Skip to main content

How 20th century check fraud is helping prevent 21st century data theft

Trusona Wins Best in Show at Finovate 2018

How do you prove you are who you say you are? That might seem like an easy question to answer, but in a world where your most personal of private information can be harvested from your credit agency or social networking account, that ease is a problem. Fraudsters and criminals can also prove they’re you, using surprisingly little information.

That’s the puzzle Ori Eisen is hoping to solve with the Trusona password-free authentication system. It offers middle-man validation services to companies all over the world, in hopes of improving the protection of everyone’s digital data. He’s using the expertise of 20th century fraudsters like Frank Abagnale, famously depicted in the movie Catch Me If You Can, to shore up our modern digital defenses against classic social engineering tactics.

Digital Trends: Frank Abagnale is probably known by most as the subject of the 2002 movie Catch Me If You Can based on his escapades in the ’60s with check fraud and impersonation. How did you two become involved together?

Ori Eisen: The short version is that while I was working for one of the largest credit card companies, I was asked in addition to my internet responsibilities, to learn about all about counterfeiting of cards, which I didn’t know anything about. There’s no book or university degree on that subject, so I asked, who can teach me? The name Frank Abagnale came up again and again, it’s just that he doesn’t take new students.

The “Money Men” visiting @FairFX -with the one and only Frank Abagnale. Let the #NoPasswords Revolution begin. @trusona_inc pic.twitter.com/soAYZ3Vn7u

— Ori Eisen (@orieisen) December 7, 2017

I begged him for months and months to meet me and help me because through me he could help curb crime because I would take his knowledge and go and beat the bad guys. Eventually he agreed to the meeting and we’ve been working together ever since.

Although today Abagnale operates a consultancy firm, his expertise comes from a time when computers were incredibly rare and incomparable to the digitally-enhanced world we enjoy today. How is his input useful in the modern age?

The word “Trusona” is a fusion of True and Persona and in order to know who the true persona is, you have to go through a process called identity proofing. First let’s establish who you are as a person [because…] there is no authentication without identity proofing. How can I authenticate it is you if I don’t prove it is you to begin with?

“There is no authentication without identity proofing.”

Frank is really good at helping us think through in that moment when you conduct identity proofing, how to spot a fake document. How a bad guy would replace a picture of Frank with a picture of Steven Spielberg. How would you beat the certificate or how would you beat the black ink on the document or all the fine microprint. He really knows a lot about those documents because governments use them in that process.

In the journey of devising a way to find out who the true persona is, in many cases where we would have come up with a solution, he basically showed us how you could beat it very easily. So it was like playing chess until you come to the point where he could not beat what we were doing.

What kind of systems did you develop that were protected against the kind of social engineering attacks that Frank Abagnale is so effective at implementing?

When Trusona debuted, we launched with a curve that says what are you trying to protect, and that is the level of service we provide. In all of them, there won’t be any kind of password.

Different service levels require different levels of reveal. Our basic level, called “Essential,” is only asking you to provide an email address that we send an email to verify you indeed have access to it. There’s no documents involved, no pictures, nothing like that. That can tie you to an account, for media streaming or similar. Because it’s good enough. It still uses our anti-replay technology, so that even if bad guys were listening in to it, they couldn’t reuse it.

Trusona's Anti-Replay Technology

Our next level is “Executive.” That level says, ‘ok you can still be in your house, but in addition to your email, I want you to scan remotely, either a passport or a driving license.’ It’s not Trusona telling you to do it, we’re only completing the request of our partners. So, you’re trying to do something with your bank or to do something with your healthcare, and on their behalf we do it. Trusona does not store any of this data, because we don’t want to become the next hot potato for a bad guy.

The third level is called “Elite” and it asks you for an email, and to scan your document remotely, and to show yourself up in person. We only ask you to do that once, to connect you to a very strong credential. It’s not that every time you need to take a selfie or video, because that’s the only level that an underwriter will insure. It’s not for mass market, it’s for unique situations, but that is the only way to know the true persona, which is what our business is all about.

What about the growth in deepfakes and AI-driven video manipulation software that makes it possible to create lifelike video and images of people on the fly? Does that pose a threat to your “Elite” level?

Companies like Adobe released the equivalent for Photoshop for live video. It can imitate voice and face […] To go beyond that, you would have to begin with in-person identity proofing, meaning I need to meet you in real life, and with your documents, to establish that it’s you. You can not do it remotely. But not every use case requires that. It really depends what you’re trying to protect. If HBO wants to allow you to watch a movie, they don’t need that level of security. But if Goldman Sachs wants to move $50 million for Steven Spielberg, they might need that level of security.

Did you ever have Frank Abagnale try to social engineer Trusona employees?

In order to become the world’s first authenticated company – nobody else has taken these steps, because it’s not simple — we have to first protect our own data from our own employees. What if you kidnapped one of them and told us ‘I’ll only release them if you give me access to the keys?’

Right from the get go we spent a year in stealth mode and designed a system that even if you put a gun to my head I can’t help you. That includes our head of engineering and everyone else who built the system, because I explained to them, in order to protect the world from the bad guys, we can’t be the weakest link in the chain and they understand. That’s why we have to take very special people to sign up to this mission.

“[We] designed a system where even if you put a gun to my head, I can’t help you”

We also don’t store any hot potatoes. If you hacked us today, and we’ve done a lot of pen tests with different companies, all you get is one way hash of data. If I took your email, it’s one way hash. If I took anything about a transaction, it’s one way hashed, so you can never revert it back to the data because we don’t know what the raw value is.

If we were hacked by a nation state, which I expect to happen any day now, they would find something that was useless. We announced our insurance on May 6 2016 – two years ago. Ever since, 13 percent of our web hits are coming from Russia. And we don’t have a single customer there, we don’t have a single sales person there. That’s a lot for people we aren’t doing business with!

The third is training. I can tell you that even at our support guy, who takes support calls […] we train them to take calls from people like ‘Donald Trump.’ We are very adept at faking phone calls and making it look really legit, to make it seem like the president is calling you. We know how to do that because we are hackers. It’s the steps, the questions, not just saying yes to everything, that makes us as strong as we can be. Because we realize that the more pervasive we become, we are ourselves becoming a target.

What about legitimate demands from government agencies? Is Trusona data protected from the real Donald Trump?

We have had many dealings with three letter agencies, but the design is such that I can’t do it, even if you wanted me to. I don’t know what the data is. You can subpoena me today, and tell me to give you all the data on [a client]. Ok I’ll get the subpoena and I’ll reply if you can tell me which ones of our records are theirs, then you can have it, but I don’t know.

One of the most talked about digital systems in recent years has been blockchain technology. Today it’s used by governments and organizations to protect the veracity of data. Is it an effective tool for improving privacy and data protection too?

Blockchain technology is one of the most amazing inventions of our time, hard stop. However, many people make the link that if it’s mathematically correct they are immutable in real life and that’s where Frank Abagnale will just laugh at you.

Data security is failing and there has to be a better system. Blockchain creates a secure, unalterable public record and is poised to dramatically improve the world around you, from voting systems to rental contracts.

If I make a fake document of Jon Martindale and I go to a bank and apply with it and they put into a blockchain, by the time you will figure out that it wasn’t you and you’ll try to undo it, how will you expunge it from the blockchain? It’s the “GIGO” principle, garbage in garbage out.

Making a technology that’s mathematically perfect, is wonderful. I actually think that everyone who buys a house should have it on a blockchain so you can never lose your house. There’s a lot of good applications for that, but to say that that will solve the core identity problem is a falsehood. The problem was never about how to store the data, it was: How do I know who is who in the zoo?

With so many major hacks and data thefts taking place, it’s easy for people to feel powerless in protecting their data. Do you have any security recommendations for our readers that they can use to help protect themselves?

There is a very simple tip I’ll give them. Until we live in a world with no passwords, my only advice is change your passwords. It doesn’t cost you anything. Even if passwords were stolen yesterday, changing them is like changing the lock on your door. For the most important things in your life, your bank your healthcare, put a calendar entry and every month, every quarter, at a minimum once a year, change your passwords. The fact that we are creatures of habit is working against us.

Jon Martindale
Jon Martindale is the Evergreen Coordinator for Computing, overseeing a team of writers addressing all the latest how to…
Get up to $900 off the Dell XPS 15 and Dell XPS 17 today
A Dell XPS 15 laptop on an office desk next to a monitor.

It’s all change at Dell this year with the Dell XPS 16 replacing the Dell XPS 17 and the Dell XPS 15 gradually seeing fewer updates. That means if you’re still keen to snag a Dell XPS 15 or 17, your chance to do so is running out. That’s why it’s great to see some excellent laptop deals for both models with up to $900 to be saved at the moment. If you’re looking for a new laptop, read on while we guide you through what each laptop has to offer.
Dell XPS 17 -- $1,949, was $2,849

The Dell XPS 17 remains a good option for anyone seeking a powerful laptop that works well as a desktop replacement. It has a 13th-generation Intel Core i7-13700H processor with a massive 32GB of memory so it’s ideal for all kinds of productivity-based tasks such as if you need to manage many spreadsheets at once or if you just prefer to have a lot of windows open at once. It also has 1TB of SSD storage while it can handle plenty of gaming too thanks to its Nvidia GeForce RTX 4070 graphics card. Its display is a 17-inch full HD+ model with 1920 x 1200 resolution, anti-glare properties, and 500 nits of brightness so it looks great. Other quality of life improvements include plenty of USB-C ports, up to 14 hours of battery life, a great cooling system, and a form factor that means it squeezes a 17-inch display into a 15-inch form size. It also has a large edge-to-edge backlit keyboard, comfortable touchpad, and large keycaps so it feels good to work on as you’d expect from the makers of some of the best laptops.

Read more
This Dell gaming laptop with an RTX 3050 is discounted to $700
Dell G15 gaming laptop on a table.

You don't need to spend thousands of dollars to be able to get a decent gaming laptop, as there are budget-friendly options like the Dell G15 with the Nvidia GeForce RTX 3050 graphics card. It's currently even cheaper at just $700, following a $200 discount on its original price of $900. We're not sure how much time is remaining on this offer though, so if you think this is the perfect gaming laptop for you, stop hesitating and proceed with the purchase immediately to make sure that you don't miss out on the savings.

Why you should buy the Dell G15 gaming laptop
The Dell G15 is highlighted in our list of the best gaming laptops as the best budget gaming laptop under $1,000, as it provides dependable performance while staying affordable for most gamers. It's equipped with the Nvidia GeForce RTX 3050 graphics card, which is perfect for budget gaming, and pairs it with the 13th-generation Intel Core i5 processor and 8GB of RAM. These specifications are more than enough to be able to play the best PC games, though you may have to dial down the settings for the more demanding titles.

Read more
Intel’s big bet on efficient GPUs might actually work
An Intel Meteor Lake processor socketed in a motherboard.

Intel has a lot riding on its next-gen Battlemage graphics architecture, and a very early benchmark shows some promising signs for performance. An Intel Lunar Lake CPU packing a low-power integrated Battlemage GPU was reportedly spotted in the SiSoftware benchmark database. It boasts not only higher performance than Intel's Meteor Lake chips, but also much better efficiency.

User @miktdt on X (formerly Twitter) spotted the result, which appears to come from an early qualification sample of the HP Spectre x360 14. The benchmark picked up that the laptop was using a Lunar Lake CPU, which is said to come with the Xe2-LPG architecture, a lower-power version of Battlemage.

Read more