Card Fraud: Discover the Possibilities

By Masuda, Barry | Security Management, December 1992 | Go to article overview

Card Fraud: Discover the Possibilities


Masuda, Barry, Security Management


4:10 PM: A CUSTOMER APPROACHES an employee at Tops Appliance City in Hanover, NJ, and requests the most expensive VCR and camcorder in stock. The customer does not inquire about the product's features and, amazingly, does not haggle for a price reduction. Store loss prevention is alerted that a fraudulent transaction may be taking place.

4:15 pm: Surveillance cameras zoom onto the customer's face. Instantly, several photos are taken.

4:20 pm: The customer hands a newly issued MasterCard to the cashier. Loss prevention personnel instruct the cashier to stall the customer while verification with the issuing bank is obtained.

4:25 pm: Bank security calls the phone number of the accountholder and finds him home. This information is relayed immediately to store personnel.

4:26 pm: A store loss prevention representative takes possession of the card and directs the suspect to a secure area to wait for the police to arrive.

4:27 pm: The suspect tries to escape and has to be forcibly subdued.

4:29 pm: A taxicab, parked nearby, is discovered to be occupied by an accomplice. Eleven additional stolen credit cards are found in the accomplice's possession. All have been stolen from the mail. Potential loss for this fraud attempt: $2,200. Unused credit limit of all recovered cards: $55,000.

This scenario plays itself out day after day. A credit card is stolen, merchandise is obtained fraudulently, and retailers, banks, and cardholders suffer economic loss. Occasionally, someone is arrested.

Credit card abuse is an easy score for criminals: Personal identification is not required as it is with checks; the acceptance of credit cards is practically universal (a card issued from a bank in Colorado raises no eyebrows when used in Mexico); and current authorization procedures imposed at the point of sale are designed to focus primarily on credit limit controls that are irrelevant to detecting and preventing fraud.

The problem involves many participants, is driven by conflicting motives, and spans innumerable jurisdictions. Security precautions are often enfeebled by banks in pursuit of market share, consumers reluctant to accept cumbersome interactive prevention measures, and the fact that crimes cross jurisdictions.

Even when federal jurisdiction is invoked by the US Postal Inspector's Office or the Secret Service, lack of adequate staff and changing priorities shift resources away from fraud interdiction efforts. Moreover, credit card fraud is a faceless crime. The injury inflicted is purely economic and falls most heavily on large financial institutions or retail businesses.

In 1989, the retail industry reported shrinkage totaling $2.2 billion. By comparison, Visa and MasterCard reported losses(1) associated with credit card fraud in the United States for 1991 of half a billion dollars. Credit card fraud is expected to increase, eclipsing all other retailer reported external losses, such as shoplifting, bad checks, and counterfeit currency.

Unfortunately, the macroeconomic conditions associated with credit card fraud obstruct the adoption of any progressive short-term solutions. For example, a major factor influencing the opportunity for credit fraud is the sheer volume of cards in circulation. Worldwide, 1.5 billion credit cards generated more than seven billion transactions in 1991, of which three billion were transacted in the United States.(2)

According to Dennis Carrol, the assistant vice president of security and manager of investigations for First Card Services (FCS), a credit card issuer, it is not uncommon for FCS to have 1.4 million cards in the US mail on any given day. As long as the available supply of hot cards remains constant, demand will persist. People trafficking in stolen plastic (primary offenders) sell an account for cash (to secondary offenders) based on its credit limit.

Cards are discounted on the street from $50 to $300. …

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Card Fraud: Discover the Possibilities
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited passage

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.