The verification game

7
The verification game Everyone is gambling. Speculating. Hoping for the best. Izzat, karma, in’sh’allah, God willing …. PRAY’ing that things won’t go wrong and everything will be ok and as it has been so far and is today. So far so good. Defining the problem No one can forecast the future. Human behaviour – and especially anticipatory behaviour – is impossible. Take the example of onetime crimes, firsttime crimes, suicide bombers, young male muslims traveling to Syria, Hollywood movie “Minority Report” like situations … this requires reverse logic, lateral thinking and outofthebox solutions that provide 10x benefits without 10x costs. Given a population of 1 billion or even a 100,000 the problem of 1 is to find where the haystack is before you even think of finding the needle. The problem Keeping track of each of the population will create a police state in the name of softer goals, communism, socialism, gulag, stasi, CIA torture we can make an endless list that violates human rights and the UN charter. The “balance” between constitutions, law, privacy, security, safety, identity, integrity, validity are all 21 st century challenges. Also “static” does not work. People change their mobile numbers and emailids. Tenants move homes. Landlords sell houses. Employees move to other states. New vehicles are bought. Central or Federal systems and State systems may differ from Metro, Community or Business enterprise needs. Statutory is different from Policies and Guidelines, what really matters is based on behaviour and culture. You need to find only the bad apples OR worry about the lonewolf attack OR the one needle (or a few needles) in a hay atack.

Transcript of The verification game

Page 1: The verification game

The verification game

Everyone is gambling. Speculating. Hoping for the best. Izzat, karma, in’sh’allah, God willing …. PRAY’ing that things won’t go wrong and everything will be ok and as it has been so far and is today. So far so good.

Defining the problem

No one can forecast the future. Human behaviour – and especially anticipatory behaviour – is impossible. Take the example of one­time crimes, first­time crimes, suicide bombers, young male muslims traveling to Syria, Hollywood movie “Minority Report” like situations … this requires reverse logic, lateral thinking and out­of­the­box solutions that provide 10x benefits without 10x costs.

Given a population of 1 billion or even a 100,000 the problem of 1 is to find where the haystack is before you even think of finding the needle.

The problem

Keeping track of each of the population will create a police state in the name of softer goals, communism, socialism, gulag, stasi, CIA torture we can make an endless list that violates human rights and the UN charter. The “balance” between constitutions, law, privacy, security, safety, identity, integrity, validity are all 21 st century challenges.

Also “static” does not work. People change their mobile numbers and emailids. Tenants move homes. Landlords sell houses. Employees move to other states. New vehicles are bought.

Central or Federal systems and State systems may differ from Metro, Community or Business enterprise needs. Statutory is different from Policies and Guidelines, what really matters is based on behaviour and culture.

You need to find only the bad apples OR worry about the lone­wolf attack OR the one needle (or a few needles) in a hay atack.

Page 2: The verification game

Which is the bad apple? What if it is bad on the inside? Which haystack? Where are all the haystacks? Who is the wolf masquerading as? Is he on our radar? We can’t act on the information we have so far. Which haystack should I search first? Do all haystacks look the same? What is the past, present and future of this haystack?

Any solution must also be inevitably “integrated” and not silos as today. The physical world and virtual worlds. Individuals, their online identities and avatars. Automation and manual. Internet of PCs, mobiles & things. Homes, Households, Residential towers & Commercial complexes. A smart­city or intelligent building is only as good as the “persons” who live in it. Each is a person with variable and changeable behavioural pasts, presents and future.

Verification is starting to become a pain­point. Bad publicity, “one idiot.”. New mandates are making you look at the problem of verification an immediacy for you. CSR, Workplace gender issues, whistle blower policy implementation, anarchists & jihadists in your server­ rooms. Definitely 80%+ of most problems worldwide are the threat from inside – the bad apples and the needles in the haystack. How do you find the 20% of the 20% of the 20% of the 20% of the 20% who may have already done this, are doing it right now OR will do so in the future?

What is your (or your Business) position?

o I / we do NOT care, firm does NOT care if …. q Whether he or she has a criminal record, it does not affect us. q Women have clear roles OR should stay at home. q Is a pedophile. q provoked is prone to anger and violence. q Clinically mentally challenged and sometimes a threat. q Has ADHD, OCD and related symptoms.

Page 3: The verification game

q Is always sick and does not attend office reliably. q Plays online games or browses porn in the office q Is an alcoholic or a drug­abuser and mis­behaves sometimes. q Is a gambler or has a lot of debt from it. q Is deeply religious and willing to die for it. q The person does not care whether and if he gets caught. q He is taking kickbacks from suppliers. q Has stocks in competing firms. q Is secretive and we do not know much about his or her private life.

o … as long as he or she does what they are being paid for, work­output is good AND the paperwork is all perfect & verified, its ok!

We may Appear scare­mongering and be talking about the 20% of the 20% of the 20% of the 20% of 20% under your control … but that’ enough – the one bad apple, the lone­wolf or needle in the haystack to upset the apple­cart, bring business to a halt or make all haystacks un­ usable.

The real conundrum

The law perhaps arguably – but the facts remains – maybe based on Christian, secular, constitution, Western tradition but is one giving a chance to redeem, change, be forgiven, let go, forgiveness, if they are sorry, or plead guilty, lesser charge for co­operation or being an informant. Re­habilitation & correction facilities, won’t happen again. A first offender must be allowed redemption and given a second chance. Systems already allow this.

However we still must track one­time offenders to catch them if there is a second­ transgression or a repeat­offender. If we don’t do the first, the second will fall through the cracks of the system. This is where technology, automation and good­systems can make a difference.

Solution options

Current solutions of hoping it will go away, passing the buck, throwing resources or money at it, allowing agencies to go rogue are not working.

Use our adaptive, evolutionary, community, multiple haystack grouping methodology, design, architecture, taxonomy, system, process, workflow, checklists, cloud, platform, software, hardware, hosting, tool, enabler as an end­to­end comprehensive integrated solution to your “needles in haystacks” problem.

Look for an integrated solution, don’t acquire it in silos and hope to integrate it at some future date just because you don’t have the resources or you want to save your back­side by

Page 4: The verification game

buying from a Big­5 because of a Big­5 analytics reports and a Big­5 has paid up somewhere to get the business.

Think strategic, global citizenship, community benefit, individual rights, seamless technology not just IT/ICT leverage, user experience and of course TCO (Total Cost of Ownership) and ROI (Return On Investment) matters whether its yours, stakeholder or public money.

Our solution

Defining haystacks to start with. Some haystacks are more volatile and susceptible than others. Tools available for this are Geographic & demographic but more important is the Psychographic dimension.

Each of these haystacks may or may not have a needle or needless that concern us. In this case we leverage the haystack. Call it community policing, social media, virtual groups, fencing, gossip, self­preservation or jsst a 21 st century way of doing this.

Talk to us from Design, Advisory, Risk­prioritization & Architecting to Training, Deployment, Communications, collaboration & networking TO analytics, reporting, alerts, tracking, monitoring … end­to­end per capita or per­alert “cost”, “pricing” solutions whatever your size. 1 billion, 1 million, 1 thousand to a few 100.

It is an on­going process of pre­event, in­event and post­event for each and all of your haystacks and known or unknown needles in your haystack.

The process we follow already has a design and architecture and scalable tool to allow all this to happen incrementally and quickly.

Put in place a culture, values, traits, habits, encouraging specific behavioural characteristics while discouraging other behavioural characteristics. The challenge is not

Page 5: The verification game

Republican versus Democrat or Secularism vs Religion … it is “extremes” against the moderates …. The “tails” of the “bell­curve”. Change or else this will change you.

The following shows a “information gathering” black­book buildup of information as it happens on a clextra platform.

You do not know anything about anything till you quantify it. We have a very simple individual risk rating system. A risk­rating number between 1 and 9. Everyone starts on a 5 which is default and unknown. With every positive it lowers going to the BEST possible which is a 1. With every proven and witness, evidence support, negative, FIR, warning, alert, civil or criminal the rating drops to a maximum of 9. (Definite risk). In a more mature form this can be a 3­dimensional rating as below …

We start with whatever we have or is available but our design architecture allows add­on of bits and pieces of information over a period of time – manually & automated. The system – with your involvement ­ gets more intelligent and useful over time – very little of budgets or past­investments will be wasted, going forward.

Features

Some of the features from the “integrated” solution …

1. Main­key can be the India UID aadhaar (or Social Security Number or Welfare ID). 2. Using MDM (Master Data Management) any other key can be mapped to this main

key allowing cross­industry, cross­utility and cross­purpose integration. 3. Geography mapping. 7­level whole globe system can be integrated to GPS, Google

Maps, and layering of multiple databases on top of this. 4. User­bases : Individuals, homes, groups, clusters, communities, customers or vendor­

groups. Self­service. Information­bases and access­control. Personalisation. 5. Evidence upload and download as any document. EDMS system any OS, file­type,

mime­types, formats. 6. Checklists. Multiple points each as simple, dated, 3­level approval or escalation

options, evidence­backed, decision­quality and more. 7. Base information such as Aadhaar or EMV databases, extended­Aadhaar, to black­

book custom­add on of individuals information as you get it. Individual and Team profiling on Geography, Demography & Pscyhography.

Page 6: The verification game

8. Pyschographic profiling. Supporting the Geographic & Demographic. Self­ assessment, over 30+ behavioural assessments, peer assessments, third­party validation, 360 degree and more.

9. Cloud based accessible any­where, any­time, any­device, any­one (with or without login). Currently limited to English but any Unicode language add­on is technically feasible.

10. Info­Toll­Gate automated query system. SOAP, XML, EDI­X25 integration etc. 11. eWallet payment system with subscriber subscriptions management and automated

billing and eCash management.

Possible user­group(s) or Target audience(s)

In our design and system these could be the haystacks that we define in our solution space. The list is unlimited with different implications for different user groups under different circumstances.

1. Government – Central & State, Local authoritative. a. Foreign visitors (Immigration control) b. Criminal databases Records (Escaped, wanted, supposed to be in custody) c. Past­criminal­record database (Public to be able to query this) d. Travel restrictions database (Homeland security) e. Not allowed to drive (RTO/Police traffic accident, drunk­driving etc.) f. Extremist organization members. g. Homeland Security. Anti­terrorist cells.

2. Private Enterprise a. KYC (Known Your Customer) for banks b. CAF (Customer Application Form) for Telecom firms. c. Do not employ register. (Reasons, background, evidence) d. Do not deal with. (AML/Corruption/Black money police­record). e. Deal with care (Known whistleblowers) f. Defunct firms list (MCA, SEBI, BSE, NSE other government authorities) g. Profiling agencies. LPO. BPO. KPO. h. Data governance, data management, analytics firms.

3. Individuals a. Self­service. Public access. Free. Paid­for. Subscribed­to. Shift the onus. b. Prove that you are clear and are employable, can be trusted. c. Allow authorities to verify, double­check, confirm, audit your data.

Access would again be based on open to public as a citizen good, against to firms, subscriptions to individuals, pay­per­user, who can WRITE or READ­ONLY from the systems, FREE or PAID­FOR automated transaction­query­based access, self­service, trust & anti­trust based system, records and fields in the database.

Page 7: The verification game

Why game?

Why is verification a game? Verification is based on the art of games and the science of game theory. You have to “know” and “anticipate” your opponent. You have to know your “board territory”, “options”, “rules” & “strategies”. There is a high degree of intuitive, pattern recognition. There is a clear “pre­move”, “in­move / current­move”, “future­move” element. When these are not defined as the problem statement to start with – the game has changed. Bad apples, needle­in­haystacks and lone­wolves play a different game with different rules. You have to revisit your assumptions in the first place – which is where Riskpro, clextra & our PRAY model scores wins.

Commercial & Business model options

Primarily a b2b – but your customers are our customers b2c – there are one­time, upfront costs. One­off purchases or monthly subscriptions Per­transaction, READ­ONLY, pay­per­use, pay­per­query, WRITE to records and a variety of pricing options suitable to any pocket. Rs. 1/­ to Rs. 5000/­ per transaction; OR monthly fixed Rs. 10,000/­ to Rs. 600,000/­, variable as­ needed­project charges in the range of Rs. 3 to Rs. 30 lakhs, USD, Euro, GBP or other currency OR hosting on request.

Document …

PRAY thoughtpaper.doc Dec 17, 2014

Casper Abraham [email protected] +91 98450 61870 Founder Director Riskpro India Ventures (P) Ltd. Bangalore­Mumbai­Delhi­Chennai INDIA Website … http://riskpro.in Platform website … http://edgevalue.com/clextra Access … http://clextra.edgevalue.com (When we give you this option)