advertisement
advertisement

This is page 2 of:

$12 Million In Duplicate Charges From Shell Oil Telco Crash

February 2nd, 2011

The bigger issue, though, is how a telco outage could have caused so many duplicate charges. Typically, duplicate charges happen when store employees are dealing with transactions that were in progress at the instant when the outage hit. If the system records are unclear as to whether the charge was fully processed and confirmed or not, associates (and, more likely, the system’s automatic process will kick in) will typically take the safe route—in terms of revenue protection—and process the charges again.

Either way, as Shell discovered, this approach can cause a lot of false charges. And it is painful well beyond the accounting cleanup. Beyond the cost of processing the reversals—and hard dollar reimbursement costs, such as for those debit customers who were hit with overdraft fees—there’s the hit to the chain’s reputation. How will customers who see such double charges feel? Will they assume the chain was trying to rip them off?

This possibility also raises some fun questions. Can Shell legal connect the dots sufficiently to make the case to AT&T? And if so, can they get AT&T to cover all of the losses in any way associated with the outage? Should it be able to?

But let’s expand this discussion. Outages that can trigger this store-and-forward headache are many, from power blackouts to telco hiccups (such as what Shell experienced) to—for E-Commerce transactions—a Web site crash or network disconnect or even a backbone provider problem.

Getting back to the AT&T liability issue, should this now be a standard part of performance guarantees? Sort of an SLA (service-level agreement) type of agreement that covers companies of this type?

The short answer is almost certainly not, because the AT&Ts and others are going to legitimately say that the duplicates weren’t really caused by the outage but by a problem with the store-and-forward system that they have nothing to do with.

The problem is that store-and-forward systems are supposed to be able to identify those transactions that had been properly processed and those that hadn’t. With more than 401,000 dupes coming from as large a chain as Shell, isn’t there a fundamental flaw?

This isn’t the first time First Data has been involved in a double-charge problem. It experienced one with Hannaford and other chains less than four months ago. In that case, customers were not only double-billed, but the retailers were double-paid. The day before Thanksgiving (Nov. 24, 2010), grocery chain Winn-Dixie—suffering an outage—reported double-charging customers in all of its 485 stores.

There have also been cases of a million double-charged transactions at Starbucks as well as publicized incidents at Macy’s plus a big one at Best Buy.


advertisement

5 Comments | Read $12 Million In Duplicate Charges From Shell Oil Telco Crash

  1. Jeff Says:

    Amazing that people and other businesses never pass on an opportunity to take a shot at AT&T. This problem was caused not by the Telco outage, but rather the flawed First Data Software code. Network outages occur, it is a fact of life in a wired network there will always be outages. Apparently Shell and First Data did not contemplate that an outage might occur and what would happen if it did.

  2. bill bittner Says:

    The thing that is so crazy about this story is that it is so simple to prevent. Every transaction initiated requires a unique ID. Whether the ID is explicitly stated or calculated by hashing values in the transaction, the ID provides a means for screening duplicates.

    But this must be an age old problem, because I can remember the VP of Tech Services reviewing transaction dumps to manually screen duplicates. We operated our own “switch” and routed the credit card transactions coming in from the stores to the providers. I never got an explanation why this couldn’t be programmed back then, but apparently it still exists.

  3. Steve Sommers Says:

    In dealing with issues like this for over 20 years and designing systems and subsystems to prevent or minimize issue like this, I don’t blame any of the parties mentioned in the article. Instead, I blame a fundamental flaw in the core authorization/clearing systems run by the card brands. The one piece missing is an end-to-end Globally Unique ID (GUID) assigned to the transaction at the point of origin. This point of origin GUID assignment should be as close to the point of entry as possible (or point of initiation in the event of recurring transaction).

    Right now there is no such capability and without it, you can write all the preventative code you want but at some point a decision needs to be made — error in favor of the cardholder, or error in favor of the merchant and arguments could be made for both. Adding this GUID would (or should) guarantee no double postings no matter how many times the transaction is retried or reposted.

    As to the liability argument, good luck. The only winners will be the lawyers. Even SLA’s won’t stop the finger pointing: the POS vendor should have coded for this, the merchant should have audited prior to settlement, a velocity threshold should have alerted First Data, etc., the possibilities are endless.

  4. econobiker Says:

    This also happened on Friday January 28 in the afternoon as I experienced the double bill from a Shell gas transaction around 4:30pm CST 01-28-11.

  5. Malathi Says:

    Absence of uniqueness has been a huge question mark & I thought that this has been a black box to me as I did not get clear answers. Thanks to Steve Sommers on throwing light. There are many ways by which this can be achieved. As we move towards chip & pin transactions, one quick suggestion could be card number combined with card transaction counter (CTC). Would ISO include this or other as an enhancement to 8583? This uniqueness will make a lot of sense to payment industry.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.