Organised fraud rings do not operate as isolated individuals. They share phone numbers, addresses, devices, bank accounts, and IP addresses across dozens of applications submitted to the same or multiple lenders. Each application looks legitimate in isolation. The network graph makes the connections visible — and what looks like a creditworthy borrower on a single-application view becomes the obvious centrepiece of a coordinated fraud ring on a graph view.
Why Traditional Fraud Models Miss Organised Rings
Conventional fraud detection evaluates each application independently — checking the applicant's bureau, their income, their address, their identity documents. This is adequate for opportunistic fraud: the individual who submits false income documentation or takes a loan they cannot repay. It fails completely against organised fraud rings, whose defining characteristic is that the individual application is carefully constructed to pass exactly these checks.
A synthetic identity — a fraud persona built by combining genuine identity documents from multiple real people with fabricated or stolen credentials — may have a plausible credit bureau history seeded by small legitimate loans. It may have a genuine bank account with manufactured transaction history. It may have a real-looking employer reference. None of these are detectable by single-application analysis. What is detectable — only on a graph — is that the phone number linked to this application also appears on seven other applications submitted to this lender in the last 90 days. That the IP address last used to log in matches the IP address of four other applications. That the bank account shows identical transaction patterns to two other applicants whose loans are already in default.
The Fraud Risk AI builds and continuously updates an entity relationship graph — a live map of every shared attribute across every application in the system — and uses graph analytics to detect clusters of connected entities that share the structural signature of coordinated fraud.
The Network Graph: Live Visualisation of Connected Entities
The 6 Entity Attributes That Build the Graph
The fraud network graph is built from six categories of shared attributes. Every application submitted is checked against every attribute in the graph database — not just the attributes of other applications to the same institution, but across the fraud intelligence consortium of lenders sharing the Fraud Risk AI's network graph. A fraudster who submitted applications to three other lenders last month is identifiable the moment they submit to a fourth, even if they changed their name and address.
From Graph Detection to Coordinated Response
When the Fraud Risk AI identifies a ring — a cluster of 3 or more applications connected by 2 or more hard-link attributes — it does not simply flag the newest application. It reviews the entire cluster and assigns a ring fraud score to every member, including applications already disbursed, applications in pipeline, and applications pending disbursement.
The coordinated response has three components. For applications pending disbursement: immediate hold, pending ring fraud investigation. For applications in pipeline: review queue with ring membership evidence provided to the fraud team. For already-disbursed accounts: flagged for enhanced collection and legal review, with documentation preserved for potential law enforcement referral and insurance claim.
Critically, the ring detection triggers an alert to other lenders in the fraud intelligence consortium — not the individual application data, but the shared attributes (phone numbers, devices, addresses) that can be used to block the same ring from succeeding elsewhere. This consortium intelligence model is the reason that catching a fraud ring at one lender prevents it from simply moving to the next.
The Fraud Ring That Is Invisible on a Single Application Is Unmistakable on a Graph
Organised fraud ring detection is a problem that individual-application analysis cannot solve — not because the data is insufficient, but because the pattern only emerges at the population level. The Fraud Risk AI's graph model is the only analytical framework that can see what experienced human fraud investigators have always known: fraud rings reveal themselves through their connections, not their individual applications. The graph makes those connections machine-readable, searchable, and detectable in seconds rather than weeks.
