Tirreno User Guide

Overview

“The art of war teaches us to rely not on the likelihood of the enemy’s not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.”

—Sun Tzu, The Art of War

Tirreno is an ethical tool for the analysis of user activity aimed at uncovering malicious intents.

In order to achieve the declared objective, Tirreno collects intelligence to detect signals related to user identity and behaviour. This solution enables a detailed investigation of anomalies and a manual review of complex fraudulent patterns. It helps to maintain non-interrupted services and protect private information.

Since Tirreno brings enterprise-level fraud prevention techniques to a wide variety of digital platforms and businesses, it exists in two versions: cloud-based and on-premises software. The cloud-based version is a full-fledged solution for small and medium-sized platforms. The on-premises version is developed for platforms with a demand for utmost control or for integration into a complex defence system, facilitating risk assessment during user onboarding.

Privacy

By saying that Tirreno is an ethical tool, we highlight our commitment to not crossing a thin line between taking mandatory actions for fraud prevention and breaking user privacy.

In fact, Tirreno does not use cookies or browser fingerprinting and does not expose more user data than is strictly necessary.

Quick example

Open-source intelligence (OSINT) allows checking whether an email address is associated with online profiles. Tirreno uses this solely as factual information, without exposing online platforms’ names.

User data is safe with us. We do not share it with third parties and follow data retention policies. With the cloud-based version, Tirreno account deletion can be requested at any time. As such, deletion of an account leads to the immediate and irreversible removal of all associated data. With the on-premises version, full control over data and its security is exercised by a hosting platform.

System Workflow

The Tirreno’s workflow consists of the following main parts:

  1. Gathering of user request data.

  2. Enrichment and management of the collected data.

  3. Machine-led data processing.

  4. Manual review of the processed data.

In the next subsections, we briefly describe each of these stages. When applicable, materials covering the subject more fully are linked.

Data Collection

This stage is an entry point to Tirreno setup and further usage. It requires the installation of a lightweight script for sending user request data to Tirreno. And this is the only requirement for Tirreno to start operating!

For more information on this, see API Integration.

Data Enrichment

A perceived magic 🪄 is happening during this stage: raw pieces of data are carefully prepared and then intermingled with the Tirreno’s internal as well as external proprietary and open-sourced data.

Machine Processing

This is the backbone of the Tirreno background workings. Each user request data is processed through a set of specific conditions (rules). During this stage, the rules engine detects irregularities and suspicious activities. The received results define the calculated user score, which is a determinative characteristic to consider at the stage of manual review.

For more details, see the Rules section.

Manual Review

Tirreno outputs the accumulated knowledge base via a web-accessible user interface. The interface is designed to be a convenient tool for human-led investigation of the machine-preprocessed data analytics. It provides varying ways to proceed with investigation and can thus be flexibly adapted to different workflows and undertakings.

For a description of all the capabilities provided, advance to the chapters Console and Operator Procedures.