Page 26 - GS230601
P. 26
Co v er St o r y
CoverStory
Sharing information, closing gaps
As infosec leaders have noted, As infosec leaders have noted, lack of communication has
lack of communication has been a been a major impediment to security within organizations
major impediment to security within and across public and private sectors. Dakshina, for
example, recalled a recent conversation with a card issuer
organizations and across public when pointing out that financial institutions frequently
and private sectors. have gaps between fraud and customer service teams.
"He confirmed they store device ID and other transac-
tional data, so I asked if customer service reps pass that
This way you retain the customer, Dakshina noted, and information to the fraud team so they know if the cus-
while not every customer will go for it, the email will at
least let them know you're trying to keep them happy. tomer purchased the product using the same device ID,"
Dakshina said. "He said, 'No, we don't give the data to the
I call this "friction, not rejection" because you can't stop
buyer remorse from happening, especially when multiple dispute side.' And because of that disconnect, customer
service has no visibility into the transaction, leaving them
stores are selling the same item, he said. A customer who
buys a $1,000 item, then sees it sold somewhere for $800, no choice but to take the cardholder's dispute at face value.
They can't even say, 'We see you used your phone to check
will be thinking about how to recover the $200, he added.
out; are you sure you didn't initiate the transaction?'"
Because fraud comes in many varieties, Dakshina
recommended combining human and machine intelligence Jason Kratovil, head of public policy and external affairs
at SentiLink, mentioned that gaps in Social Security were
to detect anomalies and avoid false positives by separating
legitimate orders from fraudulent transactions. making it easy for criminals to create synthetic identities.
"If you want to create a synthetic identity, find a Social
High stakes, deep fakes Security number for a minor or immigrant with a thin
credit profile and combine it with a burner phone and
Nir Stern, vice president, product management at AU10TIX, some made-up PII (personally identifiable information),"
acknowledged that deep fakes are a growing concern for he said.
companies of all sizes that have difficulty discerning
between forged and authentic images and documents. From there, he added, a criminal could purchase authorized
Identity proofing, which his company provides to Twitter, user tradelines or accumulate declined applications by
LinkedIn and other global enterprises, can solve for this repeatedly applying for credit; over time, with minimal
issue, he stated. skill and a bit of patience, these activities could create a
legitimate-looking consumer.
"Unfortunately, whenever there's a new technology, the
first adopters are usually the bad guys," he said. "We run SentiLink CEO Naftali Harris and COO Maxwell
over 100 types of forgery tests and compare data elements Blumenfeld, who were early employees at Affirm, co-
to determine if a document or image is real or forged. And founded SentiLink in 2017 after seeing patterns in credit
because we have such huge traffic from both our customers reports that didn't tie to real people. Kratovil noted they
and bad actors, we're able to train our AI models on an were among the first to see synthetic ID as a big problem.
ongoing basis against the latest threats."
The following year, the company was an early adopter of
Stern advised enterprises in need of identity proofing to the Social Security Administration's real-time, API-based
look for fully automated solutions. He pointed out that system for verifying an individual's name, date of birth
numerous vendors claiming to be fully automated actually and Social Security number. The Electronic Consent Based
have agents behind the scenes doing manual work. Global SSN Verification (eCBSV) service is now used by SentiLink
entities require robust solutions that can respond in as partners to onboard customers efficiently while reducing
little as 4 seconds to requests from multiple regions, fraud and risk.
languages and regulatory landscapes, he stated.
Sources of truth
"I think the key for organizations is to work with solutions
that are fully automated and scalable," he said, noting large In a July 2022 white paper, The Electronic Consent Based
enterprises that monitor traffic across global databases can SSN Verification Service, How eCBSV can help your financial
identify new threats quickly and avert disasters. This type institution fight fraud and approve more applications faster,
of provider, he stated, continuously builds new models, SentiLink positioned eCBSV as more efficient than paper-
which protects their communities in the endless fight based consent forms for identifying synthetic fraudsters
against the bad guys. and enabling inadvertently flagged individuals to prove
they're real. "Technology continues to re-shape how
consumers seek out and utilize financial services. As this
innovation takes hold, it has presented one undeniable
26