SlideShare a Scribd company logo
1 of 10
Download to read offline
Fraud Prevention




                        Operationalizing
                        Real-Time Fraud
                           Detection
White
Paper


                        Integrated decisioning platform
                     provides migration to day-one check
                               fraud prevention



Co-authored by
Orbograph and
The Santa Fe Group
February 12, 2011
Introduction

                      Continuous waves of check fraud attacks have heightened the
                      sensitivity of financial institution (FI) executives. The growth of
                      these crimes have forced FI’s to take defensive measures to
                      minimize losses and protect their customers. Unfortunately,
                      FI’s are hampered by limited capital budgets and staff
                      reductions. Because FI resources are limited, gaps persist,
                      allowing fraudsters to penetrate older systems built on outdated
                      methodologies. The result is unwanted fraud risk. Are we in
                      effect perpetuating check fraud by not moving fast enough to
                      new technologies and solutions?
The ABA 2009
Deposit Account       Given the now common use of images and check truncation, it
Fraud Survey          is surprising that so many banks still view fraud detection
showed check          through the lenses of traditional check or siloed processing
fraud losses          practices with disparate case management and decisioning
exceeded $1 billion
for the first time.
                      platforms for on-us, deposit, and ACH fraud prevention.

                      This white paper offers an offensive game plan for financial
                      institutions to solidify their defenses, minimize losses, maximize
                      efficiency, and build for the future with enterprise-wide
                      prevention strategies.

                      I. Fraud Loss Trends and the Persistence of Paper

                      The American Bankers Association reported in its 2009 Deposit
                      Account Fraud Survey that, in 2008, check fraud losses
                      exceeded $1 billion for the first time. Responding financial
                      institution fraud managers reported that the top three loss
                      categories were: returned deposited items, also known as
                      deposit fraud (35%); counterfeit checks (30%); and forged
                      makers’ signatures and endorsements (22%). This was
                      reinforced by data from the Association for Financial
                      Professionals’ 2010 Payments Fraud and Control Survey
                      showing the primary sources of loss among commercial bank
                      customers were: counterfeit checks using the organization’s
                      MICR line data (72%); alteration of payee names on checks
                      issued by the organization (58%); and alteration of dollar
                      amount on checks issued (35%).

                      1
                          See http://www.aba.com/Surveys+and+Statistics/2009_Deposit_htm
                      2
                          See http://www.afponline.org/pub/pdf/2010_Payments_Fraud_Survey.pdf
In the ABA survey, more than half of respondents experienced
                        ACH originator fraud during 2008 in frauds that typically
                        targeted individual and small business accounts. As ACH
                        volumes flatten and net ACH fraud dollars remain significantly
                        less than on-us and deposit check fraud losses, it’s clear ACH
                        volumes and losses will undoubtedly continue to grow, however
                        it will be a long time before they approach the current and
                        expected check and loss volumes. By comparison, it becomes
                        obvious that investment in checks still promises good return.

                        A 2010 customer survey by Orbograph asked financial
                        institutions how their check fraud losses compare to the ABA
                        median. Interestingly, 66.5% indicated that fraud losses were
                        less than the ABA median. However, 84% out of 256
A 2010 Orbograph        respondents believed an image-based fraud prevention
customer survey         strategy would provide moderate to strong value.
showed 84% out of
256 respondents         In addition to these eye-opening industry numbers, other risk
believed an image-      considerations for the paper-channel should be evaluated:
based fraud detection
strategy would
                             Large-scale adoption of remote deposit capture will
provide moderate to            allow hundreds of thousands of businesses to feed
strong value.                  images into the check clearing system virtually
                               unchecked.
                             Least cost routing options create opportunities for
                               additional cross channel fraud when checks convert to
                               ACH and move to Regulation E (90-day return rules).
                               These extended windows make it more difficult to track
                               fraud as well.
                             Mobile capture for depositing checks provides great
                               convenience, yet adds risk for potential exploitation by
                               criminals. Adoption is predicted to climb in 2011.

                        Effective fraud managers must be able to identify, interpret and
                        prioritize these macro trends but account for micro level
                        statistical variances including, urban vs. rural, organized crime
                        presence and an ever-changing economic environment.
                        However, analysis is not enough. Continual improvements
                        using best practices and new technologies can enable FI’s to
                        drive prevention/detection rates significantly higher.
II. A Tectonic Shift…In Thinking

                    Before the enactment of the Check 21 Act in 2005, check fraud
                    detection was a “day-two” function by necessity. There was no
                    time to look for fraud during nightly check processing. Instead,
                    bank check processing departments were consumed by two
                    objectives: 1) to process all outgoing paper checks (those
                    drawn on other banks) in time to meet the exchange deadlines
                    each night; and 2) to process all the on-us paper checks (those
                    accepted in-house the previous day and those received through
                    in-clearings from other banks at night) in time to meet posting
                    deadlines each morning.
Banks could not
afford to           The banks’ “mission: critical” was to ensure that customer
jeopardize the      accounts were up to date before opening for business in the
completion of       morning. Each evening millions of checks were transported
this intensive      between hundreds of exchange points and thousands of banks
paper-movement
process for a
                    to achieve the efficient nationwide clearing of checks upon
handful of checks   which the US economy has depended for decades. Banks
that might not be   could not afford to jeopardize the completion of this intensive
legitimate.         paper-movement process for a handful of checks that might not
                    be legitimate; there was too much float at stake.

                    Fraud managers finally had their opportunity when the on-us
                    paper from the day before had been processed and posted. At
                    that point, the race was on to locate fraudulent checks before
                    midnight of that second day, the last clear chance for a bank to
                    return an item to the depositing bank without being responsible
                    for the loss.

                    On the “returned check” side of the house, banks were again
                    impeded by the return of the paper checks — checks they had
                    previously accepted that were drawn on other banks. While in
                    theory returning a check should take no more than two days,
                    the complexity of the paper process created a lot of opportunity
                    for checks to fall through the cracks, leaving the return of
                    checks to wait until the third or fourth day after they had been
                    accepted. This created an opportunity for criminals, who could
move or acquire the cash, sticking the accepting bank with the
                         loss. Even in 2009, this concern continued. (See appendix A)
                         Fast forward to today. Nearly all checks are imaged early in the
                         banking process. Many are truncated right at the branch with
                         increasing numbers imaged and entered into the clearing
                         process at the customer’s office through RDC. The need to
                         move paper through the clearing process to effect payment is a
                         thing of the past. Nearly all of that paper transfer is
                         accomplished electronically in a fraction of the time.

                         Regulatory changes and technology developments are
                         redefining fraud risk mitigation strategies as well. Regulation
                         CC changes in 2010 provided next-day check availability and
                         although positive from many operational and customer vantage
                         points, fraudsters can work comfortably in many markets within
                         a two day window by withdrawing funds next day via branch or
                         ATM. The result is an increase in deposit fraud. Why?

                         Regulation CC swings the pendulum — and the advantage —
                         back to the paying bank. Institutions with strong on-us check
                         fraud technology simply return potential counterfeits, irregular
                         signatures (forgeries) and alterations to the BoFD (Bank of First
                         Deposit) within the required processing window. By the time the
                         BoFD receives the return, the money is gone. The paying bank
                         has protected itself while the BoFD takes the loss.

                         “This change is a tectonic shift in check processing and is not
      Jodi Pratt         only related to the speed of processing,” says Jodi Pratt of Jodi
Senior Consultant with   Pratt and Associates & The Santa Fe Group.
 The Santa Fe Group

                         III. A Unified Approach

                         We now have the tools, the capacity, and the capability to move
                         check fraud prevention into the mainstream of transaction
                         processing and integrate it into the check and payment
                         processing function so that the two can occur simultaneously.
                         Platforms are now available to manage return items,
                         exceptions, and fraud suspects from the same user interface.
                         Additionally, multiple payments can be added, linking account
                         activity and address cross channel fraud. Couple a platform
                         strategy with additional data elements available through check
images, and detection may finally develop into fraud
                         prevention.

                         The overwhelming majority of banks have yet to seize this
                         opportunity. The limitations that pushed fraud detection out of
                         day-one processing no longer exist, yet banks continue to
                         behave as if day-one detection is still out of reach. Most fraud
                         managers still operate under the now-unnecessary constraints
                         of a batched, day-two world. This is inefficient, certainly, and it
                         allows criminals who’ve successfully exploited paper
                         processing in the past to continue their work.

                         What if banks began using today’s expedited check processing
                         to transform check fraud detection and actually achieve the
                         Holy Grail of day-one — and in some cases, day-zero — fraud
                         detection? Can an FI overcome old habits and reap the full
                         fraud-prevention benefits of imaging and new platforms?

                         “With several simple steps, FI’s can step into the next
                         generation: operationalizing real-time or at least “near real-
                         time” fraud detection and prevention,” summarized Bob Jones,
                         of RW Jones and Associates.

                         IV. Technology and Operational Considerations
  Robert W. Jones
Senior Consultant with
 The Santa Fe Group
                         A well-rounded fraud-prevention program that uses all the
                         available data points hasn’t always been easy to achieve.
                         Initially, data points were generated from processing data and
                         MICR line information feeding data analytics with basic
                         statistical analysis. The result: lower than desired detection
                         rates and high-false-positive rates. Today, decision data is
                         generated by image analysis algorithms applied to imaged
                         signatures, check stock formats, and field level characteristics.

                         The key is a unified approach, leveraging analytics and image
                         analysis on an integrated decisioning platform that is integrated
                         into both the inclearings and over-the-counter (OTC) teller or
                         branch capture environments to enhance pre-post fraud
                         filtering.
 Inclearings: Most checks cleared through the Federal
                             Reserve and industry exchange networks are in image
                             cash letters. Images arrive several times throughout the
                             day depending on rules of each network. Running cash
                             letters through an integrated check processing fraud
                             detection system before posting offers an early warning
                             of suspect items. Fraud is potentially caught earlier in
                             the process, preventing on-us losses that previously
                             were not discovered until it was too late to return items
                             to cover a loss or stop subsequent intraday withdrawals.

                              Adjusting in-clearing processes this way can transform
                              check fraud management by making fraud prevention a
                              mainstream function (as opposed to a post-clearing or
                              auxiliary function). Inclearing processing offers other
                              benefits too, including enhanced customer service by
                              intercepting suspect items before they post to
                              customers’ accounts and preventing legitimate items
                              from being rejected.

                              Payee name verification (PNV) is also a value-added
                              feature reduce fraud. PNV can now be run Day 1 or Day
                              2 as an additional prevention method using customer
                              generated payee issue files.
      Joe Gregory
Vice President Marketing    Over-the-counter (on-us): Transaction fraud filters,
       Orbograph
                             based on the limited numerical data from the MICR line
                             can offer the initial baseline of information about account
                             behavior: the volume of checks written, the value of
                             those checks, their serial numbers, and their timing. This
                             data alone, however, is inadequate to make high-quality,
                             low-false-positive suspect decisions, keeping many
                             banks from implementing it at the teller line. Today,
                             images captured at the back counter of a branch, or at
                             the teller window, can be used to improve fraud
                             identification rates, allowing for real-time fraud detection
                             that keeps cash from crossing the teller account on
                             cashed checks and split deposits. “These elements,
                             combined with an intelligent decisioning engine, can
                             now score an individual transaction within two to three
seconds,” stated Joe Gregory, Vice President of
                          Marketing at Orbograph.

                        Transit: Deposit fraud is generated from transit items.
                         Solutions in this area are still evolving as many FI’s are
                         now using “black list” servicers who provide access to
                         fraudulent account lists. Although improving, institutions
                         are not leveraging image-based data elements for fraud
                         prevention. Several strategies can be deployed to help
                         this area.

                          FI’s can now create transit account profiles for matching
                          payable transit items against during day one processing.
                          This approach leverages an image archive which is now
                          underutilized and allows FI’s to put temporary holds on
                          funds. Profiles can be created from FDIC alerts for
                          official checks which are involved with active fraud
                          schemes. Image analysis can also reduce risk by
                          identifying remotely created checks (RCC) and matching
                          payee information to active “black lists” currently
“Because one FI’s         effecting the FI. Lastly, analytics on deposit trends at the
“on-us” losses are
another’s “deposit        account level are the last line of defense and are
fraud” losses, FI’s       improved when merged with these advanced image
need to understand        techniques.
the benefits of
reciprocity,” stated      “Because one FI’s “on-us” losses are another’s “deposit
Jones.                    fraud” loss (and vice versa), FI’s need to understand the
                          benefits of reciprocity,” stated Jones. There is
                          substantial value to be gained by both parties in
                          receiving reliable return information on the same day or
                          early the next day. By cooperating with a common
                          exchange partner, FI’s can reduce deposit fraud by the
                          paying bank returning a notification of doubtful
                          collectability to the BoFD. By taking this approach, an
                          improved fraud network could spread quickly across the
                          country, strengthening the entire banking community. 3

                        Other instruments: Once banks have invested in real-
                         time on-us check fraud detection, it’s relatively easy to
                         extend that functionality to additional areas of fraud loss.
                         While losses associated with savings withdrawals,
                          3
                           For evidence of this, see other successful fraud collaborations that have
                          occurred over the last 15 years, such as the BITS Fraud Steering
                          Committee, the American Bankers Association Statistics Committee.
convenience checks on lines of credit, and cash
       advances have not been adequate to justify a special
       fraud detection solution, the infrastructure is in place to
       accept and analyze signatures on these documents. The
       incremental cost of including verification may now be
       justifiable as checks become harder for crooks to
       negotiate.

V.     Conclusion

The 2010 Regulation CC changes on next-day check
availability demand that banks focus on superior on-us fraud
prevention. This is best accomplished when the foundation for
case management is based on a common decisioning platform.
This platform becomes the decision layer for a tightly integrated
transaction and image-based fraud analysis engine.

When “best of breed” performance feeds a common platform,
the primary objectives of detection and efficiency can be
achieved. Moving into the future, the decision platform
incorporates additional payment channels under this umbrella
and bridges the gap to day one fraud by supporting same day
interbank fraud prevention.
APPENDIX A:

ABA Deposit Fraud Report - 2009 Edition
Average Time to Return Check to BoFD

More Related Content

What's hot

Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation TransUnion
 
Role of blockchain in enterprise kyc
Role of blockchain in enterprise kycRole of blockchain in enterprise kyc
Role of blockchain in enterprise kycadityakumar2080
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012The Texas Network, LLC
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesIJSRD
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety
 
Fei 2011 future of bill payments- duncan consulting
Fei 2011  future of bill payments- duncan consultingFei 2011  future of bill payments- duncan consulting
Fei 2011 future of bill payments- duncan consultingkristyduncan
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereGoutama Bachtiar
 
GT - Anti-money laundering compliance in the money services business industry
GT - Anti-money laundering compliance in the money services business industry GT - Anti-money laundering compliance in the money services business industry
GT - Anti-money laundering compliance in the money services business industry Grant Thornton
 
2014 march falcon business fraud classification model (3attendees)
2014 march falcon business fraud classification model (3attendees)2014 march falcon business fraud classification model (3attendees)
2014 march falcon business fraud classification model (3attendees)jcsobreira
 
Cyber loss model for all industries
Cyber loss model for all industriesCyber loss model for all industries
Cyber loss model for all industriesThomas Lee
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeAlan Percy
 
First Data Trans Armor
First Data Trans ArmorFirst Data Trans Armor
First Data Trans ArmorJoshua Willis
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment SystemsDomenico Catalano
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersEckoh
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sectorsksahu099
 

What's hot (19)

Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation
 
A guide to Financial Crime Management
A guide to Financial Crime ManagementA guide to Financial Crime Management
A guide to Financial Crime Management
 
Role of blockchain in enterprise kyc
Role of blockchain in enterprise kycRole of blockchain in enterprise kyc
Role of blockchain in enterprise kyc
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
 
E-Banking Security
E-Banking SecurityE-Banking Security
E-Banking Security
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
Fei 2011 future of bill payments- duncan consulting
Fei 2011  future of bill payments- duncan consultingFei 2011  future of bill payments- duncan consulting
Fei 2011 future of bill payments- duncan consulting
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
GT - Anti-money laundering compliance in the money services business industry
GT - Anti-money laundering compliance in the money services business industry GT - Anti-money laundering compliance in the money services business industry
GT - Anti-money laundering compliance in the money services business industry
 
Tackling Card not present Fraud
Tackling Card not present FraudTackling Card not present Fraud
Tackling Card not present Fraud
 
2014 march falcon business fraud classification model (3attendees)
2014 march falcon business fraud classification model (3attendees)2014 march falcon business fraud classification model (3attendees)
2014 march falcon business fraud classification model (3attendees)
 
Cyberlaundering
CyberlaunderingCyberlaundering
Cyberlaundering
 
Cyber loss model for all industries
Cyber loss model for all industriesCyber loss model for all industries
Cyber loss model for all industries
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
First Data Trans Armor
First Data Trans ArmorFirst Data Trans Armor
First Data Trans Armor
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment Systems
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact Centers
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
 

Viewers also liked

Fraud+Indicators(1)
Fraud+Indicators(1)Fraud+Indicators(1)
Fraud+Indicators(1)gj4u
 
The Mobile Project. Technology, Standards & Scale
The Mobile Project. Technology, Standards & ScaleThe Mobile Project. Technology, Standards & Scale
The Mobile Project. Technology, Standards & ScaleVivastream
 
Coffee = Time Management.
Coffee = Time Management.Coffee = Time Management.
Coffee = Time Management.Vivastream
 
Planning for Profitable Meetings at EDS 2013
Planning for Profitable Meetings at EDS 2013Planning for Profitable Meetings at EDS 2013
Planning for Profitable Meetings at EDS 2013Vivastream
 
Going Beyond Selling Cars to Win Clients
Going Beyond Selling Cars to Win ClientsGoing Beyond Selling Cars to Win Clients
Going Beyond Selling Cars to Win ClientsVivastream
 
Mobile Coupons & Loyalty
Mobile Coupons & LoyaltyMobile Coupons & Loyalty
Mobile Coupons & LoyaltyVivastream
 
Retention Strategies: A Steady Diet of Low-Hanging Fruit
Retention Strategies: A Steady Diet of Low-Hanging FruitRetention Strategies: A Steady Diet of Low-Hanging Fruit
Retention Strategies: A Steady Diet of Low-Hanging FruitVivastream
 
Psychology-Based Marketing

Psychology-Based Marketing
 Psychology-Based Marketing

Psychology-Based Marketing
 Vivastream
 
Creative Slamdown: How to Sell Mundane Products
Creative Slamdown: How to Sell Mundane ProductsCreative Slamdown: How to Sell Mundane Products
Creative Slamdown: How to Sell Mundane ProductsVivastream
 
Learn the 4 essential requirements. part 1 of 4
Learn the 4 essential requirements. part 1 of 4Learn the 4 essential requirements. part 1 of 4
Learn the 4 essential requirements. part 1 of 4Vivastream
 
How to Leverage Big Data in the Mobile World
How to Leverage Big Data in the Mobile WorldHow to Leverage Big Data in the Mobile World
How to Leverage Big Data in the Mobile WorldVivastream
 
Part1 state-email
Part1 state-emailPart1 state-email
Part1 state-emailVivastream
 
Learn the 4 Essential Requirements, Part 3 of 4, Slides 153-228
Learn the 4 Essential Requirements, Part 3 of 4, Slides 153-228Learn the 4 Essential Requirements, Part 3 of 4, Slides 153-228
Learn the 4 Essential Requirements, Part 3 of 4, Slides 153-228Vivastream
 
How Workday went from Good...to Great!: Winning with Big Data
How Workday went from Good...to Great!: Winning with Big DataHow Workday went from Good...to Great!: Winning with Big Data
How Workday went from Good...to Great!: Winning with Big DataVivastream
 
Todays Mobile Cybersecurity
Todays Mobile CybersecurityTodays Mobile Cybersecurity
Todays Mobile CybersecurityVivastream
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudVidaB
 
Effective Digital Advertising: Making Sense Of Data, Targeting & Measurement
Effective Digital Advertising: Making Sense Of Data, Targeting & MeasurementEffective Digital Advertising: Making Sense Of Data, Targeting & Measurement
Effective Digital Advertising: Making Sense Of Data, Targeting & MeasurementVivastream
 
Today''s Tablets Mean Bigger Consumer Engagement
Today''s Tablets Mean Bigger Consumer EngagementToday''s Tablets Mean Bigger Consumer Engagement
Today''s Tablets Mean Bigger Consumer EngagementVivastream
 
How to Balance Your PPC and SEO Campaigns
How to Balance Your PPC and SEO CampaignsHow to Balance Your PPC and SEO Campaigns
How to Balance Your PPC and SEO CampaignsVivastream
 

Viewers also liked (20)

Fraud+Indicators(1)
Fraud+Indicators(1)Fraud+Indicators(1)
Fraud+Indicators(1)
 
The Mobile Project. Technology, Standards & Scale
The Mobile Project. Technology, Standards & ScaleThe Mobile Project. Technology, Standards & Scale
The Mobile Project. Technology, Standards & Scale
 
Coffee = Time Management.
Coffee = Time Management.Coffee = Time Management.
Coffee = Time Management.
 
Planning for Profitable Meetings at EDS 2013
Planning for Profitable Meetings at EDS 2013Planning for Profitable Meetings at EDS 2013
Planning for Profitable Meetings at EDS 2013
 
Going Beyond Selling Cars to Win Clients
Going Beyond Selling Cars to Win ClientsGoing Beyond Selling Cars to Win Clients
Going Beyond Selling Cars to Win Clients
 
Mobile Coupons & Loyalty
Mobile Coupons & LoyaltyMobile Coupons & Loyalty
Mobile Coupons & Loyalty
 
Retention Strategies: A Steady Diet of Low-Hanging Fruit
Retention Strategies: A Steady Diet of Low-Hanging FruitRetention Strategies: A Steady Diet of Low-Hanging Fruit
Retention Strategies: A Steady Diet of Low-Hanging Fruit
 
Psychology-Based Marketing

Psychology-Based Marketing
 Psychology-Based Marketing

Psychology-Based Marketing

 
Creative Slamdown: How to Sell Mundane Products
Creative Slamdown: How to Sell Mundane ProductsCreative Slamdown: How to Sell Mundane Products
Creative Slamdown: How to Sell Mundane Products
 
Learn the 4 essential requirements. part 1 of 4
Learn the 4 essential requirements. part 1 of 4Learn the 4 essential requirements. part 1 of 4
Learn the 4 essential requirements. part 1 of 4
 
How to Leverage Big Data in the Mobile World
How to Leverage Big Data in the Mobile WorldHow to Leverage Big Data in the Mobile World
How to Leverage Big Data in the Mobile World
 
Part1 state-email
Part1 state-emailPart1 state-email
Part1 state-email
 
Learn the 4 Essential Requirements, Part 3 of 4, Slides 153-228
Learn the 4 Essential Requirements, Part 3 of 4, Slides 153-228Learn the 4 Essential Requirements, Part 3 of 4, Slides 153-228
Learn the 4 Essential Requirements, Part 3 of 4, Slides 153-228
 
How Workday went from Good...to Great!: Winning with Big Data
How Workday went from Good...to Great!: Winning with Big DataHow Workday went from Good...to Great!: Winning with Big Data
How Workday went from Good...to Great!: Winning with Big Data
 
Todays Mobile Cybersecurity
Todays Mobile CybersecurityTodays Mobile Cybersecurity
Todays Mobile Cybersecurity
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraud
 
Effective Digital Advertising: Making Sense Of Data, Targeting & Measurement
Effective Digital Advertising: Making Sense Of Data, Targeting & MeasurementEffective Digital Advertising: Making Sense Of Data, Targeting & Measurement
Effective Digital Advertising: Making Sense Of Data, Targeting & Measurement
 
311323
311323311323
311323
 
Today''s Tablets Mean Bigger Consumer Engagement
Today''s Tablets Mean Bigger Consumer EngagementToday''s Tablets Mean Bigger Consumer Engagement
Today''s Tablets Mean Bigger Consumer Engagement
 
How to Balance Your PPC and SEO Campaigns
How to Balance Your PPC and SEO CampaignsHow to Balance Your PPC and SEO Campaigns
How to Balance Your PPC and SEO Campaigns
 

Similar to Operationalizing Real-Time Fraud Detection

Using Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims FraudUsing Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims FraudCognizant
 
understanding risk management in emerging retail payments
understanding risk management in emerging retail paymentsunderstanding risk management in emerging retail payments
understanding risk management in emerging retail paymentsBoni
 
2007 12 - understanding risk management in emerging retail payments
2007 12 - understanding risk management in emerging retail payments2007 12 - understanding risk management in emerging retail payments
2007 12 - understanding risk management in emerging retail paymentsBoni
 
Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...Santhosh L
 
Article global it systems are now even more vulnerable - paul wright
Article  global it systems are now even more vulnerable - paul wrightArticle  global it systems are now even more vulnerable - paul wright
Article global it systems are now even more vulnerable - paul wrightPaul Wright MSc
 
A42 banks race to defend from further reputational damage
A42   banks race to defend from further reputational damageA42   banks race to defend from further reputational damage
A42 banks race to defend from further reputational damageFreddie McMahon
 
Iqt quarterly winter 2011 realini
Iqt quarterly winter 2011 realiniIqt quarterly winter 2011 realini
Iqt quarterly winter 2011 realiniDavid Schwartz
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET Journal
 
Computer aided audit techniques and fraud detection
Computer aided audit techniques and fraud detectionComputer aided audit techniques and fraud detection
Computer aided audit techniques and fraud detectionAlexander Decker
 
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud RiskThe CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud RiskKyriba Corporation
 
Guaranteed_Performance_in_Check_Processing_with_Managed_Recognition_Technology
Guaranteed_Performance_in_Check_Processing_with_Managed_Recognition_TechnologyGuaranteed_Performance_in_Check_Processing_with_Managed_Recognition_Technology
Guaranteed_Performance_in_Check_Processing_with_Managed_Recognition_TechnologyVivastream
 
ATM Fraud Prevention Management White Paper from ESQ
 ATM Fraud Prevention Management White Paper from ESQ ATM Fraud Prevention Management White Paper from ESQ
ATM Fraud Prevention Management White Paper from ESQESQ Business Services
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
 
Enterprise Fraud Management
Enterprise Fraud ManagementEnterprise Fraud Management
Enterprise Fraud ManagementManish Desai
 
Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industryitio Innovex Pvt Ltv
 
Best practices for preventing fraud in a real-time world
Best practices for preventing fraud in a real-time worldBest practices for preventing fraud in a real-time world
Best practices for preventing fraud in a real-time worldDomenico Scaffidi
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bbmarukanda
 

Similar to Operationalizing Real-Time Fraud Detection (20)

Using Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims FraudUsing Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims Fraud
 
understanding risk management in emerging retail payments
understanding risk management in emerging retail paymentsunderstanding risk management in emerging retail payments
understanding risk management in emerging retail payments
 
2007 12 - understanding risk management in emerging retail payments
2007 12 - understanding risk management in emerging retail payments2007 12 - understanding risk management in emerging retail payments
2007 12 - understanding risk management in emerging retail payments
 
Blockchain in Finance
Blockchain in FinanceBlockchain in Finance
Blockchain in Finance
 
Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...
 
Article global it systems are now even more vulnerable - paul wright
Article  global it systems are now even more vulnerable - paul wrightArticle  global it systems are now even more vulnerable - paul wright
Article global it systems are now even more vulnerable - paul wright
 
What is Social KYC?
What is Social KYC? What is Social KYC?
What is Social KYC?
 
A42 banks race to defend from further reputational damage
A42   banks race to defend from further reputational damageA42   banks race to defend from further reputational damage
A42 banks race to defend from further reputational damage
 
Iqt quarterly winter 2011 realini
Iqt quarterly winter 2011 realiniIqt quarterly winter 2011 realini
Iqt quarterly winter 2011 realini
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid Models
 
Computer aided audit techniques and fraud detection
Computer aided audit techniques and fraud detectionComputer aided audit techniques and fraud detection
Computer aided audit techniques and fraud detection
 
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud RiskThe CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
 
Guaranteed_Performance_in_Check_Processing_with_Managed_Recognition_Technology
Guaranteed_Performance_in_Check_Processing_with_Managed_Recognition_TechnologyGuaranteed_Performance_in_Check_Processing_with_Managed_Recognition_Technology
Guaranteed_Performance_in_Check_Processing_with_Managed_Recognition_Technology
 
ATM Fraud Prevention Management White Paper from ESQ
 ATM Fraud Prevention Management White Paper from ESQ ATM Fraud Prevention Management White Paper from ESQ
ATM Fraud Prevention Management White Paper from ESQ
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
 
Kyc and Blockchain
Kyc and BlockchainKyc and Blockchain
Kyc and Blockchain
 
Enterprise Fraud Management
Enterprise Fraud ManagementEnterprise Fraud Management
Enterprise Fraud Management
 
Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industry
 
Best practices for preventing fraud in a real-time world
Best practices for preventing fraud in a real-time worldBest practices for preventing fraud in a real-time world
Best practices for preventing fraud in a real-time world
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 

More from Vivastream

Exchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceExchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceVivastream
 
Exchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapExchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapVivastream
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream PosterVivastream
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream PosterVivastream
 
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksBreaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksVivastream
 
EY Smart Commerce Report
EY Smart Commerce ReportEY Smart Commerce Report
EY Smart Commerce ReportVivastream
 
EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014Vivastream
 
EY Global Consumer Banking Survey
EY Global Consumer Banking SurveyEY Global Consumer Banking Survey
EY Global Consumer Banking SurveyVivastream
 
Automation for RDC and Mobile
Automation for RDC and MobileAutomation for RDC and Mobile
Automation for RDC and MobileVivastream
 
Healthcare Payments Automation Center
Healthcare Payments Automation CenterHealthcare Payments Automation Center
Healthcare Payments Automation CenterVivastream
 
Next Generation Recognition Solutions
Next Generation Recognition SolutionsNext Generation Recognition Solutions
Next Generation Recognition SolutionsVivastream
 
Automation Services
Automation ServicesAutomation Services
Automation ServicesVivastream
 
Company Overview
Company OverviewCompany Overview
Company OverviewVivastream
 

More from Vivastream (20)

Exchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceExchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_Ecommerce
 
Exchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapExchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement Roadmap
 
Test
TestTest
Test
 
Tcap
TcapTcap
Tcap
 
SQA
SQASQA
SQA
 
Jeeva jessf
Jeeva jessfJeeva jessf
Jeeva jessf
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
 
APEX
APEXAPEX
APEX
 
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksBreaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
 
EY Smart Commerce Report
EY Smart Commerce ReportEY Smart Commerce Report
EY Smart Commerce Report
 
EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014
 
EY Global Consumer Banking Survey
EY Global Consumer Banking SurveyEY Global Consumer Banking Survey
EY Global Consumer Banking Survey
 
Serano
SeranoSerano
Serano
 
Accura XV
Accura XVAccura XV
Accura XV
 
Automation for RDC and Mobile
Automation for RDC and MobileAutomation for RDC and Mobile
Automation for RDC and Mobile
 
Healthcare Payments Automation Center
Healthcare Payments Automation CenterHealthcare Payments Automation Center
Healthcare Payments Automation Center
 
Next Generation Recognition Solutions
Next Generation Recognition SolutionsNext Generation Recognition Solutions
Next Generation Recognition Solutions
 
Automation Services
Automation ServicesAutomation Services
Automation Services
 
Company Overview
Company OverviewCompany Overview
Company Overview
 

Operationalizing Real-Time Fraud Detection

  • 1. Fraud Prevention Operationalizing Real-Time Fraud Detection White Paper Integrated decisioning platform provides migration to day-one check fraud prevention Co-authored by Orbograph and The Santa Fe Group February 12, 2011
  • 2. Introduction Continuous waves of check fraud attacks have heightened the sensitivity of financial institution (FI) executives. The growth of these crimes have forced FI’s to take defensive measures to minimize losses and protect their customers. Unfortunately, FI’s are hampered by limited capital budgets and staff reductions. Because FI resources are limited, gaps persist, allowing fraudsters to penetrate older systems built on outdated methodologies. The result is unwanted fraud risk. Are we in effect perpetuating check fraud by not moving fast enough to new technologies and solutions? The ABA 2009 Deposit Account Given the now common use of images and check truncation, it Fraud Survey is surprising that so many banks still view fraud detection showed check through the lenses of traditional check or siloed processing fraud losses practices with disparate case management and decisioning exceeded $1 billion for the first time. platforms for on-us, deposit, and ACH fraud prevention. This white paper offers an offensive game plan for financial institutions to solidify their defenses, minimize losses, maximize efficiency, and build for the future with enterprise-wide prevention strategies. I. Fraud Loss Trends and the Persistence of Paper The American Bankers Association reported in its 2009 Deposit Account Fraud Survey that, in 2008, check fraud losses exceeded $1 billion for the first time. Responding financial institution fraud managers reported that the top three loss categories were: returned deposited items, also known as deposit fraud (35%); counterfeit checks (30%); and forged makers’ signatures and endorsements (22%). This was reinforced by data from the Association for Financial Professionals’ 2010 Payments Fraud and Control Survey showing the primary sources of loss among commercial bank customers were: counterfeit checks using the organization’s MICR line data (72%); alteration of payee names on checks issued by the organization (58%); and alteration of dollar amount on checks issued (35%). 1 See http://www.aba.com/Surveys+and+Statistics/2009_Deposit_htm 2 See http://www.afponline.org/pub/pdf/2010_Payments_Fraud_Survey.pdf
  • 3. In the ABA survey, more than half of respondents experienced ACH originator fraud during 2008 in frauds that typically targeted individual and small business accounts. As ACH volumes flatten and net ACH fraud dollars remain significantly less than on-us and deposit check fraud losses, it’s clear ACH volumes and losses will undoubtedly continue to grow, however it will be a long time before they approach the current and expected check and loss volumes. By comparison, it becomes obvious that investment in checks still promises good return. A 2010 customer survey by Orbograph asked financial institutions how their check fraud losses compare to the ABA median. Interestingly, 66.5% indicated that fraud losses were less than the ABA median. However, 84% out of 256 A 2010 Orbograph respondents believed an image-based fraud prevention customer survey strategy would provide moderate to strong value. showed 84% out of 256 respondents In addition to these eye-opening industry numbers, other risk believed an image- considerations for the paper-channel should be evaluated: based fraud detection strategy would  Large-scale adoption of remote deposit capture will provide moderate to allow hundreds of thousands of businesses to feed strong value. images into the check clearing system virtually unchecked.  Least cost routing options create opportunities for additional cross channel fraud when checks convert to ACH and move to Regulation E (90-day return rules). These extended windows make it more difficult to track fraud as well.  Mobile capture for depositing checks provides great convenience, yet adds risk for potential exploitation by criminals. Adoption is predicted to climb in 2011. Effective fraud managers must be able to identify, interpret and prioritize these macro trends but account for micro level statistical variances including, urban vs. rural, organized crime presence and an ever-changing economic environment. However, analysis is not enough. Continual improvements using best practices and new technologies can enable FI’s to drive prevention/detection rates significantly higher.
  • 4. II. A Tectonic Shift…In Thinking Before the enactment of the Check 21 Act in 2005, check fraud detection was a “day-two” function by necessity. There was no time to look for fraud during nightly check processing. Instead, bank check processing departments were consumed by two objectives: 1) to process all outgoing paper checks (those drawn on other banks) in time to meet the exchange deadlines each night; and 2) to process all the on-us paper checks (those accepted in-house the previous day and those received through in-clearings from other banks at night) in time to meet posting deadlines each morning. Banks could not afford to The banks’ “mission: critical” was to ensure that customer jeopardize the accounts were up to date before opening for business in the completion of morning. Each evening millions of checks were transported this intensive between hundreds of exchange points and thousands of banks paper-movement process for a to achieve the efficient nationwide clearing of checks upon handful of checks which the US economy has depended for decades. Banks that might not be could not afford to jeopardize the completion of this intensive legitimate. paper-movement process for a handful of checks that might not be legitimate; there was too much float at stake. Fraud managers finally had their opportunity when the on-us paper from the day before had been processed and posted. At that point, the race was on to locate fraudulent checks before midnight of that second day, the last clear chance for a bank to return an item to the depositing bank without being responsible for the loss. On the “returned check” side of the house, banks were again impeded by the return of the paper checks — checks they had previously accepted that were drawn on other banks. While in theory returning a check should take no more than two days, the complexity of the paper process created a lot of opportunity for checks to fall through the cracks, leaving the return of checks to wait until the third or fourth day after they had been accepted. This created an opportunity for criminals, who could
  • 5. move or acquire the cash, sticking the accepting bank with the loss. Even in 2009, this concern continued. (See appendix A) Fast forward to today. Nearly all checks are imaged early in the banking process. Many are truncated right at the branch with increasing numbers imaged and entered into the clearing process at the customer’s office through RDC. The need to move paper through the clearing process to effect payment is a thing of the past. Nearly all of that paper transfer is accomplished electronically in a fraction of the time. Regulatory changes and technology developments are redefining fraud risk mitigation strategies as well. Regulation CC changes in 2010 provided next-day check availability and although positive from many operational and customer vantage points, fraudsters can work comfortably in many markets within a two day window by withdrawing funds next day via branch or ATM. The result is an increase in deposit fraud. Why? Regulation CC swings the pendulum — and the advantage — back to the paying bank. Institutions with strong on-us check fraud technology simply return potential counterfeits, irregular signatures (forgeries) and alterations to the BoFD (Bank of First Deposit) within the required processing window. By the time the BoFD receives the return, the money is gone. The paying bank has protected itself while the BoFD takes the loss. “This change is a tectonic shift in check processing and is not Jodi Pratt only related to the speed of processing,” says Jodi Pratt of Jodi Senior Consultant with Pratt and Associates & The Santa Fe Group. The Santa Fe Group III. A Unified Approach We now have the tools, the capacity, and the capability to move check fraud prevention into the mainstream of transaction processing and integrate it into the check and payment processing function so that the two can occur simultaneously. Platforms are now available to manage return items, exceptions, and fraud suspects from the same user interface. Additionally, multiple payments can be added, linking account activity and address cross channel fraud. Couple a platform strategy with additional data elements available through check
  • 6. images, and detection may finally develop into fraud prevention. The overwhelming majority of banks have yet to seize this opportunity. The limitations that pushed fraud detection out of day-one processing no longer exist, yet banks continue to behave as if day-one detection is still out of reach. Most fraud managers still operate under the now-unnecessary constraints of a batched, day-two world. This is inefficient, certainly, and it allows criminals who’ve successfully exploited paper processing in the past to continue their work. What if banks began using today’s expedited check processing to transform check fraud detection and actually achieve the Holy Grail of day-one — and in some cases, day-zero — fraud detection? Can an FI overcome old habits and reap the full fraud-prevention benefits of imaging and new platforms? “With several simple steps, FI’s can step into the next generation: operationalizing real-time or at least “near real- time” fraud detection and prevention,” summarized Bob Jones, of RW Jones and Associates. IV. Technology and Operational Considerations Robert W. Jones Senior Consultant with The Santa Fe Group A well-rounded fraud-prevention program that uses all the available data points hasn’t always been easy to achieve. Initially, data points were generated from processing data and MICR line information feeding data analytics with basic statistical analysis. The result: lower than desired detection rates and high-false-positive rates. Today, decision data is generated by image analysis algorithms applied to imaged signatures, check stock formats, and field level characteristics. The key is a unified approach, leveraging analytics and image analysis on an integrated decisioning platform that is integrated into both the inclearings and over-the-counter (OTC) teller or branch capture environments to enhance pre-post fraud filtering.
  • 7.  Inclearings: Most checks cleared through the Federal Reserve and industry exchange networks are in image cash letters. Images arrive several times throughout the day depending on rules of each network. Running cash letters through an integrated check processing fraud detection system before posting offers an early warning of suspect items. Fraud is potentially caught earlier in the process, preventing on-us losses that previously were not discovered until it was too late to return items to cover a loss or stop subsequent intraday withdrawals. Adjusting in-clearing processes this way can transform check fraud management by making fraud prevention a mainstream function (as opposed to a post-clearing or auxiliary function). Inclearing processing offers other benefits too, including enhanced customer service by intercepting suspect items before they post to customers’ accounts and preventing legitimate items from being rejected. Payee name verification (PNV) is also a value-added feature reduce fraud. PNV can now be run Day 1 or Day 2 as an additional prevention method using customer generated payee issue files. Joe Gregory Vice President Marketing  Over-the-counter (on-us): Transaction fraud filters, Orbograph based on the limited numerical data from the MICR line can offer the initial baseline of information about account behavior: the volume of checks written, the value of those checks, their serial numbers, and their timing. This data alone, however, is inadequate to make high-quality, low-false-positive suspect decisions, keeping many banks from implementing it at the teller line. Today, images captured at the back counter of a branch, or at the teller window, can be used to improve fraud identification rates, allowing for real-time fraud detection that keeps cash from crossing the teller account on cashed checks and split deposits. “These elements, combined with an intelligent decisioning engine, can now score an individual transaction within two to three
  • 8. seconds,” stated Joe Gregory, Vice President of Marketing at Orbograph.  Transit: Deposit fraud is generated from transit items. Solutions in this area are still evolving as many FI’s are now using “black list” servicers who provide access to fraudulent account lists. Although improving, institutions are not leveraging image-based data elements for fraud prevention. Several strategies can be deployed to help this area. FI’s can now create transit account profiles for matching payable transit items against during day one processing. This approach leverages an image archive which is now underutilized and allows FI’s to put temporary holds on funds. Profiles can be created from FDIC alerts for official checks which are involved with active fraud schemes. Image analysis can also reduce risk by identifying remotely created checks (RCC) and matching payee information to active “black lists” currently “Because one FI’s effecting the FI. Lastly, analytics on deposit trends at the “on-us” losses are another’s “deposit account level are the last line of defense and are fraud” losses, FI’s improved when merged with these advanced image need to understand techniques. the benefits of reciprocity,” stated “Because one FI’s “on-us” losses are another’s “deposit Jones. fraud” loss (and vice versa), FI’s need to understand the benefits of reciprocity,” stated Jones. There is substantial value to be gained by both parties in receiving reliable return information on the same day or early the next day. By cooperating with a common exchange partner, FI’s can reduce deposit fraud by the paying bank returning a notification of doubtful collectability to the BoFD. By taking this approach, an improved fraud network could spread quickly across the country, strengthening the entire banking community. 3  Other instruments: Once banks have invested in real- time on-us check fraud detection, it’s relatively easy to extend that functionality to additional areas of fraud loss. While losses associated with savings withdrawals, 3 For evidence of this, see other successful fraud collaborations that have occurred over the last 15 years, such as the BITS Fraud Steering Committee, the American Bankers Association Statistics Committee.
  • 9. convenience checks on lines of credit, and cash advances have not been adequate to justify a special fraud detection solution, the infrastructure is in place to accept and analyze signatures on these documents. The incremental cost of including verification may now be justifiable as checks become harder for crooks to negotiate. V. Conclusion The 2010 Regulation CC changes on next-day check availability demand that banks focus on superior on-us fraud prevention. This is best accomplished when the foundation for case management is based on a common decisioning platform. This platform becomes the decision layer for a tightly integrated transaction and image-based fraud analysis engine. When “best of breed” performance feeds a common platform, the primary objectives of detection and efficiency can be achieved. Moving into the future, the decision platform incorporates additional payment channels under this umbrella and bridges the gap to day one fraud by supporting same day interbank fraud prevention.
  • 10. APPENDIX A: ABA Deposit Fraud Report - 2009 Edition Average Time to Return Check to BoFD