Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security NewswirePorts: Sea, Land, & Air

Criminals Make Use of Fraudulently Purchased Tickets to Travel Anonymously

Criminals Make Use of Fraudulently Purchased Tickets to Travel Anonymously

By Kylie Bull
Criminals Make Use of Fraudulently Purchased Tickets to Travel Anonymously
December 1, 2016

One hundred ninety-three individuals suspected of traveling with airline tickets bought using stolen, compromised or fake credit card details have been detained in a major international law enforcement operation targeting airline fraudsters. Forty-three countries, 75 airlines and eight online travel agencies were involved in this global operation, which took place at 189 airports across the world in mid-October.

The airline industry is estimated to lose more than $1 billion per year as a result of the fraudulent online purchases of flight tickets. Fraudulent online transactions are highly lucrative for organized crime and are often purchased to facilitate more serious criminal activities including illegal immigration, human trafficking, drug smuggling and terrorism.

The fifth Global Airport Action Day was organized through coordination centers at Europol in The Hague, INTERPOL Global Complex for Innovation in Singapore and Ameripol in Bogota, and was supported by Canadian and U.S. law enforcement agencies.

Representatives from airlines, online travel agencies, payment card companies, Perseuss and the International Air Transport Association worked together with experts from Europol’s European Cybercrime Centre to identify suspicious transactions and provide confirmation to law enforcement officers deployed in the airports. Eurojust assisted throughout the action week, together with the European Border and Coast Guard Agency (Frontex), which deployed officers to 20 airports, assisting in the detection of identity fraud, fake documents and irregular migration.

For the first time, this global operation lasted for five consecutive days. Law enforcement is now tackling this international phenomenon on a daily basis in close cooperation with the private sector. This has enhanced the trust between all involved parties and will continue to inflict damage to the criminals involved in airline ticket fraud.

During the operation, 350 suspicious transactions were reported. As a result, 193 people were detained, denied boarding, questioned by police and charged criminally. Investigations are ongoing. Several people were caught trying to traffic drugs from Latin America to Europe, frequently flying back and forth using fraudulently purchased tickets.

Crime-as-a-Service, the recent trend in all forms of serious organized crime, has now also appeared in the travel sector. Law enforcement has targeted fake online travel agencies, specializing in purchasing airline tickets with stolen or fake credit card details for other criminals, providing them a service. One criminal enterprise offered financial services, fraudulently purchased tickets and fake documents. During the action several bookings for different destinations were linked to the same criminal organization.

The use of compromised credit card details is an increasingly high volume crime, with tens of thousands of criminal complaints in many EU countries. An increase in Card-Not-Present (CNP) fraud is apparent across almost all sectors; the purchases of physical goods, airline tickets, car rentals and accommodation with compromised cards has seen a significant increase throughout the EU. Airline companies are among the most affected by CNP fraud.

“We cannot allow anyone, in particular serious criminals and terrorists, to travel around the world anonymously and to endanger others,” said Europol’s Director Rob Wainwright. “The digital underground is underpinned by a mature Crime-as-a-Service model which continues to provide tools and services to people with criminal motivation. Together with our private partners we need to further extend these successful initiatives targeting fraud in the airline industry, fighting them on a daily basis, to make life as hard as possible for criminals.”

KEYWORDS: human trafficking international security travel security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kylie Bull began her career in television news at ITN in the UK before moving to print journalism. She has been an editor at IHS Jane's for sixteen years, where she continues today, and was recently the managing editor at Homeland Security Today. Bull has reported on a wide variety of security, geopolitical and counterterrorism subjects and has interviewed world leaders such as Russian President Vladimir Putin and UK Prime Minister Theresa May.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • European Standard Travel Document Approved

    See More
  • Cooperation at Sea to Combat Maritime Attacks

    Cooperation at Sea to Combat Maritime Attacks

    See More
  • Airport at Sunset

    International Network to Fight Airline Fraud

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • into to sec.jpg

    Introduction to Security, 10th Edition

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing