CS

Feds Bust $200 Million Credit-Card Fraud Ring

By D.J. Murphy, Editor-in-Chief

DJ MurphyEighteen people based in New York and New Jersey were charged in federal court Monday alleging they stole at least $200 million in what could be the largest credit-card fraud ring in U.S. history. The complaint brought by U.S. Attorney Paul J. Fishman, alleges an extensive, complicated scheme in which tens of thousands of credit cards were obtained using more than 7,000 false identities.

The perpetrators are alleged then to have enhanced the credit scores of the bogus identities by providing fabricated information to credit bureaus, enabling the identities to qualify for large loans and lines of credit they turned into cash and never repaid.

Complicating the scheme, said Fishman, the accused fraudsters created “dozens” of sham companies that applied for, and received, credit-card acceptance services including merchant accounts and credit-card terminals. They then ran the fraudulent cards through the terminals pouring money from the fake purchases into the merchant accounts, which they raided. When processors caught on to the fraudulent activity and shut the accounts down, the defendants simply created new companies and moved on to new merchant services providers.

The alleged criminals also leveraged several existing businesses that were complicit in the scheme, according to the U.S. Attorney’s Office in Newark, N.J. Several jewelry stores in Jersey City, N.J. allowed the defendants to use the fake credit cards to run fake transactions on their equipment. Law enforcement officials said these businesses operated multiple merchant accounts simultaneously, enabling more fraudulent transactions to be processed before all the accounts were shut down.

Scope ‘Astonishing’

Establishing identities of this nature and “nurturing” them to the point where they could be leveraged to secure loans and lines of credit, is an uncommon form of identity fraud to begin with, according to Dr. Stephen Coggeshall, CTO of risk management solutions provider ID Analytics and a director of the Council for Identity Protection. Doing so on a scale the defendants allegedly did is “astonishing,” he said.

Identity theft (appropriating the real identity of an existing person) and identity manipulation (changing your own identity to perpetrate fraud) are fairly common, Coggeshall said. But creating what he calls “synthetic identities” (fictitious identities that don’t exist but are plausible due to a real social security number and address) is a much more sophisticated crime. It requires applying for credit cards, and probably getting rejected, a few times.

“If they persist, they may get one through on an institution that doesn’t do the extensive checks that some of the larger banks might do, and be able to establish an identity” Coggeshall explained. “But, I’ve never seen an organized fraud on that scale, creating and establishing that many thousands of these synthetic identities and nurturing them carefully. They had to keep track of who’s who, what credentials they were using, what they had applied for and what credit they had gotten in order to establish and nurture these identities to get them up to good credit ratings so they could steal a reasonable amount of money using those identities. The level of care and effort and precision these thieves achieved is astonishing.”

Coggeshall also said catching fraudsters that successfully establish synthetic identities is much more difficult than nabbing those using stolen or manipulated identities. But, he said the fact that the defendants in this case created more than 7,000 identities but used only 1,800 addresses is likely one of the factors that led law enforcement to the perpetrators as commonalities like the same address on multiple cards is a red flag that most antifraud systems catch.

Underwriting Failure?

Creating the identity for a business that doesn’t exist is, if not easy, Coggeshall said, straightforward. Getting a merchant account, however, shouldn’t be. How the “dozens” of fictitious businesses involved in this scam were able to slip through the risk management cracks of processors, acquirers, ISOs and other merchant services providers speaks to overworked underwriters and the natural tension that exists in these companies between diligent risk management and the pressure to onboard merchants, according to Matthew Parker, executive advisor at ContractPal, a New York City software provider that automates part of the underwriting process for merchant services companies.

“Merchant processors have to strike the balance between being too strict and blocking potentially good customers and not being strict enough and letting fraud happen,” Parker said.

Good due diligence takes time and effort in a manual underwriting environment, Parker noted. Some of the things an underwriter might need to do when evaluating a potential merchant client include matching addresses to actual locations, seeing if a company has readily apparent privacy or delivery policies and terms of service, a Better Business Bureau record, complaints on file, a working Website, etc.

“All this takes a lot of time,” he said. “And, frankly, most underwriting departments are swamped. They’re underfunded. The marketing departments have these big pushes and all of a sudden you have tons of applicants signing up and the bottleneck is the underwriting department at a merchant processor.”

The merchant processor thinks, ‘we spent the money on the marketing, we have to book the business.’ And the pressure to cut corners in the underwriting process mounts, he said, resulting in a situation where entirely fabricated businesses receive merchant accounts and the ability to accept credit-card payments.

Losses May Grow

Law enforcement agents from the FBI’s Cyber Division and the U.S. Secret Service, postal inspectors, representatives of the U.S. Social Security Administration and various financial institutions and merchant services providers were involved in the 18-month investigation. According to U.S. Attorney Fishman, the massive scope of the conspiracy, which began in 2007, may result in the final loss figures eclipsing the $200 million confirmed losses.

Each defendant was charged with one count of bank fraud, which could result in a maximum penalty of 30 years in prison and a $1 million fine.



Advertisement


  • Payvision Expands into Canada - April 14, 2014
    Payvision Expands into CanadaDutch PSP Payvision is enabling cross-border e-commerce for its clients in a growing number of countries. The most recent region into which the Amsterdam-based company has expanded its operations is Canada.
  • Heartbleed Fallout Continues - April 14, 2014
    Heartbleed Fallout ContinuesSince last week, e-commerce, payments and security companies have been reacting to the news of the security vulnerability—dubbed the Heartbleed Bug—uncovered in the OpenSSL encryption standard.
  • Forte Unveils Online Payment Platform - April 10, 2014
    Forte Unveils Online Payment Platform Forte Payment Systems, a provider of online and mobile payment technology, yesterday unveiled an online payment platform that enables e-commerce merchants to accept eCheck payments in addition to traditional card payments.
  • APC Adds minFraud to Product Hub - April 3, 2014
    APC Adds minFraud to Product HubAlpha Payments Cloud this week added minFraud from MaxMind to its APC Product Hub. minFraud is an antifraud software product that offers fraud risk scoring based on IP address, email and device reputation.
  • Colo. ISO Files for IPO - March 31, 2014
    Colo. ISO Files for IPOOn Friday, Mercury Payment Systems announced it has filed registration papers with the Securities and Exchange Commission proposing an initial public offering that could net the company $100 million.
  • Klarna Closes on SOFORT Deal - March 13, 2014
    Klarna Closes on SOFORT DealSwedish online payment provider Klarna said its acquisition of German competitor SOFORT, which was first announced in December, has cleared all regulatory hurdles and is now complete.
  • Congressional Hearings on Breaches Continue - March 10, 2014
    Congressional Hearings on Breaches ContinueCongressional hearings in the wake of the massive security breaches uncovered last December (and the ones still emerging) continued on Thursday as the House Subcommittees on Oversight and Research and Technology had their say on the matter.
  • Sears: No Indication of Breach - Mar. 3, 2014
    Sears: No Indication of BreachChicago-based Sears issued a statement on Friday that said while an internal investigation of its security systems is in progress, “we have found no information based on our review of our systems to date indicating a breach.”

Advertisement

 


    CNP Expo

 

Sign Up Today Free

Receive the twice weekly CNP Report and monthly feature articles providing in-depth examinations of global CNP issues.

Please take a moment and register.
* First Name:

* Last Name:

* Password:

* Confirm Pwd:

* Email:

* Category:

Company:

 
Captcha
Answer:

 

 

CNP Archive

Researching companies or people in the CNP industry? Search our past coverage for targeted news and information.

Search here