Loading...

Stop Trying to Collect from Synthetic Identities

Published: July 15, 2019 by Guest Contributor

Friend or foe?

Sophisticated criminals put a great deal of effort into creating convincing, verifiable personas (AKA synthetic identities). Once the fictional customer has embedded itself in your business, everything from the acquisition of financial instruments to healthcare benefits, utility services, and tax filings and refunds become vulnerable to synthetic identity fraud.

Information attached to synthetic IDs can run several levels deep and be so complete that it includes public record data, credit information, documentary evidence and social media profiles that may even contain photo sets and historical details intended to deceive—all complicating your efforts to identify these fake customers before you do business with them.

See real-world examples of how synthetic identity fraud is souring various markets – from auto and healthcare to financial services and public sector – in our tip sheet, Four common synthetic scenarios.

Stopping synthetic ID fraud — at the door and thereafter.

There are efforts underway in the market to collectively improve your ability to identify, shut down and prevent synthetic identities from entering your portfolio. This overall trend is great news for the future, but there are also near-term solutions you can apply to protect your business starting now. While it’s important to identify synthetic identities when they knock on your door, it’s just as important to conduct regular portfolio checkups to prevent negative impacts to your collections efforts. Every circumstance has its own unique parameters, but the overarching steps necessary to mitigate fraud from synthetic IDs remain the same:

  1. Identify current and near-term exposure using targeted segmentation analysis.
  2. Apply technology that alerts you when identity data doesn’t add up.
  3. Differentiate fraudulent identities from those simply based on bad data.
  4. Review front- and back-end screening procedures until they satisfy best practices.
  5. Achieve a “single view of the customer” for all account holders across access channels—online, mobile, call center and face-to-face.

The right tools for the job.

In addition to the steps mentioned above, stopping these fake customers from entering and then stealing from your organization isn’t easy—but with the right tools and strategies, it is possible. Here are a few of our top recommendations:

Forensics

Isolate and segment identities based on signals received during early account pathing, from both individuals and their device. For example, even sophisticated fraud networks can’t mimic natural per-device user interaction because these organizations work with hundreds or thousands of synthetic identities using just a few devices. It’s highly unlikely that multiple geographically separate account holders would share the same physical device.

High-risk fraud scores

Not all synthetic identity fraud manifests the same way. Using sophisticated logic and unique combinations of data, a high-risk fraud score looks at a consumer’s credit behavior and credit relationships over time to uncover previously undetectable risk. These scores are especially successful in detecting identities that are products of synthetic identity farms. And by targeting a specific data set and relationships, you can maintain a frictionless customer experience and reduce false positives.

Analytics

Use a solution that develops models of bad applicant behavior, then compares and scores your portfolio against these models. There isn’t a single rule for detecting fraudulent identities, but you can develop an informed set of rules and targeted models with the right service partner. Cross-referencing models designed to isolate high-risk identity theft cases, first-party or true-name fraud schemes, and synthetic identities can be accomplished in a decisioning strategy or via a custom model that incorporates the aggregate scores and attributes holistically.

Synthetic identity detection rules

These specialized rules consist of numerous conditions that evaluate a broad selection of consumer behaviors. When they occur in specific combinations, these behaviors indicate synthetic identity fraud. This broad-based approach provides a comprehensive evaluation of an identity to more effectively determine if it’s fabricated. It also helps reduce the incidence of inaccurately associating a real identity with a fictitious one, providing a better customer experience.

Work streams

Address synthetic identities confidently by applying analytics to work streams throughout the customer life cycle:

  • Credit risk assessment
  • Know Your Customer/Customer Identification Program checks
  • Risk-based identity proofing and authentication
  • Existing account management
  • Manual reviews, investigations and charge-offs/collections activities

Learn more about these tools and others that can help you mitigate synthetic identities in our white paper, Synthetic identities: getting real with customers.

If your organization is like most, detecting SIDs hasn’t been your top priority. So, there’s no time to waste in preventing them from entering your portfolio. Criminals are highly motivated to innovate their approaches as rapidly as possible, and it’s important to implement a solution that addresses the continued rise of synthetic IDs from multiple engagement points.

With the right set of analytics and decisioning tools, you can reduce exposure to fraud and losses stemming from synthetic identity attacks from the beginning and across the customer life cycle. We can help you detect and mitigate these fake customers before they become delinquent. Learn more

Related Posts

Our behavioral analytics solutions help you stop fraud rings, fraud bots, and other third-party fraud attacks.

Published: November 21, 2024 by Allison Lemaster

Account farming is the process of creating and cultivating multiple user accounts, often using fake or stolen identities.

Published: November 18, 2024 by Julie Lee

AI is significantly transforming the landscape of real estate fraud, enabling criminals to execute schemes like deed theft with greater ease.

Published: November 8, 2024 by Alex Lvoff