A Unique Perspective into the World of Identity Fraud



Similar documents
Child Identity Fraud - Current Trends and Advantages

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules

LexisNexis InstantID. Technical White Paper. Analyzing Results. For the following: LexisNexis Bridger Insight XG. Contact LexisNexis Sales:

Identity fraud demands constantly evolving prevention strategies to thwart ever-shifting criminals.

Key Factors for Payers in Fraud and Abuse Prevention. Protect against fraud and abuse with a multi-layered approach to claims management.

The Value of Advanced Data Integration in a Big Data Services Company. Presenter: Flavio Villanustre, VP Technology September 2014

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics

I See Fraud Rings. by Dr. Stephen Coggeshall Chief Analytics and Science Officer. November 2012 WHITEPAPER

The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age

White Paper. Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper

Sample Report: LexisNexis RiskView Report

Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target.

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

How to Detect and Prevent Identity Based Fraud in Government.

Alternative Data and Fair Lending

Customer Education. LexisNexis Accurint Getting Started & Best Practices Guide. LexisNexis Risk Solutions

YOUR GOOD CREDIT The Importance of Your Credit Report and Your Credit Score Maintain Good Credit Combat Identity Theft FACT Act Rights

A Proposal of Employee Benefits. Innovations in IDENTITY THEFT

Citi Identity Theft Solutions

Identity Theft Plan. Guidebook. Copyright 2013 Prepaid Plans All Rights Reserved

IDENTITY THEFT PREVENTION PROGRAM

Fraud detection in newly opened accounts. Connecting data helps predict identity theft

WHITEPAPER. Best Practices in Registration Data Management. Government agencies can reduce fraud and turn registrant data into a powerful asset

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Family Protection Plan

Identity Theft and Tax Administration

IDENTITY THEFT RESOURCE KIT

Credit Scores. Copyright 2009 How to Gain Wealth. All rights reserved.

Federal Trade Commission Identity Theft Survey Report

All About Credit Reports from A to Z

SEVEN EASY STEPS TO CREATING AN IDENTITY THEFT RED FLAG PROGRAM

INFORMATION FOR VICTIMS OF FRAUD CRIMES SCHERTZ POLICE DEPARTMENT

Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution

SOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

Integrity We are above reproach in everything we do.

Reclaiming your identity

POLICY: Identity Theft Red Flag Prevention

A BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper

IDENTITY THEFT PREVENTION PROGRAM OVERVIEW

MOTLOW STATE COMMUNITY COLLEGE

What every infosec professional should know about identity theft. Branko S. Bokan, CISSP Infosec4all.com

Internet Insurance Fraud Rings

Find the digital fingerprints of fraud in the financial services industry

DMACC IDENTITY THEFT- RED FLAGS PROCEDURES

UNC Asheville. Red Flag Rule and NC Identity Protection Act Information

Medicaid Fraud Prevention & Detection

An effective approach to preventing application fraud. Experian Fraud Analytics

White Paper. Account Opening: The Front Door of Fraud. Effective Enterprise-wide Fraud Mitigation Solutions to Combat New-Account Fraud

University Policy: Identity Theft Prevention Policy

clear.thomsonreuters.com DON T JUST FIND PEOPLE. FIND ANSWERS. CLEAR

ID Theft P E R S O N A L A N D O R G A N I Z AT I O N A L P R E V E N T I O N A N D D E T E C T I O N

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012

Be the carrier of choice.

COUNCIL POLICY STATEMENT

Strategies for businesses to stop fraud without slowing commerce

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model

From Chase to Prevention. Stopping Healthcare Fraud Before it Happens

The Use of Credit Reports in Employment Background Screening

Dear Concerned Consumer,

RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft

Click to edit Master title style Fighting Back Against. Identity Theft and Online Fraud. Click to edit Master text styles Second level Third level

WASHINGTON ASSOCIATION OF SHERIFFS AND POLICE CHIEFS Model Policy on Identity Theft Policy, Procedures, and Victim Referral Information

Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

Identity Theft Repair Kit

Red Flag Rules and Aging Services: What You Need to Know

EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);

FY13 Core Training. Click next to continue

Red Flag Policy and Procedures for Alexander Orthopaedic Associates

LexisNexis Screening Solutions. Fast. Accurate. Secure.

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, Effective Date: Last Revised Date: Responsible Office:

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009

Central Oregon Community College. Identity Theft Prevention Program

ELKHORN RURAL PUBLIC POWER DISTRICT POLICY #1230. Identity Theft Prevention Policy

The Long Con: An Analysis of Synthetic Identities

Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0

Benefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS

Facts On Credit Bureaus

Data makes all the difference.

Identity Theft Assistance: Information for Recovering Your Good Name

These rules became effective August 1, 2009, and require certain agencies to implement an identity theft program and policy.

Federal and State Government Identity Theft and Protection Initiatives

Northeast Technology Center Board Policy 2110 Page 1 IDENTITY THEFT PREVENTION (MANY COVERED ACCOUNTS)

31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY. WHEREAS, The Fair and Accurate Credit Transactions Act of 2003,

Identity Theft Protection as an Employee Benefit

Church Mutual Recommends First Advantage

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Don t be the last to know.

Facts and Statistics

Questions and Answers About the Identity Theft Red Flag Requirements

The Rise in State Income Tax Refund Identity Fraud:

The Facets of Fraud. A layered approach to fraud prevention

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements

What is identity theft?

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT

SCAM JAM ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection

CHAPTER 99: IDENTITY THEFT PREVENTION PROGRAM

Designing an Identity Theft Prevention Program

Transcription:

White Paper A Unique Perspective into the World of Identity Fraud Explore the value of LexisNexis FraudPoint solutions in fraud detection. Risk Solutions Identity Management

Executive Summary There are many challenges in detecting identity fraud. These challenges are magnified by the lack of an industry-wide repository of identity information. While credit risk information is traceable to a single consumer, identity fraud is often untraceable to the fraud perpetrator, who can simultaneously affect multiple consumers and accounts. In addition, while a great deal of identity fraud is the result of a stolen identity, there are growing trends in many fraud schemes such as synthetic identities, manipulated identities and friendly fraud. An identity repository to trace and monitor how identities are created and modified over time would enable better fraud mitigation strategies. Boasting over 35 years of experience as the largest compiler of consumer identity information, LexisNexis has built one of the largest and most comprehensive commercial identity fraud prevention repositories in the nation. This identity repository has proven to be highly effective in combating identity fraud. Identity fraud remains an ongoing problem Fraudulent credit behavior is a significant problem for the financial services industry. According to the Federal Trade Commission (FTC), 19% of complaints to its Consumer Sentinel Network in 2010 were related to identity theft. In total, the number of identity theft complaints has tripled between 2001 and 2010. Importantly, these statistics are based on victim reported frauds to the FTC, and are likely an underestimate of actual identity theft rates and losses. In February 2012, Javelin Strategy released its annual Identity Fraud Report often used as a benchmark for identity fraud trends and reported fraudulently opened new accounts drove losses of $5 billion across 1.95 million victims in the United States in 2011. Furthermore, consumers reported that they are increasingly spending more of their money and time to remediate the effects of application stage identity fraud, with average consumer out of pocket costs of $1,205 per event, the highest reported over the past 6 years. Among the challenges in detecting identity fraud is the way identity information is organized for fraud detection. While credit risk is traceable to a single consumer with a single payment history across all accounts; fraudulent identity manipulation is often untraceable to the fraud perpetrator, who can simultaneously affect multiple consumers and accounts and adapt to defeat preventive measures. Additionally, the definitions of credit risk and fraud vary by institution, resulting in inconsistent labeling of fraud across lenders. An authoritative identity repository would resolve this challenge, resulting in more effective detection within the vastly larger universe of normal identity variation. 3x The rate at which identity theft complaints have risen between 2001 and 2010. Identity fraud has traditionally been defined as the unauthorized use of another s personally identifiable information to achieve financial gain. While a great deal of credit fraud is the result of stolen identity, there has been a rise in the manufacture of synthetic identities or the creation of alternative versions of existing identities that are close enough to pass casual scrutiny. In order to capture these growing trends of falsifying identities, LexisNexis has broadened the definition of identity fraud to include any material misrepresentation of an identity fact in the course of opening or gaining access to a financial account. This definition includes stealing the identity of an unsuspecting victim, inventing a synthetic identity, or managing an altered version of an existing identity. A Unique Perspective into the World of Identity Fraud 2

LexisNexis compiles identity facts LexisNexis Risk Solutions has a unique vantage point to observe the identity activity of U.S. consumers. Boasting over 35 years of experience as the largest compiler of court documents, public record filings, state licenses and registrations, property deeds, phone and address change information, bankruptcy proceedings and other proprietary and licensed data sources, LexisNexis has built the largest and most comprehensive identity fraud prevention database in the nation. Comprised of more than 34 billion records from more than 10,000 sources and growing daily by millions of records - the identity repository enables all of the LexisNexis identity solutions used by thousands of financial institutions. In total, the LexisNexis identity repository had 290 million active identities on file on January 1, 2012, of which just over 7 million identities were newly reported in 2011. This identity repository is the core of LexisNexis FraudPoint Score and LexisNexis FraudPoint Attributes, a new patentpending identity fraud solution that is unique in its use of a multi-dimensional identity bureau to detect suspicious or fraudulent events. By monitoring identity information from multiple data sources, the FraudPoint Solution achieves a robust view of identities by examining four categories of identity information: Category #1: Tri-Credit Bureau Identity Activity Identity information from three national credit bureaus is monitored for all the identity events that financial institutions report during their normal updates to the credit reporting agency. FraudPoint can see every identity reported to the credit bureaus, including the full name, Social Security Number (SSN), and current address. Tracking credit header identity information captures both new identities and changes to existing identities such as the reporting of a new address or the discontinuation of reporting. Identities on file at credit bureaus are necessary but not sufficient because fraudster invented identities are reported alongside identities of legitimate credit users. Category #2: LexisNexis Customer Network FraudPoint has visibility to millions of inquiries from financial institutions confirming identities of consumers attempting to open new financial accounts. These records give FraudPoint insight into the recency and velocity of identity usage, and the frequency of identity misuse. Not all of the identities seen in our identity verification inquiries represent real people, and insight into identity misuse (e.g. multiple recent queries about unknown individuals, all using the same home address and phone number) can be very useful in detecting fraud ring activity. Category #3: Online, Utility, Phone and Other Identity Activity FraudPoint monitors identity activity reported by landline phone carriers, utility reporting services, and mobile phone directories to track confirmed address changes in near real-time. This dimension provides a very timely source of address changes and current residential status; as well as providing identity coverage on millions of U.S. consumers who are unknown at the credit bureaus. Category #4: Local, State and Federal Government Records FraudPoint reviews government reported public record data sourced from county courthouses and all fifty state governments such as real estate property deed transfers, county property tax records, court judgments, felony and criminal convictions, tax liens, evictions, occupational licenses, drivers licenses, vehicle and watercraft registrations, voter registrations, bankruptcy filings and related records. Tens of millions of identities that have no credit bureau presence or utility records are found in these government and court sources. These sources are difficult to manipulate or falsify. FraudPoint also searches student directory sources compiled from college and university sources to more accurately check identities of young adults, many of whom have little or no presence in other data sources. A Unique Perspective into the World of Identity Fraud 3

# of Suspicious Identities Recently Reported at Address # of Searches with Input Address & a Suspicious Identity Fraud Rate 30% 25% 20% 15% 10% 5% 0% 1.1% 2.0% 4.1% 7.9% 11.6% 0 1 2 3 4 5+ FraudPoint takes the information from all these categories and examines the full identity footprint across all sources, looking for points of consistency and/or anomaly that indicate likely fraud. FraudPoint considers: the identity s originating source (such as driver s license, voter registration, credit bureau header update, etc.), its time in the identity repository, the number of sources confirming the identity, the variation in identity elements across sources, the frequency with which the identity was used for applications, the number of associated identities (especially suspicious ones), etc. By comparing millions of normal identities with rarer suspicious identities, FraudPoint is able to profile applications with high risk identities into their likely fraud type. Joe Smith 26.9% Fraud Rate 30% 25% 20% 15% 10% 5% 0% FraudPoint considers: The identity s originating source (such as driver s license, voter registration, credit bureau header 0 1 2 3 update, 4 etc.) 5+ Its time in the identity repository The number of sources confirming the identity The variation in identity elements across sources The frequency with which the identity was used for applications The number of associated identities (especially suspicious ones), etc. And more For example, an identity that is seen only in credit bureau header data, but not on any other data source, is at higher risk of 555 Crabapple Ln. being a synthetic identity, especially if the address has a high velocity of credit seeking, and multiple suspicious identities are using the same SSN. FraudPoint Anywhere, differentiates US 55555 six types of risky identities: Stolen, Synthetic, Manipulated, Vulnerable Victim, Friendly Fraud, and Suspicious Activity. FraudPoint 702 FraudPoint Differentiates Six Types of Risky Identities Stolen Identity Manipulated Identity Friendly Fraud Synthetic Identity Vulnerable Victim Suspicious Activity FraudPoint Score: Six Powerful Risk Indices A Unique Perspective into the World of Identity Fraud 4

Breadth of the problem LexisNexis has recently conducted an investigation into the magnitude of suspicious identity behavior and subsequent fraud rates. In examining the behavior of different samples, key fraudulent claims come to light. From this investigation, LexisNexis was able to identify specific fraud trends and other identity anomalies. Method The LexisNexis research team examined the identity repository information from two different perspectives to better understand fraud trends. First, we studied the identities used to apply for new financial accounts in December, 2011 in order to understand the patterns of suspicious identity elements detected by FraudPoint solutions. Second, we studied the identities used to open credit accounts in early 2011 in order to understand subsequent fraud-loss rates. Results Study 1 The majority of new account applications screened against our identity repository have no apparent identity issues. Over ninety percent of applications are fully verified with no evidence of stolen identity, created identity or identity manipulation. Five percent of applications are from new identities that have not previously been seen by a major credit bureau, and most of these appear to be legitimate consumers opening their first account. There are also a significant number of very suspicious applications mixed in with all the normal account opening transactions. More than one percent (1.5%) of applications are from identities associated with five or more different Social Security Numbers (SSN) in the identity repository. Almost one percent (0.9%) of applicants used an SSN that is linked to a different identity at a different address. Some applications looked suspicious in their misuse of SSN or address information other than their own. Fully 3.0% of through-the-door applications showed significant evidence of stolen identity. ### - 24-5555 ### - 23-5555 ### - 23-5545 ### - 23-5546 ### - 99-1234 1.5% of applications we examined are from identities associated with five or more SSNs. The analysis then focused on the number of synthetic or created identities presented at account opening. Of those identities appearing for the first time, more than two percent used an SSN that was reported as deceased or that was issued to someone else before the applicant s claimed date-of-birth. Many of these identities had been used on multiple applications in the recent past, and often shared an address with multiple suspicious identities and applications. About 1% of all applications showed significant evidence of being a synthetic identity. Study 2 With the magnitude of attempted fraud quantified in the 2% to 5% range across multiple financial institutions and account types, we focused on fraud incidence rates in a particularly industry: revolving credit card issuers. Analysis of over 2,500,000 bankcard applications profiled the identity characteristics of known fraud cancels, known fraud losses, and first-pay defaults. First payment defaults were included if they became untraceable after opening an account, using the card, and making no payments. These were included because a review of their characteristics showed that they looked more like fraudulent identities than like normal credit defaults. This combined definition of fraud yielded a 1.3% fraud rate for the entire sample. A Unique Perspective into the World of Identity Fraud 5

Applications where the SSN was reported to belong to someone other than the applicant had a 24% fraud rate. If the SSN was reported deceased or was issued prior to the applicant s date-of-birth, the fraud rate was over 21%. Where there was significant evidence of stolen identity, the fraud loss rate was 43.2% on over 30,000 applications. Where there was significant evidence of synthetic identity, the fraud loss rate was 24.2% on over 12,000 applications. Overall, FraudPoint Score effectively rank ordered fraudulent applications (see the table below). In the lowest tail of FraudPoint Score, corresponding to a 350 cutoff, fraud rates are as high as 58.2% and almost one-third (31.5%) of all fraudulent applications are identified while sacrificing less than one-half of one-percent of non-fraudulent applications (0.3%). Using a more typical cutoff of 550, 71.1% of all fraudulent applications are identified while only forgoing 3.5% of non-fraudulent applications. In short, FraudPoint Score effectively identified future frauds with a very low false-positive rate. 43.2% Where there was significant evidence of stolen identity, the fraud loss rate was 43.2% on over 30,000 applications. Effectiveness of FraudPoint Score in Identifying Future Frauds Fraudpoint score band Corresponding Score Cutoff Fraud Rate per score band cumulative % of Frauds Identified below cutoff Cumulative % of non-frauds identified below cutoff 300-349 350 58.20% 31.50% 0.30% 350-399 400 33.40% 45.20% 0.60% 400-449 450 19.60% 56.70% 1.20% 450-499 500 9.80% 64.80% 2.20% 500-549 550 5.60% 71.10% 3.50% 550-599 600 2.80% 76.60% 6.00% 600-649 650 1.40% 82.30% 11.00% 650-699 700 0.60% 88.60% 23.70% 700-749 750 0.30% 95.70% 56.90% 750-999 999 0.10% 100.00% 100.00% Population Average 1.30% In the lowest tail corresponding to 300-350 scoreband cutoff, fraud rates are as high as 58% and almost one-third of all fraudulent applications are identified while sacrificing less than one-half of one percent on non-fraudulent applications. Using a more typical cutoff of 550, 71% of all fraudulent applications are identified while only forgoing 3.5% of non-fraudulent applications. A Unique Perspective into the World of Identity Fraud 6

Cases of interest In the course of our investigations we found several interesting cases that are worth highlighting to demonstrate how manipulated identities differ from normal identities. One SSN was used by 57 unique names, each living at a different address. One identity was the subject of 33 consumer application attempts in a one month period. All applications used the same SSN and address; but the names and birthdates used corresponded to two different unrelated applicants. A 34 year old identity that declared bankruptcy in 2000 was the subject of 130 attempts to open credit in December 2011. At least 116 different SSNs were submitted across these attempts. A 71 year old identity was the subject of 67 attempts to open credit. The fraudster used 54 different SSNs and 2 different birthdates. A 44 year old identity was the subject of 42 inquiries. The inquiries were associated with a variety of apartment numbers from the same building, in which the identity doesn t appear to have ever lived. In short, by observing the interrelationships between identity elements, LexisNexis is able to flag applications that are at high risk of identity fraud. Indeed, each of the above cases was identified by FraudPoint as an application with high probability of being a case of identity theft. Putting it all together: FraudPoint solutions FraudPoint provides lenders with the intelligence to better predict and prevent identity fraud. With access to the most comprehensive identity fraud prevention repository, FraudPoint solutions deliver a robust foundation for fraud prevention. These predictive tools help lenders quickly detect fraud threats while minimizing false positives. FraudPoint solutions allow lenders to: Identify fraud incidents before the application is booked Reduce fraud losses and/or achieve fraud loss goals Minimizes administrative costs associated with inefficient and unnecessary investigation A Unique Perspective into the World of Identity Fraud 7

Benefits of FraudPoint Solutions Characteristics Validation History Sources Relatives & Associates Correlation Application Identity Velocity Velocity Divergence Characteristics Variance FraudPoint solutions provide visibility into the application profile and the applying identity to detect multiple forms of identity fraud. Detecting the needle in the haystack Unique patent-pending segmentation is the key to successfully detecting rare needle in a haystack outcomes like fraud. Rather than applying a single methodology to all applications, FraudPoint focuses on identity combinations to differentiate between different fraud schemes. Separate scoring systems were created to detect synthetic identities, stolen identities, manipulated identities, friendly fraud, vulnerable victims, and suspicious identities. 60% 50% 40% 30% 20% 10% 0% m. % of Frauds The FraudPoint solutions also help lenders identify and investigate fraud through its four delivered components. First is a three digit FraudPoint Score to provide a high-level probability of an application being fraudulent. Second is a series of Fraud Risk Indices that provide lenders guidance on the type of fraud scheme being perpetrated. Third are Fraud Warning codes to provide specific guidance on identity problems. Fourth are a set of over 200 model-ready, highly-predictive FraudPoint 58.9% Attributes that can be used in custom fraud and identity theft models. The FraudPoint Attributes contain information not found in other identity aggregator solutions. For more information Call 866.858.7246 32.4% or visit lexisnexis.com/risk/financial-services 19.5% About LexisNexis Risk Solutions LexisNexis Risk Solutions (www.lexisnexis.com/risk) is a leader in providing essential information that helps customers across all industries and government predict, assess and manage risk. Combining cutting-edge technology, unique data and advanced scoring analytics, we provide products and services that address evolving client needs in the risk sector while upholding the highest standards of security and privacy. LexisNexis Risk Solutions is part of Reed Elsevier, a leading publisher and information provider that serves customers in more than 100 countries with more than 30,000 employees worldwide. 10.8% 5.6% 2.0% 1.5%.7%.3%.1%.1%.1% FraudPoint Solutions are not provided by a consumer reporting agency as that term is defined in the Fair Credit Reporting Act (15 U.S.C. 1681, et seq.) ( FCRA ) and do not constitute consumer reports as that term is defined in the FCRA. Accordingly, FraudPoint Solutions may not be used in whole or in part as a factor in determining eligibility for credit, insurance, employment or another purpose in connection with which a consumer report may be used under the FCRA. 300-350- 400-450- 500-550- 600-650- 700-750- 800-850- 900-950- Due to the nature of the origin of public record information, the public records and commercially available data sources used in reports may contain errors. NXR01902-1 0313 349 399 449 499 549 599 649 699 749 799 849 899 949 999 33% 46% 57% 65% 72% 77% 83% 88% 95% 100% 100% 100% 100% 100% m % of File 1% 1% 2% 3% 4% 7% 11% 23% 49% 93% 100% 100% 100% 100% A Unique Perspective into the World of Identity Fraud 8