Facebook Twitter Instagram
    Trending
    • 5 Ways Technology Makes Your Business Efficient
    • The Journey from Tech Side Project to Return on Investment
    • Top 3 Best Tech Advancements to Help You De-Stress
    • Advancements in Car Technologies Affecting Infrastructure Development
    • David Marcus Talks about the Blurred Lines in Cybersecurity
    • Audi and the Massive Automotive Changes Between 2025 and 2030
    • How to Deploy Managed IT Services in a Mixed Mac and Windows Environment
    • 5 Tech Developments That Have Revolutionized Investing
    TechSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    • News & Analysis
      Featured
      March 6, 20211

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      April 9, 2021

      CISO Panel Discussion Weighs in on Cybersecurity in the Digital Age

      April 2, 2021

      FTC vs. Qualcomm: Did Apple Illegally Influence The FTC?

      April 2, 2021

      A Look at Microsoft Mesh

    • Business
      Featured
      March 6, 20211

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      April 21, 2021

      5 Ways Technology Makes Your Business Efficient

      April 21, 2021

      The Journey from Tech Side Project to Return on Investment

      April 19, 2021

      How to Deploy Managed IT Services in a Mixed Mac and Windows Environment

    • Security
      Featured
      March 7, 20211

      Pandemic Unmasks Vulnerability to Automated Bot Attacks

      Recent
      April 13, 2021

      Shashi Prakash Chats about Cryptocurrency and NFT Fraud

      March 30, 2021

      Exploiting Embedded Linux Devices Through the JTAG Interface

      March 28, 2021

      Zero Trust for Data

    • Microsoft
      Featured
      September 12, 20201

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      Recent
      September 12, 2020

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      July 13, 2020

      Learning from the Microsoft Store Failure

      May 15, 2020

      The Microsoft Surface Earbuds: How Many Ways Can You Say “Awesome!”?

    • Podcasts
    • Technology
      Featured
      March 1, 20212

      Could Home Study Be Better for Education? Using Technology to Craft a Better Tomorrow

      Recent
      April 21, 2021

      Top 3 Best Tech Advancements to Help You De-Stress

      April 20, 2021

      Advancements in Car Technologies Affecting Infrastructure Development

      April 19, 2021

      Audi and the Massive Automotive Changes Between 2025 and 2030

    • Reviews
      Featured
      March 4, 20210

      Dell’s UltraSharp 40 – Improving Work and Workplaces with Monitor Innovations

      Recent
      8.0
      March 29, 2021

      Review: Peril Protect

      10.0
      March 15, 2021

      Review: Tesla Puddle Lights

      9.0
      March 13, 2021

      Review: Ubiquiti UniFi Dream Machine Pro

    TechSpective
    You are at:Home»Security»Encryption»Fighting Financial Fraud with Consilient and Intel SGX
    Intel SGX Consilient financial fraud money laundering
    Image from Pixabay

    Fighting Financial Fraud with Consilient and Intel SGX

    0
    By Tony Bradley on December 8, 2020 Encryption, Intel, Privacy, Security Awareness

    Intel is a sponsor of TechSpective

    When it comes down to it, money is involved in virtually every form of crime and cybercrime. In many cases, money itself is the primary target, but even when it isn’t, it still plays a vital and central role. Criminals leverage technology to launder and move money—funneling Illicit funds to finance criminal networks, rogue regimes, terrorist activities, and more. Consilient recently launched with a goal to develop a more effective approach to discovering and mitigating financial crime risk.

    Consilient was created through a partnership between K2 Integrity and Giant Oak. Gary Shiffman, founder and CEO of Giant Oak and inventor of GOST—a machine learning based screening platform, and Juan Zarate, co-managing partner and Chief Strategy Officer at K2 Integrity, co-founded Consilient to combine deep knowledge of anti-money laundering (AML) and countering of financial terrorism (CFT) knowledge with cutting edge technology, including Intel Software Guard Extensions (Intel SGX), to develop a secure, dynamic, and effective solution to help financial institutions.

    Fighting Financial Fraud

    Criminal activity within the financial system is a massive global problem. Estimates suggest that between $800 billion and $2 trillion of criminal transactions are moved through financial institutions annually. What is more alarming is that it is also estimated that less than one percent of that activity is intercepted.

    An article from McKinsey & Company points out that there has been a rise in technology aimed at helping financial institutions address the problem. However, the article also reveals that as much as 85 percent of financial crimes compliance and anti-money laundering activities are conducted manually.

    Consilient’s Zarate declared, “The current global AML/CFT system is an outdated model that requires a new 21st century design that allows financial institutions, authorities, and other regulated actors in the financial system the ability to discover and manage evolving and complicated illicit financing risks to the financial system more proactively, effectively, and efficiently.”

    One of the biggest challenges in fighting financial crime is the inability to effectively share information and compare notes between financial institutions. Each company is a silo—an island unto itself. Working in isolation with access to limited information, they have a very limited ability to identify and report suspicious activity. They need to be able to step back and see the larger picture—view larger patterns and connect the dots.

    Financial institutions need to overcome these blind spots in order to effectively track sophisticated criminals who are able to exploit weaknesses in the system to obscure their activities. One solution is to encourage organizations to share information and work collectively to identify risks and understand trends. There are significant regulatory constraints and privacy concerns, however, when it comes to sharing sensitive customer and financial data that make such cooperation difficult.

    Consilient intends to solve this challenge through the use of Federated Learning with its proprietary DOZER technology. They have created a behavioral-based machine learning-driven governance model. The approach allows its algorithm to access and analyze data from different data sets, financial institutions, and regions without moving the actual data.

    Intel SGX and Federated Learning

    Consilient overcomes the challenges of organizational silos, and the information-sharing and privacy constraints of traditional AML / CFT systems by building models of what “normal” or “legal” behavior looks like and analyzing activity to identify transactions or patterns that are out of the ordinary.

    It is essential to have end-to-end security and privacy safeguards in place to ensure that data remains private and confidential. It is also crucial that the underlying model inside DOZER is protected from theft that could allow attackers to expose data or tamper with the algorithms. To provide these protections and assure the integrity and accuracy of the model, Consilient leverages hardware-based Trusted Execution Environments (TEEs) using Intel SGX.

    Intel SGX Consilient financial fraud money laundering

    A white paper on the solution, “Federated Learning through Revolutionary Technology,” explains, “Intel Software Guard Extensions is a hardware-based TEE that helps protect against code / data snooping, as well as code and data modifications by malware on the system. The technology has the root of trust limited to a small portion of the CPU hardware and the machine learning application itself. The fundamental principle behind Intel SGX is to minimize the trusted computing base in order to significantly reduce the attack surface from where an attack can be launched.”

    Incorporating Intel SGX into the federated learning approach of DOZER enables Consilient to protect against software attacks and attacks against memory content. Data and encryption keys remain protected even in the case of an insider attack or if an attacker is able to gain full control of a target system, and Intel SGX guards against memory bus snooping, memory tampering, and other attacks against contents in RAM. Intel SGX also increases confidence in the integrity of the model and data by providing hardware-based attestation capabilities that allow for valid code and data signatures to be measured and verified.

    The Future of AML / CFT Systems

    “Identifying and disrupting the financial networks of criminal enterprises is a top priority for our member banks. This promising technology presents new opportunities to more effectively identify illicit financing at the source,” commented Banking Policy Institute President and CEO Greg Baer.

    Zarate is presenting a keynote session this week at the ABA / ABA Financial Crimes Enforcement Conference to highlight persistent issues with money laundering and financial crime. He will stress the crucial role of new technologies and the use of machine learning to effectively and efficiently address these challenges.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThe Tech Tools to Enhance Your Remote Working Platform Experiences
    Next Article The Best Practices of Digital Adoption
    Tony Bradley
    • Website
    • Facebook
    • Twitter
    • LinkedIn

    I have a passion for technology and gadgets--with a focus on Microsoft and security--and a desire to help others understand how technology can affect or improve their lives. I also love spending time with my wife, 7 kids, 2 dogs, 5 cats, 1 rabbit, 2 ferrets, a pot-bellied pig, and sulcata tortoise, and I like to think I enjoy reading and golf even though I never find time for either. You can contact me directly at tony@xpective.net. For more from me, you can follow me on Twitter, Facebook, Instagram and LinkedIn.

    Related Posts

    Shashi Prakash Chats about Cryptocurrency and NFT Fraud

    Exploiting Embedded Linux Devices Through the JTAG Interface

    Zero Trust for Data

    Leave A Reply Cancel Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Site Sponsors
    Qualys
    Intel
    Adobe
    PopSpective
    Coffee and Politics
    DevOps.com
    • Technology
    • Popular
    • Top Reviews
    April 21, 2021

    Top 3 Best Tech Advancements to Help You De-Stress

    April 20, 2021

    Advancements in Car Technologies Affecting Infrastructure Development

    April 19, 2021

    Audi and the Massive Automotive Changes Between 2025 and 2030

    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    9.7
    November 16, 2018

    Review: BlackVue DR900S-2CH Vehicle Dash Cam

    9.5
    September 2, 2015

    Review: Microsoft Band

    May 27, 2014

    Protect your family photos with ScanMyPhotos

    Popular Posts
    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    Qualys
    Qualys
    PopSpective
    Qualys
    About

    TechSpective covers technology trends and breaking news in a meaningful way that brings value to the story, and provides you with information that is relevant to you. We offer in-depth reporting and long-form feature stories, as well as breaking news coverage, product reviews, and community content in plain English terms, and with a unique perspective on technology.

    Qualys
    © 2020 Xpective, Inc.
    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact

    Type above and press Enter to search. Press Esc to cancel.