Back to Perspectives
VideoCase Study

Fraud Detection Success Story - Tech Deep Dive

5 min read

We worked with a large European car manufacturer whose dealer claims were slipping through whilst manual checks missed the subtle stuff.

š—§š—µš—² š—°š—µš—®š—¹š—¹š—²š—»š—“š—²š˜€ š˜„š—²š—æš—² š—»š˜‚š—®š—»š—°š—²š—±:

- š—¦š—¼š—½š—µš—¶š˜€š˜š—¶š—°š—®š˜š—²š—± š—³š—æš—®š˜‚š—± š—½š—®š˜š˜š—²š—æš—»š˜€ - manipulated transaction IDs, tweaked narrations, adjusted amounts just enough - š——š—¼š—°š˜‚š—ŗš—²š—»š˜š˜€ š—®š—æš—æš—¶š˜ƒš—²š—± š—ŗš—²š˜€š˜€š˜† - lengthy PDFs with multiple docs stitched together, screenshots, images, spreadsheets - š—™š—¼š—æš—ŗš—®š˜š˜€ š˜ƒš—®š—æš—¶š—²š—± š—Æš˜† š—±š—²š—®š—¹š—²š—æ, š—ŗš—®š—øš—¶š—»š—“ š—¶š˜ š—µš—®š—æš—± š˜š—¼ š—±š—²š—°š—¶š—±š—² š˜„š—µš—®š˜'š˜€ š˜š—µš—² š˜€š—¶š—»š—“š—¹š—² š˜€š—¼š˜‚š—æš—°š—² š—¼š—³ š˜š—æš˜‚š˜š—µ - Processing limits - š—µš—¼š˜„ š—ŗš˜‚š—°š—µ š˜š—²š˜…š˜ š—°š—¼š˜‚š—¹š—± š—æš—²š—¹š—¶š—®š—Æš—¹š˜† š—“š—¼ š˜š—¼ š—® š—ŗš—¼š—±š—²š—¹ š—®š˜ š—¼š—»š—°š—²?

š—Ŗš—² š—Æš˜‚š—¶š—¹š˜ š—®š—» š—®š—“š—²š—»š˜š—¶š—° š˜€š—¼š—¹š˜‚š˜š—¶š—¼š—» š˜š—µš—®š˜:

- Breaks documents into logical chunks, routes only relevant parts through models - Uses š—±š—²š˜š—²š—æš—ŗš—¶š—»š—¶š˜€š˜š—¶š—° š—ŗš—®š˜š—°š—µš—¶š—»š—“ for transaction IDs, amounts, dates (reliable + traceable) - š——š—²š—½š—¹š—¼š˜†š˜€ š—Ÿš—Ÿš— š˜€ š—¼š—»š—¹š˜† š˜„š—µš—²š—æš—² š˜š—µš—²š˜† š—“š—²š—»š˜‚š—¶š—»š—²š—¹š˜† š—®š—±š—± š˜ƒš—®š—¹š˜‚š—² - Flags inconsistencies š—Æš—²š—³š—¼š—æš—² š—½š—®š˜†š—ŗš—²š—»š˜ š—“š—¼š—²š˜€ š—¼š˜‚š˜

š—„š—²š˜€š˜‚š—¹š˜š˜€: šŸ“šŸ¬% š—æš—²š—±š˜‚š—°š˜š—¶š—¼š—» š—¶š—» š—ŗš—®š—»š˜‚š—®š—¹ š˜„š—¼š—æš—ø. š—„š—²š—®š—¹-š˜š—¶š—ŗš—² š—³š—æš—®š˜‚š—± š—±š—²š˜š—²š—°š˜š—¶š—¼š—». š—„š—¢š—œ š—¶š—» šŸÆ š—ŗš—¼š—»š˜š—µš˜€.

š—¢š˜‚š—æ š˜š—²š—®š—ŗ š˜„š—®š—¹š—øš˜€ š˜š—µš—æš—¼š˜‚š—“š—µ š—µš—¼š˜„ š˜„š—² š˜€š—¼š—¹š˜ƒš—²š—± š˜š—µš—¶š˜€ - the fraud angles we considered, why messy documents were the hardest part, and how we kept it cost-effective for production. šŸ“¹