{"id":6154,"date":"2021-02-23T06:00:43","date_gmt":"2021-02-23T14:00:43","guid":{"rendered":"http:\/\/www.trulioo.com\/?p=6154"},"modified":"2023-11-23T23:46:09","modified_gmt":"2023-11-23T23:46:09","slug":"synthetic-identity-fraud","status":"publish","type":"post","link":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud","title":{"rendered":"Synthetic Identity Fraud \u2014 Spotting the Fakes"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"600\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/06\/Synthetic-identity-fraud-2020.jpg\" alt=\"Synthetic identity fraud 2020\" class=\"wp-image-18185\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/06\/Synthetic-identity-fraud-2020.jpg 900w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/06\/Synthetic-identity-fraud-2020-740x493.jpg 740w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/06\/Synthetic-identity-fraud-2020-48x32.jpg 48w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/figure>\n\n\n\n<p>Any time you see a number of followers\/fans on a social media account, do you wonder how many are real? It raises an interesting question: How can you tell if someone online is real, or if they\u2019re a bot or some other synthetic identity? While these deceptive accounts often pose no real issues, bad actors are increasingly turning to synthetic identity fraud to commit financial crimes. Synthetic identities wreak havoc on traditional validation and authentication methods, costing businesses significant time and money.<\/p>\n\n\n\n<p>The concept is to create fake identities usually based on combining fake information with actual ID data. One example of a fake identity is one that contains personal information, such as a real social security number (SSN), along with a fake address and other synthetic data points. The fraudster can then use this&nbsp;<a href=\"https:\/\/securityintelligence.com\/synthetic-identity-theft-three-ways-synthetic-identities-are-created\/\" target=\"_blank\" rel=\"noopener noreferrer\">fake identity<\/a>&nbsp;to acquire a driver\u2019s license, passport or other form of real ID, in addition to credit cards and other accounts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-fastest-growing-type-of-financial-crime\">The fastest growing type of financial crime<\/h2>\n\n\n\n<p>Unfortunately, synthetic identities are a growing problem. Data breaches are allowing more personally identifiable information (PII) to leak out, which makes it easier to start these scams. The speed of online and mobile commerce is generating demands for quicker onboarding and credit processes, taking human interaction out of the process. And, the anonymous nature of synthetic identities also decreases the risk to fraudsters, increasing their interest.<\/p>\n\n\n\n<p>The losses are substantial; in its <a href=\"https:\/\/www.experian.com\/blogs\/news\/2021\/01\/11\/experian-launches-2021-future-fraud-forecast\/\" target=\"_blank\" rel=\"noopener noreferrer\">2021 Future of Fraud Forecast<\/a>, Experian stated that synthetic identity fraud was the fastest growing type of financial crime. According to the Auriemma Group, \u201cUp to 5% of charged-off credit card accounts <a href=\"https:\/\/www.auriemma.group\/acg-pr-letter-2017\/\" target=\"_blank\" rel=\"noopener noreferrer\">could be linked to synthetic identity fraud<\/a>. With the average unpaid debt totaling more than $15,000 per account, that equates to $6 billion, or 20%, in credit losses industry-wide.\u201d This emphasizes other research from Equifax, which found synthetic ID fraud&nbsp;accounts for 80% of credit card fraud losses, nearly 20% of card charge-offs.<\/p>\n\n\n\n<p>COVID-19 has caused synthetic identity to increase, as more and more people move to transacting with businesses and banks online, and undertake more aspects of their daily lives digitally. In addition, prominent large-scale customer data leaks and cybersecurity breaches have exposed millions of identities and huge amounts of personal data for fraudsters to exploit. To put it in perspective, an&nbsp;Identity Theft Resource Center report&nbsp;indicated that 471 million customer records were exposed in 2018. Savvy fraudsters use all of this personal information to take advantage of the vulnerable, especially the young and elderly. Fraudsters even use identities and SSNs of dead people.<\/p>\n\n\n\n<p>Department of Justice, R. Sean McCleskey states:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>When criminals use a <a href=\"https:\/\/hotforsecurity.bitdefender.com\/blog\/synthetic-identity-fraud-to-drive-48-billion-in-annual-losses-by-2023-juniper-research-20602.html\" target=\"_blank\" rel=\"noopener noreferrer\">blend of different people\u2019s data<\/a>, as well as some entirely made-up information, it becomes harder for law-enforcement officials to both realize the crime and then locate the culprit.<\/p>\n<\/blockquote>\n\n\n\n<p>And the losses aren\u2019t just financial. Oftentimes, criminals will use the SSNs of children to apply for government benefits, open bank and credit card accounts, apply for loans or utility services, or rent a place to live. Children are targets of identity theft because the crime can go undetected for years, often until they first apply for credit or check their credit score.<\/p>\n\n\n\n<p>More than one million children were&nbsp;<a href=\"https:\/\/www.cnbc.com\/2018\/04\/24\/child-identity-theft-is-a-growing-and-expensive-problem.html\" target=\"_blank\" rel=\"noopener noreferrer\">victims of identity theft<\/a>&nbsp;or fraud in a single year. While that number covers the various different types of identity fraud, synthetic identity fraud is increasingly used by fraudsters as those accounts offer a blank slate and are better suited for opening accounts that go unnoticed. According to Carnegie Mellon CyLab, children\u2019s SSNs are 51 times more likely to be used in synthetic fraud schemes than adults.<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18186 size-full\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/06\/Traditional-fraud-vs-synthetic-identity-fraud.jpg\" alt=\"Traditional fraud vs synthetic identity fraud\" width=\"900\" height=\"411\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/06\/Traditional-fraud-vs-synthetic-identity-fraud.jpg 900w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/06\/Traditional-fraud-vs-synthetic-identity-fraud-740x338.jpg 740w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/06\/Traditional-fraud-vs-synthetic-identity-fraud-70x32.jpg 70w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><br><em>Adapted from Payments Fraud Insights report (2020), Federal Reserve System.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-credit-bust-out-fraud\">Credit bust-out fraud<\/h2>\n\n\n\n<p>Synthetic identities are often used to open new accounts, as a form of application fraud. As the identity data elements are reusable, it becomes a tool for application flooding, which are attempts to open large numbers of accounts. The fraudsters understand it\u2019s a numbers game, with many accounts being rejected. However, accounts that are opened can then look more legitimate over time.<\/p>\n\n\n\n<p>To maximize returns, synthetic fraudsters play a long con with a credit bust-out fraud, also known as sleeper fraud. This form of fraud is where a fraudster establishes a normal usage pattern and solid repayment history to build up their credit line so they can acquire more cards and higher credit limits, before a final \u201cbust out\u201d of charges where they max out all the cards with no intention of paying the bills. While it takes patience, the financial gain is often substantial. One fraud ring in New Jersey built up 7,000 credit profiles in a scheme that created over $200 million in fraud losses.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-stopping-fake-identities\">Stopping fake identities<\/h2>\n\n\n\n<p>There are steps that your business can take to limit synthetic identity fraud. Just as using data is the key to creating a synthetic identity, data is the solution to combating the fraud. Initial Know Your Customer (<a href=\"\/blog\/kyc\">KYC<\/a>) checks are an obvious starting point, as they are often a compliance requirement.<\/p>\n\n\n\n<p>Unfortunately, fraudsters can abuse gaps in the Know Your Customer (KYC) protocols of financial institutions. Bypassing weak KYC protocols and traditional, manual processing procedures, once accounts are opened, these synthetic identities can go undetected for many years. Further complicating <a href=\"https:\/\/www.trulioo.com\/identity-verification-use-cases\/fraud-prevention\/fraud\">fraud prevention efforts<\/a>,&nbsp;synthetic identity profiles generally have strong credit scores. This results in fewer (or no) red flags during credit underwriting and credit checks.<\/p>\n\n\n\n<p>Adding in additional identity layers in a <a href=\"\/blog\/compliance\/risk-based-approach\">risk-based approach<\/a> builds more security hurdles for the fraudster to overcome, as they need to synthesize a more robust profile.<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18187 size-full\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/06\/Synthetic-identity-fraud-layers-of-identity-verification.jpg\" alt=\"Adapted from Payments Fraud Insights report (2020), Federal Reserve System.\" width=\"900\" height=\"353\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/06\/Synthetic-identity-fraud-layers-of-identity-verification.jpg 900w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/06\/Synthetic-identity-fraud-layers-of-identity-verification-740x290.jpg 740w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/06\/Synthetic-identity-fraud-layers-of-identity-verification-82x32.jpg 82w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><br><em>Adapted from Payments Fraud Insights report (2020), Federal Reserve System.<\/em><\/p>\n\n\n\n<p>Equifax mentions these three points to watch out for:<\/p>\n\n\n\n<ul>\n<li>SSN can\u2019t be matched to the specific consumer, based on comparison algorithms<\/li>\n\n\n\n<li>SSN matches to a different consumer, while no credit file is available for the requested applicant<\/li>\n\n\n\n<li>SSN matches to a different consumer, and a credit file is available for the name and address provided; however, the SSN on that file is different from the SSN provided on the inquiry<\/li>\n<\/ul>\n\n\n\n<p>While good, those three points only consider one data source.<\/p>\n\n\n\n<p>By using multiple data sources, you increase the opportunity to find non-matches and detect red flags for potential fraud. As pointed out by the U.S. Federal Reserve in <a href=\"https:\/\/www.fedpaymentsimprovement.org\/wp-content\/uploads\/frs-synthetic-identity-payments-fraud-white-paper-july-2020.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Payments Fraud Insights: Mitigating Synthetic Identity Fraud in the U.S. Payment System<\/a>:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>A multi-layered approach that employs both manual and technological data analysis gives organizations the best chance to identify and mitigate fraud caused by synthetics.<\/p>\n<\/blockquote>\n\n\n\n<p>There are also other data sources that are coming into the picture that will further limit the effectiveness of this type of fraud. These include data points like:<\/p>\n\n\n\n<ul>\n<li>IP address<\/li>\n\n\n\n<li>Physical location<\/li>\n\n\n\n<li>Biometrics<\/li>\n\n\n\n<li>Social media information<\/li>\n\n\n\n<li>Mobile identifiers<\/li>\n\n\n\n<li>Geolocation<\/li>\n<\/ul>\n\n\n\n<p>To effectively mitigate synthetic identity fraud, you need a system that can appropriately consider the totality of the data and not rely on limited views. Adaptability to new data parameters and sources is the key; the more independent and reliable data sources you can leverage, the more you can do.<\/p>\n\n\n\n<p>One further step is implementing <a href=\"https:\/\/blogs.cornell.edu\/info2040\/2019\/10\/17\/link-analysis-to-fraud-detection\/\" target=\"_blank\" rel=\"noopener noreferrer\">link analysis processes<\/a>, which analyze the connections between different identities and data. For example, different identities might use the same address or SSN, or have some other relationship that can indicate a fraudulent pattern. The use of sophisticated <a href=\"\/blog\/identity-verification\/payment-fraud-analytics\">fraud analytics systems<\/a> helps spot suspicious patterns, without affecting the customer onboarding experience.<\/p>\n\n\n\n<p>It\u2019s an emerging threat to businesses and implementing an effective identity verification and authentication system to spot fake identities is your strongest defense to help protect your business from the fastest growing type of ID fraud, which currently accounts for 80-85% of all identity fraud.<\/p>\n\n\n\n<p><em>Originally\u00a0published: March 2017, updated to reflect the latest industry news, trends and insights.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"Any time you see a number of followers\/fans on a social media account, do you&#8230;","protected":false},"author":8,"featured_media":18185,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"footnotes":""},"categories":[331],"post-types":[148,172],"post-topics":[123,131,143],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.1 (Yoast SEO v22.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Synthetic identity fraud \u2014 Spotting the fakes<\/title>\n<meta name=\"description\" content=\"Synthetic identity fraud is one the fastest-growing forms of identity theft. Learn how to better spot fake identities based on real ID data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Synthetic identity fraud \u2014 Spotting the fakes\" \/>\n<meta property=\"og:description\" content=\"Synthetic identity fraud is one the fastest-growing forms of identity theft. Learn how to better spot fake identities based on real ID data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud\" \/>\n<meta property=\"og:site_name\" content=\"Trulioo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/trulioo\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-23T14:00:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-23T23:46:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/06\/Synthetic-identity-fraud-2020.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paul Valkama\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trulioo\" \/>\n<meta name=\"twitter:site\" content=\"@trulioo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Valkama\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud\"},\"author\":{\"name\":\"Paul Valkama\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae\"},\"headline\":\"Synthetic Identity Fraud \u2014 Spotting the Fakes\",\"datePublished\":\"2021-02-23T14:00:43+00:00\",\"dateModified\":\"2023-11-23T23:46:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud\"},\"wordCount\":1292,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"articleSection\":[\"Fraud and Risk\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud\",\"url\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud\",\"name\":\"Synthetic identity fraud \u2014 Spotting the fakes\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/#website\"},\"datePublished\":\"2021-02-23T14:00:43+00:00\",\"dateModified\":\"2023-11-23T23:46:09+00:00\",\"description\":\"Synthetic identity fraud is one the fastest-growing forms of identity theft. Learn how to better spot fake identities based on real ID data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trulioo.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fraud and Risk\",\"item\":\"https:\/\/www.trulioo.com\/post-topics\/fraud-prevention\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Synthetic Identity Fraud \u2014 Spotting the Fakes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trulioo.com\/#website\",\"url\":\"https:\/\/www.trulioo.com\/\",\"name\":\"Trulioo\",\"description\":\"Building trust online (online identity verification services)\",\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trulioo.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.trulioo.com\/#organization\",\"name\":\"Trulioo\",\"url\":\"https:\/\/www.trulioo.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"contentUrl\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"width\":2784,\"height\":1464,\"caption\":\"Trulioo\"},\"image\":{\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/trulioo\",\"https:\/\/twitter.com\/trulioo\",\"https:\/\/www.linkedin.com\/company\/trulioo\",\"https:\/\/www.instagram.com\/trulioo_global\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae\",\"name\":\"Paul Valkama\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g\",\"caption\":\"Paul Valkama\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Synthetic identity fraud \u2014 Spotting the fakes","description":"Synthetic identity fraud is one the fastest-growing forms of identity theft. Learn how to better spot fake identities based on real ID data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud","og_locale":"en_US","og_type":"article","og_title":"Synthetic identity fraud \u2014 Spotting the fakes","og_description":"Synthetic identity fraud is one the fastest-growing forms of identity theft. Learn how to better spot fake identities based on real ID data.","og_url":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud","og_site_name":"Trulioo","article_publisher":"https:\/\/www.facebook.com\/trulioo","article_published_time":"2021-02-23T14:00:43+00:00","article_modified_time":"2023-11-23T23:46:09+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/06\/Synthetic-identity-fraud-2020.jpg","type":"image\/jpeg"}],"author":"Paul Valkama","twitter_card":"summary_large_image","twitter_creator":"@trulioo","twitter_site":"@trulioo","twitter_misc":{"Written by":"Paul Valkama","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud#article","isPartOf":{"@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud"},"author":{"name":"Paul Valkama","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae"},"headline":"Synthetic Identity Fraud \u2014 Spotting the Fakes","datePublished":"2021-02-23T14:00:43+00:00","dateModified":"2023-11-23T23:46:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud"},"wordCount":1292,"commentCount":0,"publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"articleSection":["Fraud and Risk"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud","url":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud","name":"Synthetic identity fraud \u2014 Spotting the fakes","isPartOf":{"@id":"https:\/\/www.trulioo.com\/#website"},"datePublished":"2021-02-23T14:00:43+00:00","dateModified":"2023-11-23T23:46:09+00:00","description":"Synthetic identity fraud is one the fastest-growing forms of identity theft. Learn how to better spot fake identities based on real ID data.","breadcrumb":{"@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/synthetic-identity-fraud#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trulioo.com\/"},{"@type":"ListItem","position":2,"name":"Fraud and Risk","item":"https:\/\/www.trulioo.com\/post-topics\/fraud-prevention"},{"@type":"ListItem","position":3,"name":"Synthetic Identity Fraud \u2014 Spotting the Fakes"}]},{"@type":"WebSite","@id":"https:\/\/www.trulioo.com\/#website","url":"https:\/\/www.trulioo.com\/","name":"Trulioo","description":"Building trust online (online identity verification services)","publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trulioo.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.trulioo.com\/#organization","name":"Trulioo","url":"https:\/\/www.trulioo.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","contentUrl":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","width":2784,"height":1464,"caption":"Trulioo"},"image":{"@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/trulioo","https:\/\/twitter.com\/trulioo","https:\/\/www.linkedin.com\/company\/trulioo","https:\/\/www.instagram.com\/trulioo_global\/"]},{"@type":"Person","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae","name":"Paul Valkama","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g","caption":"Paul Valkama"}}]}},"_links":{"self":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/6154"}],"collection":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/comments?post=6154"}],"version-history":[{"count":1,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/6154\/revisions"}],"predecessor-version":[{"id":39521,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/6154\/revisions\/39521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media\/18185"}],"wp:attachment":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media?parent=6154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/categories?post=6154"},{"taxonomy":"post-types","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-types?post=6154"},{"taxonomy":"post-topics","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-topics?post=6154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}