eGaming Review December 2013 | Page 66

SPONSORED EDITORIAL JX X XIX X X X UM O SLOTS FRAUD FOCUS Getting to know the enemy Last month at EIG, Jumio interviewed a convicted fraudster on the stage in Barcelona. Why did we take this unusual step? At Jumio, we think it’s important to get inside the mind of the fraudster and understand their modus operandi so that the egaming industry can better detect and prevent the fraudsters as they ply their trade I t was standing room only in the theatre at EIG and our interviewee, ex-fraudster Tony Sales, was ready to recount his exploits. The poacher-turned gamekeeper routine can be quite polarising content in the eyes of the businesses that have previously been targeted. Some businesses see the value in the insight that reformed criminals have to impart. Others don’t take kindly to the (ex) bad guys earning a (legitimate) living from reliving their past deeds. Whatever your opinion on the matter and assuming eGR’s readers are withholding judgment for now, we take a look at what we can learn from this time spent talking to the guy who took the credit card system for almost £30m using a gang of foot soldiers to industrialise his fraud machine. delivery of the goods, services or capital that they have obtained through the act of fraud. And finally, they have to realise the profit and cash out that fraud. How do fraudsters identity theft? In the recent Jumio White Paper, the Fraudsters’ Playbook, now available on the Jumio site, we revealed five different ways in which fraudsters conduct identity theft. Some of these ID theft exploits are hi-tech in nature, some are lo-tech and some are just downright con-tricks. How are card fraudsters targeting gaming operators? Typically, card fraudsters are male, computer literate individuals in their late teens to late twenties, with access to a list of compromised card numbers ready for exploitation. With that demographic, fraudsters love online gaming, not just in their spare time but also in their working time. Here’s what Tony Sales said during his interview at EIG: “I used to love online gaming, it was cash, pure cash. If I was on a job to Here’s one of the fraudster’s ID theft exploits that is more hitech in nature called the ‘WiFi Coffee Shop hack’ To see more of the fraudsters’ ID theft exploits, download the White Paper at www.jumio.com/playbook What can we learn from (ex) fraudsters? The first learning point here is that fraud is not one homogenous process but is a four-part process. Fraud always begins with identity theft, before the second stage where the fraudster commits the actual fraud against an online retailer or a gaming operator using the identity they have stolen. Thirdly, the fraudster has to then take David Pope is European marketing director at Jumio, the next generation online and mobile identity verification and payment company. For the past 10 years, David has worked with ecommerce merchants, payments firms, online gaming operators and other regulated sectors to help them understand how to welcome new customers while defending against card fraud and money laundering. C O N T A C T : W W W. A R I S T O C R A T 64 www.egrmagazine.com www.egmagazine..com