Identity fraud is a hugely important problem. Today, criminals have tools at their disposal to get at sensitive Consumer Financial data. Complicated situation and that we get briefings like wheree i just received you go through just how massive the problem is and the techniques that are available. We realize that mentioning them in public is not a wise thing to do. This puts us in a tough situation. And thell of my Members Committee and their staff to get those briefings from members to our testifying today to see how big a problem this is. It is costing us a lot more than we think. Toolsare large numbers of that people use. These intrusions are only becoming more sophisticated. In the news this week there was synthesizer voice from anke instructions employee who thought it was his boss. That will accelerate as the Technology Gets more advance. The stakes in this are a enormous. Financial services at the front lines of this attack. It can be used for something to do Identity Fraud. It can be bought cheaply off the web. These Fake Identities look completely real. Criminals can use them to open accounts. Accounts. The unfortunate common practices of breakout, where you simply have a massive loan and never repay it. You buy a car that you ship offshore. This scam happens using these synthetic identities. Of thingsa number that we can do. I was very impressed by the roadmap produced by one of my witnesses here. Someone only has time to read one document, that is the one i personally found the most useful. It provides a roadmap for what government can do to help. I think the government has a ,nique role in provisioning that we ultimately should take responsibility for maintaining a valid list of our citizens. This is one of the reasons why i am very eager to hear more from the witnesses in this hearing. In light of the fact that we are unlikely to have a large amount of time because the votes may be intervening, i think i will just cut off my comments here and turn it over to my colleague. Hill thank you for intervening this task force. I know this is a topic that you particularly care deeply about. Very interested in learning how our identity systems can be modernized in such a way that of the personal information of our citizens. We anticipate a Digital World where we are distributing , productsservices digitally through banks and nonbanks across the country. Mobile app ora through the internet or through the web. This issue of authenticating someones true identity that you are doing business with and that they in turn are granting you the Financial ServicesCompany Access to their information for a particular purpose. All of this relates to how we identify people and how we authenticate people in this space. A lot of people who are banks or Financial Services are not covered. Issue of how we improve that and offer innovation is very important. Really have a completely Digital Process in 50 states in this country are internationally if you do not have cyber protection. Had we authenticate people in a more protective way . More than a username and password. Also the issue of data breaches is critical. The federal government doesnt have any better track record than the private sector. We have been talking about the incompetence of the federal government. Obviously this is a key issue. If you are a state actor, that is where the disruption is very vulnerable. To advances in technologies such as Artificial Intelligence and machine learning, it is becoming increasingly easy to authenticate individuals and mitigate that kind of fraud. We must be vigilant of policymakers to ensure our Sensitive Information remains private. I look forward to hearing the witnesses help us understand these issues and what we might that are legislatively or regulatory really to improve this process. I look forward to the discussion. Rep. Mchenry what is next . How many breaches will it take before Congress Takes appropriate action to view cybersecurity as a top priority. A few months ago we had the worlds biggest Bank Executives right behind in front of our panel. They said the biggest threat was cybersecurity. What i appreciate about this panel is that and i appreciate the work mr. Foster has brought to the table, because we begin with a bipartisan challenge, a challenge that we can seek Bipartisan Solutions to hear and congress. And new thinking. An innovative approach to this really cumbersome, dom password username situation we are already in. A new type of thinking that is occurring in the private sector. To ensure policymakers keep pace with what is happening in the private sector. Thank you so much. Today we welcome the testimony of an washington, professor of data policy at nyu. A managing director of venture security. A coordinator of the Better Identity Coalition. The president and founder of risk solutions. And the chief identity officer of security technologies. Witnesses are reminded that oral testimony will be limited to five minutes. Your full written statements will be made part of the record. This washington, you are recognized for five minutes. Im grateful for this opportunity to speak. Professor, ime a spent eight years in Financial Services. In addition to many years working in support of this chamber. My name is and washington. Why did i give my name . I gave you my name because it is an identifier. Digital Financial Services rest on the ability to guess that you are you. Artificial intelligence goes further by taking actions. Today i will explain why identity is important. Why ai makes mistakes. And what we might do about it. Consider a firm with an ai system that works 99 of the time. That is great. But in a business of 10 million people, that means it fails on all hundred thousand people. Family who cannot get a home mortgage. Lets not forget that owner Face Even Greater financial risks. Much of the Data Technology today was made for marketing purposes. It is cute. It is a momentary curiosity. A digital mistake is detrimental and it is ongoing. A teacher in maryland had to give up her livelihood. Profession that required continual recertification. She probably does not see herself as a new york driver. She is just the information on this slide. Someone else in new york has the exact same name and the exact same birthday. They have no recourse to solve this confusion. A data double is how the scholars call this. That is someone who has the identifiers but is not you. Im a Computer Scientist with a degree in business. I think this stuff works. There is little financial incentive to fix these mistakes. Mistakes will happen. It is mathematically certain. Are the chances that you will meet someone who has the same birthday . It is really high. It only takes 23 people in the same room. Probably the members of this committee and staff, there are people who have the same birthday. Not as rare ase we perceive them to be. So what can be done . Artificial intelligence identifiers are built for a global audience. I will argue that we need a way to get feedback into identity systems. I want to know how i can improve and make the systems better. This could lead toward procedures for handling errors and exceptions. This is one example of how ai systems need a feedback mechanism. Argue that the authority of Human Experience must balance the authority of data. Thats happen. Experience matters. Each of you has someone in your District Office that does casework. A recognition that institutions sometimes of individuals. What will be the resolution process for identity disputes and Artificial Intelligence. I lead security practices for north america Financial Services. Thank you for the opportunity to speak your today. Innovation and Digital Identity and Access Management is extremely important to cybersecurity. We live in a digitally connected world. Most of these transactions happen online. Key to the mistrust. The information we used to validate our identities is available to dark web forums and social media postings. That makes us more vulnerable. I would like to draw members attention to the slide on the screen that lists five global us. R threats to Identity Theft is first because it is at the root of every breach. Ultimately gaining access to privileged data and systems. Attackers stole 81 million. That was more than three years ago. Today we can use ai to enable Financial Institutions to have more accurate pictures of employee access across a complex enterprise. Managers can make better decisions. Leading organizations are leveraging biometrics, ai behavioralbased analytics, and multifactor authentication to make realtime, riskbased authentication decisions. To approve transactions and make limits on them. These new tools are providing secure online identities. We are part of the id 2020 alliant. Create digitalo identities in developing countries so they can competently receive Government Services that validate their services. Allowdigital identities people more security over their data. Congress needs to pass a National Privacy law. This would build consumer trust. It would enable the private sector to offer more goods and services. Congress should help foster an environment for digital innovation. I encourage you to ensure that any new law to advanced Digital Identity be tech neutral and an operable with other sectors. Is much work to be done to build. I want to thank you again for the opportunity to discuss the issues and i look forward to your questions. Thank you for the opportunity to testify today. I am perhaps that she or about half of the Better Identity Coalition. At 22 members are united by common recognition that the way we handle identity in the u. S. Is broken. And a common desire to take steps to make identity systems work better. I am grateful to this task force for calling me here today. The way we have identified handle identity in america impacts our liberty. , as an economic standpoint we move to highvalue transactions and the Digital World, identity can be the great enabler. Cyber attacks are executed by taking advantage of week or stolen passwords. We have seen adversaries seek to steal massive datasets so they can have an easier time compromising the questions used in identity verification. Attackers have caught up with many of the first generation tools that we have been using. There is a of reasons for this. The most important question is, what to government and industry do about it now that is a key point. If there is one message this task force should take away, it is that industry has said they cannot solve this alone. We are at a juncture where the government will have to step up and play a bigger role to address these smaller abilities. Last year, the Better Identity Coalition put out a blueprint for the government. When talking about the future will of the Social Security number, it is essential to understand its role as an identifier. And its use as an authenticator, which is used to prove im really me. Be used as no longer authenticators. We stop pretending the numbers are secret or that the knowledge of one can be used to prove someone is who they claim to be. That doesnt mean we need to replace them as identifiers. That treatsa system them like the widely available number that they are. I have yet to see any replacement proposal. On the authentication topic, there is good news. Havestakeholder efforts developed standards for nextgeneration authentication that are being embedded in most devices, operating systems, and browsers in ways that enhance security. The password list era is near. Government will need to take a more active role in delivering nextgeneration idea solutions. We are not recommending that a National Database be recognized. Our challenge is the identity gap. All of these systems are stuck in the paper world while commerce is moving online. Modernizes, we should around the consumer model that allows the consumer to ask the government issue to stand beyond in the online world by validating the information from that credential. In the online world by validating the information from that credential. It is about producing a new paradigm. She provides basic identity information but since she is not there in person, the bank does not really know if it is her or if she is a real person. She will ask someone who knows her to prove that she is who she claims to be. Because the app was issued to her phone at the time when she got a drivers license, there is now a train of chain of trust in place. The bank can set up a secure connection. Concept was embraced in the 2016 report from the Bipartisan Commission on enhancing cybersecurity. I appreciate the opportunity to testify today. I have submitted lengthier testimony for the record. Thank you for the opportunity to provide before you. Appear before you. I am the founder and president of turnkey solutions. I spent 20 years in the Financial Services sector at a large institution. I was at j. P. Morgan chase, where i was responsible for establishing Business Practices around proactive identification of fraud threats that included credit bust outs, identity manipulation, and credit abuse. As we consider how to use Artificial Intelligence, it is important that we clarify our target by gaining a more comprehensive target of what synthetic identities are. For the purposes of my discussion, a synthetic identity and its basic form is a Social Security security number, a name, a date of birth. Creating one is materially different than traditional Identity Theft. In cases of traditional Identity Theft, impersonating a person. In cases of synthetic identity, the criminal is using a limited amount of elements of a persons identity, for example just their Social Security number, and a pair that for a name, date of birth, and address they control and create a distinct persona. They do not want to comingle with an existing person. Once that synthetic is created, you can use that for pretty much anything. Banking service, social media, insurance, rent an apartment, enroll in benefits programs. You can basically use it for any purpose the creator intended. Technology plays a huge role. Advances in tech reggie create speed and convenience but also anonymity advances in Technology Create speed and convenience but also anonymity for the fraudsters. Awareness consumers are a lot more educated on understanding the important of their credit, the different ways to protect identifiers, stay away from compromising their information. That information has been put out to protect consumers but also used by organized criminals to design their attacks specifically to exploit those types of evidence. Regulations have done a lot to protect Identity Theft victims and to be able to make sure they have ways to remediate when they have been victimized. We have seen those same leverageds exploited, and abused by criminals. We want to erase and eradicate thief,g with identity havehe same protections been leveraged by them. That information wasnt as useful as it had been in the past, so they started to move to names,atic information, Social Security numbers, date of birth. This broad threat was specifically engineered to invade existing controls while avoiding vulnerabilities. Many groups creating this type of fraud are highly organized, to beticated, and intend transnational in nature. Industry, we need to be more effective in adaptation of evolving technologies. As we seek to deliver unprecedented speed and convenience, we must remain vigilant in understanding the threats to our interests and infrastructure. Synthetic Identity Fraud in the u. S. And around the world is widespread. It is being amplifies by increased digitalization of products and processes. Alld operates across delivery channels, providing the perpetrators with unfettered access, making it essential that we act in a unified collaborative enter. We must recognize the complexity benextgeneration fraud and informed of the severity and scope. Negation efforts from industry to make sure must be fluid and nimble to make sure we can address these. It needs to be universally defined in order for institutions to detect, report, and remediated. I appreciate your opportunity and look forward to any questions. Chairman, Ranking Member, and all members of the committed the committee, thank you. I am the chief identity officer at security to elegies and i look forward to sharing experiences and sharing a database and network that works across the economy. Secure key is a world leader in providing Technology Solutions to enable citizens to access services. We focus on the public, private sectors. Governments and other organizations have strong incentives to realize cost savings and increased integrity. An organizations ability to do this hinges on a single question. Can i trust the person or Digital Identity at the other end of this transaction. Identity is broken in problematic for citizens and businesses. Mix of measures to mitigate risk, but dilutions tend to be complex and not fully effective. Site, the other side, citizens are asked to to do a number of methods to onboard the security needs of services. Three stories every about online impersonators. Fraudsters are correcting are collecting information to know as much if not more than the system there impersonating. Biometric methods, which have been presented as a Digital Solution to digital fraud, have been targeted by hackers. You cant change your biometrics. Our collection of systems are too hard for a consumer to use. It is not solving the problem and it is too expensive to be sustained. Consider the ceos of facebook and twitter. Each know how the system works, understand identity best haveices, and even they trouble controlling fraudulent access to their digital identities. Of dorsey became the victim fraud. If they cant manage and be protected in the current digital landscape, our the rest of us supposed amended how are the rest of us supposed to manage . It needs to be said that there is no organization on the planet that can solve Digital Identity on its own. It takes a village. Each player playing to its strengths and creating trust. The model of the Publicprivate Partnership between government institutions, and other providers. Governments are the foundational issuers of identity documents in the form of birth registries and immigration documents. They also link to a living person. Adeptvernments arent as as the commercial sector at knowing the person at the end of a digital transaction. The irs has a file and everyone in this room but they will be hardpressed to point us out in a crowd. That is why they use kba. According to compared to other organizations, citizens only rarely interact with government in their daily lives. They will log into their bank account several times per week. This increases the integrity and transactions for banks. Our mobile devices are always within reach. Carriers have security features which are important and tied to subscriber accounts. Services built on open standards. Verify me was developed in cooperation with seven major Financial Institutions in canada. It takes a digital approach to solve identity problems with greater simplicity, higher integrity, better privacy. The information we have helped to solve the Digital Identity problem in canada and developed a model that works around the world. The u. S. Department of Homeland Security and the digital and Identity Council of canada. Thank you for the opportunity to share my comments today. I will now recognize myself for five minutes for questions. One thing that impressed me in your testimony was the bipartisan nature of support for this. You are very involved in the obama administrations initiative on secure online id. It appears that omb and the Current Administration is strengthening those initiatives. You say what government involvement is in strengthening identities online . Spentyou mentioned, i several years in government. Although i was a Civil Servant while i was there and stationed up the road where i served as Senior Advisor for identity management. This has never been a partisan issue as you point out. Much of what the program was focused on was how to basically catalyze a marketplace. The idea, the governments role should be limited, but government should play a role where there are a lot of gaps to fill. Looking to carve out an appropriate role for the government in terms of one where there is not too much of a role for the government. In may, the office of management and budget signed memorandum 1917 into effect, updating a lot of the governments cybersecurity policy. We were excited to see that they took one of our key recommendations, basically for industries to create privacy woulded apis, which validate which would have consumers validate information about themselves i think now that that is in place, there is a good policy foundation to governmentto bring to play this role. You both touch on in your testimony defect and lack the lack the fact of of being able to protect yourself, those who are not wealthy. Some of the biggest improvements having a way to authenticate yourself. I wonder if you could offer a little bit about why this is. It is interesting that if you at some of the things that said, whetherdic banked or unbanked have cell phones. We could establish confidence by having a National Privacy law, i way toould go a long engender trust. Also being able to use the rule that is in their hand to be able to validate so able to validate themselves. Ms. Washington, do you have anything to add . Ms. Washington i would say, right now, without a standard procedure, people who feel less powerless in society will how toy not figure out dispute it. Rep. Foster there is probably also a tendency for wealthy people to have more established financial transaction records to be used in a secondary way to make sure the person is real and so on. Add . U have anything to take into we have to consideration, for all the things we are putting in place to protect consumers, there are much easier ways to go back and negotiate the system. All of the controls we are putting on for Artificial Intelligence, you have to understand who this person is. We need to go further up the chain and make sure that identity is actually factual first. We need to get to the root of the issue instead of just addressing in some cases the symptoms. We would get much more collaborative between industry and government. We need to reshape the issue and look at it from a different lens. Rep. Foster thank you. Mr. Hill is recognized for five minutes. Ask hill i would like to that something gets submitted for the record. One industry that one thing that has been concerning for our Title Industries across the country have been email fraud. Letter like to submit a from chairman powell as well as the response he had on this issue. Without objection. Rep. Hill this has been a really good panel. We are trying to correct the world we live in and prepare for of the future, and we cant do it without a privacy standard. I think all of you gave great pleased tod i was hear talk about omb issues. Anddangers of data scraping for is not practice accessing customer data. Will the policy that in the and it is aector good standard for the private to adopt . I think it will help to contribute to some of the challenges we have seen in open banking. I have been really impressed by the work of the Financial Data exchange, a group that was what doesin cybersecurity work. They brought together banks and firms to come to to come up with a standard api that will allow a consumer to decide to essentially securely grant certain access rights to some of their Financial Data. Because their identity is that core control, if we were able to enhance some of the ways we do thinkty verification, i we will have Robust Solutions across the board. I think rep. Hill i think that is very helpful. This issue of synthetic identity, could you explain that. Are you saying people are not imitating the exact person, individual,ew creating using all validated information. Ms. Walraven similar. They can use real information, lets say a Social Security number. They will take that, at a name that is different, add a date of birth. They would probably make it closer to what is likely for them. Address put it at an they can control. From there, they create separate and distinct identity. It is not real per se, as far as identity, but it functions, especially in a digital and paperless era, exactly as a real identity. They know their mothers maiden name, the userid and password, the security questions, because they created them. Afterwards, you are not going to catch them in the existing infrastructure we have because those credentials are known to them. Grant, i read recently about the beginning of the implementation of the california statute. For the 4. 5 years ive been in congress, we have debated privacy and witnessed the battle between retailers and the Financial Services industry, which grows tiresome on this committee, and the desire to have a 50 state solution. Now, california has acted. Ccpa a net positive for the consumer . The approach they took. Ccpa, writi think large, we will have to see how it goes. There have been a couple of things on the identity side i have been concerned about. It took kind of an ambiguous approach about whether you can use data for Fraud Prevention. In europe, i thought they did a good job saying, if you are using data for marketing purposes, all these rules apply. Data, that ising for security and Fraud Prevention only, that is ok. A california, they took little bit of a different approach. Part of it i think was the law was written in about a week. I think they were trying to head off a ballot initiative. It says a consumer cannot go to a company that is doing security and Fraud Prevention and ask the data could be deleted. But they stop short of saying you could go to a company and opt out of that being used at all. And of people to companies tell them to turn off the Security Analytics controls, some of the best tools this year willols we have today, it put consumers and businesses at risk. Gentleman from north carolina, breaking member mr. Mchenry is recognized. Rep. Mchenry informative panel. I think this is quite constructive for what has been a rather tiresome debate between retailers and banks on who holds the bag without talking about progress or fixing the problem. They Want Congress to intervene and make the decision on who gets sued. Lets get beyond that, to the solutions. I would like to hear the story of what your company is doing in andda to verify identity, the undertaking you and your company have had. Twohere have been generations of services we launched in canada. One was in 2012. It was designed to be a safe andacement for user ids four. When i went to our tax authority, i ids and password. When i went to the tax authority, i forgot my password. They had to send mail to my house. I solved the problem a different way, they sent me this thing two weeks later, and the next year i do the same thing. That cost me 40 a shot. They spend millions of dollars identifying 5,000,080 and. 5 million canadians. Their costs have come down. Canadians are now able to use their bank account to get to government. The reason this works better is because canadians are in their bank account every week so they are not going to forget the password. More importantly, if they cant get in, they are on devcon five, they will run down to the bank right now. Servicelenge with that is authentication only. It didnt solve the identity problem. In may of this year, with all the major banks and several other trusted partners, we launched identity service, which allows me to prove my identity based on banks, telephone data. I authenticate with those providers myself and under my control i can give that to someone else when i want to sign up for a new service. It takes costs down and gives better results. Rep. Mchenry verify me. Block chain technology, walk us through that. We came at it from a different point of view. If any organization is consuming data from a network, they have three requirements. Requirement number one, they want to know the data came from an authoritative source, like a government issued id. The second requirement, they want to know the data has not been altered. Take my drivers license, all my data, and stick their photo on it. They want to make sure the data belongs to the person presenting it. Why block chain . Block chain test three specific things. It allowed us to implement triple blind privacy. In canada, when i use my bank account to get to the government comedy bank doesnt see my online destination. The government knows i came from a Tier One Bank in canada but not which one. Triple blind privacy says, not the bank, not the government has a complete picture of the user journey. When we try to do that with identity, with us in the middle, we were going to see a lot. We wanted a way to do triple blind identity. So i can send my money from wells fargo to the irs without either knowing. It allows a sticky to meet the integrity challenge. The side benefit is we get resiliency because it is hard to mount a denial of service attack. Rep. Mchenry broadly, the block chain cryptography is a leap forward in order to ensure that you can have that movement of data. Heres a different question. Is there a different cultural assumption between folks in the United States and folks included about their Digital Identity and willingness to share that data . I think the stance is very similar. I would say the privacy regulations are very similar. They have recourse, if something negative happens, they have somewhere to go to get it sorted. Rep. Mchenry lets get at it. Patter, lets get at her. Highly informative. I have three hours more questions but every one of you are topnotch. The gentleman from georgia is recognized. Thank you, mr. Chairman. Thank you to all of you on the panel. Fromis intriguing coming an i. T. Background. Cybereen dealing with issues since my time in the air force, dealing with intelligence throughl the way up even protecting businesses and School Systems with internet access. It through even protecting is an ongoing c. Transactions that happen especially in the Financial Services sector, verification has to be done at the same speed. I like using cash. I like reading a printed book. Store andng to a putting my hands on what im going to buy. I am unique in the world today, i found out. The younger you are, the more you are relying on the technology. We have to be exploring these areas. I would like to submit for the record a letter from the Consumer First Coalition ofressing concerns congressional oversight over the Social Security verification system as they move forward. Without objection, so ordered. Washington brought up an interesting scenario. I have one that i found quite unique. I was taking a group to the white house. If you have ever visited the white house, they have quite a verification system if there is one thing wrong, you will get pulled out and put in the holding area. One young lady, early 30s, was put in the holding area. She said, this happens all the time. Identical twin sister. She wasidnt realize going to have twins and had already chosen the name, so she gave us both the exact same name. It was Elizabeth Grace smith. One was called liz, the other called grace. They have the same birthdate, the same birth location, the same height, weight. What triggered the secret service was their Social Security numbers were off by one digit. This is an illustration of the type of thing we are going to encounter. We have got to find a path to get there. I am big on innovation, big on sandboxes so we can explore ways to do this but it has to be done it took us a while to adopt the chip payment system. Traveling in europe, they had it a long time before we were able to adopted here. It has reduced the counterfeit fraud by 87 . The bad players come the criminals now focus on Digital Payments. That involves digital identities. Solutions. Cybersecurity solutions. We need to combat these Digital Payment frogs. Are we heading in the right are we heading in the right direction . Do we have the sandbox available to develop these . Thats a question. I remember when i was back working at the offices of the control of the currency. When the deadline was approaching for chip and pin and the conversations we have to appear before conference at that time as well. I remember distinctly having this conversation about what it would do and what it would not do. As weve seen overseas, the card not present fraud is through the roof. Bad guys know. All these Online Transactions are card not present. That means they are missing that authentication aspect. Being present with that chip and pin. While it was a step in the right direction, and it was just a layer, the fact that most of our transactions are increasingly online and need to happen at the speed that weve discussed, we need to create an environment that fosters innovation. That figures out a way to improve the state of ids that creates that more trust that weve talked about here. Do it in a way where people can protect all consumers and everyone can get bought into the system. Jeremywhy my colleague and this roundtable i mentioned earlier, they have a lot of alignment around what needs to be done to create that transparency for consumers with privacy. Ecosystem totter enable them for Online Transactions. I have tons of questions. This is intriguing. I marty out of time. I will submit the others for the record. The gentleman from ohio is recognized for five minutes. Panel, foru for the your outstanding testimonies and participation today. It has been a great setting so far. I want to drill down on some of mr. Mchenrys questions about block change specifically. We will spend some time there if you dont mind. As you were innovating in the space, what legal impediments existed in canada that prevented you from developing on the block chain and what has had to change . Walk me through what it was like as you were innovating and how you got there. Sure. One of the Biggest Challenges is , when you look at the economy, the most rigorous process we go through as consumers is when we go to a bank. They have ky see. Hasanada, our organization a set of interpretation bulletins that they use to interpret the legislation to say what banks can and cannot do. When we started this process, it didnt include digital methods. It took a long time to talk about the event changes of doing digital methods. One of the things we were able to convince the regulators is what we were doing with our services was getting card presence identity. When i take my drivers license to the counter, the bank is defenseless against that attack. They cant check against the issuers. With our service, all the data is checked in realtime. That is getting the regulators to understand. This is better than what we can do in person. This is more powerful. Was that a regulatory or legislative fix . The interpretation bulletins were updated to include digital methods. Legislatively . Yes. U. S. ,you look at the where you see similar holes where we should be legislating to enable the technology . Canada had an advantage we have a small set of banks and provinces. We could get everybody in the room. Economic construction here is different. You have 3000 banks and 50 states. You have a small set of tellicos. This could be applied to the u. S. Follow. Model. Theres a lot of work to launch a Similar Service to the one we have in canada. Thats down the track. More week needs to be done. There will be similar challenges where the regulatory will have to support it. Do you have any specifics in mind . Yeah. As followup it testimony. You can review that after. That would be fantastic. Membershiplf of our is fin tech. One of the things we called for was the treasury and regulators to do more here. They have been receptive to discussions with us. If you are seeing a barrier, please let us know. Marshall billingsley is assistant secretary in the office of financing. They want to do a text print working with industry to help bring regulators and together. I continue to ask my members every month, are we running into things precluding innovation . Is,biggest answer we get theres a regulation with ambiguity and the compliance people have their freak out. Its hard to move forward. Im bullish there. Where we need more effort, we talked about the omb memo. Thats a nice start. Policy members come out all the time and get ignored. We need more of a formal governmentwide initiative convened by the white house to look at how to bring agencies out how too figure take this to the next. My oldes to be done at agency. A framework of standards to help agencies could benefit from a center of excellence in government as well that could actually help. The Social Security ministration is developing that service. Getting other agencies to do that needs technical help. These are little steps around the edges that can make a big difference to helping this problem. Thank you. Thanks to everybody for the time and energy on this. We will follow up. I yield back. Virginiantleman from is recognized for five minutes. Thank you. I would like 60 minutes to question the panel please. Its good to be here. Birthday. About my birth they as march 17. St. Patricks day. Look at that. No one. My goodness. I want to give my background really quickly because im excited about this stuff. I was in military intelligence about 26 years. Tracking people and finding their identities without them volunteering their innovation information. It is the bridge between technology and operations and how this would happen. My questions might be more esoteric and fun, i hope. I have about 50 questions id written down. Im going to try to go quickly. Ive always had too many to go quickly. I want to start here with the bottom line upfront and i will go backwards with technology. It does sound like the use of a i will be a critical part of ensuring security and Digital Identity. Should we be concerned that this kind of technology could be cost prohibitive . Is that something we have to worry about . Anytime you deal with innovation, Smaller Companies in the world are really creative and they partner with eccentric to make that possible, to make them scale. I think we need to find ways to help Smaller Companies actually be able to leverage some of these capabilities that you are pointing out. I would commend the Ranking Members effort in his own district in little rock to create an Innovation Hub where Community Institutions can actually learn how to take advantage of these things. The other way to help them scale to the benefit of smaller is to actually help them do that through the partnerships with their third parties. Their largescale Technology Service providers. Thats why i get excited. We are creating our uke unique identifiers. Forward, do you see rejectingmpanies individual or business transactions with other entities based on insufficient authentication of identity . When i look at how people are going back and forth and utilizing their own signatures, are we going to get to a point where you see private companies actually creating their own unique id set of criteria . Thatu see them ensuring and rejecting those companies . I listened to what mr. Grant has been doing in canada. Our companys going to be judged based on their criteria for how they protect identity and other companies rejecting that identity based on new ids . Do you see that happening in the future . One of the things we have been trying to do in the u. S. Has been looking at whether we could have Certification Programs for private issuers of identity. I talked about the role of government. My bank knows me. Thats the foundation of what is happening in canada. Amy have to figure out who i before they open an account. Could they then vouch for other places . Could i log in with my bank somewhere . There are Certification Programs in place today from organizations. This has been recognized by the General Services administration to certify the way that a private sector entity issues and identity. Aboutforward, i talked the concept of an identity ecosystem. Be able to create some hybrid solutions that could really bring in the best innovations the private sector could deliver with access to a sort of give authoritative accesses the government has. Can give people something thats portable that they can use everyplace that they go. You are in my head. If we are creating this identity token, we are dealing with unstructured data. We are dealing with new things like natural liquid processing. Is there a time where we will be able to customize our token where the only way we can find our identity is the stuff that we actually customize with that information . We own our identity by customizing our own information . Theres a lot of focus on how you can allow people to only reveal certain things about themselves without revealing everything. There are great models in place these days theyll give people very granular choice for what they share about themselves online. When we talk about the privacy debate in this country, so much is tied to identity. What information is collected on me . Strong tool that you can use to manage that and go back and revoke certain things is going to be a key enabler. Thank you so much. I apologize for how quick that was. You guys are fantastic. Thank you. The Ranking Member and i will each have an additional five minutes for questions and closing. I would like to recognize mr. Hill. Thank you. I think you heard a good discussion and the panel has been very appreciated. I want to go back to finish our conversation about the california proposed statute. We may broaden that to the panel lawell to compare a rush set of parameters with the more thoughtful approach the eu took it have a compare and contrast. The wall street journal last week reported that private businesses could face a half 1 billion compliance burden trying to comply with the california law. Talk about that. Finish your thought. I think you returned to make on it was rushed. You have some concerns you outlined the point i was making with california, there has been some proposals to try to clarify that. This is the information to be used for fraud investigation. The backdrop on this is that identity analytic solutions, many that are using ai, are one of the most powerful tools we have today to actually prevent fraud. To give you a number, microsoft started talking about this publicly. They manage billions of logins a day. Two years ago, they were seeking 10 million attacks per day. When you go, they were seeking 100 million attacks per day. This year, 300 million attacks per day. Thats a 30 times increase in two years. The way they are actually combating this is with databased analytics systems. Some might be collecting things like personal data. So long as you have a carveout that says, thats ok if you are worried about security and fraud protection. You cant take that data and use it someplace else. The European Banking Authority is actually actively promoting the use of what they call transaction risk analysis to secure payments. I think the concern here is if its more ambiguous or if we are considering federal privacy legislation that doesnt say it as clearly, the 2 of people calling up microsoft to give examples and say, dont use those systems. Turn that off. What are they supposed to do at a time when attacks might go up another 10 times next year . Thats my concern. You mentioned open banking in the u. K. Canada as well. Is anybody else adding to that, on california . On the privacy directives in europe and what you have done in canada. Has europe and the u. K. Solved this password authentication process in order to make open baking a safe activity . [is a singular term. The way it manifests in each country has been different. Some countries have it compulsory. In others, its optional. In some places they include the ability to do push payments. Its not a uniform application of how it works. Of open banking is that it will cause asset dripping. The banks are forced to open up their apis and give us the data at no cost. The consumer is going to give this to some new startup that doesnt have the same controls as the bank does. Then the consumer is going to come back to the bank and say, how did you let this happen . What we should give away is trusted data so consumers can give it away granular. Thats the approach we are looking at in canada. In australia they took the approach that is reciprocal. If you will participate in open banking, you also have to agree to advance to share data back with the network. That solved the asset stripping issue. Im interested in what we abouto do regulatory late how we handle this requirement of an api approach. A discrete approach instead of just allowing scraping. I hear from startup entrepreneurs, you are disturbing the customer experience. I would argue customers experience is getting messed up when everything is stolen from them. Thats not a good idea. That is something specific regulatorys can do . You cant do open baking with open digital infrastructure. This is the problem. Im a consumer. You are the bank thats trying to represent me. Jeremy is the start up that once my data. How is jeremy supposed to present to you that he has my permission to get my data . You have this threeway triangle of authentication trying to go on. The consumers never going to get it. The only way to follow this is allowing consumers to have Digital Identity infrastructure. I yield to you. Thank you. The business of this threeway conversation is fascinating. I think there are Technological Solutions with a properly designed app on yourself on. The future of this is not an identity dongle but perhaps not advanced cell phone. Keysn store the private and is resistant even against having yourself a completely hacked. Maybe it would capture the screen and see password being transmitted. You cannot actually still from the secure enclave in these. Thats a tremendous advantage of that approach. You can still have this threeway conversation under the control of properly designed apps. I think there has been great progress. It relates to the use of block chain. Advantages isat that it provides a nonfalsifiable ledger. Is there a solution to developing a Witness Protection Program which is government sponsored synthetic Identity Fraud . Is that something that people have thought about and come up with solutions to . I dont have a great answer. One of the challenges of that, what we are getting with these records, you cant go back in time and insert a person for the purposes of witness protection. Its difficult to do. You will have to find some other method to bring that identity long. If its a publicly visible block chain ours is not. Going back and altering records in the past is hard. With the government could do is have a set of identities on standby to use for the future so they have the longevity that would be required. That has its own pitfalls. It has to have all sorts of secondary verifications. You should put that on your to do list when we come up with a perfect example here. It also seems to me that to come up with the ultimate solution here, there has to be a role of government. At some point in your life, you have to go and authenticate yourself and be uniquely identified using biometrics. At that point, you can be issued a security dongle or the cell phone equivalent. You can use that for many purposes in very streamlined transactions. Alternative logical than having every citizen who wants this to be able to identify themselves, knowing there is not synthetic Identity Fraud or other people using their credentials. Any alternative to have them presenting themselves in front of a trusted Government Authority . Some payment learn systems we try to do identity. A data breach has the same identity as new money. Comparing identity to money, theres a lot of things they can learn. When you look at the Global Payments system, 6 billion cards in circulation who have never been copper lies. Bankan have your favorite and i can have my Favorite Bank and we can go to any merchant on the planet with any prior relationship. Portly, when we lose the car, we call the bank right away because we are terrified to be responsible. That integrity is what makes the process work. These things make the global system work. We made it super simple for the consumer and we hid the complexity of waste they dont have to understand everything. We have a trusted network operator. You have to apply to get in the network and you have to be able to stay in the network. Thingird most important is user behavior. I look at my wallet and see my card is gone. I will be on devcon five. Im terrified i will be responsible. This system is not perfect. Syntactic Identity Fraud can still permeate such a system. Thats when it comes down to understanding, knowing your real customer. We do have controls in place that are supposed to do that. We all assume that banks know who their customers are. I know they are all coming from the banking industry. Everybody is trying not. Synthetics are prolific as they are, they are is widespread. They are growing in a force multiplier. They dont actually know their customers. I feel like if you have an issue that is not at the root and you compound on top of that, you just make the issue later worse. Even at this false trust. It doesnt allow you to be able to contend with those types of individuals. That goes exactly what they are looking for. They dont want to send that money red flag. They dont want to get caught. They want to be able to continue to navigate through the system. They are currently navigating pretty well unfettered. They give the example that gave of the identical twins with identical names. They differ only in their fingerprints. At some point in their lives, it seems like they have to present organization,some almost certainly a government, who has to go and look and dedupe all the people who cling to have that name. Alternativees no to very advanced biometrics of some kind. This can be an optional system. If youre going to provide citizens who want one with a secure means of authenticating themselves, you have to have this moment in their lives. Biometrics can play a role. I worry about saying they are the solution. I tend to get nervous when we talk about creating new central databases of biometrics. If there is one thing weve learned, we are not really good at protecting them. Topsecret clearance. All that information and images of my fingerprints are now in china. At least two thirds of this room probably has the same thing, understanding who is here today. Awould never want to use centrally matched fingerprint system online where they didnt know i was there to protect anything of value. Anationstate can spoof fingerprint based off of those images. There are helpful tools. The dmvs are using face recognition for doodoo thing. For dedoofing. It is not perfect. They could toss it to a fraud investigator. Leveraging that process is important. The oneers license is thing that most americans get in their lifetimes were they have a robust in person identity proofing process. Its really valuable. We think people should be able to reuse it. Only 87 of adults have a drivers license. Its harder than ever to get one thanks to things like the real id act from 2005 which had good security reasons. The flipside is, if you are on the margins of society, say you have been homeless, say you have been evicted, its really hard for people to restart their identity lives again. They are just lacking what they used to have. In d. C. , theres a couple people. That work with i will have to gavel myself. Votes have been called. Without objection, i would like the report from the Better Identity Coalition to be included in the record. So argued. I want to think the witnesses for their testimony. Is at the root of so many problems that we have. Members will have five legislative days to submit additional wit questions. I ask our witnesses to please respond is probably as youre able. Thank you again. Task force is adjourned. [inaudible] a next friday, President Trump and Melania Trump host australia Prime MinisterScott Morrison at the white house. Its the president s second state dinner since taking office. Will show you the guest arrivals as well as the dinner toasts. Our live coverage starts at 6 30 p. M. Eastern on cspan. Listen with the free cspan radio app. Saturday on book tv at 11 00 eastern, some record associate Justice Neil Gorsuch discusses his book. Madison knew this when he wrote the constitution. Those are just promises. A billt think we needed of rights if we got the constitution and the structure right. He knew that men are not angels. And that the key to your liberty is keeping power separated. On sunday at 9 00 on afterwards, in his latest book, journalist ben westhoff reports on how labs in china menu manufacture the drug. Hes in a viewed by ann mclane kuster. If you are a scientist at university, you publish a paper, it went into some university library. Pretty of skier. Hard to find. Theseernet age, all of papers were published online. And publicly available. Exactly. So these rogue chemists began looking for these files specifically for these papers to go through them and appropriate the chemical formulas to learn how to make these new drugs. At 10 00 eastern, jeff merkley provides his firsthand account of conditions for my get migrant families at the u. S. Southern border. Advocates said that hundreds of boys who have been separated were being warehouse in a walmart. I went to find out about it. They decided they didnt want me to see what was going on. Policestead called the and the video went viral. Suddenly all of america was hearing about cages and secret warehousing of migrant children. Watch book tv every weekend on cspan2. Saturday at 6 00 eastern, on the civil war, the 1863 tomahawk cancan campaign. Everybody concentrating on tullahoma. After they leave the highland rim at this point, somewhat anticlimactic. Bragg is ready to fight it out in the trances. Emory University Professor deborah would step on her 1996 lawsuit against holocaust and i are david irving. Denier david irving. Million, nono 6 leadership from the bar, bachelor. This is all made up. At 5 00 eastern, a discussion about shakespeares influence on u. S. Politics. 6 00, the Norman RockwellMuseum Traveling Exhibit on fdr and the four freedoms. Explore our nations passed on American History tv. Every weekend. Cspan3. Next, House Republican leaders talk about the partys priorities heading into next years elections. House gop members are meeting in baltimore for their annual party retreat. During this news conference, they were also asked about last nights debate with democratic president ial candidates. Good morning. Thanks for being here