twitter

Financial Payments

Credit card fraud costs merchants— and consumers—over $190 billion/yr.


Fraud prevention in our entire payments system – credit and debit cards – is based on a culture of detection, not prevention. As a result, identity theft costs Americans over $37 billion a year, and merchants in the US alone lose approximately $190 billion per year to credit card fraud. And yet this only accounts for the fraud we can identify. Something is clearly wrong with a system that allows theft to happen and expects American consumers to pay the costs of reimbursing merchants and credit card companies through higher prices. What are we doing wrong?

We’re using antiquated technologies. Credit and debit cards use magnetic strips – a seventy year-old technology – to hold sensitive financial information such as customer name, card number, and expiration dates. All this info can be easily copied and spoofed innumerable times to create hundreds of fake credit cards, or sold online for as little as $1 for each credit card identity. Financial services companies “prevent fraud” by using back-end analytics to catch the crime after the fact, instead of authenticating the card and the card holder are legitimate prior to making any transaction.

Chip-and-PIN users are protected globally from ID theft and fraud.


But why is it a uniquely American problem? Almost every other country and region in the world authenticates the card and the holder as being real prior to the transaction by using Chip-and-PIN credit and debit cards, based on the internationally recognized EMV standard. This upgrade for the rest of the world has resulted in a big problem for American consumers: international credit and debit card fraud has migrated to the United States due to our lax authentication protocols for payment cards. Here’s an example of the differences:


Mag-Stripe Credit Cards

Joe eats at a restaurant in Florida and hands his mag-stripe credit card to the waiter, who disappears into a back room with it to not only run it through the machine,  but to copy the numbers down for his own nefarious use later. Joe then makes an online purchase with the same credit card, but the online merchant’s site gets hacked and they lose not only Joe’s credit card data, but that of hundreds of other people – all to be sold online on the black market. On the way to the police station to file a report, Joe is pickpocketed. The criminal then uses Joe’s credit card to purchase a $50 mag-stripe reader to make an additional 200 copies of Joe’s credit card to sell to his cohorts. While Federal law protects Joe against loss, it doesn’t protect the merchants who’ve been cheated, who then pass the costs of the fraud back on to consumers.


Chip-and-PIN Credit Cards

Joe eats at a restaurant in Rome and asks to pay the bill. The waiter presents him with a card-reader tableside, into which he inserts his card. The card’s onboard chip authenticates that the reader is legitimate, and the reader validates that the card is legitimate. (This step did not happen in Florida). Once it is confirmed that both the reader and the card are legitimate, Joe is required to enter his secret PIN, which authenticates that Joe is who he says he is. A thief that obtained Joe’s credit card number couldn’t create a fake card because he wouldn’t be able to counterfeit the card’s authenticating chip; likewise a pickpocket wouldn’t be able to use it because he wouldn’t have the secret PIN. Online fraud would be deterred by sites that require the card be inserted into a card-reader prior to its use. Joe is safe, the merchants suffer no fraud losses, and the savings are passed on to consumers through lower prices.


The future’s looking brighter...we’ll just have to wait until 2015.


U.S. card issuers are now slowly migrating to the EMV Chip-and-PIN cards, and beginning October 2015, credit card companies will shift the liability for fraud to merchants if they do not comply with the EMV standard. This will encourage many merchants to move to the more secure standard, bringing a windfall of benefits to American consumers, including improved international interoperability and a sizable reduction in fraud.

Click here to download the PDF version.

Learn How

Secure ID News to Know

  • Privacy and Security Standards are Crucial to the Success of the Internet of Things

    Today it seems like you can't browse a tech website or listen to a corporate CEO speak without hearing about the Internet of Things. And for good reason. As many commentators argue, the Internet of Things (IoT) has the potential to dramatically reshape our daily lives, bringing convenience and efficiency that otherwise would have been limited to the realm of science fiction. 

    However like all major innovations, the Internet of Things carries risks – particularly when it comes to privacy and security – and in recent weeks, several articles and organizations have highlighted the need for universally-recognized standards. We believe that it is absolutely crucial for all IoT-related standards to incorporate privacy and information security provisions to protect consumers.

    Read more...
     
  • SIDC Announces its Sponsorship of the 2015 connect:ID Conference

    The Secure ID Coalition (SIDC) is thrilled to announce its participation in the 2015 connect:ID conference in Washington, D.C. on March 24-25. The SIDC is affirming its commitment to secure, privacy-enhancing technology solutions through its participation in the event as a Premier Partner.

    Read more...
     
  • Health Data Breaches: Does the Federal Government Already Have the Authority to Begin Fixing the Problem?

    Wednesday evening, Anthem, the second largest health insurance company in the United States, revealed that it had suffered a massive data breach. Anthem covers one in nine Americans and, as The Washington Post reports, this may amount to the largest data breach yet at a major insurance company. The problem with cybersecurity at many large organizations is that it doesn't easily factor into the cost-benefit risk analysis that executives use when making decisions to allocate time and money. And that's a problem.

    Read more...