首页    期刊浏览 2024年12月14日 星期六
登录注册

文章基本信息

  • 标题:Economic Perspectives special issue on payments fraud: an introduction.
  • 作者:Amromin, Gene ; Porter, Richard D.
  • 期刊名称:Economic Perspectives
  • 印刷版ISSN:1048-115X
  • 出版年度:2009
  • 期号:March
  • 语种:English
  • 出版社:Federal Reserve Bank of Chicago
  • 摘要:The volume starts with an extensive summary of conference presentations, keynote addresses, and open floor discussions, written by Tiffany Gates and Katy Jacob. In order to give a sense of the intense back-and-forth exchanges that took place during this day-and-a-half-long event, the authors structure their summary around the broad themes of the discussion rather than simply presenting a chronological account. The themes are as follows: organizational structures for management of fraud risks; technological innovation; alignment of incentives for fraud prevention among consumers, merchants, and payments providers; and regulatory policies.
  • 关键词:Bank fraud;Federal Reserve banks;Fraud

Economic Perspectives special issue on payments fraud: an introduction.


Amromin, Gene ; Porter, Richard D.


In this special issue of Economic Perspectives, we present selected papers based on our recent conference, Payments Fraud: Perception Versus Reality, hosted by the Federal Reserve Bank of Chicago on June 5-6, 2008. The conference brought together decision-makers from the banking, payments, legal, regulatory, and merchant communities for a wide-ranging discussion of the threats to the security of the payments system and how those threats might best be addressed.

The volume starts with an extensive summary of conference presentations, keynote addresses, and open floor discussions, written by Tiffany Gates and Katy Jacob. In order to give a sense of the intense back-and-forth exchanges that took place during this day-and-a-half-long event, the authors structure their summary around the broad themes of the discussion rather than simply presenting a chronological account. The themes are as follows: organizational structures for management of fraud risks; technological innovation; alignment of incentives for fraud prevention among consumers, merchants, and payments providers; and regulatory policies.

Gates and Jacob's article highlights the challenges involved in bringing the various constituencies together to forge common ways to address fraud in payments systems. Gates and Jacob find that payments fraud cannot be eliminated without decreasing the openness and efficiency of the payments system. In the current environment, technological innovations have enabled system participants to enhance payments security, at the same time that technology has made it easier for criminals to perpetrate payments fraud remotely. Practitioners are constantly weighing the costs and benefits of payments fraud mitigation and are looking to the public sector to offer guidance and support. As the industry combats payments fraud, companies are banding together to find common solutions. For instance, throughout the conference, financial industry participants emphasized the concept of enterprise-wide fraud management, while many also acknowledged the difficulties faced by small merchants and many financial institutions in fashioning such holistic strategies. A number of legal professionals stressed the detrimental effects of legacy laws and regulations that evolved independently around individual payment product lines. Together, these viewpoints contributed to a budding consensus on the importance of dedicated high-level executive involvement in payments fraud management and of outsourcing development of fraud prevention tools to specialized entities.

The rest of this volume is devoted to articles that address in greater detail some of the key topics discussed at the conference. The contributors of these papers span the spectrum of thought leaders in combating payments fraud--industry experts in fraud detection systems, legal professionals, academic researchers in economics and technology, and senior officials of the Federal Reserve System.

The first article is written by Bruce J. Summers. His paper provides a synthesis of the approaches of practitioners and economists to thinking about the problems in containing retail payments fraud. As Summers makes clear, these approaches differ somewhat for reasons that have to do with both perspective and analytical framework. Yet, both parties are integral in formulating a coherent public policy response to the problem of payments fraud.

In particular, payments industry practitioners tend to regard fraud as a persistent but manageable problem that requires both unrelenting attention and significant expenditures. These expenditures on fraud mitigation have resulted in declining rates of fraud losses. Still, there is concern that maintaining such results in the future will require ever-expanding expenditures. Part of this argument rests on the view that fraud threats to electronic payments networks arise globally, are increasingly sophisticated, and propagate quickly. The bottom line is that for the practitioners, payments fraud is part of the cost of doing business, which can be ameliorated by pooling fraud prevention efforts. To underscore this view, Summers reports consensus recommendations from a recent industry roundtable (which is a focus of the article by Malphrus later in this volume). Those recommendations call for information sharing, better authentication technologies, and adoption of standards--ideas that take into account the economies of scale and scope in fraud prevention, though not necessarily the conflicting incentives among the many participants in payments networks.

Economists tend to think of the payments system as a vast network of participants whose divergent incentives generate considerable spillovers from their own actions. The effects of these spillovers are frequently not fully appreciated by the participants because market prices fail to convey the extent of the spillovers to them. An example of such an "externality" is when a consumer (or merchant) fails to be appropriately vigilant about data security because limited liability rules (or existing penalties for breaching network security protocols) do not signal the extent to which such actions affect other participants in the payments system. Moreover, because fraud prevention by one party usually improves the experience of everyone else, there is ample incentive for other participants to "freeload." As a result, there may be drastic underprovision of fraud prevention in the aggregate. This framework forces economists to take a systemic view of payments networks, focusing on ways in which policy can better align the incentives of all participants. One important implication of this view is that incentives (or regulation) must be appropriately allocated across the payments network because the entire system is only as strong as its "weakest link."

The juxtaposition of the views of practitioners and academic economists gives rise to an interesting and provocative observation that industry practitioners' relatively sanguine view of risk is partly attributed to their focus on practices of their own firms. Thought leaders in the industry are keenly aware that the interconnectedness between the many players in the payments space poses risks that are not directly observable by any individual participant. Yet, their primary responsibility for managing fraud at their enterprises may instill a somewhat false sense of security. This comparison also points to a potentially key role of the Federal Reserve in bridging the gap, since it is both a research center and a major payments provider.

The next three articles in this volume are, in some sense, elaborations on Summers' conclusion. The first of these, by William Roberds and Stacey L. Schreft, lays out an economic framework for thinking about fraud in payments networks. The second, by Steve Malphrus, gives the industry view on the current state of efforts in retail fraud management. The third, by Mark N. Greene, addresses the nature of payments fraud and the need for coordinated efforts in fighting it.

Roberds and Schreft start out by noting the inevitable trade-off between more efficient payments markets and loss of privacy. On the one hand, as an economy grows, paying for transactions in cash becomes prohibitively expensive and inefficient. On the other hand, credit- and debit-based transactions between parties that typically do not know each other are impossible without exchanging some information that verifies both the identity and the creditworthiness of the parties. The resulting transfer of information back and forth presents opportunities for fraud. Still, without such transmission of private information modern payments systems would be infeasible, thereby forcing payments activity onto the slower rails of cash-facilitated exchanges of yesteryear.

What is the proper balance then? As Roberds and Schreft argue, it is useful to think of this balance as "confidentiality" of payments transactions. "Confidentiality" thus consists of "data informativeness" (how much identifying information is exchanged between parties) and "data integrity" (how well this information is protected). If you tilt the balance too much toward safeguarding privacy (that is, lessen data informativeness), then the wheels of credit-based and remote transactions grind to a halt. But if you tilt it too much toward being absolutely certain about the identity and creditworthiness of the consumer, then you may transmit so much data that you increase the incidence of and losses from fraud.

To get closer to the answer, the authors lean on economic theory. They note that neither information nor integrity diminishes with repeated use. For example, say Wal-Mart knows Mr. A is not a fraudulent actor and, therefore, processes payments it receives from him. The fact that Wal-Mart has this information does not diminish the value of the information to Home Depot. These seemingly abstract concepts matter because they help us think about the way in which "confidentiality" can be provided efficiently. In particular, the fact that the two attributes of "confidentiality" do not wear down with consequent use implies that, at some point, the marginal cost of providing it is close to zero.

This insight implies that optimally there will be only a few large producers of "confidentiality" that are able to leverage vast economies of scale in building networks for collecting and transmitting necessary information securely (for example, credit bureaus, card networks, and so on). However, since information must be exchanged among many different parties (for example, merchants, issuers, and consumers) in order to have value, the potential for conflicts of interest is large. Some parties may have weaker incentives to safeguard information and thus become the "weak link" that compromises the entire system. Some parties may choose to freeload on data integrity efforts of others because the cost of fraud or loss of "confidentiality" is not proportionately allocated.

The authors' analysis of "confidentiality" further points to the proper role for policymakers in fostering efficient (but not fraud-free) payments systems. Public policy should aim to resolve the potential for conflicts of interest through coordination, judicious imposition of standards, and proper allocation of legal incentives (as discussed in greater detail in Douglass's article later in this volume). The public sector should not focus on duplicating the job done by the private sector in collecting, verifying, and processing payments-related information. As Roberds and Schreft underscore, the ultimate goal of regulators should be to strike the proper balance between privacy and efficiency.

Malphrus's article summarizes the results from a special roundtable discussion on retail payments fraud, which was held at the Federal Reserve Bank of Minneapolis in March 2007. The participants reported that, despite the declining use of checks, check payments still generated the largest number of fraud attempts. They emphasized that criminals are continually searching for weaknesses in fraud detection and prevention practices. Many thought that banks and businesses needed to adopt a holistic approach to detecting and preventing retail payments fraud, being ever mindful of the overall fraud landscape across all of their operations. The roundtable participants shared a number of suggestions for improving the industry's ability to detect and prevent retail payments fraud, including better protection of customers' personal and financial data. They recommended more effective sharing of best practices with respect to fraud detection and prevention within the industry. Industry leaders specifically discussed the effectiveness of PIN (personal identification number) and chip technology. Some stated that fraud rates on PIN debit cards are significantly lower than those for other payment types, and advocated a more widespread application of PIN security to card payments.

Malphrus also shares some thoughts on new account fraud that has featured prominently in recent discussions on retail payments systems' vulnerabilities. Allowing customers to open accounts electronically, as opposed to in person at a bank, clearly offers the potential for fraud. However, this risk can be mitigated by making use of various technologies; for example, software can identify the geographical location of the user's computer, and device identification tests can be subjected to further fraud screening. all of these technologies are currently operational, and their widespread adoption is likely to make a considerable difference in mitigating a particular aspect of retail payments fraud.

Malphrus also highlights an increasingly important aspect of policymaking--the need to protect privacy while countering terrorist financing and money laundering. As different agencies (for example, the Central Intelligence Agency and the Federal Reserve) cooperate to combat these threats, they must be vigilant about how they exchange information about U.S. citizens. Moreover, as those perpetrating illicit activities increasingly attempt to leverage existing payments networks, the need for cooperation between the private sector and government agencies becomes all the more important.

The next contributor, Greene, represents Fair Isaac Corporation--a leading provider of automated identification procedures for prospective fraud on electronic payments networks. Greene's role gives him a clear perspective on the nature of the current threats to the payments system. As Greene argues in his article, greater cooperation among the various payments system participants is necessary to combat fraud. Increasingly, modern day fraudsters operate globally, often outside the jurisdiction of the U.S., and they are well organized and well financed.

In particular, Greene warns that adopting piecemeal solutions that focus on individual payments segments or regions would be inadequate to beat the scares. While payments providers may have an incentive to differentiate their products and seek competitive advantage, they need to find ways to cooperate with each other in sharing information or developing standards that would help lessen the problem. He suggests that piecemeal solutions are like pushing on a balloon--they may impede fraud in the particular targeted segment or region but quite often at the expense of increasing fraud elsewhere.

Instead, Greene advocates a fraud protection system that works like a burglar alarm, covering all the openings--"doors and windows"--since fraudsters will always make the most of the weakest link. He argues it is possible to build better models of fraud containment that profile not only individuals but also devices and merchants. With this platform, one could successfully identify uncharacteristic and possibly fraudulent payment behavior. Such modeling exercises would be more effective if they could be "trained" (that is, estimated on large amounts of current real-world data); this might require the cooperation of various payments system participants. Some public sector cooperation might be desirable to remove the concern that such industry data-sharing exercises constituted collusive practices.

In the question-and-answer session that followed Greene's keynote address at the conference, Greene raised the possibility of a mass compromise to the payments system by fraudsters. In a typical card compromise where the information could be stolen for, say, 25,000 cards, Greene acknowledged there is often only a limited amount of resulting damage--perhaps on the order of 400 fraudulent transactions. He suggested that the outcome could be considerably larger, with perhaps as many as 4 million fraudulent transactions generated on the same (25,000) card base. In this circumstance, Greene argued the systemic risk to payments could be huge. Moreover, he stressed that the industry is not prepared to deal with such a contingency. This might require a joint public-private initiative to scope out the problem and propose solutions.

The next article in this volume, by Duncan B. Douglass, takes us back to the central role that proper allocation of incentives plays in the efficient functioning of payments systems. Douglass focuses on ways in which the current framework of public laws and private network rules distributes fraud liability among the three principal sets of participants--consumers, merchants, and card issuers. Although the discussion centers on signature-based credit and debit cards, its implications are readily extended to other payments instruments.

The public law framework that governs the legal liability for fraud losses is based on the Truth in Lending Act (TILA) and the Electronic Fund Transfer Act (EFTA), as well as the associated Federal Reserve Board Regulations Z and E. As Douglass points out, the primary goal of these laws and rules is to effectively absolve the consumer from liability for losses related to fraud, regardless of whether a consumer's own behavior contributed to fraud in the first place. Although a lack of care on the part of consumers often contributes to fraud, Douglass argues that making consumers bear more of the consequences for their actions is not realistic. This owes both to the political environment and, more importantly, to the desire to instill confidence in the security of card transactions among consumers.

The private card networks' rules take over from where public laws stop--by setting cardholder liability to zero--and proceed to further allocate fraud loss liability between merchants and card issuers. In brief, the rules effectively assign liability for losses in card-present transactions to issuers and in card-not-present transactions to merchants. Douglass emphasizes that this joint framework of public laws and private rules leads to several predictable outcomes that make system-wide fraud prevention efforts somewhat inefficient. To paraphrase, consumers never care too much about safeguarding their transactions, merchants try to exercise due diligence primarily in card-not-present environments, and card issuers are concerned mostly with point-of-sale transactions. Each party thus has ample incentives to undermine the efforts of the other--for example, merchants not verifying signatures at the point of sale.

Douglass illustrates this dynamic with the example of the failed adoption of networks' payer authentication programs. Although these programs are effective in reducing online fraud, consumers, who bear no responsibility for fraud, have balked at merchants' efforts to adopt these measures. For their part, card issuers, which bear less of a burden for fraud in card-not-present transactions, were content to sit on the sidelines and not force their customers to enroll in such programs.

The final article in the volume, by Kevin Fu, Thomas S. Heydt-Benjamin, Daniel V. Bailey, Ari Juels, and Tom O'Hare, focuses on technological vulnerabilities in a newly popular set of payments instruments--devices that use RFID (radio frequency identification), such as credit cards. Such cards offer the promise of speedier contactless transactions at the checkout or gas station and, unlike traditional magnetic stripe cards, require only physical proximity between the card and the associated reader.

Fu and his co-authors demonstrate that the more convenient retail experience provided by RFID devices over magnetic stripe cards may come at the price of several vulnerabilities in RFID's first-generation incarnations. Using their toolkit as electrical engineers, the authors find that all of the 20 million RFID-enabled cards currently in circulation are subject to privacy invasion. The cards can be scanned and private information can be removed by the fraudsters without the awareness or consent of the cardholders.

These vulnerabilities should not necessarily be viewed as a fatal indictment of the technology; rather, they represent what might be expected for a work in progress. If successful, RFID technology will overcome these vulnerabilities along its developmental path. New (and ultimately successful) payments innovations do not necessarily provide full fraud protection capabilities at launch but often gain them over time as they scale up efficiently. The history of PayPal illustrates this point quite nicely. (1) We hope that the message delivered by Fu and his co-authors will rouse the card manufacturers to address these challenges quickly.

Each of the articles collected in this volume offers a specific insight into the current state of efforts in combating retail payments fraud. The articles also outline a number of ways in which these efforts can be made more successful at a systemwide level and offer a methodological framework for thinking about the problem. We hope this work will provide a valuable basis for ongoing discussions on how we can develop and coordinate public and private responses to the pressing need to manage payments fraud risk.

NOTES

(1) Sujit Chakravorti and Carrie Jankowski, 2005, "Forces shaping the payments environment A summary of the Chicago Fed's 2005 Payments Conference." Chicago Fed Letter. Federal Reserve Bank of Chicago, No. 219a, October, p 2.

Gene Amromin is a senior financial economist and Richard D. Porter is a vice president, senior policy advisor, and the director of the payments team in the Financial Markets Group at the Federal Reserve Bank of Chicago.
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有