advertisement
advertisement

This is page 2 of:

Gonzalez Lawyers, Judges Debate Data Breach Costs

March 25th, 2010

In those same federal sentencing guidelines, TJX’s filing said, “in cases involving stolen credit or debit cards, loss is quantified as a minimum of $500 per stolen payment card.” It added that its SEC filings “reported that data relating to at least 11.2 million unexpired payment cards were stolen during the intrusion. Defendant has not questioned this number. Applying the $500 per card minimum to these cards alone would yield a loss well above the $400 million threshold. The court could also apply the minimum $500 per card to the more than one million cards the Defendant stole from retailer DSW alone—thus ignoring both TJX’s claimed loss and any calculation based on payment card data from TJX—and still be well above the $400 million threshold.”

But the lawyers have many guidelines for sentencing. The law says the court should define “loss” as “the greatest of actual loss or intended loss.” The government cited a recent appellate court decision as offering yet a third metric: “The First Circuit has held that, in the case of stolen credit cards, intended loss reasonably may be found to be the stolen payment cards’ aggregate credit limit, since it is natural and probable to expect that purchasers of the stolen card numbers will charge as much as possible to them. It is also reasonable to hold a defendant accountable for the amount of loss as measured by the aggregate credit limit, even though the defendant’s personal profit has been dramatically less.”

Defense counselor Martin Weinberg disagreed. He pointed out that “the government’s discussion omits the fact that tens of millions of the accounts had expired and would therefore no longer have had credit limits at all.” He added that “the $500 per access device equation from which this figure is derived is completely arbitrary and lacking in any empirical validation” and that it was “irrational.”

Weinberg pointed out that, with TJX, “of the 36 million card numbers obtained from TJX, at least 25 million–approximately 70 percent–were expired and therefore unusable.” He also cited from a federal probation department pre-sentence report about the Dave & Buster’s breach.

“Defendants obtained account information for approximately 110,630 debit and credit card accounts through the Dave & Buster’s intrusion. However, it further states that defendants obtained account information for 5,132 accounts from a particular Dave & Buster’s restaurant but used only 675–approximately 13 percent,” Weinberg wrote. “Using the arbitrary $500 per card figure, the Dave & Buster’s loss would be $55.315 million but, in reality, the losses to Dave & Buster’s and affected financial institutions was, according to the [pre-sentence report], only approximately $1.32 million. Thus, the loss produced [in the government report] is 42 times the actual loss.”

The argument Weinberg makes is, in essence, that the government can’t take a large number of retail victims to get to a huge number of intercepted cards and then not bother proving that any of the specific claims holds up to close scrutiny.

“Despite having had access or potential access for several years to the foreign servers, to the affected corporations’ own internal investigations, and to records from Visa, MasterCard, and American Express, as well as possession of [accomplices’] computers and of records which would distinguish between losses attributable to the corporate response to the intrusion and losses attributable to use of the stolen data, the government has never quantified the amount of stolen data which was actually used to unlawfully obtain money from ATM machines, retailers, banks, or other sources to which the data was linked. Critically, despite the government’s possession of [accomplices’] computers, the government has adduced no evidence regarding the extent to which stolen data was ever used to an individual cardholder’s detriment, as opposed to simply remaining on the server.”


advertisement

Comments are closed.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.