company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
6. Insights Report Brochure
2013 IDENTITY FRAUD REPORT:
Data Breaches Becoming a Treasure Trove for Fraudsters
Table of Contents
OVERVIEW ....................................................................................................................................................................................
6
INTRODUCTION ............................................................................................................................................................................
.
7
Execu ve Summary ........................................................................................................................................................
7
Major Findings .................................................................................................................................................
.
7
Recommenda ons ....................................................................................................................................................... 1
.
1
Consumer Recommenda ons for Preven on, Detec on and Resolu on™ of Iden ty Fraud ...................... 1
.
1
Recommenda ons for Financial Ins tu ons.................................................................................................. 3
1
Recommenda ons for Merchants ................................................................................................................. 5
1
QUICK REFERENCE GUIDE ........................................................................................................................................................... 7
1
FRAUD TYPES .............................................................................................................................................................................. 1
2
New Account Fraud ...................................................................................................................................................... 1
2
Compromising Iden
es ................................................................................................................................ 2
2
Fraudsters Prefer New Card Accounts ........................................................................................................... 3
2
Exis ng Account Fraud ................................................................................................................................................. 4
2
Exis ng Card Fraud ....................................................................................................................................................... 5
2
Payment Card Data Targeted Through Mul ple Vectors ............................................................................... 6
2
Addressing Fraud A empts ............................................................................................................................ 8
2
The Effect of EMV ........................................................................................................................................... 8
2
Exis ng Non‐Card Fraud ............................................................................................................................................... 0
3
Account Takeover ......................................................................................................................................................... 2
3
Accessing Exis ng Accounts ........................................................................................................................... 3
3
Accounts Targeted and the Effect on Consumers .......................................................................................... 5
3
Familiar Fraud ............................................................................................................................................................... 7
3
Despite Changes in Fraud Trends, Familiar Fraud Pa erns Remain Constant ............................................... 7
3
Mo va on and Opportunity .......................................................................................................................... 8
3
One‐Stop Shopping: Access to PII and the Severity of Familiar Fraud ........................................................... 9
3
PREVENTION ............................................................................................................................................................................... 2
4
Data Breaches: Precursors to Fraud ............................................................................................................................. 2
4
Online Retail Fraud ....................................................................................................................................................... 4
4
Mobile Consumers Are Vulnerable Targets .................................................................................................................. 7
4
Social Media ................................................................................................................................................................. 0
5
Risky Prac ces on Social Networking ............................................................................................................. 0
5
DETECTION ................................................................................................................................................................................. 2
.
5
Methods of Detec on .................................................................................................................................................. 2
5
Means of Detec on by Fraud Type ................................................................................................................ 2
5
6
T +1 925 225 9100 · F +1 925 225 9101 · 4301 Hacienda Dr. · Pleasanton, CA 94588 USA · inquiry@javelinstrategy.com · www.javelinstrategy.com
7. Insights Report Brochure
2013 IDENTITY FRAUD REPORT:
Data Breaches Becoming a Treasure Trove for Fraudsters
Table of Contents
Means of Detec on Among Exis ng Debit and Credit Card Fraud Vic ms ................................................... 4
.
5
Effect of Common Fraud Detec on Types on FI Fraud Vic m Reten on ...................................................... 5
5
Length of Fraudulent Ac vity Before Detec on by Detec on Methods ....................................................... 6
.
5
Detec ng Familiar Fraud: Perpetrators Represent Camouflaged Threat ..................................................................... 6
5
RESOLUTION ............................................................................................................................................................................... 8
5
Fraud Resolu on Rates Reach All‐Time High................................................................................................................ 8
5
Resolu on by Fraud Type ............................................................................................................................................. 9
5
Exis ng Card Fraud Resolu on Is Quicker Because the Process Is Streamlined ............................................ 0
6
Exis ng Non‐Card Fraud Resolu on ............................................................................................................... 1
6
New Account Fraud Resolu on ...................................................................................................................... 2
6
Account Takeover Fraud Resolu on .............................................................................................................. 3
6
Severity of Fraud and Resolu on Ac ons .................................................................................................................... 4
.
6
Lower‐Income Consumers Are More Severely Affected by Fraud ................................................................. 4
6
Low‐Income Consumers Know the Perpetrators and Take Legal Ac on ....................................................... 6
6
Fraud Severity and Responses to Fraud ......................................................................................................... 8
6
Demographic Determinants of Resolu on Ac on ........................................................................................................ 9
6
Consumer Responses to Fraud Depend on Age ............................................................................................. 9
6
APPENDIX .................................................................................................................................................................................... 2
7
METHODOLOGY .......................................................................................................................................................................... 4
7
2012 Survey Data Collec on ........................................................................................................................................ 4
.
7
Longitudinal Trending ................................................................................................................................................... 4
7
Categorizing Fraud by FTC methodology ...................................................................................................................... 5
7
Devia on From FTC and 2003 Methodology and Repor ng ........................................................................................ 5
7
Survey Ques onnaire ................................................................................................................................................... 6
7
Margin of Error ............................................................................................................................................................. 6
7
Contribu ng Organiza ons .......................................................................................................................................... 6
7
GLOSSARY ................................................................................................................................................................................... 7
7
RELATED RESEARCH .................................................................................................................................................................... 0
8
COMPANIES MENTIONED .......................................................................................................................................................... 82
7
T +1 925 225 9100 · F +1 925 225 9101 · 4301 Hacienda Dr. · Pleasanton, CA 94588 USA · inquiry@javelinstrategy.com · www.javelinstrategy.com
8. Insights Report Brochure
2013 IDENTITY FRAUD REPORT:
Data Breaches Becoming a Treasure Trove for Fraudsters
Table of Figures
Figure 1: Overall Iden ty Fraud Incidence Rate and Total Fraud Amount by Year ....................................................................... 7
Figure 2: Breakdown of Iden ty Crime Types ............................................................................................................................. 17
Figure 3: Overall Measures of the Impact of Iden ty Fraud, 2004–2012.................................................................................... 18
Figure 4: Iden ty Fraud Overview: Exis ng Account Fraud ........................................................................................................ 18
.
Figure 5: Iden ty Fraud Overview: Exis ng Card Fraud .............................................................................................................. 19
Figure 6: Iden ty Fraud Overview: Exis ng Non‐Card Fraud ...................................................................................................... 19
Figure 7: Iden ty Fraud Overview: New Account Fraud ............................................................................................................. 20
Figure 8: Iden ty Fraud Overview: Account Takeover Fraud ...................................................................................................... 20
Figure 9: New Account Fraud Incidence and Total Fraud Amount by Year ................................................................................. 21
Figure 10: Types of New Fraudulent Accounts Opened .............................................................................................................. 23
Figure 11: Exis ng Account Fraud Incidence and Total Fraud Amount by Year .......................................................................... 24
Figure 12: Exis ng Card Fraud Incidence and Total Fraud Amount by Year ................................................................................ 25
Figure 13: Type of Exis ng Card Misused by Age ........................................................................................................................ 26
Figure 14: Type of Personal Informa on Compromised in a Data Breach .................................................................................. 27
Figure 15: Road Map for EMV Migra on And Shi ing Liability ................................................................................................... 29
Figure 16: Exis ng Non‐Card Fraud Incidence and Total Fraud Amount by Year ........................................................................ 30
Figure 17: Consumer Out‐of‐Pocket Costs As a Percent of Fraud Losses .................................................................................... 31
Figure 18: Account Takeover Fraud Incidence and Total Fraud Amount by Year ....................................................................... 32
Figure 19: Informa on Changed on Accounts Taken Over .......................................................................................................... 33
Figure 20: Recent Use of Security So ware ................................................................................................................................ 34
Figure 21: Types of Accounts Taken Over ................................................................................................................................... 35
Figure 22: Type of Card Account Misused Among Account Takeover Vic ms and All Fraud Vic ms ......................................... 36
Figure 23: Key Fraud Metrics among Familiar Fraud and Non Familiar Fraud Vic ms ............................................................... 37
.
Figure 24: Personal Acquaintance With the Perpetrator by Annual Household Income ............................................................ 38
Figure 25: Severity of Effec ve Fraud by Familiar Fraud Vic ms, All Fraud Vic ms.................................................................... 39
Figure 26: Type of PII Compromised Among Familiar Fraud Vic ms, All Fraud Vic ms ............................................................. 40
.
Figure 27: Fraud Incidence by Data Breach Vic ms, Non‐Data‐Breach Vic ms and All Fraud Vic ms ....................................... 42
Figure 28: Incidence of Fraud Types by Type of Informa on Breached ...................................................................................... 43
Figure 29: Means of Misuse of Fraud Vic ms’ Informa on 2010–2012 ..................................................................................... 44
.
Figure 30: Online Retail Fraud Incidence vs. POS Fraud Incidence 2005–2012 .......................................................................... 45
Figure 31: Type of Exis ng Card Misused for Fraudulent Online vs. In‐Person Purchases ......................................................... 46
.
Figure 32: Mobile Consumers’ Percep ons of the Riskiness of Behaviors .................................................................................. 47
Figure 33: How Recently Mobile Consumers Have Downloaded Apps to their Mobile Device .................................................. 48
Figure 34: Fraud Incidence by Ownership of Tech Products ....................................................................................................... 49
Figure 35: Incidence Rate by Social Networking Ac vity, 2012 ................................................................................................... 51
8
T +1 925 225 9100 · F +1 925 225 9101 · 4301 Hacienda Dr. · Pleasanton, CA 94588 USA · inquiry@javelinstrategy.com · www.javelinstrategy.com
9. Insights Report Brochure
2013 IDENTITY FRAUD REPORT:
Data Breaches Becoming a Treasure Trove for Fraudsters
Table of Figures
Figure 36: Means of Fraud Detec on by Fraud Type .................................................................................................................. 52
Figure 37: Means of Fraud Detec on by Credit and Debit Card Vic ms ..................................................................................... 53
Figure 38: Fraud Vic ms Who Switched Their FI or Credit Card Provider by Detec on Method................................................ 54
Figure 39: Mean Detec on Time by Fraud Detec on Method.................................................................................................... 55
Figure 40: Detec on Times for All Fraud Vic ms vs. Familiar Fraud Vic ms .............................................................................. 56
Figure 41: Means of Discovery of Fraud by All Fraud Vic ms vs. Familiar Fraud Vic ms ........................................................... 57
Figure 42: Percent of Fraud Vic ms Who Have Completely Resolved Their Fraud ..................................................................... 58
Figure 43: Percent of Vic ms Who Have Resolved Their Fraud by Fraud Type, 2011 and 2012 ................................................. 59
Figure 44: Number of Organiza ons Contacted for Assistance by Fraud Type ........................................................................... 60
Figure 45: Resolu on Time by Fraud Type .................................................................................................................................. 61
Figure 46: Organiza ons Contacted by Fraud Type .................................................................................................................... 62
.
Figure 47: Severity of Effect of Fraud by Fraud Type .................................................................................................................. 63
.
Figure 48: Fraud Amounts and Consumer Costs As a Percent of Annual Household Income ..................................................... 64
Figure 49: Severity of Effect of Fraud by Annual Household Income .......................................................................................... 65
Figure 50: Agencies Contacted by Familiar Fraud Vic ms and All Fraud Vic ms ........................................................................ 66
Figure 51: Legal Ac ons Taken by Familiar Fraud Vic ms and All Fraud Vic ms ........................................................................ 67
Figure 52: Responses to Fraud by Fraud Amount and Resolu on Hours .................................................................................... 68
Figure 53: Organiza ons Contacted by Severity of Fraud ........................................................................................................... 69
Figure 54: Fraud Vic ms’ Responses to Fraud by Age ................................................................................................................. 70
Figure 55: Vic ms’ Ac ons as a Result of Fraud by Year ............................................................................................................. 72
Figure 56: Types of Merchants Fraud Vic ms Avoid ................................................................................................................... 73
9
T +1 925 225 9100 · F +1 925 225 9101 · 4301 Hacienda Dr. · Pleasanton, CA 94588 USA · inquiry@javelinstrategy.com · www.javelinstrategy.com