Phone: (702) 981-4663      Alexander@DisputedefenseConsulting.com

Your message has been sent.

Thank you for contacting us. 

How do fraudsters isolate who/where to target?

I was recently asked this question and immediately my mind ran through the process. There are many sources of information and many ways to go about this. The one that I reflected on (that isn’t spoken about too often) is finding reports like this.

Read More »

Methods from a Past Life Pt. 1: Selling Rental Cars

Generated credit card numbers are used to reserve a rental car online. The same card number and expiration date are embossed onto a card matching the issuer. 3 for Amex, 4 for Visa, 5 for Mastercard, 6 for Discover. No CVV / Billing Address information is needed due to the weakness of the checkout form. The account is made under the name of someone who has a real (stolen) drivers license that can pass the DL without suspicion. Both the card and the DL are presented in-person when picking up the car.

Read More »

Is Your Automation Designed Properly?

There are many examples of extraordinarily-talented people in our community, many of which represent effective and powerful SaaS offerings. Each offering, as effective as it may be, can only serve as a tool. Consider the use of a hammer. Great for nails. Not so good when applied to screws.

Read More »

High Level Fraudsters Break Merchant Strategies

A friendly vendor asked me a question that required a pretty long-winded response. My answer was centered around one of the more-involved methods from my past, an explanation of the requisite methods, the reason why the exploits worked, and what could be done to stop someone like me from using this method.

Read More »
Alexander Hall

Alexander@DisputeDefenseConsulting.com

(702) 981-4663

Register now for our

Upcoming Roundtable

Seats are limited

Upon submission you will receive an email confirmation.