Verify

Verify and validate customers globally using their phone number.

Velocity

Discover the network provider for every mobile number globally.

Authenticate

Protect customers, accounts, and transactions within your app.

Live

Discover if a mobile number is assigned to a subscriber.

Score

A real time phone number credibility score.

TeleShield™

Identify if a number has the propensity to be used for fraud.

Banks and Financial Services
E-Commerce
Insurance
Mobile Messaging
Gaming & Gambling
Communication and Service Providers
Identity & Verification Providers
eBooks
News
Developers
Viteza
FAQ
About us
Events
Careers
Contact us
Articles

With Great Power Comes Great Responsibility: Data Access is Key

Claudiu Filip

5 min read
  • The concept of balancing power with moral authority is ancient
  • But it has an application in modern business too
  • We must be scrupulously careful around customer data
  • Trust is the key to making systems secure – and it must be earned

With great power comes great responsibility.

It’s a line that has become so widely known that it’s now almost a catchphrase – or cliche.  And this is thanks to its modern iteration which, I learn, began in a Spiderman strip cartoon in 1962, before being used more recently in the immensely popular Marvel film franchise around the same character.

But its origins as a philosophical position apparently go back to at least Cicero and Ancient Rome, possibly beyond – because the idea that power must be balanced by moral authority is at least 2,000 years old.

Power and responsibility must go together

And, although it’s perhaps a stretch to describe what I do as wielding great power – I’m probably more of a geek than a superhero, truth be told – I do think that the Spiderman philosophical position does have some relevance in describing a crucial aspect of what we do.

And that is around the question of access to data that underpins everything that TMT ID does – in terms of verifying and authenticating legitimate customers or users, identifying and weeding out rogue ones – and protecting the integrity of the platforms hosting them.

In order to do this, it’s crucial that we have as much access as possible – but equally not one iota more than we are legally allowed. And we only ever have access to what customers have okayed us to see, for example, via those terms and conditions box ticks and so on.

We must never abuse this power. That is a big responsibility.

Rules around data are strictly enforced globally

There are serious reasons why we have to be super careful around this whole area.

Firstly, data use is very heavily regulated.

In the UK, where TMT ID’s HQ is, there is the Information Commissioner’s Office (ICO) – and there are equivalent regulatory organisations in pretty much every country in which we operate. Each will have their own small variant rules so it pays to be both well-informed, very careful and, as a safety net, to err on the side of caution.

Because these regulators will come down heavily on anyone seen to be misusing data access. And fines can be enormous: the ICO, for example, is empowered to fine as much as £17.5 million or 4% of annual global turnover, whichever is higher.

But even without this scary financial disincentive, there’s an even more compelling reason to ensure rigid compliance: trust.

Trust is a commodity that takes a long time to accrue and just a moment to lose.

No one can be blase around security when trust is so crucial

And yet without it, we’d simply disappear. Because commercial enterprises that have become known for being reckless around personal data don’t tend to stick around.

One thinks of the Cambridge Analytica scandal. (In the 2010s, this company was harvesting personal data from social media users and using it for targeted political advertising – until they were exposed).  Where are they now? Quite.

And the whole sector of device-based security, from mobile phone networks to authentication services like ourselves, represents a global circle of trust. They need us to make sure they’re not being scammed, and nor are their customers, while we need them to be able to check.

And so on. We all need to be trustworthy and to be able to trust each other.

We also need to be hyper-vigilant.

Hackers can target any business so stay alert always

Because data breaches can happen in the most unlikely places. Rather than some flashy City fringes fintech or crypto outfit, the victim of the most serious hack in London in the last year or two was…The British Library. They’re still trying to repair the damage after all their user data was accessed by rogue agents.

Or you can be hacked via the virtual backdoor: the biggest international hacking scandal of the year involved the discovery of a maliciously introduced so-called backdoor in Linux’s xz programme. A presumed Chinese hacker using the name Jia Tan was discovered in March to have been weeks away from having potential access to millions of systems worldwide when the plot was uncovered.

This is scary stuff – but the lesson is to fear the worst. And prepare for it.

Key is to ensure your systems are set up for absolute discretion

I can’t reveal the nuts and bolts of how we do what we do because it is necessarily confidential. We don’t want to give the hackers any insight that may help them in any way at all. But we are aware that they are out there and that informs everything we do.

The customer information we are checking could be invaluable in numerous scams, and the fraudsters would love to be able to access it.

So our first protection against them doing so is not to see it ourselves: checks are digital rather than personal, and our systems see to that. And we use encryption at every level for any data transaction, with access codes changing constantly. Our systems are set up so that many pairs of eyes can see these processes – transparency is very important here – but none have the power to alter anything.

Finally, we need to be constantly alert.

If you want customers to trust you, you must be super careful about who you trust

We must assume that people are untrustworthy rather than relying on them not to be. That guy whose leaving drinks you just went to? Make sure that none of the passwords or codes he used are still live – right now.

Ensure that anyone walking the digital corridors of your business still needs the keys to get into any room.

And those who are on the side of good in all this will share information on what fraudsters are doing now, and what the next scam is. So that’s where we are: in a circle of trust. This careful cooperation can help legitimate trade, and help defeat fraud.

So – again, without wishing to sound too superheroic – we are, in a sense, a power for good. Perhaps not quite Spiderman but we are doing our bit.

Last updated on September 27, 2024

Contents

Related Articles

Promotional graphic for "the identity arms race" by peter taylor, featuring a stylized image of a woman sending a kiss, with a green and white abstract design on a dark background, addressing

The Identity Arms Race

The Case for Progressive Verification: A Layered Approach to Identity Assurance

Romance Fraud: The Honeytrap Scandal at the Heart of the UK Government


What Our Customers Are Saying

"Phone number verification plays a critical role in helping to detect and prevent online fraud. TMT ID’s TeleShield product provides easy access to global mobile data, enabling us to enhance the actionable results of our MaxMind minFraud® services."

MaxMind

"BTS (Business Telecommunications Services) is successfully using TMT’s Velocity and Live services to check the status of mobile numbers. This way we make sure we optimize the performance of the service offered to our customers and ensure the quality of terminating traffic to all countries.”

Business Telecommunications Services

"Working with TMT’s TeleShield service has expanded our ability to detect fraud and minimise the risk to our business. TeleShield brings peace of mind and the opportunity to stop fraud before it affects our customers’ bottom line or the service."

Six Degrees Labs

"LATRO relies on TMT’s TeleShield to provide the most up to date and reliable numbering qualification information within our fraud reporting tools, enabling us to protect our customer’s revenues and empowering them to defend themselves against fraudulent numbers."

LATRO

"TMT is a valued partner that enables us to manage our routing costs effectively. They proactively and continuously expand their operator and country coverage while delivering exceptional customer service. We can always count on them to achieve high-quality results and look forward to our continued collaboration."

Global Message Service

"TMT provides us with the most comprehensive numbering intelligence data through their fast and reliable Velocity and Live services. TMT is a trusted partner for us, their products ensure that we continue to optimise the best performance and service to our customers."

Global Voice

"TeleShield from TMT gives 42com the power to detect and target telephony fraud scams internationally, thereby protecting our company from the financial and customer experience impacts of telecommunications fraud."

Alberto Grunstein - CEO

"It has been a pleasure to work with the team at TMT. They have become an essential provider of accurate numbering data information and Number Portability services globally."

Luisa Sanchez - VP of SMS and Messaging Solutions, Identidad Technologies

"Deutsche Telekom Global Carrier uses TMT ID as one of their key suppliers for Mobile Number Portability Data services. Deutsche Telekom Global Carrier uses TMT ID’s Velocity MNP solution. This is an ultra-fast query service that optimises the routing of international voice calls and A2P messaging."

Deutsche Telekom Global Carrier

Ready to get started?

We provide the most comprehensive device, network and mobile numbering data available

Contact us > Chat to an expert >