.com/credit-card-news/credit-card-industry-facts-personal-debt-statistics-1276.php#ixzz1oYOKbcfJCompare credit cards here - CreditCards.com
  6. Mobile and WiFi-based ad network JiWire has released its Q4 Mobile Audience Insights Report. There’s some great data in the report. I’ll focus on a few items of interest pertaining to advertising and marketing.As the headline asserts, JiWire found that 75% of its survey respondents (US, UK) said they had taken action after exposure to a locally relevant ad.