Feeds

Kid crims don't need to skim: Paywave cards lead fraud rise

Fraud experts disagree: Tap'n'go won't get cash for a stash

  • alert
  • submit to reddit

The essential guide to IT transformation

Victoria Police's top brass have criticised Australian banks for a rise in contactless credit card fraud arising from stolen tap and go cards.

Chief commissioner Ken Lay told reporters theft of the cards - which did not require proof of ownership for purchases under $100 - had contributed to a 48 percent rise in deception crime over the last twelve months across the Garden State.

"The banks simply need to do more to crack down on this," Lay said.

"It is simply not good enough and it's not good enough for the banks simply to say 'oh we'll cover the cost'".

His deputy Lucinda Nolan said children as young as 10 had stolen the contactless cards to make fraudulent purchases.

"We are very, very concerned with the trend and correlation between tap and go and residential burglaries in particular," Nolan told reporters.

"From a personal perspective, i'd like to see them scrapped."

Cards were stolen from mailboxes and houses, she said, noting crime was up 5 percent across the state.

But one fraud expert formerly working at a major Australian bank said the alarm could be a red herring because police had little visibility into more damaging and prolific online fraud.

"People report their wallet getting stolen to the police [but] they do not report their card number being used for card not present [fraud]," he said.

"Police don't generally see most of the day-to-day banking fraud that goes on as it isn't reported, so [contactless fraud] looks like a crime wave when it's really a drop in the ocean value wise."

He suspected contactless fraud could be on the rise among drug users due to its high liquidity, citing figures in a Victoria Police report that robbery had declined 12 percent. He suggested pinching contactless cards could lend to a reduction in muggings and physical assaults.

Mastercard Australia Andrew Cartwright said the company's statistics did not show an increase in fraud against contactless cards.

Researchers have since 2006 developed a variety of hardware and software platforms to steal contactless cards via wireless transmissions. Some were able to break through protective wallets.

Researcher Kristen Paget developed a wallet protector dubbed Guardbunny which squealed a high-pitched sound and illuminated the eyes of the bunny logo glow (as pictured) when RFID signals were detected. ®

Next gen security for virtualised datacentres

More from The Register

next story
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
Linux kernel devs made to finger their dongles before contributing code
Two-factor auth enabled for Kernel.org repositories
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.