CINXE.COM
Understanding the Synthetic Identity Fraud (SIF)
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <!-- The above 3 meta tags *must* come first in the head; any other head content must come *after* these tags --> <title>Understanding the Synthetic Identity Fraud (SIF)</title> <meta name="description" content="How perpetrators combine real and fictitious identifying information, to create new identities"> <meta name="keywords" content="Synthetic Identity Fraud, SIF fraud, Synthetic Identity Theft, Fraud Prevention, Identity Theft Protection, Digital Fraud Solutions"> <link rel="apple-touch-icon" sizes="180x180" href="apple-touch-icon.png"> <link rel="icon" type="image/png" sizes="32x32" href="favicon-32x32.png"> <link rel="icon" type="image/png" sizes="16x16" href="favicon-16x16.png"> <link rel="shortcut icon" type="image/x-icon" href="favicon.ico"> <link rel="manifest" href="manifest.json"> <meta name="msapplication-TileImage" content="mstile-150x150.png"> <meta name="theme-color" content="#ffffff"> <!-- Bootstrap --> <link href="css/bootstrap.min.css" rel="stylesheet"> <link href="css/style.css" rel="stylesheet"> <!--font-awesome--> <link href="https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css" rel="stylesheet"> <link href="https://fonts.googleapis.com/css2?family=Montserrat:wght@100;200;300;400;500;600;700;800;900&display=swap" rel="stylesheet"> <!-- Owl Stylesheets --> <link rel="stylesheet" href="css/owl.carousel.css"> <link rel="stylesheet" href="css/owl.theme.default.css"> <!-- javascript --> <script src="js/jquery.min.js"></script> <script src="js/owl.carousel.js"></script> <!-- HTML5 shim and Respond.js for IE8 support of HTML5 elements and media queries --> <!-- WARNING: Respond.js doesn't work if you view the page via file:// --> <!--[if lt IE 9]> <script src="https://oss.maxcdn.com/html5shiv/3.7.3/html5shiv.min.js"></script> <script src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js"></script> <![endif]--> <meta name="google-site-verification" content="I0CDxLn5hun_Esd7Gf8jIPUBQ1eIIcVNsUQQ9d4Dq8Q"> <style> .wrapper-banner { background: url("synthetic_identity_fraud.jpg"); background-size: cover; background-position: center; } </style> <meta name="msvalidate.01" content="3992470AA0B488CE9CF07B1CD73A76D7"> <link rel="stylesheet" href="./style2.css"> <style> body { color: black; } </style> <style> a:link { color: blue; background-color: transparent; text-decoration: none; } a:visited { color: blue; background-color: transparent; text-decoration: none; } a:hover { color: red; background-color: transparent; text-decoration: underline; } a:active { color: blue; background-color: transparent; text-decoration: underline; } </style> </head> <body> <!-- Fixed navbar --> <div class="wrapper-menu"> <nav id="header" class="navbar navbar-fixed-top"> <div id="header-container" class="container navbar-container"> <div class="navbar-header"> <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#navbar" aria-expanded="false" aria-controls="navbar"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a id="brand" class="navbar-brand" href="https://www.disinformation.ch/"> <!--<img src="images/logo-black.png" alt="" class="shrink-logo"> --> </a> </div> <div id="navbar" class="collapse navbar-collapse"> <ul class="nav navbar-nav"> <li><a href="https://www.synthetic-identity-fraud.com" target="_blank" >Index</a></li> <li><a href="https://www.synthetic-identity-fraud.com/Biometrics.html" target="_blank" >Biometrics, the answer to SID</a></li> <li><a href="https://www.cyber-risk-gmbh.com" target="_blank">Cyber Risk GmbH</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Impressum.html" target="_blank">Impressum</a> </li> <li><a href="https://www.cyber-risk-gmbh.com/About.html" target="_blank">About us</a></li> </ul> </div> <!-- /.nav-collapse --> </div> <!-- /.container --> </nav> <!-- /.navbar --> </div> <div class="container-fluid wrapper-banner"> <div class="container"> <div class="top-banner"> <h3>Synthetic identity fraud (SIF)</h3> </div> </div> </div> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h3>Synthetic Identity Fraud (SIF)</h3> <br> <br> <p class="text-left"><b>What is Synthetic Identity Fraud (SIF)?</b></p> <p class="text-left"> <i>Identity fraud </i>is a crime in which perpetrators obtain personally identifiable information belonging to an individual, and assume that individual’s identity to commit fraud. In identity fraud, criminals may use a person’s credit card information to make unauthorized charges, or apply for credit or government benefits. Identity related crime is growing in sophistication, intensity, and frequency. </p> <p class="text-left"> <i> Synthetic identity fraud (SIF) </i> is different. SIF is a crime in which perpetrators combine real and fictitious identifying information, to create new identities with which they defraud financial institutions, government agencies, or individuals. It is important to understand that in synthetic identity fraud, the resulting identity and profile is not associated with a real person, it is a new identity. </p> <p class="text-left">Synthetic identity fraud can be achieved through identity fabrication (a completely fictitious identity is created), and identity manipulation (modified real information, or a combination of real and fake information is used for a new identity). SIF can go undetected for years. Assembling a new identity used to be the specialty of spies, now it is also part of the modus operandi of state-sponsored groups, the organized crime, and even individuals. </p> <p class="text-left"> National security programs in many countries rely on verifying a purported identity against a list of suspected bad actors or terrorists. Criminals and terrorists use synthetic identities to enter countries or move around undetected. SIF criminals have successfully used synthetic identities to obtain state-issued identity documents necessary to acquire passports. SIF has also been used to finance terrorists and criminals over long periods of time. </p> <p class="text-left"> SIF impacts national security in other ways too. It offers the opportunity to organized crime and nation states to obtain and launder illicit profits, and to harm the economic stability of households, enterprises and governments. </p> <p class="text-left"> The trend to digitize almost all financial transactions and government benefits create opportunities for criminals, terrorists, and spies. It’s much easier to impersonate someone online than it is in person. The large number of data breaches across all sectors of the economy has exposed all personal information anybody would need for SIF, and everybody can purchase this information.</p> <p class="text-left"> SIF is often used in other crimes too. Sexspionage and romance scams occur when a perpetrator adopts a fake identity to gain a victim’s affection and confidence. The perpetrator uses the illusion of a romantic or close relationship, to manipulate and/or steal from the victim. The persons that carry out romance scams are experts at what they do and will be seem genuine, caring, and believable. Their intention is to quickly establish a relationship, gain trust, and eventually ask for money or information. </p> <br> <p class="text-left"> <b> Which is the solution to Synthetic Identity Fraud (SIF)?</b></p> <p class="text-left">Biometric identification and verification technologies are the answer to SIF. This is necessary for banking services, international and domestic travel, access to sensitive facilities and information, government benefits, voting rights and so many other areas that are exploited by threat actors.</p> <p class="text-left"> A biometric identifier is a measurement of a physical characteristic of an individual which, when captured in a database, can be used to verify the identity or check against other entries in the database. Fingerprints, facial recognition, iris scans, voice recognition, and anthropometry (body measurements) are some examples. New sensors and algorithms and new technologies can dramatically improve identification and verification.</p> <p class="text-left">You can find more information at: </p> <p class="text-left"><a href="https://www.synthetic-identity-fraud.com/Biometrics.html" target="_blank">https://www.synthetic-identity-fraud.com/Biometrics.html</a></p> <br> <p class="text-left"> <b> Steps, from the US Government Accountability Office (GAO)</b></p> <p class="text-left">A typical process to create and build a synthetic identity involves the following steps:</p> <p class="text-left">Step 1: Perpetrators steal or purchase hacked public or private databases that contain personally identifiable information. They combine this information to make new identities. </p> <p class="text-left">Step 2: Perpetrators use the synthetic identities to apply for lines of credit, typically at a bank. The bank submits an inquiry to credit bureaus about the applicant’s credit history. The credit bureaus initially report that an associated profile does not exist, and the bank may reject the application; however, the credit inquiry generates a credit profile for the synthetic identity in the credit bureaus’ databases.</p> <p class="text-left">Step 3: Once the synthetic identity is established via the credit profile, the perpetrator again applies for and ultimately receives credit. At this stage, the perpetrator will typically apply for multiple credit cards and other products marketed to consumers who are new to credit.</p> <p class="text-left">Step 4: SIF perpetrators maintain good credit over time to build up credit limits and apply for more cards. They also exploit credit bureau procedures to improve their credit history by getting legitimate credit users to act as accomplices and add synthetic identities as “authorized users” on accounts in good standing. Criminals may also build credit history by adding the synthetic identities as “authorized users” to other credit accounts they have obtained using different synthetic identities.</p> <p class="text-left">Step 5: Eventually SIF perpetrators exploit financial institutions by, for example, charging the maximum amount on credit cards and not paying the bill. This stage of the fraud is known as the “bust-out.” Perpetrators may also launder the money between multiple accounts. They may also use the synthetic identities to fraudulently obtain government benefits or illegally obtain work. </p> <br> <p class="text-left"><b>Synthetic Identities, from the US National Credit Union Administration</b></p> <p class="text-left">What do you get when you combine real identity data with fabricated data? You get what is commonly termed a “synthetic identity.” It exists only in the virtual world but can wreak havoc in the real one.</p> <p class="text-left">The foundation of a synthetic identity is personally identifiable information along with a compromised Social Security number that acts as the essential linchpin. In order to avoid detection, fraudsters prefer to use Social Security numbers of those least likely to use credit, such as the elderly and children. </p> <p class="text-left">This synthetic identity may be comprised of one person’s name, a second person’s Social Security number, a third person’s physical address, and some fabricated information such as a fictitious place of employment. This semblance of an identity — made from combining just enough real data and just a bit of fake data — allows fraudsters to apply for credit, make major purchases, and establish a convincing financial history over time.</p> <p class="text-left">And the use of synthetic identities is growing. According to the Justice Department, synthetic identities derived from compromised Social Security numbers is one of the fastest growing forms of identity theft in the United States. TransUnion reports that a record $355 million in outstanding credit-card balances are owed by people who it suspects did not exist in 2017. Lastly, Accenture PLC listed synthetic identity fraud as one of the biggest threats facing financial institutions in 2018, and reports it will cost billions of dollars and countless hours as financial institutions “chase down people who don’t even exist.”</p> <p class="text-left">The difficulty in detecting the fraudulent use of Social Security numbers is, in part, an unintended consequence of the Social Security Administration’s attempt to reduce identity fraud. In the past, a Social Security number was comprised of a three-digit geographic number, a two-digit age group number, and a four-digit serial number. However, in July 2011, the agency began randomizing Social Security numbers partly in response to concerns that fraudsters could reconstruct them from public records. Because of randomization, financial institutions can no longer pair a Social Security number with a credit applicant’s place and date of birth to help verify the applicant’s identity.</p> <p class="text-left">An active synthetic identity fraud also creates a fragmented credit file. A fragmented credit file refers to additional credit report information, comprised of some combination of real and fabricated data, tied to a valid Social Security number. Negative information entered into a fragmented file that is linked to a consumer’s Social Security number has the potential to cause real world harm. For example, if a synthetic identity fraud results in a defaulted loan, the fraud can result in harm to a real consumer’s credit rating even though the name and date of birth attached to the fraud are different. Credit blocks and alert notification services tied to a valid credit file are not effective when it comes to monitoring activity on a fragmented credit file.</p> <p class="text-left">Often credit unions rely on data analytics or information provided by third parties to detect traditional forms of identity fraud. Data analytics typically focus on suspicious activity, such as accounts with large transactions, transactions made in geographic areas deemed high-risk, and patterns of insufficient payments or bounced checks. They often look for rapid changes in customer behavior consistent with traditional identity fraud. Unfortunately, building a financial history with a synthetic identity is typically a slower process, so a credit union may not realize an account is fraudulent until after fraud has already occurred, if at all.</p> <p class="text-left">Despite the difficultly, there are a few things a credit union can do to increase its chances of identifying a possible synthetic identity. </p> <p class="text-left">These include:</p> <p class="text-left"> - Utilizing a more effective data analytic tool that flags seemingly unconnected accounts based on similar data fields such as a phone number;</p> <p class="text-left"> - Monitoring for any Social Security number that matches a different consumer while no credit file is available for the requested applicant; and</p> <p class="text-left"> - Monitoring for credit files where the name and address of the applicant match, but the Social Security number matches a different consumer and vice versa.</p> <p class="text-left">Likewise, there are a few things consumers and credit union members can do determine if their Social Security number is associated with a synthetic identity:</p> <p class="text-left"> - Check their annual Social Security statement to ensure that the reported income figure is in line with what was actually earned.</p> <p class="text-left"> - Be on the lookout for mail that is sent to their home with someone else’s name on it.</p> <hr> <br> <p class="text-left"> <b> What Are Identity Theft and Identity Fraud? From the US Department of Justice</b></p> <p class="text-left">Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. </p> <p class="text-left">The most common ways that Identity Theft or Fraud can happen are:</p> <p class="text-left"> - In public places, for example, criminals may engage in "shoulder surfing"– watching you from a nearby location as you punch in your telephone calling card number or credit card number – or listen in on your conversation if you give your credit-card number over the telephone.</p> <p class="text-left"> - If you receive applications for "pre-approved" credit cards in the mail, but discard them without tearing up the enclosed materials, criminals may retrieve them and try to activate the cards for their use without your knowledge. Also, if your mail is delivered to a place where others have ready access to it, criminals may simply intercept and redirect your mail to another location.</p> <p class="text-left"> - Many people respond to "spam"– unsolicited E-mail – that promises them some benefit but requests identifying data, without realizing that in many cases, the requester has no intention of keeping his promise. In some cases, criminals reportedly have used computer technology to steal large amounts of personal data.</p> <p class="text-left">With enough identifying information about an individual, a criminal can take over that individual's identity to conduct a wide range of crimes. For example:</p> <p class="text-left">- False applications for loans and credit cards,</p> <p class="text-left">- Fraudulent withdrawals from bank accounts,</p> <p class="text-left">- Fraudulent use of telephone calling cards or online accounts, or</p> <p class="text-left">- Obtaining other goods or privileges which the criminal might be denied if he were to use his real name.</p> <hr> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h3>Cyber Risk GmbH, some of our clients</h3> <br> <div class="logos"> <div class="logos-slide"> <img src="Logos/XMA8.png" alt="" > <img src="Logos/SYGNIA5.jpg" alt="" > <img src="Logos/DELL3.jpg" alt="" > <img src="Logos/VW.jpg" alt="" > <img src="Logos/Bosch9.png" alt="" > <img src="Logos/Swisslife3.JPG" alt="" > <img src="Logos/ATLAS8.png" alt="" > <img src="Logos/INSIG8.png" alt="" > <img src="Logos/SANT8.png" alt="" > <img src="Logos/NTT38.png" alt="" > <img src="Logos/EIB15.PNG" alt="" > <img src="Logos/SC8.JPG" alt="" > <img src="Logos/schindler.jpg" alt="" > <img src="Logos/AO9.png" alt="" > <img src="Logos/GS300.JPG" alt="" > <img src="Logos/DB8.png" alt="" > <img src="Logos/TM8.png" alt="" > <img src="Logos/OK8.png" alt="" > <img src="Logos/PWC5.JPG" alt="" > <img src="Logos/Fujitsu.png" alt="" > <img src="Logos/HO5.JPG" alt="" > <img src="Logos/FIN22.png" alt="" > <img src="Logos/SAN8.png" alt="" > <img src="Logos/BAH9.png" alt="" > <img src="Logos/AT32.png" alt="" > <img src="Logos/WINS25.png" alt="" > <img src="Logos/SKY12.png" alt="" > <img src="Logos/RB78.png" alt="" > <img src="Logos/WU8.png" alt="" > <img src="Logos/TDC.JPG" alt="" > <img src="Logos/BH18.png" alt="" > <img src="Logos/DeepSec_Conference7.png" alt="" > <img src="Logos/DC12.png" alt="" > <img src="Logos/BROAD8.png" alt="" > <img src="Logos/LEMON8.PNG" alt="" > <img src="Logos/SIK8.PNG" alt="" > <img src="Logos/KUMO8.PNG" alt="" > <img src="Logos/VEST8.PNG" alt="" > <img src="Logos/MOXA8.PNG" alt="" > <img src="Logos/TIET8.PNG" alt="" > <img src="Logos/UNI8.PNG" alt="" > <img src="Logos/BCC11.PNG" alt="" > <img src="Logos/SN8.PNG" alt="" > <img src="Logos/KYN8.PNG" alt="" > <img src="Logos/PG8.PNG" alt="" > <img src="Logos/MER8.PNG" alt="" > <img src="Logos/LIB8.PNG" alt="" > <img src="Logos/ALI8.PNG" alt="" > <img src="Logos/USA8.PNG" alt="" > <img src="Logos/MAR8.PNG" alt="" > <img src="Logos/ABB8.PNG" alt="" > <img src="Logos/INSI8.PNG" alt="" > </div> </div> <script> var copy = document.querySelector(".logos-slide").cloneNode(true); document.querySelector(".logos").appendChild(copy); </script> </div> </div> </div> </div> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> </div> </div> </div> </div> <!--<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js"></script> --> <script src="js/bootstrap.js"></script> <script> $(document).ready(function() { var owl = $('.cliend-logo'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 6 }, 1000: { items: 6 } } }) }) $(document).ready(function() { var owl = $('.testimonialstext'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 1 }, 1000: { items: 1 } } }) }) </script> <script> $(window).scroll(function() { if ($(document).scrollTop() > 50) { $('nav').addClass('shrink'); $('.add').hide(); } else { $('nav').removeClass('shrink'); $('.add').show(); } }); </script> </body> </html>