Transactions: {{start}}
Total Value: {{end}}
{{end}}
Credit Card Fraud

Explore the transactions to find the origin of a card skimming fraud.

Click Select people with disputes to view customers with flagged transactions. Which single merchant did they all shop at? Could that be where their cards were first cloned?

To keep investigating, click Reset view and then select each of the flagged customers. Use the time bar to see if their visit at the suspicious retailer took place before their first flagged transaction.

Some undisputed transactions are shown as aggregate links. Click the icon to split them again.

This demo uses KeyLines to find the origin of a card skimming fraud, which occurs when a skimmer steals a customer's card data during a transaction for later unauthorised use.

The chart shows:

  • Nodes representing people and merchants.
  • Links representing transactions. Red links are disputed, green are undisputed.

Between the chart and the time bar, there is a number of linked features to help you understand the data:

  • Zooming into the time bar's histogram focusses on transactions that happened during the zoomed time period.
  • Selecting a person or a merchant foregrounds all their transactions and shows the values as link labels.
  • Hovering the histogram shows tooltips with details and pings the relevant nodes in the chart.
  • You can use the time bar controls to see how the transactions happened over time.

The featured data is based on Credit Card Fraud Detection scenario created by Neo4j GraphGist.