News

00:19 AM
Connect Directly
RSS
E-Mail
50%
50%

Defensive Posture

Banks seek continual improvement in security strategies and tactics.

The Best Defense

Terrorists do not walk through walls. They're flesh-and-blood beings who need to travel, talk to one another, eat and sleep. Often, these activities require access to the banking system. To the extent that terrorists can hide their identities and their financial transactions, they can plan attacks unabated. That's why law enforcement has turned to banks for help in detecting individuals on terrorist watch lists. During the account-opening process, banks request data that is not only helpful for assessing the potential risk of a loan, but also can help to unmask stolen or fake identities.

Using a combination of public records and proprietary techniques, SRD (Las Vegas) allows banks to verify customer data and make sure that it's stored in a format amenable to rapid and accurate searching. With this technology comes the ability to cross-reference data points from within the customer base. If two customers share the same beneficiaries, emergency contacts or phone numbers, the SRD system automatically generates a report that points out the accounts that bear further investigation. "Instead of a very large stack of suspicious activity, you're going to have a smaller, more refined stack," says John Slitz, SRD's CEO.

SRD also has tackled the problem of how to cross-reference customers from different institutions. Banks are loath to provide customer lists to competitors, even if for noble purposes. In response, SRD has developed a "hashing" algorithm that transforms each data element into a string of coded characters. Instead of two banks exchanging real customer names and addresses, they exchange encrypted versions of customer data. If there's a connection worth pursuing, the compliance officers at the respective financial institutions can then follow up with identifiable information.

But everyone else's information remains within the banks' walls. "They want that evaluation to take place in a way that protects the privacy of the individual and is not data-mining," Slitz says. "They want to be able to find that 'Joe Smith' is a relation to 'Fred Barnes,' and Fred is a known, convicted felon for money laundering, and that association makes Joe Smith a reasonable and particular lead for them to investigate."

Previous
3 of 3
Next
Comment  | 
Print  | 
More Insights
Register for Bank Systems & Technology Newsletters
White Papers
Current Issue
Bank Systems & Technology Dec. 2, 2014
BS&T's 2014 Elite 8 executives are leading their banks to success, whether it involves leveraging the cloud, modernizing core systems, or transforming into digital enterprises.
Slideshows
Video
Bank Systems & Technology Radio
Archived Audio Interviews
Join Bank Systems & Technology Associate Editor Bryan Yurcan, and guests Karen Massey and Jerry Silva from IDC Financial Insights, for a conversation about the firm's 11th annual FinTech rankings.