Skip to main content

Card-Present Fraud

Prerequisites

Before addressing CP fraud, understand:

Card-present fraud is lower than CNP, but when it happens, you eat the loss. EMV shifted liability, but the shift only works if you actually use the chip. Keyed transactions, employee schemes, and physical tampering are your real risks.

Most SMBs assume in-person payments are safe. They're safer, not safe. See fraud metrics for how to measure your exposure.

What Matters

  1. EMV liability shift only works if you dip the chip. Swipe or key the card, you own the fraud.
  2. Skimming still happens. Attackers overlay devices on your terminals to capture card data.
  3. Employee fraud is your biggest CP risk. Internal refund schemes, keyed transaction abuse, card data theft.
  4. Keyed transactions are high-risk by definition. Every keyed entry should trigger velocity rules.
  5. Physical security is fraud prevention. Terminals in view, tamper checks, access control. See PCI DSS Requirement 9.

Skimming Detection

Skimmers capture card data at the point of swipe or insert. Modern skimmers are sophisticated.

Types of Skimmers

TypeHow It WorksDetection
Overlay skimmerFits over existing card slotWiggle test, visual inspection
Deep insert skimmerInside the card slotHarder to detect visually
Bluetooth skimmerTransmits data wirelesslyRF detection, Bluetooth scan
ShimmerThin device reads chip dataVery hard to detect

Daily Terminal Check

Train staff to check terminals every day:

  • Card slot sits flush, doesn't wiggle
  • No overlay on PIN pad
  • Terminal casing is intact, no gaps
  • Cables are secure, no additions
  • Tamper stickers/seals unbroken
  • Terminal serial number matches inventory

Weekly Deep Check

  • Compare terminal to photo of known-good state
  • Check for unusual Bluetooth devices nearby
  • Verify firmware version matches expected
  • Review transaction patterns for anomalies

Terminal Tampering

Beyond skimmers, terminals can be physically compromised.

Tamper Indicators

SignWhat It Means
Broken or missing tamper sealTerminal may have been opened
Loose screws or panelsInternal access attempted
Different colored partsReplacement components
Unusual weightInternal additions
Strange behaviorSlow transactions, unexpected prompts

What to Do If Tampering Suspected

  1. Stop using the terminal immediately - see terminal operations
  2. Do not process more transactions
  3. Preserve the terminal as evidence
  4. Contact your processor security team
  5. Review transactions from that terminal for past 30 days - check metrics
  6. File police report if confirmed - document for PCI incident response

Physical Security Basics

  • Terminals in view of staff at all times
  • Cable/lock terminals to counter
  • Limit who can access back of terminal
  • Lock terminals in safe overnight (high-risk locations)
  • Visitor/vendor check-in for anyone who touches terminals

Employee Fraud Schemes

Your employees are your biggest card-present fraud risk. This is a form of first-party fraud when committed by insiders.

Common Schemes

Refund Fraud

Pattern: Employee processes refund to their own card or an accomplice's card without a corresponding sale. See refund fraud for detection strategies.

Signals:

  • High refund count for specific employee
  • Refunds without corresponding sales
  • Refunds to same card repeatedly
  • Refunds processed after hours or at close

Prevention:

  • Require manager approval for refunds over $X
  • Match refunds to original transactions
  • Review refund reports by employee weekly
  • Dual control for cash refunds

Skimming by Staff

Pattern: Employee uses hidden device to capture card data, sells data or uses for fraud.

Signals:

  • Employee handles cards out of customer view
  • Transactions take unusually long
  • Multiple fraud reports traced to your location

Prevention:

  • Customer-facing terminals only
  • Cards never leave customer's hand
  • Clear sightlines to all terminals
  • Background checks for new hires

Keyed Transaction Abuse

Pattern: Employee keys in card numbers from memory, photos, or written notes for personal purchases.

Signals:

  • High keyed ratio for specific employee
  • Keyed transactions to same card
  • Keyed transactions after hours

Prevention:

  • Monitor keyed ratio by employee
  • Require manager approval for keyed transactions
  • Review keyed transactions daily
  • Disable keyed entry on some terminals

Void/Cancel Manipulation

Pattern: Employee processes sale, pockets cash, then voids transaction.

Signals:

  • High void rate for specific employee
  • Voids at end of shift
  • Voids without customer present

Prevention:

  • Require customer signature on voids
  • Manager approval for voids
  • Receipt required for all voids
  • Camera coverage of register area

Monitoring by Employee

Track these metrics per employee:

MetricRed Flag Threshold
Refund count> 2x average
Refund value> 2x average
Keyed transaction %> 5%
Void rate> 2%
After-hours transactionsAny
Same-card refunds> 1 per month
Ask Your Dev

"Can we pull reports showing refund and void rates by employee? What about keyed transaction percentage?"


MOTO/Keyed Transaction Risk

Every keyed transaction is a liability.

When Keyed Entry Is Acceptable

ScenarioRisk LevelNotes
Established B2B customer, phone orderLowerKnown relationship, verify identity
Card present but chip failed onceMediumOne retry, then request different card
Delivery driver collecting paymentMediumConsider mobile terminal instead

When Keyed Entry Is a Red Flag

ScenarioRisk LevelNotes
Walk-in says chip "doesn't work"HighCommon fraud tactic
Customer reads card number from phoneHighLikely stolen card data
Rush to complete before closingHighPressure tactic
High-ticket item, new customerHighClassic fraud pattern
Employee keying without customer presentCriticalPotential internal fraud

Liability Shift Loss

Transaction TypeLiability for Fraud
Chip dip (EMV)Issuer
Contactless (NFC)Issuer
Swipe (mag-stripe)Merchant
Keyed (MOTO)Merchant

If you key a fraudulent transaction, you eat the loss. No exceptions.

Keyed Transaction Policy

  1. Chip must be attempted first
  2. If chip fails, tap must be attempted
  3. If both fail, request different card
  4. Keyed entry requires manager approval
  5. Document reason for every keyed transaction
  6. Never key a number read from a phone or paper

EMV Liability Shift Mechanics

Understanding liability shift helps you make risk decisions.

How Liability Shift Works

Before EMV (pre-2015): Issuer usually liable for fraud.

After EMV: Liability falls on the party with less secure technology.

Merchant HasCard HasLiability
Chip terminalChipIssuer
Chip terminalNo chipIssuer
No chip terminalChipMerchant
No chip terminalNo chipIssuer

What "Chip Terminal" Means

  • Terminal must be EMV-capable
  • EMV must be enabled and active
  • Transaction must be processed as chip (not fallback)

If your terminal has chip capability but you swipe anyway, you lose liability shift.

Fallback Transactions

When chip fails and you fall back to swipe:

  • First fallback: Some liability protection (varies by network)
  • Repeated fallback: Loses protection, signals potential issue

If your terminal regularly falls back to swipe, investigate:

  • Dirty chip reader
  • Worn chip slot
  • Firmware issue
  • Fraud attempt

Test to Run

2-week card-present security audit:

Week 1: Assessment

  • Inspect all terminals for tampering signs
  • Pull keyed transaction report by employee
  • Review refund patterns for past 90 days
  • Verify terminal firmware is current
  • Check physical security (locks, sightlines, access)

Week 2: Remediation

  • Address any tampering concerns
  • Investigate high keyed ratios
  • Implement employee monitoring dashboards
  • Update terminal check procedures
  • Train staff on fraud indicators

Success criteria: All terminals verified clean. Keyed ratio under 2%. Monitoring in place.


Scale Callout

VolumeFocus
Under $100k/mo CPDaily terminal checks. Manager approval for keyed entries. Basic employee monitoring.
$100k-$1M/mo CPAutomated employee metrics. Weekly refund review. Tamper detection procedures.
Over $1M/mo CPDedicated loss prevention. Camera integration. Real-time anomaly detection. Regular security audits.

Where This Breaks

  1. High-turnover retail. Constant new employees means constant training gaps. Simplify procedures and automate monitoring.

  2. Mobile/delivery operations. Terminals out of your sight increase risk. Use cellular terminals with GPS tracking. Limit keyed entry capability.

  3. Multi-location franchises. Consistency is impossible without automated monitoring. Centralized reporting and regular audits required.


Analyst Layer: Metrics to Track

MetricWhat It Tells YouTarget
Keyed transaction %Liability exposure< 2%
Refund rate by employeeInternal fraud riskCompare to average
Void rate by employeeManipulation potential< 2%
Fallback transaction %Terminal health< 1%
CP fraud/dispute rateOverall health< 0.3%
After-hours transaction %Anomaly indicatorInvestigate any

Location-Level Comparison

If you have multiple locations, compare:

  • Keyed % by location
  • Refund rate by location
  • Dispute rate by location

Outliers indicate location-specific problems (terminal issues, employee issues, or local fraud patterns).

Trend Analysis

Week-over-week trends matter more than snapshots:

  • Increasing keyed ratio = investigate
  • Increasing refunds at one location = investigate
  • Spike in voids before employee resignation = investigate

CP Anomaly Monitoring

Build alerting for these card-present anomalies:

AnomalyDetection LogicAlert Threshold
Keyed entry spikeKeyed % > baseline + 2 std devReal-time alert
Off-hours transactionsTransactions outside business hoursAny occurrence
Refund without saleRefund not matched to prior saleAny occurrence
High-value voidVoid > $X (set threshold)Each occurrence
Multiple cards, same device3+ distinct cards on one terminal/hourReal-time alert
Repeated decline then success3+ declines followed by approvalFlag for review

Anomaly Investigation Workflow:

  1. Alert fires → Identify employee, terminal, transaction details
  2. Verify legitimate? → Check with manager, review camera
  3. If suspicious → Escalate to loss prevention
  4. If false positive → Tune threshold
  5. Document outcome → Train detection model

Employee Risk Scoring

Build employee risk scores based on:

FactorWeightSignal
Keyed % vs peersHighAbove-average = risk
Refund % vs peersHighAbove-average = risk
After-hours transactionsMediumAny = flag
Void patternMediumClustered voids = risk
TenureLowNew employees = higher monitoring

Score employees monthly. Investigate top 10% risk scores. Many will be false positives (high performers, complex transactions), but some will reveal issues.


Next Steps

Preventing skimming and tampering?

  1. Train daily terminal checks - Staff inspection routine
  2. Perform weekly deep checks - Compare to known-good state
  3. Handle suspected tampering - Response protocol

Addressing employee fraud?

  1. Know common schemes - Refund, skimming, keyed abuse
  2. Monitor by employee - Per-employee metrics
  3. Implement prevention controls - Manager approvals

Managing keyed transactions?

  1. Identify acceptable scenarios - Low-risk cases
  2. Recognize red flags - High-risk signals
  3. Enforce keyed policy - Chip first, approval required