The Long Con: An Analysis of Synthetic Identities
|
|
|
- Camilla Dortha Hall
- 10 years ago
- Views:
Transcription
1 WHITEPAPER The Long Con: An Analysis of Synthetic Identities October 2014
2 2 Table of Contents Introduction 3 Defining Synthetic Identities 4 Differentiating Synthetic Identity Fraud 5 Synthetic Fraud and Criminal Activities 7 Case Studies 7 Magnitude of Volume and Risk 9 Can Synthetics be Recognized? 13 Conclusion 13
3 Introduction 3 Fraudsters continue to find increasingly sophisticated means to perpetrate crimes despite advances in technology and stricter regulations designed to reduce fraudulent behavior. Notably, the advent of digital technology and the anonymity it provides has contributed to the rise of the creation of fictitious credentials known as synthetic identities. Synthetic identity fraud is a significant and growing problem for multiple reasons. A major contributing factor is that social security number (SSN) randomization, introduced in 2011 and intended to provide higher safeguards for the public, has been exploited by fraudsters to help create and use false identities. The availability of identity information for use by fraudsters in generating synthetic identities is also growing with each new, massive data breach. Additionally, the shift to the Europay MaterCard Visa (EMV) standard for point-of-sale transactions in 2015, which requires merchants to accept both magnetic strip and chip and PIN transactions, is expected to force fraudsters to adopt new account fraud strategies. In the midst of this changing landscape, it is reasonable to assume that synthetic fraud will continue to be a persistent and significant problem. Avivah Litan, Gartner Inc., estimates that synthetic schemes constitute at least 20% of credit charge-offs and 80% of losses from credit-card fraud. 1 The true danger of synthetic fraud is that, unlike third-party fraud where an entire identity is stolen and used to defraud enterprises and victims, synthetic fraud frequently has no specific consumer victim. The lack of a clear consumer victim often allows a synthetic fraudster to remain undetected for months, only to bust out (suddenly use the remainder of a credit line). This long-term con or fraud is particularly dangerous because criminals employing this technique for financial gain can often nurture the synthetic identity into generating larger credit limits and larger loss amounts for the lender than the average identity theft scenario. This white paper explores 1) the definition of synthetic fraudsters and the algorithm used to identify them, 2) the estimated size of the synthetic fraud issue, 3) various regulatory and financial issues that lenders and wireless carriers face when it comes to synthetic fraudsters, and 4) possible solutions for reducing synthetic fraud. Background Fraudsters have used synthetic identities for decades. In the past, people with minimal or poor credit history created synthetic identities to receive approval for new credit cards. In some cases, to consolidate financial responsibility, family members shared identity information in an amalgamation of elements that could no longer be traced to a particular person. Despite the fake identities, these cases often would not derive from any malicious intent, and applicants would plan to use the card legitimately to purchase goods. However, today, synthetic identities are often created for malicious intent: to purposefully commit fraud, to launder money, or to support terrorist or other criminal activities. The risk of synthetic identity fraud has grown as the demand for immediate access to goods and services threatens to strain security processes. Most enterprise systems have become increasingly automated and online enrollment technologies have become ever more popular. Due to the absence of official identification, like driver s licenses or passports, synthetic fraudsters can appear as a thin file/no hit applicant to an enterprise s adjudication system. Without a true paper trail leading to a real person, the subsequent drop in credit score is of no consequence and the victim of the crime is the financial institution at risk of fraud or violation of Know Your Customer (KYC) regulations. 1 Christopher Conkey, The Borrower Who Never Was (The Wall Street Journal, 2007)
4 Defining Synthetic Identities: Distinctive Characteristics of Synthetic Identity Fraud 4 Synthetic identities are a combination of fabricated credentials where the implied identity is not associated with a real person. Unlike identity theft or manipulation, where the core identity of a person is impersonated or manipulated by a fraudster, a synthetic identity is an artificial identity with no particular person behind it. The fake identity uses false elements that include any combination of fabricated SSN, name, date of birth, address or phone number. The validity of each individual identity element is not definitive, but the combination of identity elements is definitely invalid. For example, the address may be a real, shippable address and the SSN may be real and valid, but the SSN, name and date of birth combination does not match with any real person. Synthetic identities are fairly easy to create because fabricating data elements can be done indiscriminately. Even an SSN, which is supposed to be a unique identifier for a single person, can be easily fabricated. Blatantly invalid SSNs (e.g ) would most likely be flagged by a financial institution due to the obvious invalidity of some of the data elements; however, potentially legitimate SSNs are easier to fabricate in the post-randomization era. Because a fabricated SSN may be a previously issued SSN to an unknown person, the resulting fraud may appear to be identity theft. However, this method actually indicates synthetic fraud because the fabricated personally identifiable information (PII) does not belong to the SSN, to the fraudster, or to any core identity. This accidental or intentional use of a valid SSN with fabricated identity elements is one of the more difficult scenarios for lenders and vendors to identify and prevent. Furthermore, lenders and vendors typically rely on the SSN for identity verification and as long as the SSN does not raise any red flags (frivolous, deceased or invalid format/range), the unknown identity may bypass the lender s security system as an applicant with a thin credit history. Some synthetic fraudsters will create a shell company to artificially verify fake identity elements. The use of a valid SSN with other fake identity elements to commit synthetic identity fraud is a common way to attempt to bypass a lender s security measures.
5 Differentiating Synthetic Identity Fraud 5 The table below summarizes the characteristics of three distinct identity fraud types that are often confused: Who is the victim? Nature of the misrepresentation Signals used to find the fraud Identity Theft Identity Manipulation Synthetic Identity The person whose identity is being misused The company providing the fraudulently obtained product or service is also a victim Typically SSN, name and date of birth belong to the victim, and the address, phone, and/or are associated with the fraudster Unusual activity around the SSN, name, and/or date of birth combination (these belong to the victim), or address/phone (these are usually associated with the fraudster) The fraudster is the victim The company providing the fraudulently obtained product or service is also the victim SSN, date of birth and/ or name vary slightly from the fraudster s own, correct information Systematic variations around the fraudster s personally identifiable information (PII) to differentiate from simple typos No consumer victim The company providing the fraudulently obtained product or service is the victim SSN, name and date of birth are fabricated or chosen randomly Combined identity elements do not match Asserted PII, especially SSN, has been seen in relation to other identity elements Summary Victim s core identity Fraudster s core identity No core identity Ultimately, the differences between identity theft, identity manipulation, and synthetic identity fraud manifests in how the fraudster obtains or creates the asserted PII, including the SSN, and the resulting indicators of fraud. Identity thieves knowingly steal a victim s core identity and use this legitimate combination of SSN, name and date of birth to apply for a product or service. Identity manipulators make slight variations to their own, or a known, identity to attempt to bypass a lender s verification system. Synthetic fraudsters create an identity using a potentially valid SSN and fabricated PII. Because identity theft has a particular consumer victim, there is a much higher likelihood of the fraud being reported to the financial institution since the extra account will eventually appear in the victim s credit report. With manipulation and synthetics, discovery is likely to occur long after the financial loss has been perpetrated, and will generally not be reported by the consumer. According to a 2007 article in the Harvard Journal of Law & Technology 2 : "However, as estimates of the prevalence and severity of identity theft suggest, it is plain that the market has thus far failed to address the problem. The rise of synthetic identity theft indicates that financial institutions are not authenticating the identities of credit applicants. Instead, it appears that financial institutions are only authenticating the SSN by comparing it to the date of birth, rather than ensuring that the number is issued to the correct person. This means that lenders are not using all the tools available to them to prevent identity theft simply matching the name of the applicant to the SSN would in many cases make this type of fraud impossible." 2 Identity Theft: Making the Known Unknowns Known, Harvard Journal of Law & Technology; Volume 21, Number 1, Page 116, Fall 2007; Chris Jay Hoofnagle
6 Examples of Synthetic Fraud and Financial Risk In August 2006, James J. Rose was indicted for devising a scheme to defraud multiple financial institutions issuing credit cards. He and his partner used a small consumer reporting agency to steal valid SSNs to create synthetic identities. One of his synthetic frauds includes using Hilal Salifual 3 s real SSN to apply for a credit line under the name Hannah Crabtree 4, a fabricated name. He and his partners obtained over 250 credit cards from 15 different banks, charging roughly $760,000 to these synthetic identities 5. Other behaviors used by synthetic fraudsters are known as bust-outs. Bust-out is the term used to describe the behavior seen when a fraudster increases the spending limit of a credit line by paying off small purchases with the goal of obtaining larger loans. Eventually, the fraudster will bust-out the entire credit line, acquiring a large loan with no intention of paying it back. In February 2013, federal agents arrested 13 people for creating roughly 7,000 fake identities to steal roughly $200 million from multiple lenders. The perpetrators found unused SSNs sourced via Craigslist listings that solicited individuals who were not credit active to willingly offer up their credentials 6. The fraudsters used drop addresses as the mailing addresses for the false identities, and created sham companies that accepted credit card payments. After obtaining the cards, the fraudsters started making small charges and paying off the cards to raise their credit limits. 7 This enabled the fraudsters to incur a large loan that would not have been possible without first making smaller payments, which led to significantly greater financial loss for the lender. As the risk of synthetic fraud grows, financial institutions should remain wary of the increased risk of bust out behavior that can originate from synthetic identities. 6 Tax Fraud Recent ID Analytics research with a state tax agency showed that, over the span of three years, roughly 1.4% of the tax return population appeared to be synthetic. These synthetic identities resulted in a total tax refund amount of $20 million. The SSNs asserted by these identities had never been seen in combination with the asserted name and date of birth, leading ID Analytics to believe these identities are synthetic. 3 Name has been anonymized to protect identity s privacy 4 Name has been anonymized to protect identity s privacy 5 Chris Jay Hoofnagle, Identity Theft: Making the Known Unknowns Known (Harvard Journal of Law and Technology, 2007) 6 U.S. Attorney s Office, Four Plead Guilty in $200 Million International Credit Card Fraud Conspiracy (FBI, 2013) 7 U.S. Attorney s Office, Eighteen People Charged in International $200 Million Credit Card Fraud Scam (FBI, 2013)
7 Synthetic Fraud and Criminal Activities 7 Perhaps equally troubling is the potential of other crimes committed under fabricated identities. As ID Analytics original research uncovered, synthetic identities are used for criminal activity in both the wireless and financial industries. Because these synthetic identities are not used for financial gain, they are much more difficult to discover since there is no report of a fraud or credit loss. There have been recent, high-profile cases of terrorist organizations exploiting the use of synthetic identities to serve their ideological purposes. Synthetic identities provide an avenue for terrorists to not only distribute funding, but to also obtain valuable resources, such as cell phones and airplane tickets for individuals intent on more than just financial harm. For example, in May of 2014, Canadian officials discovered that terrorists on do not fly lists were using synthetic identities to purchase airline tickets between New York, Toronto and Pakistan. 8 The scheme included the use of fake names to obtain passports for an infamous murder suspect and major drug trafficking groups. 9 Financial institutions should be especially concerned about synthetic frauds due to Know Your Customer (KYC) compliance policies. The USA PATRIOT Act of 2001 requires all financial service providers to establish anti-money laundering programs. Because most synthetic fraudsters appear as new-to-credit or thin file, lenders are not able to verify the asserted identity as well as they would a thick file applicant (e.g., someone with multiple trade lines). The fraudster is allowed to complete the application process because the synthetic identity meets the adjudication criteria for a thin-file / no-hit prospect. As long as synthetic fraudsters with criminal intent continue to keep their account(s) in good standing, criminals can engage in money laundering or terrorist funding. Synthetic Identity: Algorithm for Discovery Original research of historic data made available in ID Analytics proprietary ID Network (R) has produced an algorithm that identifies synthetic identities by determining whether or not the particular combination of PII has ever been seen before. The algorithm relies on comparing the asserted PII to that which is stored in the ID Network and looking for mismatches between SSN, name and date-of-birth (DOB) combinations. In order to confidently identify a synthetic identity, the core combination of identity elements cannot have been seen before and the SSN has historically been used in combination with different PII than the asserted identity elements. If these conditions are met, the identity is not just an applicant without credit history; the identity is likely fake. Case Study #1: Synthetic Identity (Confidently Synthetic) Charles Smith 10 applied for a credit card for the first time in Before this application, Charles Smith was never seen before. Charles Smith used a valid SSN to apply for a credit line; however, in 2003, that same SSN was used to apply for two retail cards for a completely different identity: Jon Trufante 11. Jon Trufante and Charles Smith have different names, dates of birth, addresses, and phone numbers. In fact, the addresses they used to apply for credit are nearly 100 miles apart. 8 Rick MacInnes-Rae and Mark Gollom, Suspected terrorist links to synthetic ID fraud are being ignored (CBCNews, 2014) 9 Dave Seglins and John Nicol, RCMP bust passport fraud scheme tied to Canada s most vanted (CBCNews, 2014) 10 Name has been anonymized to protect the identity s privacy. 11 Name has been anonymized to protect the identity s privacy.
8 Charles Smith fulfills the algorithm for identifying a synthetic identity. He has never been seen before this application and the SSN he is asserting appears to belong to a completely different person. As further evidence of fraud, Jon Trufante again applied for credit from another credit card company three months after Charles Smith appeared. This strongly suggests that Charles Smith used Jon Trufante s SSN to open a new account with a major lender, but because the new account uses fabricated, unshared, credentials, it is synthetic fraud, not identity theft. 8 Emerging Market, Immigrant or Possible Synthetic Identity Emerging Market, Immigrant or Possible Synthetic SSN never seen before Name and DOB combination never seen before The algorithm ID Analytics uses to identify synthetic identities is purposefully created to minimize false positives. Synthetic identities have the potential to hide in the thin file category due to the lack of credit history surrounding the SSN, name, and date of birth. This population has no previous credit history and has never applied for a phone in the U.S., but they can be completely valid applications. These identities can be emerging market (e.g., youths ), immigrant, or possible synthetic. Without any historical data to verify the identity elements used in conjunction with the SSN, it is extremely difficult to identify which identities are simply new and which are fabricated. This population of possible synthetic identities is expected to grow in the future due to SSN randomization. 12 Prior to 2011, asserted SSNs from the range of numbers that the Social Security Administration (SSA) never legitimately issued were treated with special scrutiny. After 2011, SSNs that once fell in the SSA s unissued range are now legitimately being issued to newborns and immigrants. These applications, while most likely benign, should be scrutinized more closely in order to mitigate the possibility of a synthetic identity making it through the application process. Case Study #2: Emerging Market or Possible Synthetic Identity Sarah McMaster 13 applied for a phone at a major wireless carrier in At the time of the application, Sarah McMaster was under 20 years old. This phone application is likely the first thing Sarah McMaster applied for that required a credit check due to her age. Since 2010, Sarah has continued to apply for multiple credit lines, including a retail card and a major credit card. She has used the same core PII, with some variations in address and phone number. This identity can likely be categorized as emerging market. The individual is young and had no credit history before applying for her first phone. She also continued to apply for credit using the same SSN, name and DOB combination after the initial phone application. Sarah is most likely a legitimate youth applying for her first phone; however, Sarah may still be a synthetic fraudster due to her lack of credit history. Without historical credit information, it is difficult to conclude for certain that Sarah is a legitimate identity. Until Sarah perpetrates a loss to the wireless carrier, it will remain unclear as to whether she represents a credit risk (credit loss as a legitimate identity) or a fraud risk (potential synthetic identity). 12 ID Analytics, Exploring the Impact of SSN Randomization (ID Analytics, 2014) 13 Name has been anonymized to protect the identity s privacy.
9 Magnitude of Volume and Risk 9 ID Analytics performed multiple studies with respect to data in the ID Network using the above definitions and algorithm to answer two questions: how large is the population of synthetic identities and how risky is this population? Data from both a credit card issuer and a wireless carrier were studied. Studies performed on new account applications from these two different enterprises indicate that roughly 2% of the consumers from both industries are identified as a synthetic identity, and these consumers are roughly four times more likely to be reported as fraud in both industries. Financial Institutions 3.0% Percent of Synthetic Identities Financial Institution 2.5% % of Population 2.0% 1.5% 1.0% 0.5% 0.0% 2010_Q1 2010_Q2 2010_Q3 2010_Q4 2011_Q1 2011_Q2 2011_Q3 2011_Q4 2012_Q1 2012_Q2 2012_Q3 2012_Q4 2013_Q1 2013_Q2 2013_Q3 2013_Q4 Quarter The chart above shows the percent of synthetic identities over three years at a credit card issuer. The blue bars represent the percent of total applications identified by ID Analytics as synthetic. The dotted dark gray line approximates the date of SSN randomization, July Using ID Analytics proprietary methodology for categorizing synthetic fraudsters, it is observed that for a credit card issuer, roughly 2% of the total application volume over three years is made up of synthetic identities. The data suggests that over time, the percent of synthetic fraudsters in the total population has decreased slightly. The confounding factor is that there is an increase in the number of SSNs from the previously unissued range due to SSN randomization that may or may not be from synthetic identities ID Analytics, Exploring the Impact of SSN Randomization (ID Analytics, 2014)
10 Synthetic Fraud Rate Compared to Overall Fraud Rate Financial Institution 10 18% 16% 14% % of Total Population 12% 10% 8% 6% 4% 2% 0% 2010_Q1 2010_Q2 2010_Q3 2010_Q4 2011_Q1 2011_Q2 2011_Q3 2011_Q4 2012_Q1 2012_Q2 2012_Q3 2012_Q4 2013_Q1 2013_Q2 2013_Q3 2013_Q4 Quarter Synthetic Fraud Rate Overall Fraud Rate The blue line is the entire set of new-account applications that were discovered to be fraud by lenders (e.g., tagged as fraud ) divided by the entire population of applications. The red line is the set of all tagged frauds for only the subset of applications meeting ID Analytics criteria for a synthetic identity divided by that entire subset of applications, including those that were not tagged as fraud by the lender. The chart above shows two fraud rates for two different populations: the synthetic identity population (in red), a subset of the overall population, and the overall population (in blue). The graphic illustrates how much riskier synthetic frauds are than the overall fraud rate (which includes third-party, first-party and synthetic frauds). While the overall population has a fraud rate of roughly 2%, the synthetic identities have an overall fraud rate of about 9%, or over four times riskier. Furthermore, despite a slight decrease in the number of synthetic identities, the syntheticidentity-fraud rate shows signs of increasing over time. This trend coincides with timing of SSN randomization, supporting the supposition that this event increased the risk of synthetic fraud.
11 Wireless Carriers 2.5% Percent of Synthetic Identities Wireless Carrier % % of Population 1.5% 1.0% 0.5% 0.0% 2010_Q1 2010_Q2 2010_Q3 2010_Q4 2011_Q1 2011_Q2 2011_Q3 2011_Q4 2012_Q1 2012_Q2 2012_Q3 2012_Q4 2013_Q1 2013_Q2 2013_Q3 2013_Q4 Quarter The chart above shows the percent of synthetic identities in the total population of a wireless carrier. The data suggests that synthetic identities consist of roughly % of the total population. Similar to the credit card issuer, the percent of synthetic identities appears to be decreasing over time.
12 Synthetic Fraud Rate Compared to Overall Fraud Rate Wireless Carrier % 3.0% % of Total Population 2.5% 2.0% 1.5% 1.0% 0.5% 0.0% 2010_Q1 2010_Q2 2010_Q3 2010_Q4 2011_Q1 2011_Q2 2011_Q3 2011_Q4 2012_Q1 2012_Q2 2012_Q3 2012_Q4 2013_Q1 2013_Q2 2013_Q3 2013_Q4 Quarter Synthetic Fraud Rate Overall Fraud Rate The chart above shows a comparison between the overall fraud rate and the synthetic identity population s fraud rate. Although the wireless carrier s synthetic identity fraud rate has some variability, the rate is consistently above the fraud rate for the total population. The wireless carrier s overall fraud rate is roughly 0.5%, whereas the synthetic identity fraud rate is roughly 2%, about four times riskier than the overall population. Although the trend is not as clear as in the financial institution example, the wireless trend supports the noticeable corresponding rise in the synthetic identity fraud rate following SSN randomization. It is worth noting that although the synthetic identity population is riskier, there is still a significant portion of the synthetic population that is not flagged as fraud, especially in the wireless carrier s population. This good population appears to have every intention to pay. As noted above, there are several possible explanations for these lower-risk applicants. Some applicants may feel as though they must fake their credentials because they have no alternatives; they may be undocumented workers or people escaping bad credit histories. Some may be account holders who are waiting for an opportunity to bust-out. Others, however, may be using fake identities to maintain accounts that support other illicit activites, but do not necessarily represent a dollar-loss risk to the enterprise. In each case, the synthetic identity appears to be good because the person behind the identity makes timely payments on their balances.
13 Can Synthetics be Recognized? 13 Synthetic identities can be identified with a high degree of confidence using sufficient historical data and the algorithms that ID Analytics has constructed. Historical application data, especially data on the asserted SSN, is the key to determining if an identity is artificial. The ability to examine all previous name and date of birth combinations associated with an asserted SSN enables identification of synthetic credentials. With a large enough data source like ID Analytics ID Network, it is possible to confidently determine whether an identity is synthetic or not. Finally, ID Analytics methodology can categorize identities as likely synthetic identities, possible synthetic identities for further consideration and normal identities. Conclusion: How Can ID Analytics Help? With advanced knowledge of the growing threat of synthetic fraud, ID Analytics created the ID Network a consortium of consumer behavioral data built through the contributions of more than 200 enterprise clients. With more than a trillion data elements from multiple business sectors and information on over three million client-reported attempts at identity fraud, ID Analytics is well situated to identify synthetic fraud. ID Analytics fraud protection products use historical data to assess the risk of each individual identity element. This is an especially predictive method of flagging synthetic fraud. ID Analytics has historical insight into the vast majority of SSNs and can confidently flag identities that appear to be synthetic. ID Analytics can assess the SSN, name and date of birth combinations asserted in the applications and confirm that the same combinations have been used in the past. Using products such as ID Score (R) 9.0 and ID Network Attributes, ID Analytics is well positioned to help solve the synthetic fraud problem. About ID Analytics, Inc. ID Analytics is a leader in consumer risk management with patented analytics, proven expertise and real-time insight into consumer behavior. By combining proprietary data from the ID Network one of the nation s largest networks of cross-industry consumer behavioral data with advanced science, ID Analytics provides in-depth visibility into identity risk and creditworthiness. Every day, many of the largest U.S. companies and critical government agencies rely on ID Analytics to make risk-based decisions that enhance revenue, reduce fraud, drive cost savings and protect consumers. ID Analytics is a wholly-owned subsidiary of LifeLock, Inc. Please visit us at ID Analytics is a registered trademark of ID Analytics, Inc. All other trademarks and registered trademarks are the property of their respective holders.
14 2014 ID Analytics. All rights reserved.
The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age
How to Battle the Leading Identity Fraud Tactic in The Digital Age In the 15 years since synthetic identity fraud emerged as a significant threat, it has become the predominant tactic for fraudsters. The
I See Fraud Rings. by Dr. Stephen Coggeshall Chief Analytics and Science Officer. November 2012 WHITEPAPER
WHITEPAPER I See Fraud Rings by Dr. Stephen Coggeshall Chief Analytics and Science Officer November 2012 2 Table of Contents Introduction 3 What is Identity Fraud? 4 Types of Identity Fraud 4 What is an
WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules
WHITEPAPER Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules May 2008 2 Table of Contents Introduction 3 ID Analytics for Compliance and the Red Flag Rules 4 Comparison with Alternative
A Unique Perspective into the World of Identity Fraud
White Paper A Unique Perspective into the World of Identity Fraud Explore the value of LexisNexis FraudPoint solutions in fraud detection. Risk Solutions Identity Management Executive Summary There are
Synthetic ID Fraud. Pervasive, Misunderstood, and Unknown. Monday, April 20th 10:15-11:15 AM
Synthetic ID Fraud Pervasive, Misunderstood, and Unknown Monday, April 20th 10:15-11:15 AM Bob Cofod Director SightSpan Barbara Simcox Director of Investigations and Training Turnkey Risk Solutions Steven
Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions
Leveraging Risk & Compliance for Strategic Advantage IBM Information Management software Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions XXX Astute financial services
Best Practices in Account Takeover
WHITEPAPER Best Practices in Account Takeover July 2013 2 Table of Contents Introduction 3 Account Takeover is Painful 4 Differences between Account Takeover and Account Compromise 4 Why Account Compromise
Bust-out fraud. Knowing what to look for can safeguard the bottom line. An Experian white paper
Knowing what to look for can safeguard the bottom line An Experian white paper Executive summary Bust-out is a growing area of fraud for the financial services industry. For organizations across the globe,
The Facets of Fraud. A layered approach to fraud prevention
The Facets of Fraud A layered approach to fraud prevention Recognizing Fraud The various guises of fraud lead many organizations to believe they are not victims of deception or to vastly underestimate
White Paper. Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper
White Paper Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper Dave Whitin, Consultant Michiko Wolcott, Statistician September 2006 Table of contents Executive summary...................................
Synthetic identity fraud: Can I borrow your SSN?
IBM Analytics IBM Red Cell and Turnkey Risk Solutions Synthetic identity fraud: Can I borrow your SSN? Who else might be using your Social Security number and why? 2 Synthetic identity fraud: Can I borrow
Identity Theft and Tax Administration
PREPARED STATEMENT OF BETH TUCKER IRS DEPUTY COMMISSIONER FOR OPERATIONS SUPPORT BEFORE SUBCOMMITTEE ON FISCAL RESPONSIBILITY AND ECONOMIC GROWTH SENATE FINANCE COMMITTEE ON IDENTITY THEFT MAY 25, 2011
Now is the time for a fresh approach to detecting fraud
Now is the time for a fresh approach to detecting fraud Learn where today s fraud detection falls short and what you can do about it. Read on. Table of Contents Now is the time for a fresh approach to
Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy
CONSUMER INFORMATION SOLUTIONS Automotive Services Tools for dealers, lenders and industry service providers that drive profitable results in today s economy Reach the right prospects Automotive solutions
Fraud detection in newly opened accounts. Connecting data helps predict identity theft
Fraud detection in newly opened accounts Connecting data helps predict identity theft Executive summary Fraud continues to be a genuine threat and challenge. After a sharp and unexplained drop in identity
The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology
The State of Insurance Fraud Technology A study of insurer use, strategies and plans for anti-fraud technology September 2014 The State of Insurance Fraud Technology A study of insurer use, strategies
White Paper. Account Opening: The Front Door of Fraud. Effective Enterprise-wide Fraud Mitigation Solutions to Combat New-Account Fraud
White Paper Account Opening: The Front Door of Fraud Effective Enterprise-wide Fraud Mitigation Solutions to Combat New-Account Fraud August 2010 Table of Contents Introduction..........................................1
Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper
Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the
INTRODUCTION. Identity Theft Crime Victim Assistance Kit
Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change
Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution
Product Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Losses from account fraud and debit risk are growing, so you ve got to move quickly and decisively
Protect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity
Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target.
White Paper Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target. Research provided by Javelin Strategy & Research February 2010 Risk Solutions Financial
on behalf of the National Retail Federation before the
Testimony of Amy Hanson President FACS Group, Inc. Financial, Administrative Credit Services (A Subsidiary of Federated Department Stores, Inc.) Mason, Ohio on behalf of the National Retail Federation
Protect your credit. Guard your identity. BENEFITS GUIDE
Protect your credit. Guard your identity. BENEFITS GUIDE Welcome to the Identity Watch Program Congratulations! You have taken an important step in safeguarding your identity from the impact of theft.
Protect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY
Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009
Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program
An effective approach to preventing application fraud. Experian Fraud Analytics
An effective approach to preventing application fraud Experian Fraud Analytics The growing threat of application fraud Fraud attacks are increasing across the world Application fraud is a rapidly growing
Stopping the Flow of Health Care Fraud with Technology, Data and Analytics
White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,
Reduce Fraud: Stop Fraudsters Before They Strike
Reduce Fraud: Stop Fraudsters Before They Strike The ability for a company to protect itself from ill intentioned web users is vital to their ability to succeed online. Billions of dollars are lost every
one admin. one tool. Providing instant access to hundreds of industry leading verification tools.
2 7 12 14 11 15 8 16 10 41 40 42 19 49 45 44 50 48 47 51 46 52 53 55 54 56 57 67 68 1 5 39 43 58 71 81 82 69 70 88 25 29 23 26 22 3 21 28 4 6 32 30 38 33 31 37 34 35 36 63 59 64 60 62 61 65 72 73 66 74
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if
White Paper: Are there Payment Threats Lurking in Your Hospital?
White Paper: Are there Payment Threats Lurking in Your Hospital? With all the recent high profile stories about data breaches, payment security is a hot topic in healthcare today. There s been a steep
FACTA Identity Theft Red Flags Program. www.chs.acfei.com
1 FACTA Identity Theft Red Flags Program Module 1 Fair and Accurate Credit Transactions Act Overview Identity thieves use individual s personal identifiable information to open new accounts and misuse
Ouachita Baptist University. Identity Theft Policy and Program
Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program
AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA
Australian Payments Clearing Association AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA 214 Australian Payments Clearing Association Limited ABN 12 55 136 519 CONTENTS OVERVIEW 1 SECTION 1 Fraud rates 4 SECTION
POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY
POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY I. POLICY SUMMARY It shall be the policy of Polk County Rural Public Power District (PCRPPD) to take all reasonable steps to identify, detect, and prevent
CREDIT CARD FRAUD PREVENTION IN NONPROFITS
CREDIT CARD FRAUD PREVENTION IN NONPROFITS TABLE OF CONTENTS 01 01 01 02 02 03 03 04 05 05 FRAUDULENT CREDIT CARD TRANSACTIONS AND IN WHAT WAYS CHARITIES ARE AT RISK CARD TUMBLING ONLINE AUCTION FRAUD
FINAL // FOR OFFICIAL USE ONLY. William Noonan
FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with
IRS Criminal Investigation. Detroit Field Office
IRS Criminal Investigation Detroit Field Office Identity Theft The FTC estimates that as many as 9 million Americans have their identities stolen each year. How Do They Get Your Information? Theft of valuables
Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment
Using Voice Biometrics in the Call Center Best Practices for Authentication and Anti-Fraud Technology Deployment This whitepaper is designed for executives and managers considering voice biometrics to
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 Current Laws: A person commits the crime of identity theft if the
Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection
Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: September 2001 LETTER NO.: 01-CU-09 TO: SUBJ: Federally Insured Credit Unions Identity Theft and
RC284. Protect Yourself Against Identity Theft
RC284 Protect Yourself Against Identity Theft Identity theft the unauthorized use of your information by third parties involves the collection and use of personal information such as your name, date of
AML & Mortgage Fraud Compliance Program v. 08.2013 ANTI-MONEY LAUNDERING & MORTGAGE FRAUD COMPLIANCE PROGRAM
ANTI-MONEY LAUNDERING & MORTGAGE FRAUD COMPLIANCE PROGRAM Version: 2.0 dated 08.2013 TABLE OF CONTENTS AML & Mortgage Fraud Compliance Program 1.0 PURPOSE AND SCOPE... 3 2.0 APPLICABLE REGULATIONS AND
Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012
Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers Privacy, Governmental Liaison and Disclosure May 9, 2012 Today s presentation How identity theft is a threat to the taxpayer What IRS is
Advantages & Disadvantages of Getting a New Social Security Number
Advantages & Disadvantages of Getting a New Social Security Number In This Article You must prove that your current SSN is a disadvantage for you Creditors are wary of an SSN with no credit history The
White paper. Biometrics and the mitigation of card-related fraud
White paper Biometrics and the mitigation of card-related fraud The Aadhaar scheme, primarily envisaged to provide every resident proof of identity, holds a great deal of promise for other applications
Patriot Act compliance for Finance and Commercial Loan Organizations
Patriot Act compliance for Finance and Commercial Loan Organizations Patriot Act Compliance Charles Klingman,, US Treasury Dept. Present proposed regulations for Finance and Commercial Loan Companies Debra
LexisNexis InstantID. Technical White Paper. Analyzing Results. For the following: LexisNexis Bridger Insight XG. Contact LexisNexis Sales:
Technical White Paper LexisNexis InstantID Analyzing Results For the following: LexisNexis Bridger Insight XG Contact LexisNexis Sales: 877-922-5757 C ONTENTS Executive Summary..................................................
Identity Theft Packet
BOULDER POLICE DEPARTMENT 1805 33 rd Street Boulder, CO 80301 Identity Theft Packet ** Use this packet when the crime involves the stealing of someone's identity, such as when a victim finds out that someone
Child Identity Theft Education Kit
Child Identity Theft Education Kit Who s at Risk? Consider a teenager who is about to start college. She has deposited money into a savings account and is ready to move it into a checking account. Much
IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT
CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but
I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly
How child identity theft happens.
How child identity theft happens. Facts you should know about identity theft. What is identity theft? Identity theft is the act of using someone s personal information such as an account number, driver
Designing an Identity Theft Prevention Program
The Federal Trade Commission has indicated that mortgage brokers are covered by the Red Flags Rule and must design identity theft prevention programs to comply with the law. The FTC has published a How-To
716 West Ave Austin, TX 78701-2727 USA
How to Detect and Prevent Financial Statement Fraud GLOBAL HEADQUARTERS the gregor building 716 West Ave Austin, TX 78701-2727 USA VI. GENERAL TECHNIQUES FOR FINANCIAL STATEMENT ANALYSIS Financial Statement
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved
A strategic approach to fraud
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
CATCH ME IF YOU CAN: THE IRS IMPERSONATION SCAM AND WHAT IS BEING DONE ABOUT IT
STATEMENT OF ALYSA D. ERICHS SPECIAL AGENT IN CHARGE HOMELAND SECURITY INVESTIGATIONS MIAMI U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT REGARDING A HEARING ON CATCH ME IF YOU CAN: THE IRS IMPERSONATION SCAM
