Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

The COVID-19 pandemic seems like a double whammy for financial crime investigators. While online fraud has skyrocketed, teams are still adapting to a remote work environment. A recent survey among Association of Certified Financial Crime Specialists (ACFCS) members asked: Are they appropriately equipped for their mission?

*

Financial institutions are on high alert as attacks on the industry spiked by 38% in February and March. In March, the Financial Crimes Enforcement Network (FinCEN) alerted institutions to “malicious and fraudulent transactions similar to those that occur in the wake of natural disasters” and warned them of increased scam activity.

Between January and February, the Federal Trade Commission (FTC) reported  more than 52,000 cases of fraud that were related to COVID-19 and resulted in $38.6M of fraud loss. All of this puts additional pressure on the industry’s fraud analysts and investigators, while they struggle with the consequences of working from home.

Together with Authentic8, the Association of Certified Financial Crime Specialists (ACFCS) asked members who attended a recent webinar on dark web research if they felt sufficiently equipped to conduct their online investigations.

When anonymity is vital, does your browser have your back?

More than 500 cybersecurity leaders, investigators, and analysts responded. The collective answer: “No.”

The results indicate that most surveyed specialists lack the proper equipment to conduct critical investigations on the web securely and efficiently. The culprit is the web browser.

I found it remarkable that the primary tool financial crime specialists rely on for their investigative work on the web is putting their mission and their organizations at risk. There were three main takeaways from the survey:

  • Investigator needs are not met by tools provided
  • Tool-related challenges impede investigations and can put organizations at risk
  • A specific cohort of investigators had much less “pain” than the rest

1 - Investigator needs are not met by tools provided

Authentic8_Insufficient_Tools-1

 

  • Need - 80% of those involved with investigative work online stated that they need to hide or misattribute their identity online. Anonymity or managed attribution capabilities are essential for investigators when examining suspicious websites or online forums because revealing their identity - or that of their organization - can compromise their mission and makes them vulnerable to targeted watering hole attacks.
     
  • Need - 15% of those surveyed said they need to access the dark web at least once every month. Many criminal activities happen on the dark web, so investigators frequently need to visit these sites.
     
  • Mismatch - Yet 58% of that same group responded that they conduct investigations without protection, via a local browser on their PC. Local browsers can reveal detailed information about the user, organization, and corporate assets, even with “incognito mode” or VPN / privacy plugins in place, which effectively runs counter to the “hide or misattribute” need for investigators. Additionally, using a local browser to access the dark web can open an organization to scrutiny and reputational risk.
Authentic8_Efficacy_Efficiency_Challenges-1

 

  • 66% face a challenge in hiding their online identity. As discussed above, it is critical to hide the investigator’s and organization’s identity to protect investigations and avoid possible “watering hole” attacks. Unfortunately, a local browser does little to protect one’s identity, which can jeopardize investigations, lead to regulatory fines and reputation risk for the organization.
  • 44% of those collecting and analyzing evidence face issues in maintaining chain-of-custody. Compliance manager needs are best met by a centrally managed, encrypted, tamper-safe audit logging system - capabilities that are not readily available in a decentralized local browsing environment. As a result, an investigator's hard work may be naught due to technicalities in chain-of-custody management.
     
  • 30% are routinely blocked from accessing sites they need to investigate. Most local bowsers are governed by a set of corporate web filters that deny access to websites based on company-wide policy. Unfortunately, many investigators need to visit suspicious sites, which are likely to be blocked. This can result in delays of multiple days that can impact the timely filing of regulatory reports (e.g., Suspicious Activity Reports) and lead to fines on the financial institution.

3 - A specific cohort of investigators had much less “pain” than the rest

Authentic8_Cloud_Browser-1

The most remarkable result of the survey was that not everyone claimed to face the above challenges. There was one cohort - those who used a cloud browser solution - who claimed to have much less “pain” than the rest.

The implication: There is a better way of doing things than using a local browser.

What is a “cloud browser”?

A cloud browser is a browser that runs on cloud-hosted servers. It executes all web code in a secure, isolated environment managed by policy, to provide protection and oversight. The end-user device receives a benign display stream, and end-users can interact via regular mouse and keyboard input. A concrete example of this is Silo for Research.

Silo for Research is a cloud browser-based product, built for the needs of investigators. Silo for Research combines web isolation with attribution management for secure, geographically distributed research and analysis.

Silo for Research can be configured to appear on the internet from one of dozens of global exit nodes and spoof different client environments. To the website under examination, the research framework presents itself as a regular browser launched on a local device on a local network.

Websites and social media platforms are presented only with the IP address of Authentic8’s server and cannot trace the network back to the end-user. This eliminates the risk of attribution or de-anonymization as the result of the web browser.

Can you measure investigation outcomes?

It is possible, but it is essential to recognize that different stakeholders have different outcomes they care about regarding an investigation. The good news is that a solution like Silo for Research can address the top priorities for multiple stakeholders.

With Silo for Research,

  • Analysts and investigators can decrease time to insight, even in a WFH environment. Purpose-built tooling can drive Mean-Time-To-Resolution (MTTR) down by up to 50%.
     
  • IT admins and support teams can reduce costs and management overheadCloud-hosted tooling can reduce expenses by 2x compared to custom-built infrastructure.
     
  • Compliance and risk officers can simplify compliance and improve case documentation. Auditable logs enable teams to meet regulatory requirements.

So yes, investigation outcomes can be measured - not only in lower IT costs and MTTR reduction but also in avoiding regulatory sanctions.

With Silo for Research, your firm will be able to conduct timely and thorough investigations (even when analysts work from home), file SARs quickly, maintain chain-of-custody and promptly produce documentation if compelled by regulators - without pushing IT to the brink.

Final thoughts

Financial crime is on the rise. Pandemic-induced remote work is hampering investigations. Regulatory fines continue to grow in size. Does it make sense to roll the dice when it comes to equipping analysts and investigators with the tools they need?

About the Author

A8 Team
A8 Team
Contribution Team U.S.A.

Authentic8 Team is a group of cybersecurity enthusiasts, investigation sleuths, top-notch engineers, news junkies, policy wonks and all-around fervent writers hell-bent on bringing you the best darn blog in the industry. 

Related Resources

Guide
Guide

Financial fraud investigation: tips & techniques

Keep your online financial fraud and AML research secure and anonymous across the open, deep and dark web

Flash Report
Flash Report

Using the dark web in financial crime investigations

Learn how to safely conduct financial crime investigations on the dark web without disclosing identity or intent to targets

Infographic
Infographic

What's hurting caseload productivity in financial crime investigations?

Highlights from the 2020 survey on the top challenges and necessary solutions to improve financial crime investigations

Close
Close