{"id":1493,"date":"2019-02-18T01:26:10","date_gmt":"2019-02-18T01:26:10","guid":{"rendered":"http:\/\/kusuaks7\/?p=1098"},"modified":"2023-08-14T09:17:51","modified_gmt":"2023-08-14T09:17:51","slug":"three-types-of-fraud-graph-analytics-can-help-defeat","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/three-types-of-fraud-graph-analytics-can-help-defeat\/","title":{"rendered":"Three Types of Fraud Graph Analytics Can Help Defeat"},"content":{"rendered":"<p>Organizations across industries are adopting graph analytics to reinforce their anti-fraud programs. In this post, we examine three types of fraud graph analytics can help investigators combat:<\/p>\n<ul>\n<li><a href=\"https:\/\/linkurio.us\/blog\/3-fraud-graph-analytics-help-defeat\/#insurancefraud\" rel=\"noopener\">insurance fraud<\/a>,<\/li>\n<li><a href=\"https:\/\/linkurio.us\/blog\/3-fraud-graph-analytics-help-defeat\/#creditcardfraud\" rel=\"noopener\">credit card fraud<\/a>,<\/li>\n<li><a href=\"https:\/\/linkurio.us\/blog\/3-fraud-graph-analytics-help-defeat\/#vatfraud\" rel=\"noopener\">VAT fraud.<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Detecting fraud is about connecting the dots<\/h2>\n<p>&gt;<\/p>\n<p>In many areas, fraud investigators have at their disposal large datasets in which clues are hidden. These clues are left behind by criminals who, on their side, try to hide their activity behind layers of more or less intricate schemes. To unveil illegal activities, investigators have to connect the pieces of the puzzle to discover evidence of wrongdoing.<\/p>\n<p>Most anti-fraud applications are able to connect simple data points together to detect suspicious behaviors: an IP address to a user, withdrawal activities to a place of residence, or a loan request history to a client.<\/p>\n<p>But these applications fall short on more complex analysis that would imply several levels of relationships or data types. This is mostly due to the technology on which these applications often rely and the data silos it creates. The relational databases that emerged in the \u201980s are efficient at storing and analyzing tabular data but their underlying data model makes it difficult to connect data scattered across multiple tables.<\/p>\n<p>The graph databases we\u2019ve seen emerge in the recent years are designed for this purpose. Their data model is particularly well-suited to store and to organize data where\u00a0<a href=\"https:\/\/linkurio.us\/blog\/unlocking-value-connected-data\/\" rel=\"noopener\">connections are as important as individual data points<\/a>. Connections are stored and indexed as first-class citizens, making it an interesting model for investigations in which you need to connect the dots. In this post, we review three common fraud schemes and see how a graph approach can help investigators defeat them.<\/p>\n<p>&gt;<\/p>\n<h2>3 types of fraud graph analytics can combat<\/h2>\n<p>&gt;<\/p>\n<h2 id=\"insurancefraud\">1) Insurance fraud<\/h2>\n<p>Insurance fraud encompasses any act committed in the intent of defrauding an assurance process. It ranges from staged car accidents to faked deaths or exaggerated property damages. The FBI estimates that\u00a0<a href=\"https:\/\/www.fbi.gov\/stats-services\/publications\/insurance-fraud\" rel=\"noopener\">insurance fraud cost $40 billion<\/a>\u00a0per year in the U.S.<\/p>\n<p>As an example, people frequently team up and put together fake road traffic accident (RTA) claims, in which they report hard-to-disprove, light, personal injuries. Those fraud rings involve several criminal playing the various roles of conductors, passengers, witnesses and even doctors that certify injuries, or accomplice lawyers that file the claim.<\/p>\n<p style=\"text-align: center;\">\n<p>There are too many claims filed every day for insurance analysts to analyze manually. Fraud investigation units have to rely on simple business rules to identify suspicious claims. But if the fraudsters made sure to avoid red flag case elements (unusual injury, recently purchased insurance policy, low velocity but significant injury etc) there is a chance they will go undetected and repeat the scheme.<\/p>\n<p>This is where graph technology steps in. The graph approach brings data from various sources under a common model, so investigators can look at\u00a0<i>all\u00a0<\/i>the data at the same time, instead of isolated data silos. And this is exactly what they need because in these situations, what often gives away the fraudsters is abnormal connections to other elements.<\/p>\n<p>These suspicious connections could be that the witness\u2019s wife is connected to two similar cases, or that the doctor\u2019s phone number is the same as the one of a conductor involved in another RTA claims, etc. Graph visualization and analysis platforms like Linkurious Enterprise allow investigators to pick up suspicious signs faster. They get a better understanding of the \u201cbig picture\u201d and can identify abnormal connections to\u00a0<a href=\"https:\/\/linkurio.us\/blog\/whiplash-for-cash-using-graphs-for-fraud-detection\/\" rel=\"noopener\">detect insurance fraud<\/a>.<\/p>\n<p style=\"text-align: center;\">\nAbove is an example graph visualization where we can identify one of those abnormal patterns that indicate insurance fraud of staged car accidents: Two customers (blue nodes) filed three claims (green nodes). We can identify a network of three customers connected through personal information such as phone (brown nodes), email (pink nodes) with the same lawyer (green node) involved every time. It is likely they are recycling stolen or fake identity to file fraudulent claims.<\/p>\n<h2 id=\"creditcardfraud\">2) Payment card fraud<\/h2>\n<p>Payment card fraud takes the form of criminals getting ahold of credit card information and proceeding to create unauthorized transactions. Card-present scenarios, in which criminals use a stolen or counterfeit credit card at an ATM or at the point-of-sale (POS) terminal of a physical store, affected\u00a0<a href=\"https:\/\/geminiadvisory.io\/card-fraud-on-the-rise\/\" rel=\"noopener\">45,8 million cards in the U.S<\/a>\u00a0in 2018. Despite a massive migration to the safer chip-based card, stolen credit card fraud is still a major issue.<\/p>\n<p>In a commonly encountered situation, a criminal proceeds the following way:<\/p>\n<ul>\n<li>set up skimming devices at ATM or gas pump to steal the details stored in card\u2019s magnetic stripes;<\/li>\n<li>replicate the stolen card information into a counterfeit card;<\/li>\n<li>use to stolen cards to withdraw money at ATM, buy goods or gift cards at shops;<\/li>\n<li>cardholders notice unusual activity on their bank account and notify the authority.<\/li>\n<\/ul>\n<p style=\"text-align: center;\">\n<p>These situations are a perfect case for graph technology. While traditional technologies will hardly allow you to create a \u2018big picture\u2019 of heterogeneous data, the graph approach lets you collect the data in a model linking together: cardholders, transactions, terminals, and locations.<\/p>\n<p>This way, when authorities are confronted with a surge of card-present fraud cases in a given region, graph technology can help\u00a0<a href=\"https:\/\/linkurio.us\/blog\/stolen-credit-cards-and-fraud-detection-with-neo4j\/\" rel=\"noopener\">identify the common point of compromise<\/a>\u00a0by highlighting the common links within the various reported cases, no matter how large the dataset is. Credit card fraud is thus another type of fraud graph analytics can help detect and fight.<\/p>\n<p style=\"text-align: center;\">\n<p>Above is an example of a graph visualization to identify a common point of compromise: Clients (blue nodes) report fraudulent purchases (orange nodes). We can identify through connections the common ATM (purple) where they made a withdrawal before the card was compromised.<\/p>\n<h2 id=\"vatfraud\">3) VAT fraud<\/h2>\n<p>Carousel fraud, also known as the missing trader, or VAT fraud, is the theft of VAT collected on the sale of goods initially bought VAT-free in another jurisdiction. This scheme is difficult to identify in time and losses can be massive as recent cases have shown.<\/p>\n<p>In 2018, a single\u00a0<a href=\"https:\/\/www.europol.europa.eu\/newsroom\/news\/eu-wide-vat-fraud-organised-crime-group-busted\" rel=\"noopener\">VAT fraud ring cost more than 60 million euros<\/a>\u00a0to the European economy. The criminal organization was selling products online through a wide network of shell companies and producing false invoices to perform VAT fraud. Generally, this is how the carousel works:<\/p>\n<ul>\n<li>Company A sells the goods company B VAT-free<\/li>\n<li>Company B sells the goods to company C, charging the VAT<\/li>\n<li>Company C sells the goods and claims a VAT refund to the tax agency of country A<\/li>\n<\/ul>\n<p style=\"text-align: center;\">\n<p>Those schemes are intricate and transactions quickly come after one after another to avoid raising suspicion. To make sense of the layers behind which criminals hide, investigators need an overview of the situation. Once again, graph technology can help bring together various data types to get a better understand of the financial context.<\/p>\n<p>Then, platforms like Linkurious Enterprise provide support for pattern finding activity, leveraging the flexible query semantic of graph databases. Investigators can search across vast data collections for patterns indicative of the carousel: for example multiple transactions occurring in a short amount of time between companies from two different countries with a newly created intermediary company. From there, investigators can monitor flagged patterns and\u00a0<a href=\"https:\/\/linkurio.us\/blog\/vat-fraud-mysterious-case-missing-trader\/\" rel=\"noopener\">assess the existence of potential carousel fraud<\/a>.<\/p>\n<p style=\"text-align: center;\">\n<p>Above is an example of a visualization to identify chains of transactions in VAT fraud: Companies (blue nodes) and their parent organizations (flags nodes) sell goods VAT-free and collect back VAT through complex layers of sales between EU and non-EU countries.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Organizations across industries are adopting graph analytics to reinforce their anti-fraud programs. In this post, we examine three types of fraud graph analytics can help investigators combat: insurance fraud, credit card fraud, VAT fraud. &nbsp; Detecting fraud is about connecting the dots &gt; In many areas, fraud investigators have at their disposal large datasets in<\/p>\n","protected":false},"author":130,"featured_media":22137,"comment_status":"open","ping_status":"open","sticky":false,"template":"single-post-2.php","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[95],"ppma_author":[2643],"class_list":["post-1493","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-big-data-amp-technology"],"authors":[{"term_id":2643,"user_id":130,"is_guest":0,"slug":"elise-devaux","display_name":"Elise Devaux","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"Devaux","first_name":"Elise","job_title":"","description":"Elise Devaux is Marketing Project Manager at chez Linkurious SAS, which provided the data analytics software behind the Paradise Papers, to help cover the emerging graph technology use cases. Prior to Linkurious, she worked in the humanoid robotics industry to support and foster Softbank Robotics developer community."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/130"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=1493"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1493\/revisions"}],"predecessor-version":[{"id":30191,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1493\/revisions\/30191"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/22137"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=1493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=1493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=1493"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=1493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}