counterfeit fraud detection tips, tools and techniques sean trundy, coo james smith, svp, sales...
TRANSCRIPT
![Page 1: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/1.jpg)
Counterfeit Fraud Detection
Tips, Tools and Techniques
Sean Trundy, COOJames Smith, SVP, Sales & Marketing
![Page 2: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/2.jpg)
How Peru Became the World's Counterfeit CapitalBy Lucien Chauvin / Lima
![Page 3: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/3.jpg)
Agenda• UVeritech - Introduction• Counterfeit Fraud– An Overview
– Types of Counterfeit Fraud– Losses– Counterfeiting Techniques– Sources of Counterfeit– What’s Next?
• Document Authentication Methods– Visible/Physical Document Inspection– Covert Feature Detection(UV, IR, MG)– Forensic Analysis
• Tools for Detection• Live Product Demo
![Page 4: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/4.jpg)
UVeritech Background
• Founded in 2000• Leaders in “counterfeit fraud prevention”
solutions• Pioneered POS counterfeit detection
scanners in enterprise accounts• Multiple layers of Fraud Prevention
– UV, Automated Currency Detection, Image Capture, Verification and Authentication
![Page 5: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/5.jpg)
A Leader in Fraud Prevention Solutions
• 14 of top 20 US banks use our products
over 14,000 units over 20,000 units over 28,000 units
• Over 1000 Credit Unions installed• Over 500,000 units sold• Marquis customers in all verticals
![Page 6: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/6.jpg)
![Page 7: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/7.jpg)
Counterfeit Fraud Overview
Counterfeit fraud is the act of intentionally presenting a forged item in order to gain a benefit.
While often associated primarily with currency (e.g. counterfeit money), in fact, counterfeit fraud can include an amazingly far-reaching range of items, including:•Negotiable instruments (cash, checks, cashiers checks, postal money orders, traveler checks, gift certificates)•Identification Documents or “breeder” documents to create a false identity (e.g. birth certificate, driver license, passport)•Title documents showing ownership (vehicle, real estate)•Certificates of Authenticity for collectibles and rare articles•Coupons, “promotional dollars”, or other store currency•Credit cards, gift cards, P-Cards, stored value cards
![Page 8: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/8.jpg)
Currency Counterfeiting
2009 Saw 77% Increase over 2008Secret Service made 2,506 domestic arrests and assisted in 360 foreign arrests for counterfeiting offenses, and helped to remove more than $182 million in counterfeit U.S. currency from circulation, up $79 million from FY2008.
![Page 9: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/9.jpg)
Currency Counterfeiting
Counterfeiting on the upswing
![Page 10: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/10.jpg)
Currency Counterfeiting• Factors Contributing to Increased Counterfeit Currency
– Digital Tools• Office Copier Technology/Digital Graphics Programs• Printer/Toner Technology • Criminal “Social Networks” propagating files and know-how
– Organized Crime Participation• “Mass Production” factories utilizing washed notes
– Improved quality, quality control programs, incremental improvements over iterative generation
– Foreign Government Collusion• North Korea, Iran, Bulgaria, Columbia and China produce “Supernotes”
– Access to Intaglio printers and heavy offset presses
![Page 11: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/11.jpg)
Currency CounterfeitingTypes of Counterfeit Notes
• Washed Notes - “Bleaching” Genuine Banknotes• Produces Genuine US Banknote Stock upon which to print higher-denomination
counterfeit note• Washed Notes pass the pen-test, and most common visual inspection techniques• “Feels” like real money – because it is!
• SuperNotes – Produced on Same Equipment used by BEP• Heavy Offset Presses, similar paper, similar inks, ability to reproduce many of the physical
characteristics of genuine banknotes
• Digital Notes - The Most Common Form of Counterfeit• Copier/PhotoShop productions – can typically be identified by lack of intaglio printing,
lack of “covert” security features, and incorrect paper
• Altered Notes– Bank notes altered to appear as higher denomination, e.g. “raised” notes
![Page 12: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/12.jpg)
Currency CounterfeitingWashed Notes
![Page 13: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/13.jpg)
Currency CounterfeitingAltered Notes; Digital Notes
Copy
Genuine
![Page 14: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/14.jpg)
Counterfeit Negotiable Instruments• Negotiable Instrument Types
– Money Orders, Postal Money Orders, Cashiers Checks
– Traveler Checks
– State and Federal Treasury Checks – e.g. Tax Returns, Social Security, Unemployment, etc
![Page 15: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/15.jpg)
Traveler Checks - Features
![Page 16: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/16.jpg)
Traveler Checks - Features
![Page 17: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/17.jpg)
Postal Money Order- Features
![Page 18: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/18.jpg)
Counterfeit Identity Documents Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.
•The FTC estimates that as many as 9
million Americans have their identities
stolen each year.
![Page 19: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/19.jpg)
Identity theft by category
![Page 20: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/20.jpg)
Counterfeit Identity Documents Common Techniques For Stealing ID Information•Dumpster Diving. They rummage through trash looking for bills or other paper with your personal information on it.
•Skimming. They steal credit/debit card numbers by using a special storage device when processing your card.
•Phishing. They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information.
•Changing Your Address. They divert your billing statements to another location by completing a change of address form.
•Old-Fashioned Stealing. They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information.
•Pretexting. They use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources.
![Page 21: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/21.jpg)
Cont’d Common ID Theft Techniques•Hacking computer networks, systems and databases
•Exploiting breaches that result in the publication of personal information such as names, Social Security number or credit card
•Advertising bogus job offers in order to accumulate resumes typically disclosing applicants' names, home and email addresses, telephone numbers and sometimes their banking details
•Exploiting privileged IT users to access personal data on their employers' systems
•Infiltrating organizations that store valuable personal information
•Brute-force attacking weak passwords; compromising weak password reset questions
•Obtaining castings of fingers to falsify fingerprint identification
•Browsing social networking websites for personal details published by users
Counterfeit Identity Documents
![Page 22: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/22.jpg)
Coupons; Store Currency
![Page 23: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/23.jpg)
Types of Counterfeit FraudCredit Cards, Gift Cards
• Fake Cards– Card “Skimming”
– Breached data theft
• Stolen Cards– Card not present Transaction
– Presented with Fake ID
![Page 24: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/24.jpg)
The Cost of Fraud
For every $100 of fraud, total losses equal $310Lexis–Nexis 2010 True Cost of Fraud Study
In addition to the transactional (dollar) losses, organizations also incur:
Associated expensesAudits, legal, investigative, report preparation (SAR’s, CTR’s), employee interviews
Loss recovery – e.g. pursuit of lost fundsFees and interest
![Page 25: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/25.jpg)
Counterfeit Fraud Losses• $200 million in counterfeit currency in the U.S.
(2009 US Treasury) $109M confiscated by Secret Service in 2008
• $12.2 billion in losses due to check fraud(2006 American Bankers Association)
• $500 million per year in credit card fraud• $31 billion in US existing account fraud
(2009 Javelin Strategy and Research)
• $221 billion worldwide per year due to identity theft (Aberdeen Group)
![Page 26: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/26.jpg)
Counterfeit FraudTechniques
Amateur•Alteration•Digital•Chemical Wash
Professional•Engraved/Off-set•“Breeder” Document Replication
![Page 27: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/27.jpg)
Who is Counterfeiting?
• Foreign Governments
• Foreign Organized Crime
• Domestic Organized Crime
• Domestic “small time” operators
• Domestic – “Opportunity Forgers”
![Page 28: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/28.jpg)
Document AuthenticationCommon Methods
• Document Authentication Methods– Visible/Physical Document Inspection
• “Test” the paper by feel• Look at colors and “visible” security features
– Color shifting, Holographic, thermal sensitive
– Covert Feature Detection• Ultra-Violet• Infra Red• Magnetic
– Forensic Analysis• Pattern Matching• Content Matching
![Page 29: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/29.jpg)
Document AuthenticationPhysical Inspection
• Color-Shifting Ink
• Holographic Images
• Thermal Ink
![Page 30: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/30.jpg)
Document AuthenticationPhysical Inspection
Intaglio Printing
![Page 31: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/31.jpg)
Document AuthenticationVisible Inspection
• Watermarks
Artificial
Genuine
![Page 32: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/32.jpg)
Document AuthenticationCovert Feature Inspection
“Covert” features, by definition, are hidden features that cannot be read without technological assistance•Ultra-Violet
– Fluorescent “glowing” features
•Infra-Red– Special ink only reflects infra-red light
•Magnetic (MICR)– Machine readable characters printed with magnetic
ink
![Page 33: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/33.jpg)
Ultra-Violet security features are popular and used quite commonly because:
– The fluorescence is visible to the naked eye
– The printing techniques are understood and easy to control
– Features can be easily varied, and are able to be made into interesting, compelling designs (which can be easily remembered)
Verifying UV Features
![Page 34: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/34.jpg)
Traveller Check UV Features
![Page 35: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/35.jpg)
Money Order UV Features
![Page 36: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/36.jpg)
ID Document UV Features
![Page 37: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/37.jpg)
Currency UV Features
![Page 38: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/38.jpg)
Infra-Red ink features appear as monochromatic and require an IR viewing filter for human eye to see.
Infra-Red features are popular for government controlled documents (ID’s, currency, etc.) because:
–Machine Readable Characters are easy to be read
–Optical Character Recognition (OCR) software can see IR printed letters and numbers better than visible light
–Casual counterfeiting operations are incapable of reproducing IR printed features and/or are unaware of them
Verifying IR Features
![Page 39: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/39.jpg)
Currency IR Features
![Page 40: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/40.jpg)
ID Document IR Features
![Page 41: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/41.jpg)
Forensic Examination
• Pattern Matching• MCR/MRZ (Machine Readable Character
Recognition/ Machine Readable Zones)• Data Match/ Data Compare
– OCR– Bar-Code– RFID– DigiMark
![Page 42: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/42.jpg)
Document AuthenticationPattern Matching
![Page 43: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/43.jpg)
Data Compare
Intelligent data-
base recognizes
document and
looks for visible
and stored data in
expected locations
![Page 44: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/44.jpg)
Tools for Counterfeit Document Detection
![Page 45: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/45.jpg)
Aids for Physical Document Review
• Magnifying Glass/Jeweler’s Loupe– Enables verification of micro-printing
Requires very detailed knowledge of document
design and layout. Slow process; potentially offensive to customers
• Starch-pen/ink testing pens– Tests validity of paper and/or the ink used in printing
process
Forgers now use paper that can pass the litmus test, higher-end laser printers can stump the ink-tester pen
![Page 46: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/46.jpg)
Ultra-Violet Devices
![Page 47: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/47.jpg)
Infra-Red Devices
![Page 48: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/48.jpg)
MRC Character Reader Devices
![Page 49: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/49.jpg)
Forensic/Advanced Analytical Devices
Infrared Pattern
Seal/tamper check
UV check
Visible Pattern
![Page 50: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/50.jpg)
Layered Fraud Prevention
• POS Ultra-Violet Devices-POS and Perimeter Protection– Verify Currency, Driver Licenses, Credit Cards, Traveler Checks,
Money Orders, Passports, etc.
• Advanced currency and ID scanners– Detects counterfeit “Super Bills”– Mag-strip, optical character and bar-code readers– Age verification for restricted products– High Speed Money Counting Machines
• ID Validation and image capture authentication
![Page 51: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/51.jpg)
Layers of Fraud Prevention
Image capture Authentication
Back-office currencycounting and fraud detection
CurrencySuper $50/$100 InternationalManagers
Below counter wall mounted
Currency, ID,Credit Cards
Front
Rear
Front
Rear
Currency, ID, Credit Cards
![Page 52: Counterfeit Fraud Detection Tips, Tools and Techniques Sean Trundy, COO James Smith, SVP, Sales & Marketing](https://reader035.vdocument.in/reader035/viewer/2022062517/56649e7e5503460f94b81309/html5/thumbnails/52.jpg)
Summary• Prevent fraudulent transactions• Regulatory Compliance adherence• Avoid monetary and disciplinary penalties• Secure encrypted image of DL for future archive
retrieval and storage• Reduce FTC-privacy exposure while enhancing
any pending litigation• Reduce exposure to privacy violation from
internal employees