SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
The Future of Fighting Government Benefit Fraud 1
Digital Forensics and Data Mining: The Future of Fighting Government Benefit Fraud
Elizabeth Branney-Gant
The Future of Fighting Government Benefit Fraud 2
The Future of Fighting Government Benefit Fraud 3
Table of Contents
Abstract.............................................................................................................................. 4
Digital Forensics and Data Mining: The Future of Fighting Government Benefit
Fraud.............................................................................................................................................. 5
1. Current Challenges in Government Benefit Fraud ................................................... 5
2. Digital Forensics ....................................................................................................................6
3. How Digital Forensics and Data Mining Can Be Conjoined to Fight Benefit Fraud:
Build a Layered Defense ...........................................................................................................6
4. Predictive Fraud Modeling and Analytics...........................................................................13
5. Conclusion............................................................................................................................14
References........................................................................................................................ 15
The Future of Fighting Government Benefit Fraud 4
Abstract
Government agencies are increasingly a target for government benefit fraud. As
government agencies move from in person services to Internet or multi-channel services, the
need to "know your customer" to prevent and identify fraud increases. Private sector companies
have developed many strategies to know their customers in a multi-channel environment. Public
sector agencies have unique challenges not faced by private sector agencies: legacy programs,
budgets publically decided years in advance, public procurement regulations and the scrutiny of
public opinion to name a few. This paper explores: current challenges in government benefit
fraud, how digital forensics and data mining can be conjoined to fight benefit fraud and possible
future solutions.
Keywords: digital forensics, data mining, benefit fraud, government, account change
alerts, two factor authentication, machine identification, MAC IDs, multi-page login sequence,
security images, security questions, IP geocoding, IP mapping, predictive fraud modeling, fraud
analytics, crime analytics, ideographic digital profiling, big data, personally identifiable
information, PII, identify theft.
The Future of Fighting Government Benefit Fraud 5
Digital Forensics and Data Mining: The Future of Fighting Government Benefit Fraud
1. Current Challenges in Government Benefit Fraud
Government benefit fraud can take a variety of forms: tax returns, insurance programs
(unemployment, disaster, crop) and income maintenance programs (WIC, SNAP, Medicaid, W-
2). Government programs are unique targets for fraud because government programs are
designed to be accessible in order to facilitate services to individuals who are in need of services.
Furthermore, government programs are increasingly doing business in a multi-channel service
environment.
Gone are the days of face-to-face interactions in most benefit programs. As government
agencies continue to move toward providing services over the phone and Internet, the risk of
fraud increases. Proper precautions must be taken to authenticate and differentiate between the
customers the programs are designed to serve from the fraudsters looking to exploit the system.
Government benefit fraud is increasingly perpetrated through organized multi-victim identity
theft scams (U.S. Department of Justice, 2015). Consequently, government benefit programs
have the need to design a layered defense that keeps system available1
to real beneficiaries and
equally importantly denies and/or detects fraudsters’ intrusions2
. This paper explores how the
fields of digital forensics, data mining and data analytics combined can be utilized to prevent and
investigate government benefit fraud.
1
Information assurance principle of “availability” means that, “the right information to the right people at
the right time”(Fick, 2009).
2
The information assurance principle of “authenticity”—establishing that the user logged into the system is really
the person whose credentials (credentials come in many forms user name or password or personally identifiable
information PII) are presented (Fick, 2009)
The Future of Fighting Government Benefit Fraud 6
2. Digital Forensics
Digital Forensics is “the application of computer science and investigative procedures for
a legal purpose involving analysis of digital evidence after proper search authority, chain of
custody, validation with mathematics, use of validated tools, repeatability, reporting and possible
expert presentation. (Sammons, 2012).
Digital forensics is a relatively new forensic science (Kessler, 2010). Yet digital forensics
has many sub-fields that if utilized properly, can position government agencies to strike the right
balance between the information assurance principles of availability and authenticity. For
example network forensics analysis focuses on properly capturing, recording and analyzing
network events to identify cyber threats and crimes.
Network forensics analysis generally takes one of two forms. One form is in analyzing
network traffic and another form is in log file analysis (Sindhu & Meshram, 2012). Harnessing
the power of network forensics is mission critical component of preventing and detecting
government benefit fraud. Network forensics is the ‘what needs to be done’ section 3 explores
the ‘how it can be done.’ Section 3 proposes critical infrastructure needed to build a layered
defense to keep fraudsters out. Likewise, the infrastructures suggested, increases the rate of
detection in the event that a fraudster gets into the system.
3. How Digital Forensics and Data Mining Can Be Conjoined to Fight Benefit Fraud: Build
a Layered Defense
Building a layered defense is a long standing military security principle. As the
information age has evolved and cybercrime increased, the principle started being applied to
network and information systems security. In the context of information security ‘building a
layered defense’ is often referred to as defense in depth (Fick, 2009). Defense in depth is an
The Future of Fighting Government Benefit Fraud 7
approach to managing risk that employs diverse defensive strategies. If one layer fails, another
layer presents a choke point in order to prevent a full breach (Branum, Gegick and Michael
2005).
Counter institutively, most cyber criminals have “sub-expert” skill levels when it comes
to committing cybercrime and avoiding detection. However, they can still do a great deal of
damage. On the other hand, employing the right network forensics techniques can aid in
preventing, detecting and investigating cybercrime (Steel, 2014).
The realization that most cyber criminals have “sub-expert” skill levels means that the
return on investment from building a layered defense would be high. However to efficiently
capitalize on any infrastructure investments, government agencies need to react with a sense of
urgency. Most cyber criminals are between the ages of 17 and 45 (Li, 2008). Generation X and
Millennials were the last generation to be introduced to technology in both digital and analog
terms (Garvey, 2015). Consequently the sophistication of the average cybercriminal is likely to
go up over time, due to the next generation of fraudsters being exposed to technology at a much
earlier age than the present generation of fraudsters.
Sections 3.1 through 3.6 explore options government agencies can employ based on their
fraud risk appetite. Ironically, the security options that are enumerated are the norm in the private
sector. The absence of similar options in the public sector has made government benefit
programs a target for cybercrime. Employing the right mix of these options can help government
programs ensure that they really ‘know the customer’ they are dealing with.
These options have a two-fold benefit: one benefit is that in and of themselves they can
help prevent fraud and detect fraud. A second benefit is that when fraud is detected, the
information (data) from the incidents and attacks can be collected and analyzed (data mining and
The Future of Fighting Government Benefit Fraud 8
data analytics). Simultaneously, that data can be maintained in a data warehouse in order to later
build real-time predictive fraud models and analytics tools. The power of big data and predictive
fraud modeling and analytics is explored in Section 4. The ability to prevent and detect fraud
while working toward predictive modeling is the future of fighting government benefit fraud.
3.1 Account Access and Account Change Alerts. Account access and change alerts are
one of the least invasive methods government agencies can employ to prevent fraud. Real world
example: someone contacts their bank to update their address. The bank updates the address and
contacts the customer (either through mail, email, text or prerecorded call) to verify that the
customer made the requested change. The customer is told that if they did not make the change,
that they should alert the bank immediately. The technology used to set up automated
notifications for account access change alerts could later be utilized in Two-Factor
Authentication (see Section 3.2). Public sector agencies would have to identify what changes to
accounts are the most indicative of fraud for their agency. Some potential changes indicative of
fraud are changes to: address, phone, email, direct deposit and username changes etc.
3.2 Two-Factor Authentication. Two-factor authentication or 2FA, has two layers of
authentication when logging into accounts. If someone only has to enter a username and
password, then they are using single factor authentication (something they know). 2FA requires
the user to have another credential (something they have). A more common every day example
would be using a credit card (something you have) and having to provide a zip code for the
mailing address (something you know) to authenticate the transaction (Rosenblatt, 2013).
The Future of Fighting Government Benefit Fraud 9
In the context of identity theft and government benefit fraud the options could look like this:
2FA is a form of secure access and identity management and if employed correctly can prevent
fraud beyond what identity proofing software alone can prevent. In this regard it can be paired
with or used separately to identify and prevent fraud. Agencies that use identity proofing should
collect failed log in attempts for analysis.
A cyber example of 2FA, that digital customers are accustomed to, would be: a customer
saving their bank account on their phone (or other device) and normally only accessing the
account from their phone (or other device). Most banks would make the user authenticate their
identity, if they tried to log in on another ‘unknown’ device. The customer would have
previously selected a communications preference (email, text, recorded voice etc.) when they set
up the online bank account. Consequently, the bank would authenticate the customer by sending
the customer a temporary password to the account (email, text, recorded voice etc.) the customer
provided when they set up their online bank account. Agencies can set thresholds, allow for
opting out, establish whitelists etcetera to account for claimants that use public computers so it
does not create a barrier to legitimate customers.
-Personally
identifiable
information (PII)
-Username
-Password
-Etc.
-Email account
-Mobile phone
-Telephone
-Machine fingerprint
-MAC ID
The Future of Fighting Government Benefit Fraud 10
3.2. Machine Fingerprinting. Has long been used by companies to identify a device
over the Internet without collecting any personally identifiable information. Collecting machine
prints allows marketing companies to manage their content and the delivery of the content to the
right customer at the right time. (digitalmarketing-glossary.com)
Companies also harness this tool to identify fraudsters. For example if one device has
launched an anomalous amount of transactions, the company can flag the device. After flagging
the device the company can review its activity to determine if it is a legitimate customer or a
fraudster. Government agencies can use this tool for authentication and identification purposes.
For example, a legitimate customer is always known to log on using a particular device
(identified by machine finger printing). A fraudster then attempts to log into the systems using a
customer’s credentials (username, password, PII etc.). The system could then deny service to the
fraudster until further authentication takes place (2FA, answering security questions correctly
etc.)
This layer of defense is promising, but it has limitations. For instance, if a user changes
enough features on their device it can generate a false flag. However, the system can be designed
to fail gracefully to minimize impact on legitimate customers. Furthermore, this situation can be
minimized if machine finger printing is paired with capturing MAC IDs.
3.3 MAC IDs. Media Access Control Address or MAC ID, is a “unique identified that is
assigned to devices that allows them to optimize communications over networks” (Slagan, 2013).
MAC IDs are a mission critical component to preventing and investigating government benefit
fraud for several reasons. One reason is because of the rise in use of burner and mobile devices,
to commit cybercrime. Burner and mobile devices often have generic IP addresses assigned to
The Future of Fighting Government Benefit Fraud 11
them; consequently sending subpoenas to the service providers often yields no results of
probative value.
However many wireless and burner device companies collect MAC IDs, so it can be a
valuable piece of information to collect for subpoena purposes. A second reason to collect MAC
IDs is that they can be used to differentiate between a fraudster and the true customers.
Furthermore, MAC IDs can be used to identify multi-victim frauds quickly because MAC IDs
are harder to mask than IP addresses and machine fingerprints alone.
3.4 Multi-Page Login Sequence and User Selected Security Images. Multi-page log in
sequences prevent customers (whether it is a business customer or a beneficiary customer) from
becoming the victim of phishing scams. Example without multi-page log in sequence: Customer
gets spoofed communications from government agency and follows the link to a fictitious
agency website. They enter their username and password on the first page. The fraudster now has
their username and password and any other information the customer provides before they
realize it is a spoofed website.
See examples in figures below from Nelnet.com a federal student loan company.
Claimant inputs username on 1st
t
page and is directed
to 2nd
page
Claimant inputs password on 2nd
page if they recognize the
security image they selected.
The Future of Fighting Government Benefit Fraud 12
Example with a multi-page log on sequence: prevents aforementioned scenario because
even if the claimant provides the fraudster with their username, the absence of their selected
security image on the second page alerts them to stop before entering their password. Also multi-
page log in sequences make bot attacks more complicated.
3. 5 Security Questions. User selected security questions and answers are a standard tool
for preventing identity theft online. However, they are not enough to prevent fraud in situations
where it is the fraudster setting up the account. Likewise, they are not enough to prevent a fraud
if a fraudster knows or obtains the answers. On the other hand they are classic tools to prevent
fraud. Furthermore, they can be utilized to identify multi-victim frauds. Answers to security
questions provided valuable data points because fraudsters often use a pattern of passwords.
3.6 IP Geocoding and Mapping. Collecting and analyzing IP addresses used to access
the system is a mission critical component to fighting government benefit fraud. Collecting IP
information enables quicker identification of multi-victim scenarios. IP addresses can be mapped
down to the zip code level. This information can provide critical intelligence to investigators
(Altoff, 2008). Likewise, it enables agencies to block known threats (blacklisting). There are
limitations to IP geocoding especially with wireless service providers and users that utilize
burner devices.
The Future of Fighting Government Benefit Fraud 13
4. Predictive Fraud Modeling and Analytics
IP address, machine fingerprinting and MAC IDs would ideally be used together to
strengthen fraud detection (increased accuracy) while also reducing false positives (decreased
disruptions to real claimants). Furthermore, collecting these 3 pieces of information (network
events) gives investigators multiple avenues to explore and to investigate any fraudsters that
successfully gain access to the system.
The network events enumerated in Sections 3.1 through 3.6 are events that can be of
great probative value on their own. The network events are even more valuable if they are
captured and stored in a data warehouse3
. If the aforementioned network events are captured
using forensically sound methods and stored in a data warehouse, then the scope and impact of
investigations increases exponentially. Simply put it allows analysts and investigators access to
the evidence.
Access to the evidence (in an unalterable state) allows analysts and investigators to both
identify and investigate frauds without fear of compromising the digital evidence. Therein is the
sweet spot: not only does implementing the aforementioned network infrastructure prevent fraud
but it also increases the rate and speed of detection. Furthermore, agencies can harness the power
of machine learning, predictive modeling and fraud analytics to make informed business
decisions (Cutts, 2015). Decisions properly formed based on machine learning, predictive
modeling and fraud analytics can be used to break the pay and chase cycle that many government
agencies face.
3
According to Designing Data Warehouses for Cyber Crimes, a data warehouse is, “a data repository that
contains historical data for effective data analysis and reporting processes. Data warehouses are designed to support
decision making by studying and analyzing complex sets of data.”
The Future of Fighting Government Benefit Fraud 14
5. Conclusion
Government agencies make unique targets for cybercrime. As government agencies
continue to move toward serving customers in multi-channel environments, the need to know
their customer increases. Government agencies can utilize network forensics and big data to
build a layered defense in order to increase the rate of fraud prevention and detection.
Furthermore, the information arms investigators with the tools they need to investigate and
subsequently pursue prosecution.
The Future of Fighting Government Benefit Fraud 15
References
Branded3. Altoff, P. (2008). Five Ways to Detect Fraud Using Geolocation.
https://www.branded3.com/blog/five-ways-to-detect-fraud-using-geolocation/
CNET. Rosenblatt, S. (2013). Two-Factor Authentication: What You Need to Know
(FAQ). http://www.cnet.com/news/two-factor-authentication-what-you
need-to-know-faq/
Department of Homeland Security. Branum,S. Gegick, M. and Michael, C. (2005).
Defense in Depth. Retrieved from https://buildsecurityin.us-
cert.gov/articles/knowledge/principles/defense-in-depth
Fick, J. (2009). Prevention is Better than Prosecution: Deepening the Defense
against Cyber Crime. Journal of Digital Forensics, Security and Law, Vol. 4(4), 51-72.
http://ojs.jdfsl.org/index.php/jdfsl/article/view/159/76
United States Department of Justice. (2015, April). Defendants Charged in Separate
Fraud Schemes that Resulted in Thousands of Identities Stolen and Used to Commit
Fraud Schemes. Retrieved from http://www.justice.gov/usao-sdfl/pr/defendants-
charged-separate-fraud-schemes-resulted-thousands-identities-stolen-and-used).
Kessler, G. (2010). Judges’ Awareness, Understanding, and Application of Digital
Evidence. Journal of Digital Forensics, Security and Law, Vol. 6(1), 55-72.
http://ojs.jdfsl.org/index.php/jdfsl/article/view/27
Li, X. (2008). The Criminal Phenomenon on the Internet: Hallmarks of Criminals and
Victims Revisited Through Typical Cases Prosecuted. Social Science Research
Network. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2034529
Make Use Of. Slagan, S. (2013). What is a MAC Address & Cab it Be used to Secure
Your Home Network. http://www.makeuseof.com/tag/what-is-a-mac-address-can-
it-be-used-to-secure-your-home-network-makeuseof-explains/
Sammons, J. (2012). The Basics of Digital Forensics. Boston: Syngress p. 2.
Sindhu, K. & Meshram, B. (2012). Digital Forensics and Cyber Crime Data Mining.
Journal of Digital Forensics, Security and Law, Vol. 3, 196-201.
http://www.estij.org/papers/vol2no12012/19vol2no1.pdf
Social Media Week. Garvey, A. (2015). The Oregon Trail Generation: Life Before
and After Mainstream Tech.
http://socialmediaweek.org/blog/2015/04/oregon-trail-generation/
Steel, C. (2014). Idiographic Digital Profiling: Behavioral Analysis Based on Digital
The Future of Fighting Government Benefit Fraud 16
Forensics. Journal of Digital Forensics, Security and Law, Vol. (9)1.
ojs.jdfsl.org/index.php/jdfsl/article/view/122/201
The Digital Marketing Glossary. What is Device Fingerprinting Definition?
http://digitalmarketing-glossary.com/What-is-Device-fingerprinting-definition

Weitere ähnliche Inhalte

Was ist angesagt?

RIB Cybersecurity
RIB CybersecurityRIB Cybersecurity
RIB CybersecurityAndy Kim
 
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015Andy Kim
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015James Sheehan
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Robert Bromwich
 
B susser researchpaper (3)
B susser researchpaper (3)B susser researchpaper (3)
B susser researchpaper (3)Bradley Susser
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for LegislatorsKristin Judge
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
 
Neo4j graphs in government
Neo4j graphs in governmentNeo4j graphs in government
Neo4j graphs in governmentNeo4j
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudGoutama Bachtiar
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
Employer 0409
Employer 0409Employer 0409
Employer 0409dgade
 
Jen Q. Public: How analytics is impacting government, education and public sa...
Jen Q. Public: How analytics is impacting government, education and public sa...Jen Q. Public: How analytics is impacting government, education and public sa...
Jen Q. Public: How analytics is impacting government, education and public sa...IBM Analytics
 
Improve Public Safety
Improve Public SafetyImprove Public Safety
Improve Public Safetyestotts75
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 
Blockchain in government
Blockchain in governmentBlockchain in government
Blockchain in governmentzaarahary
 

Was ist angesagt? (20)

West2016
West2016West2016
West2016
 
RIB Cybersecurity
RIB CybersecurityRIB Cybersecurity
RIB Cybersecurity
 
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?
 
B susser researchpaper (3)
B susser researchpaper (3)B susser researchpaper (3)
B susser researchpaper (3)
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for Legislators
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
Neo4j graphs in government
Neo4j graphs in governmentNeo4j graphs in government
Neo4j graphs in government
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and Fraud
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
Employer 0409
Employer 0409Employer 0409
Employer 0409
 
Jen Q. Public: How analytics is impacting government, education and public sa...
Jen Q. Public: How analytics is impacting government, education and public sa...Jen Q. Public: How analytics is impacting government, education and public sa...
Jen Q. Public: How analytics is impacting government, education and public sa...
 
Improve Public Safety
Improve Public SafetyImprove Public Safety
Improve Public Safety
 
helsinki final 20160808
helsinki final 20160808helsinki final 20160808
helsinki final 20160808
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Blockchain in government
Blockchain in governmentBlockchain in government
Blockchain in government
 

Andere mochten auch

141013_MAR agenda invitation program Mar2015_v1
141013_MAR agenda invitation program Mar2015_v1141013_MAR agenda invitation program Mar2015_v1
141013_MAR agenda invitation program Mar2015_v1Popa Daniel
 
Thomson walker internship 2016
Thomson walker internship 2016Thomson walker internship 2016
Thomson walker internship 2016Emily Hick
 
Creative critical reflection
Creative critical reflectionCreative critical reflection
Creative critical reflectionzohairalii
 
Importancia de las integrales definidas en el área tecnológica
Importancia de las integrales definidas en el área tecnológicaImportancia de las integrales definidas en el área tecnológica
Importancia de las integrales definidas en el área tecnológicaangelruiz81
 
Assessment Literacy Module - Assessment Literacy Workshop in Kazakhstan (ENG...
Assessment Literacy Module  - Assessment Literacy Workshop in Kazakhstan (ENG...Assessment Literacy Module  - Assessment Literacy Workshop in Kazakhstan (ENG...
Assessment Literacy Module - Assessment Literacy Workshop in Kazakhstan (ENG...Kathleen Sullivan
 
Linguistic markup and processing of transclusion in XML documents (Notes)
Linguistic markup and processing of transclusion in XML documents (Notes)Linguistic markup and processing of transclusion in XML documents (Notes)
Linguistic markup and processing of transclusion in XML documents (Notes)Simon Dew
 

Andere mochten auch (12)

Undeground air cooling
Undeground air coolingUndeground air cooling
Undeground air cooling
 
Arte en Colombia
Arte en ColombiaArte en Colombia
Arte en Colombia
 
Actividad 2-vitacora-4
Actividad 2-vitacora-4Actividad 2-vitacora-4
Actividad 2-vitacora-4
 
141013_MAR agenda invitation program Mar2015_v1
141013_MAR agenda invitation program Mar2015_v1141013_MAR agenda invitation program Mar2015_v1
141013_MAR agenda invitation program Mar2015_v1
 
Thomson walker internship 2016
Thomson walker internship 2016Thomson walker internship 2016
Thomson walker internship 2016
 
UMESH BHATI
UMESH BHATIUMESH BHATI
UMESH BHATI
 
Creative critical reflection
Creative critical reflectionCreative critical reflection
Creative critical reflection
 
Importancia de las integrales definidas en el área tecnológica
Importancia de las integrales definidas en el área tecnológicaImportancia de las integrales definidas en el área tecnológica
Importancia de las integrales definidas en el área tecnológica
 
Pedagogía Compleja
Pedagogía ComplejaPedagogía Compleja
Pedagogía Compleja
 
HIMANSHU BHARDWAJ
HIMANSHU BHARDWAJHIMANSHU BHARDWAJ
HIMANSHU BHARDWAJ
 
Assessment Literacy Module - Assessment Literacy Workshop in Kazakhstan (ENG...
Assessment Literacy Module  - Assessment Literacy Workshop in Kazakhstan (ENG...Assessment Literacy Module  - Assessment Literacy Workshop in Kazakhstan (ENG...
Assessment Literacy Module - Assessment Literacy Workshop in Kazakhstan (ENG...
 
Linguistic markup and processing of transclusion in XML documents (Notes)
Linguistic markup and processing of transclusion in XML documents (Notes)Linguistic markup and processing of transclusion in XML documents (Notes)
Linguistic markup and processing of transclusion in XML documents (Notes)
 

Ähnlich wie Branney-Gant Research Paper

Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPPhilippe Boivineau
 
Top of FormAnnotated BibliographyMohammed, D. (2018, January
Top of FormAnnotated BibliographyMohammed, D. (2018, JanuaryTop of FormAnnotated BibliographyMohammed, D. (2018, January
Top of FormAnnotated BibliographyMohammed, D. (2018, JanuaryTakishaPeck109
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsLapman Lee ✔
 
Jones A LWP Final Approved
Jones A LWP Final ApprovedJones A LWP Final Approved
Jones A LWP Final ApprovedAdam Jones, LCC
 
The global digital divide portrays the global disparities basicall.docx
The global digital divide portrays the global disparities basicall.docxThe global digital divide portrays the global disparities basicall.docx
The global digital divide portrays the global disparities basicall.docxarnoldmeredith47041
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaLizbethQuinonez813
 
Cybercrime in government
Cybercrime in governmentCybercrime in government
Cybercrime in governmentJacqueline Fick
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Alexander Decker
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfTirthShah760404
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
A System to record and document cybercrime incidents for middle east countri...
A System  to record and document cybercrime incidents for middle east countri...A System  to record and document cybercrime incidents for middle east countri...
A System to record and document cybercrime incidents for middle east countri...Assignment Studio
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)Bradley Susser
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)Bradley Susser
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 

Ähnlich wie Branney-Gant Research Paper (20)

Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WP
 
Top of FormAnnotated BibliographyMohammed, D. (2018, January
Top of FormAnnotated BibliographyMohammed, D. (2018, JanuaryTop of FormAnnotated BibliographyMohammed, D. (2018, January
Top of FormAnnotated BibliographyMohammed, D. (2018, January
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threats
 
Jones A LWP Final Approved
Jones A LWP Final ApprovedJones A LWP Final Approved
Jones A LWP Final Approved
 
The global digital divide portrays the global disparities basicall.docx
The global digital divide portrays the global disparities basicall.docxThe global digital divide portrays the global disparities basicall.docx
The global digital divide portrays the global disparities basicall.docx
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expa
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
Cybercrime in government
Cybercrime in governmentCybercrime in government
Cybercrime in government
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdf
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
A System to record and document cybercrime incidents for middle east countri...
A System  to record and document cybercrime incidents for middle east countri...A System  to record and document cybercrime incidents for middle east countri...
A System to record and document cybercrime incidents for middle east countri...
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 

Branney-Gant Research Paper

  • 1. The Future of Fighting Government Benefit Fraud 1 Digital Forensics and Data Mining: The Future of Fighting Government Benefit Fraud Elizabeth Branney-Gant
  • 2. The Future of Fighting Government Benefit Fraud 2
  • 3. The Future of Fighting Government Benefit Fraud 3 Table of Contents Abstract.............................................................................................................................. 4 Digital Forensics and Data Mining: The Future of Fighting Government Benefit Fraud.............................................................................................................................................. 5 1. Current Challenges in Government Benefit Fraud ................................................... 5 2. Digital Forensics ....................................................................................................................6 3. How Digital Forensics and Data Mining Can Be Conjoined to Fight Benefit Fraud: Build a Layered Defense ...........................................................................................................6 4. Predictive Fraud Modeling and Analytics...........................................................................13 5. Conclusion............................................................................................................................14 References........................................................................................................................ 15
  • 4. The Future of Fighting Government Benefit Fraud 4 Abstract Government agencies are increasingly a target for government benefit fraud. As government agencies move from in person services to Internet or multi-channel services, the need to "know your customer" to prevent and identify fraud increases. Private sector companies have developed many strategies to know their customers in a multi-channel environment. Public sector agencies have unique challenges not faced by private sector agencies: legacy programs, budgets publically decided years in advance, public procurement regulations and the scrutiny of public opinion to name a few. This paper explores: current challenges in government benefit fraud, how digital forensics and data mining can be conjoined to fight benefit fraud and possible future solutions. Keywords: digital forensics, data mining, benefit fraud, government, account change alerts, two factor authentication, machine identification, MAC IDs, multi-page login sequence, security images, security questions, IP geocoding, IP mapping, predictive fraud modeling, fraud analytics, crime analytics, ideographic digital profiling, big data, personally identifiable information, PII, identify theft.
  • 5. The Future of Fighting Government Benefit Fraud 5 Digital Forensics and Data Mining: The Future of Fighting Government Benefit Fraud 1. Current Challenges in Government Benefit Fraud Government benefit fraud can take a variety of forms: tax returns, insurance programs (unemployment, disaster, crop) and income maintenance programs (WIC, SNAP, Medicaid, W- 2). Government programs are unique targets for fraud because government programs are designed to be accessible in order to facilitate services to individuals who are in need of services. Furthermore, government programs are increasingly doing business in a multi-channel service environment. Gone are the days of face-to-face interactions in most benefit programs. As government agencies continue to move toward providing services over the phone and Internet, the risk of fraud increases. Proper precautions must be taken to authenticate and differentiate between the customers the programs are designed to serve from the fraudsters looking to exploit the system. Government benefit fraud is increasingly perpetrated through organized multi-victim identity theft scams (U.S. Department of Justice, 2015). Consequently, government benefit programs have the need to design a layered defense that keeps system available1 to real beneficiaries and equally importantly denies and/or detects fraudsters’ intrusions2 . This paper explores how the fields of digital forensics, data mining and data analytics combined can be utilized to prevent and investigate government benefit fraud. 1 Information assurance principle of “availability” means that, “the right information to the right people at the right time”(Fick, 2009). 2 The information assurance principle of “authenticity”—establishing that the user logged into the system is really the person whose credentials (credentials come in many forms user name or password or personally identifiable information PII) are presented (Fick, 2009)
  • 6. The Future of Fighting Government Benefit Fraud 6 2. Digital Forensics Digital Forensics is “the application of computer science and investigative procedures for a legal purpose involving analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting and possible expert presentation. (Sammons, 2012). Digital forensics is a relatively new forensic science (Kessler, 2010). Yet digital forensics has many sub-fields that if utilized properly, can position government agencies to strike the right balance between the information assurance principles of availability and authenticity. For example network forensics analysis focuses on properly capturing, recording and analyzing network events to identify cyber threats and crimes. Network forensics analysis generally takes one of two forms. One form is in analyzing network traffic and another form is in log file analysis (Sindhu & Meshram, 2012). Harnessing the power of network forensics is mission critical component of preventing and detecting government benefit fraud. Network forensics is the ‘what needs to be done’ section 3 explores the ‘how it can be done.’ Section 3 proposes critical infrastructure needed to build a layered defense to keep fraudsters out. Likewise, the infrastructures suggested, increases the rate of detection in the event that a fraudster gets into the system. 3. How Digital Forensics and Data Mining Can Be Conjoined to Fight Benefit Fraud: Build a Layered Defense Building a layered defense is a long standing military security principle. As the information age has evolved and cybercrime increased, the principle started being applied to network and information systems security. In the context of information security ‘building a layered defense’ is often referred to as defense in depth (Fick, 2009). Defense in depth is an
  • 7. The Future of Fighting Government Benefit Fraud 7 approach to managing risk that employs diverse defensive strategies. If one layer fails, another layer presents a choke point in order to prevent a full breach (Branum, Gegick and Michael 2005). Counter institutively, most cyber criminals have “sub-expert” skill levels when it comes to committing cybercrime and avoiding detection. However, they can still do a great deal of damage. On the other hand, employing the right network forensics techniques can aid in preventing, detecting and investigating cybercrime (Steel, 2014). The realization that most cyber criminals have “sub-expert” skill levels means that the return on investment from building a layered defense would be high. However to efficiently capitalize on any infrastructure investments, government agencies need to react with a sense of urgency. Most cyber criminals are between the ages of 17 and 45 (Li, 2008). Generation X and Millennials were the last generation to be introduced to technology in both digital and analog terms (Garvey, 2015). Consequently the sophistication of the average cybercriminal is likely to go up over time, due to the next generation of fraudsters being exposed to technology at a much earlier age than the present generation of fraudsters. Sections 3.1 through 3.6 explore options government agencies can employ based on their fraud risk appetite. Ironically, the security options that are enumerated are the norm in the private sector. The absence of similar options in the public sector has made government benefit programs a target for cybercrime. Employing the right mix of these options can help government programs ensure that they really ‘know the customer’ they are dealing with. These options have a two-fold benefit: one benefit is that in and of themselves they can help prevent fraud and detect fraud. A second benefit is that when fraud is detected, the information (data) from the incidents and attacks can be collected and analyzed (data mining and
  • 8. The Future of Fighting Government Benefit Fraud 8 data analytics). Simultaneously, that data can be maintained in a data warehouse in order to later build real-time predictive fraud models and analytics tools. The power of big data and predictive fraud modeling and analytics is explored in Section 4. The ability to prevent and detect fraud while working toward predictive modeling is the future of fighting government benefit fraud. 3.1 Account Access and Account Change Alerts. Account access and change alerts are one of the least invasive methods government agencies can employ to prevent fraud. Real world example: someone contacts their bank to update their address. The bank updates the address and contacts the customer (either through mail, email, text or prerecorded call) to verify that the customer made the requested change. The customer is told that if they did not make the change, that they should alert the bank immediately. The technology used to set up automated notifications for account access change alerts could later be utilized in Two-Factor Authentication (see Section 3.2). Public sector agencies would have to identify what changes to accounts are the most indicative of fraud for their agency. Some potential changes indicative of fraud are changes to: address, phone, email, direct deposit and username changes etc. 3.2 Two-Factor Authentication. Two-factor authentication or 2FA, has two layers of authentication when logging into accounts. If someone only has to enter a username and password, then they are using single factor authentication (something they know). 2FA requires the user to have another credential (something they have). A more common every day example would be using a credit card (something you have) and having to provide a zip code for the mailing address (something you know) to authenticate the transaction (Rosenblatt, 2013).
  • 9. The Future of Fighting Government Benefit Fraud 9 In the context of identity theft and government benefit fraud the options could look like this: 2FA is a form of secure access and identity management and if employed correctly can prevent fraud beyond what identity proofing software alone can prevent. In this regard it can be paired with or used separately to identify and prevent fraud. Agencies that use identity proofing should collect failed log in attempts for analysis. A cyber example of 2FA, that digital customers are accustomed to, would be: a customer saving their bank account on their phone (or other device) and normally only accessing the account from their phone (or other device). Most banks would make the user authenticate their identity, if they tried to log in on another ‘unknown’ device. The customer would have previously selected a communications preference (email, text, recorded voice etc.) when they set up the online bank account. Consequently, the bank would authenticate the customer by sending the customer a temporary password to the account (email, text, recorded voice etc.) the customer provided when they set up their online bank account. Agencies can set thresholds, allow for opting out, establish whitelists etcetera to account for claimants that use public computers so it does not create a barrier to legitimate customers. -Personally identifiable information (PII) -Username -Password -Etc. -Email account -Mobile phone -Telephone -Machine fingerprint -MAC ID
  • 10. The Future of Fighting Government Benefit Fraud 10 3.2. Machine Fingerprinting. Has long been used by companies to identify a device over the Internet without collecting any personally identifiable information. Collecting machine prints allows marketing companies to manage their content and the delivery of the content to the right customer at the right time. (digitalmarketing-glossary.com) Companies also harness this tool to identify fraudsters. For example if one device has launched an anomalous amount of transactions, the company can flag the device. After flagging the device the company can review its activity to determine if it is a legitimate customer or a fraudster. Government agencies can use this tool for authentication and identification purposes. For example, a legitimate customer is always known to log on using a particular device (identified by machine finger printing). A fraudster then attempts to log into the systems using a customer’s credentials (username, password, PII etc.). The system could then deny service to the fraudster until further authentication takes place (2FA, answering security questions correctly etc.) This layer of defense is promising, but it has limitations. For instance, if a user changes enough features on their device it can generate a false flag. However, the system can be designed to fail gracefully to minimize impact on legitimate customers. Furthermore, this situation can be minimized if machine finger printing is paired with capturing MAC IDs. 3.3 MAC IDs. Media Access Control Address or MAC ID, is a “unique identified that is assigned to devices that allows them to optimize communications over networks” (Slagan, 2013). MAC IDs are a mission critical component to preventing and investigating government benefit fraud for several reasons. One reason is because of the rise in use of burner and mobile devices, to commit cybercrime. Burner and mobile devices often have generic IP addresses assigned to
  • 11. The Future of Fighting Government Benefit Fraud 11 them; consequently sending subpoenas to the service providers often yields no results of probative value. However many wireless and burner device companies collect MAC IDs, so it can be a valuable piece of information to collect for subpoena purposes. A second reason to collect MAC IDs is that they can be used to differentiate between a fraudster and the true customers. Furthermore, MAC IDs can be used to identify multi-victim frauds quickly because MAC IDs are harder to mask than IP addresses and machine fingerprints alone. 3.4 Multi-Page Login Sequence and User Selected Security Images. Multi-page log in sequences prevent customers (whether it is a business customer or a beneficiary customer) from becoming the victim of phishing scams. Example without multi-page log in sequence: Customer gets spoofed communications from government agency and follows the link to a fictitious agency website. They enter their username and password on the first page. The fraudster now has their username and password and any other information the customer provides before they realize it is a spoofed website. See examples in figures below from Nelnet.com a federal student loan company. Claimant inputs username on 1st t page and is directed to 2nd page Claimant inputs password on 2nd page if they recognize the security image they selected.
  • 12. The Future of Fighting Government Benefit Fraud 12 Example with a multi-page log on sequence: prevents aforementioned scenario because even if the claimant provides the fraudster with their username, the absence of their selected security image on the second page alerts them to stop before entering their password. Also multi- page log in sequences make bot attacks more complicated. 3. 5 Security Questions. User selected security questions and answers are a standard tool for preventing identity theft online. However, they are not enough to prevent fraud in situations where it is the fraudster setting up the account. Likewise, they are not enough to prevent a fraud if a fraudster knows or obtains the answers. On the other hand they are classic tools to prevent fraud. Furthermore, they can be utilized to identify multi-victim frauds. Answers to security questions provided valuable data points because fraudsters often use a pattern of passwords. 3.6 IP Geocoding and Mapping. Collecting and analyzing IP addresses used to access the system is a mission critical component to fighting government benefit fraud. Collecting IP information enables quicker identification of multi-victim scenarios. IP addresses can be mapped down to the zip code level. This information can provide critical intelligence to investigators (Altoff, 2008). Likewise, it enables agencies to block known threats (blacklisting). There are limitations to IP geocoding especially with wireless service providers and users that utilize burner devices.
  • 13. The Future of Fighting Government Benefit Fraud 13 4. Predictive Fraud Modeling and Analytics IP address, machine fingerprinting and MAC IDs would ideally be used together to strengthen fraud detection (increased accuracy) while also reducing false positives (decreased disruptions to real claimants). Furthermore, collecting these 3 pieces of information (network events) gives investigators multiple avenues to explore and to investigate any fraudsters that successfully gain access to the system. The network events enumerated in Sections 3.1 through 3.6 are events that can be of great probative value on their own. The network events are even more valuable if they are captured and stored in a data warehouse3 . If the aforementioned network events are captured using forensically sound methods and stored in a data warehouse, then the scope and impact of investigations increases exponentially. Simply put it allows analysts and investigators access to the evidence. Access to the evidence (in an unalterable state) allows analysts and investigators to both identify and investigate frauds without fear of compromising the digital evidence. Therein is the sweet spot: not only does implementing the aforementioned network infrastructure prevent fraud but it also increases the rate and speed of detection. Furthermore, agencies can harness the power of machine learning, predictive modeling and fraud analytics to make informed business decisions (Cutts, 2015). Decisions properly formed based on machine learning, predictive modeling and fraud analytics can be used to break the pay and chase cycle that many government agencies face. 3 According to Designing Data Warehouses for Cyber Crimes, a data warehouse is, “a data repository that contains historical data for effective data analysis and reporting processes. Data warehouses are designed to support decision making by studying and analyzing complex sets of data.”
  • 14. The Future of Fighting Government Benefit Fraud 14 5. Conclusion Government agencies make unique targets for cybercrime. As government agencies continue to move toward serving customers in multi-channel environments, the need to know their customer increases. Government agencies can utilize network forensics and big data to build a layered defense in order to increase the rate of fraud prevention and detection. Furthermore, the information arms investigators with the tools they need to investigate and subsequently pursue prosecution.
  • 15. The Future of Fighting Government Benefit Fraud 15 References Branded3. Altoff, P. (2008). Five Ways to Detect Fraud Using Geolocation. https://www.branded3.com/blog/five-ways-to-detect-fraud-using-geolocation/ CNET. Rosenblatt, S. (2013). Two-Factor Authentication: What You Need to Know (FAQ). http://www.cnet.com/news/two-factor-authentication-what-you need-to-know-faq/ Department of Homeland Security. Branum,S. Gegick, M. and Michael, C. (2005). Defense in Depth. Retrieved from https://buildsecurityin.us- cert.gov/articles/knowledge/principles/defense-in-depth Fick, J. (2009). Prevention is Better than Prosecution: Deepening the Defense against Cyber Crime. Journal of Digital Forensics, Security and Law, Vol. 4(4), 51-72. http://ojs.jdfsl.org/index.php/jdfsl/article/view/159/76 United States Department of Justice. (2015, April). Defendants Charged in Separate Fraud Schemes that Resulted in Thousands of Identities Stolen and Used to Commit Fraud Schemes. Retrieved from http://www.justice.gov/usao-sdfl/pr/defendants- charged-separate-fraud-schemes-resulted-thousands-identities-stolen-and-used). Kessler, G. (2010). Judges’ Awareness, Understanding, and Application of Digital Evidence. Journal of Digital Forensics, Security and Law, Vol. 6(1), 55-72. http://ojs.jdfsl.org/index.php/jdfsl/article/view/27 Li, X. (2008). The Criminal Phenomenon on the Internet: Hallmarks of Criminals and Victims Revisited Through Typical Cases Prosecuted. Social Science Research Network. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2034529 Make Use Of. Slagan, S. (2013). What is a MAC Address & Cab it Be used to Secure Your Home Network. http://www.makeuseof.com/tag/what-is-a-mac-address-can- it-be-used-to-secure-your-home-network-makeuseof-explains/ Sammons, J. (2012). The Basics of Digital Forensics. Boston: Syngress p. 2. Sindhu, K. & Meshram, B. (2012). Digital Forensics and Cyber Crime Data Mining. Journal of Digital Forensics, Security and Law, Vol. 3, 196-201. http://www.estij.org/papers/vol2no12012/19vol2no1.pdf Social Media Week. Garvey, A. (2015). The Oregon Trail Generation: Life Before and After Mainstream Tech. http://socialmediaweek.org/blog/2015/04/oregon-trail-generation/ Steel, C. (2014). Idiographic Digital Profiling: Behavioral Analysis Based on Digital
  • 16. The Future of Fighting Government Benefit Fraud 16 Forensics. Journal of Digital Forensics, Security and Law, Vol. (9)1. ojs.jdfsl.org/index.php/jdfsl/article/view/122/201 The Digital Marketing Glossary. What is Device Fingerprinting Definition? http://digitalmarketing-glossary.com/What-is-Device-fingerprinting-definition