First Published on 11th November, 2016
Ai Editorial: Be it for identifying areas of vulnerability, acting on identified risk or acting swiftly when attack happens, gearing up for website security is of paramount importance, writes Ai’s Ritesh Gupta
Why do websites get hacked and what to do when it happens?
Being ready for the same is an ongoing exercise, and it needs to be an integral part of any crisis management plan today.
Travel brands have been at the receiving end, so it’s important to keep a tab on areas of vulnerability. Specialists label forms, login pages and dynamic content are soft targets.
One needs to assess the modus operandi behind web application attacks.
They can happen over free open-source software and commercial or custom-built applications.
Areas of vulnerability
Today it’s mandatory for every organization to comprehend aspects of an application’s information security.
Airlines need to gear up for penetration tests. This evaluates the effectiveness of information security controls implemented in the real-world. Advantage of penetration testing: Knowing a system’s vulnerability before an invader gets to know it.
Access is considered to be a critical aspect when one talks of hacking.
One needs to have a detailed look at how does one log into hosting panel, server, website, a device etc. A detailed study of how a fraudster/ attacker tends to evade a web application’s authentication and authorization process and ends up gaining access to content of an entire database is must.
Injection errors emanate from a failure to sort out untrusted input. Other than SQL injection, other common mistakes are sensitive data not being encrypted at all times and Cross-site Scripting (XSS) attack (a web application makes use of unvalidated or unencoded user input within the output it generates). An XSS vulnerability results when malicious script that one inserts eventually get parsed in the victim’s browser. Today there are automated web vulnerability scans that are available for guarding one against XSS attacks. The pace with which new code gets deployed today, it is imperative to automate security of a web application.
There is also need to guard against manipulation of software vulnerability, featuring crooked Uniform Resource Locator (URL) or POST Headers. One also can’t ignore instances where a malicious website, email etc causes a user’s web browser to perform an unwanted action on a trusted site for which the user is currently authenticated.
Once a vulnerability surfaces, an organization needs to tackle the risk associated.
As Acunetix, a web application security software specialist, recommends, the level of risk can be ascertained from numerous data points – “the severity of the vulnerability, the consequence should the vulnerability be abused, and threats the application faces.” So a Stored Cross-site Scripting (XSS) vulnerability in the authenticated area of a business-critical application hosting sensitive information may appear as a bigger risk than a Blind SQL Injection vulnerability in an internal application that does not pile up sensitive data.
As for new technology, ecommerce sites are relying on analytics and machine learning for real-time cognitive fraud detection. For instance, IBM has come up with new behavioral biometric capabilities that incorporate the use of machine learning to help understand how users interact with banking websites. Fraudsters have a cognitive behavior just like users and it is quite different than a real user. Suspicious behavior is being tracked in new ways to detect new account fraud for online banking and eCommerce sites and malware/ bot activity.
What if attack happens?
Travel brands have faced situations where severe attacks have happened, and it’s a dreadful situation.
Foregenix, a specialist in digital forensics and information security, recommends that organizations need to take compressed backup of the entire web root, and export any database associated with the website. So if payment card data has been stolen then this back-up will needed when there is an investigation by card brands and/or law enforcement. Again, in order to support any inspection, rather than eliminating suspect files from a website, store a copy in a secure, compressed, offline location, recommends Foregenix. Inform processor and acquiring bank. This is in turn will help in dealing with Visa, Mastercard, Amex and the other brands if payment card data has been stolen.
Spot the IP addresses used during the attack. This will help in identifying attack patterns inside of web server logs and other system logs.
Acunetix suggests that companies need to identify accounts that have been compromised. Change the credentials for these accounts. Also, check for malware, malicious software that is developed with the intention of infiltrating a computer or website without the consent of the owner. Check how it works. Viruses, worms, and Trojan horses are examples of malicious software. This is important as most malware are designed to infect other systems. There have been cases where companies have worked with forensic experts and swiftly removed the offending malware.
Being accountable: A leading hotel brand, when its credit card data was breached around a year back, chose to address the question from a consumer’s perspective - How do I know if my credit card has been compromised? The answer from the chain – “If you suspect any unauthorized activity on your card, we recommend you contact your credit card provider directly”. The group also acknowledged that despite having leading data security systems in place, the malware was “undetectable” by all anti-viral systems. Brands are expected to be answerable at all times by customers, and organizations need to be prepared for all external communication related to any such attack.
Follow Ai on Twitter: @Ai_Connects_Us
First published on 21st October, 2016
Ai Editorial: In an era in which we are talking of winning over “micro-moments”, ‘OS-Pay’ can propel consumers’ purchasing behavior. And it can help in controlling fraud, too, writes Ai’s Ritesh Gupta
No marketer likes to get locked in a particular data ecosystem. But, marketers at large, also can’t do without Facebook, Apple, Google, and if we talk of China, then Alibaba, Tencent, and Baidu.
Be it for brand awareness or completing a transaction on such 3rd party platforms, if there is no provision to get data out of an ecosystem, then it inhibits optimisation of the overall marketing initiative. The repercussions vary from wastage of ad expenditure to annoying a customer – say serving an ad repeatedly even if the customer isn’t interested!
So if we talk of Facebook, Google, Apple etc., then making the most of data from each ecosystem is must.
One might excel in search and the other could be sharp in the arena of apps or social. The challenge crops up when one tries to work on customer profiles or assess the overall customer experience.
On the positive side, ad tech companies like Bitly are looking at this conundrum, and offering trackable links in every channel for a unified view.
Lure of OS-Pay – conversion plus lower fraud risk
No doubt cross device tracking and attribution can be a tough task, but airlines need to go with the flow. The direction in which Google or Apple move, airlines, too, need to capitalize and assess where they can step up conversion, more so when transactions can be facilitated by that ecosystem only. In this context, the recent move by Apple Pay and Android Pay to enable users to use OS-Pay through a web browser is an important development.
This is what Android platform promises - be it your chosen app or checking out on Chrome, one just need to rely on Android Pay at checkout and leave the rest to “Android”.
Chargebacks911’s COO, Monica Eaton-Cardone asserts ‘OS-Pay’ can propel consumers’ purchasing behavior and merchants’ fraud management.
Not only “mobile consumers” are much more likely to complete a transaction, but fraud risk is minimized, too.
“With mobile payments, though, the risk of fraud is greater. There are additional hindrances when it comes to cardholder and device authentication. However, this fraud risk is minimized when transactions are processed with ‘OS-Pay’ mobile wallets; apps like Apple Pay and Samsung Pay could actually help deter fraud,” says Monica. She says no actual credit card information is exchanged between the cardholder and the merchant in the process of conducting the transaction. Moreover, sensitive information isn’t stored on the device or shared with the service provider. “Not only that, but Apple Pay and Samsung Pay employ biometric technology as a means of validating the cardholder’s identity.”
“Both of these apps rely on biometric fingerprint technology in order to authorize a transaction. Therefore, in order for the user to authorize a transaction, the cardholder needs to provide a fingerprint. Not only is this a strong deterrent against unauthorized transactions, but the customer’s fingerprint attached to a transaction is very compelling evidence in the merchant’s favour in the event of friendly fraud.”
Airlines need to support popular wallets and payment apps quickly. Imagine there are two customers - one has downloaded an airline app, whereas the other is keen on using 3rd party app/ wallet. Both are accessing same trip essentials, including an airline seat. So how should airline look at their own digital offerings, and also capitalizing on 3rd party mobile wallet payment platforms?
“Airlines are well positioned to capitalize on the earning potential associated with mobile wallets and branded apps. With the addition of up-sell options and full-service concierge, direct retail apps create an ample opportunity for savvy airlines to leverage current demands. Not only that, but by adapting tokenized technology, airlines can enhance security and reduce overall friction while simultaneously improving conversions,” says Monica. Traffic is key, and giving consumers a one-stop shop has proven to be the most winning solution.
Preparing for fraud
As Monica points out, there are 3 primary strategies for understanding and mitigating fraud, and the same holds true for up-and-coming technologies:
1. Enriched data sources: Data analysis is one of the most important components of a successful fraud detection solution, says Monica. When it comes to new methods or technologies, there are additional elements required in order to perform a relevant analysis. Without knowing these elements and understanding how they relate to the overall picture, fraud exposure is apt to increase.
2. Improved human intelligence: New technology also means new and unknown opportunities for fraud. “However, human intelligence in the form of manual review processes, improved quality control, and customer service checkpoints can help negate the threats that frequently accommodate these emerging payment techniques. Human forensics should be a top priority and aligned with any plans to implement a new method or payment strategy,” says Monica.
3. Collaboration and communication: Airlines servicing multiple countries with many departments are challenged with the task of maintaining continuity while implementing new initiatives. Establishing a feedback loop for fraud suspicions will help keep fraudsters at bay and prevent repeat attacks from happening. There are several types of evolving fraud—friendly fraud, for example. A large percentage of these risks can only be detected through communication and collaboration.
Closer to seamless experience
Today, we are talking about winning over “micro-moments”, and a key factor in same is enabling customers to shop and pay in an omni-channel environment. The ability to use Apple Pay and Samsung Pay for online purchases could streamline the process, considering the prowess of their parent companies. If the customer elects to use one of these methods, they wouldn’t have to worry about typing-in all of their cardholder information for each purchase; that data could simply be stored and recalled at will. As a result, customers would be less likely to abandon a transaction. Of course, as Monica says, this could also be a double-edged sword. There is a kind of balance between streamlining the process and encouraging customers to buy without first thinking through a purchase. As a result, this could lead to buyer’s remorse, which could mean returns or even chargebacks at a later date. Another point of friction could be recalling data smoothly across channels. “If a customer begins a transaction on one device but decides to switch to a different channel, that information will need to be immediately recallable. With even minor points of friction, the likelihood that a customer will abandon a transaction increases dramatically, so it would be wise to try and make the process as efficient as possible,” concluded Monica.
Follow Ai on Twitter: @Ai_Connects_Us
First Published on 14th October, 2016
Ai Editorial: The cloud security set up needs to be payment processor agnostic, tokenize and secure all data types plus manage data in an omnichannel environment, writes Ai’s Ritesh Gupta
Optimizing payments-related infrastructure requires one to excel on many fronts.
Be it for data privacy and data security challenges, the simplicity and speed at which an airline process their business payments and transactions, accepting varied form of payment methods or ensuring the entire set up doesn’t hamper the travel shopping experience by keeping everything under design control, a lot needs to be done. Every facet has its significance, and airlines can’t afford to slip on any account.
Cloud-based set up for processing of payments
Airlines, just like any organization in the arena of digital commerce, need to keep place with telling changes in the enterprise IT environment.
Talking of payments, cloud computing is an attractive proposition, and this is owing to several benefits – curtailing expenditure, cost cutting etc.
But is cloud secure for payment processing?
This is a vital conundrum to solve as no airline or any travel organization would imagine being a victim of any sort of fraud or even a data breach. No matter how strong the infrastructure is for processing of payments, airlines and other travel merchants can always be jittery when it comes to trusting a 3rd party vendor with key details such as traveller’s credit card information, with the perception that data must be stored in-house in order to handle chargebacks etc. When one talks of drifting away from on-premise software solution for processing, there would always be some level of reluctance. There is a need to evaluate potential risks in a shared environment. As observed over a period of time, cloud data-centre security is being labelled as more vigorous than that of on-premise legacy servers. As a result, cloud-based software is gaining prominence.
WEX Travel, a provider of virtual payment solutions to the travel industry, in one of its recent blog postings, did refer to apprehensions about cloud specialists’ ability to “keep data secure” as a major roadblock that hinders shifting of processing to the cloud. As WEX also acknowledges, cloud providers “devote more resources to security”, but still there is need to verify the plans for storing data at the cloud.
It needs to be highlighted that the utility of cloud computing is on the rise. Payment specialists are looking at delivering seamless omnichannel payment processing within a single payment solution. This week Adyen announced that for the first time, merchants “can enable credit card payments, manage complex alternative payments, offer fraud solutions and conduct EMV card-present solutions globally over a single interface delivered entirely in the cloud”. Adyen says with this move, one can avoid costly systems integration, data reconciliation is in real-time, and the offering is payment method agnostic.
Cloud-based payment tokenization
Cloud-based payment tokenization lays a strong foundation and ensures that an organization’s sensitive data doesn’t get stolen from their business systems.
Tokens can feature in transactions involving debit and credit cards, loyalty cards; cloud-based payments; e-commerce and m-commerce payments - card-on-file data.
By tokenizing sensitive data, you remove it from your environment, reducing scope and compliance.
Also, airlines can’t afford to work with specialists that only tokenize payment data, and leave other sensitive data streams.
Importantly, tokens (essentially results from a procedure in which a sensitive data field, Primary Account Number or PAN from a credit or debit card, is swapped with a proxy value named as token) can pave way for accomplishing compliance with requirements that specify how sensitive data needs to be handled and secured by companies in order to adhere to guidelines such PCI DSS.
The proxy value or tokens cannot be upturned to their primary values without retrieving the original set up that relates with their original values. Such key information is kept in a secure location inside a company’s firewall. Only cloud tokenization erases toxic data out of PCI, PHI, and PII scope. (In comparison, when we talk of encryption, the surrogate can be reversed to the original value via the use of a “key”).
Travel companies need to assess the efficacy of the chosen cloud security offering, especially in terms of taking care of most of the scope of PCI Compliance by eradicating payment details from enterprise systems and substituting it with surrogate value or token; capturing payment data prior to its entry into systems and storing the PANs in data vaults, returning tokens to systems; replacing tokens from systems and transmitting PANs to payment processors and service partners; batch processing PAN files into tokens and securely vaulting the PANs.
Speed is of essence, too.
In today’s fast paced shopping environment, microsecond latency counts.
The time taken to transforming PAN to token and back to PAN needs to be done in a swift manner, and this shouldn’t have any sort of negative impact on payment processing.
As WEX highlighted, airlines need to curtail the level of detailed information an entity needs to store. Plus, restrict staff’s access to such data.
Also, when it comes to paying vendors with Virtual Card Numbers (VCNs) one doesn’t need to be aware of bank account information and don’t need to protect their sensitive information. WEX stated that VCNs also mean that your own account information is safe whether you or the vendor tracks and processes payments in the cloud. “Because VCNs can be used only once, even if there’s a breach, as has happened with hotel chains including Hilton, Marriott, and others, there’s no risk of fraudulent transactions,” highlighted the company in its blog.
Follow Ai on Twitter: @Ai_Connects_Us
First Published on 7th October, 2016
Ai Editorial: If airlines adopt a risk-averse approach to managing fraud, then sales can suffer tremendously. Ai’s Ritesh Gupta explores this issue
When one talks about the role of machine learning in managing fraud, there is one question that immediately crops up.
How does machine learning take the onus and deliver – in terms of liability shift as well as handling fraud and boosting sales? The industry is already talking about 100% chargeback protection i. e. getting entirely refunded for any unauthorized transaction not getting detected.
As it turns out, a huge problem with the traditional rule-based fraud solutions and reliance on manual reviews lies in a risk-averse approach to managing fraud. Methods like these are overly focused on bringing down the fraud rate as close to zero as possible, and tries to prevent the first chargebacks from happening. When this happens, sales suffer tremendously.
Firstly, fraud managers would rather not take the risk of accepting a borderline transaction (which could be genuine), resulting in much greater false positives. At the same time, rules deployed (location based, amount based, time based, etc) limit genuine users from making transactions.
In addition to the effectiveness in detecting fraudsters, with machine learning, the system understands when to skip rules when positive behaviour is detected. Furthermore, an optimized algorithm (another form of machine learning) allows the system to optimize and make the most of all the transactions that are seen as part of a portfolio. Based on calculated risks, the system passes the optimized number of transactions while ensuring that chargeback rates are still under control. As a result, borderline genuine transactions can be passed and unnecessary rules and bans are lifted, improving sales greatly.
What hampers sales?
According to Justin Lie, Group CEO, CashShield, a SaaS based self-learning fraud prevention solution for ecommerce, around 3-4 years ago, airlines were reluctant to speak about big data and machine learning as they were still very reliant on payment gateways to handle fraud. However, in recent times, fraud has evolved to become much more complex, and airlines have increasingly come to understand the importance of fraud management to gain competitive advantage and optimize sales.
“We are definitely seeing a positive trend of airline companies gaining back control of their payment options, flow and procedures in the industry, and they are more and more knowledgeable about putting together the various pieces of puzzle to enhance performance,” Lie says.
The use of rules and manual reviews hamper sales and are not the most effective form of managing fraud, added Lie.
“When airlines move away from traditional methods, they must be comfortable with automating most or all of the fraud systems, which means that they can redirect resources to more important areas and focus on their core business, and also allows them to scale up operations much easily while keeping the cost managing fraud under control,” said Lie.
From detecting fraud to predicting it
When using traditional methods of detecting fraud (deploying hard rules and manual reviews), it is often based on analysing the standard fields (name, address, email, IP location, fingerprint and what can be found on the order form) and what transactions have passed through the hard rules. The problem here is that those standard fields and hard rules are extremely easy for fraudsters to manipulate and get passed once they have figured the rules in place. For example, it is now easy for fraudsters to generate hundreds or thousands of new fake emails, and once they realise that a time based rule (no more than 3 transactions in an hour) is in place, they will try to write their program to attack the system with 3 transactions per hour each time. Not only so, genuine customers are likely to be blocked. For instance, a geo-location rule would block customers booking transactions from ‘riskier’ locations.
Moving towards machine learning allows airlines to remove all these unnecessary rules that would have otherwise blocked genuine customers. The combination of big data and machine learning allows more effective fraud prevention. To simplify what has been said about big data and machine learning, big data is first used to collect information about the user’s behaviour on the website (how the mouse moves, what he likes or puts into his wishlist, etc), and this information is combined with machine learning, which uses pattern recognition to map the pattern of his behaviour to match it either with positive (genuine) or negative (fraudulent) behaviour, as well as predictive analytics that records the positive/ negative behaviour and uses that on future transactions for potential signs of fraud. Lastly, an optimized fraud risk algorithm should be used to make decisions on whether or not to accept a transaction based on calculated risks to best optimize sales while controlling fraud and chargeback rates.
Automating fraud analysis
Since the information and data that each airline collects are different (including their web structure and payment options), airlines should refrain from using a one size fits all solution. Instead, they should consider using fraud solutions that cater and adapt to their industry and business model.
Rather than collecting as much data as possible, the quality of the data and how the airlines use the data for better decisions in fraud prevention and increasing sales is much more important.
As for machine learning, it often encompasses different types, and simply using one type (predictive analytics) is insufficient. Merchants should learn to discern and understand the different types of machine learning, and be sure to know if the fraud solution uses only predictive analytics or covers more bases with more than one kind of machine learning. To “improve” machine learning, or rather just to get the best out of machine learning, businesses should deploy solutions that use more than just predictive analytics, or upgrade to a solution that uses predictive analytics, pattern recognition and optimization if they are still using traditional methods of preventing fraud.
Follow us on Twitter: @Ai_Connects_Us
First published on 29th September, 2016
Loyalty fraud is a malice that continues to spread. It is up to loyalty practitioners to educate the senior management, including CFO and CEO, on the seriousness of loyalty fraud, writes Ai’s Ritesh Gupta
Are you thinking like a fraudster? Are you contemplating how your rewards program or FFP can be exploited by a criminal?
It’s time to take action. It’s time to be in control.
Fraud is happening, and it’s growing.
The onus is on businesses to respond, simply because consumers aren’t changing their behavior and as a result they are more vulnerable to fraud. In one of its recent surveys, ACI indicated that consumers are not really protecting themselves enough. For instance, they “leave phones (with ever increasingly available mobile wallets) unlocked and perform sensitive transactions on public computers”. And to make it worse, if the perception is weak, or there is not adequate customer support as a result of a fraud incident, then the customer moves on.
As highlighted in one of our recent articles, the fact that airlines present more earning and redemption options today, mainly via partnerships and rewards ecosystems, this also means that the overall loyalty earning and burning lifecycle has paved way for new means of fraud. We referred to following initiatives to keep a tab on loyalty fraud – monitor activity, keep data/ information secure, stringent verification, being savvy with data, customer experience shouldn’t be jeopardized and creating awareness among consumers.
But, as I interacted with experienced airline industry and loyalty consultant, Iain Webster, it became clear that there are other areas, too, that need to be focused upon. Webster, currently associated with ICLP, a part of the Collinson Group, in London as senior loyalty consultant, asserted that fraud is growing. “The fraudsters are getting more serious as they realise the gains to be had. Loyalty practitioners need to get serious too,” suggested Webster.
Aligning things internally for fruitful results
Importantly, the industry also needs to align itself internally in order to have a bigger control over the malice of loyalty fraud.
Webster said it boils down to too few airlines recognising that loyalty is big business.
“A successful FFP can easily bring in more revenue than a Cargo division, for example. It is up to loyalty practitioners to educate their CFO and CEO on the seriousness of loyalty fraud,” he said.
He said there are 2 main issues when it comes to combating loyalty fraud today.
1. Detection: Most loyalty programs sit within marketing departments and therefore have neither the skills nor the inclination to spend time and resource digging around looking for an unseen problem. Detecting fraud requires a mix of data, financial and technical knowledge, said Webster.
2. Prosecution: “I deliberately use the word ‘prosecution’ because that is the logical consequence of theft. Loyalty fraud is theft. Period. But it is not easy to persuade top management or the authorities that something of value has been stolen. Therefore in instances where fraud is uncovered the usual response is to do little more than close the account and blacklist the email address of the fraudster who is then free to move on and do it again somewhere else under an alias,” explained Webster.
So airlines need to dig deeper, and need to have resources and processes in place.
· Define roles and set up a process – The fraud/ security team needs to be established with clear definition of roles. Also, airlines need to establish business policies and operational practices in addition to implementing fraud detection and prevention tools. Is there a process in place to assess multiple data points in order to detect modus operandi? How to work out manual and automated tools to keep a tab on fraud related to loyalty? Who is going to decide on performance metrics and related accountability?
· Areas of improvement - Loyalty program fraud largely tends to revolve around purchase of points or miles via fraudulent or stolen credit cards, and taking over of loyalty accounts by a cheat/ imposter, who generally redeems the points or miles. Where do you think airlines can improve at this juncture? “Firstly, if they are not already doing it, airlines should apply the same rigor to detecting credit card fraud with point purchase as they do with revenue ticket purchase. Then I believe the issue is not so much ‘taking over’ of loyalty accounts, but one of identity theft where an account is set up by the fraudster using a stolen identity,” said Webster. “Anecdotally I can well remember ringing up the genuine individual who was the named person on an account we had under investigation only to spend the first ten minutes trying to explain to him what a frequent flyer program was. He had no idea that the fraudster, his travel agent, was operating the account and then selling on the redemption tickets.”
· Understand new developments – A lot is being talked about real-time, behavioral analytics-based fraud detection and prevention. “I would like to see greater use of technology and data mining to detect suspect behaviour patterns in much the same way as the insurance claims industry has been doing for years,” suggested Webster. Specialists highlight that behavioral analytics can be banked upon to discover and probe changes in user behavior with precision. So one can come to grips with complex fraud patterns with high accuracy based on dynamic user behavior modeling.
Loyalty Fraud Association
A new association, Loyalty Fraud Prevention Association, has been set up to fight loyalty fraud.
“By bringing together loyalty managers from different industries, travel, financial, and retail we will create an environment of shared knowledge of the techniques being used by the bad guys and the counter-measures that others have found successful. This way we can alert our members as to existing and potential scams. The loyalty version of Interpol. Maybe ‘Interpoints’ ?” said Webster, president, Loyalty Fraud Prevention Association.
A two-day event, Annual General Meeting - Loyalty Fraud Prevention Association (LFPA), is scheduled to take place in London (Nov 9-10) this year. The agenda: Is your loyalty program protected?
Or click here
Ai Editorial: Fighting fraud can’t be a competitive issue since criminals are not “brand loyal”. Just the way airlines are fighting card payment fraud, there is a need to combat loyalty fraud in a similar manner, writes Ai’s Ritesh Gupta
Revenue leakage, clean fraud, fresh fraud, criminal fraud…if you are part of an airline, then you would have probably heard of all of these. But there is one more type of fraud – loyalty fraud - that is now entrenched on this list as well.
Yes, loyalty fraud isn’t atypical phenomena anymore.
In fact, nothing is more dreadful than the fact airlines, as an industry on the whole, haven’t come to grips with this menace.
This is exemplified by the fact that not only hackers, but current employees or ex-staff are also currently indulging in illegitimate activities related to FFPs. Not only there is claiming or awarding of miles fraudulently, but the brand value as well as the trust of the customers takes a beating.
A couple of months ago Air India was embroiled in one such controversy. If we type “Air India loyalty” on Google UK or Google India, then on the first page itself there is a news link about theft of passengers’ frequent flyer miles. This means any search about Air India’s loyalty program can have a detrimental impact on the brand, and negative impact on the association of a passenger with the airline or their FFP.
As it turned out, in case of Air India, FFP accounts were hacked and the bunch of fraudsters also featured an ex-employee. He apparently had access to Air India’s intranet and Internet-based systems.
“This is completely unacceptable (ex-staff gaining access even after not being associated with the organization),” stated Peter Maeder, Co-Founder & Secretary, LFPA or Loyalty Fraud Prevention Association, a new entity set up to fight loyalty fraud.
Stealing of points/ miles is attractive
FFPs worldwide continue to face capacity, regulatory, accounting and liability pressures, notwithstanding the fact that we compete for “share of mind” in an over-crowded loyalty environment.
FFPs have evolved, and as a result the earning and redemption options today are more than ever. Maeder says because of the new accounting rules introduced in 2008/ 2009, loyalty program manager are seeking more ways for their customers to redeem their points and miles. “Therefore, cash-like redemption programs are on the increase. As a result, stealing points/ miles have become much more interesting for the criminal fraternity. Furthermore, so called “friendly fraud” - we should not talk about “friendly” fraud , fraud is a criminal act and can’t be friendly! - is very simply done by all people involved in loyalty programs (staff, but also travel agents or other third party organizations),” explained Maeder.
Simple measures first
Maeder says its imperative airlines comprehend all possibilities of fraud - fraud by members, staff, travel agents, partners, data breaches/ hacks/ malware etc. and accordingly train relevant teams and find ways to forge reliability and security across the organization. “Rather than just dwelling on costly initiatives from the beginning, a solid foundation needs to be in place – enforcing certain values and creating awareness. Airlines owe it to their loyal members – protecting data of passengers, and shield their reputation. This is absolutely mandatory at this juncture,” said Maeder. For example, a tendency to keep simple passwords is still there and this can result in a compromise of any IT system if the staff goes ahead with say “123456” as a password.
“Fighting fraud requires resources, both human (trained and dedicated staff) and technical (secure IT infrastructure). Many loyalty programs are being run on legacy IT systems, which are prone to hacking.
Fighting fraud requires a professional organization - few airlines have so far invested in developing teams and systems to respond adequately to the rapidly increasing threat, which costs them not only money, but above all their reputation! Does it require media pressure, until the loyalty industry is waking up and starts taking the necessary steps to fight the phenomena?” questioned Maeder.
Airlines need to take simple measures first to ascertain the danger of cyber security and gradually move on to embracing high-level risk-based rule engines to monitor accounts for suspicious or unusual activity, and establishing automatic alerts for questionable activities.
For instance, Maeder referred to penetration tests. This evaluates the effectiveness of information security controls implemented in the real-world. Advantage of penetration testing: Knowing a system’s vulnerability before an invader gets to know it. This way areas susceptible to attack are exposed. Accordingly, remedial initiatives can be taken to foster a secure environment. Other than evaluating threat from outsiders, an internal assessment, too, can be done with the assistance of specially designed plug-computers to replicate an attack from within the client’s network.
Maeder referred to an important point when we talk of collective improvement.
“The credit card industry has long recognized that fraud is a significant cost facture to all parties involved in card payments. Therefore, they have set-up standards, guidelines and rules that have to be adhered to when accepting or transmitting credit card data (the Payment Card Industry Data Security Standards or PCI DSS).
To date, there is no body/organization that seeks to support the loyalty industry in a similar way,” pointed out Maeder. “Some airlines have invested significant time and money to make their card payment infrastructure more secure and have been able to reduce their losses due to fraud. Unfortunately, similar efforts have not yet been undertaken so far and the hackers are clearly taking advantage of these “opportunities”.”
Hackers, who are usually a step ahead of the “good guys” have started to switch their activities to loyalty programs, which are not as well protected as card programs. Also, the airline industry is working together in fighting card payment fraud – work groups, data sharing, chat forums etc. “Nothing similar is available so far in the loyalty area,” said Maeder, who added that the objective of the LFPA is to provide guidelines, share best practices, offer training and exchange ideas about fighting loyalty fraud.
Collaboration is definitely going to be an important weapon in the armoury of airlines. Maeder made an important remark.
“Fighting fraud can’t be a competitive issue – the criminals are not “brand loyal”,” he said.
The LFPA will allow and encourage collaboration among industry professionals by running chat forums (open to registered members only), providing a data base of data elements that have been used in confirmed fraudulent transactions, workshops where best practices are being discussed and developed, webinars, conferences. “We are not reinventing the wheel, but are using the experience gaining in fighting credit card fraud. Membership is open to all parties in running loyalty programs. However, participation in work groups, chat forums, etc. is limited to registered members only,” he said.
A two-day event, Annual General Meeting - Loyalty Fraud Prevention Association (LFPA), is scheduled to take place in London (Nov 9-10) this year. The agenda: Is your loyalty program protected?
Or click here
First published on 25th August, 2016
Ai Editorial: Airlines are counting on machine learning to make decisions designed to optimize sales while keeping fraud and chargeback rates under control, writes Ai’s Ritesh Gupta
How efficiently machine learning is coming to grips with blocking fraudulent transactions automatically? And how does it work?
As I initiate my conversation with Justin Lie, who has built CashShield, a SaaS based self-learning fraud prevention solution for ecommerce, from scratch, I am eager to know how the industry is trying to combat fraudsters.
The first remark is sharp enough to grab attention. “In recent years, online fraud syndicates are increasingly using machines to mask their online transactions as genuine, and they are well ahead in the technology that they are using as compared to what the travel industry is currently deploying. Therefore, it is imperative for companies in the travel sector to move towards using big data and machine learning to deal with fraud more effectively.”
As this tactic has been around for a while, where do cracks emerge then?
Singapore-based Lie, Group CEO, Founder, CashShield, says when we talk of machine learning, it is important to differentiate between the different types of machine learning deployed. Many fraud solutions in the market now tout their use of machine learning, but they are usually only using one form of machine learning – predictive analytics – which allows the solution to predict future fraud based on historical data.
Not just predictive analytics
So this method of fraud prevention is good, but problems arise when completely new transactions with no historical data are submitted into the system, and there is no way for the machine to predict whether or not the transaction is genuine or fraudulent.
“For instance, when a fraudster uses a new program to carry out a fraud attack, there would be no records of the new program, making it difficult for the machine to detect the suspicious behaviour until the fraudulent transactions were accepted and later recorded in the system as fraudulent,” explains Lie.
He says to increase the effectiveness of the fraud system, another form of machine learning must be used as well – pattern recognition.
“With pattern recognition, even without any prior historical data, the machine is able to detect patterns across different transactions and diagnose if the transaction exhibited bot behaviour or human behaviour,” Lie asserts. Using big data, the system collects information from the merchant’s website, such as the user’s web movement behaviour, social media accounts, likes or comments on the website, e-newsletter subscription or alternative payment methods. Combined with pattern recognition, the system draws patterns (for both positive and negative behaviour) to map the DNA profile of the user, and determine if other incoming transactions exhibit the same (fraudulent) behaviour or not. The large quantity of information collected from big data makes it difficult for fraudsters to cover all of their tracks, therefore increasing the effectiveness of preventing fraud.
We also dwelled on what different types of machine learning are there for an apt blend of chargeback protection and fraud prevention.
Lie explained: pattern recognition, deep learning and stochastic optimization are also necessary for combining millions of test results to be crunched for an optimized yes or no decision in real time. “Predictive analytics falls under the branches of supervised learning in machine learning, and is important to predict if a fraudster will use the same attack again in the future. However, other forms of machine learning – unsupervised learning – are also important, especially when new attacks with no previous data happen. Unsupervised machine learning is able to seek patterns and correlation amidst the new data collected, which helps to identify positive and negative behaviour, and is effective in identifying genuine customers as much as identifying fraudsters,” he said.
He further explained: Statistical modelling provides test results, while probability modelling assigns weighting. When we apply this to fraud screening, using probability modelling only gives you a risk score based on the information collected about the transaction. The merchant still has to rely on a team of manual reviewers to look at the risk score and decide whether or not to accept the transaction. The problem here is that fraud officers are often risk averse and their main KPI is to bring the fraud rate as close to zero as possible, which results in many borderline genuine transactions rejected. Consequently, sales suffer tremendously since many genuine customers are turned away. Therefore, it is more useful and effective to rely on an algorithm – what we call an optimized fraud risk management algorithm – to make decisions designed to optimize sales as much as possible while keeping fraud and chargeback rates under control.
Optimized fraud risk algorithm
As for how such algorithm functions, Lie referred to two examples:
· The first example: It is not uncommon for a sibling to use another sibling’s online shopping website account to accumulate more loyalty points easily or for the former to use the latter’s accrued loyalty points for discounts. The problem occurs when the former sibling ends up signing in from a different IP address, uses a different device (different device fingerprint) and pays with a different payment account. Immediately, this will be flagged as suspicious behaviour, as it seems like a fraudster is hacking into the user’s account. However, through identity mapping, powered by machine learning, with the algorithm, the machine is able to use data to identify positive behaviour, rather than focus on all the negative behaviour only to pull this genuine customer away from the pool of flagged transactions.
· The second example: Small signs may be used to point out signs of fraudulent activity, even if they seem insignificant. Perhaps we have a user who, every time he makes a transaction, will be conscious to unselect the field to subscribe to the merchant’s newsletter. However, a fraudster that has hacked into his account has programmed his attack to select the field to subscribe to the merchant’s newsletter. With small signs like this, the machine is able to see how this fraudulent transaction does not match the user’s purchasing pattern of behaviour, and is therefore able to reject this transaction as fraudulent rather than genuine.
Follow us on Twitter: @Ai_Connects_Us
Justin's profile: LinkedIn
First published on 17th August, 2016
Ai Editorial: Given the growth in card-not-present transaction volume, airlines need to be proactive to understand what triggers friendly fraud and how to deal with it, writes Ritesh Gupta from Kuala Lumpur
Airlines are constantly looking at ways to minimize the impact of chargebacks and one of the topics keenly discussed during the 5th ATPS Asia Pacific was “friendly fraud”.
Unlike fraud initiated by a criminal, friendly fraud is the case where a “cardholder” claims fraud for a transaction they were involved in. This type of fraud is hard to deal with as the legitimate cardholder uses the card with all of the correct information, and then disputes the same. What works against airlines and merchants is the fact that chargeback dispute procedure doesn’t support them, as banks and credit card organizations tends to seek only a small amount of proof from customers to corroborate a dispute claim.
Speaking here in Kuala Lumpur, Brett Small, Regional Director, APAC – Ethoca, mentioned that friendly fraud refers to “fraud that is committed when an individual had knowledge of and/or was complicit with and/or somehow benefited from the transaction on their own account, although the individual reported the transaction as unauthorized”.
Talking of airlines, Small said in case of airlines, friendly fraud is generally the result of buyer’s remorse, additional charges or fees, disagreement with refund rules, and a transaction that is completed by another party. He also explained the spectrum of behavior – varying from a benign one that generally involves a household/ family member (so may be a traveller is on the check-out page on a device, and someone inadvertently clicks to complete the transaction. So the cardholder was unaware of purchase made by a household member. Or as Small said it could be a simple case of just not recognizing the purchase – descriptor issue, statement is confusing, etc.) to the cardholder deliberately abusing the system with the intent to commit fraud.
Issues for merchants
Friendly fraud is difficult to distinguish from genuine fraud and even harder to prove for merchants:
· Difficult to detect at time of purchase.
· Issuers usually accept a customer’s assertion.
· The chargeback process does not adequately address friendly fraud.
· There is no way of collaborating with issuers.
· High impact to customers and risk of social media damage.
· Time consuming and labour intensive.
Why issuers struggle?
Explaining how issuers comprehend friendly fraud and the way it can be dealt, Small highlighted that friendly fraud is difficult to distinguish from genuine fraud.
· Issuers cannot see what is purchased.
· It may involve a dispute with a merchant that issuers are unaware of.
· Issuers are under pressure internally and from regulators to believe and refund customers.
· Issuers have thousands and sometimes hundreds of thousands of disputes per month.
· Issuers ask customers questions to try and validate disputes and also look for repeat disputers. But, cardholders have learnt how to “use” the system.
Issues being raised, but long way to go
Friendly fraud has raised the overall chargeback level, making acquirers more watchful about accepting risk liability. The industry has been looking at this issue, for instance, Visa last year chose to accept airline-supplied flight manifests as a remedy for fraud payment card chargebacks (when the passenger name matches the cardholder name). As explained by Monica Eaton-Cardone, COO, Chargebacks911, in one of her recent blog posts, initiatives taken such as one taken by Visa are being taken to help fraud-burdened merchants, but still it isn’t a definitive solution. She asserts that savvy consumers continue to exploit loopholes and merchants still report significant losses. She recommends that fraud filters need to work better. Also, merchants need to be sharp enough to understand the buying behavior, and consumers need to understand that their actions have consequences, and that getting involved in friendly fraud is going to have detrimental impact eventually.
More specifically, airlines need to look into booking history and any other internal and external data sources to verify travel. Evaluating customers’ chargeback history can be useful, too.
“There is a need to leverage merchant historical data - card number + device/ IP address for previous orders. Also, make household profiles and link all their devices. On another note, one may call the cardholder when it makes sense. This is based upon transaction amount, customer relationship, evidence etc,” said Small. “Airlines can look at implementing simple, clear refund policies. But, don’t be too easy as the new trend is refund abuse,” cautioned Small.
Other areas that can help:
· Chargeback representments (if evidence exists.)
· Using modified merchant descriptors.
· Making change and refund policies clear in the booking flow and post booking communications.
As it turns out, completely doing away with chargeback fraud isn’t a possibility, though curtailing the risk of such kind of credit card fraud is possible. Airlines have to count on ways to avert the danger of becoming a victim of friendly fraud. Merchant-issuer collaboration is essential and can play a big role in dealing with such malicious behavior.
Follow Ai on Twitter - @Ai_Connects_Us
First Published on August 16, 2016
Ai Editorial: Airlines need to dig deeper, be it for taking advantage of the liability shift rule for full 3D Secure optimization or being savvy with fraud detection on their platforms, writes Ai’s Ritesh Gupta
How is the travel industry dealing with the issue of transactions wrongly declined due to suspected fraud?
It is a serious issue as an indifferent customer experience can result in customers cutting down on their card usage or even abandoning it altogether. Yes, merchants are more liable for card-not- present (CNP) transactions today but they also need to be wary of the repercussions of a purchase decline that isn’t a fraudulent one.
Of course, the first major impact is the value of the order. Now all the money spent on getting a customer close to completing a transaction is also wasted. So be it for a print ad or remarketing campaign, the cost of acquisition is negatively affected. Then one should also consider the probable lifetime value that is lost when a genuine traveller’s order is erroneously declined.
Working in tandem
In this context, all stakeholders need to work on apt card authorisation strategies.
So when we talk of stakeholders working in tandem, there is a need to constrict your acceptance gap. It is pointed out that there tends to be a gap in acceptance as banks today are more wary of remote/ card not present transactions. Plus, there have been data violations/ incidents of fraud and also merchants have the tendency to deny transactions from particular geographical areas. So by cutting down on this gap, one can benefit by authenticating those transactions, which have a higher likelihood of being authorized.
Making the most of what we have
So if we talk of what can be done, there is a need to make the most of what is available.
For instance, a travel company I spoke to referred to 3D Secure, and how this offering is different from other payment fraud prevention solutions.
3D Secure’s code is rooted in the authorization message from beginning to end when we consider settlement. This spans multiple parties and servers. One can reap benefits by focusing on troubleshooting and monitoring of the service, and linking various 3rd parties involved. The data elements obtained from the authentication are shared with the issuer. The same enables issuers to amend their authorization risk settings and tie the authorization to the authentication.
Issuers who have deployed a risk based authentication mechanism will contest or assess transactions that seem doubtful. This way they can flush out fraudsters and cut down on false-positive declines. So before authorization they can spot danger. Based on the risk level they are then able to challenge the consumer with knowledge based questions or one-time pin numbers sent via SMS.
Here it needs to be mentioned that as per the real experience of those of who have benefited from 3D Secure, it is being indicated that the end to end interoperability of 3D Secure eradicates the speculation once associated with CNP commerce.
As we learnt from Amtrak, the key to full 3D Secure optimization and effectiveness is to take advantage of the liability shift rule and to front load 3D Secure into your risk model. The company was able to lean on this new found component of the 3D Secure protocols to not only cut fraud but also increase sales. “Issuers have lower decline rates because they have better data across the lifecycle of the card. By giving the issuer the ability to silently interject themselves into the checkout make a risk determinant will allow you to expand your risk systems beyond your walls,” shared a source.
As for being realistic, one needs to ensure that the right tools are in place, too. You can't just go to market with a vanilla 3D Secure MPI provider and expect it to work.
Being savvy with algorithms
The fraud problem is boosting the false positive issue. Merchants, acquirers and issuers decline far more good transactions than bad.
“No industry is affected more by false-positives than the travel industry,” highlighted one executive.
Its true indeed as high ticket items along with the high potential for fraud results in the highest false-positives averages online. So every travel company needs to identify how to implement static rules, ones related to behavior of a user, and also device fingerprinting.
Multi-factor authentication is also being counted upon to bring down false positives. For instance, this way one can step up approvals for new account openings, as they say, across thin-file leads with limited credit histories. Some of the options include commonly used one-time passwords (logging on to a network or service using a unique password which can only be used once or 1-time passcode based on the token’s secret to ensure authentication); certificate-based authentication (blends a public and private encryption key unique to each device; context-based authentication (optimizes a layered approach to access security by assessing user login attributes and matching them against pre-defined security policies).
Talking of Chip and PIN versions of EMV cards, one needs to be careful as it has both positive and negative sides to it. Airlines need to build trust and strengthen security. Today there are ID checking services available that use online and social media identity data, ID documents and facial biometric checks to prove that a person is who they say they are.
Lastly, whatever move is made it needs to be checked minutely. For instance, it is being stressed that one shouldn’t use biometrics in client-server architectures (not suitable for use as a factor in two-factor authentication). This is because credentials are sent over the wire (both LAN/WAN and the Internet). Since such authentication can’t be taken off, it needs to be assessed in which situations it can be potentially compromised.
Follow Ai on Twitter - @Ai_Connects_Us
First Published on 11th August, 2016
Ai Editorial: Wearable adds more touchpoints to every passenger journey, but is anything new, exciting happening? The long-term utility beyond health and notifications isn’t clear, writes Ai’s Ritesh Gupta
Where is wearable technology headed?
It’s a broad question, but there is a reason behind not jumping on to the utility for the travel sector.
The way today’s gadgets are shaping up, we expect them to deliver on multiple counts. So when I use my smartphone and smartwatch (say, paired together the way Apple products are), I expect to press lesser number of tabs (for instance, every time there is an interview scheduled in my email I expect my phone would send me a reminder without me pressing on a calendar tab), send useful notifications (say I have booked a room via an OTA app. On the day of the check-in, when I reach the vicinity of the hotel, I should be guided by my smartphone to reach the hotel) etc. So I am expecting a lot more all the time.
Frankly speaking, the lure of using a smartwatch hasn’t increased and it has failed to go beyond simple notifications. There is buzz that speech recognition and text-to-speech is set to improve, but it remains to be seen what is going to happen next. At this stage, simple experiences like third party apps not working on smartwatches seem to be an issue. When usage of apps doesn’t work it is quite frustrating.
“Smartwatches have limited capability to “keep going” while not connected to their host smartphones. However, we’re now well into “second generation” of wearable systems. The latest versions of Android Wear and upcoming version of Apple Watch now feature more “standalone” functionality. The Pebble has had this over 3 years, however,” says Ireland-based Kevin O’Shaughnessy, founder of Indigo.gt, a search and reservation platform for airport-to-city transfers. “The killer app for the watch so far has been notifications and simple “one-button” actions. These prove quite popular with long-time users. On day-of-travel this can take the stress out of the journey for many frequent flyers. Watch technology also features payments, but only in limited markets. The tap-to-pay, whether by card or devices, makes everyday travel simpler.”
He further added, “We’re now at a watershed moment with the “Wait spinner” on Apple Watch, for example. If Apple doesn’t take urgent measures to make the device more responsive, whether with better software or a new generation of watch, I worry about the long-term utility beyond health and notifications.”
I am not too savvy, but after reading about the role of a smartwatch, it is clear that data is being tracked with the current generation of wearables.
In its list of 10 compelling wearable device experiences over the next two years, Gartner mentioned biometric authentication, mobile health monitoring, virtual personal assistants, smart coaching, virtual and augmented reality, accurate motion recognition etc. The study also added that there is “genuine scope for wearables to create intelligent personalized experiences that really add value”. Overall, in comparison, the travel sector has to catch up. Yes, experts do pick developments such as the Starwood application for Apple Watch (unlocking room door in the hotel by the simple tap of a button) as a positive experience. One can also access stay details, including check-in, checkout and confirmation number, or points. Still it wouldn’t be wrong to say that the travel sector is lagging behind the likes of retail, healthcare and gaming when it comes to the “wearable future”.
“We have yet to see the travel industry tap into the “contextual purchase”,” says O’Shaughnessy.
He says the entire mobile ecosystem has the potential to eliminate the “point of sale” entirely, leaving staff to focus on customer service in retail, for example. “When it comes to notifications and proximity technology, mobile has the potential to reduce the hustle commonly seen at departure gates. With wearable, this can make the experience even more streamlined, and communication more personalised. On a personal note, I’ve yet to board a European flight smoothly with Passbook on my watch,” shared O’Shaughnessy.
What should airlines expect in the future?
I spoke to O’Shaughnessy about specific areas.
Data, analytics and personalisation: Wearable adds more touch-points to every passenger journey. “Airlines that thrive in this space will also thrive in mobile and next-generation web tools. The critical factors are payment technology, and moving toward account or virtual-account based relationships. The connection with loyalty programmes is open too,” shared O’Shaughnessy. Wearables can bank on being more connected to the user’s physical body than any smartphone or mobile device. Let’s see what the travel industry can bring. May be a chatbot via wearables – say that can guide me to a change in terminal at the airport with clear instructions without looking at the screens or booking a table at a particular restaurant with clear instructions about how far the restaurant is from my gate. Just random thoughts about one aspect of our journey.
Risk of data breach: Can my Apple Watch be hacked? There already have been concerns over personal health data being leaked. O’Shaughnessy says so far, this is a marginal risk. As devices become more capable, this may change.
Payments: Behind the scenes, the payment industry is changing entirely; when more banks in more markets adopt tokenization, we’ll see the applications first on mobile, second on wearable. Think about smoother, simpler payments, said O’Shaughnessy. There have been developments where companies like the Swiss watchmaker Swatch are gearing up to let consumers take their watch close to contactless terminals enabled for NFC (near field communication) technology, and avail contactless payment service.
Ancillaries: With more opportunities to sell, more opportunities to capture ancillary revenue opens. This will be powered by inventory but also analytics. Some examples:
· Book your taxi on arrival
· In-flight beverage/catering sales
· Sale of security fast-track passes
· Re-accommodation and flight status updates as a premium service
The IoT (or Internet of Things) future shaped by wearables: Wearables is one aspect of the Mobile or IoT space. As one of the first consumer IoT segments, this will push technology towards “longer battery life” and “better processing power” in order to make products more competitive over time.
Kevin O’Shaughnessy is scheduled to speak at the upcoming 5th Airline & Travel Payments Summit Asia-Pacific. It is scheduled to take place next week (17-18 Aug) in Kuala Lumpur.
Follow Ai on Twitter: @Ai_Connects_Us
Event’s Twitter hashtag: