Interpret and explain fraud detection signals, model outputs, and suspicious patterns across payment, identity, and account fraud typologies. Use when analyzing fraud alerts, explaining model scores, investigating fraud rings, or documenting fraud case findings for consumer and commercial banking.
This skill produces detailed, evidence-based interpretations of fraud detection signals for financial institutions. It covers transaction fraud (card, wire, ACH), identity fraud (synthetic and identity theft), account takeover (ATO), check fraud, and application fraud. Explanations are grounded in industry fraud typologies and aligned with Reg E dispute requirements, network rules (Visa/Mastercard), and law enforcement referral standards.
When to Use
Interpreting fraud model scores and feature importance rankings
Explaining why a transaction or application was flagged as potentially fraudulent
Documenting fraud investigation findings for case closure
Identifying fraud ring patterns across linked accounts
Supporting Reg E provisional credit and liability determination decisions
Preparing law enforcement referrals (SARs with fraud focus)
Analyzing false positive patterns to recommend model tuning
Calculate transaction velocity across multiple dimensions:
Count and sum of transactions per hour, day, and week
Distinct merchant count in rolling 24-hour window
Channel switching frequency (mobile → web → in-store)
Geographic spread (distinct cities or countries per day)
Behavioral Biometrics Interpretation
When behavioral data is available, assess:
Typing cadence deviation from enrolled profile
Navigation pattern anomalies (unfamiliar with interface)
Session duration relative to transaction complexity
Mouse movement patterns (bot-like linear movements vs. human curves)
Bust-Out Detection
For first-party fraud and bust-out patterns:
Account aging: months since opening vs. credit utilization trajectory
Payment behavior: consistent minimum payments building to max-out
Balance transfer patterns: moving credit across products
Sudden change: shift from responsible usage to rapid cash advances
Examples
Example 1 — ATO Pattern:
"Account #XXXX8832 (customer Jane Smith) triggered ATO-Score 94 on 2025-10-12. At 02:14 AM EST, the registered email was changed from [email protected] to [email protected] from a new device (Android, Pixel 7, IP: 185.xx.xx.xx geolocated to Romania). Within 8 minutes, a $4,500 Zelle transfer was initiated to a new recipient. The customer's prior 18 months show no international login, no device changes, and typical daytime-only access from iOS devices in Atlanta, GA. The device, IP geography, email provider change, and rapid fund movement constitute strong evidence of account takeover. Recommended: block account, reverse transaction, credential reset, and SAR filing."
Example 2 — False Positive Analysis:
"Alert FP-44291 flagged a $3,200 purchase at an electronics retailer for customer #XXXX1190 (model score: 78, threshold: 75). Top features: amount 2.1σ above mean, new merchant, and weekend timing. Investigation reveals: customer called branch on Friday to advise of planned TV purchase (noted in CRM), merchant is 2 miles from home address, and Apple Pay with biometric authentication was used. Determination: false positive. The pre-notification, proximity, and strong authentication mitigate the statistical anomaly. Recommendation: add merchant pre-notification as a score-suppressing feature in the next model iteration."
Guidelines
Never share fraud model scores, thresholds, or detection rules with customers
Use "unauthorized" rather than "fraudulent" when communicating with customers
Preserve chain of custody for digital evidence (screenshots, logs, device data)
Apply Reg E provisional credit timelines strictly; document any extensions
Distinguish between third-party fraud (victim) and first-party fraud (perpetrator) in findings
Cross-reference fraud cases against SAR filing obligations
Use statistical language for deviations (standard deviations, percentiles) rather than subjective terms
Document both incriminating and exculpatory evidence
Maintain objectivity; investigation findings inform but do not substitute for legal determinations
Validation Checklist
Fraud typology is explicitly classified
Detection signal is decomposed with feature-level attribution
Evidence is categorized by strength (strong, moderate, weak)
Customer baseline behavior is quantified for comparison
Linkage analysis covers device, identity, behavioral, and financial dimensions
Reg E applicability and timeline compliance are assessed
Financial impact (gross, recovery, net) is calculated
Determination includes confidence level and specific rationale
Actions are specific and immediately actionable
Documentation supports potential law enforcement referral