TRANSUNION
08/27/2021
Blog
The lack of a standard synthetic identity fraud definition has been one of the hurdles to improving defenses against this threat. Now we have one. The Federal Reserve Board, in collaboration with cross-industry leaders including TransUnion, has issued this definition:
Synthetic identity fraud is the use of a combination of personally identifiable information (PII) to fabricate a person or entity in order to commit a dishonest act for personal or financial gain.
The Fed issued an overview that also includes the following definitions of the primary and supplementary PII elements that may be used to create a synthetic identity.
Primary elements: Identity elements that are, in combination, typically unique to an individual or profile (e.g., name, date of birth, Social Security number and other government-issued identifiers)
Supplemental elements: Elements that can help substantiate or enhance the validity of an identity but cannot establish an identity by themselves (e.g., mailing or billing address, phone number, email address or digital footprint)
Establishing these basic definitions is an important step in properly measuring the full scope and impact of synthetic identity fraud. The descriptions also serve as a good jumping-off point for educating business leaders about this illusive threat.
You’re forgiven if you find it hard to wrap your head around what synthetic identity fraud actually is. Here are three characteristics of synthetic identity fraud that can make it difficult to understand and recognize:
Synthetic identity schemes can play out over months or years. Sophisticated fraudsters build new identities patiently, emulating the behavior of genuine consumers who are new to credit or new to the country.
These long cons often end in a “bust out.” On one day, for example, a fraudster drives away in a newly financed car and maxes out multiple lines of credit. Then, all activity by that synthetic ID stops. Eventually, many lenders or other affected businesses will categorize the losses as charge-offs due to non-payment, rather than as synthetic identity fraud.
TransUnion sponsored a 2021 report by the Aite Group1 about the impact of synthetic identity fraud and best practices for combatting it. (Download a complimentary copy of the report.) The report detailed four common uses for synthetic identities:
The steps fraudsters take to create a credit-worthy entity are always changing. Organized crime rings are especially innovative. They sometimes use multiple techniques simultaneously, trying to get one credit application or other transaction accepted — and even rejections can help build a credit history.
The following table of typical synthetic identity creation techniques is adapted from the Aite report.
METHOD | DESCRIPTION |
Add a new identity as an authorized user to an existing credit line | FIs often don’t do the same level of due diligence when adding a new authorized user, because the primary user is responsible for the debt. However, the new user is reported to credit bureaus, which establishes or adds to a synthetic ID’s credit record. |
Apply for a rental property | A legitimate address helps establish one or more synthetic identities. Also, fraudsters can use the property as a base and abandon it — usually with months of rent unpaid — after the identity has been used to cash in on loans, cards, checking accounts, etc. |
Apply for a secured credit card | Consumers with poor/brief credit histories can often get approved for a line of credit by securing it with a cash deposit. Because the credit is secured, some FI’s don’t rigorously underwrite applicants. The credit history is submitted to the bureaus, giving synthetic identities a potential foothold. |
Get a mobile phone | New identities are relatively easy to get accepted by many mobile plan carriers. Mobile devices help establish an identity’s activity history, while fraudsters also use the phone to sidestep security measures such as SMS one-time passwords. |
Create a social media presence | FIs sometimes check social media activity as part of fraud assessments, so sophisticated criminals set up social media profiles and nurture them for months or years before deploying the synthetic ID. |
Create a complicit data furnisher | Fraudsters set up businesses solely to furnish data to credit bureaus about synthetic identities. Or, a legitimate business can be used for this purpose by an internal fraudster. |
Find out about detecting and eliminating synthetic identities with TransUnion’s Synthetic Fraud Model.
For more on synthetic identity fraud, explore our blog posts on the pandemic’s impact on synthetic identity fraud, and recommendations for mitigating losses from this crime.
TransUnion Global Fraud Solutions unite consumer and device identities to detect threats across markets while ensuring friction-right user experiences. The solutions, all part of the TransUnion TruValidate™ suite, fuse traditional data science with machine learning to provide businesses unique insights about consumer transactions, safeguarding tens of millions of transactions each day.
1 The percent or rate of suspected or risky fraudulent digital transaction attempts are those that TransUnion’s customers either denied or reviewed due to fraudulent indicators compared to all transactions it assessed for fraud.