Welcome to Sentinel
Sentinel protects program integrity by identifying fraudulent submissions while maintaining low false-positive rates for legitimate applicants. Define fraud vectors, run batch analysis, and ensure benefits reach the people who need them.As generative AI makes fake documents increasingly realistic, benefit programs need sophisticated fraud detection that goes beyond document verification. Sentinel analyzes patterns across 450,000+ applications to identify coordinated fraud attempts, synthetic identities, and suspicious behaviors—without creating barriers for legitimate applicants from marginalized communities.
What Sentinel Does
Sentinel is a fraud analysis platform with four core capabilities:Batch Upload
Upload submission data from Airtable, Terra, or other sources. Process thousands of applications in a single batch.
Fraud Vectors
Define heuristics and detection rules. Geographic clustering, IP analysis, bank verification, duplicate detection, and more.
Automated Workflows
Turn fraud vectors into automated pipelines that run on every batch. Flag suspicious submissions for human review.
Results Export
Export flagged submissions to Airtable for case management review. Sync fraud findings back to Hub.
Who Uses Sentinel
Primary Users: Fraud Analysis Team- David (CEO): Defines fraud vectors, reviews patterns
- Brian (Director of Systems Integration): Builds automated workflows
- May (Engineer): Implements detection algorithms
- Upload batch of submissions (from Airtable or Terra)
- Run fraud vector analysis
- Review flagged submissions
- Export results to new Airtable base
- Case managers review and make final decisions
Fraud Vectors
Sentinel supports multiple types of fraud detection:Geographic Analysis
| Vector | Description | Example |
|---|---|---|
| Geo Clustering | Multiple applications from same location | 50 applications from single IP address |
| Address Verification | Address doesn’t match other data | Rental assistance for non-existent address |
| Distance Analysis | Employer/bank far from residence | Bank in different state than home address |
| Jurisdiction Mismatch | Applicant outside program area | Seattle program, Portland address |
Identity Analysis
| Vector | Description | Example |
|---|---|---|
| Duplicate Detection | Same person, multiple applications | SSN used across 3 programs |
| Synthetic Identity | Fabricated identity markers | SSN/DOB combination doesn’t exist |
| Identity Velocity | New identity, high activity | SSN first seen, 10 applications in 1 week |
| Name Variations | Suspicious name changes | ”John Smith” → “Jon Smyth” → “Jonathan Smith” |
Document Analysis
| Vector | Description | Example |
|---|---|---|
| Template Detection | Documents from same template | 20 paystubs with identical formatting |
| Metadata Analysis | Document creation patterns | PDF created 5 minutes before submission |
| Inconsistency Flags | Data doesn’t match across documents | Paystub income ≠ tax return income |
| Known Fraudulent | Previously flagged documents | Document hash matches known fraud |
Behavioral Analysis
| Vector | Description | Example |
|---|---|---|
| Submission Velocity | Rapid-fire applications | 10 applications in 5 minutes |
| Time Patterns | Unusual submission times | All applications at 3am |
| Device Fingerprint | Same device, multiple identities | One browser, 50 different people |
| Referral Patterns | Coordinated referral abuse | All applications from same referrer |
Financial Analysis
| Vector | Description | Example |
|---|---|---|
| Bank Verification | Bank account doesn’t verify | Account closed or doesn’t exist |
| Fraudulent Banks | Known problematic institutions | Banks frequently used in fraud rings |
| Income Inconsistency | Claimed income vs. verified | Claims 500 |
| Payment Velocity | Multiple payments to same account | 5 different applicants, same bank account |
Workflow Architecture
Risk Scoring Model
Each submission receives a risk score (0-100) based on weighted fraud vectors:Scoring Thresholds
| Score Range | Action | False Positive Target |
|---|---|---|
| 0-30 | Auto-approve (no fraud indicators) | N/A |
| 31-50 | Low priority review | <5% |
| 51-70 | Standard review required | <10% |
| 71-85 | High priority review | <15% |
| 86-100 | Critical review + escalation | <20% |
Human in the Loop
Path to Redemption
Someone flagged for fraud should not be permanently barred:- Program-Specific Flags: Fraud flags are scoped to the program where detected
- Time-Limited: Flags expire after configurable period (default: 1 year)
- Appeal Process: Applicants can submit additional documentation
- Human Override: Case managers can clear flags with justification
- Cross-Program: Only confirmed fraud (human-verified) affects other programs
Bias Mitigation
Legitimate applicants from marginalized communities may exhibit patterns that models incorrectly flag:| Pattern | Why It Happens | Mitigation |
|---|---|---|
| Frequent address changes | Housing instability | Weight address history less for housing programs |
| Non-standard employment | Gig economy, seasonal work | Accept alternative income documentation |
| Shared bank accounts | Multi-generational households | Allow multiple applicants per account |
| No traditional ID | Undocumented, homeless | Accept alternative identity verification |
Data Model
Core Tables
UI Wireframe
Batch Analysis Dashboard
Vector Configuration
Integration Points
Airtable Integration
Input: Export CSV from Airtable → Upload to Sentinel Output: Export flagged records → New Airtable base for reviewHub Integration
Fraud assessments sync to Hub for unified applicant view:Terra Integration
Read submissions directly from Terra for analysis:Implementation Phases
Phase 1: Batch Upload + Basic Vectors
- CSV upload from Airtable
- Data normalization pipeline
- IP clustering detection
- Duplicate detection (SSN, email)
- Basic risk scoring
- Export to Airtable
Phase 2: Advanced Vectors
- Document analysis (template detection, metadata)
- Bank verification integration
- Geographic analysis
- Behavioral patterns
Phase 3: Automated Workflows
- Scheduled batch processing
- Terra direct integration
- Hub sync
- Configurable alert thresholds