{"id":10595,"date":"2019-07-12T11:58:08","date_gmt":"2019-07-12T11:58:08","guid":{"rendered":"http:\/\/www.esds.co.in\/blog\/?p=10595"},"modified":"2021-10-25T11:15:33","modified_gmt":"2021-10-25T11:15:33","slug":"blockchain-and-fraud-detection","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/blockchain-and-fraud-detection\/","title":{"rendered":"Blockchain and Fraud Detection"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_Blockchain_Can_Help_in_Fraud_Detection\"><\/span><strong>How Blockchain Can Help in Fraud Detection<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<p style=\"text-align: justify;\">Blockchain refers to a shared ledger that is decentralized and resistant to any sort of tampering. It gives the verified contributors the access to store, view, and share the digital information in an environment that is rich in security, which in turn helps in fostering trust, accountability, and transparency in business relations. To capitalize on these stated benefits, companies have now started exploring ways in which the <strong><a href=\"https:\/\/www.esds.co.in\/blog\/everything-need-know-blockchain\/\">Blockchain technology<\/a><\/strong> could be used for preventing fraud in various industry verticals.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/blockchain-and-fraud-detection\/#How_Blockchain_Can_Help_in_Fraud_Detection\" >How Blockchain Can Help in Fraud Detection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/blockchain-and-fraud-detection\/#Three_Features_of_Blockchain_Which_Prevents_Frauds\" >Three Features of Blockchain Which Prevents Frauds<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esds.co.in\/blog\/blockchain-and-fraud-detection\/#i_Distributed_Networks\" >i. Distributed Networks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esds.co.in\/blog\/blockchain-and-fraud-detection\/#ii_Immutable\" >ii. Immutable<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esds.co.in\/blog\/blockchain-and-fraud-detection\/#iii_Permissible\" >iii. Permissible<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esds.co.in\/blog\/blockchain-and-fraud-detection\/#What_Type_of_Frauds_Are_Detected\" >What Type of Frauds Are Detected?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esds.co.in\/blog\/blockchain-and-fraud-detection\/#1_Financial_Fraud\" >1. Financial Fraud<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esds.co.in\/blog\/blockchain-and-fraud-detection\/#2_Identity_Frauds\" >2. Identity Frauds<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.esds.co.in\/blog\/blockchain-and-fraud-detection\/#3_Supply_Chain_Frauds\" >3. Supply Chain Frauds<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.esds.co.in\/blog\/blockchain-and-fraud-detection\/#Financial_Fraud_Case_2017_Fyre_Festival_Scam\" >Financial Fraud Case: 2017 Fyre Festival Scam<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.esds.co.in\/blog\/blockchain-and-fraud-detection\/#Identity_Fraud_Case_Facebook_Security_Scam\" >Identity Fraud Case: Facebook Security Scam<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.esds.co.in\/blog\/blockchain-and-fraud-detection\/#Supply_Chain_Fraud_Case_Supply_and_Distribution_of_Seafood\" >Supply Chain Fraud Case: Supply and\nDistribution of Seafood<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Three_Features_of_Blockchain_Which_Prevents_Frauds\"><\/span><strong>Three Features of Blockchain Which Prevents Frauds<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<p style=\"text-align: justify;\">The main three characteristics which makes the blockchain technology an ideal choice for preventing fraud are-<\/p>\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"i_Distributed_Networks\"><\/span>i. <strong>Distributed Networks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n<p style=\"text-align: justify;\">The blockchain technology consists of a distributed digital ledger that contains data that is shared between computers and reconciled on a regular basis. There is no central authority which gives no point of failures. The management and authorization of the data spread across the network is transparent, such that there is no place to commit fraud. The members in the business network or supply chain management can quickly check and verify the processes from beginning to end. Not only the current data, but the historical data of the asset transfer is almost on the go for the participants present in the network. For making alterations to the data on the block, one needs to gain control over the majority of the systems present in the network<\/p>\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"ii_Immutable\"><\/span>ii. <strong>Immutable<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n<p style=\"text-align: justify;\">Once a data or transaction is registered on the blockchain, it can&#8217;t be altered, thus making it immutable. Also, before a block is formed and added to the chain, all the participants in the networks need to validate the data. This validation is known as Consensus. Once the consensus is done, the block is approved and given a timestamp, prior to which it is attached to the previous block on the chain. Thus, with blockchain one can procure the data of an asset in terms of its origin, the journey it has done, and the owner for the given asset<\/p>\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"iii_Permissible\"><\/span>iii. <strong>Permissible<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n<p style=\"text-align: justify;\">Blockchain networks are built on permission or non-permission which depends on the type and formation of blockchain. Such permission-based blockchain networks work great in preventing fraudulent activities as they can restrict the access of the systems. This is also known as private blockchain<\/p>\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_Type_of_Frauds_Are_Detected\"><\/span><strong>What Type of Frauds Are Detected?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Financial_Fraud\"><\/span>1. <strong>Financial Fraud<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n<p style=\"text-align: justify;\">Blockchain can help in combating financial fraud. Various aspects can make financial transactions look more complex. Some of these tasks could be- the time needed for any settlements, collateral requirements, the difference in currency denominations, and many more. Some procedures are multi-staged and necessitate reasonable levels of human interactions for most cases. Blockchain can help in fraud detection by enabling the sharing of information in real-time and updating the ledger upon the agreement of all parties. This will not only prevent frauds but also lower the overall costs and time taken for the process too.<\/p>\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Identity_Frauds\"><\/span>2. <strong>Identity Frauds<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n<p style=\"text-align: justify;\">Identity theft is one of the serious issues that has impacted consumers across the globe in the past few years. Blockchain ensures the security of the digital ID of an individual in a manner that makes it tamper proof. In cases of identifying data being kept in a permission-required framework, the authorized parties can access a single version of the real information and verification of transactions can be done only by a known party. This keeps the records safely and importantly, valid.<\/p>\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Supply_Chain_Frauds\"><\/span>3. <strong>Supply Chain Frauds<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n<p style=\"text-align: justify;\">Supply chain fraud is also a major issue that is faced by several companies in recent times. The supply chain networks are quite complicated with a large number of people being involved in the process. Blockchain helps in preventing fraud by a more transparent and easily traceability of products. The Blockchain products can&#8217;t be manipulated with ease and verification and updating takes place once an agreement amongst all approved participants has been done. Digitization by the blockchain helps in tracing back the products to their origins.<\/p>\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Financial_Fraud_Case_2017_Fyre_Festival_Scam\"><\/span><strong>Financial Fraud Case: 2017 Fyre Festival Scam<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<p style=\"text-align: justify;\">Fyre Festival of 2017, is a musical festival which was supposed to take place at the Bahamas received attention on its failure post-release of the documentaries by Hulu and Netflix. The organisers made a false promise to the attendees and the main organizer of the event cheated a dozen investors with a million dollars. In July 2018, it was stated that the lead organizer had cheated more than 100 investors with a total of $27.4 million. The organizer lied about his personal business and used the brokerage account statements for showing the fraudulent income. He told his investors that he had more than $2.5 million in his personal stock holding, but in reality, he had an amount which was less than $2000. The money obtained from the investors was being used for funding his lavish and rich lifestyle<\/p>\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Identity_Fraud_Case_Facebook_Security_Scam\"><\/span><strong>Identity Fraud Case: Facebook Security Scam<\/strong><strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<p style=\"text-align: justify;\">The Facebook Security Scam is an instance of social media fraud, which was specially designed to separate social media users from their money. In the year 2012, scam pertaining to Facebook was developed in an attempt to steal financial information from their users. Hackers hijacked the user accounts by impersonating the security set up by Facebook. These hacked accounts were used to send fake messages to other users by warning them that their account was about to get deactivated and thereby, instructing the users to click on a link to verify their account. Post this, the users were directed to a false Facebook page which asked them about their account credentials as well as the credit card information in order to secure their account.<\/p>\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Supply_Chain_Fraud_Case_Supply_and_Distribution_of_Seafood\"><\/span><strong>Supply Chain Fraud Case: Supply and\nDistribution of Seafood<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<p style=\"text-align: justify;\">The supply chain in seafood has been in the headlines for negative reasons for quite some time. The current seafood supply chain holds tedious processes like the manual record keeping, which makes it more vulnerable to errors. Other issues that result in making the supply chain inefficient include improper food storage conditions, mislabelling fraud, and the existence of unregulated prices. As a result of this, the quality and <strong><a href=\"https:\/\/esds.co.in\/security\/esds-vtmscan\">security <\/a><\/strong>of food reaching the end customer is compromised. Also, there are various types of fraud involved in the chain, leading to a lacking trust between the customers and vendors. The blockchain technology can prove to be of great help in the seafood verification as it can track the seafood right from its production stage and ending with its distribution.<\/p>","protected":false},"excerpt":{"rendered":"<p>How Blockchain Can Help in Fraud Detection Blockchain refers to a shared ledger that is decentralized and resistant to any sort of tampering. It gives the verified contributors the access to store, view, and share the digital information in an environment that is rich in security, which in turn helps in fostering trust, accountability, and&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/blockchain-and-fraud-detection\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":61,"featured_media":12809,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1668],"tags":[1669,1828,2198,1896],"class_list":["post-10595","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain","tag-blockchain","tag-blockchain-technology","tag-digital-information","tag-fraud-detection"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=10595"}],"version-history":[{"count":9,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10595\/revisions"}],"predecessor-version":[{"id":12810,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10595\/revisions\/12810"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/12809"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=10595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=10595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=10595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}