Abyrint Logo abyrint.
A digital screen displaying a profile with a koala image instead of an ID photo, highlighting a security flaw.

The Koala in the KYC The Difference Between a Presence Check and a Real Control

Published on: Thu Nov 02 2023 by Ivar Strand

The Koala in the KYC: The Difference Between a “Presence Check” and a Real Control 🐨

A recent, documented case in the financial technology sector provides an instructive lesson for anyone responsible for fiduciary oversight. A digital platform’s automated Know Your Customer (KYC) process, which required new users to upload a photo of a government-issued ID, was successfully completed by an individual who instead submitted a picture of a koala.

While the incident is superficially amusing, it is a clear illustration of a widespread and significant vulnerability in many digital control systems. It reveals the critical difference between a simple “presence check” and a substantive control.


The Anatomy of the Failure: Presence vs. Content

The failure in the KYC process was not a bug in the traditional sense; the system performed exactly as it had been programmed to. The flaw was in the design of the control itself. The system was built to perform a presence check.

The system was not, however, programmed to perform a content check.

The system’s control was a form of “security theater”—a process that provided the appearance of security while lacking any substantive verification, thereby creating a false sense of assurance for auditors and compliance officers.


A Widespread Vulnerability in Supporting Documentation

This is not an isolated issue limited to KYC processes. The same fundamental weakness exists in countless business processes across all sectors, including international development, that rely on the submission of “supporting documents.”

In each of these cases, a superficial audit could easily conclude that a control is in place and functioning. The “receipt attached” field is populated, and the transaction is processed. The underlying risk remains entirely unmitigated.


Moving Towards Substantive Verification

The lesson from the koala is that our systems and our assurance methodologies must evolve.

For system design, this means moving beyond simple presence checks. Technologies like OCR and basic machine vision are increasingly accessible and can be deployed to perform rudimentary content verification—classifying documents and extracting key information for validation.

For auditors and monitoring agents, this means our testing must become more sophisticated. Verifying a document upload control is not complete until one has actively attempted to subvert it. The test script for any such control should now include a step to “upload an irrelevant image or a blank file” to see if the system correctly rejects it.

The integrity of a financial process depends on the substantive quality of its controls, not the mere existence of procedural steps. True, technology-driven monitoring requires a deep inquiry into how these controls actually function. It is our responsibility to ensure the systems we rely on can, in fact, tell the difference between a passport and a koala.