Stephen Coggeshall: Behavioral analytics could extend identity management security

 

Connecting state and local government leaders

GCN INTERVIEW: Stephen Coggeshall, chief technology officer at ID Analytics and a proponent of advanced mathematical analytics, talks about how ID cards and biometrics can fall short as identification tools.

The traditional tools of identity management — user names, passwords, ID cards and biometric information — can fall short of ensuring that people are who they say they are. Behavioral analytics and, more recently, trusted reference networks are now widely used in the financial industry as a third tool for managing information access.

Stephen Coggeshall, chief technology officer at ID Analytics, has been a pioneering proponent of the use of advanced mathematical analytics in information management at Morgan Stanley, Citicorp, MasterCard and the Internal Revenue Service. He recently spoke with Government Computer News Editor-In-Chief Wyatt Kash about the state of identity analytics and their potential for government-run networks.

GCN: One of the challenges of identity management is not only verifying who is accessing a network but identifying their roles in accessing specific information. How is behavioral analytics being used to address those needs?

Stephen Coggeshall: It depends on the sensitivity and level of complexity of the transaction. For highly sensitive information, we need to move beyond a two-factor approach — things that you know, [such as] user name, passwords, and things that you have, physical things such as secure ID cards, biometrics that restrict access — and move toward how you behave.

We do that with an identity score that tells you not just in this transaction but in other events [associated] with this identity: What’s the level of risk around this identity? Perhaps that person put in a user name and password, and that password was compromised. Or the physical device may have been compromised. So there’s another way of measuring how dangerous this transaction may be by bringing in an external score.

What we do is gather information about how an identity is interacting in the world — how, for example, that Social Security number is being used in multiple transactions or events across different industries. Is that number being used in conjunction with a variety of names or just one name? What are the address dynamics around that particular identity — phone numbers, e-mails and IP addresses? We aggregate information on how the components of that identity are connected and use a fairly advanced algorithm to come up with a score that [defines] the likelihood that there’s risk around that identity.

GCN: What sources are you using as references?

Coggeshall: It’s less about the specific sources of the data and more about how the data is combined. We have built a trusted network where generally our customers contribute data about events going on with the customers in their portfolio. We gather that data across a lot of industries — financial services, telecommunications, mortgages, retail consumer products — and we aggregate it with auxiliary data, such as phone book data, Census Bureau data, other demographic data. We combine it in an intelligent way to form the basis of this data network we use to make these decisions.

So for the government, for example, building this kind of topology, they would take this same general approach, but they would combine data into this trusted network from across their different organizations.

GCN: How do you define and verify a person’s role in a given transaction?

Coggeshall: The primary methodology [for making those decisions] is set by the business and business use. For example, if a parent is accessing a brokerage account of a child and just wants to see the balances, then the level of authentication would be a certain level. But if that person wants to transfer money in or out, then the risk score threshold may be set higher. So the [network manager] decides what level of authentication and how wide the access to particular actions may be and what additional actions may be required.

GCN: How far have tools like behavior analytics and fuzzy logic come in terms of reliability for identity management?

Coggeshall: They continue to get better. This kind of behavioral scoring started 30 or so years ago, first in credit scoring. They were fairly rudimentary linear algorithms. There have been substantial advances in business uses with consumer behavior scoring, for segmentation, for product offers. The IRS became an early adopter, using it for fraud protection with algorithms that looked for unusual returns and, in the early 1990s, for tax preparer fraud.

GCN: What needs to happen next for those tools to become more effective or widely used?

Coggeshall: We have constant improvements in our algorithms and data. The big breakthrough, emerging now, is the way to combine all three methodologies — what you know, what you have and what you do — in a blended solution.

GCN: What other methods do you see evolving to speed identity authentication?

A: There are two primary needs to make substantial improvements. One is this three-pronged approach we’ve been talking about. The second is the architecture of the data and data communications in this trusted-networks concept that will help maximize the privacy protection, at the same time giving [network managers] the ability to make these important decisions.

GCN: What safeguards are being developed to ensure that privacy laws and protections are still being followed?

Coggeshall: There are several really important principles that have to be followed. We need restricted data access — who has access to what information — and [we need] to minimize that access. Another is to make sure data is end-to-end encrypted. Even at rest on disk, we keep all our data encrypted. You need to have careful controls and processes around releasing data. In the trusted-networks model, you don’t need to release data. And around all these things you have to be [Payment Card Industry] compliant.

GCN: How would you compare the government’s progress using those tools versus what’s being tried in the financial industry?

Coggeshall: Financial services tends to be a technology leader, while government has tended to lag in adopting these technologies. But I do see more enlightened leaders in certain agencies — Homeland Security, for instance — and some of the other three-letter agencies have been leaders in being savvy and technology-driven.

These agencies have done well at bringing together vast amounts of data. What they’ve needed are algorithms to sift through very large quantities of largely unstructured data — text, video or voice — and find the needles in the haystacks.

I see two very broad trends in technology right now. One is this explosion of data and the need to work with unstructured data. The second is the ever-increasing necessity to understand who people are, how they’re connected and defined, and how they exhibit themselves in the world, and then what kinds of access they should be permitted to have to various places.

GCN: Which lessons are transferable and which aren’t?

Coggeshall: This three-pronged approach for identity intelligence we’ve talked about is very applicable in the government world. Associated with that is this concept of trusted networks. There’s a major paradigm shift going on in the business community, where we’re moving away from shipping around very sensitive data and more toward pooling information into a trusted network. And then granular-level data doesn’t need to be released from that.

[Under] the old paradigm…in order to make decisions about a person, [organizations] would ship off sensitive data to some data broker. And that broker would send additional sensitive data back to the decision-maker. So there was a lot of very sensitive data being sent around the country, being gathered and even sold. There was a whole food chain that led to the selling of people’s personal information. Privacy has become a huge concern because of that.

In this trusted-networks concept, people send us this sensitive data, and what they want is decisions. They don’t need the granular-level data. We send back high-level information, like a score or some reason codes, that allows that business to take an action without having to ship back sensitive data. So this emerging paradigm is completely transferable to the government.

NEXT STORY: Georgia bolsters ID card security

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.