Using RiskOps
The RiskOps tab enables you to perform manual reviews of applications. You can search for applications using one of the following identifiers:
- Application ID
- Applicant SSN, Email, Phone, or IP Address
- SentiLink ID
- Transaction ID

Reviewing an Application
- Open the Risk Ops tab.
- Search using one of the supported identifiers.
- Examine the Applicant Card displayed below:
- Assess the risk level using score ranges:
- High Risk (750+): Highlighted in red.
- Medium Risk (400–749): Highlighted in yellow.
- Low Risk (below 400): Highlighted in gray.

- 1. If specific PII data is not included within an application, we will display a “-”. Age and IP metadata is generated as-of the application date. Indications of eCBSV results around the identity including: Name, DOB, and SSN represent a valid combination according to eCBSV. Name, DOB, and SSN do not represent a valid combination according to eCBSV. eCBSV flagged the name, DOB, and SSN as deceased.
- 2. If application PII is an exact or fuzzy match to the first Intercept Identity they will have the icons and colors: Exact match and Fuzzy match
- 3. Hover over any PII and click the Copy icon to copy it to your computer’s clipboard.
Hover over the address to reveal a Map icon that allows you to view the address in Google Maps. - 4. Warnings and indicators appear below PII metadata.
- 5. Hover over text with a dashed underline to view an explanatory tooltip.
Escalating a Case
If further investigation is needed, use the Escalate button to submit a case to SentiLink’s Fraud Intelligence Team (FIT). Provide:
- A tag categorizing the issue (e.g., ID Theft, Synthetic Review).
- Write an explanation to give more context about what you are seeing and what you think FIT might be able to do to help resolve the case. The more detail that you can provide about why you are escalating the case and what help you need, the easier (and thus faster) it will be resolved.
FIT typically responds within 24 business hours.

Intercept in RiskOps
Click “Intercept” at the top of the Risk Ops page to view related identities from SentiLink’s comprehensive identity database, Intercept.

1. Review all PII associated with an identity in the Identity cards. Identity cards are sorted based on how closely the identity matches the application PII.
2. Teal text and icon indicates an exact PII match between the application and Manifest. Yellow text and icon indicates a fuzzy match. Note that a match or a mismatch does not necessarily mean an application is legitimate or fraudulent.
First seen dates represent the date the PII was first seen associated with the application identity.
3. Identities can have numerous rows of PII associated with them. Click to expand all tables within that card.
4. On PII as well as the right of each identity card there can be helpful data or alerts on PPP loans, bankruptcies, and fraud codes shown with the red warning triangle.
Cluster Summary

Cluster Summary utilizes data from across all applications submitted to SentiLink to illustrate how pieces of applicant information are being utilized elsewhere. Using Cluster Summary, users can identify signals of fraudulent behavior such as:
The SSN being used by other identities in a short time period
An email or phone being associated with many unrelated individuals
How often an address has been associated with a suspected case of identity theft
The graph on the below shows two different stats:
Velocity: The number of distinct applications in which the PII was used.
Volatility: The number of other identity combinations associated with the PII.
The date range selector allows you to adjust the velocity and volatility metrics based on a 30-day, 60-day, 120-day, or 1-year time period from the created date of the application.
Clustered Applications
Clustered applications displays other applications at your financial institution that contain PII matching the application you are investigating.

1. View labels, Synthetic Fraud Score (Abuse), and ID Theft Score for each application in the Cluster. Sort and filter each column by clicking the column header.
2. Hover over any PII to highlight matching PII in the clustered applications card. Hover over SSN, phone, email, or IP address to see helpful metadata.
3. Toggle the SSN, phone, email, and IP address metadata on hover.
4. Change the fields by which the results are linked by using the “Update Clustering” button.
