Technical Paper - The Payment Integrity Network
Extended Fraud Intelligence
14 Additional Checks - 69-Check Total Verdict Engine
Pig butchering, AI voice deepfake, FaaS intelligence, Magecart, real estate wire, TBML, bust-out credit, CBDC attestation, ZKP proofs, adversarial ML, quantum-safe TLS, consortium intelligence, and natural-language verdict explanations.
April 2026 - JIL Sovereign Technologies, Inc. - Patent Pending
Positioning: The Payment Integrity Network
JIL is not a fraud detection tool bolted onto a payment processor. JIL is the infrastructure layer beneath payments - the network that decides whether a payment should happen before it happens, and proves that it did happen correctly after it does. That positioning demands total coverage. Every dollar that moves through any JIL-connected institution needs to be attested by an engine that has seen every known fraud vector and has a check for it.
The 14 checks in this document are not optional enhancements. They are the difference between JIL calling itself The Payment Integrity Network and being The Payment Integrity Network.
Tier Definitions
| Tier | Classification | Description |
|---|---|---|
| Tier 1 | Critical Gaps | Active, high-loss fraud vectors with $10B+ annual losses. Missing any of these is a credibility gap with sophisticated institutional buyers who will ask specifically about them. |
| Tier 2 | Significant Gaps | Corridor-specific and forward-looking vectors. Covering these signals to enterprise prospects that JIL has thought past today's threats. |
| Tier 3 | Architecture Enhancements | Architectural improvements that make all 69 checks more accurate, more defensible in regulatory examination, and more sellable in institutional BD conversations. |
Latency Architecture
All 14 extended checks operate within the same parallel execution model as the existing 55 checks. Total verdict window: 1-2 seconds. No new check changes this budget.
| Tier | Budget | Checks and Notes |
|---|---|---|
| Tier 1 - Hard block synchronous | <100ms | Sanctions, OFAC, CIPS, IBAN checksum. Redis bloom filter. Never external API at verdict time. |
| Tier 2 - Parallel async | <750ms timeout | Checks A, C, E, G, I, N. Fire simultaneously with existing 37 async checks. |
| Tier 2 - Conditional path | <500ms | Check B (voice deepfake): only when voice channel authorization. Check D (wallet provision): only for DPAN tokens. |
| Tier 3 - Async enrichment | Post-verdict | Checks F, H, J. Do not block verdict. Enrich audit record after settlement. |
| Architecture layer | Zero per-tx impact | Checks K, L, M, N. Background monitoring, transport layer, output layer. |
Pig Butchering / Romance-Investment Scam Detection
Why This Check Exists
Pig butchering is the fastest-growing fraud category on earth. Revenue grew nearly 40% year-over-year in 2024, generating an estimated $12.4 billion globally. The mechanics combine romance or investment fraud with crypto transfers to fraudulent platforms. The critical distinction from existing APP scam detection is duration and pattern - pig butchering involves escalating payments over 30-90 days, each individually plausible. No single transfer triggers standard APP thresholds.
As The Payment Integrity Network, JIL cannot claim coverage of crypto-rail fraud without this check. It is the single largest unaddressed fraud vector in the current framework.
What This Check Does
- Wallet screen against Chainalysis, TRM Labs, and Elliptic blockchain intelligence databases via local Redis bloom filter
- Memo URL / domain age check - pig butchering platforms are almost always registered within 90 days
- Behavioral pattern detection: rolling 90-day history scoring for accelerating transfers to same wallet cluster
- OFAC sanctions screen for designated pig butchering infrastructure: Huione Group (§311 May 2025), Funnull Technology (May 2025), Karen National Army (May 2025)
Verdict Logic
| Condition | Score | Verdict |
|---|---|---|
| Wallet confirmed in Chainalysis/TRM/Elliptic pig butchering database | 100 | HARD BLOCK - NO |
| Wallet confirmed in OFAC-sanctioned infrastructure | 100 | HARD BLOCK - NO |
| 3+ transfers to same wallet in 90 days, accelerating amounts | 65 | REVIEW |
| Domain registration age <30 days in memo URL | 45 | REVIEW |
| 2 transfers to same wallet in 30 days, both >$5,000 | 40 | REVIEW |
TypeScript Reference
// pig-butchering.service.ts const walletHash = createHash("sha256").update(tx.destinationWalletAddress).digest("hex"); const bloomHit = await redis.bf.exists("pig:wallets", walletHash); if (bloomHit) { const result = await chainalysisKYT.getAddressRisk(tx.destinationWalletAddress); if (result.riskType === "scam") return { score: 100, hardBlock: true }; } // Behavioral: 90-day rolling window, accelerating amount detection const history = await getTransferHistory(tx.originAccountId, tx.destinationWallet, 90); if (history.count >= 3 && isAmountAccelerating(history.amounts)) score += 65;
APIs and Data Sources
| Source | Auth | Cost | Notes |
|---|---|---|---|
| Chainalysis KYT API | API Key | Commercial | Best-in-class. Returns cluster name, risk type, direct exposure. Cache wallet results 1h. ~200ms. |
| TRM Labs API | API Key | Commercial | Strong APAC pig butchering coverage. Complements Chainalysis for Southeast Asia networks. |
| Elliptic Navigator API | API Key | Commercial | Best for Huione/Xinbi ecosystem mapping. Elliptic shut down Huione in May 2025. |
| OFAC SDN XML Feed | None | Free | Download daily. Includes Huione Group (§311), Funnull Tech, Karen National Army. |
| RDAP domain age | None | Free | Domain registration date. Cache per domain 24h. |
AI Voice Deepfake Detection at Authorization
Why This Check Exists
The CFO deepfake wire fraud vector is now an established attack pattern. In the most documented case (Hong Kong, January 2024), an employee was fooled by a deepfake video conference into transferring HK$200 million ($25.6M USD). AI voice cloning tools - ElevenLabs, Resemble AI, and similar - can clone a voice from a 30-second audio sample. An attacker with access to any executive's public appearances has everything needed.
This check applies only to transactions authorized via voice call. It does not add latency to digital-origin transactions.
What This Check Does
- Real-time voice liveness via Pindrop Phoneprinting - detects pre-recorded or AI-synthesized audio during active authorization call
- Voice biometric match against enrolled executive voiceprint (Nuance Gatekeeper or Azure Speaker Recognition)
- Call metadata anomaly - new VoIP number, number registered <30 days, origin mismatches claimed identity location
- Audio deepfake probability score returned as 0-1 confidence value. Hard block above 0.85
APIs and Data Sources
| Source | Auth | Cost | Notes |
|---|---|---|---|
| Pindrop Protect API | API Key | Commercial | Call-center deepfake plus phoneprinting. ~100ms metadata check. Contact Pindrop sales. |
| Nuance Gatekeeper | API Key | Commercial | Voiceprint enrollment and match. Now under Microsoft ownership. |
| Azure Speaker Recognition | API Key | Pay-per-use | $1.20 per 1,000 transactions. Lighter option for voiceprint matching. |
| iProov Voice Liveness | API Key | Commercial | Strong liveness detection. Already integrated for Check 5 (document deepfake). |
Fraud-as-a-Service (FaaS) Infrastructure Intelligence
Why This Check Exists
Dark web marketplaces now sell complete fraud toolkits for as little as $50 - BEC templates, credential stuffing bots, synthetic ID kits, phishing pages. A single campaign can be run by hundreds of actors simultaneously using the same underlying infrastructure. A transaction may pass every individual JIL check but still originate from known FaaS infrastructure - the IP, device fingerprint, and email domain together match a known campaign signature.
What This Check Does
- IP intelligence - Recorded Future queries for threat actor association and FaaS tagging
- Device fingerprint database - SpyCloud cross-reference against compromised device records (40B+ records)
- Email domain reputation - SEON fraud scoring for FaaS campaign association
- Coordinated campaign scoring - 2/3 signals = REVIEW; 3/3 = hard block
APIs and Data Sources
| Source | Auth | Cost | Notes |
|---|---|---|---|
| Recorded Future Intelligence Cloud | API Key | Commercial | Best dark web plus FaaS intel. IP, domain, hash lookups. ~200ms. Cache results 15min. |
| SpyCloud Enterprise API | API Key | Commercial | Device and credential compromise database. 40B+ compromised records. |
| SEON Fraud API | API Key | Freemium + Paid | Email, phone, IP fraud scoring. Fast response, good FaaS coverage. Free tier available. |
Digital Wallet Token Provisioning Fraud
Why This Check Exists
When a stolen card number is loaded into Apple Pay or Google Pay, the resulting DPAN (Device Primary Account Number) looks identical to a legitimate token at settlement time. The fraud occurred at provisioning - before JIL was in the payment path. In 2025, $10 trillion flows through digital wallets globally. Provisioning fraud has grown proportionally with adoption, and no existing JIL check currently covers this vector.
What This Check Does
- Token requestor validation - verifies Apple Pay (50110030273), Google Pay (50132049990), Samsung Pay (50161522034), and PayPal (50133911439)
- Provisioning path risk - GREEN (push provisioning, lowest risk) / YELLOW (manual OTP) / RED (manual no OTP, highest risk)
- MDES / VTS device score - Mastercard and Visa assign device risk scores at provisioning time, accessible via token detail API
- Cardholder verification method at provisioning - flags NO_VERIFICATION provisioning events
APIs and Data Sources
| Source | Auth | Cost | Notes |
|---|---|---|---|
| Mastercard MDES Token API | Partner cert | Commercial | Requires Mastercard developer account. Token detail lookup including device score. |
| Visa VTS Token API | Partner cert | Commercial | Visa Token Service. Equivalent capability to Mastercard MDES. |
| Mastercard Account Confidence | API Key | Commercial | Returns account-level risk at provisioning time, separate from MDES. |
Magecart / E-Skimmer Compromised Merchant Detection
Why This Check Exists
Magecart attacks inject malicious JavaScript into e-commerce checkout pages to steal card numbers. Those stolen cards are then used in transactions that look completely legitimate - valid card, valid BIN, real cardholder. The fraud happened upstream of payment. In 2024, Magecart infections tripled due to the CosmicSting vulnerability, and over 1,200 scam merchant domains were identified. The check is a 30ms local database lookup - almost zero latency cost, and it catches a vector no other JIL check addresses.
What This Check Does
- Merchant MID lookup against locally cached Recorded Future Magecart-confirmed compromise list (refreshed daily at 03:00 UTC)
- Merchant domain lookup against scam merchant domain set (refreshed daily)
- BIN correlation - internal cross-merchant fraud spike detection (3+ fraud events from same BIN at same merchant in 24h)
APIs and Data Sources
| Source | Auth | Cost | Notes |
|---|---|---|---|
| Recorded Future Payment Fraud Intel | API Key | Commercial | Daily feed of compromised merchants, scam domains, active Magecart infections. Cache locally. |
| Mastercard Safety Net | Mastercard cert | Commercial | Mastercard's own compromised merchant intelligence. Requires network participation. |
| FS-ISAC | Membership | ~$5K/yr | Shared compromise intelligence network. Institutional credibility signal for BD. |
Zero-Knowledge Proof (ZKP) Post-Settlement Attestation Artifact
Why This Check Exists
JIL's current attestation model reveals the full verdict record to authorized parties. For EU entities subject to GDPR and institutional clients who consider payment flow patterns commercially sensitive, JIL needs to prove all 69 checks were run and the verdict was correct without revealing transaction details. A ZKP proves: "This transaction was evaluated against all 69 checks. No hard blocks were triggered. The verdict was YES." - without revealing amount, parties, or individual check scores. This is a genuine competitive moat - no other pre-settlement attestation system offers ZKP-backed proofs.
Implementation Libraries
| Source | Auth | Cost | Notes |
|---|---|---|---|
| RISC Zero zkVM | None | Open source | Recommended. Rust-based, more flexible than circom. Proof generation ~15-30s on GPU (async only). |
| snarkjs (circom) | None | Open source | Battle-tested. Groth16 or PLONK. Requires circom circuit definition. More complex setup. |
| noir (Aztec) | None | Open source | Developer-friendly DSL for ZK circuits. Strong Aztec Protocol backing. |
Real Estate Closing Wire Protection
Why This Check Exists
Real estate wire fraud is the highest average-loss fraud category in the United States. FBI IC3 2024 data identifies real estate as the top sector for wire fraud by dollar amount. A typical loss: $300K-$3M per closing. The attack is BEC applied to a one-time high-value workflow - the buyer receives fraudulent wire instructions days before closing. Three signals together are highly predictive: first wire to this title company, account number changed recently, large round amount. Low implementation complexity, exceptional ROI.
APIs and Data Sources
| Source | Auth | Cost | Notes |
|---|---|---|---|
| ALTA Member Directory | None | Free | American Land Title Association. Public member search. Contact ALTA for data feed access. |
| Texas TDI Title Licensing | None | Free | State licensing API. Start with Texas (JIL HQ jurisdiction). Add FL and CA next. |
| ClosingCorp / Doma | API Key | Commercial | Settlement services data platform with programmatic title company data access. |
Trade-Based Money Laundering (TBML) Detection
Why This Check Exists
FATF estimates trade-based money laundering at $2 trillion annually. The three primary vectors: over-invoicing (inflating invoice value to transfer wealth), under-invoicing (under-declaring import value), and phantom shipments (invoices for nonexistent goods). This check is relevant only to JIL's cross-border treasury and institutional corridors. For transactions with trade finance reference data (LC numbers, B/L numbers, invoice numbers), a dedicated TBML check adds a material fraud prevention layer.
APIs and Data Sources
| Source | Auth | Cost | Notes |
|---|---|---|---|
| World Bank Commodity Price API | None | Free | Monthly commodity prices. 78 commodities. Invoice vs. market comparison. Definitive free source. |
| World Bank Pink Sheet | None | Free | Full commodity price reference. Download monthly. Parse into local price table. |
| FATF TBML Typology Report | None | Free | Definitive TBML reference. Use for corridor risk scoring configuration. |
Bust-Out Credit Fraud Detection
Why This Check Exists
Bust-out fraud is the final phase of a synthetic identity scheme: 6-24 months of credit-building followed by drawing down all available credit simultaneously before disappearing. Total credit exposed to suspected synthetic identities in the US reached $3.3 billion in H1 2025. The bust-out behavioral pattern is distinctive - rapid credit utilization increase across multiple accounts in a compressed window, followed by a large outbound wire. JIL sees the wire. This check flags when the wire matches the bust-out signature.
APIs and Data Sources
| Source | Auth | Cost | Notes |
|---|---|---|---|
| Internal Redis Entity Profiler | None | Free | Background aggregator maintains credit utilization, account counts, inquiry velocity per entity. |
| Experian CrossCore | API Key | Commercial | Bust-out specific scoring. Returns dedicated bust-out risk score. Add in Phase 2. |
| TransUnion TruValidate | API Key | Commercial | Synthetic identity plus bust-out detection. $3.3B synthetic credit exposure data source. |
CBDC-Specific Attestation Framework
Why This Check Exists
Central Bank Digital Currencies are moving from pilot to production. The e-CNY is in broad circulation across China. The ECB digital euro pilot involves 50+ institutions. The digital pound is expected by 2027-2028. CBDCs introduce fraud vectors that do not exist in traditional rails: programmable restriction bypass, CBDC wallet takeover (no issuer intermediary), and cross-CBDC bridge manipulation via mBridge. Designing this framework now, before CBDCs are ubiquitous, positions JIL as the only settlement attestation engine with CBDC-native coverage.
APIs and Data Sources
| Source | Auth | Cost | Notes |
|---|---|---|---|
| BIS mBridge Documentation | None | Free | mBridge connects e-CNY, digital HKD, digital Thai Baht, digital UAE Dirham. |
| Atlantic Council CBDC Tracker | None | Free | Track CBDC launch status by country. Use to update JIL's CBDC rules configuration. |
| ECB Digital Euro | None | Free | Formal API expected with pilot expansion. Monitor for ruleset publication. |
| BIS CBDC Research Hub | None | Free | Technical specifications and policy papers for all major CBDC projects. |
Consortium Intelligence Network
Why This Enhancement Exists
Every JIL-connected institution sees a slice of the fraud landscape. A consortium model - where participants share anonymized fraud signals back into the JIL verdict engine - makes every check more accurate over time. Model: Early Warning Services cooperative (Zelle), UK Fraud Sharing and Analysis Center. Signals are anonymized via SHA-256 of PII fields before sharing. GLBA Section 314(b) explicitly authorizes fraud information sharing between financial institutions. EU institutions require GDPR-compliant DPA; anonymization provides the legal basis.
Adversarial ML / Model Drift Detection
Why This Enhancement Exists
Sophisticated fraudsters probe detection systems to map thresholds. Model drift detection monitors the statistical distribution of check scores over time using KL divergence. If Check 7 (BEC) suddenly returns scores clustered suspiciously near 29 - just below the REVIEW threshold of 30 - that is a signal that attackers have mapped the threshold. Action: rotate thresholds plus or minus 5 points with human approval.
Tooling
| Source | Cost | Notes |
|---|---|---|
| MLflow | Open source | Model versioning and experiment tracking. Deploy on JIL infrastructure. |
| Evidently AI | Open source / Paid | Data drift monitoring. Custom dashboards for per-check score distribution tracking. |
HNDL Quantum-Safe TLS Upgrade
Why This Enhancement Exists
Harvest Now, Decrypt Later (HNDL): adversarial nation-states record encrypted TLS traffic today for future quantum decryption. JIL already implements Dilithium/Kyber for verdict signing and storage - that is correct. The remaining gap is TLS between JIL's API endpoints and client systems, which still uses classical ECDHE (X25519). Upgrading to hybrid X25519Kyber768 (NIST FIPS 203 / ML-KEM) in TLS 1.3 closes this using the Open Quantum Safe (OQS) OpenSSL provider. This is the final piece of JIL's post-quantum architecture.
Implementation
# nginx.conf - add to ssl_ecdh_curve parameter ssl_ecdh_curve X25519Kyber768:X25519:P-256; # Node.js API server - OQS OpenSSL provider # npm install @openquantumsafe/oqs-node ecdhCurve: "X25519Kyber768", minVersion: "TLSv1.3"
References
| Source | Cost | Notes |
|---|---|---|
| NIST PQC Standards (FIPS 203/204/205) | Free | The authoritative standards. FIPS 203 = ML-KEM (Kyber). Published August 2024. |
| Open Quantum Safe (OQS) Project | Open source | OQS-OpenSSL provider for hybrid PQC TLS. Drop-in for existing OpenSSL deployments. |
| CISA PQC Migration Guidance | Free | US government mandate reference. NSM-10 deadline 2035 for federal agencies. |
Explainability Layer (XAI) - Natural Language Verdict Explanations
Why This Enhancement Exists
JIL's current verdict output is correct for machine consumption. It is insufficient for compliance officers who must explain rejections to regulators, customer service teams explaining holds to account holders, enterprise buyers evaluating JIL, and court or regulatory proceedings requiring evidence of why a payment was blocked. The XAI layer converts the machine verdict into a deterministic natural-language explanation. Deterministic template engine, NOT LLM-generated. Deterministic and auditable - a regulatory requirement.
Sample Output - REVIEW Verdict
Complete Extended Check Registry
All 14 extended checks with full classification, phase, latency, and hard block conditions.
| ID | Check Name | Category | Tier | Phase | Latency | Hard Block |
|---|---|---|---|---|---|---|
| A | Pig Butchering / Romance-Investment Scam | Cat 9 - Emerging | 1 | Phase 1 | 200ms | Confirmed wallet; score >85 |
| B | AI Voice Deepfake at Authorization | Cat 1 - Identity | 1 | Phase 2 | 500ms* | Deepfake >0.85; voiceprint fail |
| C | FaaS Infrastructure Intelligence | Cat 9 - Emerging | 1 | Phase 1 | 150ms | 3/3 signals confirmed |
| D | Digital Wallet Provisioning Fraud | Cat 2 - Rail Fraud | 1 | Phase 2 | 400ms* | Unrecognized device + no CV |
| E | Magecart / E-Skimmer Merchant | Cat 2 - Rail Fraud | 1 | Phase 1 | 30ms | Confirmed compromised MID |
| F | ZKP Post-Settlement Proof Artifact | Cat 5 - Instruction | 2 | Phase 3 | Zero (async) | N/A - output artifact |
| G | Real Estate Closing Wire Protection | Cat 5 - Instruction | 2 | Phase 1 | 200ms | Account change + first wire + >$100K |
| H | Trade-Based Money Laundering | Cat 8 - Intl Typology | 2 | Phase 2 | 300ms* | Duplicate instrument; 3x price dev |
| I | Bust-Out Credit Fraud Detection | Cat 4 - Behavior | 2 | Phase 1 | 150ms | Score >80 |
| J | CBDC Attestation Framework | Cat 3 - Compliance | 2 | Phase 3 | 200ms | Restriction violation; suspended wallet |
| K | Consortium Intelligence Network | Architecture | 3 | Phase 3 | Zero | N/A - enrichment layer |
| L | Adversarial ML / Model Drift | Architecture | 3 | Phase 3 | Zero | N/A - background monitoring |
| M | HNDL Quantum-Safe TLS | Architecture | 3 | Phase 2 | +2-5ms TLS | N/A - transport layer |
| N | XAI Natural Language Verdicts | Architecture | 3 | Phase 1 | Zero | N/A - output layer |
* Conditional path - only triggers for specific transaction types. Does not apply to all transactions.
Phase 1 Sprint Plan - 30 Days Post-Mainnet
Six items can be shipped within 30 days. None require new institutional partnerships or lengthy API onboarding. All use existing infrastructure or simple local logic.
| Priority | Check | Est. Dev Days | Dependencies |
|---|---|---|---|
| 1 | Check N - XAI Explanation Layer | 3 days | None. Template engine only. Immediate BD and compliance value. |
| 2 | Check E - Magecart Merchant Detection | 4 days | Recorded Future API key. Daily cron job for feed refresh. |
| 3 | Check G - Real Estate Closing Wire | 5 days | ALTA public directory. State licensing HTML scrape (TX, FL, CA). |
| 4 | Check I - Bust-Out Credit Fraud | 5 days | Redis entity profiler already in infrastructure. Internal data only for Phase 1. |
| 5 | Check A - Pig Butchering Detection | 7 days | Chainalysis KYT API key (new contract). RDAP (free). Bloom filter setup. |
| 6 | Check C - FaaS Intelligence | 5 days | Recorded Future + SEON API keys. Redis infrastructure already in place. |
Total Coverage Summary
| Metric | Now (55) | Phase 1 (+6) | Phase 2 (+4) | Phase 3 (+4) | Full 69 + Arch |
|---|---|---|---|---|---|
| Total Checks | 55 | 61 | 65 | 65 | 69 |
| Signal Categories | 8 | 9 | 9 | 9 | 9 |
| Architecture Layers | 5 | 5 | 6 | 7 | 9 |
| Known Fraud Vectors | ~82% | ~91% | ~96% | ~96% | ~99% |
| Positioning Claim | Attestation engine | Payment Integrity Network | Comprehensive integrity | Definitive standard | Industry benchmark |
Service: fraud-attestation-engine (extended)
Related paper: Pre-Settlement Fraud Attestation Engine
Owner: Stanley Byrne (CIO)
Version: 1.0 - Next review: 60 days post-mainnet
JIL Sovereign Technologies, Inc. - Patent Pending - April 2026
This document is confidential and proprietary.