This page contains a Flash digital edition of a book.
Interactive ONLINE FRAUD PROTECTION


Fighting fraud is the key to a fair game


Online gambling and gaming have become billion dollar industries that straddle continents, engaging millions of people from all walks of life and demographics. However, with this success, has come the serious risk of high-tech fraud.


The flow of money within online gambling is plain to see, as customers gamble their money in the hopes of winning more on a variety of games, from roulette to poker, to blackjack and even slot machines. The online gambling industry will be worth an estimated $41.4 bil- lion by the end of 2015.


We are also increasingly seeing the commoditisation of online gaming experiences through “in game purchas- es”. These most often take the shape of special items that a player can outfit their in-game character with to achieve new abilities and gain an edge over other play- ers. It may sound relatively minor and trivial to non- gamers, but the videogame industry, with almost all of its products having some form of online gaming ele- ment, is set to be worth of a staggering $55 billion by the end of 2015 .


The financial model in both of these closely related industries is absolutely dependent on maintaining the trust of the customer. Customers are no longer operat- ing in a bricks and mortar environment, they are using real world money in virtual environments. Trust there- fore becomes paramount to repeat business.


The great threat to this trust is fraud.


Since real money is at stake in both of these games, they inevitably attract fraudsters and cheats who will try to exploit loopholes or security features to gain prof- it illegally. Fraudsters use many tools and techniques to mask who they really are and their intentions.


For example, in online gaming fraudsters may find the quickest way to win is by using stolen or fraudulent credit card details to buy large amounts of in-game money or other bonus items that give them an unfair advantage. Fraudsters will also use stolen credit card details to buy paid memberships of online games, com- bined with the ability to use stolen funds to buy in- game purchases. This enables them to earn real or vir- tual currency at a faster rate. Although this may seem


1 3 2 l It may sound relatively minor


and trivial to non-gamers, but the videogame industry, with


almost all of its products having some form of online gaming element, is set to be worth of a


staggering $55 billion by the end of 2015 .


like a desperate gamer wanting to get the edge over their competition, in both online gaming and gambling, fraudsters often have far more nefarious motives.


Types of fraudulent activities and methods include: l


Illegally obtained card details. These are sourced through phishing attacks. These phishing attacks work through an email, enticing message recipients to visit and log into a fake website that will then steal banking credentials from the victim.


Fake emails to install illicit crimeware on individual computers. Tools such as keyloggers and screen scrapers enable criminals steal card data, use it to buy in-game currency or operate an online casino to gain further winnings with no risk of monetary loss to the fraudster.


l


Multiple identities. Fraudsters may attempt to estab- lish several online identities and take up several seats at an online poker table, for instance, giving them a huge advantage in the game and increasing their odds of winning tremendously.


l Money laundering. Online gambling provides a per-


Donald Bush, Director of Marketing, Kount


Don joined Kount as the Director of Marketing in October 2010 and became Vice President of Marketing in December 2012. Don attended Brigham Young University studying Business Administration and Marketing. Don has worked in several management roles within the technology segment for over 20 years with both hardware/software manufacturers and as a partner in two top technology marketing agencies. He has led products launches and marketing programs for dozens of companies around the world such as Citi, HP, IBM, Kodak, Motorola and Weyerhaeuser and co- authored the seminar series, “Common Launch Disasters and How to Avoid Them.”


In online gaming fraudsters


may find the quickest way to win is by using stolen or


fraudulent credit card details to buy large amounts of in-


game money or other bonus items that give them an


unfair advantage. Fraudsters will also use stolen credit card details to buy paid


memberships of online games, combined with the


ability to use stolen funds to buy in-game purchases.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84  |  Page 85  |  Page 86  |  Page 87  |  Page 88  |  Page 89  |  Page 90  |  Page 91  |  Page 92  |  Page 93  |  Page 94  |  Page 95  |  Page 96  |  Page 97  |  Page 98  |  Page 99  |  Page 100  |  Page 101  |  Page 102  |  Page 103  |  Page 104  |  Page 105  |  Page 106  |  Page 107  |  Page 108  |  Page 109  |  Page 110  |  Page 111  |  Page 112  |  Page 113  |  Page 114  |  Page 115  |  Page 116  |  Page 117  |  Page 118  |  Page 119  |  Page 120  |  Page 121  |  Page 122  |  Page 123  |  Page 124  |  Page 125  |  Page 126  |  Page 127  |  Page 128  |  Page 129  |  Page 130  |  Page 131  |  Page 132  |  Page 133  |  Page 134  |  Page 135  |  Page 136  |  Page 137  |  Page 138