A Fraud Series - Part Three: Types of Fraud Identified by a Detection System

In the first post of this series, we quickly reviewed some of the many types of fraud that have occurred over the years. In this post, we will discuss these types of fraud in more depth and provide examples:

A Fraud Series - Part Three: Types of Fraud Identified by a Detection System

In the first post of this series, we quickly reviewed some of the many types of fraud that have occurred over the years. In this post, we will discuss these types of fraud in more depth and provide examples:

Fill out form to continue
All fields required.
Enter your info once to access all resources.
By submitting this form, you agree to Expero’s Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Oscar Hernandez

February 9, 2022

A Fraud Series - Part Three: Types of Fraud Identified by a Detection System

In the first post of this series, we quickly reviewed some of the many types of fraud that have occurred over the years. In this post, we will discuss these types of fraud in more depth and provide examples:

Tags:

In the first post of this series, we quickly reviewed some of the many types of fraud that have occurred over the years. In this post, we will discuss these types of fraud in more depth and provide examples:

Chargebacks:
Charges made to a financial account that were not authorized may result in a chargeback. For instance, a compromised credit card can be used to purchase goods without the card holder’s knowledge. If this transaction is successfully disputed, the money can be returned to the card holder’s account. The damage, however, has already been dealt. Oftentimes the fraudster has made off with the illegally purchased goods while the businesses are held responsible for returning the stolen money to the card holder. In some cases, chargeback fraud can be committed by the card holder themselves. In this case, the card holder purchases an item, receives the item, and then disputes the transaction with the bank to initiate a chargeback. This pattern is extremely common on the internet. 

Illegal Offshore Accounts:
Using offshore accounts is not necessarily illegal. There are many legal reasons why someone would want to move money into an offshore account. Moving money to offshore accounts in order to evade taxes or hide assets, including assets that were acquired through criminal activity, however, is illegal. When analyzing account interactions, it can be difficult to see and follow the links between various entities and the accounts connected to them. Graph analytics help fraud analysts visualize connections between potentially fraudulent entities in an intuitive way that makes it much easier to follow fraud rings in a system. 

Money Laundering:
Money laundering involves legitimizing illegally acquired funds. For example, fraudsters can set up business fronts to channel stolen money, making the money appear to have been legally sourced. One can also split large amounts of money into smaller transactions or even spread these transactions across multiple accounts to reduce suspicion. As you could imagine, with a little creativity, there are a ton of ways to clean dirty money. Fraudsters are using the latest technologies to hide their money under a layer of obscurity, performing transactions between many accounts, through legitimate sources such as restaurants or cryptocurrency, making it very difficult to trace the money back to its original source. This is partly why keeping up with fraud trends is so difficult for blacklist and rules based fraud detection systems. Systems built to adapt to these trends rather than react to them are much more valuable for capturing fraudulent or anomalous activity. Tune in next week to learn how we might surface money laundering in our Connected Toolkit.

In this post we’ve reviewed some common types of fraudulent behavior and accompanying examples. It is important to note that as time goes on, fraudsters will continue to adapt to rules and regulations that attempt to prevent them from committing fraud. While supervised detection systems can detect certain types of fraud well, oftentimes analysts don’t immediately know whether new patterns are indicative of fraud or not. This is why it is important to use an unsupervised system that can learn not only from existing patterns, but from new patterns as well. 




User Audience

Services

Project Details

Similar Resources

Software Solutions to Fight Retail Fraud

The focus of this webinar is to identify how Machine Learning, Visualizations and new technology like Graph can directly increase the accuracy and output of retail systems. We will feature unique Expero lightning talks on ML & Business Visualization technology, followed by a Q&A session.

Watch Demo

A Fraud Series - Part Eight: Quickly Detect & Prevent Fraud with Expero Connected

In this series, we’ve shown that fraud is extremely expensive and can damage a company’s reputation. Preventative measures, such as employee training and email filtering can help reduce insider threats, but still leaves threats from the outside unhindered. Easy to use fraud detection software solutions, such as the Expero Connected Toolkit, reduce the overhead required to track and predict fraud and provide a variety of tools for many user personas.

Watch Demo

A Fraud Series - Part Seven: Detect Fraud with Real-Time Alerts

Alerts are a powerful tool for real time fraud detection systems. Alerts can be used to surface things one normally wouldn’t see in real time. You can imagine using alerts to notify users of phishing attacks, fraud, or anything suspicious. Real time alerts are important for escalating and properly mitigating threats. They can even be preventative, declining fraudulent transactions (or enabling unusual, but non-fraudulent, ones) as they occur, before they escalate into full on fraud or successful attacks.

Watch Demo

Fraud Detection Solutions to Fight Cyber Crime

In this webinar we discuss how Graph and Machine Learning work together to detect, prevent, and investigate cyber fraud using capabilities that Expero has put together.

Watch Demo