首页    期刊浏览 2024年12月14日 星期六
登录注册

文章基本信息

  • 标题:The efficiency and integrity of payment card systems: industry views on the risks posed by data breaches.
  • 作者:Cheney, Julia S. ; Hunt, Robert M. ; Jacob, Katy R.
  • 期刊名称:Economic Perspectives
  • 印刷版ISSN:1048-115X
  • 出版年度:2012
  • 期号:November
  • 语种:English
  • 出版社:Federal Reserve Bank of Chicago
  • 摘要:In this article, we consider the potential for data breaches that compromise the security of personal and account information to threaten consumer confidence in payment card systems in the United States. (1) In particular, we explore whether a large, well-targeted data breach (or a sequence of breaches over a relatively short period of time) might render inoperable a payment card system (for credit, debit, or prepaid cards), possibly resulting in its being abandoned, temporarily or otherwise, by a substantial number of consumers. (2) We recognize that, given the precautions that are in place in such systems, the probability of a catastrophic abandonment is quite low. But this probability is not zero. Recent events, as well as feedback from the industry, suggest that further study of such potential tail risks could be helpful. (3)
  • 关键词:Credit and debit card industry;Credit card fraud;Credit card industry;Data security

The efficiency and integrity of payment card systems: industry views on the risks posed by data breaches.


Cheney, Julia S. ; Hunt, Robert M. ; Jacob, Katy R. 等


Introduction and summary

In this article, we consider the potential for data breaches that compromise the security of personal and account information to threaten consumer confidence in payment card systems in the United States. (1) In particular, we explore whether a large, well-targeted data breach (or a sequence of breaches over a relatively short period of time) might render inoperable a payment card system (for credit, debit, or prepaid cards), possibly resulting in its being abandoned, temporarily or otherwise, by a substantial number of consumers. (2) We recognize that, given the precautions that are in place in such systems, the probability of a catastrophic abandonment is quite low. But this probability is not zero. Recent events, as well as feedback from the industry, suggest that further study of such potential tail risks could be helpful. (3)

The shutdown or abandonment of one or more of these systems, even if the duration is relatively limited, might amount to a significant disruption in the flow of funds among consumers and businesses and, increasingly, from governments to households in the form of benefit payments. (4) Such transactions might be immediately shifted to alternative means of payment, but doing so could create substantial operational challenges for those payment systems. Sudden shifts away from payment card transactions to other payment methods might also invoke a policy response to an immediate crisis based on incomplete information--which would be less desirable than a response based on a process of carefully gathering and evaluating all the available information.

In the event of a crisis, the Federal Reserve maintains a legal and electronic infrastructure to provide liquidity to banks facing interbank settlement difficulties as a result of disruptions to the normal clearing and settlement cycles of card systems; however, this liquidity would have to quickly reach consumers and businesses, including nonfinaneial firms, that rely on these systems as a means to exchange value and whose payment behavior would be affected by even a temporary disruption in one of the card networks. To allow for efficient payment substitution in support of a smoothly functioning U.S. economy, there must also be multiple reliable ways to make and receive electronic payments.

For all of these reasons, researchers at the Federal Reserve Bank of Chicago and the Payment Cards Center at the Federal Reserve Bank of Philadelphia developed a series of questions and organized informal conversations with a variety of payment system participants, with the goal of better understanding the nature and significance of risks posed by data breaches to payment card systems. More specifically, to examine the adequacy of existing efforts to prevent, manage, and mitigate fraud in card-based payment systems, the Chicago Fed and Philadelphia Fed researchers conducted 17 industry interviews in 2009. The individuals interviewed represented a variety of domestic perspectives, including those of networks, banks, merchants, processors, independent sales organizations (ISOs), vendors, and information-sharing organizations. This article documents the insights gained through this exercise, but it does not identify individual organizations or respondents. Ideally, the information learned from these interviews would be helpful to other researchers considering the risks that data breaches may pose to retail payments in the United States, as well as how those risks can be mitigated in the most optimal manner.

In the next section, we provide an overview of the threat that fraud poses to the smooth operation of payment card systems in the United States. Then, we discuss specific measurements of losses due to payment card fraud, as well as the current scale and character of data breaches in the financial industry. After providing this background information, we summarize our industry interviews and discuss the lessons learned from them.

Accounting for payment fraud

Payment fraud can be broadly defined as any activity that uses confidential personal (and often financial) information for unlawful gain. For example, A masquerades as B and uses B's credentials to illicitly take B's funds or to obtain credit under B's name. Such fraud can occur with any type of noncash payment method, including credit and debit cards, checks, and automated clearinghouse (ACH) transactions. Payment fraud can be committed knowingly by a consumer (first-party fraud), or consumers can be victimized by others operating within financial institutions or as part of criminal enterprises (third-party fraud). (5)

Fraud is a threat to the payment system's efficiency because it degrades operational performance and increases costs--not only for the parties whose payments are compromised but also for all participants in the system. (6) Payment networks are potentially vulnerable to fraud at a number of points along the transaction chain. Criminals naturally opt to exploit the weakest links in payment chains. As a result, banks and other payment system operators and private firms using the payment system incur significant expenses to protect against fraud.

When successful, payment card fraud, which we focus on in this article, can give rise to adverse consequences for participants at different points along the payment chain. For example, when a criminal steals a payment card and uses it (or its information) to make a purchase, the legitimate cardholder's liability for the fraudulent transaction is limited by statute or regulation. It is downstream participants, such as the card-issuing bank and the merchant, that are likely to incur losses on fraudulent transactions. (7)

Although the cost of fraud losses might be limited by investing in stronger protections against criminal use of a stolen card, it is neither possible nor efficient to eliminate payment fraud entirely. Rather, in striving to achieve efficiency, payment system operators and users must balance the costs of preventing and mitigating fraud against the full set of costs that fraud generates, including, but not limited to, the actual monetary loss to society. (8) Ideally, individual participants would actively monitor the risks that their choices create.

An important input into this calculation is the confidence that private actors have in the payment methods they use. For example, consumers have come to expect that payment card systems will reliably and securely complete payments as instructed. Today, these systems are widely used to receive income and benefit payments, to purchase goods and services, and to pay bills. Over time, payment card systems have displaced more-costly paper-based systems, especially for purchases made at the point of sale (POS). Card systems have also been essential in facilitating payments in new sales channels, such as the Internet, where the buyer and seller do not transact in a face-to-face environment.

Without sufficient confidence among the parties involved, payment card systems cannot operate efficiently for all of them, nor will these systems be profitable to their owners. Card networks operate more efficiently in an environment where their services are offered ubiquitously and large numbers of consumers and merchants agree to utilize them. The presence of strong network effects in established card payment systems contributes to their resilience in the face of temporary shocks. (9) At the same time, these network effects imply that a sufficiently large shock to public confidence in a payment card system might result in a sufficiently large shift of transactions to other (potentially less efficient) forms of payment that cannot easily be reversed.

This shift would reduce the value of the payment card network because a reduction in the number of active cardholders may, in turn, lead to fewer merchants or businesses willing to incur the cost to accept payment card transactions.

Consumer payment systems usually function so smoothly that it is easy to underestimate their complexity. This complexity is due in part to the number of parties involved in completing a payment, the high degree of coordination required among these parties, and the ongoing investments that are required to ensure reliable performance. For example, a card-based payment transaction in the United States will involve some or all of the following parties: a cardholder; a merchant or biller; a card issuer, or simply an issuer; a card-acquiring bank, or an acquirer (which converts payment card receipts into bank deposits for merchants); (10) an electronic switch (which routes transaction information among various banks participating in a payment network); a payment network; one or more processors; a telecommunications company; and other third parties. Coordinating the activities of all these participants is a crucial payment system function, and such coordination takes on special significance in protecting the system from fraud and preserving the public's confidence in the system. (11)

Moreover, no single government entity has an exclusive or comprehensive regulatory or supervisory jurisdiction over U.S. retail payment systems or payment providers. The Board of Governors of the Federal Reserve System issues certain retail payment regulations, especially regarding checks. The recently established Consumer Financial Protection Bureau (CFPB) has jurisdiction over most federal consumer protection regulation for electronic payment transactions. As a prudential regulator, the Federal Reserve Board, as well as other federal financial supervisors, conducts exams; and these exams can entail a review of the financial institution's payment system security precautions, including those of its business partners.

Further, some of the organizations involved in operating networks and providing payment services to the public are banks, but many are not. Thus, additional regulators can be involved. For example, nonbanks operating under state money transmitter licenses are subject to state agency supervision. In addition, the CFPB may determine, by rule, that certain non-banks in markets for consumer financial products and services are "larger participants" and therefore subject to CFPB supervision. (12) A variety of state laws also address consumer rights in instances of identity theft or a data breach. (13)

Local, state, and federal law enforcement agencies investigate instances of fraud, identity theft, and data breaches. Consumer payments, whether made domestically or abroad, are potentially exposed to fraudulent activities orchestrated from anywhere in the world and, therefore, may fall under the investigative jurisdiction of foreign authorities. Therefore, regulation, supervision, policing, and investigation of retail payments and fraud in payment systems may be the responsibility of a variety of agencies at the international, federal, and state or local level.

In the private sector, five payment card networks--American Express, Discover Financial Services, JCB (Japan Credit Bureau) International, MasterCard Worldwide, and Visa Inc.--initially established individual data security standards for payment system participants. About six years ago, they joined forces to create a unified set of standards--the Payment Card Industry Data Security Standard (PCI DSS or, more simply, PCI)--to better secure payment card systems, and they founded the PCI Security Standards Council. For more information about PCI DSS and the council, see box 1 PCI Security Standards Council.
BOX 1

   PCI Security Standards Council

   The PCI Security Standards Council is composed of
   representatives from its five founding global payment
   card networks--American Express, Discover Financial
   Services, JCB International, MasterCard Worldwide,
   and Visa Inc. These companies have agreed to
   incorporate the PCI Data Security Standard in their
   respective data security compliance programs.

   All five payment card networks share equally in
   the council's governance, have equal input into the
   PCI Security Standards Council, and share responsibility
   for carrying out the work of the organization.
   Other industry stakeholders are encouraged to join
   the council as participating organizations and review
   proposed additions or modifications to the standards.

   The PCI Security Standards Council Board of
   Advisors (currently 21 members) is composed of
   representatives of participating organizations. This
   cross-industry group is chartered to ensure that all
   voices are heard in the ongoing development of PCI
   security standards; this group has representation from
   across the payment chain--that is, from merchants,
   financial institutions, processors, and others--as well
   as from around the world.

   Participating organizations are eligible to vote
   for (and to nominate) candidates for election to the
   board of advisors.

   Enforcement of compliance with the PCI DSS
   and determination of any noncompliance penalties
   are carried out by the individual payment card networks
   and not by the council.

   Source: PCI Security Standards Council website,
   https://www.pcisecuritystandards.org.


Several of these networks have also recently announced plans to support migration to an EMV (Europay, MasterCard, and Visa) payment infrastructure in the United States as a means to further increase the security of payment card transactions; EMV is a global standard for the interoperation of chip-based payment cards with POS devices and automated teller machines (ATMs). (14) While these plans are specific to the individual networks, the announcements suggest that the networks informally tried to develop plans with similar key dates and milestones to encourage merchants and issuers to adopt EMV payments. Nevertheless, there is an ongoing discussion about whether the existing levels of investment, coordination, information sharing, and management of incentives in securing payment card systems by firms and organizations in the private and public sectors are adequate to confront the threats arising from modern data breaches. (15) We explore the costs and consequences of data breaches in greater detail in the next section.

Measuring payment fraud and data breaches

A rough estimate of aggregate fraud losses related to U.S. payment cards was about $3.56 billion in 2010. (16) In 2011, reported credit card fraud losses were approximately 5 cents per $100 of transaction value. As a cost of doing business, these losses are not comparatively large, since they equate to roughly one-tenth of the charge-off rate associated with credit losses on credit cards. For debit and prepaid cards, the industry-wide fraud losses to all parties to a transaction were about 9 cents per $100 of transaction value in 2009, with issuers and merchants incurring about 5 cents and 4 cents of that total, respectively. (17) In addition, issuers will incur many other indirect costs related to efforts to detect and prevent incidences of fraud on their cards and to mitigate fraud losses. Indirect fraud costs are also borne by merchants and, in some instances, by consumers.

A primary focus of this article is on the consequences of data breaches--both in terms of the direct fraud losses incurred by card-issuing banks, merchants, and consumers and in terms of public confidence lost in payment card systems. According to Verizon's 2012 Data Breach Investigations Report, across all industries and categories in 2011, there were approximately 855 data breaches in the U.S. In total, those breaches may have compromised as many as 5 million card accounts. (18)

Ordinarily, only a small percentage of compromised payment card records ever result in fraudulent transactions. (19) But there are other indirect costs associated with a data breach, which can be substantial. For example, according to one 2009 survey by the Ponemon Institute, the average cost to firms responding to a data breach is about $200 per record compromised. (20) Our very imprecise estimate, based on the 2009 survey by the Ponemon Institute and the 2012 data breach report by Verizon, is that the indirect costs of payment card records compromised in 2011 might be as high as $1 billion.

Recent payment card data breaches are particularly notable for the sophistication of techniques employed by criminals. In recent years, breaches have occurred at large card processors, such as RBS WorldPay, Heartland Payment Systems, and Global Payments; at merchants, such as T. J. Maxx, Hannaford, and Sony; and at third-party vendors, such as Epsilon and RSA. (21) In many of these cases, breaches are not detected at the time of intrusion into the system, in part because the hackers wait for an opportune time to monetize the compromised information. But when they do act, recent experience suggests that they move quickly and, at times, employ a sophisticated (and possibly international) criminal organization. For example, in 2008, the RBS WorldPay breach resulted in a number of prepaid payroll cards being compromised. These cards were used to obtain $9 million in cash in one day from ATMs located in several dozen cities around the world. (22)

It is important to note that data breaches that result in payment fraud can occur at nonfinancial firms, such as universities and hospitals. Data breaches at any firm that collects and stores personal data can provide criminals with sufficient information, such as an individual's name, address, and Social Security number, to commit financial fraud. (23) This information can be used to compromise security protocols at financial institutions (resulting in account takeover) or to obtain credit in the victim's name (new-account fraud). Both are examples of identity theft.

Identity theft is an important aspect of payment fraud with potentially severe consequences for victims, including not only monetary loss but also a time-consuming process to revalidate credit and other transactional accounts. (24) The fear of identity theft is one reason why consumers might collectively react to an unprecedented rash of data breaches by losing confidence in a particular payment method and switching to a substitute method. In 2010, the Federal Trade Commission (FTC) received more than 250,000 complaints about instances of identity theft. In 9 percent of those complaints, consumers alleged that new credit card accounts had been opened in their names. Also, in 7 percent of those complaints, consumers alleged a takeover of one or more of their existing accounts. (25) A survey of consumers reports that as many as 11 million adults have at some point been a victim of identity theft. (26)

There is some qualitative evidence that consumers' concerns about data security can influence their choice of payment providers and methods of payment. According to a survey conducted by Gartner shortly after the 2008 RBS WorldPay data breach mentioned previously, 23 percent of respondents said that increased fears that financial data are not secure have been a factor in their decisions about which retail stores they patronize. In addition, concerns about security led 59 percent of respondents to change how they shop and pay online. (27)

Further, a recent paper by Kahn and Linares-Zegarra (2012) examining nationally representative survey data found that identity theft incidents increased adoption of money orders, traveler's checks, online bank bill payments, and prepaid cards while also boosting the number of cash and credit card transactions. The authors also reported a decrease in the use of checks after "mixed incidents" of identity theft. Mixed incidents refer to the subset of consumers reporting being a victim of identity theft as well as knowing other victims. Notably, these results reveal changes in the adoption and use of particular types of payments after an identity theft incident.

Such behavior is interesting in light of the significant regulatory and contractual protections from losses resulting from fraudulent transactions afforded to consumers in the United States. (28) These protections against monetary losses do not eliminate the less apparent costs associated with the pain and suffering consumers face (time costs, forgone financing opportunities, etc.) as a result of identity theft. (29) Accordingly, data breaches and identity theft appear to have an influence on consumer payment behavior, notwithstanding the legal protections that are in place for consumers.

To summarize, payment fraud is an ongoing concern for payment system participants--for the card issuers and merchants that bear most of the actual fraud losses and for processors, networks, and others that have an inherent interest in maintaining confidence in the payment system in which they participate. Some fraudulent activity is the result of data breaches that occur both within and without retail payment systems. There is some evidence that data breaches have created concerns about security in the minds of at least some consumers--concerns that, at the margin, may affect their choice of payment providers or methods.

Our experience to date suggests that data breaches have not caused consumers in any great number to lose confidence in card payments and switch to alternative means of payment. However, questions remain about the adequacy of investment, coordination, information sharing, and management of incentives in securing payment card systems against modern data breaches and the increasingly sophisticated and global criminal organizations that commit these crimes. In the next section, we describe the results of 17 interviews examining these questions.

Interview topics and results

Our conversations with payment system participants were loosely organized around three topics: payment trends and fraud (especially related to data breaches), liability (for fraud losses) and incentives (to prevent fraud), and coordination and information sharing. In the following subsections, we introduce each topic and describe the insights gained from our conversations with the interviewees.

Payment trends and fraud

Modern data storage systems, online information sharing, and the growing number and variety of firms using or offering access to payment card systems have increased the potential points of entry that might be exploited by sophisticated criminal organizations. The technology to secure those access points has improved over time, so the larger question is whether, on net, payment card systems are more or less vulnerable than in the past.

For example, today, more organizations may have a business need to retain personal consumer financial data, and any of these firms may be a potential target for criminals. Financial institutions must consider the data security practices of these firms when providing them payment-related services. Another characteristic of today's payment system is the demand by consumers for around-the-clock payment servicing, in the form of supporting either transaction processing (for example, online purchases) or access to account management functions (for example, online banking). To the extent that meeting this need requires alternative access points (such as the Internet or a mobile device) or alternative service providers (such as online security firms or cellular providers), the number of potential points or places at which data can be compromised increases. Potential access points must be made more secure to manage the increased risks. And if one access point is penetrated, the amount of data potentially at risk must be limited in order to control the potential scale of the damage.

In this complex environment, market participants and regulatory, supervisory, and oversight authorities must determine whether payment methods carry excessive fraud risk; who is liable when payment fraud occurs; how losses are allocated; what consumer protections should be in place; how notification of fraud should be handled; and how standards should be defined to manage the incidence of fraud. Additionally, payment providers must authenticate consumers whom they have never met and authorize electronic transactions from which they might be far removed. And increasingly, they must do these tasks in real time. Carrying out all of these tasks is quite a tall order, but necessary to prevent and mitigate fraud.

Interview results

Many respondents emphasized that as the number, types, and complexity of electronic payments grow, so too do the opportunities for committing fraud. Electronic payments are evolving in the locations or channels in which they might be used by consumers--for example, they can now be made at nonbank financial centers (such as check cashers or retail stores) or even vending machines. In addition, the physical forms of electronic payments are evolving--for example, some consumers can now use contactless cards (payment cards that use chip technology to allow for tap-and-go payments) and mobile devices to execute payments. (30)

Several interviewees stressed that while traditional card payments and transactional practices are important to study for fraud risks, it is also important to consider emerging payment practices. For example, one interviewee noted that ACH networks are moving from relatively safe, recurring payments with trusted payees to new forms of nonrecurring payments, which likely carry higher fraud risks because distinguishing between legitimate one-time (nonrecurring) payments and fraudulent ones is more difficult. Such issues warrant further study. Several other interviewees indicated that mobile payments are an emerging area that bears special attention; the focus should be on gaining a better understanding of the risks to retail payment systems and investigating whether these may be different from the risks in more-traditional card-initiated payments. (31) Another interviewee pointed to the gradual adoption of contactless payment cards in the United States. This interviewee said that while the back-end processing remains the same as in contact environments, an inappropriately configured contactless front end (for example, with weak encryption) at the point of sale might increase fraud risk.

Interviewees also highlighted changing consumer payment preferences and noted that these changes have a material bearing on the ongoing development of fraud-risk-management systems. For example, according to one interview with a large merchant, in 2003, PIN (personal identification number) debit accounted for only 10 percent of its total transactions, compared with 35 percent in 2009. Thus, static four-digit PINs designed for use at on-premise and later off-premise ATMs are now being used at a much larger number of POS terminals in very different and diverse physical environments. (32) As payment methods change and new types of payments or new types of providers emerge, security systems must adapt to these developments. Several interviewees discussed the challenge of balancing risk mitigation and support for innovation in the constantly evolving electronic payment system.

Along similar lines, interviewees held a consensus that criminals' ability to rapidly change their tools and adopt new tactics may significantly increase the threats posed to the payments system. Most interviewees noted that the management of fraud risk must be at least as dynamic as the adoption and use of new tools, techniques, and tactics by those engaged in fraudulent activity. Interviewees agreed that making one-time assessments of a company's systems and satisfying minimum security standards at one point in time were hardly sufficient. Hackers are committed to finding new ways to compromise systems and steal personal and card data, so weaknesses must be uncovered before they can be exploited.

Moreover, as certain types of organizations tighten security, criminals respond by changing their targets and points of attack. For example, one interviewee mentioned that payment processors and merchants are not the only targets for illegally obtaining payment information; payroll processors and other firms need to be aware of the problem as well. In addition, fraudsters recognize that institutions are tightening the security of data at rest, which are stored in internal systems. Thus, criminals have begun targeting vulnerabilities present when data are moved (or transmitted) either between payment nodes or within a company's internal systems.

Several interviewees said that companies cannot ignore threats that may result from a shortfall in internal controls or communication. Some interviewees noted an increase in internal fraud--that is, fraud committed by company employees or contractors. (33) Access controls and tracking mechanisms are important tools in limiting this risk. Similar issues arise among independent firms along the payment chain. One interviewee said that, for example, a lot of effort has been put into front-end security, where the payment transaction is made. However, some interviewees stated that much work still needs to be done in the communication between the merchant and the processor.

Liability and incentives

As consumers, merchants, and payment providers struggle with the issue of payment fraud, we recognize that it is not realistic to eliminate fraud entirely. Rather, the goal ought to be to encourage the adoption of risk-management practices that strike a balance between excluding unduly risky payment options and rigidly dictating payments choices. Collaboration within and among companies is a necessary aspect of successful payment fraud management, since security is expensive to achieve and maintain. In order to be effective, payment fraud prevention and mitigation efforts need to include all parties "touching" the payment transaction. To do this, the parties' incentives must be properly aligned.

In our interviews, we asked whether the current incentive structure for payment card systems best addresses data security risks. For example, do current network rules assign a larger share of liability for losses to those participants most able to take actions to minimize those losses for the system as a whole? And if the current rules fail to achieve this, are there incentive problems at the network level or is there another explanation? (34) If incentive problems exist, what is the nature of these problems?

Interview results

Merchants, banks, networks, and processors all share responsibilities for protecting a payment system against data breaches, but the extent to which these responsibilities are equitably distributed was a frequent point of discussion during our interviews. A number of interviewees contended that incentives to prevent fraud are misaligned. This sentiment was particularly strong among participants on the merchant and acquiring side of payment card processing. According to a number of interviewees, merchants have a vested interest in protecting data in order to maintain their reputations and brands as well as to avoid chargebacks, which occur when firms fail to comply with network rules. However, these interviewees noted that merchants do not feel that they have ownership over the fraud mitigation system with which they must comply, and they often feel that blame for fraud is somewhat arbitrarily placed on them. One merchant interviewee stated that "the payment system is not our system."

Other interviewees stated that the current system of shared liability, wherein both issuers and acquirers have some liability for fraud losses, appears to be effective: Incentives to prevent and mitigate fraud in that system have kept direct credit card fraud losses relatively modest for almost a decade. That said, these interviewees noted that this apparent level of success in managing fraud losses may limit the incentive to develop new innovative security measures, especially if they are expensive. For example, one representative from a large bank said that his organization assessed its fraud mitigation tactics as being successful and considered the addition of more sophisticated authentication procedures to be unnecessary at that time. However, fraud risks are constantly evolving, necessitating solutions that can predict or respond to new threats.

As part of the discussion about incentives to invest in data security, several interviewees noted that compared with small firms, large firms may have greater financial resources to make investments in data security. For example, our interviews suggested that large banks and big-box merchants may be better positioned financially to develop in-house security systems, to incorporate security products into their business processes, and to meet data security requirements imposed on them by private sector or public sector actors. Our interviews also suggested that small processors, small ISOs, and small merchants are likely to be more cost sensitive than their larger counterparts when considering investments in data security. Several interviewees noted that to the extent that data security costs become prohibitively expensive for these firms, a barrier to entry to payment card systems could be created.

Payment card fraud losses among issuers, as a percentage of transaction value, have remained relatively stable over the past decade. Nevertheless, the data breaches described previously suggest that hackers have developed increasingly sophisticated techniques for identifying and exploiting vulnerabilities. And these experiences indicate that criminals may be able to scale their fraud quickly. As a result, payment system participants are paying increased attention to the risks posed by data breaches.

According to our interviews, most large banks are employing fraud mitigation and data security programs that may be proprietary or other programs provided by third-party vendors and processors (or a combination of the two). Merchants, acquirers, and processors are also employing fraud prevention and data security systems that may already include or may soon include innovative solutions, such as end-to-end encryption and tokenization. (35)

Several interviewees stressed that incentives are also important for consumers in order to combat fraud. Some merchants argue that consumers lack sufficient incentives to protect their own data because of statutes or regulations that limit consumer liability for fraudulent transactions and zero liability rules and other protections offered by banks and card networks. According to this perspective, the problem is one of moral hazard. Put another way, even if consumers are best positioned to prevent fraud (by protecting their personal and account information), they may not be sufficiently motivated to do so because they bear little of the costs resulting from fraudulent transactions except in the case of identity theft. (36) Indeed, some interviewees argued that strong consumer protections from fraud losses might explain the relatively modest consumer reactions to large data breaches observed to date. Nevertheless, an interviewee from a large bank stated that a policy of shifting liability to consumers could backfire, since consumers might move away from payment cards that do not offer zero liability.

A number of interviewees expressed a related concern about the level of security associated with online payments initiated using consumers' computers. Several interviewees indicated that consumers' computers can be the weakest link in the data security chain. Setting security standards for personal and corporate computing is one way that the public sector could get involved to make consumer electronic payments safer. For example, one option suggested was to put additional responsibilities on Internet service providers (ISPs) for ensuring greater security in personal and corporate computing. (37) One interviewee also suggested that a restricted top-level domain, such as .bank, could add protection by offering greater controls and more regulated entry into businesses facilitating payments via the Internet.

Despite comments by some interviewees that incentives to prevent and mitigate fraud are misaligned, a number of interviewees also mentioned companies that have advanced fraud protection strategies. Indeed, some companies exist for the sole purpose of providing banks and others with security solutions.

Some interviewees argued that the provision of fraud protection is a profitable business that can offer a competitive advantage. For example, banks, merchants, networks, and processors may be able to advertise better security as a differentiating factor between them and their competitors. The ability to convey such a message may also act as an incentive for other companies to innovate. This is an example of using market dynamics to improve incentives to invest in better security. But there may also be a downside to this approach. Some interviewees argued that if establishing a competitive advantage in fraud prevention proves to be important, private firms may be reluctant to rapidly share their know-how and lessons learned from their own experiences combating fraud attacks. The result would be an uneven level of defenses across the industry.

Coordination and information sharing

As noted earlier, an aspect of the evolution of electronic payment systems in the United States over the past few decades has been a movement toward a more open environment, with multiple parties (including nonbanks) processing or "touching" cardholder information. These parties include, at a minimum, both card-acquiring and card-issuing banks, a number of independent payment networks (card networks, ACH networks, and PIN-debit-only electronic benefit transfer [EBT] networks), payment-card-accepting and other merchants, and third-party processors. These parties may also include nonbank intermediaries and providers of alternative financial services.

In the United States, the resulting industrial structure has become more complex, and the participants have become highly differentiated. Both developments may make effective coordination more difficult to achieve over time. (38) By contrast, European payment markets are relatively more concentrated and, therefore, may present an easier path to coordinating data protection policies. In addition, the network participants in Europe may be less specialized than those we observe in the United States. But it is also the case that European regulatory bodies have played a more active role than their U.S. counterparts with respect to supporting coordination on data security in payment systems. (39) But the European approach has its drawbacks, too. Adopting monolithic security solutions also poses certain risks. For example, if the security design is breached, the breach could be exploited almost immediately and at about the same scale as the payment system itself.

In the United States, there are examples of specially designed efforts in both the public sector (40) and the private sector (41) to share information related to identity theft and payment fraud. One example is the Information Sharing and Analysis Centers (ISACs) established under a presidential directive to improve information sharing about physical and cybersecurity threats. Several industry sectors, including the financial services industry, established ISACs in response to this mandate. The Financial Services Information Sharing and Analysis Center (FS-ISAC) provides an increasingly comprehensive information distribution system that allows a broad array of financial services companies, financial regulatory agencies, law enforcement and intelligence agencies, and nonbank firms integral to the financial sector to exchange information and receive alerts related to fraud, cybercrime, and data breaches, in a real-time or nearly real-time environment. (42) In addition, many U.S. states now require public disclosure of data breaches and notices sent to individuals whose records have been compromised. State laws establishing such requirements are designed primarily to mitigate harm to consumers after breaches have already occurred. Still, features such as credit report monitoring and credit freezes can help detect or prevent subsequent fraud attempts.

While FS-ISAC has played an important role in facilitating information sharing among firms in the financial services industry, data breaches can still occur at firms outside of this industry, and the data stolen in these breaches can result in financial fraud. Very rapid and detailed information sharing by breached parties across industry sectors might also help identify vulnerabilities before sensitive data are stolen from others and reduce the amount of information stolen. Additionally, speedy and thorough information sharing may lead to firms and industries quickly sharing best practices in response to a particular type of compromise. There are signs of ample demand for improved information sharing. In a recent survey, 93 percent of antifraud professionals agreed that information sharing helps prevent fraud, and 78 percent would like to see more information sharing. (43)

Today, in the United States, the mitigation of fraud risk in payment card systems is largely coordinated by network rules. These rules are determined by each network and must be adhered to by financial institutions (and their agents) that issue branded payment cards or acquire transactions made with those cards, merchants that accept payment cards, and third parties that process those cards. The revenues and profitability of payment card networks are generally increasing in transaction volumes. As a result, payment card networks have strong incentives to ensure the integrity of these electronic payment systems. In theory, they should also be able to shape the means of coordinating the incentives among their member institutions. Potential levers include technological standards, loss allocation rules, and variations in interchange fee rates, to name just a few. (44)

Further, as indicated earlier, the five major card networks have coordinated to establish uniform standards for data system security through the Payment Card Industry Data Security Standard. PCI DSS is the set of data security standards that all card network participants, including issuers, merchants, and processors, are required to meet. (45) (As of June 30, 2012, 97 percent of Visa's Level 1 merchants, 93 percent of Level 2 merchants, and 60 percent of Level 3 merchants were compliant with PCI DSS. Compliance among Level 4 merchants, however, remained "moderate.") (46) Unfortunately, several recent data breaches have occurred at firms designated by auditors as being PCI compliant; such breaches naturally raise the question of whether PCI DSS offers sufficient data protection for critical electronic payment systems. The networks and others have emphasized that PCI compliance is not a static concept; it is something that must be continuously monitored and addressed. Those within the industry continue to evaluate the effectiveness of PCI DSS, and the PCI Security Standards Council is working to improve upon the original requirements. (47)

Next, we describe the industry's views on whether the complexity of U.S. retail payment markets presents a barrier to private sector coordination of efforts to address data security issues. We also explore how policymakers might support such coordination efforts.

Interview results

Most interviewees stated that an increased level of cooperation among payment participants is needed to enhance security. They offered specific suggestions for improvement, including mechanisms to share best practices and coordinate with law enforcement. Some interviewees said that the public sector could play a role in facilitating information sharing in the payment card industry, although opinions differed on whether the government has the necessary legal authority or whether further action is required to support such a role. One representative from a large financial institution argued that at a minimum, the federal government had an opportunity to improve processes for shutting down Internet sites selling stolen consumer data. Another representative from a large bank stated that current information-sharing mechanisms are sufficient. While this interviewee acknowledged that cooperation in response to new information might not be immediate, he said a positive spirit of cooperation exists.

The issue of competitive advantage was raised by several interviewees when considering the current state of coordination and information sharing among payment card system participants. Many said that as long as data security is seen as a differentiating factor that can be profitable, information sharing and cooperation will be more difficult to achieve. Despite this concern, several interviewees said that large card-issuing banks share information in a variety of ways, including through network-supported mechanisms and organizations such as FS-ISAC. Our interviewees indicated that information sharing by acquirers and merchants was more fragmented and less coordinated. Some of these companies are hindered by confidentiality or nondisclosure agreements with clients and, thus, are not allowed to coordinate and share information. In addition, one processor interviewee stated that a history of distrust of the payment card networks creates the perception that sharing information and, ultimately, coordinating with the networks may result in adverse consequences for a firm that admits to a data breach or other data security event. Further, some interviewees noted that in the past, payment card networks did not always share data breach information with acquirers; rather, they only shared this information with card issuers.

Other interviewees noted that some acquirers and processors have prioritized information-sharing efforts. For example, according to our interviews, an information-sharing group was formed following a significant data breach, and details about malware used in this case were distributed to payment card processors. It turned out that this malware had been used by criminals in more than 650 breaches at 300 companies, compromising 200 million payment cards; yet, this particular vulnerability had not been widely understood.

Several interviewees noted that the public sector may be uniquely positioned to play a role in developing a framework supporting greater sharing of information about incidents of fraud and cybercrime--within the private sector and public sector and between them, as well as across different industries. They said that government agencies such as the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) are well positioned to disseminate information about cyberthreats or to issue alerts. These agencies could also leverage their positions to get more players to participate in an information-sharing infrastructure.

In addition to information-sharing efforts, coordination is also important in setting standards or best practices for data security. As noted earlier, the development of PCI DSS is an example of a private sector effort to develop data security standards for participants in payment card systems. Several interviewees said that payment card networks are best positioned to design and enforce standards and to develop an effective set of "carrots and sticks" to encourage the various payment system participants to comply with the standards. An interviewee from a large bank noted that determining the right standards is not as difficult as enforcing those standards, specifically noting that the penalties for non-compliance need to be clear and enforceable. At the same time, interviewees disagreed on how successful PCI DSS has been at equitably meeting the needs of the very diverse group of payment system participants. Merchant interviewees argued that the standard itself is flawed and that meeting a flawed standard defeats the purpose of better securing payment card systems. One interviewee suggested an alternative to PCI DSS by stating that there is a need for federal regulations or standards that would define data necessary to execute a transaction by the various parties to the transaction and parameters for how long the data should be held by those parties.

In regard to designing standards, several interviewees stressed the importance of providing all relevant participants an opportunity to evaluate the standards. (48) For example, these parties may have very different perspectives on the strength of compliance incentives (the "carrots and sticks") incorporated into the standards for improving data security.

Interviewees generally agreed that law enforcement has become much more aware of the complexity of payment fraud and that the industry is learning how to cooperate with the FBI, Secret Service, FTC, and local law enforcement. One interviewee noted that federal law enforcement used to view payment fraud as a one-off event; but today, it recognizes that data breaches may threaten not only payment system security but also potentially the country as a whole (for example, if payment fraud is used to finance terrorist activities). This appreciation for data breach risks was one of the reasons the George W. Bush administration established its Identity Theft Task Force; the Obama administration has continued to focus on these risks, with special attention paid to cybersecurity.

In addition, the increasingly global scope of payment fraud concerned a number of industry participants. Hackers are able to build and manage databases of compromised accounts across multiple locations, making their activities more difficult to track and their operations more difficult to dismantle. Criminals realize that they can launder money across a variety of international jurisdictions, taking advantage of differences in laws and regulations. Further, they are able to coordinate "money mules," who physically move money and goods around but do not necessarily understand that they are working for a criminal enterprise.

This degree of international activity poses a significant problem for law enforcement. Some of the most sophisticated criminal networks are well adapted for working across national borders, yet a few interviewees noted that state and national law enforcement agencies face more boundaries and less interagency cooperation. One interviewee stated that for fraud and cyber-crime solutions to be effective, law enforcement agencies across the globe need to address geopolitical differences. Individual governments are pursuing their own security initiatives, but this interviewee pointed out that there should be more discussion and collaboration among nations around the world to combat fraud and cybercrime. (49)

Variations in the legal definition of payment fraud are also important to consider, particularly given the global nature of payment card fraud. An interviewee offered this example: A phishing email directs a person to a fake website, one that looks exactly like the real site but is controlled by hackers. This technique encourages the phishing target (the consumer) to visit the fake website and enter personal information. In some international jurisdictions, simply maintaining the fake website constitutes fraud, but in other countries, fraud has not occurred until money is actually stolen. Given such differences, antifraud measures may often be more difficult to enforce across borders than within some of them.

Other issues facing the enforcement of antifraud statutes include minimum-value thresholds for fraud cases and overlapping jurisdictions of the various law enforcement agencies. One interviewee said that cases are only likely to be pursued if they involve the theft of $10,000 or more; cases involving smaller amounts are unlikely to be investigated. This interviewee also commented that the government is dramatically under-investing in cybercrime investigations. Another interviewee claimed that having multiple law enforcement authorities with differing jurisdiction over payment fraud can spread resources to fight fraud thin. The consensus among participants in these interviews was that more resources both in law enforcement and in the regulatory community are required.

Lessons from the interview results

The management of payment card fraud raises a number of difficult questions: Have changes in technology increased or decreased the vulnerability of payment card systems to data breaches that might undermine consumer confidence in them? Do payment card networks, their partners, and their customers have the appropriate incentives to take precautions to avoid card fraud? Are the costs of payment card fraud or of avoiding this fraud borne by the appropriate parties? For example, do nonfinancial firms that retain personal and account data have sufficient incentives to protect this information? Are payment card networks able to make efficient choices about managing fraud risks and implement antifraud measures in a timely manner? If not, are there reasons to believe that public authorities could facilitate better or timelier decisions? If such a role is appropriate, what information and expertise would government need to have?

The answers to these questions are not simple. (50) Taken as a whole, our interview results convey mixed views on most of these topics and, in particular, on the role that government should play or is capable of playing. That said, some general observations can be made with respect to areas of shared concern and insight among the interviewees.

Most interviewees recognized that payment card systems have benefited from dramatic advances in information, computing, and telecommunications technologies over the past four decades. These advances have helped create opportunities for new participants in payment card systems, such as nonbank payment providers, to introduce innovative products and services, like prepaid cards and Internet shopping. At the same time, these additions to the traditional payment card system model present new risks and require a reevaluation of the security protocols that were developed in the past.

Of course, criminals can also leverage technological advances to develop, test, and deploy their tools quickly. And when they find promising vulnerabilities, there is at least the possibility that their attacks will rapidly increase in scale. Several interviewees emphasized the adeptness of thieves to identify vulnerabilities and quickly exploit them. They also noted that the vulnerabilities may include a type of payment system participant and a point in the payment processing chain, as well as a data storage system risk and a software weakness. Any incremental risk that results from innovation should be offset by careful risk management and investments in new defenses, with an emphasis on dynamic and flexible data security approaches, rather than static ones. Several interviewees observed that a national focus on the security of the information and communications infrastructure in the United States could result in significant improvements in securing retail payment systems, including payment card systems.

The interviewees expressed very mixed views about the incentives to prevent fraud and to mitigate its consequences among various payment system participants. Respondents generally considered the incentives at their organizations to be better than those in other parts of the transaction chain. This is perhaps an indirect recognition of the interdependence

of payment participants in securing of the system and the importance of adequate coordination of their efforts.

A number of interviewees stated that the protections afforded to consumers from losses associated with fraudulent transactions limit consumers' incentives to protect their cards, personal information, and computers. Others pointed out that these protections do help to ensure public confidence in card payments and that diluting those protections may increase the likelihood of a mass abandonment of payment cards if a tail event as we described earlier were to occur.

There was widespread agreement that a key ingredient in protecting payment systems from fraud is coordination of fraud defenses among participants in these systems. For payment card systems, this coordination function is generally performed by the card networks. Many participants expressed the view that in the United States, payment applications have become so diverse and payment firms so specialized that effective coordination is becoming more difficult. Others questioned whether the networks had exactly the right motivations or were sufficiently well equipped to ensure that all payment participants had the right incentives. Such concerns led some interviewees to speculate about an increased role of government as a coordinator. Others wondered whether government was sufficiently nimble or adequately equipped to play such a role.

There was greater consensus about a number of roles in which government either is essential or could likely be more helpful. The first is in its law enforcement capacity, which may require additional resources. Given the international character of many modern electronic payment systems, interviewees recognized that law enforcement efforts must also take on a more international character. This too will require additional coordination--in this case, among governments around the world. Also, interviewees mentioned the need for more comprehensive information about the volume, character, and drivers of payment card fraud and data breaches. In general, interviewees supported expanding the collection and dissemination of data and new research, which governments can facilitate.

Most interviewees also said that the government could play a useful role in facilitating a more rapid dissemination of actionable information about new threats to the security of payment systems. Numerous information-sharing networks already exist, but some of our respondents contended that information exchanges remained too balkanized and too slow in many instances. The U.S. federal government is already an active participant in a number of these exchanges and, in some instances, contributes information obtained through various law enforcement and intelligence channels. (51)

Several respondents argued that the government can play a special role as both a participant and a facilitator of the exchange of actionable information about data breaches because it may be uniquely positioned to address private sector incentives in markets where security may be a source of competitive advantage. If maintaining a reputation as a secure provider of payment services is good for business, then firms will have incentives to invest in appropriate procedures and technologies. But the desire to maintain a competitive advantage may act to discourage private actors from sharing information about the nature of any new threats they are experiencing. Government does not face this tension. In addition, by acting as an important source of information while insisting on reciprocity, government can tip private sector incentives in the direction of sharing more information--and sooner. (52)

Conclusion

The evolution of our electronic payment networks provides greater flexibility, convenience, and efficiency for consumers, businesses, and governments. At the same time, advancements in these networks can lead to opportunities for fraudsters, including the potential for large-scale data breaches. To manage these new risks, payment system stakeholders must make security an integral part of the provision of retail payments. Our interview results suggest that to enable the smooth and efficient operation of the complex U.S. retail payment system, payment system participants need to find more ways to cooperate, share relevant information, and innovate to stay ahead of the criminal gangs that perpetrate payment fraud using an array of sophisticated tools and procedures.

REFERENCES

Abdul-Razzak, Nour, Katy Jacob, and Richard D. Porter, 2011, "Improving security for remote payments," Chicago Fed Letter, Federal Reserve Bank of Chicago, No. 293a, December, available at www.chicagofed.org/digital_assets/publications/ chicago_fed_letter/2011/cfldecember20112_293a.pdf.

Amromin, Gene, and Richard D. Porter, 2009, "Economic Perspectives special issue on payments fraud: An introduction," Economic Perspectives, Federal Reserve Bank of Chicago, Vol. 33, First Quarter, pp. 2-6, available at www.chicagofed.org/digital_assets/publications/economic_perspectives/2009/ep_1qtr2009_part1_amromindaorter.pdf.

Anderson, Ross, and Tyler Moore, n. d., "Information security economics--and beyond," University of Cambridge, Computer Laboratory, mimeo, available at www.cl.cam.ac.uk/~rjal4/Papers/econ_crypto.pdf.

Board of Governors of the Federal Reserve System, 2011 a, "Debit card interchange fees and routing," Federal Register, Vol. 76, No. 139, July 20, pp. 43478-43488, available at www.federalreserve.gov/reportforms/formsreview/RegII_20110720_ifr.pdf.

--, 2011b, "2009 interchange revenue, covered issuer cost, and covered issuer and merchant fraud loss related to debit card transactions," report, Washington, DC, June, available at www.federalreserve.gov/paymentsystems/files/debitfees_costs.pdf.

Bradford, Terri, Fumiko Hayashi, Christian Hung, Simonetta Rosati, Richard J. Sullivan, Zhu Wang, and Stuart E. Weiner, 2009, "Nonbanks and risk in retail payments: EU and U.S.," in Managing Information Risk and the Economics of Security, M. Eric Johnson (ed.), New York: Springer Science+Business Media, pp. 17-54.

CardLine, 2009, "Data fears influencing habits," American Banker, Vol. 174, No. 50, March 16, p. 10.

Cheney, Julia S., 2010, "Heartland Payment Systems: Lessons learned from a data breach," Federal Reserve Bank of Philadelphia, Payment Cards Center, discussion paper, No. DP10-01, January, available at www.philadelphiafed.org/consumer-credit-and-payments/payment-cards-center/publications/discussion-papers/2010/19-2010-January-Heartland-Payment-Systems.pdf.

--, 2007, "An update on trends in the debit card market," Federal Reserve Bank of Philadelphia, Payment Cards Center, discussion paper, No. DP07-07, June, available at www.philadelphiafed.org/consumercredit-and-payments/payment-cards-center/publications/discussion-papers/2007/D2007JuneUpdateDebitCardMarketTrends.pdf.

--, 2005, "Identity theft: Do definitions still matter?," Federal Reserve Bank of Philadelphia, Payment Cards Center, discussion paper, No. DP05-10, August, available at www.philadelphiafed.org/consumer-creditand-payments/payment-cards-center/publications/discussion-papers/2005/identity-theft-definitions.pdf.

--, 2004, "Identity theft: Where do we go from here?," Federal Reserve Bank of Philadelphia, Payment Cards Center, discussion paper, No. DP04-03, April, available at www.philadelphiafed.org/consumercredit-and-payments/payment-cards-center/events/conferences/2004/IdentityTheft_042004.pdf.

Cheney, Julia S., Robert M. Hunt, Katy R. Jacob, Richard D. Porter, and Bruce J. Summers, 2012, "The efficiency and integrity of payment card systems: Industry views on the risks posed by data breaches," Federal Reserve Bank of Philadelphia, Payment Cards Center, discussion paper, No. DPI 2-04, October, available at www.philadelphiafed.org/consumer-creditand-payments/payment-cards-center/publications/discussion-papers/2012/D-2012-Efficiency-andIntegrity-of-Payment-Card-Systems.pdf.

Consumer Financial Protection Bureau, 2012, "Consumer Financial Protection Bureau to supervise credit reporting," press release, Washington, DC, July 16, available at www.consumerfinance.gov/pressreleases/consumer-financial-protection-bureau-to-superivsecredit-reporting/.

Contini, Darin, Marianne Crowe, Cynthia Merritt, Richard Oliver, and Steve Mott, 2011, "Mobile payments in the United States: Mapping out the road ahead," Federal Reserve Bank of Atlanta, Retail Payments Risk Forum, white paper, March 25, available at www.frbatlanta.org/documents/rprf/rprf__pubs/110325_wp.pdf.

Discover Financial Services, 2012, "Discover implements 2013 EMV mandate in U.S., Canada and Mexico," Business Wire, March 15, available at www.businesswire.com/news/home/20120315005409/en/Discover-Implements-2013-EMV-MandateU.S.-Canada.

Federal Reserve Bank of Atlanta, Retail Payments Risk Forum, 2011, "The Role of Government in Payments Risk and Fraud--Conference summary," available at www.frbatlanta.org/news/conferences/11rprf_summary.cfm.

Federal Reserve Bank of Atlanta and Federal Reserve Bank of Boston, Mobile Payments Industry Workgroup, 2010, "Mobile payments industry roundtable summary," report, Atlanta, available at www.frbatlanta.org/documents/rprf/rprf_events/mobile-payments-roundtable-summary.pdf.

Federal Reserve System, 2011, The 2010 Federal Reserve Payments Study--Noncash Payment Trends in the United States: 2006--2009, report, Washington, DC, updated April 5, 201 I, available at www.frbservices.org/files/communications/pdf/press/2010_payments_study.pdf.

Federal Trade Commission, 2012, Consumer Sentinel Network Data Book for January--December 2011, February, available at www.ftc.gov/sentinel/reports/sentinel-annual-reports/sentinel-cy2011.pdf.

Fnrletti, Mark, and Stephen Smith, 2005, "The laws, regulations, and industry practices that protect consumers who use electronic payment systems: Credit and debit cards," Federal Reserve Bank of Philadelphia, Payment Cards Center, discussion paper, No. DP05-01, January, at www.philadelphiafed.org/consumer-creditand-payments/payment-cards-center/publications/ discussion-papers/2005/ConsumerProtectionPaper_CreditandDebitCard.pdf.

Herbst-Murphy, Susan, 2012, "Government use of the payment card system: Issuance, acceptance, and regulation," Federal Reserve Bank of Philadelphia, Payment Cards Center, conference summary, No. CS12-01, July, available at www.philadelphiafed.org/consumer-credit-and-payments/payment-cards- center/publications/conference-summaries/2012/C-2012Government-Use-of-the-Payment-Card-System.pdf.

Jacob, Katy, and Bruce J. Summers, 2008, "Assessing the landscape of payments fraud," Chicago Fed Letter, Federal Reserve Bank of Chicago, No. 252, July, available at www.chicagofed.org/digital_assets/publications/chicago_fed_letter/2008/cfljuly2008_252.pdf.

Javelin Strategy & Research, 2012, 2012 Identity Fraud Sltrvey Report: Social Media and Mobile Forming the New Fraud Frontier, Pleasanton, CA, February, available for purchase at https://www.javelinstrategy.com/brochure/239.

Kahn, Charles M., and Jose Manuel Linares-Zegarra, 2012, "Identity theft and consumer payment choice: Does security really matter?," University of Illinois at Urbana--Champaign and University of St Andrews, working paper, February 14, available at http://ssrn.com/abstract=2005694.

Keitel, Philip, 2008, "Legislative responses to data breaches and information security failures," Federal Reserve Bank of Philadelphia, Payment Cards Center, discussion paper, No. DP08-09, December, available at www.philadelphiafed.org/consumer-credit-and-payments/payment-cards-center/publications/discussion-papers/200g/D2008DecemberLegislativeResponsesToDataBreaches.pdf.

Kjos, Ann, 2007, "The merchant-acquiring side of the payment card industry: Structure, operations, and challenges," Federal Reserve Bank of Philadelphia, Payment Cards Center, discussion paper, No. DP07-12, October, available at www.philadelphiafed.org/consumer-credit-and-payments/payment-cardscenter/publications/discussion-papers/2007/D2007OctoberMerchantAcquiring.pdf.

Krebs, Brian, 2009, "Data breach led to multi-million dollar ATM heists," Washington Post, February 5, available at http://voices.washingtonpost.com/securityfix/2009/02/data_breach_led_to_multi-milli.html.

Lacey, John H., 2011, "RSA data breach the result of successful spear phishing," Massachusetts Data Privacy Law Blog, April 7, available at www.massdataprivacylaw.com/data-breach/rsa-data-breach-the-result-ofsuccessful-spear-phishing/.

Liu, Edward C., Gina Stevens, Kathleen Ann Ruane, Alissa M. Dolan, and Richard M. Thompson H, 2012, "Cybersecurity: Selected legal issues," CRS Report for Congress, Congressional Research Service, No. R42409, April 20.

MasterCard Worldwide, 2012, "MasterCard introduces U.S. roadmap to enable next generation of electronic payments," press release, Purchase, NY, January 30, available at http://newsroom.mastercard.com/press-releases/mastercard-introduces-u-s-roadmapto-enable-next-generation-of-electronic-payments/.

PCI Security Standards Council, 2010, "PCI Security Standards Council releases version 2.0 of the PCI Data Security Standard and Payment Application Data Security Standard," press release, Wakefield, MA, October 28, available at https://www.pcisecuritystandards.org/pdfs/pr_l01028_standards._2.0.pdf.

Ponemon Institute, 2010, 2009 Annual Study: Cost of a Data Breach, report, Traverse City, MI, January, available at www.ponemon.org/local/upload/fckjail/generalcontent/18/fileUS_Ponemon_CODB_09_012209_sec.pdf.

Rashid, Fahmida Y., 2011, "ID theft declined in 2010 but average losses increased: Survey," e WEEK, February 10, available at www.eweek.com/c/a/Security/ID-Theft-Declined-in-2010-but-AverageLosses-Increased-Survey-814461/.

Roberds, William, and Stacey L. Schreft, 2009, "Data breaches and identity theft," Journal of Monetary Economics, Vol. 56, No. 7, October, pp. 918-929.

Robertson, David (publisher), 2012, "Visa & MasterCard--U.S. 2011," Nilson Report, No. 988, February, pp. 1, 9-11.

--. 201 I, "U.S. leads the world in credit card fraud, states The Nilson Report: Global credit card fraud losses increased 10.2% over 2009," press release for Nilson Report, Carpinteria, CA, November 21, available at https://nilsonreport.com/pdf/news/112111.pdf.

RSA Conference, eFraud Network Forum Program Committee, 2009, 2009 Online Fraud Benchmark Report, April 15, available at https://365.rsaconference.com/docs/DOC-1895.

Schreft, Stacey L., 2007, "Risks of identity theft: Can the market protect the payment system?," Economic Review, Federal Reserve Bank of Kansas City, Fourth Quarter, pp. 5-40, available at www.kansascityfed.org/Publicat/ECONREV/PDF/4q07Schreft.pdf.

Sidel, Robin, 2012, "Card processor: Hackers stole account numbers," Wall Street Journal, April 2, available by subscription at http://online.wsj.com/ article/SB10001424052702304750404577318083097652936.html.

Striekler, Laura, and Aurora Ellis, 2011, "Secret Service investigates Epsilon data breach," CBSNews.com, April 4, available at www.cbsnews.com/8301-31727_162-20050575-10391695.html.

Sullivan, Richard J., 2010, "The changing nature of U.S. card payment fraud: Industry and public policy options," Economic Review, Federal Reserve Bank of Kansas City, Second Quarter, pp. 101-133, available at www.kansascity fed.org/Publicat/Econrev/pdf/10q2Sullivan.pdf.

The Clearing House, 2011, "Project Compas executive summary for NACHA," report, New York, April 4.

Verizon RISK Team, 2012, 2012 Data Breach Investigations Report, New York, available at www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012__en_xg.pdf.

Visa Inc., 2011, "Visa announces plans to accelerate chip migration and adoption of mobile payments," press release, San Francisco, August 9, available at http://corporate.visa.com/newsroom/press-releases/press1142.jsp.

NOTES

(1) This article is based on Cheney et al. (2012)--a discussion paper published by the Payment Cards Center at the Federal Reserve Bank of Philadelphia.

(2) Credit, debit, and prepaid card transactions account for about 60 percent of the number and 5 percent of the value of noncash transactions in the United States. They account for a much higher share of the value of transactions at the point of sale (POS). Today, with the exception of the remaining checks used to pay recurring bills, debit cards and automated teller machines (ATMs) are the principal means consumers use to access funds in their transaction accounts. See Federal Reserve System (2011, p. 13) and The Clearing House (2011).

(3) For the purposes of this article, we define tail risk to mean that there is uncertainty over the precise probability of the occurrence of a highly unlikely but catastrophic event. We consider the abandonment of payment card systems or instruments as an example of tail risk associated with data breaches.

(4) Governments of all levels are replacing the remaining benefit disbursements that occur via paper check with some form of prepaid card, whose functionality depends on the existing payment card infrastructure. See Herbst-Murphy (2012).

(5) For a general discussion of payment fraud, see the special edition of the Federal Reserve Bank of Chicago's Economic Perspectives published in the first quarter of 2009, with an introduction by Amromin and Porter (2009).

(6) In economic terms, fraud, like pollution, creates externalities. If fraud is largely nonexistent, one can operate more freely with less caution. However, when fraud is rampant, one must operate much more vigilantly--which is a relatively expensive course of action.

(7) The actual allocation of losses will depend on the circumstances of the transaction and payment card network rules.

(8) The full set of costs includes nonmonetary costs incurred by consumers--such as the opportunity cost of time spent to verify transactions and replace compromised payment cards and, in the case of identity theft, to monitor and confirm the validity of credit accounts opened in the victim's name.

(9) By network effects, we mean in this context that a payment method will be more attractive to consumers when there are more places that accept that particular method of payment. Moreover, merchants and other businesses will be more willing to incur the costs of accepting payment cards when they know that many of their customers are ready and willing to use them.

(10) For more details on the card-acquiring bank function (that is, the merchant-acquiring function), see Kjos (2007).

(11) For card-based systems, the coordination function is performed by the networks, that is, American Express, Discover Financial Services, JCB (Japan Credit Bureau) International, MasterCard Worldwide, and Visa Inc.

(12) The CFPB has supervisory (for example, examination) authority (for the purposes of ensuring compliance with many federal consumer protection statutes) over nonbanks of all sizes in the residential mortgage, private education lending, and payday lending markets. The CFPB may, by rule, define a set of nonbanks that it determines are "larger participants" in markets for consumer financial products and services and establish supervisory authority over these firms. For example, the CFPB adopted a rule on July 16, 2012, to begin

supervising consumer reporting agencies (for example, credit bureaus or credit reporting companies) that have more than $7 million in annual receipts. See Consumer Financial Protection Bureau (2012).

(13) For additional details, see Keitel (2008).

(14) See Visa Inc. (2011), MasterCard Worldwide (2012), and Discover Financial Services (2012). For more information on the EMV standard, see www.emvco.com

(15) For a discussion related to this topic, see Cheney (2010).

(16) See Robertson (2011). Also see Sullivan (2010); Sullivan's estimate of fraud losses is based on the sum of direct losses borne by card issuers; POS merchants; and merchants in Internet, mail order, and telephone transactions.

(17) We calculated the value for the 2011 credit card fraud losses using data from Robertson (2012) for four of the five major networks--American Express, Discover, MasterCard, and Visa. In 2010, the Federal Reserve Board surveyed issuers subject to Regulation II (Debit Card Interchange Fees and Routing). The data on debit and prepaid card fraud losses are for the 2009 calendar year and represent total fraud losses, as reported by the issuers, for PIN (personal identification number) debit, signature debit, and prepaid card transactions. The Board of Governors of the Federal Reserve System also published data for PIN debit, signature debit, and prepaid debit fraud losses separately. See Board of Governors of the Federal Reserve System (2011a, p. 43480) and the Board of Governors of the Federal Reserve System (2011b).

(18) This estimate is based on Verizon's estimate that these breaches involved 174 million potentially compromised records, but that only about 3 percent of those involved payment card data. See Verizon RISK Team (2012, p. 42).

(19) See Cheney (2007, pp. 8-9).

(20) This statistic is from the Ponemon Institute (2010, p. 12). About two-thirds of this cost results from attrition of existing customers and less success in obtaining new ones.

(21) For a detailed account of the breach at Heartland, see Cheney (2010). Less is known about the breach at Global Payments, but see Sidel (2012). For information about the Epsilon and RSA data breaches, see Strickler and Ellis (2011) and Lacey (2011),. respectively.

(22) See Krebs (2009)

(23) The Verizon RISK Team (2012, p. 42) found that the vast majority of records compromised in 2011 contained personal information. Also, according to the Verizon RISK Team (2012, pp. 10--11), the majority of all data breaches (54 percent) occurred among restaurants and hotels, but relatively few records are stolen this way. Retailers and financial firms also accounted for significant shares of brcaches (20 percent and 10 percent, respectively).

(24) According to Javelin Strategy & Research's 2011 Identity Fraud Survey Report, in 2010 it took victims an average of 33 hours to resolve issues related to identity fraud (Rashid, 2011). The full Javelin report is available for purchase at https://www.javelinstrategy.com/ rescarch/Brochure-209.

(25) See Federal Trade Commission (2012).

(26) See Javelin Strategy & Research (2012). For further information on identity theft, see Schreft (2007).

(27) See CardLine (2009).

(28) These protections are defined in the Fair Credit Billing Act and the Electronic Fund Transfer Act and in "zero liability" policies created by private payment networks. For details, see Furletti and Smith (2005).

(29) See Cheney (2005).

(30) Traditionally, fraud has been measured, managed, and mitigated within each independent payment channel (for example, checking and ACH). In recent years, payment providers have recognized a growing interdependence in fraud management across channels, since criminals have learned to exploit vulnerabilities detected in one channel to extract information or value in others.

(31) For an in-depth discussion of mobile payments issues, see Federal Reserve Bank of Atlanta and Federal Reserve Bank of Boston, Mobile Payments Industry Workgroup (2010). Also see Contini et al. (2011).

(32) One interviewee provided the example of PIN pads at gasoline pumps as a new type of physical acceptance environment for PIN payment cards. This company noted that new ways had to be considered (and some developed) to effectively limit PIN payment card fraud in this environment. For example, gas stations may use zip code verification during the authorization process at the gas pump machines.

(33) This observation is consistent with a rising trend in the share of breaches that involve internal employees over the years 2004-09 as reported in Verizon RISK Team (2012, figure 10, p. 16). The share of fraud events resulting from insiders fell significantly thereafter.

(34) These incentive problems are discussed in greater detail in Anderson and Moore (n. d). For a theoretical explanation of the potential incentive problems, see Roberds and Schreft (2009).

(35) Encryption involves masking the valuable private information so that it is too expensive to decrypt it even when the information is illicitly intercepted. Currently, the most powerful form of encryption available in web browsers is 128-bit encryption. Tokenization involves masking the valuable information, such as a credit card number, with a token. The token might be, for example, an arbitrary number or combination of numbers and letters. Without the token look-up key, the random information has no value if it is stolen.

(36) While liability incentives for consumers are limited by the various protections offered, there is some recognition that identity theft is an entirely different matter. Consumers appear to have a general, albeit basic, understanding that they are largely rcsponsible for restoring their good credit standing in the case of identity theft and that such a restoration is often quite expensive in terms of both time and money.

(37) The Australian government developed a framework to address the problem of compromised personal computers (PCs). In 2005, the Australian Communications and Media Authority (ACMA) developed the Australian Interact Security Initiative (AISI), which works with ISPs and consumers. AISI is a free service provided by the ACMA that monitors data feeds on compromised Australian PCs. The agency sends a list of customers with compromised PCs to the ISP, which is required to notify the customers. The ISP may contact the customers by phone or letter and provide advice to fix the problem, but in some cases, it may even disconnect customers to contain the spread of a malware threat.

(38) Coordination may include efforts to share information among payment system participants, as well as efforts to move participants toward better data protection practices.

(39) For more details on the evolution of regulatory structures in the European Union (EU) and the United States, see Bradford et al. (2009).

(40) For example, the FTC maintains the Identity Theft Clearinghouse, which provides law enforcement agencies with direct access to detailed incidence data recorded as part of the complaints and also allows the FTC to share aggregate data with consumers, other government agencies, and industry constituencies. For additional examples of identity theft information-sharing efforts, see Cheney (2004).

(41) Early Warning Services is an example of a limited liability bankowned company that essentially is a private sector data-sharing initiative. Its services include verifying identities and authenticating account holders' information, as well as screening potential new and existing customers for a prior history of fraud or account abuse. For more information on Early Warning Services, see www.earlywarningcom/about2.html.

(42) According to the FS-ISAC's website, the FS-ISAC "was established by the financial services sector in response to 1998's Presidential Directive 63. That directive--later updated by 2003's Homeland Security Presidential Directive 7--mandated that the public and private sectors share information about physical and cybersecurity threats and vulnerabilities to help protect the U.S. critical infrastructure." For more information about FS-ISAC, see www.fsisac.com/about/. Other industries have also established ISACs. For example, the communications sector and the electricity sector have formed ISACs.

(43) See RSA Conference, eFraud Network Forum Program Committee (2009, p. 5).

(44) The Federal Reserve Board's Regulation II applies to debit card issuers with consolidated assets of $10 billion or more and allows debit card payment networks to vary interchange fee rates for transactions below the maximum interchange fee permitted by the Board's standards. Interchange fee is a term used in the payment card industry to describe a fee paid between banks for accepting card-based transactions. This fee is usually paid by a merchant's financial institution to a payor's financial institution.

(45) For more information on PCI, visit the PCI Security Standards Council's website, https://wwwpcisecuritystandards.org

(46) Level classifications vary by transaction volume. According to Visa's website, Level 1 merchants process over 6 million Visa transactions per year. Other merchants may be required to meet Level 1 PCI compliance requirements at Visa's sole discretion. Level 2 merchants process between I million and 6 million Visa transactions per year. Level 3 merchants process between 20,000 and 1 million Visa e-commerce transactions per year. Level 4 merchants comprise those that process fewer than 20,000 Visa e-commerce transactions and all other merchants that process up to 1 million Visa transactions per year. For more details, see http://usa.visa.com/merchants/risk_management/cisp_merchants.html. The compliance rates for the different merchant levels are available at http://usa.visa.com/download/merchants/cisp_pcidss_compliancestats.pdf (accessed on October 24, 2012).

(47) For example, in October 2010, the PCI Security Standards Council released version 2.0 of PCI DSS. See PCI Security Standards Council (2010).

(48) Box 1 (p. 133) provides a discussion of how the PCI Security Standards Council gets participating organizations involved in the process of evaluating and updating the PCI DSS. For more details on the rights and responsibilities of participating organizations, see https://www.pcisecuritystandards.org/get involved/rightsresponsibilities.php.

(49) The Federal Reserve Bank of Atlanta's Retail Payments Risk Forum addressed the need for improved international coordination among law enforcement organizations in its November 2011 payments conference--The Role of Government in Payments Risk and Fraud. For a summary of the conference discussion, see Federal Reserve Bank of Atlanta, Retail Payments Risk Forum (2011).

(50) For additional discussions of the policy issues related to fraud in consumer payments, see Abdul-Razzak, Jacob, and Porter (2011) Also see Sullivan (2010) and Jacob and Summers (2008).

(51) Recently, Congress has been considering a number of cybersecurity bills that aim to increase the dissemination of actionable information obtained in the public sector as well as improve incentives for private actors to share the information they have. For further details, see Liu et al (2012).

(52) This is analogous to the role that private credit bureaus play. In the United States, reporting to a credit bureau is not mandatory. Yet hundreds of thousands of organizations find it worthwhile to share their information in exchange for the ability to use information provided by all members.

Julia S. Cheney is manager of research and programming and Robert M. Hunt is vice president and director of the Payment Cards Center at the Federal Reserve Bank of Philadelphia. Katy R. Jacob is a business economist and Richard D. Porter is a vice president and senior policy advisor in the Economic Research Department at the Federal Reserve Bank of Chicago. Bruce J. Summers is an independent consultant on payment systems and technology management. The authors thank those who participated in the interviews described in the article. They also thank Anna Lunn and James van Opstal for their assistance and Darin Contini, Douglas Evanoff, Fumiko Hayashi, Joanna Stavins, Rick Sullivan, and Kirstin Wells for many helpful conversations. The views expressed are the authors' and do not necessarily reflect the views of the Federal Reserve Bank of Philadelphia.

Economic Perspectives is published by the Economic Research Department of the Federal Reserve Bank of Chicago. The views expressed are the authors' and do not necessarily reflect the views of the Federal Reserve Bank of Chicago or the Federal Reserve System.

Charles L. Evans, President; Daniel G. Sullivan, Executive Vice President and Director of Research; Spencer Krane, Senior Vice President and Economic Advisor; David Marshall, Senior Vice President, financial markets group; Daniel Aaronson, Vice President, microeconomic policy research; Jonas D. M. Fisher, Vice President, macroeconomic policy research; Richard Heckinger, Vice President, markets team; Anna L. Paulson, Vice President, finance team; William A. Testa, Vice President, regional programs; Richard D. Porter, Vice President and Economics Editor; Helen Koshy and Han Y. Choi, Editors; Rita Molloy and Julia Baker, Production Editors; Sheila A. Mangler, Editorial Assistant.

Economic Perspectives articles may be reproduced in whole or in part, provided the articles are not reproduced or distributed for commercial gain and provided the source is appropriately credited. Prior written permission must be obtained for any other reproduction, distribution, republication, or creation of derivative works of Economic Perspectives articles. To request permission, please contact Helen Koshy, senior editor, at 312-322-5830 or email [email protected].

ISSN 0164-0682
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有