SlideShare a Scribd company logo
© 2015 ID Analytics, Inc. Confidential
Identity Fraud Protection
Using Big Data Analytics
Stephen Coggeshall
July 16, 2015
© 2015 ID Analytics, Inc. Confidential
• Who am I?
• Who is ID Analytics?
• Everything you ever wanted to know about identity fraud
• Our technology stack: billions of records examined in near
real time
Outline
2
© 2015 ID Analytics, Inc. Confidential
ID Analytics Overview
• Founded in San Diego, CA in 2002
• Powered by analytics, differentiated by
data
• Focused on empowering leading
organizations to make better fraud, credit
and identity risk decisions
• Over 300 leading U.S. enterprises rely on
ID Analytics solutions every day…
- 4 of the top 6 financial institutions
- 4 of the top 5 wireless carriers
- Government agencies: Social Security
Administration and Veterans Affairs
3
ID Analytics applies advanced analytics to a unique source of U.S. Identity data,
solving critical fraud, identity and credit challenges to help enterprises grow safely
© 2015 ID Analytics, Inc. Confidential
Identity Fraud is the act of
misrepresenting which person you are
Why is it done?
• To improperly get products or services
(financial services, consumer products…)
• To stay “unidentified” while
behaving badly (money
laundering, terrorists…)
What Is Identity Fraud
4
© 2015 ID Analytics, Inc. Confidential
Ways to Classify Identity Fraud
• Financial identity fraud
̶ Account openings
̶ Account takeover
• Health care id fraud
• Tax id fraud
• Money laundering
• Terrorist activity
Classify by
Industry/Target
• Identity Theft
• Identity Manipulation
• Synthetic Identity
Classify by
Method Used
5
© 2015 ID Analytics, Inc. Confidential
Three Types of Identity Fraud
Who is
the victim?
Nature of the
misrepresentation
Identity Theft
Core identity:
Victim
• Owner of misused
identity
• The company
providing
product/service
• SSN, name and date of
birth belong to the
victim
• Address, phone, and/or
email belong to
fraudster
Identity
Manipulation
Core identity:
Fraudster
• Fraudster
• The company
providing
product/service
• SSN, date of birth
and/or name vary
slightly from the
fraudster’s own, correct
information
Synthetic
Identity
Core identity:
None
• No direct consumer
victim
• The company
providing
product/service
• SSN, name and date of
birth are fabricated or
chosen randomly
6
© 2015 ID Analytics, Inc. Confidential
• Fraudster improperly uses another
person’s identity information
– New account origination (name, SSN, DOB)
– Account takeover (name, account number)
• Fraudster frequently uses his own
contact information
– (Phone, address, email)
We All Know About Identity Theft
7
© 2015 ID Analytics, Inc. Confidential
Example of Severe Identity Manipulator
9
different
first
names
5
different
last
names
24
different
SSNs
11
different
DOBs
Suspicious address
variation
8
© 2015 ID Analytics, Inc. Confidential
Description of Synthetic Identity Fraud
SSN
“Charles
Smith”
DOBAddress
Seen
1x
Phone
John Trufante
Seen
10xs
Address DOB Phone
9
© 2015 ID Analytics, Inc. Confidential
Example Identity Fraud Ring
• 85 phone & credit card
applications from these 6 people
from one address (close to
Anacostia Park) in Washington,
DC over 3 years. Sharing of
SSNs, DOBs, names.
• An additional 5 ID theft victims; 2
victims are deceased (ID theft of
the dead).
Ring is still active in September 2014.
PII has been changed
10
Six People, Identity Manipulation and Identity Theft
1 Gerald Smith 24 yrs 2 FNs 10 apps
2 Corona Jones 24 yrs 2 SSNs, 2 LNs 12 apps
3 Corona Jones 52 yrs 3 SSNs, 2 DOBs, 2 FNs 5 apps
4 Monique Jones 43 yrs 2 SSNs, 3 LNs 9 apps
5 Latasha Jones 21 yrs 3 SSNs, 2 DOBs 26 apps
6 Angel Jones 21 yrs No identity manipulation 12 apps
© 2015 ID Analytics, Inc. Confidential
Example Identity Fraud Ring
Moved
11/2011
• 345 credit card apps, 1 payday
loan from these 4 fraudsters from
2 addresses. Frank uses his
college email (retired professor).
• Started with Frank & Hatti, then
Dottie. Later Freida joined.
PII has been changed
Indianapolis, IN area
11
Four People, Identity Manipulation Fraud
1 Hatti Smith 48 yrs
12 SSNs, 3 DOBs, 2 FNs, 3
LNs
194
apps
2 Frank Smith 75 yrs
7 SSNs, 5 DOBs, 2 FNs, 2
LNs
117
apps
3 Dottie Smith 71 yrs
2 SSNs, 3 DOBs, 4 FNs, 2
LNs
10 apps
4 Freida Jones 48 yrs 2 SSNs, 2 LNs 24 apps
© 2015 ID Analytics, Inc. Confidential
Identity Fraud Ring Locations
12
© 2015 ID Analytics, Inc. Confidential
• Receive the application (SNAPD:
SSN, Name, Address, Phone, DOB)
• Build the PII-linked graph
• Translate this graph into numbers
• These features are the inputs to
machine learning algorithms
• Calculate the score
• Return the score and reason codes
What’s Behind The ID Score?
13
All this is done in ~200 ms.
Our products are real time delivered and near real time aware.
© 2015 ID Analytics, Inc. Confidential
• ~2 billion applications for credit cards, mobile phones, retail credit,
other loans…
• U.S. white pages, (NAP*) ~100 million records monthly over ~10 years
• Header files (SNAPD*), ~200 million records monthly over ~10 years
• ~3 million labeled output records of various frauds
• Account performance data, ~100 million/month
• Account changes, ~10 million/month
• Many other smaller files (SSA DMF, OFAC, census…)
• > trillion data elements
• Data is time stamped – can “roll back the clock”
Data
14
*SNAPD – SSN, Name, Address, Phone, Date of birth
© 2015 ID Analytics, Inc. Confidential
• Support Vector Machines (SVM)
• Traditional Neural Nets
• Boosted Trees
• Random Forests
• Convolutional (Deep) Neural Nets
• K-Means Clustering
• Others – linear, logistic regressions, CART/CHAID, radial basis
functions, KNN…
Machine Learning/Modeling Algorithms
15
© 2015 ID Analytics, Inc. Confidential
• Identity Risk Scores – requires near real time assembly of near real
time data for near real time score delivery
• Identity Resolution – look back through all data over time and people
to resolve an identity when presented with fragmented information.
Needs knowledge of complete PII history.
• Find fraud rings – examine multiple fuzzy linkings across billions of
records. Can be batch.
Services That Need Specialized Technology
16
These require very special data organization and systems
© 2015 ID Analytics, Inc. Confidential
• The core of what we observe is events, like applications for products
and services
• Look across the flow of events for
– anomalous interconnections
– connections of known bad events
• Fraud scores find events with anomalous connections
• Gather known bad events, connect by address, phone number, email
• Remove false positives (business, organization…)
• Remainder are candidates for fraud rings
Systematically Find Thousands of Fraud Rings
17
© 2015 ID Analytics, Inc. Confidential 18
Lambda Architecture
Real Time
Data Flow
Batch
Data Flow
Speed Layer
Batch Layer Serving Layer
Reporting, BI
RDBs
RDB (RO, RW)
Flat files
Real time services
N+1 redundancy
Batch processing
Analysis
R&D
Near real time synchronization
Real time service delivery
~200 ms response time
RDB (RO, RW)
Flat files
Hadoop, Spark, Hive
Real time services
N+1 redundancy
© 2015 ID Analytics, Inc. Confidential
We have identified three methods of identity fraud
• Identity Theft, Identity Manipulation and Synthetic Identity
Real time fraud detection and awareness requires very careful
system architecture
• Data ingestion, storage, retrieval
• Separation of real time, batch and BI/reporting
• Optimization of data layout
Summary
19

More Related Content

What's hot

Dama Ireland slides - Data Trust event 9th June 2016
Dama Ireland slides - Data Trust event 9th June 2016Dama Ireland slides - Data Trust event 9th June 2016
Dama Ireland slides - Data Trust event 9th June 2016
Ken O'Connor
 
Synthetic Data for Big Data Privacy
Synthetic Data for Big Data PrivacySynthetic Data for Big Data Privacy
Synthetic Data for Big Data Privacy
MOSTLY AI
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningBig Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Matt Stubbs
 
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
Jean-Michel Franco
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
Khawar Nehal khawar.nehal@atrc.net.pk
 
Hacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected DataHacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected Data
Neo4j
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
Matt Stubbs
 
Big Data in Banking (Data Science Thailand Meetup #2)
Big Data in Banking (Data Science Thailand Meetup #2)Big Data in Banking (Data Science Thailand Meetup #2)
Big Data in Banking (Data Science Thailand Meetup #2)
Data Science Thailand
 
The Emergence of Alt-Data and its Applications
The Emergence of Alt-Data and its ApplicationsThe Emergence of Alt-Data and its Applications
The Emergence of Alt-Data and its Applications
PromptCloud
 
Building Confidence in Big Data - IBM Smarter Business 2013
Building Confidence in Big Data - IBM Smarter Business 2013 Building Confidence in Big Data - IBM Smarter Business 2013
Building Confidence in Big Data - IBM Smarter Business 2013
IBM Sverige
 
A visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaA visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe Francavilla
Data Driven Innovation
 
Fast Data Mining: Real Time Knowledge Discovery for Predictive Decision Making
Fast Data Mining: Real Time Knowledge Discovery for Predictive Decision MakingFast Data Mining: Real Time Knowledge Discovery for Predictive Decision Making
Fast Data Mining: Real Time Knowledge Discovery for Predictive Decision Making
Codemotion
 
Audit,fraud detection Using Picalo
Audit,fraud detection Using PicaloAudit,fraud detection Using Picalo
Audit,fraud detection Using Picalo
guest4ea866f
 
1. The Importance of Graphs in Government
1. The Importance of Graphs in Government1. The Importance of Graphs in Government
1. The Importance of Graphs in Government
Neo4j
 
SAS Viya AI for digital banking
SAS Viya AI for digital bankingSAS Viya AI for digital banking
SAS Viya AI for digital banking
Jason Loh
 
[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing
Natalino Busa
 
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Matt Stubbs
 
ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, securityRoman Chanclor
 
The State of Big Data Adoption: A Glance at Top Industries Adopting Big Data ...
The State of Big Data Adoption: A Glance at Top Industries Adopting Big Data ...The State of Big Data Adoption: A Glance at Top Industries Adopting Big Data ...
The State of Big Data Adoption: A Glance at Top Industries Adopting Big Data ...
Datameer
 

What's hot (20)

Dama Ireland slides - Data Trust event 9th June 2016
Dama Ireland slides - Data Trust event 9th June 2016Dama Ireland slides - Data Trust event 9th June 2016
Dama Ireland slides - Data Trust event 9th June 2016
 
Synthetic Data for Big Data Privacy
Synthetic Data for Big Data PrivacySynthetic Data for Big Data Privacy
Synthetic Data for Big Data Privacy
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningBig Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
 
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
 
Hacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected DataHacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected Data
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Big Data in Banking (Data Science Thailand Meetup #2)
Big Data in Banking (Data Science Thailand Meetup #2)Big Data in Banking (Data Science Thailand Meetup #2)
Big Data in Banking (Data Science Thailand Meetup #2)
 
The Emergence of Alt-Data and its Applications
The Emergence of Alt-Data and its ApplicationsThe Emergence of Alt-Data and its Applications
The Emergence of Alt-Data and its Applications
 
Building Confidence in Big Data - IBM Smarter Business 2013
Building Confidence in Big Data - IBM Smarter Business 2013 Building Confidence in Big Data - IBM Smarter Business 2013
Building Confidence in Big Data - IBM Smarter Business 2013
 
A visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaA visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe Francavilla
 
Fast Data Mining: Real Time Knowledge Discovery for Predictive Decision Making
Fast Data Mining: Real Time Knowledge Discovery for Predictive Decision MakingFast Data Mining: Real Time Knowledge Discovery for Predictive Decision Making
Fast Data Mining: Real Time Knowledge Discovery for Predictive Decision Making
 
Audit,fraud detection Using Picalo
Audit,fraud detection Using PicaloAudit,fraud detection Using Picalo
Audit,fraud detection Using Picalo
 
1. The Importance of Graphs in Government
1. The Importance of Graphs in Government1. The Importance of Graphs in Government
1. The Importance of Graphs in Government
 
SAS Viya AI for digital banking
SAS Viya AI for digital bankingSAS Viya AI for digital banking
SAS Viya AI for digital banking
 
[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing
 
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
 
ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, security
 
The State of Big Data Adoption: A Glance at Top Industries Adopting Big Data ...
The State of Big Data Adoption: A Glance at Top Industries Adopting Big Data ...The State of Big Data Adoption: A Glance at Top Industries Adopting Big Data ...
The State of Big Data Adoption: A Glance at Top Industries Adopting Big Data ...
 

Viewers also liked

Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
CA Technologies
 
Motivation for big data
Motivation for big dataMotivation for big data
Motivation for big data
Arockiaraj Durairaj
 
The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...
cVidya Networks
 
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
 "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"  "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
cVidya Networks
 
Webinar: Using Big Data Technology in Fraud Prevention
Webinar: Using Big Data Technology in Fraud PreventionWebinar: Using Big Data Technology in Fraud Prevention
Webinar: Using Big Data Technology in Fraud Prevention
NetGuardians
 
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssuranceHow to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
cVidya Networks
 
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
Geoffrey Fox
 
Online Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics WebinarOnline Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics Webinar
Datameer
 
Medical University of South Carolina: Using Big Data and Predictive Analytics...
Medical University of South Carolina: Using Big Data and Predictive Analytics...Medical University of South Carolina: Using Big Data and Predictive Analytics...
Medical University of South Carolina: Using Big Data and Predictive Analytics...
Seeling Cheung
 
Fiducia & GAD IT AG: From Fraud Detection to Big Data Platform: Bringing Hado...
Fiducia & GAD IT AG: From Fraud Detection to Big Data Platform: Bringing Hado...Fiducia & GAD IT AG: From Fraud Detection to Big Data Platform: Bringing Hado...
Fiducia & GAD IT AG: From Fraud Detection to Big Data Platform: Bringing Hado...
Seeling Cheung
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
2016 Banking Trends
2016 Banking Trends2016 Banking Trends
2016 Banking Trends
MX
 

Viewers also liked (14)

Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Aamod_Chandra
Aamod_ChandraAamod_Chandra
Aamod_Chandra
 
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
 
Motivation for big data
Motivation for big dataMotivation for big data
Motivation for big data
 
The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...
 
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
 "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"  "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
 
Webinar: Using Big Data Technology in Fraud Prevention
Webinar: Using Big Data Technology in Fraud PreventionWebinar: Using Big Data Technology in Fraud Prevention
Webinar: Using Big Data Technology in Fraud Prevention
 
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssuranceHow to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
 
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
 
Online Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics WebinarOnline Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics Webinar
 
Medical University of South Carolina: Using Big Data and Predictive Analytics...
Medical University of South Carolina: Using Big Data and Predictive Analytics...Medical University of South Carolina: Using Big Data and Predictive Analytics...
Medical University of South Carolina: Using Big Data and Predictive Analytics...
 
Fiducia & GAD IT AG: From Fraud Detection to Big Data Platform: Bringing Hado...
Fiducia & GAD IT AG: From Fraud Detection to Big Data Platform: Bringing Hado...Fiducia & GAD IT AG: From Fraud Detection to Big Data Platform: Bringing Hado...
Fiducia & GAD IT AG: From Fraud Detection to Big Data Platform: Bringing Hado...
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
2016 Banking Trends
2016 Banking Trends2016 Banking Trends
2016 Banking Trends
 

Similar to Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015

Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
pdewitte
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
Tri-State Better Business Bureau
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
fmi_igf
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2
Management Insights LLC
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Elizabeth Dimit
 
Preventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldPreventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach world
Laurent Pacalin
 
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Neo4j
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
hewie
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
guest1d1ed5
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
Case IQ
 
Master Cross-Channel Customer Recognition
Master Cross-Channel Customer RecognitionMaster Cross-Channel Customer Recognition
Master Cross-Channel Customer Recognition
Signal
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
hewie
 
The Super Broken Story of the True Digital Identity
The Super Broken Story of the True Digital IdentityThe Super Broken Story of the True Digital Identity
The Super Broken Story of the True Digital Identity
Manah Khalil
 
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...Steven Wardell
 
2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To Know2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To Know
Raffa Learning Community
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
TransUnion
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
Guardian Analytics
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
Maven Logix
 
Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach World
Guardian Analytics
 
Investigating & proving cybercrime
Investigating & proving cybercrimeInvestigating & proving cybercrime
Investigating & proving cybercrime
Jenny Reid
 

Similar to Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015 (20)

Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
Preventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldPreventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach world
 
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
Master Cross-Channel Customer Recognition
Master Cross-Channel Customer RecognitionMaster Cross-Channel Customer Recognition
Master Cross-Channel Customer Recognition
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
The Super Broken Story of the True Digital Identity
The Super Broken Story of the True Digital IdentityThe Super Broken Story of the True Digital Identity
The Super Broken Story of the True Digital Identity
 
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
 
2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To Know2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To Know
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach World
 
Investigating & proving cybercrime
Investigating & proving cybercrimeInvestigating & proving cybercrime
Investigating & proving cybercrime
 

More from StampedeCon

Why Should We Trust You-Interpretability of Deep Neural Networks - StampedeCo...
Why Should We Trust You-Interpretability of Deep Neural Networks - StampedeCo...Why Should We Trust You-Interpretability of Deep Neural Networks - StampedeCo...
Why Should We Trust You-Interpretability of Deep Neural Networks - StampedeCo...
StampedeCon
 
The Search for a New Visual Search Beyond Language - StampedeCon AI Summit 2017
The Search for a New Visual Search Beyond Language - StampedeCon AI Summit 2017The Search for a New Visual Search Beyond Language - StampedeCon AI Summit 2017
The Search for a New Visual Search Beyond Language - StampedeCon AI Summit 2017
StampedeCon
 
Predicting Outcomes When Your Outcomes are Graphs - StampedeCon AI Summit 2017
Predicting Outcomes When Your Outcomes are Graphs - StampedeCon AI Summit 2017Predicting Outcomes When Your Outcomes are Graphs - StampedeCon AI Summit 2017
Predicting Outcomes When Your Outcomes are Graphs - StampedeCon AI Summit 2017
StampedeCon
 
Novel Semi-supervised Probabilistic ML Approach to SNP Variant Calling - Stam...
Novel Semi-supervised Probabilistic ML Approach to SNP Variant Calling - Stam...Novel Semi-supervised Probabilistic ML Approach to SNP Variant Calling - Stam...
Novel Semi-supervised Probabilistic ML Approach to SNP Variant Calling - Stam...
StampedeCon
 
How to Talk about AI to Non-analaysts - Stampedecon AI Summit 2017
How to Talk about AI to Non-analaysts - Stampedecon AI Summit 2017How to Talk about AI to Non-analaysts - Stampedecon AI Summit 2017
How to Talk about AI to Non-analaysts - Stampedecon AI Summit 2017
StampedeCon
 
Getting Started with Keras and TensorFlow - StampedeCon AI Summit 2017
Getting Started with Keras and TensorFlow - StampedeCon AI Summit 2017Getting Started with Keras and TensorFlow - StampedeCon AI Summit 2017
Getting Started with Keras and TensorFlow - StampedeCon AI Summit 2017
StampedeCon
 
Foundations of Machine Learning - StampedeCon AI Summit 2017
Foundations of Machine Learning - StampedeCon AI Summit 2017Foundations of Machine Learning - StampedeCon AI Summit 2017
Foundations of Machine Learning - StampedeCon AI Summit 2017
StampedeCon
 
Don't Start from Scratch: Transfer Learning for Novel Computer Vision Problem...
Don't Start from Scratch: Transfer Learning for Novel Computer Vision Problem...Don't Start from Scratch: Transfer Learning for Novel Computer Vision Problem...
Don't Start from Scratch: Transfer Learning for Novel Computer Vision Problem...
StampedeCon
 
Bringing the Whole Elephant Into View Can Cognitive Systems Bring Real Soluti...
Bringing the Whole Elephant Into View Can Cognitive Systems Bring Real Soluti...Bringing the Whole Elephant Into View Can Cognitive Systems Bring Real Soluti...
Bringing the Whole Elephant Into View Can Cognitive Systems Bring Real Soluti...
StampedeCon
 
Automated AI The Next Frontier in Analytics - StampedeCon AI Summit 2017
Automated AI The Next Frontier in Analytics - StampedeCon AI Summit 2017Automated AI The Next Frontier in Analytics - StampedeCon AI Summit 2017
Automated AI The Next Frontier in Analytics - StampedeCon AI Summit 2017
StampedeCon
 
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
StampedeCon
 
A Different Data Science Approach - StampedeCon AI Summit 2017
A Different Data Science Approach - StampedeCon AI Summit 2017A Different Data Science Approach - StampedeCon AI Summit 2017
A Different Data Science Approach - StampedeCon AI Summit 2017
StampedeCon
 
Graph in Customer 360 - StampedeCon Big Data Conference 2017
Graph in Customer 360 - StampedeCon Big Data Conference 2017Graph in Customer 360 - StampedeCon Big Data Conference 2017
Graph in Customer 360 - StampedeCon Big Data Conference 2017
StampedeCon
 
End-to-end Big Data Projects with Python - StampedeCon Big Data Conference 2017
End-to-end Big Data Projects with Python - StampedeCon Big Data Conference 2017End-to-end Big Data Projects with Python - StampedeCon Big Data Conference 2017
End-to-end Big Data Projects with Python - StampedeCon Big Data Conference 2017
StampedeCon
 
Doing Big Data Using Amazon's Analogs - StampedeCon Big Data Conference 2017
Doing Big Data Using Amazon's Analogs - StampedeCon Big Data Conference 2017Doing Big Data Using Amazon's Analogs - StampedeCon Big Data Conference 2017
Doing Big Data Using Amazon's Analogs - StampedeCon Big Data Conference 2017
StampedeCon
 
Enabling New Business Capabilities with Cloud-based Streaming Data Architectu...
Enabling New Business Capabilities with Cloud-based Streaming Data Architectu...Enabling New Business Capabilities with Cloud-based Streaming Data Architectu...
Enabling New Business Capabilities with Cloud-based Streaming Data Architectu...
StampedeCon
 
Big Data Meets IoT: Lessons From the Cloud on Polling, Collecting, and Analyz...
Big Data Meets IoT: Lessons From the Cloud on Polling, Collecting, and Analyz...Big Data Meets IoT: Lessons From the Cloud on Polling, Collecting, and Analyz...
Big Data Meets IoT: Lessons From the Cloud on Polling, Collecting, and Analyz...
StampedeCon
 
Innovation in the Data Warehouse - StampedeCon 2016
Innovation in the Data Warehouse - StampedeCon 2016Innovation in the Data Warehouse - StampedeCon 2016
Innovation in the Data Warehouse - StampedeCon 2016
StampedeCon
 
Creating a Data Driven Organization - StampedeCon 2016
Creating a Data Driven Organization - StampedeCon 2016Creating a Data Driven Organization - StampedeCon 2016
Creating a Data Driven Organization - StampedeCon 2016
StampedeCon
 
Using The Internet of Things for Population Health Management - StampedeCon 2016
Using The Internet of Things for Population Health Management - StampedeCon 2016Using The Internet of Things for Population Health Management - StampedeCon 2016
Using The Internet of Things for Population Health Management - StampedeCon 2016
StampedeCon
 

More from StampedeCon (20)

Why Should We Trust You-Interpretability of Deep Neural Networks - StampedeCo...
Why Should We Trust You-Interpretability of Deep Neural Networks - StampedeCo...Why Should We Trust You-Interpretability of Deep Neural Networks - StampedeCo...
Why Should We Trust You-Interpretability of Deep Neural Networks - StampedeCo...
 
The Search for a New Visual Search Beyond Language - StampedeCon AI Summit 2017
The Search for a New Visual Search Beyond Language - StampedeCon AI Summit 2017The Search for a New Visual Search Beyond Language - StampedeCon AI Summit 2017
The Search for a New Visual Search Beyond Language - StampedeCon AI Summit 2017
 
Predicting Outcomes When Your Outcomes are Graphs - StampedeCon AI Summit 2017
Predicting Outcomes When Your Outcomes are Graphs - StampedeCon AI Summit 2017Predicting Outcomes When Your Outcomes are Graphs - StampedeCon AI Summit 2017
Predicting Outcomes When Your Outcomes are Graphs - StampedeCon AI Summit 2017
 
Novel Semi-supervised Probabilistic ML Approach to SNP Variant Calling - Stam...
Novel Semi-supervised Probabilistic ML Approach to SNP Variant Calling - Stam...Novel Semi-supervised Probabilistic ML Approach to SNP Variant Calling - Stam...
Novel Semi-supervised Probabilistic ML Approach to SNP Variant Calling - Stam...
 
How to Talk about AI to Non-analaysts - Stampedecon AI Summit 2017
How to Talk about AI to Non-analaysts - Stampedecon AI Summit 2017How to Talk about AI to Non-analaysts - Stampedecon AI Summit 2017
How to Talk about AI to Non-analaysts - Stampedecon AI Summit 2017
 
Getting Started with Keras and TensorFlow - StampedeCon AI Summit 2017
Getting Started with Keras and TensorFlow - StampedeCon AI Summit 2017Getting Started with Keras and TensorFlow - StampedeCon AI Summit 2017
Getting Started with Keras and TensorFlow - StampedeCon AI Summit 2017
 
Foundations of Machine Learning - StampedeCon AI Summit 2017
Foundations of Machine Learning - StampedeCon AI Summit 2017Foundations of Machine Learning - StampedeCon AI Summit 2017
Foundations of Machine Learning - StampedeCon AI Summit 2017
 
Don't Start from Scratch: Transfer Learning for Novel Computer Vision Problem...
Don't Start from Scratch: Transfer Learning for Novel Computer Vision Problem...Don't Start from Scratch: Transfer Learning for Novel Computer Vision Problem...
Don't Start from Scratch: Transfer Learning for Novel Computer Vision Problem...
 
Bringing the Whole Elephant Into View Can Cognitive Systems Bring Real Soluti...
Bringing the Whole Elephant Into View Can Cognitive Systems Bring Real Soluti...Bringing the Whole Elephant Into View Can Cognitive Systems Bring Real Soluti...
Bringing the Whole Elephant Into View Can Cognitive Systems Bring Real Soluti...
 
Automated AI The Next Frontier in Analytics - StampedeCon AI Summit 2017
Automated AI The Next Frontier in Analytics - StampedeCon AI Summit 2017Automated AI The Next Frontier in Analytics - StampedeCon AI Summit 2017
Automated AI The Next Frontier in Analytics - StampedeCon AI Summit 2017
 
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
 
A Different Data Science Approach - StampedeCon AI Summit 2017
A Different Data Science Approach - StampedeCon AI Summit 2017A Different Data Science Approach - StampedeCon AI Summit 2017
A Different Data Science Approach - StampedeCon AI Summit 2017
 
Graph in Customer 360 - StampedeCon Big Data Conference 2017
Graph in Customer 360 - StampedeCon Big Data Conference 2017Graph in Customer 360 - StampedeCon Big Data Conference 2017
Graph in Customer 360 - StampedeCon Big Data Conference 2017
 
End-to-end Big Data Projects with Python - StampedeCon Big Data Conference 2017
End-to-end Big Data Projects with Python - StampedeCon Big Data Conference 2017End-to-end Big Data Projects with Python - StampedeCon Big Data Conference 2017
End-to-end Big Data Projects with Python - StampedeCon Big Data Conference 2017
 
Doing Big Data Using Amazon's Analogs - StampedeCon Big Data Conference 2017
Doing Big Data Using Amazon's Analogs - StampedeCon Big Data Conference 2017Doing Big Data Using Amazon's Analogs - StampedeCon Big Data Conference 2017
Doing Big Data Using Amazon's Analogs - StampedeCon Big Data Conference 2017
 
Enabling New Business Capabilities with Cloud-based Streaming Data Architectu...
Enabling New Business Capabilities with Cloud-based Streaming Data Architectu...Enabling New Business Capabilities with Cloud-based Streaming Data Architectu...
Enabling New Business Capabilities with Cloud-based Streaming Data Architectu...
 
Big Data Meets IoT: Lessons From the Cloud on Polling, Collecting, and Analyz...
Big Data Meets IoT: Lessons From the Cloud on Polling, Collecting, and Analyz...Big Data Meets IoT: Lessons From the Cloud on Polling, Collecting, and Analyz...
Big Data Meets IoT: Lessons From the Cloud on Polling, Collecting, and Analyz...
 
Innovation in the Data Warehouse - StampedeCon 2016
Innovation in the Data Warehouse - StampedeCon 2016Innovation in the Data Warehouse - StampedeCon 2016
Innovation in the Data Warehouse - StampedeCon 2016
 
Creating a Data Driven Organization - StampedeCon 2016
Creating a Data Driven Organization - StampedeCon 2016Creating a Data Driven Organization - StampedeCon 2016
Creating a Data Driven Organization - StampedeCon 2016
 
Using The Internet of Things for Population Health Management - StampedeCon 2016
Using The Internet of Things for Population Health Management - StampedeCon 2016Using The Internet of Things for Population Health Management - StampedeCon 2016
Using The Internet of Things for Population Health Management - StampedeCon 2016
 

Recently uploaded

原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
v3tuleee
 
Adjusting OpenMP PageRank : SHORT REPORT / NOTES
Adjusting OpenMP PageRank : SHORT REPORT / NOTESAdjusting OpenMP PageRank : SHORT REPORT / NOTES
Adjusting OpenMP PageRank : SHORT REPORT / NOTES
Subhajit Sahu
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
Oppotus
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Subhajit Sahu
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
rwarrenll
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
balafet
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
Subhajit Sahu
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
ewymefz
 

Recently uploaded (20)

原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
 
Adjusting OpenMP PageRank : SHORT REPORT / NOTES
Adjusting OpenMP PageRank : SHORT REPORT / NOTESAdjusting OpenMP PageRank : SHORT REPORT / NOTES
Adjusting OpenMP PageRank : SHORT REPORT / NOTES
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 

Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015

  • 1. © 2015 ID Analytics, Inc. Confidential Identity Fraud Protection Using Big Data Analytics Stephen Coggeshall July 16, 2015
  • 2. © 2015 ID Analytics, Inc. Confidential • Who am I? • Who is ID Analytics? • Everything you ever wanted to know about identity fraud • Our technology stack: billions of records examined in near real time Outline 2
  • 3. © 2015 ID Analytics, Inc. Confidential ID Analytics Overview • Founded in San Diego, CA in 2002 • Powered by analytics, differentiated by data • Focused on empowering leading organizations to make better fraud, credit and identity risk decisions • Over 300 leading U.S. enterprises rely on ID Analytics solutions every day… - 4 of the top 6 financial institutions - 4 of the top 5 wireless carriers - Government agencies: Social Security Administration and Veterans Affairs 3 ID Analytics applies advanced analytics to a unique source of U.S. Identity data, solving critical fraud, identity and credit challenges to help enterprises grow safely
  • 4. © 2015 ID Analytics, Inc. Confidential Identity Fraud is the act of misrepresenting which person you are Why is it done? • To improperly get products or services (financial services, consumer products…) • To stay “unidentified” while behaving badly (money laundering, terrorists…) What Is Identity Fraud 4
  • 5. © 2015 ID Analytics, Inc. Confidential Ways to Classify Identity Fraud • Financial identity fraud ̶ Account openings ̶ Account takeover • Health care id fraud • Tax id fraud • Money laundering • Terrorist activity Classify by Industry/Target • Identity Theft • Identity Manipulation • Synthetic Identity Classify by Method Used 5
  • 6. © 2015 ID Analytics, Inc. Confidential Three Types of Identity Fraud Who is the victim? Nature of the misrepresentation Identity Theft Core identity: Victim • Owner of misused identity • The company providing product/service • SSN, name and date of birth belong to the victim • Address, phone, and/or email belong to fraudster Identity Manipulation Core identity: Fraudster • Fraudster • The company providing product/service • SSN, date of birth and/or name vary slightly from the fraudster’s own, correct information Synthetic Identity Core identity: None • No direct consumer victim • The company providing product/service • SSN, name and date of birth are fabricated or chosen randomly 6
  • 7. © 2015 ID Analytics, Inc. Confidential • Fraudster improperly uses another person’s identity information – New account origination (name, SSN, DOB) – Account takeover (name, account number) • Fraudster frequently uses his own contact information – (Phone, address, email) We All Know About Identity Theft 7
  • 8. © 2015 ID Analytics, Inc. Confidential Example of Severe Identity Manipulator 9 different first names 5 different last names 24 different SSNs 11 different DOBs Suspicious address variation 8
  • 9. © 2015 ID Analytics, Inc. Confidential Description of Synthetic Identity Fraud SSN “Charles Smith” DOBAddress Seen 1x Phone John Trufante Seen 10xs Address DOB Phone 9
  • 10. © 2015 ID Analytics, Inc. Confidential Example Identity Fraud Ring • 85 phone & credit card applications from these 6 people from one address (close to Anacostia Park) in Washington, DC over 3 years. Sharing of SSNs, DOBs, names. • An additional 5 ID theft victims; 2 victims are deceased (ID theft of the dead). Ring is still active in September 2014. PII has been changed 10 Six People, Identity Manipulation and Identity Theft 1 Gerald Smith 24 yrs 2 FNs 10 apps 2 Corona Jones 24 yrs 2 SSNs, 2 LNs 12 apps 3 Corona Jones 52 yrs 3 SSNs, 2 DOBs, 2 FNs 5 apps 4 Monique Jones 43 yrs 2 SSNs, 3 LNs 9 apps 5 Latasha Jones 21 yrs 3 SSNs, 2 DOBs 26 apps 6 Angel Jones 21 yrs No identity manipulation 12 apps
  • 11. © 2015 ID Analytics, Inc. Confidential Example Identity Fraud Ring Moved 11/2011 • 345 credit card apps, 1 payday loan from these 4 fraudsters from 2 addresses. Frank uses his college email (retired professor). • Started with Frank & Hatti, then Dottie. Later Freida joined. PII has been changed Indianapolis, IN area 11 Four People, Identity Manipulation Fraud 1 Hatti Smith 48 yrs 12 SSNs, 3 DOBs, 2 FNs, 3 LNs 194 apps 2 Frank Smith 75 yrs 7 SSNs, 5 DOBs, 2 FNs, 2 LNs 117 apps 3 Dottie Smith 71 yrs 2 SSNs, 3 DOBs, 4 FNs, 2 LNs 10 apps 4 Freida Jones 48 yrs 2 SSNs, 2 LNs 24 apps
  • 12. © 2015 ID Analytics, Inc. Confidential Identity Fraud Ring Locations 12
  • 13. © 2015 ID Analytics, Inc. Confidential • Receive the application (SNAPD: SSN, Name, Address, Phone, DOB) • Build the PII-linked graph • Translate this graph into numbers • These features are the inputs to machine learning algorithms • Calculate the score • Return the score and reason codes What’s Behind The ID Score? 13 All this is done in ~200 ms. Our products are real time delivered and near real time aware.
  • 14. © 2015 ID Analytics, Inc. Confidential • ~2 billion applications for credit cards, mobile phones, retail credit, other loans… • U.S. white pages, (NAP*) ~100 million records monthly over ~10 years • Header files (SNAPD*), ~200 million records monthly over ~10 years • ~3 million labeled output records of various frauds • Account performance data, ~100 million/month • Account changes, ~10 million/month • Many other smaller files (SSA DMF, OFAC, census…) • > trillion data elements • Data is time stamped – can “roll back the clock” Data 14 *SNAPD – SSN, Name, Address, Phone, Date of birth
  • 15. © 2015 ID Analytics, Inc. Confidential • Support Vector Machines (SVM) • Traditional Neural Nets • Boosted Trees • Random Forests • Convolutional (Deep) Neural Nets • K-Means Clustering • Others – linear, logistic regressions, CART/CHAID, radial basis functions, KNN… Machine Learning/Modeling Algorithms 15
  • 16. © 2015 ID Analytics, Inc. Confidential • Identity Risk Scores – requires near real time assembly of near real time data for near real time score delivery • Identity Resolution – look back through all data over time and people to resolve an identity when presented with fragmented information. Needs knowledge of complete PII history. • Find fraud rings – examine multiple fuzzy linkings across billions of records. Can be batch. Services That Need Specialized Technology 16 These require very special data organization and systems
  • 17. © 2015 ID Analytics, Inc. Confidential • The core of what we observe is events, like applications for products and services • Look across the flow of events for – anomalous interconnections – connections of known bad events • Fraud scores find events with anomalous connections • Gather known bad events, connect by address, phone number, email • Remove false positives (business, organization…) • Remainder are candidates for fraud rings Systematically Find Thousands of Fraud Rings 17
  • 18. © 2015 ID Analytics, Inc. Confidential 18 Lambda Architecture Real Time Data Flow Batch Data Flow Speed Layer Batch Layer Serving Layer Reporting, BI RDBs RDB (RO, RW) Flat files Real time services N+1 redundancy Batch processing Analysis R&D Near real time synchronization Real time service delivery ~200 ms response time RDB (RO, RW) Flat files Hadoop, Spark, Hive Real time services N+1 redundancy
  • 19. © 2015 ID Analytics, Inc. Confidential We have identified three methods of identity fraud • Identity Theft, Identity Manipulation and Synthetic Identity Real time fraud detection and awareness requires very careful system architecture • Data ingestion, storage, retrieval • Separation of real time, batch and BI/reporting • Optimization of data layout Summary 19

Editor's Notes

  1. The table above summarizes eh characteristics of 3 distinct identity fraud types that are often confused Ultimately, the difference between identity fraud, identity manipulation, and synthetic identity fraud manifests in how the fraudster obtains or creates the asserted PII, including the SSN, and the resulting indicator of fraud.
  2. The table above summarizes eh characteristics of 3 distinct identity fraud types that are often confused Ultimately, the difference between identity fraud, identity manipulation, and synthetic identity fraud manifests in how the fraudster obtains or creates the asserted PII, including the SSN, and the resulting indicator of fraud.
  3. “Charles Smith” applied for a credit card for the first time in 2010, prior to this he was never seen before “Charles Smith used a valid SSN to apply, however, that same SSN was used to apply for two retail cards for a completely different identity: John Trufante John and Charles have different names, dates of birth, addresses, and phone numbers. In fact, the addresses they used to apply were nearly 100 miles apart “Charles Smith” fulfills the algorithm for identifying a synthetic identity. He ahs never been seen before this application and the SSN he is asserting appears to belong to a completely different person As further evidence of fraud, John Trufante again applied for credit from another credit card company three months after “Charles Smith” appeared This strongly suggests that “Charles Smith” used John Trufante’s SSN to open a new account with a major lender, but because the new account uses fabricated, unshared, credentials, it is synthetic fraud, not identity theft
  4. “Charles Smith” applied for a credit card for the first time in 2010, prior to this he was never seen before “Charles Smith used a valid SSN to apply, however, that same SSN was used to apply for two retail cards for a completely different identity: John Trufante John and Charles have different names, dates of birth, addresses, and phone numbers. In fact, the addresses they used to apply were nearly 100 miles apart “Charles Smith” fulfills the algorithm for identifying a synthetic identity. He ahs never been seen before this application and the SSN he is asserting appears to belong to a completely different person As further evidence of fraud, John Trufante again applied for credit from another credit card company three months after “Charles Smith” appeared This strongly suggests that “Charles Smith” used John Trufante’s SSN to open a new account with a major lender, but because the new account uses fabricated, unshared, credentials, it is synthetic fraud, not identity theft
  5. “Charles Smith” applied for a credit card for the first time in 2010, prior to this he was never seen before “Charles Smith used a valid SSN to apply, however, that same SSN was used to apply for two retail cards for a completely different identity: John Trufante John and Charles have different names, dates of birth, addresses, and phone numbers. In fact, the addresses they used to apply were nearly 100 miles apart “Charles Smith” fulfills the algorithm for identifying a synthetic identity. He ahs never been seen before this application and the SSN he is asserting appears to belong to a completely different person As further evidence of fraud, John Trufante again applied for credit from another credit card company three months after “Charles Smith” appeared This strongly suggests that “Charles Smith” used John Trufante’s SSN to open a new account with a major lender, but because the new account uses fabricated, unshared, credentials, it is synthetic fraud, not identity theft