Thinkstock
Partner Insights

How Data-Sharing Can Keep Fraud from Spreading

Print
Email
Reprints
Comment (1)
Twitter
LinkedIn
Facebook
Google+

If banks are serious about thwarting fraud or keeping it from spreading, then they need to do a better job of sharing information between departments and with rival banks and nonbank partners, industry practitioners say.

As it stands, a department responsible for tracking suspicious deposits and withdrawals often might not share its data with fraud analysts who are tasked with monitoring fraudulent debit and credit card purchases and other transactions. By not working more closely together, they could be missing out on an opportunity to spot fraudulent behavior or, with the help of law enforcement, bring down a criminal ring, experts say.

Similarly, if banks and third-party partners were more willing to share their stories of the fraud and security incidents they've been victim to, such as a check-kiting scheme or a denial-of-service attack, they could put the right defenses in place to keep intruders out of their databases and applications.

"Banks only have so much line of sight," says John O'Neill, a senior vice president at Bank of America. "We can only see so much of the data we have. If we use that as our only data source, we're never going to catch the large fraud rings that are stealing our customers' account information."

O'Neill believes that telecom companies and e-commerce giants like Google, Yahoo, and Amazon need to share fraud and security data with their bank partners. These companies need to recognize that they share the same customers and face the same cybercriminals, he says. "Keeping to yourselves is only creating more of an issue," he says.

Some comparing of notes on fraud and security does take place in the financial services industry. For instance, the Financial Services-Information Sharing and Analysis Center in Washington, D.C., gathers some information about fraud and security incidents from its members, anonymizes it, and sends it back out in the form of reports. The National Cyber-Forensics and Training Alliance in Pittsburgh holds meetings in which subject matter experts from different industries share threat information.

Some banks have set also up their own, private, closed-door peer networks of colleagues at different banks who know and trust each other and share information on a less-formal basis.

"As stewards of the industry, our job is to share as much information as we can through our partners," says Aaron Glover, senior analyst at SunTrust Banks in Atlanta. SunTrust, for example, has built a relationship with the Internal Revenue Service in Atlanta in which the bank sometimes calls to verify Treasury checks. The bank recently asked the IRS about one $300,000 check, which turned out to be linked to an IRS investigation, so SunTrust put the check on hold.

But despite such one-off successes, there's a strong need for protocols for information sharing about money laundering, corporate security and fraud, Glover says.

One group that is trying to tie together fraud data from many corners is NCFTA, which is building a giant database of threat information, collecting data from financial, government, and healthcare sources.

"We're sharing threat information, we're sharing information about compromised accounts, and it's enough to stop transactions," says Maria Vello, the president and CEO of the NCFTA.

The group has relationships with cohorts in Canada and the U.K. that have helped thwart the activity of international fraud rings, she says.

In one example, as Shylock malware was hitting the U.K., the U.K.'s Center for Information Sharing obtained the malware code and shared it with the NCFTA, along with the intelligence that it was targeting the U.K., Italy and the U.S. (Shylock is a family of malware that tricks customers into providing bank login or account details to hackers when they think they're interacting with their bank.) "We pushed that information out to our partners, and they were able to put up their defenses," Vello says. Bank members could adjust their malware detection software and behavioral analytics software to look for signs of Shylock-generated activity, and help their customers from falling victim to the malware.

But cooperation can be hard, largely because banks are often unwilling to share information. A few years ago, the NCFTA and the financial industry's equivalent, the FS-ISAC, tried to forge an alliance to freely share threat information. However, the FS-ISAC's bank members rejected the plan, saying they did not want their bank customers' information shared with other industries.

Bank members praise the FS-ISAC for the work it does in gathering security incident information from banks and reporting it back. The group has also begun automating its process, to send threat information that can be directly read and acted upon by banks' security systems. It will issue a new update to this system in June.

But insiders also say banks don't always send the right people to the group's meetings and calls those who truly know what is going on. "When I'm sitting on an FS-ISAC call, people are saying, 'no, we don't have any fraud,'" says one member. "Who are you and how much do you make, because I want to hire you," the member adds, sarcastically.

JOIN THE DISCUSSION

(1) Comment

SEE MORE IN

RELATED TAGS

'Dodd-Frank Is Like the TSA': Comments of the Week
American Banker readers share their views on the most pressing banking topics of the week. Comments are excerpted from reader response sections of AmericanBanker.com articles and from our social media platforms.

(Image: iStock)

Comments (1)
Good topic, but does not even begin to touch what is already going on today. US retail banks, and US Card issuers already pool their information in the industries central fraud utility: Early Warning Services. For example, try taking a picture of a check for deposit into your Chase account, then take that same check in for deposit at a teller and see what happens. The EWS service has made a tremendous dent in many types of fraud, including account compromise online.

Google, Amazon, Paypal and MNOs would be glad to share their fraud data.. but it requires the banks to reciprocate. This is what is not happening... it can not be a one way street. For this to work, there must be industry incentives to collaborate. Entities like Paypal and Amazon who do an amazing job managing fraud must have risk based pricing, same with merchants. The data sharing conundrum is caught up in the overall challenges of the payment system. For card present, it is a bank problem and banks must be willing to buy data to help them manage their problems. For CNP the reverse is true. For identities the costs usually are borne at account opening and account servicing.

I think most people would be amazed at the data sharing going on today, but we can't talk about it or the perpetrators will learn what we are doing to catch them. This is the game of fraud fighting.

Tom Noyes
Starpoint
Former global head of Citi Channels
Former head of sales and marketing 41st Parameter
Posted by noyesclt2 | Tuesday, March 25 2014 at 9:42AM ET
Add Your Comments:
Not Registered?
You must be registered to post a comment. Click here to register.
Already registered? Log in here
Please note you must now log in with your email address and password.
Already a subscriber? Log in here
Please note you must now log in with your email address and password.