View original document

The full text on this page is automatically extracted from the file linked above and may contain errors and inconsistencies.

Forecasting inflation and the Great Recession
Marco Bassetto, Todd Messer, and Christine Ostrowski

Introduction and summary
In 2001, Atkeson and Ohanian (2001) presented a
challenge for most statistical models of (U.S.) inflation,
showing that for the period 1985–99, forecasting future
inflation to remain at its most recently observed value
(the “random-walk” hypothesis) would outperform moresophisticated models that incorporated information from
many other economic variables, such as unemployment.
Brave and Fisher (2004) expanded and qualified this
observation: They found that it did not necessarily hold
true for periods other than 1985–99, but they also confirmed that it is difficult to find a model that would perform better than the simple random walk consistently
across a variety of sample periods.
In more recent years, inflation has appeared to be
more stable than in the past, and using a simple constant
to forecast inflation has been an even more successful
strategy than adopting the random-walk hypothesis,
as shown by Stock and Watson (2007) and Diron and
Mojon (2008). But, as noted by Stock and Watson, the
quest for variables—other than inflation itself—that
would consistently help predict inflation has yet to deliver
satisfactory results.1
In this article, we reassess several of the models
considered by Brave and Fisher (2004) in the wake of
the Great Recession of 2008–09 and its aftermath. This
period is particularly interesting because many economic
variables saw more extreme movements than they had
ever experienced in the stable-inflation era since 1985.
As an example, figure 1 shows the behavior of the
Chicago Fed National Activity Index (CFNAI). If measures of economic or labor market activity are ever useful in forecasting inflation, then this should become
particularly clear in times of large movements. In
figure 2, we show the behavior of inflation over the same
period. The black line shows total inflation as measured
by the Personal Consumption Expenditure Price Index
(PCE), while the red line shows core inflation, excluding

Federal Reserve Bank of Chicago

the volatile energy and food sectors. Inflation did drop
in 2008, at the same time as the economy was contracting, but this drop could not be forecasted based on
the benign economic data of 2007. More importantly,
inflation recovered between 2009 and 2010.
We are not the first to point out that inflation remained remarkably stable in the face of serious economic
weakness over the last five years: This is discussed by
Hall (2011), Ball and Mazumder (2011), and Simon,
Marco Bassetto is a professor of macroeconomics at University
College London, a senior economist and research advisor in the
Economic Research Department of the Federal Reserve Bank
of Chicago, and a member of the Centre for Macroeconomics.
Todd Messer is an associate economist and Christine Ostrowski
is a senior associate economist in the Economic Research
Department of the Federal Reserve Bank of Chicago. The
authors are indebted to Gadi Barlevy, Mariacristina De Nardi,
Hesna Genay, and Ezra Oberfield for valuable suggestions.
© 2013 Federal Reserve Bank of Chicago
Economic Perspectives is published by the Economic Research
Department of the Federal Reserve Bank of Chicago. The views
expressed are the authors’ and do not necessarily reflect the views
of the Federal Reserve Bank of Chicago or the Federal Reserve
System.
Charles L. Evans, President; Daniel G. Sullivan, Executive Vice
President and Director of Research; Spencer Krane, Senior Vice
President and Economic Advisor; David Marshall, Senior Vice
President, financial markets group; Daniel Aaronson, Vice President,
microeconomic policy research; Jonas D. M. Fisher, Vice President,
macroeconomic policy research; Richard Heckinger, Vice President,
markets team; Anna L. Paulson, Vice President, finance team;
William A. Testa, Vice President, regional programs; Richard D.
Porter, Vice President and Economics Editor; Helen Koshy and
Han Y. Choi, Editors; Rita Molloy and Julia Baker, Production
Editors; Sheila A. Mangler, Editorial Assistant.
Economic Perspectives articles may be reproduced in whole or in
part, provided the articles are not reproduced or distributed for
commercial gain and provided the source is appropriately credited.
Prior written permission must be obtained for any other reproduction, distribution, republication, or creation of derivative works
of Economic Perspectives articles. To request permission, please
contact Helen Koshy, senior editor, at 312-322-5830 or email
Helen.Koshy@chi.frb.org.
ISSN 0164-0682

79

figure 1

Chicago Fed National Activity Index, 1967–2012
label

2
1
0
−1
−2
−3
−4
−5

1970

’75

’80

’85

’90

’95

2000

’05

’10

Source: Federal Reserve Bank of Chicago, www.chicagofed.org.

figure 2

Year-over-year headline and core PCE inflation (percent)
12.0

label

10.0
8.0
6.0
4.0
2.0
0.0
−2.0

1970

’75

’80

’85

’90
Core

’95

2000

’05

’10

Headline

Note: PCE indicates Personal Consumption Expenditures Price Index.
Source: U.S. Bureau of Economic Analysis and Haver Analytics.

80

3Q/2013, Economic Perspectives

Matheson, and Sandri (2013), among others. This
observation is commonly cited as evidence that the
“Phillips curve,” which illustrates the relationship
between inflation and unemployment, has flattened in
recent years. Our goal in this article goes beyond this
observation in two ways:
1) We show how the recovery of inflation in 2009–10
occurred precisely at the only time (since 1985)
in which the statistical models considered here
would predict sharp disinflation, that is, inflation
went up at the time at which the models would
most strongly predict that it should go down.

forecasting horizons. We perform our analysis on core
inflation in order to strip out highly volatile food and
energy prices. We consider two measures of inflation,
based on the price index for Personal Consumption
Expenditures (PCE) and the Consumer Price Index
(CPI), respectively.3 Most of our analysis is based on
data from January 1985 to December 2012;4 we exclude
earlier years, in which monetary policy was conducted
very differently and inflation was much less stable. As
a robustness experiment, we also consider what happens
if we include the high-inflation period of the 1970s and
the disinflation period of the early 1980s.

2) We quantify the effect of the resulting large
forecast errors on the coefficient estimates of the
model, offering a metric by which we can assess
how much weaker the relationship between inflation and economic activity appears when the
data from 2008–12 are taken into account.
Our work is also related to Del Negro, Giannoni,
and Schorfheide (2013). In their paper, they consider
a fully fledged new Keynesian model, and they show
that inflation during the Great Recession behaved in
ways that are broadly consistent with the implications
of the model; in particular, their model anticipated some
disinflation, but not enough to get to deflation. The path
of inflation forecasts displayed by Del Negro, Giannoni,
and Schorfheide is not out of line with the results of
the purely statistical forecasting models that we consider.2 Indeed, if we only look at our figure 12 (p. 94),
the performance of the statistical models does not
appear as bad during the Great Recession. However,
when we look at the forecasts of changes in inflation,
the failure of the models to account for the behavior
of inflation over the last five years becomes apparent:
It is this failure that leads to the conclusion that estimates based on data up to 2007 were not robust to the
inclusion of data observed since then. It would be interesting to perform experiments similar to ours in a
wider class of both statistical and economic models.
In the next section, we describe the statistical
models that form the basis of our analysis. Then, we
present the results from our estimation. We first document the magnitude and timing of the forecast errors
from the models and then discuss how the past five
years affect the coefficient estimates.

Models in differences
It is common to assume that inflation itself is a
unit-root process (or close to it), which suggests we
should run forecasting regressions in differences. In
this form, the forecasting regression is

Brief description of data and models
We use monthly data for both inflation and the
variables to be used in forecasting it. We consider two
forecasting horizons: 12 months and 24 months. This
represents a fairly standard choice, and our results would
not change substantially if we considered other, similar

Federal Reserve Bank of Chicago

1)

p∗

q∗

j =0

j =0

12
1
π12
t + h − πt = α + ∑ γ j ∆πt − j + ∑ β j xt − j + ε t + h .

In equation 1, π12
t is 12-month inflation in period t, that
is, it is the logarithmic change in the price index between period t and t –12. Then h is the forecast horizon
(12 or 24 months). ∆π1t is the one-month change in
monthly inflation; xt is the vector of variables used
in the forecast (which varies by model); p*, q*, a,
(β1,…, βq*), (γ1,…, γp*) are parameters to be estimated;
and εt+h is the forecast error, which (by construction) is
uncorrelated with all the variables used in the regression
up to period t. We study four models that share the common structure of equation 1, but differ in the variables
used to predict changes in the inflation rate. These
models follow research by Stock and Watson (1999,
2002, and 2003).
Specifically, all four models include a constant5
and lags of one-month changes in inflation, but they
then differ as follows:
Activity index model
This model is based on the premise that inflation
may increase in periods of brisk economic activity and
decrease when the economy exhibits slack. Activity is
measured by the three-month moving average of the
Chicago Fed National Activity Index (CFNAI).6 The
CFNAI aggregates information7 from 85 series capturing
various aspects of economic activity and is calibrated
so as to have a mean of zero and a variance of one,
with positive or negative values, respectively, indicating
periods of above-average or below-average economic
activity. As shown in figure 1, the Great Recession of
2008 brought the CFNAI to values that were matched
only by the most severe recession of the 1970s.

81

figure 3

Civilian unemployment and slow-moving component, 1959–2012
12

label

10

8

6

4

2
1960

’65

’70

’75

’80

’85

Unemployment rate (percent)

’90

’95

2000

’05

’10

Slow-moving component

Source: U.S. Bureau of Labor Statistics and Haver Analytics.

Natural rate model
This model looks more specifically at labor market
conditions. To construct xt , we start with the civilian
unemployment rate, and we split it into two components.8
The first component is a slow-moving trend, which
captures demographic changes and other institutional
factors that may affect unemployment without being
associated with the business cycle. The second component (the “cyclical component”), which is the residual
after the trend has been removed, is meant to be associated with business cycle movements in unemployment that may be predictive of inflationary pressures.
Figure 3 plots the civilian unemployment rate
and its slow-moving trend as estimated at the end of
2012. Because the most recent recession was so unusually protracted, a significant part of the increase
in unemployment of the past five years is attributed
to the trend (dotted red line). This formulation has the
counterintuitive implication that during the recession
of 2008, unemployment was actually lower than its
long-run trend. For this reason, we choose to construct
the residual in a period t that is used for estimation
from the trend as it would be estimated on data only
up to that period.9 Using this one-sided estimate, the
spike in unemployment in 2008 and 2009 is entirely
perceived as a cyclical downturn, which should affect
inflation. For the sake of robustness, we also repeated
the experiment using the trend as currently estimated;

82

our conclusions would be similar and, if anything,
stronger in this case.
Diffusion model
This model closely resembles Stock and Watson
(2002). As for the activity index model, we rely on a
large number of series whose common information is
summarized by means of principal components. The
difference between the activity index model and the
diffusion model is that we include here a much larger
number of series (148), which capture not only economic
activity, but also information on prices and financial
market conditions. Here, xt represents the first four
principal components of the 148 series.
Indicator model
While for the diffusion model we first summarize
the information from many series into a few principal
components and then use those to forecast inflation, here
we proceed in reverse. First, we use 22 economic series10
and run 22 separate regressions, each one containing a
single series as a regressor xt . Then we summarize this
information by taking the median forecast among the 22.
In addition to choosing the series to include in
equation 1, we need a criterion to choose the number
of lags of inflation and the regressors that appear on
the right-hand side of equation 1. For the first three
models, we rely on the Bayesian information criterion
to make a selection.11

3Q/2013, Economic Perspectives

For the indicator model, the Bayesian information criterion may select different lag lengths depending on the variable that we use; we thus simply fix p*
and q*, which we choose to be 5.
Models in levels
There is evidence that inflation has been less persistent in recent years than in the past.12 For this reason,
we experiment with a different specification, where
inflation is treated as a stationary process:
2)

p∗

q∗

j =0

j =0

12
1
π12
t + h = α + ωπt + ∑ γ j ∆πt − j + ∑ β j xt − j + ε t + h .

Compared with equation 1, equation 2 allows the effect
of past inflation to decay over time and long-run inflation to revert to a constant.
Thus, we repeat our exercise for each model, replacing equation 1 with equation 2.
Results
Models in differences
To begin, we estimate the four models using data
from January 1985 to December 2007, before the Great
Recession. Using this output, we forecast the predicted
change in year-over-year inflation at each point in our
sample. Up to 2007, this is an in-sample prediction:
The coefficients of the statistical model are estimated
to fit the data as well as possible. From 2008 onward,
this becomes an out-of-sample forecast, where we
explore whether the coefficients that we estimated on
previous data are helpful in accounting for inflation
during and after the Great Recession.
Figure 4 shows results for PCE in the post-1984
sample at the 12-month horizon, where the blue line
is the actual change in inflation and the red line is the
predicted change. All four models predict a drop in
inflation from late 2009 to early 2010. Measures of
slack are greatest after the recession has taken its toll
on economic activity and the labor market, and this is
when the statistical relationship of equation 1 would
imply the greatest downward pressure on inflation. However, inflation actually dropped contemporaneously
with the deterioration in economic activity and labor
market conditions. By 2010, inflation was instead recovering. In other words, the models were predicting
the greatest decrease at precisely the time when inflation
was increasing. Further, none of the models predicted
an increase in inflation at all: Inflation was expected
to decrease and continue to decrease throughout the
early 2010s.

Federal Reserve Bank of Chicago

Next, we examine the forecast errors (the difference between the blue line and the red line in figure 4)
to understand how this miss compares with past episodes.
These errors are shown in figure 5. This figure shows
that the forecast errors were large but not unprecedented
by historical standards. The only exception is the diffusion model (panel D), which performed particularly
poorly during the Great Recession. However, returning
to figure 4, we see that a noticeable difference emerges
in the source of these errors in the later period. Previously, forecast errors were due to movements in inflation that the models failed to predict. During the Great
Recession, the models predicted a large change that
never occurred.
We now reestimate the models by adding five more
years of data, so that the sample covers the period from
January 1985 to December 2012, and we recompute
our forecasts based on the estimates obtained on this
new sample. Figure 6 adds these new forecasts (represented by the black lines) to those that were already
included in figure 4. In the activity and diffusion models
(panels A and D, respectively), the forecasts become
much flatter, indicating that the CFNAI and the diffusion factors appear to be less predictive of inflation
changes in the wake of the Great Recession. The indicator model stayed roughly equal, but the aggregation
of the indicators in this model was never particularly
informative of inflation changes, resulting in a flat forecast line throughout. The change in coefficients is
particularly stark in the case of the natural rate model:
The inflation forecast almost becomes a constant.
Estimating the models using the additional data
shows a much more muted response of inflation.
Why do the forecasts become flatter when we add
the more recent data? The forecasts are composed of
a constant, current and lagged values of monthly changes
in inflation, and current and lagged values of measures
of economic activity (or labor/financial market conditions). In figure 7, we isolate the component of the forecast that is due to the measure of economic activity. As
before, the red line refers to the coefficients estimated
on data up to 2007, and the black line includes data up
to 2012. This figure shows that the large drop in inflation the models predicted in late 2009 and 2010 that never
occurred was indeed due to weakness in the measures
of economic activity. It is this failed prediction that
mutes the response of the forecasts when coefficients
are estimated on the entire sample of data to December
2012. For the natural rate model, this revision is so
large that unemployment almost completely loses its
predictive power for inflation.

83

Source: insert source

figure 4

Realized 12-month PCE inflation changes vs. forecast, 1985–2007 coefficients
label
A. Activity
0.02
0.01
0.00
−0.01
−0.02
1986

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

B. Natural rate
0.02
0.01
0.00
−0.01
−0.02
1986

C. Indicator
0.02
0.01
0.00
−0.01
−0.02
1986

D. Diffusion
0.02
0.01
0.00
−0.01
−0.02
1986

Realized 12-month changes in PCE inflation
12-month-ahead forecast based on coefficients estimated on the sample 1985–2007
Note: PCE indicates Personal Consumption Expenditures Price Index.
Source: U.S. Bureau of Economic Analysis and Haver Analytics.

84

3Q/2013, Economic Perspectives

Source: insert source

figure 5

Errors from 12-month-ahead PCE forecast, 1985–2007 coefficients
label
A. Activity
0.025

0

−0.025
1986

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

B. Natural rate
0.025

0

−0.025
1986

C. Indicator
0.025

0

−0.025
1986

D. Diffusion
0.025

0

−0.025
1986

Note: PCE indicates Personal Consumption Expenditures Price Index.

Federal Reserve Bank of Chicago

85

Source: insert source

figure 6

Realized 12-month PCE inflation changes vs. forecast, 1985–2007 and 1985–2012 coefficients
label
A. Activity
0.02
0.01
0.00
−0.01
−0.02
1986

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

B. Natural rate
0.02
0.01
0.00
−0.01
−0.02
1986

C. Indicator
0.02
0.01
0.00
−0.01
−0.02
1986

D. Diffusion
0.02
0.01
0.00
−0.01
−0.02
1986

Realized 12-month changes in PCE inflation
12-month-ahead forecast based on coefficients estimated on 1985–2007 sample
12-month-ahead forecast based on coefficients estimated on 1985–2012 sample
Note: PCE indicates Personal Consumption Expenditures Price Index.
Source: U.S. Bureau of Economic Analysis and Haver Analytics.

86

3Q/2013, Economic Perspectives

Source: insert source

figure 7

Contribution of economic activity variables, 1985–2007 and 1985–2012 coefficients
label
A. Activity
0.012
0.006
0
−0.006
−0.012
1986

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

B. Natural rate
0.012
0.006
0
−0.006
−0.012
1986

C. Indicator
0.012
0.006
0
−0.006
−0.012
1986

D. Diffusion
0.012
0.006
0
−0.006
−0.012
1986

Based on coefficients estimated on the 1985–2007 sample
Based on coefficients estimated on the 1985–2012 sample

Federal Reserve Bank of Chicago

87

We now explore the robustness of our findings
along several dimensions. First, in figure 8, we repeat
the experiment forecasting CPI inflation, rather than
PCE inflation. Here, the mismatch between forecasts
and outcomes is less jarring, in that inflation remained
constant when the models predicted the largest drop
(March 2010 in the activity and indicator models
[panels A and C, respectively], November 2010 in the
natural rate model [panel B], and March 2011 in the
diffusion model [panel D] in the extended sample),
rather than actually increasing as was the case for PCE;
by the time actual CPI inflation recovered, the model
forecasted changes were close to zero. Nonetheless,
the discrepancy between the red and black lines shows
that adding the years of the Great Recession reduces
the magnitude of estimated changes in inflation. As
was the case for PCE, the diffusion model (panel D)
performed particularly poorly during the Great Recession;
accordingly it saw the biggest revisions in its coefficients with the addition of the new data.
Figure 9 reverts to forecasting PCE inflation and
extends the horizon of the forecast to 24 months. This
longer window has the effect of smoothing the ups and
downs that inflation experienced, and the forecast based
on using the CFNAI now appears less out of line with
the realized outcomes in the period 2008–12. As we
saw at the 12-month horizon, the natural rate model
(panel B) suggests that deviations of unemployment
from its filtered path have hardly any predictive power
for inflation changes when data up to 2012 are included
in the estimation; and the diffusion model (panel D)
remains the worst-performing model for the period,
resulting in the largest revisions.
In figure 10 we take a broader perspective, estimating the models on a sample from January 1969 onward. When we include the high inflation of the 1970s
and the 1980s disinflation, the models suggest that
economic activity has more predictive power for changes
in inflation: This finding is most likely due to the fact
that, in those periods, inflation expectations were less
well anchored and it was easier for real shocks to propagate to persistent inflation. As a consequence, the activity, natural rate, and diffusion models (panels A, B,
and D, respectively) imply a bigger forecasted disinflation
after the Great Recession and generally perform worse.
The bigger forecast errors would lead to bigger revisions
in coefficients, but this effect is tempered by the fact
that five years of additional data have less of an effect
when models are estimated on a 45-year sample than
when they are estimated on a shorter, 28-year sample.
The figures provide consistent evidence of a
qualitative change in the forecasting relationships, but

88

they do not provide a quantitative answer as to how
much flatter the relationship between inflation changes
and economic activity has become. We now turn to
this question.
When the estimated model does not include any
lags on the measure of economic activity, the ratio of
the (absolute value of) coefficients on the measure of
economic activity is a straightforward measure of how
much flatter the relationship has become. However,
the structure of our models allows for the selection of
any number of lags, and some models estimate different numbers of lags depending on the period used.
To summarize the changes in the coefficients into a
single measure, we take the time series of the predicted
contributions to the forecast of the independent variable
and calculate the maximum and the median of those
values. Formally, for the case of the maximum, this
means that we compute the following object:

3)



q∗





t 








q∗


2007

j
t − j 


maxt  ∑ j =0 β2012
xt − j
j
max

∑

j =0

β

x

.

In equation 3, t varies over the sample period (1985–
2012 for the post-1984 sample, 1969–2012 for PCE
over the full sample, and December 1979–2012 for
CPI over the full sample), β2012
represents the estimates
j
of the coefficients of equation 1 based on data up to
2012, and β2007
represents the estimates of the same
j
coefficients based on data up to 2007.
The results are presented in table 1 (p. 92). The
table confirms the visual impression from the figures.
With the exception of the indicator models, where the
relationship between economic indicators and inflation
was already estimated to be weak as of 2007, all other
ratios are considerably less than 1, indicating a flatter
relationship in the wake of the Great Recession.
In most cases, the ratios imply a flattening out of
at least 20–30 percent—a large change considering that
the additional five years of data represent just 18 percent
of the post-1984 sample, and 11 percent and 14 percent
of the full sample for PCE and CPI, respectively. To
better understand the source of the large changes observed in this table, we observe that there are two ways
in which including new observations can have large
effects in estimating a linear relationship in equation 1.
First, observations for ∆π1t − j and xt–j could be very far
from their mean in the new period. In this case, their
effect could be uncovered much more clearly, because
it would be more difficult for the error εt+h to mask it.
Thus, large changes would simply reflect the fact that

3Q/2013, Economic Perspectives

Source: insert source

figure 8

Realized 12-month CPI inflation changes vs. forecast, 1985–2007 and 1985–2012 coefficients
label
A. Activity
0.02
0.01
0.00
−0.01
−0.02
1986

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

B. Natural rate
0.02
0.01
0.00
−0.01
−0.02
1986

C. Indicator
0.02
0.01
0.00
−0.01
−0.02
1986

D. Diffusion
0.02
0.01
0.00
−0.01
−0.02
1986

Realized 12-month changes in CPI inflation
12-month-ahead forecast based on coefficients estimated on 1985–2007 sample
12-month-ahead forecast based on coefficients estimated on 1985–2012 sample
Note: CPI indicates Consumer Price Index.
Source: U.S. Bureau of Labor Statistics and Haver Analytics.

Federal Reserve Bank of Chicago

89

Source: insert source

figure 9

Realized 24-month PCE inflation changes vs. forecast, 1985–2007 and 1985–2012 coefficients
label

A. Activity
0.01
0.00
−0.01
−0.02
−0.03
1987

’92

’97

2002

’07

’12

’92

’97

2002

’07

’12

’92

’97

2002

’07

’12

’92

’97

2002

’07

’12

B. Natural rate
0.01
0.00
−0.01
−0.02
−0.03
1987

C. Indicator
0.01
0.00
−0.01
−0.02
−0.03
1987

D. Diffusion
0.01
0.00
−0.01
−0.02
−0.03
1987

Realized 24-month changes in PCE inflation
24-month-ahead forecast based on coefficients estimated on 1985–2007 sample
24-month-ahead forecast based on coefficients estimated on 1985–2012 sample
Note: PCE indicates Personal Consumption Expenditures Price Index.
Source: U.S. Bureau of Economic Analysis and Haver Analytics.

90

3Q/2013, Economic Perspectives

Source: insert source

figure 10

Realized 12-month PCE inflation changes vs. forecast, 1969–2007 and 1969–2012 coefficients
label
A. Activity
0.06
0.04
0.02
0
−0.02
−0.04
1970

’75

’80

’85

’90

’95

2000

’05

’10

’75

’80

’85

’90

’95

2000

’05

’10

’75

’80

’85

’90

’95

2000

’05

’10

’75

’80

’85

’90

’95

2000

’05

’10

B. Natural rate
0.06
0.04
0.02
0
−0.02
−0.04
1970

C. Indicator
0.06
0.04
0.02
0
−0.02
−0.04
1970

D. Diffusion
0.06
0.04
0.02
0
−0.02
−0.04
1970

Realized 12-month changes in PCE inflation
12-month-ahead forecast based on coefficients estimated on 1969–2007 sample
12-month-ahead forecast based on coefficients estimated on 1969–2012 sample
Note: PCE indicates Personal Consumption Expenditures Price Index.
Source: U.S. Bureau of Economic Analysis and Haver Analytics.

Federal Reserve Bank of Chicago

91

			

Table 1

Contribution of economic activity to forecasts of 12-month and 24-month inflation changes
(coefficients estimated on the period to 2012 vs. the period to 2007)
Post-1984
Horizon
Model

CPI12
Activity

Natural

CPI24

Indicator

Diffusion

Activity

Natural

		

Indicator

Diffusion

Max
0.66
0.71
0.68
0.51
0.72
0.50
1.16
0.46
Median
0.66
0.57
0.66
0.57
0.72
0.46
0.93
0.59
								
Post-1984
Horizon
Model

PCE12
Activity

Natural

PCE24

Indicator

Diffusion

Activity

Natural

		

Indicator

Diffusion

Max
0.61
0.02
1.51
0.43
0.88
0.05
1.59
0.31
Median
0.61
0.02
1.12
0.43
0.88
0.05
1.17
0.25
								
All
Horizon
Model

CPI12
Activity

Natural

CPI24

Indicator

Diffusion

Activity

Natural

		

Indicator

Diffusion

Max
0.76
0.80
0.66
0.41
0.60
0.65
0.87
0.40
Median
0.76
0.59
0.80
0.45
0.51
0.50
0.81
0.45
								
All
Horizon

PCE12

PCE24			

Model

Activity

Natural

Indicator

Diffusion

Activity

Natural

Indicator

Diffusion

Max
Median

0.69
0.57

0.70
0.70

0.65
0.62

0.49
0.54

0.72
0.59

0.77
0.72

0.82
0.69

0.95
0.99

Notes: Post-1984 refers to the sample from 1985 onwards. All refers to a sample that starts in 1969 for PCE (Personal Consumption Expenditures
Price Index) and 1979 for CPI (Consumer Price Index). Numbers smaller than one imply that the contribution shrank.

the new period was very informative about the statistical relationship, increasing confidence in the estimates.
Alternatively, large changes could follow if the data
exhibited a very different statistical relationship in the
recent period than in past observations; in this case,
the relationship could be unstable. As we observed
earlier, the first explanation is certainly a possibility
for 2008–12, since all measures of economic activity
were far away from their usual ranges during the Great
Recession. In the experiment of figure 11, we show some
evidence against the second explanation. Specifically,
we estimate the activity index model at the 12-month
horizon on a rolling sample of five years and plot the
coefficient on the activity index.13 The figure shows
that the coefficient estimated over the last five years
(the last point of the line) is not very different from
estimates from previous five-year windows. Thus, we
do not see obvious signs that the statistical relationship
changed; the lack of predictive power that measures
of economic activity exhibit against inflation changes
in the latest period holds true throughout the sample

92

and simply becomes more apparent at times of large
swings in activity.
Models in levels
In this section, we consider whether a stationary
model of inflation, whereby inflation is expected to
always revert to a constant long-run mean, is better
able to account for the inflation experience of the Great
Recession. For the sake of brevity, we only consider
our baseline case, which aims to forecast core PCE
inflation 12 months ahead, using data from 1985 onward.
Our estimate of the autoregressive coefficient ω
varies between 0.82 and 0.86 across the four models
when we estimate them up to 2007: These estimates
suggest a substantial amount of mean reversion. However, as shown in figure 12, estimating the model in
levels rather than differences has only very subtle effects on the forecasts of inflation 12 months ahead.14
In figure 13, we again compare the performance of the
models estimated in levels and differences, but we look
at the forecast of the change in inflation rather than
the forecast of inflation itself. These pictures are more

3Q/2013, Economic Perspectives

Source: insert source

figure 11

Coefficient on CFNAI, five-year rolling windows
A. PCElabel
12-month horizon
0.012
0.010
0.008
0.006
0.004
0.002
0
−0.002
−0.004
−0.006

1976

’80

’84

’88

’92

’96

2000

’04

’08

’12

B. CPI 12-month horizon
0.012
0.010
0.008
0.006
0.004
0.002
0
−0.002
−0.004
−0.006
1984

’88

’92

’96

comparable to those that we introduced earlier; they
also make it easier to notice the difference between the
two estimation strategies. Not surprisingly, the models
in levels predict lower inflation in the early part of our
sample and higher inflation in the later part. This happens because inflation was higher in the first part of
the sample than in the second part of the sample:
Models based on differences in inflation start from a
baseline assumption that inflation will stay at its current
value, while models in levels predict that inflation will

Federal Reserve Bank of Chicago

2000

’04

’08

’12

revert to the mean and thus trend lower when it is above
its sample mean and higher in the opposite case. The
predicted mean reversion contributes to moderating
the forecast errors since the Great Recession, but it
does not qualitatively alter our conclusion that the
models predicted the most disinflation at a time in
which inflation was instead increasing.
In figure 14 (p. 96), we repeat the exercise of figure 7
for the models estimated in inflation levels. Specifically,
we look at the contribution that the economic activity

93

Source: insert source

figure 12

Realized 12-month PCE inflation levels vs. forecast, 1985–2007 coefficients
label
A. Activity
0.05
0.04
0.03
0.02
0.01
0
1986

’91

’96

’01

’06

’11

’91

’96

’01

’06

’11

’91

’96

’01

’06

’11

’91

’96

’01

’06

’11

B. Natural rate
0.05
0.04
0.03
0.02
0.01
0
1986

C. Indicator
0.05
0.04
0.03
0.02
0.01
0
1986

D. Diffusion
0.05
0.04
0.03
0.02
0.01
0
1986

Model in levels

Model in differences

Realized 12-month levels of PCE inflation

Note: PCE indicates Personal Consumption Expenditures Price Index.
Source: U.S. Bureau of Economic Analysis and Haver Analytics.

94

3Q/2013, Economic Perspectives

Source: insert source

figure 13

Realized 12-month PCE inflation changes vs. forecast, 1985–2007 coefficients, levels and differences
label

A. Activity
0.02

0

−0.02
1986

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

B. Natural rate
0.02

0

−0.02
1986

C. Indicator
0.02

0

−0.02
1986

D. Diffusion
0.02

0

−0.02
1986

Model in levels

Model in differences

Realized 12-month changes in PCE inflation

Note: PCE indicates Personal Consumption Expenditures Price Index.
Source: U.S. Bureau of Economic Analysis and Haver Analytics.

Federal Reserve Bank of Chicago

95

Source: insert source

figure 14

Contribution of economic activity variables, 1985–2007 and 1985–2012 coefficients, levels model
label
A. Activity
0.012
0.006
0.000
−0.006
−0.012
1986

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

B. Natural rate
0.012
0.006
0
−0.006
−0.012
1986

C. Indicator
0.012
0.006
0
−0.006
−0.012
1986

D. Diffusion
0.012
0.006
0
−0.006
−0.012
1986

Based on coefficients estimated on 1985–2007 sample
Based on coefficients estimated on 1985–2012 sample

96

3Q/2013, Economic Perspectives

measures make at each point in time to the inflation
forecast.15 As was the case in the previous section, we
see that the economic activity measures aggregated
using the indicator model have almost no predictive
power; for this reason, it does not matter whether the
model is estimated with data up to 2007 (the red line)
or 2012 (the black line). The conclusions for the natural
rate and diffusion models (panels B and D, respectively)
are also similar to those of the previous section: Even
when we estimate inflation in levels, unemployment and
the four factors of the diffusion index lose a notable
fraction of their forecasting power when we include
data from 2008 to 2012 in the estimation. Only the
activity index model seems to perform better—while the
black line is still flatter than the red line, the difference
is now minor.
Figure 15 shows the contribution to the forecasted
inflation change coming from the current position
of inflation, that is, the value of − (1 − ω)(π12
t − π) in
equation 2, where π is the sample mean of inflation,
to which inflation is expected to revert in the long run.
When inflation reached a low of 1.2 percent in July
2009, this contribution was positive and pointed the
models toward a recovery in inflation; this force, which
was not present by construction when we estimated the
models in differences, gave the estimates based on
equation 2 a slight edge over those based on equation 1.
Nonetheless, the magnitude of the contribution in
figure 15 is much smaller than that in figure 14. With
the exception of the indicator model (panel C), economic
weakness remained the dominant force driving forecasts of inflation changes, with further disinflation
predicted throughout the period to 2012.
To complete our analysis of estimates based on
mean-reverting models of inflation, we perform the
analogous computation from table 1 in table 2. Here,
we look at the contributions that economic indicators
make to forecasted inflation changes based on data up
to 2012 versus data up to 2007. The shrinkage in the
estimated importance of activity measures is less pronounced than in table 1, confirming that our models
perform better when we allow for mean reversion in
inflation. Nonetheless, the ratios in table 2 remain largely
well below 1; so even accounting for mean reversion,
in the last five years inflation responded less to economic
weakness than the models would have predicted. The
natural rate model, based on unemployment, is subject
to the most dramatic revision. The indicator model
stands out as an exception; as noted earlier, even with
data up to 2007, its indicator variables as a group had
no predictive power for inflation.

Federal Reserve Bank of Chicago

Conclusion
We have shown that measures of economic activity and labor market conditions have not been helpful
in predicting the evolution of inflation since 2008.
This phenomenon is usually interpreted as a “flattening” of the Phillips curve, the relationship between
unemployment (or other measures of economic activity)
and inflation. A flattening of this curve would imply
that unemployment would have to change more than
in the past to have a detectable impact on inflation.
Our analysis was based on purely statistical models,
which cannot be used to analyze the consequences
of alternative monetary and fiscal policies. However,
when a flat Phillips curve is embedded in a full general
equilibrium model, such as that of Smets and Wouters
(2003), it implies that monetary policy can be most
effective at stabilizing output, with minimal consequences
for inflation, at least as long as interest rates do not
drop to the zero lower bound. The converse of this
observation is that a flat Phillips curve presents a difficult challenge for monetary policy should inflation
drift up from the central bank target, because it would
then take an extreme downturn to rein inflation in.
However, our results offer an alternative explanation.
Specifically, the degree by which the statistical relationship between economic activity and output has become
flatter—as well as the fact that models would often
predict not only the wrong magnitude of the response
of inflation, but also the wrong direction—may offer
support to the idea of a vertical Phillips curve, where
the determinants of (forecastable) inflation changes
are unrelated to economic activity, such as in the model
of Lucas (1972). This model would have diametrically
opposed implications for policy, suggesting that (the
systematic component of) monetary policy can be most
effective at controlling inflation, while having little or
no direct impact on measures of economic activity.
The policy implications of a situation in which a central
bank misperceives the policy-relevant trade-off between
inflation and unemployment have been studied by
Sargent (1999) and Cogley and Sargent (2005).
The two competing explanations for the behavior
of inflation in recent years also offer different assessments of how monetary policy has fared in its quest
to achieve maximum employment and stable prices.
Under the first explanation, inflation was bound to
remain more or less stable with little effort on the part
of monetary authorities. In normal circumstances,
monetary policy could have done more to stimulate
aggregate demand and overcome weakness in economic
activity, but recently it was hamstrung by the zero
bound on nominal interest rates, which forced the use

97

Source: insert source

figure 15

Contribution of inflation level to forecasted inflation changes, 1985–2007
and 1985–2012 coefficients, levels model
A. Activity
0.003
0.002
0.001
0
−0.001
−0.002
−0.003
−0.004
1986

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

’91

’96

2001

’06

’11

B. Natural rate
0.003
0.002
0.001
0
−0.001
−0.002
−0.003
−0.004
−0.005
1986

C. Indicator
0.003
0.002
0.001
0
−0.001
−0.002
−0.003
−0.004
1986

D. Diffusion
0.003
0.002
0.001
0
−0.001
−0.002
−0.003
−0.004
−0.005
1986

Based on coefficients estimated on 1985–2007 sample
Based on coefficients estimated on 1985–2012 sample
Note: PCE indicates Personal Consumption Expenditures Price Index.

98

3Q/2013, Economic Perspectives

			

Table 2

Contribution of economic activity to forecasts of 12-month and 24-month inflation changes
(coefficients estimated on the period to 2012 vs. the period to 2007, model in levels)
Post-1984
Horizon

CPI12

CPI24			

Model

Activity

Natural

Indicator

Diffusion

Activity

Natural

Indicator

Diffusion

Max
Median

0.86
0.86

0.80
0.53

0.74
1.23

0.59
0.60

0.89
0.89

0.56
0.54

1.98
1.21

0.56
0.57

Post-1984					
Horizon

PCE12

PCE24			

Model

Activity

Natural

Indicator

Diffusion

Activity

Natural

Indicator

Diffusion

Max
Median

0.87
0.87

0.24
0.24

1.62
1.17

0.53
0.48

1.03
1.03

0.58
0.30

1.53
1.56

0.47
0.43

All						
Horizon

CPI12

CPI24			

Model

Activity

Natural

Indicator

Diffusion

Activity

Natural

Indicator

Diffusion

Max
Median

0.85
0.85

0.78
0.63

0.62
1.05

0.51
0.57

0.97
0.97

0.69
0.44

0.72
0.93

0.49
0.51

All						
Horizon

PCE12

PCE24			

Model

Activity

Natural

Indicator

Diffusion

Activity

Natural

Indicator

Diffusion

Max
Median

0.70
0.58

0.69
0.69

0.77
0.72

0.59
0.61

0.75
0.63

0.87
0.69

0.86
0.78

0.61
0.60

Notes: Post-1984 refers to the sample from 1985 onwards. All refers to a sample that starts in 1969 for PCE (Personal Consumption Expenditures
Price Index) and 1979 for CPI (Consumer Price Index). Numbers smaller than one imply that the contribution shrank.

of alternative, less effective policy measures. If instead
the second interpretation of the data is correct, stable
inflation in the wake of economic turbulence was not
a given, but rather a successful outcome of monetary
policy that maintained control of the price level even
in the face of severe adverse shocks. This stands in
contrast with the experience of the 1970s, when severe

Federal Reserve Bank of Chicago

economic disturbances were accompanied by increasing bouts of inflation; by avoiding a repeat of that experience, monetary policy might have contributed to
mitigating uncertainty and lessening the impact of
other shocks that exacted their unavoidable toll on
economic activity.

99

NOTES
More recently, Stock and Watson (2010) have suggested a new unemployment-gap metric that could be useful in forecasting inflation—this
measure is the maximum between zero and the difference between the current unemployment level and the lowest unemployment observed
over the previous 11 quarters. As figure A1 (p. 101) in appendix 1 shows, the relationship between this metric and changes in inflation has
broken down in the past few years since Stock and Watson’s paper was published.

1

The difference between a full economic model and a purely statistical model is that the former should yield correct predictions even when
policymakers adopt new rules of behavior, while the latter only yields appropriate forecasts if policymakers react to new developments
following the same rules of conduct that they used in the past.

2

The PCE Price Index is published by the U.S. Bureau of Economic Analysis, whereas the CPI is published by the U.S. Bureau of Labor
Statistics.

3

We rely on data published as of June 13, 2013.

4

With the model in differences, a constant translates into a trend in inflation. This trend is relevant to account for the evolution of inflation
since 1984. However, it is unlikely that this (negative) trend would persist into the future, with current inflation hovering between 1 percent
and 2 percent. We thus experimented with removing the effect of the trend in evaluating the model forecasts for the Great Recession. This
change does not have a material effect on the conclusions that we draw.

5

For more information on the Chicago Fed National Activity Index, see www.chicagofed.org/webpages/publications/cfnai/index.cfm.

6

The aggregation is done by taking the principal component of the series.

7

Formally, this split is achieved by means of a band-pass filter, where we retain for forecasting purposes frequencies between two months
and 12 years.

8

9
As an example, unemployment in December 2008 was 7.3 percent. If we construct the trend including all the data up to 2012, we would
estimate the trend to be 7.3 percent, and we would thus conclude that December 2008 was not a period of high cyclical unemployment. This
is due to the fact that unemployment rose much higher in 2009 and stayed high for a protracted period of time. In contrast, if we only use data
up to December 2008, the trend measure is estimated at 6.4 percent, and cyclical unemployment appears elevated. Finally, the unemployment
series that we decompose into a trend and a cyclical component is itself subject to revisions over time.

See appendix 2 for the list of series.

10

The number of selected lags is as follows:

11

PCE
Sample period
		
Act
Act
Nat
Nat
Diff
Diff

Post-1984
Full
Post-1984
Full
Post-1984
Full

p* 12-mo

p* 24-mo

CPI
q* 12-mo

q* 24-mo

p* 12-mo

p* 24-mo

q* 12-mo

q* 24-mo

‘07

‘12

‘07

‘12

‘07

‘12

‘07

‘12

‘07

‘12

‘07

‘12

‘07

‘12

‘07

‘12

0
0
0
0
0
0

0
7
0
0
0
0

0
0
0
0
0
0

0
0
0
0
0
0

0
11
0
3
0
0

0
9
0
2
0
0

0
10
1
4
0
1

0
3
0
4
0
0

0
0
0
0
0
0

0
0
0
0
0
0

0
0
0
0
0
0

0
0
0
0
0
0

0
0
3
2
0
0

0
0
3
3
0
0

0
4
3
3
0
0

0
0
3
3
0
0

See, e.g., Stock and Watson (2007).

12

We choose this model because it has few coefficients to estimate; in particular, we impose p* = q* = 0, as chosen by the information
criterion for the full sample. With rolling five-year windows, estimates of models that feature more coefficients will become more and
more unreliable.

13

Of course, the differences would become more pronounced for forecasts of inflation over a longer time horizon.

14

Note that the contribution to the inflation forecast is the same as the contribution to the inflation forecast change, since the current level
of inflation from which the change occurs is known.

15

100

3Q/2013, Economic Perspectives

Appendix 1: Alternative unemployment gap

In their quest to find a robust relationship between
unemployment and expected inflation changes, Stock
and Watson (2010) have suggested a new unemployment-gap metric: the maximum between zero and the
difference between the current unemployment level
and the lowest unemployment has been over the previous 11 quarters. Inspired by their suggestion, we
changed the natural rate model to see whether this
alternative measure of cyclical unemployment, active
only during downturns, would help to recover a role
for unemployment in predicting inflation. Since our
model is based on monthly data, we change 11 quarters
to 35 months. Figure A1 presents our results.1 Stock
and Watson used data up to the second quarter of 2010.
Up to this point, their measure of unemployment is

far from a perfect predictor of inflation, but it forecasts
dips that are correctly associated with disinflation most
of the time. Unfortunately, the period right after their
model was designed yields very large forecast errors:
As of late 2010 and early 2011, unemployment was substantially above its level of three years earlier, forecasting further disinflation, whereas inflation in fact accelerated in late 2011 and in 2012. When estimated on data
from 1985 to 2012, even this new measure of cyclical
unemployment loses its predictive power for inflation.
It is worth noting that our model is simpler than Stock and Watson’s,
in which inflation is the sum of transitory and permanent components;
nonetheless, we expect that the observations included here would
also apply to their richer environment.

1

figure A1

Realized 12-month PCE inflation changes vs. forecast, 1985-2007 and 1985-2012 coefficients,
alternative unemployment gap
label

0.02

0.01

0.00

−0.01

−0.02
1986

’91

’96

2001

’06

’11

Realized 12-month changes in PCE inflation
12-month-ahead forecast based on coefficients estimated on 1969–2007 sample
12-month-ahead forecast based on coefficients estimated on 1985–2012 sample
Note: Our alternative unemployment gap uses the difference between the current unemployment level and the lowest unemployment
has been over the previous 35 months. PCE indicates Personal Consumption Expenditures Price Index.
Source: U.S. Bureau of Economic Analysis and Haver Analytics.

Federal Reserve Bank of Chicago

101

3Q/2013, Economic Perspectives

Mnemonic

Haver description

Haver database

Activity
Activity
Activity
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion

le
lrm25
a0m005
cbhm
cdbhm
cnbhm
csbhm
ypdhm
hsm
hst
hstmw
hstne
hsts
hstw
ip
ip51
ip511
ip512
ip521
ip53
ip531
ip532
ip54
ipb0
ipfp
ipmdg
ipmfg
ipmnd
iptp
iputl
laconsa
ladurga
lafirea
lagooda
lagovta
lamanua
laminga
lanagra
landura
lapriva
lawtrda + lartrda
laserpa
lainfoa + lapbsva + laeduha + laleiha + lasrvoa
lattula - lawtrda - lartrda
lena
lhelpr
lomanua

Civilian employment: Sixteen years & over: 16 yr + (SA, 000s)
Civilian unemployment rate: Men, 25–54 years (SA, %)
Average weekly initial claims unemployment insurance (SA, 000s)
Personal consumption expenditures (SAAR, chained 2000$bil.)
Personal consumption expenditures: Durable goods (SAAR, chained 2000$bil.)
Personal consumption expenditures: Nondurable goods (SAAR, chained 2000$bil.)
Personal consumption expenditures: Services (SAAR, chained 2000$bil.)
Real disposable personal income (SAAR, chained 2000$bil.)
Manufacturers’ shipments of mobile homes (SAAR, units in 000s)
Housing starts (SAAR, units in 000s)
Housing starts: Midwest (SAAR, units in 000s)
Housing starts: Northeast (SAAR, units in 000s)
Housing starts: South (SAAR, units in 000s)
Housing starts: West (SAAR, units in 000s)
Industrial Production Index (SA, 1997=100)
Industrial Production: Consumer goods (SA, 1997=100)
Industrial Production: Durable consumer goods (SA, 1997=100)
Industrial Production: Nondurable consumer goods (SA, 1997=100)
Industrial Production: Business equipment (SA, 1997=100)
Industrial Production: Materials (SA, 1997=100)
Industrial Production: Durable goods materials (SA, 1997=100)
Industrial Production: Nondurable goods materials (SA, 1997=100)
Industrial Production: Nonindustrial supplies (SA, 1997=100)
Industrial Production: Mining (SA, 1997=100)
Industrial Production: Final products (SA, 1997=100)
Industrial Production: Durable goods [NAICS] (SA, 1997=100)
Industrial Production: Manufacturing [SIC] (SA, 1997=100)
Industrial Production: Nondurable manufacturing (SA, 1997=100)
Industrial Production: Final products and nonindustrial supplies (SA, 1997=100)
Industrial Production: Electric and gas utilities (SA, 1997=100)
All employees: Construction (SA, 000s)
All employees: Durable goods manufacturing (SA, 000s)
All employees: Financial activities (SA, 000s)
All employees: Goods-producing industries (SA, 000s)
All employees: Government (SA, 000s)
All employees: Manufacturing (SA, 000s)
All employees: Mining (SA, 000s)
All employees: Total nonfarm (SA, 000s)
All employees: Nondurable goods manufacturing (SA, 000s)
All employees: Total private industries (SA, 000s)
All employees: Wholesale and Retail trade (SA, 000s)
All employees: Service-providing industries (SA, 000s)
All employees: Aggregate of categories
All employees: Aggregate of categories
Civilian employment: Nonagricultural Industries: 16yr + (SA, 000s)
Ratio: Help-wanted advertising in newspapers/Number unemployed (SA)
Average weekly hours: Overtime: Manufacturing (SA, Hrs)

usecon
usecon
bci
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon

Appendix 2: Monthly data, January 1969 – December 2012

102

Model

103

Mnemonic

Haver description

Haver database

Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion
Activity, diffusion, indicators
Activity, diffusion, indicators
Activity, diffusion
Activity, diffusion
Activity, indicators
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion

lrmanua
napmc
napmei
napmii
napmni
napmoi
rsdh
rsh, rsh2
rsnh
timdh, timdh2
timh, timh2
timnh, timnh2
tirh, tirh2
tith, tith2
tiwh, tiwh2
trmh, trmh2
trrh, trrh2
trth, trth2
trwmh, trwmh2
tsmdh, tsmdh2
tsmh, tsmh2
tsmnh, tsmnh2
tsth, tsth2
tswmdh
tswmh, tswmh2
tswmnh, tswmnh2
ypltpmh
cdvhm, cdvh
a0m007
a0m008
a0m027
hpt
cumfg
lhelp
lr
napmvdi
cexp
lu0
lu15
lu5
luad
lut15
lut27
faram
farat
farmsr
fm1

Average weekly hours: Manufacturing (SA, Hrs)
ISM Mfg: PMI Composite Index (SA, 50+ = Econ Expand)
ISM Mfg: Employment Index (SA, 50+ = Econ Expand)
ISM Mfg: Inventories Index (SA, 50+ = Econ Expand)
ISM Mfg: New Orders Index (SA, 50+ = Econ Expand)
ISM Mfg: Production Index (SA, 50+ = Econ Expand)
Real retail sales: Durable goods (SA, chained 2000$mil.)
Retail sales: Retail trade (SA, Spliced, chained 2000$mil.)
Real retail sales: Nondurable goods (SA, chained 2000$mil.)
Real inventories: Mfg: Durable goods industries (SA, EOP, spliced, chained 2000$mil.)
Real manufacturing & trade inventories: Mfg industries (SA, EOP, spliced, chained 2000$mil.)
Real mfg inventories: Nondurable goods industries (SA, EOP, spliced, chained 2000$mil.)
Real inventories: Retail trade industries (SA, EOP, spliced, chained 2000$mil.)
Real manufacturing & trade inventories: Industries (SA, EOP, spliced, chained 2000$mil.)
Real inventories: Merchant wholesale trade industries (SA, EOP, spliced, chained 2000$mil.)
Real inventories/sales ratio: Manufacturing industries (SA, spliced, chained 2000$)
Inventories/sales ratio: Retail trade industries (SA, spliced, chained 2000$)
Real manufacturing & trade: Inventories/sales ratio (SA, spliced, chained 2000$)
Inventories/sales ratio: Merchant wholesale trade industries(SA, spliced, chained 2000$)
Real sales: Mfg: Durable goods industries(SA, spliced, chained 2000$mil.)
Real sales: Manufacturing industries (SA, spliced, chained 2000$mil.)
Real sales: Mfg: Nondurable goods industries (SA, spliced, chained 2000$mil.)
Real manufacturing & trade sales: All industries (SA, spliced, chained 2000$mil.)
Real sales: Merchant wholesalers: Durable goods inds. (SA, spliced, chained 2000$mil.)
Real sales: Merchant wholesale trade industries (SA, spliced, chained 2000$mil.)
Real sales: merchant wholesale: Nondurable goods inds. (SA, spliced, chained 2000$mil.)
Real personal income less transfer payments (SAAR, chained 2000$bil.)
PCE: Durable goods: Motor vehicles and parts (SAAR, spliced and interpolated, chained 2000$mil.)
Manufacturers’ new orders: Durable goods (SA, chained 2000$mil.)
Manufacturers’ new orders: Consumer goods & materials (SA, 1982$mil.)
Manufacturers’ new orders: Nondefense capital goods (SA, 1982$mil.)
New private housing units authorized by building permit (SAAR, units in 000s)
Capacity utilization: Manufacturing [SIC] (SA, % of capacity)
Index of help-wanted advertising in newspapers (SA, 1987=100)
Civilian unemployment rate: 16yr + (SA, %)
ISM: Mfg: Vendor Deliveries Index (SA, 50+ = Econ Expand)
University of Michigan: Consumer expectations (NSA, 66Q1=100)
Civilians unemployed for less than 5 weeks (SA, 000s)
Civilians unemployed for 15–26 weeks (SA, 000s)
Civilians unemployed for 5–14 weeks (SA, 000s)
Average {Mean} duration of unemployment (SA, weeks)
Civilians unemployed for 15 weeks and over (SA, 000s)
Civilians unemployed for 27 weeks and over (SA, 000s)
Adjusted monetary base (SA, $mil.)
Adjusted reserves of depository institutions (SA, $mil.)
Adj. monetary base including deposits to satisfy clearing balance contracts (SA, $bil.)
Money stock: M1 (SA, $bil.)

usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usna
usna
usna
usna
usna
usna
usna
usna
usna
usna
usecon
usna
bci
bci
bci
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon

Appendix 2: Monthly data, January 1969 – December 2012 (continued)

Federal Reserve Bank of Chicago

Model

3Q/2013, Economic Perspectives

Mnemonic

Haver description

Haver database

Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion
Diffusion

fm2c
fm3
fxtwb
fxuk
faaa
fbaa
faaa - ffed
fbaa - ffed
sdy5comm
sp500
spe5comm
spny
spspi
ftbs3
ftbs6
ftbs3 - ffed
ftbs6 - ffed
fcm1
fcm5
fcm1 - ffed
fcm5 - ffed
fcm10 - ffed
sp1000
sp3100
pcua
pcucc
pcuccd
pcucs
pcum
pcu
pcuslf
pcuslm
pcusls
pcut
jcdm
jcm
jcnm
jcsm
leconsa
lemanua
a0m101
mom
mum
modgu
mudg
mong
fxjap
fxcan

Real money stock: M2 (SA, chained 2000$bil.)
Money stock: M3 (SA, $bil.)
Nominal broad trade-weighted exchange value of US$ (JAN 97=100)
Foreign exchange rate: United Kingdom (US$/Pound)
Moody’s seasoned Aaa corporate bond yield (% p.a.)
Moody’s seasoned Baa corporate bond yield (% p.a.)
Moody’s seasoned Aaa corporate bond yield – fed funds rate(% p.a.)
Moody’s seasoned Baa corporate bond yield – fed funds rate (% p.a.)
S&P: Composite 500, dividend yield (%)
Stock Price Index: Standard & Poor’s 500 Composite (1941–43=10)
S&P: 500 Composite, P/E ratio, 4-qtr trailing earnings
Stock Price Index: NYSE Composite (Avg, Dec. 31, 2002=5000)
Stock Price Index: Standard & Poor’s 400 Industrials (1941–43=10)
3-month Treasury bills, secondary market (% p.a.)
6-month Treasury bills, secondary market (% p.a.)
3-month Treasury bills – fed funds rate, (% p.a.)
6-month Treasury bills – fed funds rate (% p.a.)
1-year Treasury bill yield at constant maturity (% p.a.)
5-year Treasury note yield at constant maturity (% p.a.)
1-year Treasury bill yield at constant maturity – fed funds rate (% p.a.)
5-year Treasury note yield at constant maturity – fed funds rate (% p.a.)
10-year Treasury note yield at constant maturity – fed funds rate (% p.a.)
PPI: Crude materials for further processing (SA, 1982=100)
PPI: Finished consumer goods (SA, 1982=100)
CPI-U: Apparel (SA, 1982–84=100)
CPI-U: Commodities (SA, 1982–84=100)
CPI-U: Durables (SA, 1982–84=100)
CPI-U: Services (SA, 1982–84=100)
CPI-U: Medical care (SA, 1982–84=100)
CPI-U: All Items (SA, 1982–84=100)
CPI-U: All items less food (SA, 1982–84=100)
CPI-U: All items less medical care (SA, 1982–84=100)
CPI-U: All items less shelter (SA, 1982–84=100)
CPI-U: Transportation (SA, 1982–84=100)
PCE: Durable goods: Chain Price Index (SA, 2000=100)
PCE: Personal consumption expenditures: Chain Price Index (SA, 2000=100)
PCE: Nondurable goods: Chain Price Index (SA, 2000=100)
PCE: Services: Chain Price Index (SA, 2000=100)
Avg hourly earnings: Construction (SA, $/Hr)
Avg hourly earnings: Manufacturing (SA, $/Hr)
Commercial & industrial loans outstanding (EOP, SA, chained 2000$mil.)
Manufacturers’ New Orders (SA, Mil. $)
Manufacturers’ Unfilled Orders (EOP, SA, Mil. $)
Mfrs’ New Orders: Durable Goods Industries With Unfilled Orders (SA, Mil. $)
Mfrs’ Unfilled Orders: Durable Goods Industries (EOP, SA, Mil. $)
Mfrs’ New Orders: Nondurable Goods Industries (SA, Mil. $)
Foreign exchange rate: Japan (Yen/US$)
Foreign exchange rate: Canada (C$/US$)

usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usecon
usna
usna
usna
usna
usecon
usecon
bci
usecon
usecon
usecon
usecon
usecon
usecon
usecon

Appendix 2: Monthly data, January 1969 – December 2012 (continued)

104

Model

Mnemonic

Haver description

Diffusion
fxsw
Foreign exchange rate: Switzerland (Franc/US$)
Diffusion
fxger
Foreign exchange rate: Germany (D. Mark/US$)
Activity, diffusion
jfns, cpv, cpvr
Value of private construction put in place (SAAR, chained $mil.)
Activity, diffusion
gfnis, gfnisq, gsis, gsisq, cpg
Value of public construction put in place (SAAR, chained $mil.)
Diffusion, indicators
fm2
Money stock: M2 (SA, $bil.)
Diffusion, indicators
fcm10
10-year Treasury note yield at constant maturity (% p.a.)
Diffusion
ffed
Federal funds [effective] rate (% p.a.)
Diffusion, indicators
sp2000
PPI: Intermediate materials, supplies, and components (SA, 1982=100)
Diffusion, indicators
sp3000
PPI: Finished goods (SA, 1982=100)
Diffusion, indicators
napmpi
ISM: Mfg: Prices Index (NSA, 50+ = Econ Expand)
Indicators
zlead
Composite Index of 10 Leading Indicators (1996=100)
Indicators
jfns, cpv, cpvr, gfnis, gfnisq, gsis, gsisq, cpg
New construction put in place (SAAR, 2000$mil.)
Indicators
hn1us
New single-family houses sold: United States (SAAR, 000s)
Indicators
chm
Personal consumption expenditures (SAAR, chained 2000$mil.) (spliced from usna96 before 1990)
Indicators
fcm3 - fcm1
3-year/1-year T-bill spread
Indicators
fxtwm
Nominal trade-weighted exch value of US$/major currencies (MAR 73=100)
Indicators
pzgld
Cash prices: gold, Handy & Harman Base Price (avg, spliced, $/Troy oz)
Indicators
pzsil
Cash price: silver, troy oz, Handy & Harman Base Price (avg, $/troy oz)
Indicators
pzall
KR-CRB Spot Commodity Price Index: All commodities
Indicators
spwpc
SPOT COMMODITY PRICE - PLYWOOD, CROWS (PUIWMWPC_N.WT)
Indicators
pfall
KR-CRB Futures: All commodities (avg, 1967=100)
Indicators
p101
PPI: Iron and steel (NSA, 1982=100)
Indicators
ueg
CPI-U: Energy (SA, 1982–84=100)
Indicators
ffed - ffed{1}
Change in federal funds [effective] rate (% p.a.)
Natural rate
ra16
Unemployment gap constructed from 16+ unemployment rate (SA)
Prices
jcxfem
PCE less food and energy: Price Index (SA) (2005=100)
Prices
pculfer
CPI less food and energy: Price Index (SA) (Dec 1977 = 100)
			
		
Indicator model groups:
COMEX
http://www.wrenresearch.com.au/downloads/index.htm
1: Economic activity
FSC
http://www.webspace4me.net/~blhill2/data/commodities
2: Slackness measures
BCRB
http://economic-charts.com/em-cgi/data.exe/crb/crb01
3: Housing and building activity
FAME
Federal Reserve Bank of San Francisco website
4: Industrial prices
		
5: Financial markets
Source: Haver Analytics, FAME database.

Haver database
usecon
usecon
usna
usecon
usecon
usecon
usecon
usecon
usecon
usecon
bci
usecon, usna
usecon
usna
usecon
usecon
weekly
weekly
usecon
weekly
usecon
cpidata
usecon
empl
usna
usecon

Appendix 2: Monthly data, January 1969 – December 2012 (continued)

Federal Reserve Bank of Chicago

Model

105

references

Atkeson, Andrew, and Lee E. Ohanian, 2001,
“Are Phillips curves useful for forecasting inflation?,”
Quarterly Review, Federal Reserve Bank of Minneapolis,
Vol. 25, No. 1, Winter, pp. 2–11.
Ball, Laurence, and Sandeep Mazumder, 2011,
“Inflation dynamics and the Great Recession,” Brookings
Papers on Economic Activity, Spring, pp. 337–381.
Brave, Scott, and Jonas D. M. Fisher, 2004, “In search
of a robust inflation forecast,” Economic Perspectives,
Federal Reserve Bank of Chicago, Vol. 28, Fourth
Quarter, pp. 12–31, available at www.chicagofed.org/
digital_assets/publications/economic_perspectives/
2004/ep_4qtr2004_part2_Brave_Fisher.pdf.
Cogley, Timothy, and Thomas J. Sargent, 2005,
“The conquest of U.S. inflation: Learning and robustness to model uncertainty,” Review of Economic
Dynamics, Vol. 8, No. 2, pp. 528–563.
Del Negro, Marco, Marc P. Giannoni, and Frank
Schorfheide, 2013, “Inflation in the Great Recession
and new Keynesian models,” Federal Reserve Bank
of New York, staff report, No. 618, May.
Diron, Marie, and Benoît Mojon, 2008, “Are inflation
targets good inflation forecasts?,” Economic Perspectives, Federal Reserve Bank of Chicago, Vol. 32, Second
Quarter, pp. 33–45, available at www.chicagofed.org/
digital_assets/publications/economic_perspectives/2008/
ep_2qtr2008_part3_diron_mojon.pdf.
Hall, Robert E., 2011, “The long slump,” American
Economic Review, Vol. 101, No. 2, April, pp. 431–469.
Lucas, Robert E., Jr., 1972, “Expectations and the
neutrality of money,” Journal of Economic Theory,
Vol. 4, No. 2, April, pp. 103–124.

106

Sargent, Thomas J., 1999, The Conquest of American
Inflation, Princeton, NJ: Princeton University Press.
Simon, John, Troy Matheson, and Damiano Sandri,
2013, “The dog that didn’t bark: Has inflation been
muzzled or was it just sleeping?,” in World Economic
Outlook: Hopes, Realities, Risks, International Monetary
Fund, April, pp. 79–95, available at www.imf.org/
external/pubs/ft/weo/2013/01/.
Smets, Frank, and Raf Wouters, 2003, “An estimated
dynamic stochastic general equilibrium model of the euro
area,” Journal of the European Economic Association,
Vol. 1, No. 5, September, pp. 1123–1175.
Stock, James H., and Mark W. Watson, 2010,
“Modeling inflation after the crisis,” in Macroeconomic
Challenges: The Decade Ahead, proceedings of the
Economic Symposium Conference, Federal Reserve
Bank of Kansas City, pp. 173–220.
__________, 2007, “Why has U.S. inflation become
harder to forecast?,” Journal of Money, Credit and
Banking, Vol. 39, No. s1, February, pp. 3–33.
__________, 2003, “Forecasting output and inflation:
The role of asset prices,” Journal of Economic Literature,
Vol. 41, No. 3, September, pp. 788–829.
__________, 2002, “Macroeconomic forecasting using
diffusion indexes,” Journal of Business & Economic
Statistics, Vol. 20, No. 2, pp. 147–162.
__________, 1999, “Forecasting inflation,” Journal
of Monetary Economics, Vol. 44, No. 2, October,
pp. 293–335.

3Q/2013, Economic Perspectives

Clarifying liability for twenty-first-century payment fraud
Sandeep Dhameja, Katy Jacob, and Richard D. Porter

Introduction and summary
At present, it is difficult to identify clear-cut guidance
for preventing and mitigating fraud in retail payments
in the United States.1 Part of the difficulty stems from
the fact that the U.S. retail payment system has a decentralized governance structure. The Board of Governors
of the Federal Reserve System and the Consumer
Financial Protection Bureau (CFPB) play an important
role in developing and implementing guidance to curb
retail payment fraud in the nation. However, in very
large part, fraud prevention and mitigation are the primary responsibilities of the numerous entities running
the various electronic and paper-based payment schemes
across the country. These schemes include those for
payments made via the automated clearinghouse (ACH)
system, payment cards (credit, debit, and prepaid cards),
and imaged and paper checks. Federal, state, and local
law enforcement agencies investigate instances of fraud,
identity theft, and data breaches related to retail payments, but not pursuant to any established overarching policies or goals set by a central authority for all
retail payments. Payment transactions, whether conducted domestically or abroad, are at risk for fraud
orchestrated from anywhere in the world and, therefore,
might rightfully fall under the jurisdiction of foreign
authorities. Hence, international, federal, and state or
local agencies may be responsible for the regulation,
supervision, and investigation of retail payments, as
well as the enforcement of the laws and rules pertaining to retail payment fraud.
Establishing specific, overarching governance
objectives for retail payments is becoming increasingly
important in light of the growing complexity of the
U.S. retail payment system. Setting up such objectives
is becoming particularly vital as far as transaction security is concerned. Over the years, more and more nonbank firms (such as retailers and technology firms) have
entered the payments market, competing with banks,

Federal Reserve Bank of Chicago

which are regulated and supervised differently. Additionally, many seemingly simple payment transactions
nowadays actually represent the interests of as many
Sandeep Dhameja is a risk-management team leader in the
Supervision and Regulation Department at the Federal Reserve
Bank of Chicago. Katy Jacob is a payments information consultant
in the Payments Information and Outreach Office at the Federal
Reserve Bank of Minneapolis and was a business economist in the
Economic Research Department at the Federal Reserve Bank of
Chicago while writing this article. Richard D. Porter is a vice
president and senior policy advisor in the Economic Research
Department at the Federal Reserve Bank of Chicago. The authors
thank the following individuals for their comments on earlier drafts
of this article: Duncan Douglass, Alston & Bird; Jane Larimer,
NACHA; and David Walker, ECCHO. The authors also thank
the following individuals for their participation in a meeting to
develop the ideas for this article: Carol Coye Benson, Glenbrook
Partners; Peter Burns, Heartland Payment Systems; BC Krishna,
MineralTree; John Morton, Green Dot Corporation; and Paul
Tomasofsky, Secure Remote Payment Council.
© 2013 Federal Reserve Bank of Chicago
Economic Perspectives is published by the Economic Research
Department of the Federal Reserve Bank of Chicago. The views
expressed are the authors’ and do not necessarily reflect the views
of the Federal Reserve Bank of Chicago or the Federal Reserve
System.
Charles L. Evans, President; Daniel G. Sullivan, Executive Vice
President and Director of Research; Spencer Krane, Senior Vice
President and Economic Advisor; David Marshall, Senior Vice
President, financial markets group; Daniel Aaronson, Vice President,
microeconomic policy research; Jonas D. M. Fisher, Vice President,
macroeconomic policy research; Richard Heckinger, Vice President,
markets team; Anna L. Paulson, Vice President, finance team;
William A. Testa, Vice President, regional programs; Richard D.
Porter, Vice President and Economics Editor; Helen Koshy and
Han Y. Choi, Editors; Rita Molloy and Julia Baker, Production
Editors; Sheila A. Mangler, Editorial Assistant.
Economic Perspectives articles may be reproduced in whole or in
part, provided the articles are not reproduced or distributed for
commercial gain and provided the source is appropriately credited.
Prior written permission must be obtained for any other reproduction, distribution, republication, or creation of derivative works
of Economic Perspectives articles. To request permission, please
contact Helen Koshy, senior editor, at 312-322-5830 or email
Helen.Koshy@chi.frb.org.
ISSN 0164-0682

107

as a dozen parties.2 Given these two factors, the determination of who has responsibility or liability for
which specific payment-related activity can easily
become obscured.
Further, the United States lacks a uniform set
of consumer disclosures, error resolution techniques,
and liability allocation structures for retail payments.
Hence, determining who’s responsible or liable can
be quite difficult in instances of payment fraud. When
payment fraud occurs, liability must be clearly assigned
so that end-users of the payment system (such as consumers and merchants) are made whole and so that
their trust in the overall architecture and integrity of
the system is maintained. Processing retail payment
transactions is quite complex, often involving multiple points of access to the payment system, many of
which criminals can manipulate to commit fraud. It is
important to determine which party in the transaction
processing chain is responsible for handling fraud events,
and it is vital for the rights and responsibilities of all
the parties along the chain to be clearly defined. Ideally,
fraud events should be managed by the parties (both
banks and nonbanks) that are in the best position to stop
them from occurring or can best mitigate them when
they do occur. And, of course, the criminals directly
responsible for the fraud should be held liable whenever possible. Unfortunately, in most cases, perpetrators
are not found quickly, if at all, and it can be difficult to
bring charges against them. As a consequence, attention shifts to various legitimate participants involved
in carrying out the payment transaction in order to
determine fraud liability.
In this article, we explain the governance structure
of retail payments in the United States. We then provide
an overview of payment fraud. Following that, we
discuss in depth the liability frameworks for fraud involving specific payment methods (check, ACH, and
payment cards). Some of our analysis is derived from
extensive interviews with experts in the payments industry.3 Finally, we suggest a series of recommendations
that describe how the public sector might work together
with private organizations in the payments industry to
clarify fraud liability.
Governance structure of
U.S. retail payments
The United States currently has no overarching
regulatory body or industry association that oversees
all retail payments. When checks and paper currency
were the dominant methods of payment, the Federal
Reserve System played a central role in governing
retail payments. But today, following the rise of various electronic forms of payment, specific governance

108

objectives for the payment system as a whole are
largely undefined. While several federal agencies are
involved with retail payments in some way, acrossthe-board objectives governing these payments often
do not reach a high level of specificity. For example,
at this point, there is no government mandate to determine who would have primary responsibility for
defining and enforcing security measures for all U.S.
retail payments.
A variety of federal agencies—including the Federal
Reserve System,4 the CFPB, the U.S. Department of
Justice, the Federal Bureau of Investigation (FBI),
and the U.S. Secret Service—as well as state agencies
have some purview over payment policy and payment
fraud issues. Both banks and nonbank institutions act
as payment providers in the United States, and a variety
of U.S. laws and regulations apply to their activities.
For example, certain nonbanks in markets for consumer
financial products and services may be determined by
the CFPB to be “larger participants” and, therefore,
be subject to its direct supervision.5 Other nonbanks
operating under state money transmitter licenses are
subject to state agency supervision. There are also a
variety of state laws that address consumer rights in
instances of identity theft or data breaches.6
Still, by and large, the retail payments industry
in the United States is self-governing and balkanized.
Each payment scheme operates on a competitive platform with its own set of practices and procedures.7
Because there is no overarching regulatory body or
industry association responsible for all retail payments
in the United States, when payment system security
questions arise, industry players will consult payment
scheme owners, such as NACHA8 (which administrates
the ACH network), or other industry-sponsored groups,
such as the Accredited Standards Committee X9
Incorporated (ASC X9 Inc.), ECCHO (Electronic
Check Clearing House Organization), and the PCI
(Payment Card Industry) Security Standards Council
(see appendix 1 for details). All of these groups operate independently (although the public sector, including
the Federal Reserve System, is significantly involved
in many of them). So, when it comes to fraud and security
standards, the industry itself makes most of the rules,
but without the broad consensus that an overarching
organization from either the public sector or private
sector might achieve.
An overview of payment fraud
Payment fraud, which is manifested in a variety
of ways, can be broadly defined as any activity that uses
confidential personal (or financial) information for unlawful gain, including criminals initiating transactions

3Q/2013, Economic Perspectives

without the consent or authorization of the payer.
Specifically, such activities include counterfeiting,
deception, altering payment instruments, hacking,
and data interception. Payment fraud can happen at
any point along the transaction processing chain.
Over the years, the transaction processing chain has
become increasingly complex as new players (mostly
nonbank firms) have entered the payments market and
as new payment products and services have quickly
gained popularity; most transactions nowadays often
involve multiple parties, including third-party vendors
and processors. More specifically, new physical forms
to complete electronic payments have emerged and
gained traction in recent years—for instance, some
consumers can now use contactless cards (payment
cards that use chip technology to allow for tap-andgo payments) and mobile devices to complete their
transactions. Also, electronic payments can now be
made at many more venues—for example, nonbank
financial centers (including check cashers and retail
stores), vending machines, and taxis. Indeed, a rapidly
increasing number of payees are accepting electronic
forms of payment, and these payments are often facilitated by nonbank firms, many of which have no prior
experience in providing or securing payment services.
As emerging payment channels (such as online
and mobile payments) substitute more and more for
legacy payment methods (such as paper checks), financial institutions are naturally shifting the emphasis of
their fraud prevention and mitigation strategies to the
new channels. For example, in 2011, Aite Group researchers conducted interviews with financial institution officials and found that technology investments
for fraud prevention and mitigation were being shifted
toward business units for online and mobile payment
channels (see figure 1).
Moreover, as the new payment channels have
become more popular, the number of access points
along the payment chain have grown markedly, giving
fraudsters more opportunities to commit crimes and
increasing the security challenges for all legitimate
participants. Payment fraud is constantly evolving as
criminals discover new ways to thwart the efforts of
financial institutions and other interested parties to
protect transaction data. Indeed, the techniques employed by fraudsters are numerous and are adapted to
overcome new protection measures; we discuss some
of the techniques that pose threats to electronic payments in box 1.
Many of the access points exploited to commit
fraud are not controlled by the institutions (mostly
banks) that hold the underlying funds, even though
these institutions may be ultimately liable for the fraud
losses that occur. The majority of the current laws and

Federal Reserve Bank of Chicago

figure 1

Payment channel with highest priority for fraud
prevention technology investment
Online/mobile
25
Check
13

Debit
17
Commercial
online
41

Credit card
4

Notes: This figure is based on the Aite Group researchers’ interviews
with officials from 32 North American financial institutions over the
period August through October 2011. The pie chart slices represent
the percentages of financial institutions surveyed that cited the
particular channel as their highest priority for fraud prevention
technology investment.
Source: Aite Group.

regulations covering payment fraud refer to the institutions that guarantee or issue the funds—namely, banks.
Thus, the incentives to properly secure transactional
information for individual customers and nonbank
firms facilitating retail payments may be obscured.
In other words, given the liability frameworks at present,
individual customers and nonbanks are not always liable
for fraud occurring on their watch, so they may not
be taking adequate measures to reduce payment fraud.
Because payment practices are changing faster
than the laws and regulations that govern them, the
assignation of liability when fraud occurs is quite complicated in the current payments landscape. Collaboration within and among both banks and nonbank firms
is necessary for successful payment fraud management,
since security is so expensive to achieve and maintain.
In order to be effective, efforts to prevent and mitigate
payment fraud need to involve all parties “touching”
the payment transactions. Additionally, the incentives
of the parties to act optimally to ensure the security of
the transaction (data) must be properly aligned with
those of one other. As we will explain, the laws and
regulations for retail payments differ greatly depending on the type of payment used, the method of processing the payment, and other factors; therefore, it
is yet unclear if incentives for fraud prevention and
mitigation are adequate for all parties involved in
each transaction.

109

BOX 1

Threats to electronic payments
Here we discuss some of the threats to electronic
payments. More specifically, we explain some of the
techniques used to commit payment-related cybercrime, as well as cybercrime that indirectly affects
financial services.
Hacking
Hacking is accessing information assets without
proper authorization by thwarting security mechanisms.
Hacking is usually conducted remotely and anonymously. The most well-known hacking incidents of
late have involved the exploitation of default or easily
guessable credentials; the use of stolen login credentials; brute force (for example, attacks that systematically
try every possible combination of letters, numbers,
and symbols until the correct combination grants
access); “dictionary attacks,” or strategies involving
systematically entering every word in a dictionary as
a password to access password-protected servers or
encrypted information; and the exploitation of insufficient authentication protocols. Over the past few years,
two of the most prominent payment-related hacking
events occurred at Global Payments—an electronic
transaction processor used by Visa and MasterCard—
and at Citigroup.1 Additionally, two breaches occurred
in late 2012 and early 2013 (one at India-based card
processor ElectraCard Services), leading to $45 million
in stolen funds from automated teller machines (ATMs)
around the world; the breaches were made to raise
the balances and withdrawal limits on prepaid cards
used in the theft (Nair and Dye, 2013). Prior to all of
those events, the RBS WorldPay breach resulted in a
number of prepaid payroll cards being compromised
in 2008. These cards were used to obtain $9 million
in cash in one day from ATMs located in several
dozen cities around the world (Krebs, 2009a).
Malware
Of the 44 million records compromised through
the 621 confirmed data breaches in 2012, 40 percent
were due at least in part to malware, or malicious software (Verizon RISK Team, 2013, pp. 11, 29). Malware
is designed and used for the purpose of compromising or harming information assets without the owner’s
informed consent. Malware attacks are designed to run
covertly. Examples of malware are computer viruses,
Trojan horses, and spyware. Malware is no longer simply used to gain a point of entry for hacking; rather, it
also often serves as a means to remain in control after
gaining access to a computer system, especially for
financially motivated crimes. Pathways for malware
infection include the following: installation or injection

110

by remote attacker; targeted email with an infected
attachment; web-based automatically executed “driveby” download; and user-executed download (for example, from an advertisement on a legitimate website).
Once in the system, malware performs a variety
of harmful activities, each serving one or more of
three basic purposes: to enable or prolong access while
disguising its presence; to harvest data of interest; and
to further the attack in another manner. Increasing uses
of malware include the following: logging keystrokes
(and other user inputs); sending victims’ data to external
locations either in real time or in batches using encrypted channels of communications; and bypassing
normal authentication/security mechanisms to control systems remotely.
One quite complex form of malware-related cybercrime committed against financial firms has been
dubbed by some experts as “Operation High Roller.”
In this type of attack, large amounts of money are
siphoned from high-balance accounts with no human
action required. Servers are programmed to automate
the thefts through wire transactions from specialpurpose commercial and investment accounts. Specific
strategies using this form of attack have emerged in
the European Union (EU), Latin America, and the
United States; the attacks have been altered from focusing on the accounts of individual retail customers
to business accounts. Financial institutions of all sizes—
from the largest banks to the smallest credit unions—
have been targeted. Most malware attacks rely on
social engineering (that is, human manipulation of
people for them to break normal security procedures
or divulge confidential information), as well as on
remote technical manipulation, to succeed. However,
the Operation High Roller attacks are completely
automated from start to finish and are able to bypass
even multifactor authentication systems.2 Such
attacks were developed specifically to thwart bankfraud-detection standards (for example, by making
only one transaction per account and never exceeding the dollar transfer limits that trigger suspicion)
at even the most sophisticated and well-resourced
institutions (Marcus and Sherstobitoff, 2012).

Indirect effects of cybercrime
There are many examples of electronic malfeasance
that are not related to payments per se. They include
advanced malware such as Flame (a cyberespionage
program)3 or Stuxnet (a cyberweapon designed to
destroy other software and computer systems). Although
these two pieces of software may not be necessarily
linked directly to financial fraud, variants based on

3Q/2013, Economic Perspectives

BOX 1 (continued)

Threats to electronic payments
them and other advanced malware can unquestionably affect the integrity of retail payment systems.
Using these variants and other cyberweapons, organized
groups all over the globe can conduct cyberattacks
that affect payments, even if they are not necessarily
motivated solely by monetary gain.
For example, in September 2012, cyberattacks
on some of the largest banks challenged their computer defenses in the first documented large-scale
“distributed denial-of-service” (DDoS) attacks (Strohm
and Engleman, 2012). These attacks flooded bank
websites with Internet traffic, rendering them unreachable by their customers for various lengths of time.
Such attacks can have adverse effects on payments,
even if no payment-specific data are compromised

Who is liable for losses from
payment fraud?
Fraud reduces the efficiency of the payment system
because it degrades operational performance and increases costs—not only for the parties whose payments
are compromised but also for everyone participating
in the system.9 When executed successfully, payment
fraud can lead to adverse consequences for participants
at different points along the transaction processing chain.
For instance, when a criminal steals a payment card and
uses it (or its information) to purchase an item, the
legitimate cardholder’s liability for the fraudulent
transaction is limited by statute or regulation. However,
participants further down the payment chain—such as
the card-issuing bank or a merchant—are often likely
to incur losses for such fraudulent transactions.10
Table 1 outlines several different types of fraud,
as well as some potential strategies for preventing and
mitigating them. These strategies include know-yourcustomer (KYC) protocols, fraud reviews, anti-moneylaundering (AML) rules, the Bank Secrecy Act (BSA)11
and Office of Foreign Assets Control (OFAC)12 requirements, and suspicious activity reports (SARs), which
are made to the U.S. Department of the Treasury’s
Financial Crimes Enforcement Network (FinCEN).
These strategies can be used to attempt to prevent fraud
before it happens or to lessen the impacts of fraud when
it does occur, and they are primarily focused on or
applicable to regulated financial institutions (banks)
as opposed to nonbank participants in the payment chain.
This emphasis makes sense because, as we have mentioned before, the majority of the laws and regulations
covering payment fraud refer to the institutions that

Federal Reserve Bank of Chicago

or bank account funds are stolen, since consumers
and businesses are unable to access their accounts
online to pay bills or make purchases.
1
For more information on payment card data breaches, see
appendix 2. Also see Cheney et al. (2012).
2
Multifactor authentication is an approach to validating the
user by requiring the presentation of two or more authentication factors: a knowledge factor (something the user knows,
for example, a password or personal identification number),
a possession factor (something the user has, for example,
a payment card or mobile phone), and an inherence factor
(something the user is, for example, a user’s biometric
characteristic, such as a fingerprint or voiceprint).
3
Flame provides the attacker remote access to an infected computer with control of many of its functions, such as its microphone and webcam. For further details, see Zetter (2012).

guarantee or issue the funds—that is, banks. Moreover,
as we will see later, ultimate liability for making customers (individuals and businesses) whole when payment
fraud occurs often lies with these institutions as well.
The safeguards outlined in table 1 help financial
institutions, merchants, and others along the payment
chain manage their payment fraud risk. However, when
fraud does occur, liability must be assessed and losses
allocated. Ideally, the party with the most control over
fraud prevention and mitigation would also be the one
that bears the most liability and absorbs the highest loss.
However, we find that in reality, payment fraud liability
is much more complicated. A discussion of liability
issues for different types of payment fraud follows.
Check fraud liability
Most consumers and businesses are aware of
how check fraud has taken place historically. Forgery
of checks and “passing bad checks” are well-known
concepts. The 2013 AFP Payments Fraud and Control
Survey (which mostly reports on payment fraud for
corporations such as large merchants, as opposed to
financial institutions) finds that checks are the payment type most often targeted by fraudsters. Among
the surveyed firms, 87 percent of them experienced
attempted or actual check fraud in 2012 (compared with
27 percent that experienced ACH debit fraud and
29 percent that experienced corporate and commercial payment card fraud). Moreover, 69 percent of
the surveyed firms that suffered losses as result of
payment fraud stated that they did so primarily on
account of check fraud (Association for Financial
Professionals, 2013, pp. 5, 9).

111

					

Table 1

Types of fraud and related prevention and mitigation strategies
Type of fraud

Prevention and mitigation strategies

Automated clearinghouse (ACH) debit fraud:
Unauthorized ACH entries resulting in losses
to the receiving bank (that is, the receiving
depository financial institution, or RDFI) and/or
its corporate customers

• Protect privacy of customer demand deposit account (DDA) data
• Offer positive paya and debit blocksb
• Respond to unauthorized transactions in a timely matter

ACH debit fraud: Unauthorized ACH entries
•
resulting in losses to the originating bank		
(that is, originating depository financial institution,
•
or ODFI)
•

Perform due diligence on prospective ACH originator before allowing
ACH initiation
Perform risk-based review of originator’s authorization forms and processes
Monitor ACH returnc rates of originator and third party

Check fraud: Check kiting from accounts with
insufficient funds

• Monitor accounts for suspicious activity
• Clear items quickly or immediately

Check fraud: Counterfeit or unauthorized
remotely created checks (RCCs)d deposited

• Perform due diligence on all customers depositing RCCs

Check fraud: Dual presentment/deposit of a
remotely deposited check results in loss from
insufficient funds

•
•
•
•
		

Audit customers before opening DDAs
Train frontline staff to recognize suspicious activity
Monitor customer behavior and flag suspicious items
Perform manual review and delay posting on all suspected items above
a certain dollar threshold

Payment card fraud: Legitimate cards stolen
•
and used to make illegitimate transactions		
•
		

Monitor accounts for unusual activity and immediately contact cardholders
to verify transactions
Educate customers on their rights and responsibilities and emphasize
the importance of monitoring statements

Payment card fraud: Identity or card information
•
stolen and used to create counterfeit cards
•
		
•

Monitor accounts for suspicious activity
Monitor automated teller machines and encourage merchants to monitor
point-of-sale terminals for skimminge devices
Educate consumers on their rights and responsibilities

Wire transfer fraud: Information stolen and
used to initiate unauthorized wire transfers

Educate customers about phishingf and methods of data protection
Monitor online banking portals for unauthorized access
Establish and maintain processes, such as callbacks, to identify and
stop fraudulent transactions

•
•
•
		

ACH positive pay is a fraud detection service; it lets customers safeguard against fraudulent activity by filtering or blocking unauthorized ACH
transactions according to criteria set by the customers (usually firms).
b
Debit blocks refer to the practice of disallowing regular ACH debits without specific advance permission from the payer.
c
ACH returns are ACH debits returned to the ODFI (either unpaid or for a refund) by the RDFI for any reason (including insufficient funds, an
incorrect bank account number, and lack of authorization per the payer).
d
Remotely created checks are checks that do not bear the signature of a person on whose account the checks are drawn; instead of the
signature, RCCs bear the account holder’s printed or typed name or a statement of the account holder’s authorization of the checks; for more
details, see http://ithandbook.ffiec.gov/it-booklets/retail-payment-systems/payment-instruments,-clearing,-and-settlement/check-based-payments/
remotely‑created-checks.aspx.
e
A skimming device is one that is mounted to an automated teller machine or point-of-sale machine to copy encoded data from the magnetic
stripe on the back of a payment card; for more information on skimming, see www.spamlaws.com/online-credit-card-fraud.html.
f
A phishing attack uses randomly distributed emails to attempt to trick recipients into disclosing personal information, such as account numbers,
passwords, or Social Security numbers; for more information on phishing, see www.spamlaws.com/online-credit-card-fraud.html.
Notes: This table should not be interpreted as being a comprehensive list of the appropriate processes to prevent and mitigate various forms
of fraud but rather as a brief introduction to some of the important means that are currently in use. Some of the content in this table was adapted
from information from The Clearing House.
a

Undoubtedly, vigilance to prevent or mitigate check
fraud remains a high priority for overall fraud prevention because the stolen amounts are sizable. According
to the American Bankers Association’s 2011 Deposit
Account Fraud Survey, 73 percent of banks reported
that they suffered check fraud losses totaling approximately $893 million in 2010. However, attempted check
fraud against bank deposit accounts resulted in around

112

$11 billion in actual losses and expenses incurred
to avoid losses in 2010. That figure was just below
the $11.4 billion figure recorded for 2008.13 In the
Minneapolis Fed’s 2012 Payments Fraud Survey,
43 percent of its financial institution respondents that
faced attempted payment fraud in 2011 reported checks
among the top three payment types with the highest number of fraud attempts; the financial institutions surveyed

3Q/2013, Economic Perspectives

were mostly small banks, with 2011 revenues under
$50 million (Federal Reserve Bank of Minneapolis,
Payments Information and Outreach Office, 2012,
pp. 5, 9).
Thus, from these surveys, it is clear that checks
today remain vulnerable to fraud. However, the acceleration of clearing time as a result of Check 21 legislation,14 which facilitates check truncation (digital
conversion) and the processing of check information
electronically, has greatly reduced check exceptions
(that is, checks requiring special handling to be processed) and enabled institutions to remediate fraudulent transactions in an expedited fashion. According
to a recent Federal Reserve study, only 6 million imaged checks in 2009—about 0.04 percent of all imaged checks that year—were exceptions; poor image
quality and data mismatching were the main reasons
reported for the exceptions (Federal Reserve System,
2011, pp. 12–13). Also, only 2 percent of organizations
that converted checks electronically reported that the
check conversion service was used for fraud, according
to the Association for Financial Professionals (2012, p. 3).
While the check market has experienced a rapid
transformation from paper processing to electronic
processing, the underlying structure of the parties in
each transaction remains much the same: Each check
transaction includes a drawer (the person who writes
the check), the payee (the person to whom the check
is payable), the drawee (the bank that maintains the
funds on which the check is drawn), and the depository bank (the first bank to receive a check for collection). Check fraud is different from other payment
fraud because primary liability for check fraud is assigned to the party that pays, as opposed to the party
expecting or initiating the payment, unlike, for example, with payment card fraud. Generally speaking, in
the case of check fraud, consumers are not exempt
from liability; their accountability for check fraud is
in sharp contrast with their lack of liability for most
types of payment card fraud (on account of the “zero
liability” policies offered to them by card issuers).
The Uniform Commercial Code (UCC)15 assigns
liability for check fraud and defines responsibilities
for check issuers and paying banks under the term
“ordinary care” (that is, following reasonable prevailing commercial standards). UCC articles 3 and 4
were written to assign liability to the bank that should
have been able to prevent the check fraud at the lowest cost. In general, the UCC states that a drawee
bank is liable for fraud claims involving the drawer’s
signature on the face of a check and that a depository
bank is liable for fraud claims involving the payee’s
endorsement on the back of the check. Under sections

Federal Reserve Bank of Chicago

3-403(a) and 4-401(a) of UCC articles 3 and 4, respectively, a bank can charge items against a customer’s
account only if they are “properly payable” and the
check is signed by an authorized individual. However,
if a signature is forged, the customer may be liable
for fraud losses under a variety of exceptions, including the following: if the account holder fails to exercise ordinary care; if the customer fails to reconcile
statements within a reasonable time; if “comparative
fault” is found;16 or if the counterfeit is virtually
identical to the original. Under the law as it has been
revised over time, the burden of proof shifts back and
forth between parties that are claiming that fraud has
occurred. Further, the UCC does not impose specific
time frames for restoring disputed funds into a
customer’s account.
Because checks are processed in many different
ways, the assignation of liability has become more
complicated in recent years. The electronification of
check processing has altered the ways in which the
liability issues are considered, at least to some extent.
Check laws were written to cover paper instruments
and have not necessarily been updated to reflect the
digital reality of check processing today. Check 21
legislation freed financial institutions from some of
the provisions of the UCC governing check transactions. The diminished importance of the UCC contrasts with the increased significance of private rules
from industry bodies—such as check-image-exchange
rules from ECCHO. Together, the UCC, the Expedited
Funds Availability Act (EFAA), and the Federal
Reserve’s Regulation CC17 (which implements the
EFAA) provide legal authority for banks to exchange
images of paper checks and assign liability in cases
of check fraud, but the details for check image exchange are left to private agreements or clearinghouse rules. For example, banks that clear checks
through the Federal Reserve System are held liable for
check fraud under contracts with the Federal Reserve.
In recent years, private agreements among financial
institutions have taken on increased importance in ensuring that liability for check fraud is clearly assigned
in transactions involving check image exchanges.
It is important to point out that a substitute check
(a paper check converted into an electronic image and
reconverted into a paper check18) is governed by
Check 21 regulations. A check converted into an
ACH debit is governed by the Federal Reserve’s
Regulation E and NACHA’s operating rules.19 Court
cases involving fraudulent imaged checks are few,
but have resulted in rulings that make liability issues
more difficult to ascertain and settle than in the prior
paper check regime.20 Moreover, checks that are cleared

113

via the ACH network highlight the opportunity for
cross-channel fraud—where fraud takes place in one
part of the payment system but impacts multiple
channels (for more on cross-channel fraud, see box 2).
An imaged check transaction that occurs in the absence
of a contract outlining liability is not presently covered
by existing check law, leading to potential disputes if
fraud occurs. Private rules have attempted to correct
some of the problems associated with the absence
of laws covering such checks. For example, ECCHO
has developed rules that assign liability for altered
electronic images of checks.21
Remote deposit capture (RDC) further complicates the issue of check fraud because the banks processing the checks deposited via RDC can pass back
the liability to customers who deposit check images.
RDC refers to the ability to deposit a check without
having to physically send the paper check to a bank.
This process is usually done by scanning a digital
image of a check (or taking a photo of the check on
a smartphone using a bank-supplied application) and
electronically transmitting it to the bank. Banks are
more likely to offer this service to business customers,
but recently RDC has begun to be used by individual
customers as well. The incidence of check fraud committed via RDC may rise as this method of check depositing becomes more popular.
It should be noted that remotely created checks
(RCCs) also provide a fairly new opportunity for
criminals to commit fraud. An RCC, also called a demand draft, is defined as “a check that is not created
by the paying bank and that does not bear a signature
applied, or purported to be applied, by the person on
whose account the check is drawn.”22 In the absence
of a signature, the RCC includes a statement indicating
that the payer authorized the payment. Because RCCs
do not require a signature or any other documentation
to indicate authorization, fraudsters can attempt to steal
funds with unauthorized RCCs. Indeed, some instances
of abuse have already been found in the RCC market;
recently, the Federal Trade Commission (2013) issued
a rule to ban the acceptance of RCCs from telemarketers
as a way to combat fraud against consumers.
Additionally, the advent of RCCs has led some
criminals who might have focused on other areas of the
payment system (such as the ACH system) to turn their
focus back on the check realm. This has happened in
part because of the lack of clear-cut rules governing
RCCs, as they are not typical paper checks and liability
can be unclear under UCC rules as well as state laws.
Further, the Federal Reserve’s Regulation CC
stipulates that interbank warranties “shift liability for
the loss created by an unauthorized remotely created

114

BOX 2

Cross-channel fraud liability
Payment fraud does not always occur solely within a given payment silo. In other words, criminals
might use one payment channel to commit fraud
in a separate payment channel. When corporations
are the targets, cross-channel fraud often involves
corporate account takeover; for example, credentials are stolen from a merchant’s corporate bank
account after it has been hacked—that is, actual
demand deposit account information is breached—
and that information is used to initiate fraudulent
ACH or wire transactions. In cases of cross-channel
fraud against corporations, the assignation of liability can be quite convoluted. Corporate customers
often do not understand that Regulation E rules do
not apply to them, and the courts often determine
which party has ultimate responsibility.
Cases of fraud against consumers can involve
multiple payment channels as well. For example,
criminals might trick consumers into revealing
private account information and then use it with
remotely created checks, ACH debits, and payment
cards to siphon funds from their deposit accounts.
As another example, criminals could steal consumer credentials from the information available
on a check in order to establish a credit card in
someone else’s name. Although the check might
have been used to commit this fraud, this case
would not be considered check fraud, potentially
complicating liability assignation if the criminals
are not caught.
Finally, all parties that “touch” payment transactions must contend with the potential for internal
fraud—that is, fraud perpetrated by corporate and
financial institution employees who have access
to sensitive customer information. This form of
fraud can affect a variety of payment channels,
including check, ACH, and payment cards. The
assignation of fraud liability can be quite challenging
in such fraud cases—as the firms might be liable
for fraud committed by their employees in some
cases, while the employees themselves might face
criminal charges in others.

check to the depository bank” (Board of Governors of
the Federal Reserve System, 2005, p. 71220). As we
explained earlier, for traditional checks, a drawee bank
is liable for fraud claims that involve the drawer’s
signature on the face of a check and a depository bank
is liable for fraud claims that involve the payee’s endorsement on the back of the check. In contrast, for
RCCs, the depository bank is liable for the vast majority of fraud claims (because the drawer’s signature

3Q/2013, Economic Perspectives

is not part of the check clearing process). Thus, the
drawer’s and drawee’s incentives to reduce RCC fraud
may not be correctly aligned.
ACH fraud liability
Automated clearinghouse transactions are electronic
payments routed from the demand deposit account of
a consumer, business, or government payer to that of
a payee. In the case of an ACH debit, a payee initiates
a debit transaction from the payer’s bank account, with
the funds being moved into the payee’s account; this
activity is usually done with the express permission of
the payer. Examples of ACH debits include consumer
payments on insurance premiums and mortgage
loans, as well as other types of bill payments. In the
case of an ACH credit, the payer initiates a credit
transaction that shifts funds to the payee’s account.
Examples include direct deposits of payrolls and payments to contractors and vendors. ACH fraud events
can occur in either credit or debit transactions.
The 2013 AFP Payments Fraud and Control Survey
finds that 27 percent of its respondents experienced
attempted or actual fraud via ACH debits in 2012 and
8 percent experienced fraud activity in ACH credits
(Association for Financial Professionals, 2013, p. 5);
only 16 percent of the respondents with payment fraud
losses reported that ACH fraud accounted for their
greatest financial loss due to fraud.23 Additionally, in
the Minneapolis Fed’s 2012 Payments Fraud Survey,
16 percent of the financial institution respondents that
faced attempted payment fraud in 2011 reported ACH
debits among the top three payment types with the highest number of fraud attempts, while only 2 percent
reported ACH credits among them (Federal Reserve
Bank of Minneapolis, Payments Information and
Outreach Office, 2012, p. 9).
New payment schemes, such as PayPal, rely on
either the ACH system or payment card infrastructure;
so, fraud events that occur through these alternative
payment schemes might be captured in ACH fraud
statistics as well. There is also the growing issue of
corporate account takeover of businesses and nonprofits—which is a form of identity theft wherein
criminals use malware to gain access to a party’s
online credentials and initiate fraudulent activity.24
Criminals may create transactions that resemble a
corporate customer’s regular ACH (or wire) transactions—for example, for payroll disbursements—as a
way to siphon funds. Losses from corporate account
takeover grew to $4.9 billion in 2012, according to
one estimate; that number represents a 69 percent
increase over the previous year.25
According to NACHA’s operating rules (and
some of our interviewees), the originating depository

Federal Reserve Bank of Chicago

financial institution (ODFI) involved in an ACH transaction is responsible for that transaction and must perform
due diligence on the third parties involved in that transaction.26 So, according to the ACH network rules, the
bank that sent out the payment (the originating bank)
has liability for any fraud that may occur in that ACH
transaction. Under the NACHA rules, the ACH network
has grown while reducing fraud. NACHA reports that
the volume processed by ACH operators rose from just
below 15 billion transactions in 2008 to a little over
16 billion transactions in 2011—a gain of 7.5 percent;
the total volume of unauthorized ACH returns27 dropped
22 percent during that same time period.28 ACH fraud
occurs typically because of slow account reconciliation
or ACH return, lack of ACH debit blocks (or filters),
or misuse or nonuse of ACH positive pay by a firm.29
As we mentioned earlier, according to the Association
for Financial Professionals (2013, p. 5), fraud is more
common for ACH debits than ACH credits.
One complicating factor with ACH fraud is that
the Federal Reserve’s Regulation E does not apply
to business customers for ACH transactions; it only
covers individual consumers for such transactions.
Therefore, UCC article 4A and contract law ultimately
determine fraud liability in many corporate fraud cases
involving the ACH network. UCC article 4A relies on
a “commercially reasonable” security procedures standard when it comes to fraud liability issues related to
ACH transactions. The Federal Financial Institutions
Examination Council (FFIEC)30 has issued guidance
to banks on how to determine what is commercially
reasonable, and case law often determines fraud liability
based on contracts between banks and customers related
to these types of transactions.
For ACH debit fraud, the financial institution that
promises that the payment is authorized (that is, the
originating depository financial institution with respect to
the debit entry) assumes liability for the payment, under
ACH rules. The monetary loss is usually shifted contractually from the financial institution to the merchant or
biller that actually was responsible for obtaining the
payment authorization from the payer.
ACH credit fraud—while less common than ACH
debit fraud—remains a concern. ACH credit fraud
became an issue in 2009, with the advent of corporate
account takeover. UCC article 4A covers fraudulent
ACH credit transactions, and contractual agreements
and case law determine liability for this type of ACH
fraud. While banks have relied on private agreements
(assuming they would suffice), divergent court rulings
regarding liability for losses due to ACH credit fraud
have caused banks to reconsider their strategies to
prevent this form of fraud and mitigate losses from it.

115

Thus far, banks have been found liable for losses
due to corporate account takeover more often than their
corporate customers. For example, in 2009, a construction company called PATCO Construction Inc. lost more
than $270,000 through corporate account takeover, and
in 2011 a Maine district court ruled that PATCO was
liable for the loss. However, that decision was reversed
by the U.S. Court of Appeals for the First Circuit in 2012,
putting the onus on Ocean Bank, where PATCO held
its account. By contrast, in 2013, a federal court in
Missouri ruled against Choice Escrow and Land Title,
stating that it was liable for $440,000 lost through corporate account takeover. The ruling stated that the company’s bank, BancorpSouth Bank, had asked the firm
on two occasions to initiate “dual control,” a security
mechanism requiring two authorized employees to sign
off on certain transactions, but the company refused.
This ruling implies that corporations can be held liable
for payment fraud resulting from corporate account
takeover if appropriate measures to avoid fraud are not
taken. That is, when the corporate customer is found
to have rejected commercially reasonable security
measures, it may incur ultimate liability (Lemos, 2013).
That said, according to industry sources we interviewed directly, banks might still choose to settle in
cases involving corporate account takeover, even if they
did not have any explicit liability because fraud litigation is so expensive and reputational risk is so high for
banks. Large banks have more resources than their small
counterparts to develop extensive internal controls
and hire law firms to develop private contracts with
corporate customers so that fraud litigation might be
avoided. Moreover, small financial institutions often
don’t have enough staff in their risk-management areas,
and these functions are, therefore, outsourced (though
the liability, of course, remains with the banks).
Lastly, consumer ACH transactions are governed
by the Federal Reserve’s Regulation E and NACHA’s
operating rules. According to Regulation E, the consumer
is not liable for an unauthorized ACH (debit) transaction unless the consumer fails to dispute it within
60 days of the financial institution’s transmittal of the
statement showing the bogus transaction. Under the
NACHA rules, if a consumer disputes an ACH transaction within 60 days of the settlement date, the receiving
depository financial institution must recredit the consumer and may return the transaction to the ODFI.31
Even though Regulation E and NACHA rules start
the clock at different times (the statement transmittal
date versus the settlement date), both indicate that the
consumer will not be liable for an unauthorized transaction if that consumer disputes the transaction within

116

a reasonable time frame, according to the experts we
interviewed for this article.
Payment card fraud liability
Payment cards come in three forms: credit cards;
debit cards—which are tied to a demand deposit account;
and prepaid cards—which are anonymous or linked to a
specific named individual and which are available for
general use (for example, those branded with a card
network logo, such as Visa’s) or tied to a closed system
(for example, retailer-specific gift cards). Payment cards
are susceptible to a variety of fraud attacks. The 2013
AFP Payments Fraud and Control Survey finds that
29 percent of surveyed firms experienced attempted
or actual fraud on corporate or commercial cards in
2012 (Association for Financial Professionals, 2013,
p. 5). However, surveys that focus specifically on financial institutions have found higher instances of
payment card fraud than those that focus on corporate
customers. For instance, in the Minneapolis Fed’s 2012
Payments Fraud Survey, 79 percent of its financial
institution respondents that faced attempted payment
fraud in 2011 reported signature-based debit cards among
the top three payment types with the highest number
of fraud attempts (the highest share for any payment
type). Also, 36 percent of these financial institution
respondents reported debit cards authorized with a
personal identification number (PIN) among the top
three payment types (less than half of the share reporting
signature-based debit cards), and 18 percent reported
credit cards among them (Federal Reserve Bank of
Minneapolis, Payments Information and Outreach
Office, 2012, p. 9).
Payment card fraud occurs when a card is lost or
stolen and then used to make unauthorized purchases;
criminals can also commit payment card fraud by accessing card and personal credentials to make such purchases
without stealing the physical card itself. One well-known
type of payment card fraud is the data breach, or theft of
personal and account information that can be used to
make fraudulent transactions (Cheney et al., 2012).
Some of the techniques, such as hacking and deploying malware, that are used to carry out data breaches
are described in further detail in box 1 (pp. 110 –111).32
We discuss several specific data breaches that affected
payment cards in appendix 2.
Payment card transactions vary by type of card
(credit, debit, or prepaid card), but they can also vary by
form factor (for example, plastic card versus mobile
device). Another key distinction among payment card
transactions is whether the card is present or not at
the transaction. Debit and prepaid cards often include

3Q/2013, Economic Perspectives

the option of using either a signature or a PIN for authentication, and credit cards in the United States (which
mostly use magnetic stripe technology at present) will
soon carry authentication options beyond the signature
as a result of the impending implementation of chipbased cards.33
Despite these differences among payment card
transactions, fraud liability remains relatively constant
across card-based transactions from a legal perspective.
Fraud liability most often lies with the card issuer. While
an issuer might technically be liable, a merchant might
still end up paying a significant share of the loss from
payment card fraud because of the liability the merchant
carries under the private contract with the issuer.
(Merchants agree to such contracts, though they often
argue that they have no control over the authentication
process at the point of sale.) That said, card issuers face
incremental unplanned losses due to fraud events, even
if the private contracts state that the merchants will
ultimately assume liability.
Moreover, there might be multiple merchants
involved in any given payment card fraud event; for
example, if a data breach occurs at a merchant location
but card information is used to make fraudulent purchases at another merchant, there are no chargeback
rights for the merchant where the card was actually used.
Our interviewees suggest that often, card issuers choose
to absorb the fraud losses and quickly make the consumer whole because it is quite time-consuming and
expensive to shift liability. Much of that shifting happens
on a case-by-case basis through negotiations; some
card issuers, such as small banks and credit unions,
have few resources with which to deal with these
extensive negotiations.
According to Douglass (2009), both public laws
and private card network rules protect cardholders from
liability for fraud losses associated with credit and debit
card transactions. Both the laws and rules reallocate
liability for such losses to other parties involved in the
transactions. The Truth in Lending Act (TILA), which
is implemented by the Federal Reserve’s Regulation Z,34
and the Electronic Fund Transfer Act (EFTA), which is
implemented by the Federal Reserve’s Regulation E,35
protect consumers from bearing the brunt of fraud losses
in connection with credit cards and debit cards, respectively. Under TILA and Regulation Z, the credit card
holder’s fraud liability is capped at $50 for all unauthorized transactions. The credit card holder has no liability
after the card issuer has been alerted to the loss or theft of
the credit card. The EFTA and Regulation E place a
floating cap on a debit card holder’s fraud liability based
on when the card issuer is notified of the loss or theft
of the debit card. Both Regulation Z and Regulation E

Federal Reserve Bank of Chicago

offer meaningful liability protection, even when consumers fail to report cards lost or stolen.36
Fraud liability for prepaid cards varies depending
on the specific features of the cards. Most reloadable
prepaid cards linked to specific named individuals offer
some Regulation E consumer protection, although not
all of them do; and the law does not require that they do
except for payroll cards. The status quo might change: In
2012, the CFPB issued an advance notice of proposed
rulemaking on the subject of extending Regulation E
coverage to general-purpose reloadable prepaid cards.37
Prepaid gift cards are not subject to the consumer liability rights and protections afforded by Regulation E,
and issuers of prepaid gift cards generally do not afford
fraud liability protection to prepaid gift card holders.
However, these cards are not reloadable, are usually
anonymous, and do not function as bank account substitutes in most cases. According to payment industry
experts we interviewed, in the case of network-branded
reloadable prepaid cards, such as Visa-branded ones,
fraud loss is still borne by the bank that issues the cards
as a matter of contract (that is, the card network rules
require that the card issuer protect holders of reloadable prepaid cards linked to specific named individuals
from liability for unauthorized transactions, and the
contracts further detail the specifics of who will make
the customers whole after fraud occurs). According to
our interviewees, many prepaid card issuers rely on
third-party processors and program managers to handle
the operational aspects of their card-issuing programs.
Such card issuers often use liability-shifting language
and associated indemnity clauses in contracts with these
third parties to protect themselves from fraud losses.
Liability for payment card fraud losses is generally determined for merchants and financial institutions
through payment card network rules. These rules technically bind only the card networks’ member institutions—
that is, card-issuing banks and card-acquiring banks,
or acquirers (which convert payment card receipts
into bank deposits for merchants). Acquirers generally
pass on their liability to their merchants in accordance
with private contract agreements. Rules may vary for
chargebacks; but in general, for card-present transactions, issuers bear liability for unauthorized transactions,
while for card-not-present (CNP) transactions, acquirers
(ultimately, merchants) bear liability for unauthorized
transactions (Levitin, 2010).
Douglass (2009) argues that such disproportionate liability for card issuers and merchants may generate risks that might otherwise be easily reduced or
avoided: Given the minimal liability consumers face
for payment card fraud, they may not exercise the
same degree of care in protecting against payment

117

card fraud that they would if they were held liable for
lost funds (for example, as they are with their own cash).
However, increasing consumer liability for payment
card fraud may undermine confidence in the card networks and result in reduced transaction volumes, making
it an unlikely option for improving efficiency in the
overall payment system. That said, increasing merchants’
liability for card-present transactions and card issuers’
liability for card-not-present transactions may be viable
solutions to reduce payment card fraud.
Levitin (2010) argues that raising the card issuers’
liability for CNP transactions would reduce fraud at the
least cost; however, Levitin does not argue for changes
to loss allocation for fraudulent card-present transactions,
since his analysis finds that the private card-present
rules seem sensible for the most part. Levitin notes that
card issuers have been historically reluctant to assume
fraud risk for CNP transactions, which were first allowed
at the request of merchants in the 1970s; merchants
concluded that the gains from CNP transactions outweighed the fraud risk they faced, so they agreed to
assume liability for fraudulent mail and telephone orders.
Levitin contends that the current CNP liability rules
do not account for the dramatically changed circumstances—namely, the widespread occurrence of CNP
Internet transactions. Merchants require whatever information the card networks or issuers require, but
merchants still have little ability to verify this information or prevent online CNP fraud on their own.
However, card issuers’ ability to prevent CNP fraud
has improved because their ability to verify card transaction information has changed so markedly. For the
verification process, card issuers can require the cardholder to transmit additional information that is more
difficult for fraudsters to come by with only the physical
card (such as the cardholder’s zip code or telephone
number). Moreover, issuers can now use statistical fraud
prevention tools, referred to as neural networks, which
can identify anomalies in particular consumers’ spending behavior, based on transaction histories, geography,
merchant type, and other factors. The neural networks’
speed enables issuers to halt suspicious transactions
at the stage of authorization. Given these advances
are already in place for issuers, Levitin concludes that
issuers can prevent more fraud at the least cost in CNP
transactions and therefore should bear more of the
liability for fraud committed in such transactions;
increasing issuers’ liability for CNP fraud may lead
to even greater security measures being put in place.
Additionally, he states that because e-commerce is so
well established, the card issuers would not abandon
the payments market even if they were required to bear
more of the costs for unauthorized CNP transactions.

118

As things stand today, merchants face tough choices
related to collecting additional authentication information for CNP transactions. As we stated before, merchants
ultimately bear fraud risk for most CNP transactions
at present. Hence, merchants must make calculated
decisions in balancing the inconvenience of asking
their customers for additional information with the
added protection that may result from sending that
information to issuers for verification.
Existing laws fairly clearly assign primary liability
for payment card fraud affecting consumers: In the
majority of cases, the card issuer generally must absorb
this liability from its consumer cardholders. However,
as payment card transactions have become more complex (with multiple parties now commonly involved
in these transactions), liability has more often been
determined through private contracts. This state of
affairs means that liability allocation is determined
on a case-by-case basis. That said, the majority of industry experts interviewed for this article contended
that contracts generally allocate payment card fraud
liability more equitably than the law, which tends to
be focused on negating consumer liability.
The role of the public sector
Undoubtedly, some level of fraud is inevitable in
the retail payment system. In an environment where
payment methods are constantly evolving, some level
of fraud is a cost of bringing innovations to market and
of doing business in general. While striving to achieve
efficiency, payment system operators and users must
balance the costs of preventing and mitigating fraud
against the costs of fraud, including, but not limited
to, the actual monetary loss.38 Ideally, this balancing
will take into account the risk individual participants
in the payment system may create as well as their own
capability to reduce that risk. If payment system participants are able to easily reallocate their losses to other
parties (via private contract, for example), these participants might have a disincentive to implement the most
effective fraud-reducing strategies. Further, to lessen
the overall impact of fraud events on consumers and
businesses, penalties for engaging in risky behavior
must be adequate. Enforcement of the penalties must
be robust enough to create an environment where all
actors will behave in ways that lead to the lowest level
of acceptable fraud risk.
While fighting fraud on several fronts, the public
sector has played a vital role in establishing the rights
and responsibilities of payment system participants as
they pertain to fraud. Next, we provide recommendations for how the public sector can continue to do this
in the rapidly changing payments environment of the

3Q/2013, Economic Perspectives

twenty-first century. The recommendations that follow
are far from being comprehensive. They contain examples of how the public sector might use its unique position and influence to help improve our understanding
of the payment fraud problem (including the liability issues) and bring about product and regulatory innovations that address it; the ultimate goal of such public
sector contributions would be to help better align
the incentives for all payment system participants
to reduce fraud.
Research and education
Today, most data on payment fraud are collected
and analyzed by private firms with specific research
outcomes in mind. Therefore, it is difficult to obtain
objective and accurate publicly available data on payment fraud. Surveys done by organizations such as the
Association for Financial Professionals have focused on
subcategories of payment system participants (merchants
and small financial institutions, for example) and have
sometimes had small sample sizes because of resource
constraints. More-objective research measuring payment
fraud across a wider range of participants or, ideally,
the entire U.S. payment system is needed, and this research needs to be disclosed to the public. In the UK,
for example, the national government regularly collects
payment fraud data and calculates cost estimates for
fraud, eventually disclosing this information to the
public; some argue that this information from the British
government provides incentives to UK payment system
participants to communicate with each other and prevent
future fraud. If all participants in the U.S. payment system
had information that explained the nature and scope
of the payment fraud problem (that is, its size, cost,
and other features), this information could help align
their incentives to reduce fraud. Moreover, Moore
(2010, p. 108) notes that when regulators lack information about the possible harm, (ex ante) safety regulation
to address a problem such as payment fraud does not
work that well.39 The kind of research that we are recommending here would provide the information necessary to make regulation more effective.
Given this recommended goal, what types of specific data should be collected? Data on fraud incidence
for different payment methods (that is, for all types of
payment cards, checks, ACH debits and credits, and
wire transfers) at both the bank and end-user levels are
not readily available to the public; thus, reliable estimates
of fraud costs to all payment system participants for
these channels are scarce. The Board of Governors of
the Federal Reserve System, a combination of Federal
Reserve Banks, or another public entity could collect
such data for objective research. The aim would be to

Federal Reserve Bank of Chicago

understand the volume (incidents and dollar amounts)
of fraud for different channels and to get a better sense
of total fraud costs (including prevention and investment costs, not just losses). Gaining such insights on
specific channels would help better align all parties’
incentives to behave optimally to reduce fraud in those
channels—and across the payment system as a whole
(as participants shift over to channels deemed safer or
as each channel’s security is improved). As Moore (2010)
implies, if we do not know the true cost of fraud, it is
difficult to suggest changes to the current liability structures. Some progress has been made in this direction—
for instance, the forthcoming 2013 Federal Reserve
Payments Study will include questions about payment
fraud, which should yield valuable information.40
Another obstacle in combating payment fraud is
the lack of education on liability issues for consumers
and corporate customers. This complication is especially important for the check market, where consumers
might be liable for losses due to fraud. Promotion of
account alert services to consumers could help stem
fraud in the retail payment market. In the corporate space,
federal regulators of banks could contribute to customer
education by promoting programs such as positive pay
and negative pay. Banks use positive pay programs to
match the checks that companies issue with those presented for payment.41 Negative pay (also called reverse
positive pay) requires the check issuer to monitor its
account and notify the bank when it declines to pay
a check.
One problem that arises out of the variety of rules
and contracts that govern payment fraud liability is that
depository institutions might not understand the extent
of their liability in a number of scenarios. Bank examiners could routinely ask bank representatives if they
understand liability assignation as a part of the examination process. This is especially beneficial in the check
space because liability rules were written for paper
instruments, although almost all checks are now processed electronically. Bank representatives sometimes
express confusion over fraud liability because of this
change to the product. For example, liability for fraud
committed through an imaged check transaction is not
presently covered by existing check law, so confusion
about liability may arise if such fraud occurs; in other
words, check law is silent on liability in this scenario,
so a private contract outlining liability would be needed
to bring more clarity to the situation.
In a 2011 supplement to 2005 guidance on authentication in a web-based banking environment,42 the FFIEC
outlines the responsibility of banks to educate small
business customers about Regulation E liability rules.
This guidance includes “an explanation of protections

119

provided, and not provided, to account holders relative
to electronic funds transfers under Regulation E, and a
related explanation of the applicability of Regulation E
to the types of accounts with Internet access” (Federal
Financial Institutions Examination Council, 2011, p. 7).
Judging from recent incidents of corporate account
takeover and other similar fraud events, we note that
small business customers are still sometimes unaware
that they are not protected from payment fraud losses
under Regulation E—which covers retail customers, not
corporate customers. Bank examiners need to ensure
that banks are providing appropriate customer education, per FFIEC guidelines. As we indicated earlier,
assigning liability for losses due to fraud can be quite
challenging in cases involving corporate account takeover; case law does not clearly indicate where liability
lies, as the courts have ruled in favor of banks in some
cases and corporate customers in others.
Product and service development
Check fraud involving paper checks persists; however, an alternative payment method that includes the
attributes of the check (such as ubiquity, remittance information, and compatibility with corporate accounting
systems) is presently absent. Thus, the public sector
could become more active in developing and promoting
an electronic payment order (EPO) product—that is,
an entirely digital check.43 The introduction and widespread use of an EPO would enhance check processing
in several ways. Currently, check processing is almost
exclusively electronic, but the front-end process remains
rooted in paper of some sort. Because there is no paper
check to image, exception handling could be greatly
reduced with EPOs. Additional security features, including digital records, electronic signatures, and biometric
authentication, could be used with EPOs, significantly
enhancing security protocols over what is being used
in today’s paper check world. At the same time, current
check controls, such as positive pay, could continue.
Because the paper portion of the check would be
eliminated, there would be extensive cost savings by
switching to an EPO platform.
Besides assisting in the development of an EPO,
the public sector could also help develop a unified,
nonproprietary directory of consumer and business
account information—which would facilitate the move
to different types of electronic payments. For example,
establishing this directory would make it possible to
create a ubiquitous immediate funds transfer (IFT) system
in the United States. IFT is a convenient, certain, secure,
and low-cost means of electronically transferring money
between bank accounts with no or minimal delay in
the receivers’ receipt and use of funds.44 Its widespread

120

availability in the United States could provide benefits to many payment system participants beyond the
speed by which the transactions would be settled. Because paper payment instruments are generally more
costly and more susceptible to fraud than their electronic counterparts, an IFT alternative could lead to significant reductions in payment-processing-related
costs and fraud overall. Additionally, many businesses,
especially small firms, continue to rely on paper checks
to make and receive payments because of the detailed
account information collected via checks. Establishing
a central directory would remove the need for small
firms to rely on paper checks to get such information
and store it for future use (thereby reducing the number of repositories of sensitive information). A central
directory of account information could also facilitate
the ubiquitous routing of ACH credits (which have no
return risk, unlike ACH debits). Reducing check reliance and enhancing ACH credit routing would lead to
more-efficient electronic business-to-business payments.
Moreover, a central directory would reduce the potential
for individual error in providing, receiving, or storing
sensitive information. Such a directory would enable
any individual to make a payment to another person
or entity without needing to know or store the other
party’s account information, which would potentially
make the transaction faster and safer than it would be
otherwise. The public sector could make a large positive
impact by helping the payments industry to develop
a unified, nonproprietary directory for multiple payment
channels, but it would also need to help secure it adequately as it could become a target for fraudsters.
Facilitating rules, regulations, and
standards development
As payment innovations, such as online and mobile
banking, have emerged and become popular, the public
sector has facilitated the development of rules, regulations, and standards for payment system participants
to combat fraud in these new channels. We explain
recent examples of the public sector’s involvement in
bringing about regulatory innovations that match payment innovations. Then, we make recommendations
for the public sector to get involved further to help
establish new and improved rules, regulations, and
standards for twenty-first-century payments.
The FFIEC’s 2005 guidance and 2011 supplement,
which we touched on before, are key public sector
contributions to improving payment security standards.
In 2005, the FFIEC issued guidance for financial institutions. Overall, the guidance recommends that financial institutions conduct risk-based assessments,
evaluate customer awareness programs, and develop

3Q/2013, Economic Perspectives

security measures to reliably authenticate customers remotely accessing online financial services. The guidance
specifically recommends the use of authentication
methods that depend on more than one factor—that is,
two or more of what a user knows, has, or is (as explained
in note 2 of box 1, p. 111)—to determine the user’s
identity; the FFIEC deemed single-factor authentication
(for example, the lone requirement of a password) to
be “inadequate for high-risk transactions involving
access to customer information or the movement of
funds to other parties” (Federal Financial Institutions
Examination Council, 2005, pp. 1–2). On June 22, 2011,
the FFIEC published additional guidance recommending the use of “complex device identification” instead
of “simple device identification.” As described by the
FFIEC, complex device identification employs methods
that do not easily permit the fraudster to impersonate
the legitimate customer. In the 2011 supplement, the
FFIEC explains this identification method uses “onetime cookies” (small information-gathering files, loaded
onto the user’s personal computer by the bank, that expire if removed from that particular computer) to create
a customer’s electronic “fingerprint.” This digital fingerprint is based on a number of characteristics—such
as personal computer configuration, Internet protocol
address, and geolocation. In contrast, the type of cookie
used for simple device identification could be moved to
a fraudster’s computer, permitting the criminal to impersonate a legitimate account holder. So, the FFIEC
recommended this change (Federal Financial Institutions Examination Council, 2011, p. 6).
Along the lines of what the FFIEC has done, other
public sector entities could help shape payment security
standards to help reduce fraud. For instance, there are
current systems in place to validate that a person is real
and an account is real, but no effective, ubiquitous solutions that tie the two types of authentication together.
Just as the public sector might serve as a catalyst for
creating an account directory system that would facilitate the creation of an IFT system, it could play a role
in promoting products or rules that could marry the
two types of authentication. At present, ASC X9 Inc.
is the main industry body pushing for more-robust
authentication standards. While bank regulators and
other public sector entities themselves should promote
universal standards that will provide continuity across
the payments landscape, they can also encourage such
private sector efforts that share similar objectives.
Further, to reduce confusion over liability issues,
public sector bodies should update regulations governing payments to reflect the current state of the market.
For example, the Board of Governors of the Federal
Reserve System (2011b) proposed amendments to

Federal Reserve Bank of Chicago

Regulation CC that would “apply Regulation CC’s
collection and return provisions, including warranties,
to electronic check images that meet certain requirements.” Currently, some electronic check transactions
are not clearly covered under the law, as explained in
our overview of check fraud liability; this leads to
confusion over liability issues in certain cases.45
Finally, as the regulatory environment continues
to evolve, public sector agencies are likely to pay even
greater attention to consumer protection, competition,
and criminal issues related to payment fraud. Increased
cooperation with legal authorities that specialize in contract law may be beneficial in facilitating the development of rules, regulations, and standards that clarify
fraud liability. As payment fraud becomes more international in nature, the U.S. public sector will need to
engage in cross-border cooperation with regulatory
and policing bodies not only to enforce existing laws
and rules but also to improve upon them.
Conclusion
The U.S. retail payment system has a decentralized
governance structure. Further, the United States currently
lacks a uniform set of consumer disclosures, error
resolution techniques, and liability allocation structures
for retail payments. Indeed, we document that fraud
liability for retail payments in the United States is
determined through a piecemeal set of laws, regulations,
and private contracts, largely formed in the past for
various reasons but operating in the present often under vastly different circumstances. The lack of both
a cohesive governance structure and uniform set of
rules for all payment types is even reflected within
specific industry players; indeed, firms often strategize
about security and fraud liability issues with respect
to business silos or product lines instead of their entire businesses. Furthermore, research and policy discussions are rarely about the payments industry as a
cohesive entity, but instead tend to focus on certain
industry segments.
Although many consumers or business customers
seek to make their payments in the most convenient
and efficient manner, they might not be aware of the
vast differences of their rights and responsibilities
among the various payment methods. The complexity
of these various rights and responsibilities may be
further compounded by the fact that certain payment
types are converging (for example, hybrid payment
cards access both prepaid funds and a line of credit).
So, in today’s market, the separation of laws and regulations by payment type might not make as much
sense as it did in the past.

121

This state of affairs has led to confusion and inefficiencies in the marketplace. Some legacy payment
methods, such as checks, continue to operate under laws
that have not been fully updated to reflect the digital
reality of those payment methods today. Other methods,
such as payment cards, are subject not only to new
regulations that might alter security incentives but also
to new delivery channels (such as card-not-present
transactions via mobile devices) that alter liability
structures for fraud. Moreover, as criminals begin to
use methods such as account takeover to steal funds
from firms and individuals, participants using payment
channels such as the ACH system have experienced
uncertainty because case law has thus far determined
liability in contradictory ways. Some payment methods
protect consumers from liability almost entirely,
affecting their sense of having “skin in the game” in
regard to fraud prevention. Even in cases where liability
is very clearly defined, losses might be reallocated
through private contracts, leading to disincentives for
firms to implement the most effective fraud-reduction
strategies. Together, these observations highlight the
need for a more cohesive approach to preventing and
mitigating payment fraud; channel-specific or casespecific approaches are not sufficient.

Even without the legal and regulatory harmonization that would bring clarity to issues surrounding
payment fraud liability, a variety of steps can be taken
to reduce confusion over such issues and help align
all payment system participants’ incentives to reduce
fraud. Currently, individual firms and payment associations have been managing these complex issues
surrounding payment fraud through a variety of
means, including self-governance, private agreements, standards creation, and the development of
best practices. In conjunction with those efforts, the
public sector—which develops, implements, and enforces the laws and regulations concerning payment
fraud liability—can play a more prominent role in
managing payment fraud than it has in the recent past.
Effective public sector efforts can include measuring
fraud across the entire U.S. retail payment system;
educating banks, businesses, and consumers about
payment fraud; working with the industry to develop
products and services, such as an EPO and a directory
of consumer and business account information; and
facilitating the development of rules, regulations, and
standards that are more in step with the rapidly
changing payments marketplace.

NOTES
By retail payments, we generally mean small-value payments
(such as those made in the goods and services market)—as opposed
to large-value payments (such as those made via systemically important payment systems, including transactions in the interbank
money market).

1

2
For instance, in the United States, a card-based payment transaction
involves some or all of the following parties: a cardholder; a merchant or biller; a card issuer, or simply an issuer; a card-acquiring
bank, or an acquirer (which converts payment card receipts into
bank deposits for merchants); an electronic switch (which routes
transaction information among banks participating in a payment
network); a payment network; one or more processors; a telecommunications company; and other third parties.

The interview subjects, who represent a wide range of industry
players, are anonymous. The interviews were conducted during
the first and second quarters of 2013.

3

4

At the Federal Reserve Bank of Chicago’s Payments Conference
held in October 2012, Cleveland Fed President Sandra Pianalto
articulated the Federal Reserve System’s new multiyear direction
with regard to payment policy; Pianalto (2012) stressed the need to
ensure “the speed, efficiency, certainty, security, fraud resistance,
and market responsiveness of the U.S. payments system.” Following
this announcement, the Federal Reserve moved forward with its new
payment policy agenda. In September 2013, the Federal Reserve
issued a public consultation paper requesting comments on making
improvements to the payment system; areas of focus include standards development, the exploration of a real-time payments system,
the conversion of paper payments to electronic payments, and payments security; see Federal Reserve Banks (2013).

122

The CFPB has supervisory authority (for the purposes of ensuring
compliance with many federal consumer protection statutes) over
nonbanks of all sizes in the residential mortgage, private education
lending, and payday lending markets. Additionally, the CFPB may,
by rule, define a set of nonbanks that it determines are “larger participants” in markets for consumer financial products and services
and establish supervisory authority over these firms. For further
details, see Consumer Financial Protection Bureau (2012).

5

For additional details, see Keitel (2008).

6

7

For example, in the private sector, five payment card networks—
American Express, Discover Financial Services, JCB (Japan Credit
Bureau) International, MasterCard Worldwide, and Visa Inc.—
initially established individual data security standards for payment
system participants. About seven years ago, these networks joined
forces to create a unified set of standards—the Payment Card Industry
Data Security Standard (PCI DSS or, more simply, PCI)—to better
secure payment card systems, and they founded the PCI Security
Standards Council. See also appendix 1.

8
NACHA was previously known as the National Automated Clearing
House Association.

In economic terms, fraud, like pollution, creates externalities. If
fraud is largely absent, one can operate more freely with less caution.
However, when fraud is rampant, one must operate much more
vigilantly (a relatively more expensive course of action).

9

The actual allocation of losses will depend on the circumstances
of the transaction and payment card network rules.

10

3Q/2013, Economic Perspectives

The Bank Secrecy Act is formally known as the Currency and
Foreign Transactions Reporting Act of 1970. For more details about
this law concerning the detection and prevention of money laundering,
see www.fincen.gov/statutes_regs/bsa/.

11

12
For more details on OFAC, see www.treasury.gov/about/
organizational-structure/offices/Pages/Office-of-Foreign-AssetsControl.aspx.
13
See American Bankers Association (2011) and www.stopcheckfraud.
com/statistics.html.

For more details on the Check Clearing for the 21st Century Act
(Check 21), which was enacted in 2003, see www.federalreserve.
gov/paymentsystems/regcc-faq-check21.htm.
14

15

The text of the UCC is available at www.law.cornell.edu/ucc.

The concept of comparative fault—as discussed in sections 3-406(b)
and 4-406(e) of UCC articles 3 and 4, respectively—can shift liability
to the check issuer, or drawer. If both the bank and account holder
have failed to exercise ordinary care, they both can be liable for
losses based on their respective determined fault for the fraud event.
Banks do not have to physically verify each check.

16

Regulation CC (12 CFR 229), along with its recent amendments
and compliance guide, is available at www.federalreserve.gov/
bankinforeg/reglisting.htm#CC.
17

For more information on the substitute check, see www.federalreserve.
gov/pubs/check21/consumer_guide.htm#whatis.

18

Regulation E (12 CFR 205), along with its recent amendments
and compliance guide, is available at www.federalreserve.gov/
bankinforeg/reglisting.htm#E. The NACHA operating rules are
available by free membership at www.achrulesonline.org.
19

20
See, for example, 2010 and 2011 correspondence from The Clearing
House deputy general counsel to the Board of Governors of the
Federal Reserve System, available at www.theclearinghouse.org/
index.html?f=072995.

According to ECCHO rules (as of November 2012), specifically,
section XIX(P)(3), “as between two or more Members that are parties
to a Claim, it shall be presumed for all purposes related to the Claim
that the Related Physical Check or Electronic Image was altered with
respect to the dollar amount or payee, unless the Member against
which the Claim is brought proves by a preponderance of the evidence
that the Related Physical Check or Electronic Image is not altered,
such as evidence that the Related Physical Check is a counterfeit/
fraudulent item or that the Related Physical Check is as issued by
the drawer.” This and other ECCHO rules are available via free
membership at https://www.eccho.org/cc/index.php?p_sector=cc
_rules&p_matter=cc_login_rules.
21

See §229.2 of Regulation CC, available at www.ecfr.gov/cgi-bin/
text-idx?c=ecfr&sid=635f26c4af3e2fe4327fd25ef4cb5638&tpl=/
ecfrbrowse/Title12/12cfr229_main_02.tpl.
22

Authors’ calculations based on data from Association for
Financial Professionals (2013, p. 9).
23

For more information on corporate account takeover, see Castell
(2013). Also, NACHA has developed a Corporate Account Takeover
Resource Center, whose details are available at https://www.nacha.org/
CorporateAccountTakeoverResourceCenter.
24

Javelin Strategy & Research (2013, p. 32). This report provides
estimates on the impacts of account takeover; 36 percent of account
takeovers impacted credit card accounts, and 33 percent impacted
25

Federal Reserve Bank of Chicago

checking and savings accounts (Javelin Strategy & Research, 2013,
p. 35).
See the NACHA operating rules, available by free membership at
www.achrulesonline.org.

26

ACH returns are ACH debits returned to the originating depository
financial institution (either unpaid or for a refund) by the receiving
depository financial institution for any reason, including insufficient
funds, an incorrect bank account number, and lack of authorization
per the payer. The last reason may be due to fraudulent activity.

27

28

NACHA—The Electronic Payments Association (2012, p. 1).

ACH debit blocks refer to the practice of disallowing regular
ACH debits without specific advance permission from the payer.
ACH positive pay is a fraud detection service; it lets customers
safeguard against fraudulent activity by filtering or blocking unauthorized ACH transactions according to criteria set by the customers.

29

For more information on this interagency body, see www.ffiec.
gov/about.htm.

30

See the section on the liability of the consumer for unauthorized
transfers (§205.6) in Regulation E, available at www.ecfr.gov/
cgi-bin/text-idx?c=ecfr&sid=635f26c4af3e2fe4327fd25ef4cb5638&
tpl=/ecfrbrowse/Title12/12cfr205_main_02.tpl. And see the
NACHA operating rules, available by free membership at
www.achrulesonline.org.

31

Hacking and deploying malware are among the most common
techniques used for data breaches (Verizon RISK Team, 2013,
pp. 6, 25–26).

32

The EMV (Europay, MasterCard, and Visa) standard—which enables the interoperation of chip-based payment cards—will soon be
in use in the United States; for more information on the EMV standard, see www.emvco.com. However, the advent of EMV, which
many argue provides more-secure payments than the magnetic
stripe system, will not mean that magnetic stripe payment cards
will immediately disappear from the marketplace. Analysts expect
both types of cards to coexist for some time. Moreover, there are
very promising technologies by which security can be significantly
enhanced for magnetic stripe cards, but they have not been able to
achieve sufficient market penetration to reach critical mass thus far.

33

Regulation Z (12 CFR 226), along with its recent amendments
and compliance guide, is available at www.federalreserve.gov/
bankinforeg/reglisting.htm#Z.

34

See the section on the liability of the consumer for unauthorized
transfers (§205.6) in Regulation E, available at www.ecfr.gov/cgi-bin/
text-idx?c=ecfr&sid=635f26c4af3e2fe4327fd25ef4cb5638&tpl=/
ecfrbrowse/Title12/12cfr205_main_02.tpl.

35

Card networks often reinforce consumer protections by requiring
card issuers to offer zero liability protection to their consumer holders
of credit cards and debit cards (as well as general-purpose reloadable
prepaid cards linked to specific named individuals). However, consumers must operate within certain guidelines, prescribed by the
payment card networks, to avail themselves of zero liability protection (for example, they must exercise reasonable care in protecting
against unauthorized transactions and must report unauthorized
transactions in a timely manner).
If a credit card is lost or stolen and used fraudulently, the maximum consumer liability for fraudulent charges is $50. In most cases,
even the $50 is absorbed by the card issuer because of prevailing
zero liability policies. If the consumer reports the loss or theft of
his credit card before it’s used, he is not held liable for any loss.
Also, if the credit card itself is not stolen but account information

36

123

is illegally obtained, the consumer is generally protected from liability.
The consumer is slightly more liable for debit card fraud under the
law, although the rules vary based on the situation (and, as with credit
cards, payment card networks’ zero liability policies require the card
issuer to absorb this liability in many circumstances). If the consumer
loses his debit card or it has been stolen, he must report the loss within
two business days in order for the loss limit to remain $50 under
Regulation E; otherwise, he might be liable for up to $500. Finally,
if notification of the lost or stolen debit card is not given by the
consumer to the issuer within 60 days after receiving a statement
showing unauthorized withdrawals, the consumer could be liable
for all losses occurring after that 60-day period.
For details, see http://files.consumerfinance.gov/f/201205_cfpb_
GPRcards_ANPR.pdf.
37

The costs of fraud include nonmonetary costs to consumers—for
example, the opportunity cost of time spent to verify payment card
transactions and replace compromised cards or to monitor and confirm the validity of credit accounts opened in the victim’s name after identity theft has occurred.
38

Moore (2010, pp. 107–108) discusses the conundrum of ex ante
safety regulation versus ex post liability regulation. He notes that
the Gramm–Leach–Bliley Act obliges banks to protect the security
and confidentiality of customer information. An alternative to this
proactive ex ante regulation would be to assign ex post liability for
39

fraud to the responsible party. Some legal experts have examined the
trade-offs between the ex ante regulatory regime and ex post liability
regime and find that the best results are achieved when both are used
simultaneously. But ex ante regulation is not very effective without
reliable, accurate research explaining the true nature and scope of
the problem (for example, payment fraud).
Specifically, this upcoming 2013 study—which will be the fifth in
a series of triennial studies conducted by the Federal Reserve System
to explore the payments landscape of the United States—asks for
information on the number and value of unauthorized check payments,
ACH credits and debits, debit and prepaid card transactions, credit
card transactions, and ATM cash withdrawals. For further details
on the planned study, see www.frbservices.org/fedfocus/
archive_perspective/perspective_0313_01.html.

40

41

For details, see www.positivepay.net.

See Federal Financial Institutions Examination Council (2005, 2011).

42

43

For details on this EPO product, see Jacob et al. (2009).

44

For more on IFT, see Jacob and Wells (2011).

The proposed changes to Regulation CC are in Board of Governors
of the Federal Reserve System (2011a).

45

Appendix 1: Key payments industry organizations

In this appendix, we describe some of the key payments
industry organizations that help establish standards for
retail payments in the United States.

Accredited Standards Committee X9
Incorporated
The Accredited Standards Committee X9 Incorporated (ASC X9 Inc.) establishes, maintains, develops, and
promotes standards for the financial services industry. It
is an organization accredited by the American National
Standards Institute (ANSI). Some of ASC X9’s projects
involve developing e-commerce standards, such as better
online security. Membership is open to all U.S. companies
and organizations in the financial services industry.
ASC X9 Inc. is composed of its board of directors
and four subcommittees of experts in the financial services
industry. The four subcommittees are X9AB (payments),
X9C (corporate banking), X9D (securities), and X9F
(data and information security). Within the subcommittees,
working groups are organized on an as-needed basis. Any
member with category A membership (ASC X9’s top
membership level) is on ASC X9’s board of directors and
has the ability to participate on all subcommittees and
working groups. Such members are also allowed all voting
privileges on international standards (via an ANSIaccredited U.S. Technical Advisory Group) and ASC X9
policy. For further information, go to www.x9.org.

124

ECCHO
ECCHO (Electronic Check Clearing House Organization) is a not-for-profit national clearinghouse that is
owned by its more than 3,000 member financial institutions.
Membership is open to all financial institutions, and there
are membership classes to serve institutions of all sizes.
Created to use electronics to enhance the check payment
system, ECCHO is the national provider of private sector
image-exchange rules. There is no law governing the
exchange of check images (only the legal recognition of
substitute checks and their legal equivalency to original
checks are provided by Check 21 legislation); hence,
ECCHO’s clearinghouse rules provide a common, multilateral agreement among its members in order to address
this deficiency in check law.
Changes to ECCHO rules are approved by its board
of directors. The changes are based on recommendations
from its operations committee, which includes members
and representatives from community banks, credit unions,
large banks, processors, settlement providers, and sponsoring organizations. For further information, go to
www.eccho.org.

NACHA
NACHA (formerly the National Automated Clearing
House Association) is a not-for-profit organization that
manages the development, administration, and governance
of the ACH network. Primary functions include rulemaking
for the ACH network, facilitating the development of new

3Q/2013, Economic Perspectives

payment applications, identifying and implementing
risk-management initiatives, and responding to regulatory
and government relations issues. NACHA represents
over 10,000 financial institutions via regional payments
associations and direct membership.
The NACHA operating rules provide the legal foundation for the exchange of ACH payments. Proposals to
create and develop rules are presented by NACHA members or key parties (for example, the U.S. Department of
the Treasury). The proposals are reviewed by the Rules
& Operations Committee. If the proposals are accepted,
the committee assigns a Standing Rules Group to them
for further development. NACHA’s voting members are the
ultimate decision-makers for changes to the operating rules.
For further information, go to https://www.nacha.org.

PCI Security Standards Council
The PCI (Payment Card Industry) Security Standards
Council was formed in 2006 by five global card networks—
American Express, Discover Financial Services, JCB
(Japan Credit Bureau) International, MasterCard Worldwide,
and Visa Inc. The five founding global payment brands
have agreed to incorporate the Payment Card Industry
Data Security Standard (PCI DSS or, more simply, PCI)

as the technical requirements for their respective data
security compliance programs.
All five card networks, as well as strategic members,
share equally in the council’s governance, have equal
input into the council, and share responsibility for carrying out the council’s work. Other industry stakeholders
are encouraged to join the council (as strategic or affiliate
members and participating organizations) and review
proposed additions or modifications to the standards.
The PCI Security Standards Council’s board of advisors
is composed of representatives of participating organizations. This cross-industry board is chartered to ensure that
all voices are heard in the ongoing development of the
security standards; this board has global representation
from across the payment chain (including merchants,
financial institutions, and processors).
Participating organizations are eligible to nominate
candidates for the board of advisors and then vote for them.
Enforcement of compliance with the PCI DSS and
determination of any noncompliance penalties are carried
out by the individual card networks and not by the
council. For further information, go to https://www.
pcisecuritystandards.org/index.php.

Appendix 2: Examples of data breaches affecting payment cards

In 2012, there were 621 confirmed data breaches, resulting
in 44 million compromised records (Verizon RISK Team,
2013, p. 11). The majority of the data breach attacks
were made by agents outside of the firms compromised
(92 percent); they took advantage of firms’ security vulnerabilities to access their systems and information assets
(Verizon RISK Team, 2013, p. 19). According to the
U.S. Software Protection Initiative (SPI), a security vulnerability is defined as the combination of a system flaw
(or susceptibility), an attacker’s access to the flaw, and
an attacker’s capability to exploit the flaw.1 In 2012, two
of the most common methods that attackers used to exploit such flaws and steal vast amounts of personal and
account information were hacking and deploying malware,
which were involved in 52 percent and 40 percent of
data breaches, respectively (Verizon RISK Team, 2013,
pp. 6, 25–26; see also our box 1, pp. 110 –111, for more
details on hacking and malware).
A prominent example of a hacker attack was the one
on Global Payments—a payment card processor. Global
Payments publicly acknowledged in March 2012 that it
had suffered a data breach. Subsequent investigations
estimated the breach of payment card data may have started
as early as June 2011. Global Payments confirmed that
information from at least 1.5 million accounts had been
stolen. However, others suggested that information from
at least 7 million card accounts had been compromised.

Federal Reserve Bank of Chicago

Stolen consumer information included account numbers
and other data that could be used to make counterfeit cards,
but did not include Social Security numbers, addresses,
and cardholders’ names. However, small merchants’ personal and payment information may have also been stolen.
This incident led both the Visa and MasterCard networks
to remove Global Payments from their lists of approved
transaction processors (Wolfe, 2012; Schwartz, 2012;
Sidel, 2012; and Johnson, 2012).
In June 2011, Citigroup reported that a cyberattack
on Citi Account Online, its consumer website, had enabled
hackers to view the names, account numbers, transaction
histories, and contact information (for example, email
addresses) of over 200,000 cardholders. Using legitimate
accounts, hackers logged on to the site reserved for cardholders. They then jumped between accounts by inserting
new account numbers that were differentiated by only a
few digits into a URL in the web browser’s address bar.
While Social Security numbers, birth dates, card expiration dates, and security codes were not compromised,
the stolen contact information could be used to elicit
more information through targeted attacks—for example,
through phishing (Schwartz and Dash, 2011; and
Wagenseil, 2011).
Payments industry firms are not necessarily the only
victims of hacking incidents; a variety of other types of
firms are being hacked, leading to the theft of personal and

125

account information that may later result in fraudulent
transactions. In June 2012, hackers breached LinkedIn,
the popular professional networking website, and stole more
than 6 million users’ passwords, which were exported to
a Russian hacking forum. Since individuals may use the
same password for multiple online accounts, the harvested
passwords could be used by hackers to gain access to users’
email, bank, or corporate accounts containing even more
valuable information. It is not yet known how the hackers
accessed the passwords, but to decrypt them, the hackers
employed dictionary attacks (Perlroth, 2012b). In a similar
case, Yahoo! confirmed in July 2012 that a file containing
over 400,000 user names and passwords to accounts for
Yahoo!, Google, AOL, Comcast, and other companies was
stolen. Criminals claiming responsibility for the attack
stated that they stole the passwords using a Structured
Query Language (SQL) database injection, which exploits
how webpages communicate with back-end databases
(after such an injection, attackers can issue commands to
a database to harvest data). After posting all of the stolen
information online, the hackers claimed that their actions
should serve as a wake-up call, not as a threat, to those in
charge of security at Yahoo! and other similar companies
(Perlroth, 2012a). Another very well-known hacking incident occurred when the computer system of TJX Companies
Inc., the parent company of T.J. Maxx and Marshalls,
was breached; at least 46 million payment card numbers
were stolen (Jewell, 2007). Other recent incidents of data
hacking include those at the shoe and clothing retailer
Zappos (24 million customer accounts accessed), Sony’s
video gaming and entertainment network for its PlayStation
console (77 million user accounts and possibly credit

126

card numbers accessed), and a website devoted to
Google’s operating system for mobile devices called
Android Forums (1 million user credentials accessed)
(Greenberg, 2011, 2012; and Protalinski, 2012).
One well-known example where malware was used
to commit a cybercrime is the 2008 data breach of
Heartland Payment Systems—an electronic transaction
processor for small and midsized businesses. In 2009,
the processor disclosed details of the breach: 130 million
credit card and debit card accounts had been compromised via malware planted on the company’s payment
processing network. Stolen data included names, card
numbers and expiration dates, and magnetic stripe data,
which could be used to make counterfeit cards (Krebs,
2009b; and Vijayan, 2010).2
In closing, we want to highlight two disturbing
aspects of some of these recent data breaches. For one,
breaches can occur so surreptitiously that the host under
attack may not be aware that it has been compromised
until well after the initial breach. The Verizon RISK Team
(2013, p. 52) finds that in 2012, two-thirds of the confirmed
data breaches went undetected for months or even years.
For another, about three-quarters of these breaches required
criminals to have only low levels of sophistication (for
example, the use of brute force or phishing) in order to
be successful (Verizon RISK Team, 2013, p. 49). These
findings imply that while data breaches might be fairly
simple to initiate, they remain difficult to detect.
See www.spi.dod.mil/tenets.htm.
For more details on this breach and the company’s response to it,
see Cheney (2010).

1
2

3Q/2013, Economic Perspectives

references

American Bankers Association, 2011, 2011 Deposit
Account Fraud Survey Report, Washington, DC,
December, available for purchase at https://www.aba.com/
Products/Surveys/Pages/2011DepositAccount.aspx.

Consumer Financial Protection Bureau, 2012,
“Defining larger participants in certain consumer
financial product and service markets,” Federal Register,
Vol. 77, No. 33, February 17, pp. 9592–9608.

Association for Financial Professionals, 2013,
“2013 AFP Payments Fraud and Control Survey:
Report of survey results,” underwritten by J.P. Morgan,
Bethesda, MD, March.

Douglass, D. B., 2009, “An examination of the fraud
liability shift in consumer card-based payment systems,”
Economic Perspectives, Federal Reserve Bank of
Chicago, Vol. 33, First Quarter, pp. 43–49, available
at www.chicagofed.org/digital_assets/publications/
economic_perspectives/2009/ep_1qtr2009_part7_
douglass.pdf.

__________, 2012, “2012 AFP Payments Fraud and
Control Survey: Report of survey results,” underwritten
by J.P. Morgan, Bethesda, MD, March.
Board of Governors of the Federal Reserve System,
2011a, “Availability of funds and collection of checks;
proposed rule,” Federal Register, Vol. 76, No. 58,
March 25, pp. 16862–16976.
__________, 2011b, press release, Washington, DC,
March 3, available at www.federalreserve.gov/
newsevents/press/bcreg/20110303a.htm.
__________, 2005, “Collection of checks and other
items by Federal Reserve Banks and funds transfers
through Fedwire and availability of funds and collection of checks,” Federal Register, Vol. 70, No. 227,
November 28, pp. 71218–71226, available at
www.gpo.gov/fdsys/pkg/FR-2005-11-28/pdf/
FR-2005-11-28.pdf.
Castell, M., 2013, “Mitigating online account takeovers: The case for education,” Federal Reserve Bank
of Atlanta, Retail Payments Risk Forum, survey paper,
April, available at www.frbatlanta.org/documents/
rprf/rprf_pubs/130408_survey_paper.pdf.
Cheney, J. S., 2010, “Heartland Payment Systems:
Lessons learned from a data breach,” Federal Reserve
Bank of Philadelphia, Payment Cards Center, discussion paper, No. DP10-01, January.
Cheney, J. S., R. M. Hunt, K. R. Jacob, R. D. Porter,
and B. J. Summers, 2012, “The efficiency and integrity of payment card systems: Industry views on the
risks posed by data breaches,” Economic Perspectives,
Federal Reserve Bank of Chicago, Vol. 36, Fourth
Quarter, pp. 130–146, available at www.chicagofed.
org/digital_assets/publications/economic_perspectives/
2012/4Q2012_part2_cheney_etal.pdf.

Federal Reserve Bank of Chicago

Federal Financial Institutions Examination Council,
2011, “Supplement to ‘Authentication in an Internet
banking environment,’” supplement to guidance,
Arlington, VA, June 28, available at www.ffiec.gov/
pdf/Auth-ITS-Final%206-22-11%20%28FFIEC%20
Formated%29.pdf.
__________, 2005, “Authentication in an Internet
banking environment,” guidance, Arlington, VA,
October 12, available at www.ffiec.gov/pdf/
authentication_guidance.pdf.
Federal Reserve Bank of Minneapolis, Payments
Information and Outreach Office, 2012, “2012
Payments Fraud Survey: Summary of results,” report,
September 17, available at www.minneapolisfed.org/
about/whatwedo/payments/2012_Payments_Fraud_
Survey_Summary.pdf.
Federal Reserve Banks, 2013, “Payment system improvement—public consultation paper,” Federal Reserve
Financial Services, September 10, available at http://
fedpaymentsimprovement.org/wp-content/uploads/2013/09/Payment_System_Improvement-Public_Consultation_Paper.pdf.
Federal Reserve System, 2011, “The 2010 Federal
Reserve Payments Study: Noncash payment trends in
the United States: 2006–2009,” report, Washington,
DC, April 5, available at www.frbservices.org/files/
communications/pdf/press/2010_payments_study.pdf.
Federal Trade Commission, 2013, “Telemarketing
sales rule; proposed rule,” Federal Register, Vol. 78,
No. 131, July 9, pp. 41199–41225, available at
www.gpo.gov/fdsys/pkg/FR-2013-07-09/html/
2013-12886.htm.

127

Greenberg, A., 2012, “Zappos says hackers accessed
24 million customers’ account details,” Forbes,
January 15, available at www.forbes.com/sites/
andygreenberg/2012/01/15/zappos-says-hackers‑
accessed-24-million-customers-account-details/.

Krebs, B., 2009a, “Data breach led to multi-million
dollar ATM heists,” Security Fix, blog, Washington Post,
February 5, available at http://voices.washingtonpost.
com/securityfix/2009/02/data_breach_led_to_multimilli.html.

__________, 2011, “Sony hacker may have accessed
77 million users’ data, possibly including credit cards,”
Forbes, April 26, available at www.forbes.com/sites/
andygreenberg/2011/04/26/sony-hacker-may-have‑
accessed-77-million-users-data-possibly-includingcredit-cards/.

__________, 2009b, “Payment processor breach may
be largest ever,” Security Fix, blog, Washington Post,
January 20, available at http://voices.washingtonpost.
com/securityfix/2009/01/payment_processor_breach_
may_b.html.

Jacob, K., A. Lunn, R. D. Porter, W. Rousse,
B. Summers, and D. Walker, 2009, “Digital checks
as electronic payment orders,” Federal Reserve Bank
of Chicago, Financial Markets Group, policy discussion paper, No. PDP 2009-5, November 17.
Jacob, K., and K. E. Wells, 2011, “Evaluating the
potential of immediate funds transfer for generalpurpose payments in the United States,” Chicago Fed
Letter, Federal Reserve Bank of Chicago, No. 292a,
November.
Javelin Strategy & Research, 2013, 2013 Identity
Fraud Report: Data Breaches Becoming a Treasure
Trove for Fraudsters, report, Pleasanton, CA, February,
available for purchase at https://www.javelinstrategy.
com/brochure/276.
Jewell, M., 2007, “Data theft believed to be biggest
hack,” Washington Post, via Associated Press, March 29,
available at www.washingtonpost.com/wp-dyn/
content/article/2007/03/29/AR2007032902629.html.
Johnson, A. R., 2012, “MasterCard removes Global
Payments from approved vendor list,” 4-traders,
via Dow Jones Newswires, May 2, available at
www.4-traders.com/MASTERCARD-INC-17163/
news/MasterCard-Removes-Global-PaymentsFrom-Approved-Vendor-List-14308060/.
Keitel, P., 2008, “Legislative responses to data
breaches and information security failures,”
Federal Reserve Bank of Philadelphia, Payment
Cards Center, discussion paper, No. DP08-09,
December, available at www.philadelphiafed.org/
consumer-credit-and-payments/payment-cards‑
center/publications/discussion-papers/2008/D2008
DecemberLegislativeResponsesToDataBreaches.pdf.

128

Lemos, R., 2013, “Lawsuits bring clarity to SMBs
in corporate account takeovers,” Dark Reading,
April 22, available at www.darkreading.com/smb/
lawsuits-bring-clarity-to-smbs-in-corpor/240153406.
Levitin, A. J., 2010, “Private disordering? Payment
card fraud liability rules,” Brooklyn Journal of
Corporate, Financial & Commercial Law, Vol. 5,
No. 1, Fall, pp. 1–48.
Marcus, D., and R. Sherstobitoff, 2012, “Dissecting
Operation High Roller,” McAfee and Guardian
Analytics, white paper, June 26, available at www.mcafee.
com/us/resources/reports/rp-operation-high-roller.pdf.
Moore, T., 2010, “The economics of cybersecurity:
Principles and policy options,” International Journal
of Critical Infrastructure Protection, Vol. 3, Nos. 3–4,
December, pp. 103–117.
NACHA—The Electronic Payments Association,
2012, “Risk management strategy: Executive summary,”
report, Herndon, VA, October, available at https://
www.nacha.org/sites/default/files/files/Risk_and_
Compliance/Risk_Management_Tools_and_
Resources/NACHA%20Risk%20Management%20
Summary%20Exec%20Summary%20Oct%202012.pdf.
Nair, D., and J. Dye, 2013, “Exclusive—Indian
card processor in $45 million heist is ElectraCard:
Sources,” Reuters, May 11, available at
http://in.reuters.com/article/2013/05/11/usa-crime‑
cybercrime-india-idINDEE94A04620130511.
Perlroth, N., 2012a, “Yahoo breach extends beyond
Yahoo to Gmail, Hotmail, AOL users,” Bits, blog,
New York Times, July 12, available at http://bits.blogs.
nytimes.com/2012/07/12/yahoo-breach-extends‑
beyond-yahoo-to-gmail-hotmail-aol-users/?hp.

3Q/2013, Economic Perspectives

__________, 2012b, “Lax security at LinkedIn is laid
bare,” New York Times, June 10, available at www.
nytimes.com/2012/06/11/technology/linkedin-breach‑
exposes-light-security-even-at-data-companies.html.
Pianalto, S., 2012, “Collaborating to improve the U.S.
payments system,” presentation at the 12th Annual
Payments Symposium, Federal Reserve Bank of
Chicago, October 22, available at www.clevelandfed.
org/for_the_public/news_and_media/speeches/2012/
pianalto_20121022.cfm.
Protalinski, E., 2012, “Android Forums hacked:
1 million user credentials stolen,” ZDNet, July 12,
available at www.zdnet.com/android-forums-hacked1-million-user-credentials-stolen-7000000817/.
Schwartz, M. J., 2012, “Global Payments breach:
Fresh questions on timing,” InformationWeek, May 4,
available at www.informationweek.com/security/
attacks/global-payments-breach-fresh-questions-o/
232901419.
Schwartz, N. D., and E. Dash, 2011, “Thieves found
Citigroup site an easy entry,” New York Times, June 13,
available at www.nytimes.com/2011/06/14/technology/
14security.html.
Sidel, R., 2012, “Card-data breach may be wider than
first reported,” Wall Street Journal, May 3, available
by subscription at http://online.wsj.com/article/SB10
001424052702303877604577382522160414052.html.

Federal Reserve Bank of Chicago

Strohm, C., and E. Engleman, 2012, “Cyber attacks
on U.S. banks expose computer vulnerability,”
Bloomberg, September 27, available at www.bloomberg.
com/news/2012-09-28/cyber-attacks-on-u-s-banksexpose-computer-vulnerability.html.
Verizon RISK Team, 2013, 2013 Data Breach
Investigations Report, New York, available at
www.verizonbusiness.com/resources/reports/rp_
data-breach-investigations-report-2013_en_xg.pdf.
Vijayan, J., 2010, “Heartland breach expenses pegged
at $140M—so far,” Computerworld, May 10, available at www.computerworld.com/s/article/9176507/
Heartland_breach_expenses_pegged_at_140M_so_far.
Wagenseil, P., 2011, “Citigroup data theft so easy
anyone could have done it,” TechNewsDaily, June 14,
available at www.technewsdaily.com/6911-citigroup‑
data-theft-so-easy-anyone-could-have-done-it.html.
Wolfe, D., 2012, “Global Payments reports merchant
data also affected in breach,” American Banker, June 12,
available by subscription at www.americanbanker.
com/issues/177_113/global-payments-data-breach‑
merchant‑applications-1050090-1.html.
Zetter, K., 2012, “How ‘Flame’ malware hijacks
a computer,” interview by I. Flatow, Talk of the
Nation, National Public Radio, June 8, available
at www.npr.org/2012/06/08/154587988/
how-flame-malware-hijacks-a-computer.

129