Modernizing Check Fraud Detection With Machine Learning
Modernizing Check Fraud Detection With Machine Learning
by
Lydia M. Rose
Utica College
December 2018
Master of Science in
Financial Crime and Compliance Management
ProQuest Number: 13421455
All rights reserved
INFORMATION TO ALL USERS
The quality of this reproduction is dependent upon the quality of the copy submitted.
In the unlikely event that the author did not send a complete manuscript
and there are missing pages, these will be noted. Also, if material had to be removed,
a note will indicate the deletion.
ProQuest 13421455
Published by ProQuest LLC (2018 ). Copyright of the Dissertation is held by the Author.
All rights reserved.
This work is protected against unauthorized copying under Title 17, United States Code
Microform Edition © ProQuest LLC.
ProQuest LLC.
789 East Eisenhower Parkway
P.O. Box 1346
Ann Arbor, MI 48106 - 1346
© Copyright 2018 by Lydia M. Rose
ii
Abstract
Even as electronic payments and virtual currencies become more popular, checks are still the
nearly ubiquitous form of payment for many situations in the United States such as payroll,
purchasing a vehicle, paying rent, and hiring a contractor. Fraud has always plagued this form of
payment, and this research aimed to capture the scope of this 15th century problem in the 21st
century. Today, counterfeit checks originating from overseas are the scourge of online dating
sites, classifieds forums, and mailboxes throughout the country. Additional frauds including
alteration, theft, and check kiting also exploit checks. Check fraud is causing hundreds of
millions in estimated losses to both financial institutions and consumers annually, and the
problem is growing. Fraud investigators and financial institutions must be better educated and
armed to successfully combat it. This research study collected information on the history of
checks, forms of check fraud, victimization, and methods for check fraud prevention and
detection. Check fraud is not only a financial issue, but also a social one. Uneducated and
otherwise vulnerable consumers are particularly targeted by scammers exploiting this form of
fraud. Racial minorities, elderly, mentally ill, and those living in poverty are disproportionately
educating customers, complying with regulations, and tailoring alerts that are both valuable and
fast. Applications of artificial intelligence including machine learning and computer vision have
many recent advancements, but financial institution anti-fraud measures have not kept pace. This
research concludes that the onus rests on financial institutions to take a modern approach to
check fraud, incorporating machine learning into real-time reviews, to adequately protect
victims. Keywords: Financial Crime and Compliance Management, Dr. Kyung-Seok Choo,
My first and greatest acknowledgement must be of my husband, Michael. His steadfast support
of my endeavors (including spending the first two years of our marriage completing a master’s
program) can only be repaid with a lifetime of my love. I hope to support you as loyally in
whatever you wish to do. Thank you, Michael, and I cannot wait to be your wife again! Second, I
would like to thank the faculty and staff of Utica College for leading students on an academically
rigorous course of study. Completing the Financial Crime and Compliance Management program
has prepared me for the rest of my career and served to further ignite my passions for both justice
and learning. I am also deeply appreciative for the support of my friends, family, and colleagues
who have collectively buoyed me on this journey. I doubt my sanity would be as nearly intact
without you all and I appreciate you sticking by me. I owe a particular thank you to my manager,
Mike McWhirt, whose mentorship and guidance—both on this paper and always—are endlessly
respected. Finally, to the management of Credit Union of Colorado, thank you for the support
you give to employees to follow their dreams. I assure you all that your investment in me is
iv
Table of Contents
v
List of Illustrative Materials
vi
Introduction
Ancient merchants required a secure method of transferring funds from one person to another
over a great distance. Beginning in the 1200s, they used an instrument called a bill of exchange,
which was later replaced by the widespread use of checks. The first check fraud was reported in
the fifteenth century (Quinn & Roberds, 2008, p. 3). Today, though the use of checks has
decreased year over year since 1999, the decline has slowed. The dollar value of commercial
checks clearing through the federal reserve system actually increased between 2016 and 2017
(Board of Governors of the Federal Reserve System, 2018b). Even with the arrival of Automatic
Clearing House (“ACH”) and virtual currency payment systems, the need for paper checks has
Check fraud has resurged in recent years. Both the number of overall consumer reports of
check fraud victimization and the proportion of check fraud events compared to all fraud types
increased between 2015 and 2017 (Federal Trade Commission, 2018). In a survey of 138 banks,
the American Bankers Association found that check fraud was responsible for 35% of overall
fraud losses to banks in 2017. Bank respondents also reported an increase in check fraud
compared to 2008. This shift was attributed to the relative ease of committing check fraud while
card fraud has become more difficult with the recent implementation of chip cards (“EMV”)
(American Bankers Association, 2018). A coordinated effort by law enforcement and private
partners to concentrate on check fraud, through consumer education and enforcement efforts was
made in 2009. A decline in consumer complaints to the Federal Trade Commission (“FTC”)
Consumer Sentinel was observed following this effort but check fraud complaints have begun to
1
grow again in the last four years (Baker, 2018). Thus, it is highly likely that investigation and
The purpose of this research was to evaluate the current status of check fraud and propose
a modern solution. Who is involved in check fraud and how does it take place? How could
machine learning be used to combat check fraud? Is it superior to—or could it supplement—
In one type of check fraud, victims are scammed into depositing (or allowing a fraudster
to deposit) fraudulent checks and money orders. According to a study by the Better Business
Bureau (“BBB”), checks are used in many different types of scams. For instance, the victim may
receive a check for more than expected for the sale of an item on an online classifieds site, with
instructions to purchase supplies for a work from home job, or to cover taxes on a supposed
sweepstakes prize (Baker, 2018). The victim is then directed to send a portion of the funds to the
perpetrator as a form of advance fee fraud. Advance fee fraud is characterized by an upfront
payment by the victim to the fraudster with the expectation that the payment will lead to future
profit or benefit. After the fee is advanced, no profit or benefit is ever received (Akinladejo,
2007, p. 321).
Several factors have conspired to make check scams especially damaging when
scarcity (possibility of losing out on a perceived opportunity) and reciprocation (complying with
the requests of someone to whom one feels a sense of indebtedness) (Archer, 2017, p. 35).
Unwittingly, the consumer’s exposure to this form of fraud increased as a result of the
Availability of Funds and Collection of Checks (“Regulation CC”). Regulation CC requires that
financial institutions make funds available for certain “low risk” items such as treasury and
2
cashier’s checks on the business day following the deposit while all other checks must have a
portion made available by the second business day (Board of Governors of the Federal Reserve
System, 2017). Many financial institutions expedite funds availability ahead of the schedule
required by regulation as a courtesy to their customers. The victim often advances the fee as
directed by the scammer from funds made available from the check deposit, mistakenly believing
Once the deposit is found to be fraudulent, the entirety of the balance is owed back to the
depository financial institution. Under their service agreements, most financial institutions deny
responsibility for validation of checks and place the liability for fraudulent deposits on the
customer who allowed the activity. For example, in Bank of America’s deposit agreement and
disclosures, the bank informs customers that it does not verify if checks, money orders, cashier’s
checks, or similar items are authentic and valid at the time of negotiation. Further, if an item is
later discovered to be fraudulent, counterfeit, or invalid for any reason, the customer’s account
can be charged for the full amount (Bank of America, 2018). Losses to the victim customer are
not covered by federal deposit insurance (Federal Deposit Insurance Corporation, 2018). If the
customer has no ability to repay, the balance is written off as a loss to the financial institution
and is assigned to collections. The collection process can result in civil judgements and
Vulnerability to check fraud can be identified through several risk factors. A survey by
the AARP characterized victims of advance fee frauds as single, less than college educated,
earning less than $50,000 annually, and less aware of consumer protection information (Pak &
Shadel, 2011, p. 5). Individuals who recently suffered a serious loss like a death or divorce are at
higher risk of falling victim to a scam (Federal Trade Commission, 2013). In its annual report on
3
fraud, the Federal Bureau of Investigation reported that the majority of complaints it received
through its Internet Crime Complaint Center (“IC3”) were from victims over 60, who also
experienced the highest total losses in all types of fraud (Federal Bureau of Investigation, 2017).
Beyond likelihood for victimization, some consumers—particularly those that are disabled,
According to a survey of 31,980 victims, the median loss in a counterfeit check scam was
$1,008 (Federal Trade Commission, 2018). Victims aged 80 or older reported they lost at least
twice as much as those between 20 and 69, and 1.5 times as much as those between 70 and 79
(Federal Trade Commission, 2018). While most consumers reported they would use savings if an
unexpected expense arose, for individuals living on the edge of homelessness or bankruptcy, a
$1,000 loss may spell ruin. The median balance in savings for households earning under $25,000
a year is $670. The median savings account balance for African American and Hispanic
households is $1,500 (Board of Governors of the Federal Reserve System, 2018a). The
millions lost in investment schemes and other scams. However, beyond financial strain, fraud
victims experience other serious consequences including feelings of shame, depression, and even
suicidal ideation (Ganzini, McFarland, & Bloom, 1990, pp. 61-62). Check fraud, while it can
happen to anyone, impacts the vulnerable most severely. Fortunately, it is also one of the most
consistent scams to profile because all check fraud begins with a single predicate act: the
Financial institutions are in the best position to combat the avoidable loss caused by
check fraud, and it is in their own interest. In 2016, check fraud cost banks approximately $789
million, an increase of 25% since 2014 (Baker, 2018). Customers are dissatisfied by the
4
experience of falling for a scam and losing money. They lose trust in their bank’s security
practices and have incentive to terminate the relationship (Telang & Somanchi, 2016). Banks
already perform substantial fraud prevention, having stopped around $9 out of every $10 in
attempted deposit account fraud in 2016 (American Bankers Association, 2018). Much of this
success can be attributed to the training and experience of front-line staff and bank efforts to
educate the public. However, almost 75% of the time, the customer withdraws the money from a
fraudulent check at a point of sale, not at a teller line (Baker, 2018). This suggests further effort
must be made to detect fraudulent items at the time of deposit—before any funds are spent.
artificial intelligence (“AI”) that allows computers to learn and improve from previous
experiences without manual programming (Jean-Philippe, 2018, p.1). Machine learning can be
utilized for advanced decision making and pattern recognition of text, speech, and images. Some
forms of machine learning attempt to bring computers as close as possible to the point of
mirroring human reasoning when a pre-determined answer cannot be applied to the data
(Lidestri, 2018, pp. 5-6). Machine learning can still be designed to maintain logical neural
pathways while remaining free from preconceived biases and flaws of human analysts. An
adjuacent field to machine learning is data mining. As explained by Dua & Du (2011), data
mining is the extraction of useful information from large amounts of data. The patterns,
relationships, and rules determined by data mining techniques can be used to predict behavior
from patterns discovered in the data (p. 5). Hitherto unrecognized information within large sets
of data, such as fraud transactions, can be discovered and understood by applying AI, machine
5
The financial industry is already beginning to use AI and machine learning. Machine
learning technologies are being applied to predicting credit default (Moula, Guotai, & Abedin,
2017) and events in the stock market (Chatzis, Siakoulis, Petropoulos, Stavroulakis, &
Vlachogiannakis, 2018, p. 353). The Securities and Exchange Commission (“SEC”) recently
began using a machine learning approach to behavioral predictions and risk assessment.
Researchers built topic and sentiment models to examine text in enforcement actions and
examination results, which could be used to identify future fraud and misconduct (Kutler, 2017).
The Financial Industry Regulatory Authority (“FINRA”) reported success with a machine
learning feedback loop between human analysts and a program based on current trends and
patterns, allowing more nimble fraud detection (Financial Industry Regulatory Authority, 2018).
Machine learning algorithms have even been developed to create “computer vision” which
senses variation in light and object shapes in images and video, mimicking the sensorial areas of
the neocortex in the human brain (Sohangir, Wang, Pomeranets, & Khoshgoftaar, 2018, p. 2).
This paper will theorize it could be beneficial to use machine learning to “read” the check with a
more human-like eye and recognize red flags, alterations, or signs of a counterfeit instrument.
Current solutions for check fraud prevention and detection, other than bank efforts
mentioned above, are two-fold. One method fraud investigators at financial institutions use is
software that generates alerts based on transaction activity. As described by Julisch (2010), the
Knowledge-based alerts use knowledge of past frauds to detect future instances of the same
pattern of fraud. This is a simple form of machine learning. Behavior-based alerts detect
period of time such as a business day, depending on the financial institution’s practices. One of
the issues with this approach to check fraud detection is false positive and false negative alerts. A
false positive is an alert mistakenly triggered when the condition is not present, while a false
negative is when an alert fails to trigger despite the condition actually being present (Rouse,
2014). Another problem is a delay between the time of deposit, the triggering of the alert, and the
review of the alert by an analyst. At any point, the participant may have already withdrawn the
The second solution commonly used by financial institutions is check fraud consortiums.
One example is a company called Early Warning, which has developed a bank-to-bank network
of 2,300 financial institutions including five of the largest banks in the U.S. Members of the
network can query the database of collaborative, shared intelligence on available balances,
account status, and more (Early Warning, 2015). The member financial institutions consort with
each other, making identification of potential problem items far easier. As with the above
software alerts, consortiums create many false positive alerts. Both software alerts and
consortiums cannot be discounted for their utility, but financial institutions could still do more to
Checks are a centuries-old method of payment. Many new forms of payment have been
developed, and yet the check has persisted. Scammers have taken advantage of modern
technology like Photoshop to make better fraudulent checks, but there is still room to innovate in
check fraud prevention. There are many possible solutions offered by present-day technology.
Whether drawn in by the promise of a new job, online romance, or a lottery prize, at-risk
7
consumers experience dire consequences from negotiating fraudulent checks. Protecting victims
Literature Review
The purpose of this research was to evaluate the current status of check fraud and propose
a modern solution. In light of this goal, one must understand how check fraud has evolved, the
relevant laws and regulations, and the capabilities of cutting-edge artificial intelligence
applications in this area. This portion of the paper will identify current industry efforts by
financial institutions to prevent and detect check fraud and explore the possibility of
of funds from one party to another, with the help of one or more banks. The proper definition of
a check is as follows:
A check is a written order to a bank by a depositor at that bank (known as the drawer or
maker). The order instructs a bank to pay a third party (known as the payee) a certain sum
of money from the depositor’s account when the check is presented to the bank (Quinn &
Roberds, 2008).
Routing and account number information along the bottom of the check indicates which account
at which depository bank should be debited to pay the item. A check is, at its most basic, a piece
of paper with a few special words and numbers inscribed upon it; yet, this form of payment has
been in use for at least 600 years. It is important to understand the history of the check and its
8
Quinn & Roberds (2008) completed a historical survey of the check as a method of
payment from medieval times to present for the Federal Reserve Bank of Atlanta. The word
‘check’ may have similar origins to the Arabic sakk, an instrument distributed in the Muslim
world in the tenth and eleventh centuries which allowed merchants to pay third parties from their
bank accounts via written order. Another instrument, called a bill of exchange, was also
commonly used by merchants in the same time period in Europe. A weakness of the bill of
exchange was that it only worked over distance as it relied on the passage of time: generally, the
length of time it took for the ship carrying goods to arrive to its destination. The check
superseded the bill of exchange in popularity by the sixteenth century in Europe with the
invention of negotiability, or the item being recognized as collectible after circulation. The
second revolutionary change in the same period was the practice of endorsement, which allowed
transfer of the note to an endorsee and created liability for the endorser should the item be
dishonored. However, the check did not truly rise to primacy in the United States until the 1920s
with the establishment of the Federal Reserve nationwide clearing system (pp. 1-23).
The nationwide clearing system allowed the exchange of checks across state lines without
the use of complicated and expensive correspondent relationships that were previously relied
upon. The Federal Reserve collects checks for depository financial institutions, which receive
check deposits drawn on other institutions. The Federal Reserve Bank facilitates crediting the
depository account and collecting from the paying bank. Presentment of the item, reconciliation
with the paying bank, and notification of the paying bank’s response may take as little as one
business day each (Board of Governors of the Federal Reserve System, 2016). Though credit
cards began being used commonly in the 1960s and direct deposit or ACH payments were used
9
nationwide by 1978, checks remained the majority non-cash monetary payment method through
Though the check has since been overtaken in popularity by the debit card and a
combination of electronic payments, it has not been retired from use. In 2017, 5.15 million
checks were cleared through the Federal Reserve, valuing over $8.4 billion. This was an increase
of 4.3% over 2016 and the average daily value in commercial checks collected has increased
every year since 2013 (Board of Governors of the Federal Reserve System, 2018b). The number
of per capita payments made each year with a check declined from 148.4 in 2000 to 58.4 in 2012
in the United States. In the same period, the share of the number of payments made by check also
declined by 73% (Silva, Ramalho, & Vieira, 2017, p. 585). Despite this, the check is still popular
with both businesses and individuals in the United States. Checks function as a miniature
contract between the maker of the item, the paying institution, the payee, and the depository
financial institution (Quinn & Roberds, 2008, p. 7). Certain aspects of checks enhance the
verification of the transaction, namely maker signature and payee endorsement. The lack of
information exchange required between maker and payee makes the check a convenient form of
payment for personal instances like buying a car, paying rent, or settling a dentist bill. Finally,
details contained on checks like addresses and memo lines allow businesses to easily account for
payroll and invoicing (Monga, 2014). These features do not currently have a substitute amongst
Some critical developments have allowed the check to endure. The first was the
recognition (“MICR”) technology in 1956. The MICR line, as it is referred to in banking, is the
numerical information printed at the bottom of the check. The special ink used to print this line is
10
magnetic and readable both by people and by check scanners used by most financial institutions
(Quinn & Roberds, 2008, pp. 19-20). Next, the Expedited Funds Availability Act, which was
including checks. Certain deposits, such as treasurer’s checks and cashier’s checks were
identified by Congress to be low risk and must have at least $200 made available on the business
day following the deposit while all other checks must have at least $200 made available by two
business days following the deposit (Board of Governors of the Federal Reserve System, 2017).
Regulation CC allows for exceptions for new accounts, large deposits, repeatedly
overdrawn accounts, emergencies including power failures, and more as long as proper
disclosure is given to the customer. This update facilitated consumer access to proceeds from
checks, making them more convenient, while also mandating timeframes for the return of
uncollectable items (Board of Governors of the Federal Reserve System, 2017). Finally, the
Check Clearing for the 21st Century Act (“Check 21”) enacted in 2003 allowed the use of
electronic images and processing for the collection of checks, creating efficiency in a heretofore
paper-heavy process (Board of Governors of the Federal Reserve System, 2016). The processing
of paper checks now ceases as soon as the item is converted into an electronic image, making it
Fraud is defined as a criminal act where a person uses deceit and dishonesty to obtain an
unjust advantage over another person or entity (Akinladejo, 2007, p. 320). In frauds involving
payment, the perpetrator exploits the credulity of the victim and deceives them into initiating
payments to the fraudster’s benefit (Julisch, 2010). Check fraud is as old as the instrument itself.
The check was first recorded in Europe around the year 1400 and with it came fraud, abuse, and
11
controversy. Once the concepts of negotiability and endorsement were established, when a check
was “dishonored” or unpaid due to fraud or default, the funds could still be pursued back along
the chain of endorsements based on the reputations staked by the prior endorsees of the item
(Quinn & Roberds, 2008, pp. 3-6). Collection on modern dishonored checks functions similarly.
By endorsing a check when depositing it at their financial institution, the payee warrants to their
bank that the check is good. As a check is processed, it may pass through several hands before it
reaches the bank it is drawn on (the paying bank). Each party provides a warranty to the next
party in the processing chain and unpaid funds, for fraud or otherwise, are still collected on the
Checks are subject to more fraud than any other payment method (Association for
(“ACFE”), check fraud is particularly common because some items required to commit check
fraud (scanner, printer, and personal computer) are easy to obtain and the risk of being caught
and prosecuted is low (Association of Certified Fraud Examiners, 2017, p. 431). There are
several different methods of check fraud. The ACFE’s Fraud Examiners Manual categorizes the
Counterfeit checks are fake checks purporting to be from legitimate individuals, financial
institutions, and businesses. Fraudsters attempt to copy legitimate formats of these instruments
and may use real routing and account numbers but the manufactured items are not authorized by
the true account holder (Salinger, 2005, p. 77). Fraudsters may obtain a legitimate check or
money order from the mail, for example, and then scan and Photoshop the original, editing it to
suit their needs before printing it on check stock for distribution (Baker, 2018). Counterfeit
12
checks attempt to replicate a template for a real check or money order while issuers of legitimate
items strive to create security features to thwart counterfeiters. Thus, an arms race continues
Theft and alteration are committed through use of legitimate checks rather than creating
original fictitious items. These two categories of check fraud often go hand in hand. A thief may
steal and forge blank checks, capture checks in transit, or take over an account and write checks
with the stolen information. Alteration occurs when the fraudster changes information on the
check (e.g. payee, amount) without the maker’s knowledge or permission before the item is
negotiated (Association of Certified Fraud Examiners, 2017, p. 427). The criminal utilizes a
chemical “wash” or other means to erase the targeted information and then adds information by
handwriting, typewriter, check imprinter, or laser printer to the check (Check Fraud Working
Group, 1999; Salinger, 2005, p. 77). Alteration and theft were likely forms of fraud that plagued
even the earliest forms of checks and monetary instruments, the bill of exchange and sakk.
The final two—paperhanging and kiting—are forms of check fraud wherein the customer
is not the victim, but the suspect. Paperhangers present knowingly bad checks (e.g. drawn on a
closed account) for goods or services at merchants and for cash at banks. They repeat the scam,
“hanging paper” or passing these checks and taking advantage of lax check hold and
identification review policies (Association of Certified Fraud Examiners, 2017, pp. 427-428).
Finally, kiting is a form of check fraud conducted by the customer themselves between one or
more of their own accounts. Check kiting takes advantage of what is known as check float. Float
is the delay between the time a check is deposited at the payee’s bank and the time the check is
paid by the paying bank (Quinn & Roberds, 2008, p. 21). A check kiter writes checks back and
forth from multiple accounts, but no funds actually exist. Until caught, this scheme can continue
13
indefinitely with one check written against insufficient funds covered by the next check deposit,
resembling a shell game (Association of Certified Fraud Examiners, 2017, p. 428; Salinger,
2005, p. 158).
Of the many varied forms of check fraud, counterfeit checks are the most often associated
with scams and are the form of check fraud most likely to cause a consumer loss. Most
counterfeit checks circulated in the United States originate from overseas (Baker, 2018). The
victim has little genuine identifying information regarding the actual counterfeiter in many cases
as the interaction occurs entirely online, by phone, or by mail (Association of Certified Fraud
Examiners, 2017, p. 426). Figure 1, below, illustrates the process of a check fraud facilitated by
Figure 1. Process to commit fraud with a counterfeit check for romance scam. Reprinted from
Mobile Banking Fraud Trends: Fraudulent Checks Meet Remote Deposit Capture by Guardian
Analytics, 2016, Retrieved from https://guardiananalytics.com/wp-
content/uploads/2018/06/FraudUpdate_MobileRDCTrends_March2016.pdf. Copyright 2016 by
Guardian Analytics.
14
Online job, overpayment, and advance fee scams utilizing checks all follow similar models. An
estimated 400% increase was observed in losses between 2012 and 2014 due to fraudulent
checks deposited through Remote Deposit Capture (“RDC”) mobile banking services (Guardian
Analytics, 2016). The customer themselves either performs the check deposit or provides
account credentials that instigate the fraud. Conversely, in theft and alteration varieties of check
fraud, the account holder may have no awareness of the transactions until they review their
monthly bank statement. In cases of paperhanging and kiting, it is up to the financial institution
to detect and halt the activity, risking losses the longer the activity continues.
Victim information
The true victim of a check fraud may be difficult to identify. Liability for fraudulent
checks varies on the circumstances of the negotiation, timing of discovery, and type of fraud.
The customer is responsible for preventing and reporting forgeries, alterations, and other
unauthorized uses of their own checks. The financial institution is not required to perform
examination of checks outside the duty of ordinary care (Bank of America, 2018). The customer
is not typically held liable for unauthorized checks written from their accounts provided they
dispute the item in a timely manner. Financial institutions disclose deadlines for disputing
transactions in their agreements. The determination of whether the liability for the fraud lies on
the depository bank or the paying bank within that timeframe is governed by the Uniform
Commercial Code (“UCC”). The paying bank must either pay the item or return it by midnight
on the banking day following the day the item was presented for payment. Past this “midnight
deadline” the paying bank may still place the liability on the depository bank if the depository
bank breached its warranty in accepting the item. The paying bank may make a warranty claim
15
under the UCC for up to 3 years following the negotiation of the check (Smith, 2001).
If their agreements allow for it, the depository financial institution may pass the liability
on to the customer that deposited the fraudulent item. If an item deposited to the customer’s
account has been paid by the bank on which it is drawn and that item is later returned with a
claim that the item was altered, forged, unauthorized, bears a forged or missing endorsement, or
should not have been paid, the customer’s account may be charged for the amount of that item
without prior notice (Bank of America, 2018). Customers who are victims of scams are not
covered by bank insurance policies, which cover the bank from losses related to fire, robbery,
and embezzlement, among others (Federal Deposit Insurance Corporation, 2018). Though liable,
the customer may refuse to pay, leaving the bank to attempt to gain restitution through criminal
or civil courts.
Likewise, the customer making the deposit is responsible if the deposit is returned unpaid
within the midnight deadline. A portion of the funds are made available to the customer by the
second business day following the deposit in most cases (Board of Governors of the Federal
Reserve System, 2017). In the majority of check scams, the victim sends funds made available
from the fraudulent check back to the scammer by wire transfer (Federal Trade Commission,
2018). The processing of the check through the Federal Reserve System may take up to 3 or
more business days. When the check is presented, the countdown for the midnight rule begins
(Smith, 2001). A check deposited on a Friday may not be returned until the following
Wednesday or even later, which is in compliance with UCC. This gap in time is where check
16
There are several sources to obtain data about check fraud victimization amongst
consumers. One is the FBI’s IC3 database. In 2017, IC3 received 301,580 complaints from
victims of Internet-facilitated crime. Of those, 16,368 reported being victims of advanced fee
scams and lost a collective $57.8 million, or about $3,535 per victim. Another 15,372 were
victims of confidence fraud or romance schemes ($13,750 loss per victim), 15,784 of
employment frauds (losing $2,463 on average), and 23,135 were victims of overpayment scams
($2,310 average loss) (Federal Bureau of Investigation, 2017). The data does not report how
many of these incidents involved check fraud. However, the FBI acknowledges that counterfeit
check schemes often target individuals that use the Internet for classifieds, romance,
Another source for check fraud victim data is the FTC’s Consumer Sentinel complaint
database. The FTC received reports from 2.7 million victims of fraud, identity theft, and other
schemes in 2017. Of those, 31,980 consumers reported they were victims of counterfeit check
scams. The number of reports of check fraud victimization from consumers to the FTC has
increased every year since 2015 (Federal Trade Commission, 2018). In fact, the number of
complaints received by the FTC Sentinel database and the IC3 more than doubled between 2014
and 2017 (Baker, 2018). Only 33% of all reporting consumers who were convinced to deposit a
fraudulent check as part of a scam said they took a loss. However, the average loss to consumers
in general from counterfeit checks was $1,008 in 2017, and the loss to a victim in the military
was $2,200 on average. These figures are significantly higher than the median loss of $429 per
consumer fraud incident overall (Federal Trade Commission, 2018). An estimated 36% of
businesses and 25% of households have recently been victims of white-collar crimes in contrast
with 8% for traditional property crimes and 1.1% for violent crime (Cliff & Wall-Parker, 2017)
17
The National Consumers League, through their website Fraud.org, and the BBB’s Scam
Tracker are additional collectors of victim reports. Fake check scams were one of the top overall
scams reported to the National Consumers League, occurring both online and offline, and
complaints about fake checks were up 12% over the previous year (National Consumers League,
2018; Baker, 2018). Likewise, the BBB was contacted by 47,827 victims and found that fake
check/money order scams were a component of most other types of scams including employment
and sweepstakes. Check fraud victims had the third highest median dollar loss behind family
Check fraud occurrences are likely vastly underreported. Only an estimated 29% of fraud
victims report to any sort of authority such as the Federal Trade Commission or BBB (Pak &
Shadel, 2011, p. 5) and less than 1 in 10 victims ever report to law enforcement (Baker, 2018).
Meanwhile, the United States Postal Inspection Service reported intercepting counterfeit checks
with a face value totaling $62 billion from the mail, and another 13,724 counterfeit postal money
orders totaling over $14 million in 2017 alone (Baker, 2018). The crimes not reported, and the
counterfeit items not cashed, serve to illustrate the immense problem of modern-day check fraud.
Based on reporting estimates, approximately 500,000 U.S. citizens were victims of check fraud
likely to be victims of a check scam while certain ages, races, and income levels are
disproportionately harmed by the resulting financial loss. The highest rates of check fraud
occurred in victims in the age range of 20-29 (Baker, 2018). Those aged 20-29 reported losing
money in a scam 40% of the time, compared to only 18% of people aged 70 and older. However,
those over aged 70 had much higher median losses than any other age group (Federal Trade
18
Commission, 2018). African Americans and Hispanics were more likely to experience fraud than
other racial groups. Individuals making less than $20,000 a year and those who did not complete
high school were also more likely to become victims (Federal Trade Commission, 2013).
Surveys of consumer financial habits prove that the most vulnerable cannot sustain even
a $1,000 loss without being brought to the brink. Based on income, households making $25,000
annually have a median savings balance of $1,400, while those making less than $25,000 have
just $670 saved for an emergency. Conversely, households making $115,000 have a median of
$13,000 saved. By race, African American and Hispanic households have a median of $1,500
and $1,510, respectively, while Caucasian households have $9,700 (Board of Governors of the
Federal Reserve System, 2018a). These disparities reveal that even though anyone can be the
Even before the fraud occurs, victims’ lives often show signs of distress. Individuals who
engaged in risky purchasing practices, who had experienced a serious negative life event1 in the
past 2 years, or who indicated that they had more debt than they could handle were each more
likely to be victims of fraud than those who had not (Federal Trade Commission, 2013). Ganzini,
McFarland & Bloom (1990) performed a study comparing victims of violent crimes like rape,
robbery, and assault with victims of non-violent financial (“white-collar”) crimes of fraud,
forgery, and embezzlement. Their comparison was based on parameters including recovery rates
after victimization as well as the effects of the crimes on resultant psychiatric disorders. Both
victim groups were found to be more likely to require treatment for anxiety and major depressive
1
A serious negative life event was described in the survey to include a divorce, the death of a family member or
close friend, a serious injury or illness in the family, or the loss of a job (Federal Trade Commission, 2018).
19
disorder (up to and including suicidality) after the crime occurred. Of fraud victims, this was
particularly true for individuals who already had a history of mental illness or whom experienced
a decreased standard of living following the loss (pp. 55-62). Victims can be severely harmed by
check fraud.
Financial institutions also experience significant check fraud losses, either due to liability
under UCC rules or lack of repayment by customers (both victims and perpetrators). In a survey
of fraud and anti-money laundering professionals, 63% responded that scams are most frequently
funded with a fraudulent check and that more than a third of losses to their financial institution
were from customers who were scammed (Verafin, 2017a). Attempted fraud against deposit
accounts including checking accounts rose from $12.9 billion in 2014 to $19.1 billion in 2016.
Financial institution industry losses are estimated at $789 million annually as a result of check
fraud alone (American Bankers Association, 2018). 74% of organizations experienced check
fraud in 2017 (Association for Financial Professionals, 2018). Fraud losses to financial
institutions typically do not take into account expenses related to prevention, detection,
investigation, and prosecution of the fraud (Mazur, 2014, p. 11). According to the U.S.
Activity Report (“SAR”) stats, depository financial institutions filed 152,602 SARs in 2016 and
145,274 in 2017 regarding check fraud (Financial Crimes Enforcement Network, 2018). Check
Financial institutions are invested in preventing and detecting fraud both as a service to
their customers and to protect their reputation and assets (Julisch, 2010). Financial institutions
already employ many different measures to prevent and detect check fraud. Staff training is
20
important for identifying fraudulent checks. Frontline staff can recognize signs of alteration,
forgery, missing information, and red flags in customer statements and actions (Association of
Certified Fraud Examiners, 2017, pp. 433-434). Some banks offer positive pay to their
customers, which is a process for clearing checks only if they are verified against a list of
authorized items and payees provided by the customer (Association of Certified Fraud
Examiners, 2017, p. 204). When surveyed by the ABA, most banks reported using manual
fraud (Mazur, 2014, p. 11). Transaction monitoring and out-of-pattern detection are most often
One of the most common strategies today is transaction monitoring software2 that triggers
alerts for review by human analysts. The following activity exemplifies some patterns of check
fraud that may be detectable by fraud alert software: frequent deposits and withdrawals—
particularly round number or in the same amount, low average balance compared to high level of
sudden deposits, checks clearing out of sequence, and cash withdrawn immediately from
deposited checks (Association of Certified Fraud Examiners, 2017, pp. 434-435). Commercial
detection methods. A knowledge-based alert would trigger if multiple transactions occur within a
given time period and aggregate above a given dollar threshold. Behavior-based alert techniques
focus on comparing transaction behavior to the expected value based on historical or global
2
Prominent fraud detection software companies include Verafin, NICE Actimize, Fiserv, and Banker’s Toolbox.
21
An important feature for adequate fraud alerts is the ability to detect cross-channel fraud,
or fraud that involves more than one type of product or service (Castanheiro, 2017). For instance,
in the type of fraud profiled in Figure 1 (above), fraud alert software may be able to detect what
is known as “account takeover” when the fraudster accesses the victim’s mobile banking account
to perform the check fraud. Characteristics of account takeover include an unusual digital
fingerprint and changing contact information (Verafin, 2017b). It is not economical nor possible
to prevent 100% of fraud (Julisch, 2010). When implemented, fraud detection through software
alerts can be tailored to acceptable risk thresholds set by the individual financial institution.
Fraud alerts are only as useful as they are practical. The practicality for financial
institutions relies on the cost of ownership, implementation, and operation of the software
compared with the fraud losses prevented as a result. Most financial institutions still experience
difficulty with excessive false positives and false negatives and a manual response to fraud (e.g.
blocking payments) following reception of the alert. Fraud alerts are also limited by the
software’s ability to adapt and evolve over time and the battle to anticipate rather than detect
fraud after the fact (Julisch, 2010). False identification of fraud and the inconvenience of
Nonetheless, banks that display knowledge and competence regarding fraud create a feeling of
safety for their customers, improving key factors of customer relationship quality and loyalty.
These benefits extend beyond the reduction of fraud-induced operating costs and are shown to be
crucial for customers of all ages and income levels (Hoffmann & Birnbrich, 2012, p. 403).
Under Section 314b of the USA PATRIOT Act, financial institutions are permitted to
share information with each other regarding suspected money laundering, terrorist financing, and
22
other specified unlawful activity, including fraud (Department of the Treasury, 2009).
consortiums have arisen based on a similar premise. Consortiums are a form of fraud prevention
based on information sharing between multiple member financial institutions. Consortium data
can make financial institution fraud detection efforts significantly better (Castanheiro, 2017).
One example is a data sharing program for closed accounts called ChexSystems. Participating
financial institutions report any checking account closed for fraud or other cause to the central
database and can query new applicants against the database prior to opening an account (Check
Early Warning is a consortium that integrates with check imaging systems (Early
Warning, 2015). At the time of deposit, member financial institutions can query the Early
Warning TrueChecks database, which is comprised of returned check data from financial
institutions across the United States. TrueChecks software delivers real-time responses on
counterfeit, non-sufficient funds, closed account, duplicate, and other returned items that
member financial institutions have reported (FLEX Credit Union Technology, n.d.). The goal of
consortiums is limiting the ability of fraudsters to reuse checks, identities, and accounts to
perpetrate fraud against multiple financial institutions (Castanheiro, 2017). Limitations of the
consortium model include data accuracy, membership size, and privacy regulations that limit
Finally, the criminalization of check fraud and prosecution of those responsible may deter
some from committing check fraud. Check fraud is primarily governed by state law in the United
States (Association of Certified Fraud Examiners, 2017, p. 445). Depending on the situation and
jurisdiction, perpetrators of check fraud may be prosecuted for felonies including bank fraud,
23
mail fraud, wire fraud, forgery, identity theft, or theft of a financial device among others
(Salinger, 2005, p. 74). For example, 18 U.S.C. § 1344 criminalizes defrauding financial
institutions as well as obtaining any of the funds owned by or under the custody or control of a
financial institution by means of false or fraudulent pretenses (Legal Information Institute, n.d.).
Because most American customers involved in negotiating counterfeit checks are merely
acting as “mules” of the funds to the fraudster, they are not often pursued with criminal charges
unless they can be found to be willfully and knowingly participating in the scheme (Manhattan
District Attorney's Office, 2018). However, federal law enforcement has experienced some
success in extraditing makers of fake checks from West Africa in the most egregious scams
(Baker, 2018). Nevertheless, in 2017 only 744 defendants were charged for theft by check and a
mere 57 for advance fee schemes by the United States Attorneys (Executive Office for United
States Attorneys, 2017). Arrests made for forgery and counterfeiting decreased by more than
50% from 2005-2014 (Cliff & Wall-Parker, 2017). Ultimately, check fraud and other white-
collar crimes are underprosecuted due to the difficulty of locating perpetrators and victims and
they often carry lighter sentences than violent crimes even when successfully prosecuted.
Machine learning
tasks normally reserved to humans such as seeing, recognizing speech, making decisions, and
translating languages (Jean-Philippe, 2018, p. 4). In the near future, use of artificial intelligence
will become imperative in detection of aberrant activity in applications spanning from fraud to
cyber security to physical security. Human analysis is not only fallible and slow, a workforce
shortage is expected based on predictions of future threat volumes in the fraud and security
industries (Lidestri, 2018, p. 2). The goal of AI is developing intelligent machines that think,
24
learn, see, and reason objectively, even surpassing human capabilities with methods of data
mining and machine learning in particular. Industry analysts recommend the use of more AI,
including machine learning, to prevent burnout for analysts otherwise performing tedious and
repetitive tasks. This reserves their energy for decisions requiring more nuanced judgment
intelligently make decisions through statistical modeling without requiring manual input from a
programmer. “Machine learning teaches a machine how to predict answers, which allows the
device to respond to situations it has not explicitly encountered before. The more examples the
invention sees in the form of a dataset the better the machine can learn and interpret” (Jean-
The first step in machine learning is training. Depending on the availability of sample
data for training, as well as desired outcome, machine learning algorithms may be categorized as
In supervised learning, input and expected output data pairs are fed into a function and the
supervised learning algorithms include decision trees, artificial neural networks, and support
vector machines. In unsupervised learning, sample data is provided without expected output or
other labeling in order to allow the algorithm to determine which information is significant. The
most well-known groupings of unsupervised learning methods are hierarchical clustering and
self-organization maps (Dua & Du, 2011, pp. 7-8). In reinforcement learning, the model is
trained using unlabeled information and feedback is provided to it following its decision. The
model then uses the feedback to refine its actions over time (Jean-Philippe, 2018, p. 3).
25
After the training stage, experts can set thresholds or controls for the machine learning
model to dictate certain responses based on criteria. Once deployed, machine learning can be
tuned based on performance with real data and improve over time with continued training. Much
like a person learns from past experience, reinforcement machine learning allows the algorithm
the ability to review old data and determine new patterns in light of new data given to the system
(Lidestri, 2018, p. 3). Machine learning may also be used for predictive modeling (e.g.
forecasting) and prescriptive frameworks (e.g. optimizing decisions) (Qiao & Beling, 2016).
Many financial institutions already utilize machine learning models in some form in their
fraud detection process, combining work by human analysts with model-driven software.
Knowledge-based alerts use fraud detection rules that were generated using supervised learning
techniques. Expected behavior for behavior-based alerts can be derived by use of link analysis,
clustering, and outlier detection techniques (Julisch, 2010). The process to examine and act on
Figure 2. Contemporary process of transaction fraud alerts with human analysts and machine
learning models. Adapted from Solving the “False Positives” Problem in Fraud Prediction:
Automated Data Science at an Industrial Scale by R. Wedge, J. Kanter, K. Veeramachaneni, S.
Rubio, and S. Perez, 2017, Retrieved from http://arxiv-export-
lb.library.cornell.edu/pdf/1710.07709. Copyright 2017 by MIT.
26
A neural network machine learning model is already involved today when a financial
institution’s fraud software generates a risk score and combines it with rules created by experts
to provide alerts on potentially fraudulent transactions. Despite the use of machine learning,
human involvement in the process is expensive and false positives plague these alert systems
(Wedge, Kanter, Veeramachaneni, Rubio, & Perez, 2017). Fraudulent activity is missed if it falls
outside of parameters set, but thresholds must be narrow to avoid an overwhelming number of
alerts.
Wedge et al. (2017) studied the use of a technique called Deep Feature Synthesis to speed
up and improve the process of creating features for the machine learning model they used called
a random forest. The goal of the study was to address false positives in fraud prediction. An
estimated 4 out of 5 fraud alerts are not true fraud. Using an automated method, more than 100
behavioral patterns and 237 features based on historical data of the account were determined and
used to train the model. The model was 91.4% more accurate than the existing fraud alert
software used by the participant bank, BBVA. Because losses take place unless the fraud is
detected near instantaneously, machine learning was thought to require constant streaming of
data to be calculated. However, Wedge et al. (2017) found that aggregating transactional
information from the recent past as infrequently as every 35 days maintained predictive
accuracy.
In the false positive study, patterns and features were recognized by Deep Feature
Synthesis based on analysis of transactions along with the features that describe each transaction
(such as amount, time, location) and relationships (such as between transactions and accounts or
from patterns and features of the dataset it observed. An important decision the researchers made
27
was to select the training data to keep all transactions for a given card if it was included in the
training set in order to observe patterns of behavior. The machine learning algorithm returned
unique features for each account aggregated from all the past transactions including the mean
transaction amount, the average time between subsequent transactions, and the number of
distinct uses on unique days. This information was then useful to detect outlying activity, which
may be indicative of fraud (Wedge, Kanter, Veeramachaneni, Rubio, & Perez, 2017).
Another critical financial institution process adjacent to fraud detection is credit default
prediction. Matsatsinis (2002) posited that qualitative variables—including age, family status,
and years in profession—have an essential role in credit evaluation and must be included in
make appropriate credit decisions (p. 244). Wu, Hu, & Huang (2014) innovated further in
discovering that credit risk evaluations were more effective if performed in two stages. The first
stage involved feature selection and data pre-processing and the second stage utilized several
classification techniques to construct prediction models. The results were nine credit risk levels,
not just two classes (i.e. good credit or bad credit), which allow financial institutions to accept
applications within their risk appetite rather than simply approve or deny (pp. 1098-1101).
Moula, Guotai, & Abedin (2017) studied the application of a form of supervised machine
learning called a support vector machine to predict customers who likely may not repay their
loans if offered one. Previous researchers attempted to apply artificial neural networks for credit
default prediction, while this study aimed to improve on their results. The authors attempted to
create accurate and consistent decision-making using data sets from real world credit
applications. The data included facts from the customer’s application including financial, non-
financial, demographic, and social-graphic. Moula et al. used the information to train the model
28
to predict credit status of potential customers in a more precise and flexible manner than studies
done by previous scientists. The findings showed that the more variables collected during the
application process, the better the prediction ability of the model. Moreover, the study showed
that success measurement for default prediction, like fraud prediction, relies upon delineating as
accurately as possible between good and bad accounts (pp. 158-186). Customer financial status
modeling is an important facet to consider in all account relationships a financial institution may
extend—including services like checking, savings, debit cards, and check cashing.
Data mining may involve the application of statistical or machine learning techniques, or
both, to collect and analyze large amounts of data. It can be performed both by human analysts
and, to some extent, by artificial intelligence (Wu, Hu, & Huang, 2014). Westphal (2009)
explained that data mining for fraud detection requires investigators be well versed in technical
skills including databases and visualizations to effectively use their data. To be effective is to
understand complex meanings behind data connections and be able to interpret results from a
series of connected dots (p. 407). Financial institutions and businesses that market to them have
found it lucrative to perform data mining of the available customer information to better
understand, market to, and protect their customers (Salinger, 2005, p. 77).
According to Agarwal, Gupta, & Hussein (1997), computers have long had the ability to
“read” checks. During the analysis and recognition process, the computer identifies components
in the image on the basis of proximity and horizontal alignment of characters. Extraneous
information like background pictures must be filtered out as “noise.” Blocks or areas of the
check must be identified—payee, amount, maker, and bank routing and account information—all
while correcting for handwriting. These components are located based on rules and heuristics.
The computer recognizes the courtesy amount, for example, by looking for the dollar symbol ($).
29
The components are combined after this pre-processing and sent through neural network
Many abilities of extant check reading software have applicability to fraud detection. For
example, the computer can detect the difference between handwritten and machine printed text,
separate two handwritten characters that have been joined together, and determine fractions
based on differences in relative sizes of the characters (Agarwal, Gupta, & Hussein, 1997, pp.
635-637). As the research of Krizhevsky, Sutskever, & Hinton (2012) will show, these
capabilities may be built upon. With modern computer vision technology, instead of smoothing
and disregarding background noise, more components of the check could be included in the
(Lidestri, 2018, p. 8). One of the human abilities AI seeks to mimic is visual perception.
Krizhevsky, Sutskever, & Hinton (2012) used a machine learning method called a deep
convolutional neural network to enhance computer object recognition. Their innovation over
previous researchers was to encourage the model to not “overfit,” meaning recognize the images
it was trained on well but do poorly with novel images. The researchers also used a training set
of data with 1.2 million images, which is much larger than the sets used in previous studies. Yet,
they were able to complete their training much faster than attempts by prior researchers, likely
due to their use of the deep convolutional neural network type. Minimal pre-processing of the
errors in the responses (pp. 1-8). Advances have recently been made with the same machine
learning method, deep convolutional neural networks, using the internal structure that exists
inside text documents for tagging, entity search, sentence modeling, and more (Sohangir, Wang,
30
Pomeranets, & Khoshgoftaar, 2018, p. 2). Computer vision relies in part on calculating similarity
of a given image to images the algorithm was trained with. This is very similar to the human
Ashken (2016) summarized the similarites between human vision and computer vision as
follows: “in both human and computer vision technology, the signal is understood through
comparison with a set of references. Human and computer vision systems then evaluate whether
[it is] sufficiently similar to be another example of the same thing.” Differences in the mode of
signal transmission (biological versus electrical signal) mean that computer vision is much faster
than human vision. Interestingly, interpretation first begins to take place in the human retina
whereas the computer sensors that capture light do not perform any analysis (Ashken, 2016).
Figure 3, below, is an example of a check image. The item is an altered money order and
Figure 3. Example of an altered money order that is recognizable by the trained human eye
based on handwritten information (1) courtesy amount written and (2) legal amount written
which are both known to be typed on genuine items based on knowledge of (3) this type of
money order sold by King Soopers City Market for Western Union.
31
Just as a machine learning algorithm can facilitate the development of computer vision after
being shown a sufficient amount of training material, so can a human employee learn to
recognize counterfeit and altered instruments after learning their templates. Training is
recognized by the ACFE to be one of the most important components of detecting fraudulent
valid postal money order with features annotated which could be used for training to detect
fraudulent items.
Figure 4. Example of United States Postal Money Order with 4 features indicated for use in
fraud detection: (1) serial number (2) security foil stripe (3) courtesy amount and (4) amount,
date, and location of sale. Reprinted from Domestic Money Orders by the United States Postal
Service, 2018, Retrieved from https://www.usps.com/shop/money-orders.htm. Copyright 2018
by USPS.
Theoretically, computers could be taught to recognize the same features and any
deviations through machine learning. Sohangir, Wang, Pomeranets, & Khoshgoftaar (2018)
noted that light, object shapes, and object materials can be further discerned by deep learning,
32
training techniques and computer vision suggest growth and broader applications of computer
One company has already made an attempt. Cognizant Digital Business used a machine
learning model derived from Google TensorFlow to identify counterfeit checks by comparing
them to a consortium database of previously accepted ones. Similar to the block analysis
mentioned above, the solution used optical character recognition to “read” the check with a
digital eye and then parsed the information with a neural network. Cognizant Digital Business
helped their client bank analyze massive data sets collected from scanned checks—payee, check
number, account and routing numbers, amounts, endorsements, and maker signatures. From
these, the company established a set of normative features of good checks. Once the neural
network learned the rules, it continued to adapt based on new checks it was shown. The model
provided a confidence score on each check in 70 milliseconds or less, with responses ranging
from good to certain fraud. The bank determined responses to employ automatically regarding
whether funds would be released to the customer and how much, depending on the algorithm’s
rating. The solution boasted a $20 million projected reduction in fraudulent transactions and low
There are some compliance limitations and concerns regarding the use of artificial
decisions will struggle to prove they are not discriminatory against any protected class.
Fernandez (2017) discussed that some decisions create substantial operational, financial, and
reputational risk. While smart machines can automate tasks and machine learning models using
advanced statistical techniques can process far more transaction records than a human could,
there are still situations that require human judgment. These situations arise as financial
33
institutions navigate complex and nuanced compliance issues in a highly regulated industry.
Another issue is the feasibility of collecting and processing useful data from many disparate,
outdated systems and locating qualified engineers to manage the deployment of advanced
machine learning. For these reasons, one conclusion is that AI is not yet capable of supplanting
Summary
In summary, this study reviewed the history of checks, examined the current methods and
status of check fraud in 2018, and discussed current and possible future methods for preventing
check fraud. A form of payment with a history over a millennium long is unlikely to disappear
tomorrow. Quinn & Roberds (2008) noted the versatility and legal certitude of the check have
contributed to its persistence. In addition, checks are still reasonably cheap, accessible, and
widely accepted. There are some situations, such as real estate transactions and payments
between acquaintances, that still have few viable alternatives (p. 25). The Federal Reserve Bank,
which centrally clears all checks circulated in the United States, does not record return or loss
information. Therefore, the best estimates of the size and scope of check fraud emanate from
victims who self-report losses, and law enforcement, which reports activity detected and
prevented.
The most vulnerable victims generally possess the least ability to protect themselves from
scams. Individuals with limited numeric skills and more debt than they believed they could
handle were both more likely to be victims of fraud (Federal Trade Commission, 2013). Victims
usually send the funds by wire transfer, gift card, cash, or similar methods that are difficult to
cancel and/or trace. Some customers intentionally defraud their financial institution through
34
various forms of check fraud. This leaves the prevention of check fraud down to financial
institutions in the minutes surrounding the point of deposit; otherwise it is too late.
Financial institutions already utilize applications of AI, including machine learning, for
machine learning to predict stock market fraud, machine learning could note factors significantly
indicative of fraud that humans would never have noticed. Still, humans are going to be a
necessary part of the process for the foreseeable future. Human analysts are needed to understand
the rationalizations of other humans and to control and review alerts generated by machines
applications were discussed in search of methods that may have relevance to the problem of
check fraud. Check fraud costs consumers and financial institutions a combined billion and some
dollars each year; however, information collected in this research regarding the weaknesses of
current methods and potential future directions will inform check fraud investigators.
check fraud, characteristics of fraud victims, and machine learning technologies. This research
study also examined the capabilities of both traditional check fraud detection techniques and
machine learning, discussing their combined uses in the detection of unusual activity. The study
lends legitimacy to the field of check fraud investigation by exposing the current size and scope
of the problem. As objectively as possible, relevant literature was located to address the problem
35
Major findings
The literature reviewed for this research ranged from survey reports from government
agencies and studies published in academic journals to marketing materials and references for
industry experts. The literature reviewed is dated between 1990 and 2018. The diverse literature
was selected for the breadth of sources and depth of focus to the subjects. It allowed for the
exploration of the different ways in which checks are used to defraud consumers and financial
institutions. The literature also showed the different measures currently in use by financial
institutions. In order to explore the different capabilities and uses of machine learning, it was
necessary to review literature from studies that concerned exploration at the cutting edge. This
variety of literature brought out the answers to the questions posed at the outset of the study.
Who is involved in check fraud and how does it take place? How could machine learning be used
First, a profile of check fraud was developed. The literature showed that victims of check
fraud can be any age, though people aged 20-29 were the most likely of any age group to be
victims of check fraud (Baker, 2018). The elderly and destitute are more seriously damaged by
fraud, even by the small dollar losses typical of check fraud. The majority of the check fraud
resulting in losses to consumers relies on the cooperation of victims, who provide their login
credentials and assistance returning the money. Perpetrators of check fraud use a variety of
schemes from employment to romance to lottery to induce victims to advance a fee from the
funds financial institutions make available following check deposits. Victims are left responsible
for repaying the funds sent to scammers when the check is returned, and consumers as well as
financial institutions collectively lose billions of dollars each year as a result of check scams.
36
Secondly, the capabilities of artificial intelligence were explored. Applications of AI
including machine learning are already used to detect and predict fraud as well as other unusual
activity. Artificial intelligence is designed to mimic and improve upon the human brain’s ability
to process data. Thus, applications of AI can determine patterns and detect trends that are too
complicated for humans or other computational techniques to recognize. Computer vision and
text reading abilities are in use to “read” information both printed on the MICR line and
In regard to the third question of whether the current measures are sufficient to mitigate
check fraud, the literature used in this research appears to illustrate that the current technology
measures used for preventing and detecting check fraud are rapidly becoming insufficient. With
check fraud losses appearing to surge in recent years, and the dollar volume of commercial
checks processed continuing to grow (Board of Governors of the Federal Reserve System,
2018b), analysts will soon be unable to keep up with the number of alerts. False positive rates
machine learning breakthroughs, certain characteristics can be leveraged to help lower false
positive rates and increase the efficiency of detection. Machine learning does not provide a
shield against every fraud scheme, but it does provide a wide range of diverse applications and
techniques that can supplement and improve the accuracy of existing methods including fraud
The problem of check fraud is not new. In fact, it is so ancient that any study of check
fraud must be considered within the context of existing techniques to combat it. Manual review
37
of items is the simplest solution. This method is often successful in detecting alterations and
counterfeit items. Financial institutions also created manual review accounting strategies like
positive pay, which is designed to catch unauthorized items. Another manual strategy for
approaching the problem of check fraud is reliance on frontline staff training and experience.
Tellers recognize red flags in customer situations as well as spot and refuse suspicious items.
Gradually, more automated approaches have also been developed to accompany the continued
solutions, many financial institutions have implemented a system for fraud alerts. Some have
joined consortiums to query data from collective reports of fraudulent activity. While these
solutions are more effective than manual reviews alone, there are still significant numbers of
false positive alerts. Consortium data may be out of date, inaccurately reported by another
member, or lack detail due to sharing restrictions. Software alerts may trigger for benign activity
that is similar to fraud, or for transactions that exceed parameters set by the institution even
though they are legitimate. Unreliability of alerts and data are significant obstacles to catching
fraud. Any delay in review of alerts, if they are not real-time, also results in greater likelihood for
financial losses. Some will argue maintenance and refinement of these techniques is all that is
This study was completed through academic research also within the context of available
literature. Some studies presented contrasting evidence with the above findings. One issue raised
Wedge et al. (2017), machine learning has long been thought to require substantial computing
resources in order to evaluate the massive amounts of transactional data maintained by financial
38
institutions. Thus, a potential limiter for the use of artificial intelligence and machine learning is
resources. With sufficient training features and periodic historical data aggregation (rather than
constant), machine learning can be computationally economical. Finding and affording adequate
machine learning.
Furthermore, the financial benefit is relevant to the implementation of new fraud control
measures. Financial institutions already prevent the majority of fraud attempts according to the
American Banker’s Association. Law enforcement like the United States Postal Inspectors
intercept many more. Quantifying fraud that did not occur is difficult, which makes justification
of new technology onerous. Cognizant (2018) and Wedge et al. (2017) approached this obstacle
by testing their solutions on old data and projecting savings based on what would have been
detected.
One may also question the utility of the findings of this study based on several other
aspects of the topic. First, the value may be questioned due to the decline in check use both in the
United States and worldwide. Investment into a dying form of payment may not reap sufficient
returns. However, as noted above, the Federal Reserve data on commercial check clearing
suggests a recent plateau (Board of Governors of the Federal Reserve System, 2018b).
Concurrently, the FTC, FBI, National Consumers League, and BBB all received an increased
number of complaints regarding check fraud from 2014 to 2017 (Baker, 2018). Substantial
financial and psychological harm to fraud victims was also discussed. Existing studies
demonstrate more severe monetary losses result from types of fraud other than check fraud. As
well, it can be argued that victims of violent crime like rape and murder are more seriously
techniques for any business process. This is particularly true in financial institutions, which are
highly regulated. Fernandez (2017) insinuated that regulators are not prepared for the use of AI
and machine learning—thus limiting the feasibility of such solutions for banks and credit unions
that fear regulator reprisal. Until sensitive data and decisions can be trusted with machines, and
The first limitation of this research is due to the lack of availability of newer material.
While there are still relevant publications about checks from 2013 to 2018, some materials date
from 1990 to 1999. This research needs to acknowledge technological advances in the check
product, namely digital processing of checks through the federal reserve system and Remote
Deposit Capture, as well as compensate for the age of the volume of research on checks. Much
present-day research regarding financial transactions found is focused on virtual currency and
victimization and losses. Fraudsters exploit psychological tricks, causing victims to comply with
demands and sometimes disbelieve that funds were taken. Some victims deny outright that they
were scammed due to embarrassment or even memory loss. With low reporting rates to the
government, law enforcement, and other agencies, a precise view of the issue cannot be gained.
Third, this study was limited by the lack of other research specific to the topic. While
both machine learning and checks have separately been thoroughly investigated, there is very
little information available regarding the combination of the two. Wedge et al. (2017) were
concerned with card fraud. Julisch (2010) referenced the broader topic of payment fraud. Moula
40
et al. (2017) focused on credit default prediction. Lidestri (2018) primarily researched
cybersecurity. Each of these studies concern adjacent subjects to check fraud but are not exactly
the same topic. An extensive search was conducted and only Cognizant (2018) was found to
have deployed machine learning to recognize counterfeit checks by “looking at” check images
during the time of deposit. Competing techniques were not located and this may weaken the
This study was also limited by obtainability and nationality of references. The study is
comprised of books, papers, and articles available on the open Internet as well as the library
databases accessible through Utica College. Some databases and potentially relevant studies
could not be accessed due to a lack of subscription. The study was U.S.-focused and was
The fifth—and perhaps most significant—limitation to this research has been the lack of
reputations and profitability, do not widely publicize their losses. Nor, due to financial privacy
laws, can they disclose any consumer or suspect information. Further, for-profit businesses
wishing to maintain their edge over competitors seldom share their insider secrets, including
anti-fraud practices. Law enforcement agencies cannot release information pertaining to open
investigations. Lawyers, who may possess information from fraud offenders, are bound not to
release information by attorney-client privilege. These restrictions limited the scope of the study
to open source materials pertaining to the topics explored. The limitations of this research may
information.
41
Recommendations
Based on the findings of this research, additional research and action to combat check
fraud is suggested. It is clear that the check as a form of payment is not yet going extinct.
Consumers require financial institutions to act to protect them from victimization, and better
protection from check fraud will also benefit the financial institutions in terms of strengthened
profits, reduced losses, and improved customer relationships. Given advancements in artificial
intelligence including machine learning, these ends certainly appear possible. Recommendations
This study showed that technological capabilities have advanced in recent years. Julisch
(2010) acknowledged the pointlessness of fraud detection programs that merely alert to fraud
that has already happened rather than anticipate or prevent new fraud. Innovation is required to
better protect individuals and financial institutions from check fraud. Computer vision and other
AI techniques, such as machine learning, could allow near instantaneous visual review of checks
as well as the ability to make availability decisions with a human-like eye. More research is
needed into machine learning and computer vision solutions as they specifically apply to check
fraud.
This research asked: “How could machine learning be used to combat check fraud? Is it
consortiums?” Further research is required to determine in what capacity machine learning can
be leveraged for fraud investigation, prevention, and detection. Solutions like the one put forth
performed with the algorithms most applicable to the problem of check fraud identified above:
42
random forests (Wedge, Kanter, Veeramachaneni, Rubio, & Perez, 2017), support vector
machines (Moula, Guotai, & Abedin, 2017), and neural networks (Krizhevsky, Sutskever, &
Some best practices were identified in this research. Ideally, algorithms should be trained
with a sufficient sample size of training data as in Krizhevsky, Sutskever, & Hinton (2012) and
Moula, Guotai, & Abedin (2017). Not only should there be an extensive amount of training data,
it also should be selected with care to allow the most accurate behavioral analysis (Wedge et al.,
2017). Data should be pre-processed to standardize image size and other factors to increase
accuracy (Wu, Hu, & Huang, 2014; Krizhevsky, Sutskever, & Hinton, 2012). Supervised and
reinforcement methods of training machine learning models are recommended to allow control
for desired results and adaptation over time (Jean-Philippe, 2018). These measures should be
Several moral dilemmas were raised by this research. The first is the intersection of
compliance and artificial intelligence. How will financial institutions prove to regulators and
customers that their machine learning algorithms are not discriminating against certain races,
genders, other minorities, or protected classes? Fairness in lending, check holds, and all other
financial institution policies must be maintained at all times. Secondly, selling anti-fraud
technologies also presents ethical quandaries. Software companies act as hired mercenaries
locating fraud for financial institution clients, who pay them hundreds of thousands of dollars.
Banks and credit unions seem to have only two other alternatives—developing software in-
house, or bleeding out money to fraudsters instead. Consumers have very little knowledge about
or control over their financial institution’s fraud prevention program and may literally pay the
difference for any gaps in protection. Even if it were possible, software companies do not truly
43
wish to irradicate all fraud or they would lose their source of income. How much responsibility
do financial institutions and software companies bear for protecting victims from fraud?
Additional literature research should also be undertaken to build upon what was
discovered in this research and improve upon the limitations mentioned above. Check fraud
should be reviewed globally to determine the scale of check fraud worldwide. Trends and
fraud in the United States. Additionally, relevant machine learning studies concerning fraud and
check fraud may have been completed internationally, published in journals not accessible
through Utica College or the open Internet, or otherwise overlooked by this research. Last, the
lack of recently dated material created a gap in this research. Further work should be done to
locate contemporary studies of checks, including newer digital services such as remote deposit
capture and electronic conversion. Broadening the scope of research on both machine learning
and check fraud will further serve to educate investigators, legislators, and consumers.
In addition to research, practical recommendations for banks, credit unions, and other
financial organizations were identified. Financial institutions and consumers alike are harmed by
the lack of real-time, widespread, and effective check fraud prevention tools. Far from dying off
as a fossil form of payment from the 15th Century, checks have maintained their relevance for
both individuals and businesses for situations without a suitable substitute form of payment.
While some cutting-edge techniques remain at least a few years from deployment at most
companies, there are some actions that can be taken now to significantly decrease losses from
check fraud.
44
Financial institutions should participate in consortiums and other information-sharing
programs as permissible by law. While fraudsters freely share tips and tricks for committing their
crimes online, financial institutions are typically characterized by their secrecy. Though financial
information strengthens anti-fraud programs and can be accessed within compliance confines.
Cross-institution information significantly undercuts fraudsters’ ability to repeat the same scam,
deterring crime (Castanheiro, 2017). Consortiums can be queried in real time and responses from
the database can be incoporated into bank policies. Some examples include account opening and
deposit hold decisions. Weaknesses of consortiums were identified, including the potential for
outdated information and false positives. Therefore, consortiums must be deployed alongside
knowledge, and machine learning. Delayed alerts allow time for customers to withdraw funds
made available from check deposits. Further, analysts working alerts concerning activity that is
days or even weeks old are looking in the rearview mirror. Alerts that are too narrowly focused
on one type of payment can miss the full context of real fraudulent activity. Conversely, software
that risk-scores transactions and intelligently makes decisions regarding funds availability will
prevent losses and even allow identification of emerging trends. Financial institutions must
continually tune their software to avoid creating an avalanche of false positive alerts and, again,
Factors to improve predictive capabilities of the software should be both qualitative and
financial status modeling appears to have direct applications to risk-rating immediate provision
45
of funds from check deposits. It is similar to providing the customer a short-term loan while the
check is collected upon. Quantitative data is abundant—credit score, account balances, years as a
customer—and provides useful information in scoring the inherent risk of the customer. Patterns
of fraud identified by the ACFE like frequent transactions and unusual deposit behavior, will
need to be built into the system (Association of Certified Fraud Examiners, 2017, pp. 434-435).
Financial institutions may tailor certain dollar thresholds that are deemed to be low risk as well
as set “normal” behavior, allowing for controlled alerts within the financial institution’s unique
approach and customer base. Financial institutions also hold significant amounts of qualitative
data that can be used to identify risk factors for fraud victimization. Occupation and marital
status may indicate an extra vulnerability to fraud (Pak & Shadel, 2011). All customer profile
data points should be included in analysis along with the above. Robust software that generates
Consumers should also take responsibility for their own protection against forms of
fraud, including check fraud. Members of the public should take caution to verify the legitimacy
of individuals and companies they transact with, especially online. If in doubt about a situation,
consumers should slow down and reach out to their financial institution’s fraud department or
research further before acting. Online banking credentials should never be shared with a third
party such as a friend, employer, or lawyer. Checks should not be accepted from unsolicited
mailings, or for more than the selling price of an item listed for sale. When a situation
necessitates the receipt of a check as payment, consumers should be vigilant for any red flags in
the sender’s communication or on the item itself: misspellings, distorted logos, or blurry
signatures, for example. Consumers should refrain from withdrawing funds immediately from a
check deposit, even if their bank makes funds available, and should never agree to send a portion
46
of the funds back to the sender of the check. Customers of financial institutions should regularly
review their account statements for any unauthorized activity and report it promptly as directed
in their account agreements. If consumers take charge of their own protection from scams, they
It is also time for a collective education effort as was made in 2009. Financial institutions
and law enforcement must again drive public awareness of check fraud. Media campaigns should
be launched detailing the common patterns and relevant laws. Websites that facilitate online
dating, classifieds, and money transfers should also undertake this effort. Government and non-
profit programs for the elderly and underprivileged must strive to include education regarding
scams that target their clients. Financial institutions must create comprehensive programs to
educate their staff on signs of fraudulent items, red flags in customer behavior, and best practices
for educating customers. Many banks could better explain aspects of banking that lead to
misconceptions.
Ignorance allows the losses resulting from check fraud. One example requiring more care
is the requirement for funds released under the Regulation CC schedule. The check clearing
process is also not often understood by customers. Additionally, financial institutions and
regulators alike should attempt to bring more publicity to the bounds of coverage by federal
deposit insurance. Last, it is important for consumers to be informed regarding liability for
returned items. Education is the only solution that empowers consumers to make better decisions
The last recommendation for combatting check fraud is to perform workforce planning
and vendor evaluation. According to expert projections as in Lidestri (2018), the volume of
activity at organizations throughout the country will soon outpace the ability of current staff to
47
review. It is imperative that financial institutions employ automation wherever possible to
preserve human efforts for situations where they are truly needed. Commiserate with their size,
banks and credit unions will also need to employ a staff of analysts, investigators, and experts
with adequate credentials to investigate check fraud and other cases. Finally, and perhaps most
importantly, financial institutions will need qualified software engineers to create, test, and
supervise machine learning solutions for fighting fraud. Most firms will need to begin efforts
Conclusion
For over six centuries, checks have ruled the payment landscape: overcoming distance,
surviving wars, and shaping the establishment of the modern centralized Federal Reserve
banking system. Checks are a secure and convenient instrument for ordering the transfer of funds
between parties. Day-to-day purchases have been assumed by methods like the debit card and
credit card, which recently became much more secure when with the transition to EMV
technology in the United States. Innovation also continues in the realm of new electronic transfer
services and currencies but, short of RDC and electronic conversion services, the check has
While a profile of those with a propensity to be victimized by check fraud has been
developed through this research, individuals of any age, race, or income can fall prey to these
schemes. The more concerning truth is that not everyone is equally harmed by the resulting loss.
The most financially and mentally vulnerable have far more to lose in a single risky transaction,
even if a smaller portion of funds are ultimately stolen. Perpetrators of check fraud—such as
counterfeiters working out of West Africa—are difficult to locate and even more difficult to
bring to justice. Financial institutions must either pursue the customers that warranted the check
48
in the deposit process or sustain the loss. Therefore, the financial institution’s duty for preventing
The key to recognizing and blocking the majority of check fraud may be hidden within
massive amounts of transaction data, unrecognizable by human analysts who are only able to
view a tiny portion of the picture. Methods like data mining and cross-institution collaboration
help reveal information. However, they must be used more widely and enhanced by modern
techniques to keep up with the overall volume of banking activity. Artificial intelligence,
including applications like machine learning, data mining, and computer vision can deliver
objective results, inform rule-making, and recognize trends without overburdening analysts.
wisdom and experience. Machines still lack the ability to understand human emotions,
cannot be entirely autonomous in decision making in the financial industry. Oversight is required
when updating models, assuring compliance with applicable rules and regulations, and
evaluating unique cases. Human intelligence will still be indispensable in the process, although
Criminals who commit check fraud rely on the isolation of information for their crimes to
persist. They bank on the ignorance of new potential victims. The seclusion of financial
institutions who refrain from information sharing and silence of victims who avoid reporting
allow scammers to repeat the same schemes again and again. Until the check is completely
relegated to museums, law enforcement, financial institutions, legislators, and consumers alike
must work together to bring information about check fraud forward. Through collaboration,
education, and leveraging new tools, consumers can be better protected from check fraud.
49
References
Agarwal, A., Gupta, A., & Hussein, K. (1997). Bank check analysis and recognition by
document image analysis (pp. 623-651). River Edge: World Scientific Publishing
Company.
Akinladejo, O. H. (2007). Advance fee fraud: trends and issues in the Caribbean. Journal of
American Bankers Association. (2018, January 24). Banks stop $17 Billion in fraud attempts in
Archer, A. K. (2017). "I made a choice": Exploring the persuasion tactics used by online
https://epublications.regis.edu/cgi/viewcontent.cgi?article=1830&context=theses
Ashken, S. (2016, August 15). What is computer vision? Part 4: Human vs. computer vision.
human-vision-vs-computer-vision
Association for Financial Professionals. (2018, April). 2018 payments fraud and control survey
https://commercial.jpmorganchase.com/jpmpdf/1320745402134.pdf
Association of Certified Fraud Examiners. (2017). Fraud examiners manual. Austin: Association
50
Baker, S. (2018, September 15). Don't cash that check: BBB study shows how fake check scams
dont-cash-that-check-bbb-study-shows-how-fake-check-scams-bait-consumers
Bank of America. (2018, June 8). Deposit agreement and disclosures. Retrieved from
https://www.bankofamerica.com/deposits/resources/deposit-agreements.go
Better Business Bureau. (2018). 2017 BBB scam tracker annual risk report: New trends in scam
113/media/scam-tracker/risk-report/bbbscamtrackerannualreport-final-2017.pdf
Board of Governors of the Federal Reserve System. (2016, June 16). Check Services. Retrieved
from https://www.federalreserve.gov/paymentsystems/check_about.htm
Board of Governors of the Federal Reserve System. (2017, March 1). Compliance guide to small
entities Regulation CC: Availability of funds and collection of checks. Retrieved from
https://www.federalreserve.gov/supervisionreg/regcccg.htm
Board of Governors of the Federal Reserve System. (2018a, July 23). 2016 Survey of consumer
Board of Governors of the Federal Reserve System. (2018b, February 15). Commercial checks
https://www.federalreserve.gov/paymentsystems/check_commcheckcolannual.htm
Castanheiro, M. (2017, October 4). Fraud trends targeting credit unions & members [Webinar].
members/
51
Chatzis, S. P., Siakoulis, V., Petropoulos, A., Stavroulakis, E., & Vlachogiannakis, N. (2018).
Forecasting stock market crisis events using deep and statistical machine learning
Check Fraud Working Group. (1999, February). Check fraud: a guide to avoiding losses.
publications-reports/pub-other-check-fraud.pdf
Cliff, G., & Wall-Parker, A. (2017, April). Statistical analysis of white-collar crime. Retrieved
http://criminology.oxfordre.com/view/10.1093/acrefore/9780190264079.001.0001/acrefo
re-9780190264079-e-267
Cognizant. (2018). Advanced AI machine learning solution detects check fraud for a large global
reduces-fraud-risk-for-bank-codex3688.pdf
Department of the Treasury. (2009, June 16). Guidance on the Scope of Permissible Information
Sharing Covered by Section 314(b) Safe Harbor of the USA PATRIOT Act . Retrieved
from https://www.fincen.gov/sites/default/files/shared/fin-2009-g002.pdf
Dua, S., & Du, X. (2011). Data mining and machine learning in cybersecurity. Boca Raton:
Auerbach Publications.
Early Warning. (2015, May 12). Early warning and NCR to enable cross-institution real-time
releases/2015/early-warning-and-ncr-to-enable-cross-institution-real-time-good-funds-
network.html
52
Executive Office for United States Attorneys. (2017). United States attorneys' annual statistical
https://www.justice.gov/usao/page/file/1081801/download
Federal Bureau of Investigation. (2017). 2017 Internet Crime Report. Retrieved from
https://pdf.ic3.gov/2017_IC3Report.pdf
https://www.ic3.gov/crimeschemes.aspx
Federal Deposit Insurance Corporation. (2018, January 1). A guide to what is and is not
https://www.fdic.gov/deposit/covered/notinsured.html
Federal Trade Commission. (2013, April). Consumer fraud in the United States, 2011 the third
https://www.ftc.gov/sites/default/files/documents/reports/consumer-fraud-united-states-
2011-third-ftc-survey/130419fraudsurvey_0.pdf
Federal Trade Commission. (2018, March). Consumer Sentinel Network Data Book 2017.
network-data-book-2017/consumer_sentinel_data_book_2017.pdf
Fernandez, D. (2017, September 20). Is artificial intelligence ready for financial compliance?
ready-financial-compliance/
Financial Crimes Enforcement Network. (2018). Suspicious activity report statistics (SAR stats).
53
Financial Industry Regulatory Authority. (2018, July 17). How the cloud and machine learning
http://www.finra.org/industry/podcasts/how-cloud-and-machine-learning-have-
transformed-market-surveillance
FLEX Credit Union Technology. (n.d.). FLEX TrueChecks Integration. Retrieved from
https://info.flexcutech.com/hubfs/FLEX%20TrueChecks%20Integration-
1.pdf?submissionGuid=7e4a0361-ef39-4d61-9b9a-ebd4a7254ce1
Ganzini, L., McFarland, B., & Bloom, J. (1990). Victims of fraud: Comparing victims of white
collar and violent crime . The Bulletin of the American Academy of Psychiatry and the
Law, 55-63.
Guardian Analytics. (2016, March). Mobile banking fraud trends: Fraudulent checks meet
content/uploads/2018/06/FraudUpdate_MobileRDCTrends_March2016.pdf
Hoffmann, A. O., & Birnbrich, C. (2012). The impact of fraud prevention on bank-customer
Jean-Philippe, R. (2018, May). Enhancing computer network defence technologies with machine
learning and artificial intelligence (capstone project). Utica, New York: Utica College.
Julisch, K. (2010, September 9). Risk-based payment fraud detection. IBM Research, pp. 1-13.
Krizhevsky, A., Sutskever, I., & Hinton, G. E. (2012). ImageNet classification with deep
NIPS.
Investor.
54
Legal Information Institute. (n.d.). Bank fraud. Retrieved from
https://www.law.cornell.edu/uscode/text/18/1344
Lidestri, N. (2018, May). The impact of artificial intelligence in cybersecurity (capstone project).
Manhattan District Attorney's Office. (2018, July 11). DA Vance: ID thieves indicted for “Card
https://www.manhattanda.org/da-vance-id-thieves-indicted-for-card-cracking-scheme-
involving-snapchat-rent-checks/
Matsatsinis, N. F. (2002, May). An intelligent decision support system for credit card assessment
Mazur, M. (2014, January). Fraud grows, but new tools help check it. ABA Banking Journal, p.
11.
Monga, V. (2014, March 10). U.S. companies cling to writing paper checks. Retrieved from The
checks-1394494772
Moula, F. E., Guotai, C., & Abedin, M. Z. (2017). Credit default prediction modeling: an
National Consumers League. (2018, February). Top scams of 2017. Retrieved from
https://d3n8a8pro7vhmx.cloudfront.net/ncl/pages/4567/attachments/original/1517428302
/2017_top_scams_report.pdf?1517428302
Pak, K., & Shadel, D. (2011, March). AARP Foundation national fraud victim study. Retrieved
from https://assets.aarp.org/rgcenter/econ/fraud-victims-11.pdf
55
Qiao, Q., & Beling, P. A. (2016, June). Decision analytics and machine learning in economic and
Quinn, S., & Roberds, W. (2008). The evolution of the check as a means of payment: A historical
/media/Documents/research/publications/economic-
review/2008/vol93no4_quinn_roberds.pdf
https://whatis.techtarget.com/definition/false-positive
Oaks: Sage.
Silva, V. G., Ramalho, E. A., & Vieira, C. R. (2017). The use of cheques in the European Union:
Smith, C. W. (2001, June). Defense to a payor bank's liability for late returns. CCH Deposit Law
Notes.
Sohangir, S., Wang, D., Pomeranets, A., & Khoshgoftaar, T. M. (2018). Big data: Deep learning
Telang, R., & Somanchi, S. (2016, October). Security, fraudulent transactions and customer
https://www.ftc.gov/system/files/documents/public_comments/2016/10/00062-
129181.pdf
United States Postal Service. (2018). Domestic Money Orders. Retrieved from
https://www.usps.com/shop/money-orders.htm
56
Verafin. (2017a, March). Fraud schemes & scams. Retrieved from https://verafin.com/wp-
content/uploads/2017/03/fraud-schemes-scams-IG-Verafin-170329.pdf
Verafin. (2017b, December 19). Unmasking online account takeover. Retrieved from
https://verafin.com/2017/12/unmasking-online-account-takeover/
Wedge, R., Kanter, J. M., Veeramachaneni, K., Rubio, S. M., & Perez, S. I. (2017, October 20).
Solving the “false positives” problem in fraud prediction: Automated data science at an
Westphal, C. (2009). Data mining for intelligence, fraud, & criminal detection. Boca Raton, FL:
CRC Press.
Wu, H.-C., Hu, Y.-H., & Huang, Y.-H. (2014). Two-stage credit rating prediction using machine
57