Wall Street & Technology is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security

01:25 PM
Wesley Wilhelm
Wesley Wilhelm
Commentary
50%
50%

Voice Biometrics Improve Transaction Monitoring Fraud Detection

Why voice biometrics should be a part of your fraud prevention strategy in the call center.

Transaction monitoring fraud detection systems are now commonplace at financial institutions. But what can be done to improve and prepare them for the future? One answer is to extend them to integrate with new voice biometric analysis systems. 

As a result of fraudsters evolving and altering their behavior, legacy transaction monitoring systems are known to miss some fraudulent transactions because they are consistent with historical, legitimate transactions. What are some of the latest technologies being applied to improve and update this situation?

By integrating voice biometric data into the process, we can help improve fraud detection rates. This is done by adding a comparison of the voice used to initiate the fraud scheme or the fraud transactions with the legacy transaction analysis. Additionally, voice biometric analysis can assist with the post-fraud transaction verification processes, so calls to fraudsters who confirm their fraudulent activity as "legitimate" are detected.

Fraudsters in wire transfer fraud and card fraud schemes are known to have researched the legitimate customer's prior transaction activity in order to make their fraud transactions look as normal and customary as possible. For example, fraudsters are known to falsely generate wire transfer requests that are only slightly different than previous legitimate wire transfer requests. Similarly, fraudsters are known to mirror prior card activity with "normal" merchant category codes, transaction amounts, and transaction geography on fraudulent card transactions.

It is no longer enough to just evaluate such elements as the amount of a wire transfer, where the wire is being sent, when the wire is authorized, and to whom it is being sent. For phone-initiated wire transfers, you should also include analysis of the voice requesting the wire. Voice biometric analysis and voice prints are already successfully being used to identify both known fraudsters and legitimate customers.

Continue reading on Bank Systems & Technology...

Wesley Wilhelm (Wes) has more than 30 years of experience in banking and consulting to the financial services industry, with extensive knowledge of fraud management, payments, and retail banking technology and operations. He has held numerous management positions in risk and ... View Full Bio
More Commentary
A Wild Ride Comes to an End
Covering the financial services technology space for the past 15 years has been a thrilling ride with many ups as downs.
The End of an Era: Farewell to an Icon
After more than two decades of writing for Wall Street & Technology, I am leaving the media brand. It's time to reflect on our mutual history and the road ahead.
Beyond Bitcoin: Why Counterparty Has Won Support From Overstock's Chairman
The combined excitement over the currency and the Blockchain has kept the market capitalization above $4 billion for more than a year. This has attracted both imitators and innovators.
Asset Managers Set Sights on Defragmenting Back-Office Data
Defragmenting back-office data and technology will be a top focus for asset managers in 2015.
4 Mobile Security Predictions for 2015
As we look ahead, mobility is the perfect breeding ground for attacks in 2015.
Register for Wall Street & Technology Newsletters
Video