Preface

“With commerce comes fraud,” wrote Airbnb cofounder Nathan Blecharczyk back in 2010, and it’s safe to say that the maxim has proven itself over and over in the years since then.1 Global online sales reached nearly $4.29 trillion in 2020, with more than $1 out of every $5 spent online. Fraudsters follow the money, making online fraud bigger, smarter, and bolder than ever (Figure P-1).

Figure P-1. Twenty years of internet crime complaints from the IC32

Fraud fighters, with their heads down in the data, excel at identifying new suspicious patterns and tracking down perpetrators. The constant pressure of fraud prevention means that often, day-to-day activities prevent fraud fighters from taking a breath, putting their head above the parapet, and looking around to see what’s happening outside their company or their industry. The purpose of this book is to provide a wider and more strategic perspective as well as hands-on tips and advice.

During our time in fraud prevention, we have been privileged to have the chance to talk to and see data and trends from a wide range of merchants and organizations. It’s that breadth that we want to share in this book.

Introduction to Practical Fraud Prevention

Online fraud has been around almost as long as online banking and online commerce: fraudsters go where the money is and wherever they can spot an opportunity. It’s worth noting right at the start that when we refer to fraudsters, we’re talking about threats external to a business; this book does not discuss internal fraud or risk or employee integrity issues. There’s certainly enough to be said about external fraud online—a problem that businesses have been worrying about for decades now. Julie Fergerson, CEO of the Merchant Risk Council, remembers the early days of ecommerce 20 years ago, when she’d help clients set up stores online and watch in horrified awe as fraud attacks would hit the very first week—or sometimes even the first day—of a shop’s existence.

At that time, there was often a physical aspect to online fraud. Card skimming was common as a means of stealing physical card information, perhaps carried out during a legitimate transaction or at an ATM. The card information might be used online to make purchases, or fake cards might be created to attempt transactions in physical stores. Sometimes the card data ended up online, on the forums that were quickly developing to enable criminals to interact with one another on the internet. Other times, the fraud was very simple, with a cashier just copying the card information and attempting to use it to make purchases online.

Card-present fraud hasn’t entirely disappeared, but there’s no question that a combination of chip and pin technology for card-present transactions and the sheer scale of online interactions and commerce has put card-not-present fraud center stage (Figure P-2). One 2021 study found that 83% of all fraud attacks involving credit, debit, or prepaid cards occurred online.3 That’s the world in which fraud prevention teams now live and breathe.

Figure P-2. Credit card fraud and ID theft in the United States from 2011 to 20184

The onset of the COVID-19 pandemic in early 2020 accelerated digital transformation of all kinds as people adapted to the convenience and temporary necessity of shopping and interacting online. One report found that in 2020, 47% of people opened a new online shopping account, while 35% opened a new social media account and 31% opened an online banking account.5 All of this presents financial opportunities for online companies—but not without fraud risks. Nearly 70% of merchants said chargeback rates rose during the pandemic, and many reported high levels of account takeover (ATO) attempts as well.6 Given that consumers report the intention to continue their online purchasing and banking habits even once there’s no pandemic pressure to do so, it’s reasonable to assume the fraud threat will continue as well.

Fraud attempts have become far more sophisticated, as well as more common. Fraudsters use elaborate obfuscation, an army of mules around the world, and even tools that capture information about a user’s browser and device when they visit a site so that this can be echoed as part of an ATO disguise. Phishing attempts, which drive much online fraud with their resultant stolen data, have evolved from the “Nigerian prince” scams of 10 or 15 years ago into subtle missives that mimic the tone, layout, and logos of emails sent from providers to the companies that use them, often targeting companies based on which providers they use. And don’t even get us started on the intricacies of romance scams, IT repair scams, catfishing, and other social engineering schemes.

Fraudsters operate within what is now a highly sophisticated online criminal environment—one which the FBI estimates stole more than $4.2 billion in 2020.7 Fraud is sometimes referred to as being part of the wider world of cybercrime, and other times as being connected to it but separate. In either case, there’s no doubt that these connections are an important part of the scale and success many fraudsters achieve today. A wealth of stolen data is available for purchase to use in attacks, and technically focused cybercriminals create programs and apps that fraudsters can use to disguise themselves online quickly, and often in an automated fashion. Graphic designers, SEO experts, website developers, and more all support schemes involving fake sites created to trick consumers into giving up their data or placing fake orders. We won’t delve into the complex world of cybercrime more generally in this book, but we will mention aspects of the cybercriminal ecosystem when relevant.

Fraud attacks have evolved within the banking and fintech worlds too (Figure P-3). Quite early on, fraudsters developed an appetite for higher profits. Attacks on individual consumers have existed from the beginning, but fraudsters who were able to carry out malware-based cyberattacks quickly became a more serious threat. Social engineering tactics focused on business email compromise (BEC) fraud, in which a fraudster could cash in big with a single unauthorized transfer, if they were lucky enough to succeed. Over the years, banks built up stronger defenses against the attacks of the early days, and many fraudsters “migrated” to targeting younger fintech companies and/or exploiting the vulnerabilities on the consumer side of banking. More recently, malware has been combined with social engineering, as discussed in Chapter 14.

Figure P-3. The development of fraudster attack methods and sophistication within a banking context

Of course, online fraud prevention has increased in sophistication as well. Where once the industry was dominated by rules engines, now machine learning supplements most systems to add its speed and excellence at spotting patterns to a fraud system’s efforts. This has enabled more decisions to be automated, more quickly. Diverse vendors of data enrichment for many kinds of data have sprung up, though as a number of these have been acquired by larger players in recent years, it will be interesting to see how this field develops.

The relationship between fraudsters and fraud prevention is often described as an arms race, with each side continually attempting to create or uncover new vulnerabilities or tools that will give them an edge. Sometimes one side appears to have the upper hand, and other times the other side does. Fraudsters are unlikely to give up the battle while there is so much money to be made, and fraud prevention teams can never afford to take their eyes off the game knowing that fraudsters will pounce on any weakness.

One advantage that fraud prevention teams can develop is strong, collaborative relationships, both with fraud fighters at other companies and with other departments in their own company. While working on this book, we were surprised how many times the topic of collaboration came up, and in how many different contexts. Working with fraud teams from other companies, or within other departments, or convening and sharing ideas, new trends, and tips through forums, roundtables, reports, and so on, was key to the way many fraud managers keep track of what’s going on in the industry and ensure that their teams are not falling behind.

Similarly, developing close, trusting relationships with departments such as customer support, marketing, sales, legal, and logistics/supply can give fraud prevention teams a real advantage in spotting and preventing the development of fraud trends, and in understanding and preparing for changes in the business or market approach. In the same way, educating other departments and upper management about fraud prevention and the challenges of balancing between friction and fighting fraud helps fraud teams look and stay relevant to the needs of the business and position themselves appropriately within the organization. All of this increases interdepartmental collaboration and makes it more likely that fraud teams will get the budget they need and the key performance indicators (KPIs) that make sense for both themselves and the company.

How to Read This Book

Ohad Samet, cofounder and CEO of TrueAccord and author of Introduction to Online Payments Risk Management (O’Reilly), mentions “lack of data” as a common reason for failing to understand “what is going on” in fraud analytics. He clarifies that this is often because “maintaining event-based historical data is not anywhere near the top of these engineers’ minds” (once again, note the importance of educating other departments and management). Samet gives the example of point-in-time analysis (e.g., being able to train a predictive system using only data that was available at the time of the fraud attack, long before the financial loss became evident).

The authors of this book strongly agree with Samet that “lack of data” can be catastrophic, but not just because of its negative impact on the quality of your training sets. We see the urge of digging into event-based historical data as the key to a successful fraud prevention operation. A passion for root cause analysis, with an emphasis on behavioral analytics and “storytelling” research methodologies, is our creed.

Therefore, we encourage you to read this book with the curiosity of a data addict. Like Alice in Wonderland, the historical data of your organization should be a rabbit hole that you should gladly jump into, feeling curiouser and curiouser and enticing others in your company to join the ride. We believe that robust fraud prevention solutions are built mainly by researchers who can explain the fraud from the perspectives of the attacker and the victim. To learn how to do so, one should definitely have broad horizons and a healthy dose of curiosity (sometimes you need to think like a fraudster to catch a fraudster) regarding the shockingly wide array of manipulative schemes out there. Open source researchers may gain some of this insight through web research (including the deep web and dark web), but we believe a good analyst can learn a lot from the combination of their imagination and their data (Figure P-4).

Figure P-4. Breakdown of the different parts of the internet (left); the continually curious Alice (right)8

In this book, you won’t find a checklist of steps you can take to stop fraud. Every business and every industry is different and has different priorities, needs, and structure. Fraud prevention must take all of them into account. Moreover, we have tried not to be too specific about particular tricks that can be used to catch fraudsters, because we know perfectly well that if we were, this book would become a favorite on fraudster forums within a month and the tricks would become useless soon afterward. Instead, we have tried to provide concepts and best practices that are helpful in different situations. We have also tried to make suggestions using features that are inherent to the nature of the challenge being faced, rather than ones that could be gamed and circumvented.

On a technical note, we wrote all the query examples in SQL, but they can easily be translated to PostgreSQL if necessary. Of course, you must adapt the queries to the specific tables of the database you’re working with (e.g., replace the generic hypothetical table we called CUSTOMERS with the name of the table that holds the relevant data for your use case). We have tried to present the queries throughout the book in a way that is easy for the reader to adapt to their own company’s setup and preferred technologies. For example, we happen to like DataGrip and MySQL Workbench for working with SQL and Jupyter Notebook for working with Python, but whatever your company’s or team’s preferences are will work just as well when it comes to using the suggestions in this book.

We organized many of the chapters by attack type, under the industries for which they are most relevant. For example, we placed the chapter on stolen credit card fraud in the part of the book on ecommerce, even though stolen credit card fraud touches many other elements of the online criminal ecosystem and is part of many other attack methods. Similarly, the chapter on account takeover is in the part of the book covering banking.

Our main motivation for this structure is to make it easy for fraud analysts specializing in a particular industry to find the chapters most relevant to them. We do encourage you to look at the sections in every chapter of the book, though, to see which parts may be of interest, even if they are not in the part of the book pertaining to your industry. We have done our best to ensure that although the examples given relate to the industry in whose section the chapter falls, the discussion, suggestions, and mitigation techniques are relevant across industries.

In the same spirit, we have discussed different data points, or prevention tactics, within the context of the problem they are typically used to solve. So, for example, physical address analysis and reshipper detection are discussed in the chapter on address manipulation, while login analysis and inconsistency detection are discussed in the chapter on account takeover. We did initially consider keeping the “attack” and “defense” elements separate—so that, for example, address manipulation and physical address analysis would each have their own chapter—but we felt that pairing the elements gave a much richer context for each part and kept the context far closer to what fraud prevention teams work with on a daily basis.

For the purposes of clarity, in each chapter we explore a data point separately, breaking each one down in the way that we hope will be most helpful. But in reality, when using this knowledge and the techniques suggested in analyzing user actions and profiles, you would put everything you learn about the individual data points together in order to form a story—often, two stories side by side: the legitimate story and the fraudulent story. Ultimately, you decide which is more plausible.

Context is absolutely crucial here. Say you have analyzed the IP and found a proxy, and the email address includes a lot of numbers. Perhaps the shipping address is that of a known reshipper. There’s a clear fraud story there. But what if the numbers are ones believed to be lucky in China, and the reshipper is one that reships to China? Then the proxy makes sense—this is a strong legitimate story.

Making the data points analysis an integral part of the fraud types discussion, rather than splitting it off into a separate section, will, we hope, act as a constant reminder that these data points must been seen in the full context of the other data points involved, the business, the industry, and of course, the type of fraud attack.

Table P-1 is a guide to which data points are analyzed and which tactics are discussed in each chapter. You should feel free to skim or skip to the parts of chapters that discuss the mitigation techniques you are most interested in, though we do recommend that each of you reads Chapters 1 through 5 first, regardless of your industry.

Table P-1. Guide to chapter breakdown, showing which data points are analyzed in which chapter
Chapter Topic Examples
Part I: Introduction to Fraud Analytics
Chapter 1, “Fraudster Traits” An introduction to walking a mile in the fraudster’s shoes Address verification service (AVS) manipulation examples
Chapter 2, “Fraudster Archetypes” The basics of understanding the different types of attacker you’re likely to see Manually evaluating four transactions originating from a single IP
Chapter 3, “Fraud Analysis Fundamentals” The basics of the practical analytics approach used throughout the book Login density anomaly; SQL to generate user’s histogram of abnormal number of daily logins
Chapter 4, “Fraud Prevention Evaluation and Investment” Building frameworks for strong fraud prevention teams
Chapter 5, “Machine Learning and Fraud Modeling” A discussion about the place of modeling in fraud fighting
Part II: Ecommerce Fraud Analytics
Chapter 6, “Stolen Credit Card Fraud” Typical flow of stolen credit card monetization, followed by a general discussion on comparing IP data to user data IP analysis: proxy detection, including data source examples;
IP categorization using traffic breakdowns with SQL and Python
Chapter 7, “Address Manipulation and Mules” Physical goods theft via shipping manipulation Address misspelling; SQL to find common typos or variations on city names
Python to spot reshipping services by velocity of address repetition
Chapter 8, “BORIS and BOPIS Fraud” Fraud associated with Buy Online, Return In Store (BORIS) and Buy Online, Pick up In Store (BOPIS) programs Linking analytics; detecting a fraud ring
Analyzing potential mule operations with SQL
Chapter 9, “Digital Goods and Cryptocurrency Fraud” Fraud associated with digital goods, including fiat-to-crypto transactions; note that anti–money laundering (AML) and compliance relating to cryptocurrency are discussed in Chapter 22 User profiling: age bucketing to spot potential social engineering
Chapter 10, “First-Party Fraud (aka Friendly Fraud) and Refund Fraud” First-party fraud, aka friendly chargebacks, with a focus on ecommerce Refund request word clouds and supporting tools for customer care teams with SQL and Python
Part III: Consumer Banking Fraud Analytics
Chapter 11, “Banking Fraud Prevention: Wider Context” Wider context for banking fraud
Chapter 12, “Online Account Opening Fraud” Reasons to open fraudulent accounts and ways to catch those accounts; includes references to money muling Applying census data to fraud prevention
Chapter 13, “Account Takeover” Types of ATOs and how to catch them Login analysis and inconsistency detection with SQL
Chapter 14, “Common Malware Attacks” Malware attacks, particularly as used in conjunction with social engineering
Chapter 15, “Identity Theft and Synthetic Identities” Complexities of identifying and combating cases of actual stolen identity (rather than stolen and misused individual data points connected to a real identity) Personal identifiable information (PII) analysis and identity discrepancy detection
Chapter 16, “Credit and Lending Fraud” Credit fraud and abuse, including stimulus fraud Email domain histogram with SQL
Part IV: Marketplace Fraud
Chapter 17, “Marketplace Attacks: Collusion and Exit” Collusion and exit fraud; that is, when more than one account colludes to defraud the marketplace Peer-to-peer (P2P) analysis; seller-buyer detection with SQL and Python
Chapter 18, “Marketplace Attacks: Seller Fraud” Forms of fraud carried out by marketplace sellers leveraging their position in the ecosystem Seller reputation analysis and feedback padding detection using Python
Part V: AML and Compliance Analytics
Chapter 19, “Anti–Money Laundering and Compliance: Wider Context” Wider context for AML and compliance
Chapter 20, “Shell Payments: Criminal and Terrorist Screening” Concealing money movement in various ways, including money muling; also looks at criminal and terrorist screening Credit scores and transaction analysis for money mule detection with SQL
Chapter 21, “Prohibited Items” Prohibited items and the wide variety of thorny issues associated with dealing with them Standard deviation/RMSE analysis for product popularity with SQL
Chapter 22, “Cryptocurrency Money Laundering” Why cryptocurrency has become popular for money laundering Blockchain analytic data sources
Chapter 23, “Adtech Fraud” Bot fraud identification Hijacked device identification
Chapter 24, “Fraud, Fraud Prevention, and the Future” Collaboration

Who Should Read This Book?

Primarily, fraud analysts! The main audience we had in mind as we wrote this book was the smart, dedicated, and creative collection of folks we know who fight the good fight against fraud in their organizations, and in some cases lead fraud operations in those organizations. We hope the wider context provided in this book helps you see your own work in the context in which it belongs. We also hope the structure and framework we provide for different types of fraudsters, attack methods, and identification and mitigation efforts help you get things clearer in your own head—something that can be challenging when you’re always focused on making sure chargebacks remain low while approval rates remain high. We hope this book is, as it says on the cover, practical and useful. And we hope it reminds you that, whatever today’s challenges are, you are never alone; you are part of a community of passionate fraud fighters who want to catch fraud, protect their companies, and get things right as much as you do.

We also hope this book will be valuable in training new fraud analysts, introducing them to the field, and giving them practical tips and even code to run. Having a wider understanding of online fraud, in a variety of contexts and through a variety of attack methods, will help new analysts immeasurably as they come to grips with their new challenges.

The nonfraud folks you work with regularly, such as software engineers or data scientists, who may have some working understanding of fraud prevention but who don’t live and breathe fraud fighting in the way that your own team does, may also find this book interesting and beneficial, giving them valuable additional context for the work you engage in together. We hope it makes your partnership stronger, smoother, and even more successful.

As well, we hope you’ll find this book helpful in introducing key concepts of fraud and fraud prevention to others in your organization who have no experience in fraud. As we emphasize repeatedly throughout this book, both collaboration with other departments and representing fraud prevention efforts appropriately to upper management are crucial in achieving true success as a fraud prevention department.

The context in which fraud analysts work is, frankly, cool—even if most fraud fighters don’t recognize that or think about it day to day. You’re fighting cybercriminals who use a range of ingenious techniques to try to trick you and steal from the business. Once others in your company understand this and some of the context behind it, they will care a whole lot more about what you do and will want to help you do it.

It is important to note that in general, this book reflects and speaks to the perspective of a fraud prevention professional or team, and also an AML professional or team in the sense that AML traces patterns, detects anomalies, and acts to prevent them. The compliance-focused side of AML, the perspective of data scientists or compliance experts or financial analysts, is not reflected here. There are other books that focus on these domains and aim to talk to and help the experts within them.

It was important for us to focus firmly on the fraud prevention side of things because in some ways, the fraud prevention industry is underserved in terms of educational opportunities. There are numerous excellent higher education courses and certifications (and even YouTube videos) that individuals can use to further their understanding of data science and become qualified in its use. ACFE runs diverse courses that enable participants to become Certified Fraud Examiners so that they can help businesses fight money laundering, insider fraud, financial fraud, and so forth. But there is no equivalent organization, course, or set of materials to help fraud analysts learn and stay up to date with fraud prevention within ecommerce, online marketplaces, or fintech. (Though the Merchant Risk Council is working on training materials and tests for junior fraud analysts, so watch that space!)

There is one advantage fraud fighters have that does balance out this lack to some degree. Fraud prevention, as an industry, has a particular advantage in that its professionals are unusually willing to collaborate, sharing experiences, tips, and even data with one another. This plays out in conferences, forums, and roundtables. Just as fraudsters work together sharing information about sites’ weaknesses and how they can be leveraged, and sometimes work together to form combined attacks, so fraud fighters work together to combat their shared enemy. As Karisse Hendrick, founder and principal consultant at Chargelytics Consulting and host of the popular Fraudology podcast, says, this really is a “superpower,” and fraud fighters who draw on this community spirit and nurture relationships within the industry can have a powerful advantage in fighting fraud.

This drive for collaboration is, in a sense, only logical, since it extends the understanding and effectiveness of fraud fighters and helps outweigh the extent to which criminals often work together to defraud companies. It’s also a reflection of the drive for justice that many of the fraud prevention experts we quote in this book feel animates their work and that of their team. Carmen Honacker, head of Customer and Payment Fraud at Booking.com, offers a delightful story about the time her card details were stolen and the bank called to inform her of the suspicious activity. Using her fraud prevention background and skills, she tracked down the thieves and then sent the police to arrest them. The bank managers, when she told them, were astonished and impressed. Fraud fighters can’t manage that for every suspicious case they encounter, but the drive for justice is definitely strong in the industry.

Domain expertise is hard-won knowledge for fraud fighters. This is partly because of the lack of courses and certifications, but also because, from a data perspective, there just aren’t that many fraudsters. It’s a tiny minority of users who have an enormous impact. You can’t fight the problem purely with data or machines (though as we will discuss in the book, data and machine learning can be extremely helpful). You simply need to know a lot about how fraudsters work and how your company works. This takes time, research, and ongoing effort; a fraud prevention expert’s perspective must evolve as consumer behavior, fraudster behavior, and company priorities do.

We sincerely hope this book will help fill in a little of that information gap in the fraud prevention industry. Whether you’re just starting out in your career and looking for an overview, or you’re an expert with decades of experience wanting to dig into various issues or patterns, build a framework for your accumulated knowledge, or look for new ways to combat challenges, we hope you enjoy this book and find it helpful. And we wish you the best in the ongoing, ever-evolving battle against crime that characterizes the fraud prevention profession.

Conventions Used in This Book

The following typographical conventions are used in this book:

Italic

Indicates new terms, URLs, email addresses, filenames, and file extensions.

Constant width

Used for program listings, as well as within paragraphs to refer to program elements such as variable or function names, databases, data types, environment variables, statements, and keywords.

Constant width bold

Shows commands or other text that should be typed literally by the user.

Tip

This element signifies a tip or suggestion.

Note

This element signifies a general note.

Warning

This element indicates a warning or caution.

O’Reilly Online Learning

Note

For more than 40 years, O’Reilly Media has provided technology and business training, knowledge, and insight to help companies succeed.

Our unique network of experts and innovators share their knowledge and expertise through books, articles, and our online learning platform. O’Reilly’s online learning platform gives you on-demand access to live training courses, in-depth learning paths, interactive coding environments, and a vast collection of text and video from O’Reilly and 200+ other publishers. For more information, visit https://oreilly.com.

How to Contact Us

Please address comments and questions concerning this book to the publisher:

  • O’Reilly Media, Inc.
  • 1005 Gravenstein Highway North
  • Sebastopol, CA 95472
  • 800-998-9938 (in the United States or Canada)
  • 707-829-0515 (international or local)
  • 707-829-0104 (fax)

We have a web page for this book, where we list errata, examples, and any additional information. You can access this page at https://oreil.ly/practical-fraud-prevention.

Email to comment or ask technical questions about this book.

For news and information about our books and courses, visit https://oreilly.com.

Find us on Facebook: https://facebook.com/oreilly

Follow us on Twitter: https://twitter.com/oreillymedia

Watch us on YouTube: https://youtube.com/oreillymedia

Acknowledgments

We’ve had so much support from many amazing people throughout the process of writing this book. Thank you so much to everyone who helped make it a reality! We would like to give an especially big thank-you to the following people.

Our greatest thanks go to the queen of collaboration, Karisse Hendrick, who originally suggested us for this project when the O’Reilly editors decided they wanted a book about fraud prevention, and who encouraged us throughout. We’re indebted to her for her enthusiasm, her willingness to share her experiences, and her conviction that we could cover all the topics we wanted to in a single book. (It seems she was right.)

We would also like to thank our wonderful technical experts and reviewers: Alon Shemesh, Ben Russell, Brett Holleman (whose excellent technical review was matched by the excellence of his additional and very relevant anecdotes), Gil Rosenthal, Ken Palla, Mike Haley, Netanel Kabala, Jack Smith, and Yanrong Wang. They helped us polish and clarify our explanations, pointed out things that needed to be added, and generally made sure our content matched the trends they had observed in their fraud-fighting work. Any remaining mistakes are, of course, our own.

This book could not have happened without the conversations and interviews we were lucky enough to carry out with a number of experts from the fraud-fighting space, who so generously shared their time, experience, and advice. Our thanks go to Aamir Ali, Arielle Caron, Ben Russell, Carmen Honacker, Dave Laramy, Elena Michaeli, Gali Ellenblum, Gil Rosenthal, Professor Itzhak Ben Israel, Jordan Harris, Julia Zuno, Julie Fergerson, Ken Palla, Keren Aviasaf, Limor Kessem, Maximilian von Both, May Michelson, Maya Har-Noy, Mike Haley, Nate Kugland, Nikki Baumann, Noam Naveh, Ohad Samet, Rahav Shalom Revivo, Raj Khare, Sam Beck, Soups Ranjan, Tal Yeshanov, Uri Lapidot, Uri Rivner, and Zach Moshe; to Arik Nagornov, Yuval Rubin, Lia Bader, and Lisa Toledano from DoubleVerify whose research we discuss in Chapter 23; and to Uri Arad and Alon Shemesh, without whose years of support and guidance we would not have been in a position to write this book in the first place.

We’re grateful to DoubleVerify and Identiq for being not only willing to let us write the book, but also actively supportive of our efforts.

We’d like to thank the fantastic team at O’Reilly, and particularly our editors—Corbin Collins, Kate Galloway, and Audrey Doyle—who picked up on and fixed all the little errors and lacunae that we would never have noticed ourselves.

And we’re especially grateful to our respective spouses, Ori Saporta and Ben Maraney, both of whom learned far more about fraud prevention as a result of this book than they’d bargained for. Without their encouragement, patience, and support, this book would not have happened—or at least, it certainly wouldn’t have been written by us.

1 Nathan Blecharczyk, “Hard Problems, Big Opportunity”, The Airbnb Tech Blog, November 7, 2010.

2 FBI, “Internet Crime Complaint Center Marks 20 Years”, May 8, 2020.

3 Feedzai, Financial Crime Report: The Dollar Takes Flight, Q2 2021 edition.

4 Emmanuel Gbenga Dada et al., “Credit Card Fraud Detection using k-star Machine Learning Algorithm” (paper, 3rd Biennial Conference on Transition From Observation To Knowledge To Intelligence, University of Lagos, Nigeria, August 2019).

5 James Coker, “A Fifth of Consumers Affected by Identity Fraud in 2020”, Inforsecurity Magazine, November 23, 2020.

6 DJ Murphy, “Covid Changed Chargebacks for E-Commerce Merchants, Says Report”, Card Not Present, June 3, 2021.

7 Ionut Ilascu, “FBI: Over $4.2 Billion Officially Lost to Cybercrime in 2020”, Bleeping Computer, March 18, 2021.

8 Sir John Tenniel, Drink Me, in The Nursery “Alice” by Lewis Carroll, illustrations by John Tenniel (London: Macmillan and Co., 1889), via Wikimedia Commons.

Get Practical Fraud Prevention now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.