Tag Archives: Analytics

The My Face Value “Tout Free” Guarantee

My Face Value is preparing for launch on 31st December 2017. To keep up to date with the latest news follow us on Facebook and Twitter

The My Face Value ability to tackle the problem of touts using our community is key to  earning and retaining the trust of the My Face Value community. The algorithms that My Face Value have developed to solve this problem are only one of many unique selling points in the My Face Value promise to genuine fans.

Using Innovative Technology To Beat The Touts

Similar to the auditable Random Number Generator algorithms that our Random Picking Software utilises to ensure fairness & transparency when selecting winners of our competitions & promotions, our approach to Phishing Prevention, Intercept “Man in the Middle” Attacks and our proprietary Automated Tout Detection systems use our own set of proprietary processes and algorithms to keep My Face Value secure and “tout free”.

My Face Value have developed sophisticated mechanisms that protect the data that the My Face Value community entrust us with and prevent the My Face Value community unwittingly assisting touts in their efforts to buy tickets at face value.

Protection from Trolls and Hackers 

My Face Value expects to be the target of concerted campaigns by trolls (on a simplistic level) and hackers (in a sophisticated manner) because My Face Value are dislodging and disrupting a lucrative “street level” business as well as a “respectable” corporate sector who make large amounts of money from ticket touting and price gouging tickets to events.

The first target of these hacks as we see it would be to undermine the trust in the My Face Value community by targeting our community members’ data, in all its forms. But in particular our community members credit card details. Aside from the myriad white-hat hacker tests that we have conducted, our operating systems, applications and network configurations have been comprehensively penetration tested by leaders in the field.

The Safety of Your Data – Security & Encryption 

My Face Value uses security protocols that protect the My Face Value community member from malicious interception attacks. My Face Value use a secure and encrypted connection (HTTPS/SSL) when handling My Face Value community members’ data.

The My Face Value EV SSL certificate offers the highest available levels of trust and authentication to our website. When performing transactions, the green address bar prominently displays our company name and provides highly visual assurance to customers that our site is secure – immediately giving the My Face Value community member the confidence to complete their transaction.

Sensitive Data Storage

For a further level of comfort My Face Value use an external provider with PCI Service Provider Level 1 Certification (the most stringent level of certification) to manage the process of no-hassle security and compliance that meets all PCI-DSS requirements for desktop and mobile transactions [PCI-DSS: The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organisations that handle branded credit cards from the major card schemes including Visa, MasterCard, American Express, Discover, and JCB.]

No sensitive data hits the My Face Value servers. To bolster this counter measure My Face Value have added an extra layer of security in the form of Two-Factor Authentication.

Phantom Community Members / Spam Accounts

But how do My Face Value detect touts posing as allegedly legitimate community members and avoid the scenario where the tout uses the My Face Value community as a source of leads to purchase tickets at face value and then tout.

The My Face Value community, without the measures that we have taken, would be a readily available environment with millions of community members which touts could “raid” for tickets.

The Value of Anonymity

This process is outlined in great detail on our website and on our social media pages. But in short, the answer to preventing the use of My Face Value as a ticket sourcing platform for touts is “anonymity”.

The information posted by My Face Value community members in relation to BUY/SELL/SWAP requests is not visible to the My Face Value community. Rather My Face Value store the data and identify matching BUY requests with SELL offers and SWAP requests with SWAP matches.

The relevant My Face Value Community members are then notified simultaneously by email. The email contains a link and when clicked this link will allocate the ticket on a First-Come-First-Served basis to the first My Face Value community member who secures the ticket by making the required payment.

The SELLER / SWAPPERS are then requested to send the ticket(s) to My Face Value for a counterfeit check and thereafter – assuming no issues relating to payment fraud or counterfeiting arise – My Face Value will post the ticket to the BUYER and pay the SELLER or in the case of SWAPS post the tickets to the respective My Face Value community members.

The process is managed from end-to-end by My Face Value to ensure compliance.

Detecting “Organised Touting” in the My Face Value Community

My Face Value will keep the community tout free. The BUY/SELL/SWAP Process is conducted thru a series of simple menu selections. This process is outlined in detail on our website and on our social media pages. Once completed and in order to SUBMIT the information to the My Face Value databases – the My Face Value community member is requested to LOGIN, if they have not already done so, or REGISTER – if they are not an existing My Face Value community member.

Now the science bit – the steps in the REGISTRATION process provide one level of protection against touting – but not enough. Sweat shops exist and the industry (organised crime element) are well capable of setting up hundreds of identities and email addresses using pre-paid cards in an attempt to circumvent this LOGIN or REGISTER Wall counter measure.

Tout Prevention & Community Compliance 

My Face Value have developed systems to encode expertise for detecting touts, in the form of rules. Employing Big Data Analysis / Data Mining to develop community member behaviour patterns and profiles for matching against a baseline to detect deviations and automatic responses / actions or in certain cases issue automated real time notifications to the  My Face Value Tout Prevention & Community Compliance Team for examination (See Level 1-4 below for details on this process).

The My Face Value Pattern Recognition techniques to detect clusters or patterns of suspicious behaviour are automated to ensure scaleability. Machine learning techniques automatically identify the characteristics of touting. The My Face Value algorithms learn suspicious patterns from samples which are then used later to detect breaches.

My Face Value deploy these detection algorithms on a number of levels using statistical techniques and artificial intelligence:

Level 1: Email addresses used by a community member, contact telephone number provided by a community member, frequency and time of day of logins by a community member, number and type of payment instruments used by a community member, transactions levels (numbers of transactions) by a community member, types of transactions conducted by a community member – BUY/SELL/SWAP;

Level 2: Combining source metadata, platform and device usage, IP address, browser type, geo-location (clustering), proxy spoofing and VPN detection to augment the Level 1 data My Face Value hold on behaviour patterns;

Level 3: Cross referencing My Face Value community member profiles with publicly available information on social media accounts for pattern matching and augmenting the community member risk profiling data to augment the Level 1 and Level 2 data;

Level 4: In the event that all the information points to a positive breach of the My Face Value Community Guidelines then the community member will be blocked. In circumstances where the information points to a possible breach of the My Face Value Community Guidelines then the My Face Value Tout Prevention & Community Compliance Team will request identification and documents to prove that the “member” is not a phantom account AND that the documents supplied to vouch for that assertion are genuine.

The My Face Value “Tout Free” Guarantee

By implementing Behaviour Analytics & Profiling with Context Data the My Face Value Machine-Learning Algorithms ensure a tout free environment. These processes reduce to almost zero the ability for touts to engage in the volume transactions that would make the effort commercially viable or feasible.

Whether dealing with touts as individuals or organised gangs their inability to fool the profiling algorithms and/or comply with the My Face Value escalating requests for proof of identity to determine if a suspicious account is in fact a genuine fan will keep our community tout free.

The My Face Value Tout Prevention & Community Compliance Team

 

The Holistic Z: Selective Encryption gives way to “At-Rest” & “In-Flight” Data Protection with Pervasive Encryption

IBM Z encryption moves the market from a selective encryption model to one that is pervasive. This represents a significant modification in the basic structure of computing and its effect on security will, in my opinion, have a major disruptive effect.

The overall concept is to not introduce a decision layer that says what will or will not be encrypted. Instead, it will be possible to have encryption be part of normal processing. The removal of the decision for selective encryption is a further saving in the overall cost and a reduction in the difficulty in using encryption in the current market.

The Holistic Z

The new IBM Z provides a bullet-proof platform for digital transformation, a base for strong cloud infrastructure (fortified clouds, which can be open, private, public, and hybrid), and allows back-end services to be securely exposed through secure APIs.

IBM have put security at the core of the new platform with “Pervasive Encryption as the new standardAnalytics & Machine Learning for Continuous Intelligence Across the Enterprise, and Open Enterprise Cloud to Extend, Connect and Innovate”.

The Z is arguably more powerful, more open, and more secure than any other commercial offering and makes serious moves in the rapidly evolving domains of Machine Learning, Cloud and Blockchain.

Positive Disruption with Pervasive Encryption 

But for me the focus of my interest comes back to Pervasive Encryption. The Z (“Zero Downtime“) appeals to many, on many different levels but for me it is Pervasive Encryption that piques my interest.

It is a seismic shift and legitimately makes the z14 the go-to platform for organisations who can afford their own and the Cloud platform of choice for those who cannot. The z14 mainframe has a tried-and-true architecture and excels with security features that are built into the hardware, firmware, and operating systems.

PervasiveEncryption3

True Cost & Performance Mitigation 

The largest barrier to doing full-scale encryption has been the cost of the encryption and the performance load that such activity puts on the computing platform.

Bolted-on solutions that are being deployed have caused system capacity to grow such that there are loads of up to 61% of the system load that is being consumed by security processes. This translates into significant infrastructure costs and performance drags.

Even without the newest advances the Z architecture delivered encryption (selective encryption) more efficiently and with a lower resource expenditure than other platforms.

It delivers over 8.5 times the security protection, at 93% less cost in overall expenditure, and with 81% less effort. The full impact of the faster encryption engine and the ability to encrypt information in bulk on the z14 creates a fully pervasive solution that runs more than 18.4 times faster and at only 5% of the cost of other solutions.

The Threat Landscape & GDPR Compliance 

IBM Z pervasive encryption provides the comprehensive data protection that organizations, customers, and the threat landscape demand.

Here are some stats on that threat landscape:

  1. Nearly 5.5 million records are stolen per day, 230,367 per hour and 3,839 per minute (Source:http://breachlevelindex.com/);
  2. Of the 9 Billion records breached since 2013 only 4% were encrypted (Source: http://breachlevelindex.com/);
  3. 26% is the likelihood of an organization having a data breach in the next 24 months(Source: https://www.ibm.com/security/infographics/data-breach/) ;
  4. The greatest security mistake organizations make is failing to protect their networks and data from internal threats. (Source:https://digitalguardian.com/blog/expert-guide-securing-sensitive-data-34-experts-reveal-biggest-mistakes-companies-make-data)

By placing the security controls on the data itself, the IBM solution creates an envelope of protection around the data on Z.

ENDS

Extracts, Source Material, References, & Acknowledgements to IBM Z Systems, IBM Security, IBM Systems, IBM Systems Social Program, and Solitaire Interglobal Limited.