← Back to Articles
Synthetic identities and financial crime
Synthetic IdentityIdentity FraudFinancial CrimeFraud DetectionRisk Management

Synthetic identities and financial crime

Synthetic identities and financial crime

Synthetic identity fraud is one of the fastest-growing and most challenging types of financial crime. Unlike traditional identity theft (using a real person's identity), synthetic identity fraud creates entirely new identities by combining real and fake information. This article explores synthetic identity fraud, detection strategies, and prevention approaches.

What is Synthetic Identity Fraud?

Synthetic identity fraud involves creating a new identity using a combination of:

  • Real information: Social Security Numbers (SSNs), addresses, phone numbers
  • Fake information: Names, dates of birth, other personal details
  • Mixed information: Combining real and fake elements

The result is an identity that doesn't correspond to any real person but can pass initial verification checks.

Why Synthetic Identities Are Growing

Factors Driving Growth

  1. Data Breaches: Massive amounts of personal data available
  2. Digital Onboarding: Reduced in-person verification
  3. Credit Building: Ability to build credit history over time
  4. Detection Challenges: Difficult to identify initially
  5. Financial Gain: High potential returns for fraudsters

Scale of the Problem

  • Synthetic identity fraud accounts for significant portion of identity fraud losses
  • Growing faster than traditional identity theft
  • Often undetected for months or years
  • High financial impact when discovered

How Synthetic Identity Fraud Works

Phase 1: Identity Creation

Information Gathering:

  • Obtain real SSNs (often from children or deceased individuals)
  • Create fake names and personal details
  • Combine real and fake information
  • Create supporting documents

Identity Assembly:

  • Name: Fake (e.g., "John Smith")
  • SSN: Real (from data breach)
  • Address: Real or fake
  • Phone: Fake or burner phone
  • Email: Created for identity
  • Date of Birth: Fake

Phase 2: Credit Building (Credit Bureaus)

Initial Steps:

  1. Apply for secured credit cards
  2. Make small purchases
  3. Pay on time
  4. Gradually increase credit limits
  5. Build credit history over 6-18 months

Credit Building Strategies:

  • Authorised user on legitimate accounts
  • Secured credit cards
  • Small loans
  • Consistent payment history
  • Gradual credit limit increases

Phase 3: Exploitation

Once Credit is Established:

  1. Apply for multiple credit cards
  2. Max out credit limits
  3. Apply for loans
  4. Open bank accounts
  5. Use for money laundering
  6. Abandon identity when discovered

Financial Impact:

  • High credit limits = large losses
  • Multiple accounts = multiplied losses
  • Long detection time = accumulated losses
  • Network effects = broader fraud

Detection Strategies

Identity Verification Red Flags

Data Quality Indicators:

  • SSN not matching name/DOB
  • SSN issued after date of birth
  • SSN from different state than address
  • Name variations across sources
  • Inconsistent address history

Verification Checks:

def check_synthetic_identity_indicators(identity_data):
    """
    Check for synthetic identity indicators
    """
    flags = []
    
    # SSN validation
    if identity_data['ssn_issue_date'] > identity_data['date_of_birth']:
        flags.append('ssn_after_dob')
    
    # Name consistency
    if identity_data['name_variations'] > 3:
        flags.append('name_inconsistency')
    
    # Address history
    if len(identity_data['addresses']) < 2:
        flags.append('limited_address_history')
    
    # Credit building pattern
    if identity_data['credit_age'] < 12 and identity_data['credit_score'] > 700:
        flags.append('rapid_credit_building')
    
    return flags

Credit Building Pattern Analysis

Suspicious Patterns:

  • Rapid credit score improvement
  • Unusual credit building timeline
  • Multiple accounts opened quickly
  • Consistent perfect payment history
  • Authorised user patterns

Analysis:

-- Identify rapid credit building
SELECT 
    identity_id,
    MIN(account_open_date) as first_account,
    MAX(account_open_date) as latest_account,
    COUNT(*) as account_count,
    AVG(credit_limit) as avg_limit,
    MAX(credit_score) as max_score
FROM accounts
WHERE account_open_date >= DATE_SUB(CURRENT_DATE, INTERVAL 18 MONTH)
GROUP BY identity_id
HAVING account_count >= 5
   AND DATEDIFF(latest_account, first_account) < 365
   AND max_score > 700
ORDER BY account_count DESC;

Network Analysis

Identifying Synthetic Identity Networks:

  • Shared SSNs across multiple identities
  • Common addresses or phone numbers
  • Similar credit building patterns
  • Coordinated account openings
  • Money laundering connections

Network Detection:

import networkx as nx

def detect_synthetic_identity_network(identities):
    """
    Detect network of synthetic identities
    """
    G = nx.Graph()
    
    # Add nodes (identities)
    for identity in identities:
        G.add_node(identity['id'], **identity)
    
    # Add edges (connections)
    for i, id1 in enumerate(identities):
        for id2 in identities[i+1:]:
            # Shared SSN
            if id1['ssn'] == id2['ssn']:
                G.add_edge(id1['id'], id2['id'], type='shared_ssn')
            
            # Shared address
            if id1['address'] == id2['address']:
                G.add_edge(id1['id'], id2['id'], type='shared_address')
            
            # Similar patterns
            if similar_credit_pattern(id1, id2):
                G.add_edge(id1['id'], id2['id'], type='similar_pattern')
    
    # Find communities
    communities = nx.community.greedy_modularity_communities(G)
    
    return communities, G

Behavioural Analysis

Unusual Behaviours:

  • Perfect payment history (too good to be true)
  • Limited account usage
  • Specific transaction patterns
  • Geographic inconsistencies
  • Device and location patterns

Behavioural Indicators:

  • No missed payments ever
  • Minimal account activity
  • Specific merchant patterns
  • Unusual transaction timing
  • Device fingerprint mismatches

Prevention Strategies

Enhanced Identity Verification

Multi-Source Verification:

  • Verify against multiple data sources
  • Cross-reference information
  • Check for inconsistencies
  • Validate SSN authenticity
  • Verify address history

Document Verification:

  • Authenticate identity documents
  • Check for document tampering
  • Verify document consistency
  • Validate against databases
  • Biometric verification

Credit Building Monitoring

Early Detection:

  • Monitor new credit applications
  • Track credit building patterns
  • Identify rapid credit improvement
  • Flag unusual credit histories
  • Analyse authorised user patterns

Controls:

  • Lower initial credit limits
  • Enhanced monitoring for new accounts
  • Gradual credit limit increases
  • Regular account reviews
  • Risk-based authentication

Data Quality Checks

Validation:

  • SSN validation and verification
  • Address verification
  • Phone number validation
  • Email verification
  • Cross-source consistency checks

Tools:

  • Identity verification services
  • Credit bureau data
  • Public records
  • Data quality scoring
  • Anomaly detection

Case Study: Detecting Synthetic Identity Network

Scenario

Multiple new accounts opened with similar credit building patterns, sharing some common elements.

Detection Process

Step 1: Identity Verification

  • SSN validation flags inconsistencies
  • Name variations detected
  • Address history limited
  • Data quality score low

Step 2: Credit Pattern Analysis

  • Rapid credit building identified
  • Multiple accounts opened quickly
  • Unusual credit score progression
  • Perfect payment history

Step 3: Network Analysis

  • Shared addresses identified
  • Common phone numbers
  • Similar credit building timelines
  • Coordinated account openings

Step 4: Behavioural Analysis

  • Limited account usage
  • Specific transaction patterns
  • Geographic inconsistencies
  • Device pattern anomalies

Outcome

Identified network of 15 synthetic identities, prevented additional account openings, and recovered significant funds.

Best Practices

Identity Verification

  1. Multi-Source Verification: Verify against multiple data sources
  2. Data Quality: Ensure high-quality identity data
  3. Consistency Checks: Cross-reference information
  4. Document Authentication: Verify identity documents
  5. Ongoing Monitoring: Continue monitoring after onboarding

Credit Monitoring

  1. Early Detection: Monitor credit building patterns
  2. Pattern Recognition: Identify suspicious credit histories
  3. Network Analysis: Detect coordinated fraud
  4. Risk Scoring: Score identities for risk
  5. Controls: Implement appropriate risk-based controls

Collaboration

  1. Industry Sharing: Share synthetic identity intelligence
  2. Cross-functional: Work with credit, fraud, and compliance teams
  3. Technology Partners: Leverage identity verification tools
  4. Regulatory: Stay current with regulations

Regulatory Considerations

Compliance Requirements

  • KYC: Know Your Customer requirements
  • AML: Anti-Money Laundering regulations
  • Data Protection: Privacy and data protection laws
  • Consumer Protection: Fair credit reporting

Reporting

  • Suspicious activity reporting
  • Credit bureau reporting
  • Regulatory notifications
  • Industry sharing (where permitted)

Metrics and KPIs

Key Metrics

  • Synthetic Identity Detection Rate: Detected / Total synthetic identities
  • False Positive Rate: Incorrectly flagged identities
  • Detection Time: Time to identify synthetic identity
  • Financial Impact: Losses prevented
  • Network Detection: Synthetic identity networks identified

Dashboard Metrics

  • Identity risk distribution
  • Credit building patterns
  • Network connections
  • Detection effectiveness
  • Prevention metrics

Future Trends

Emerging Threats

  • AI-Generated Identities: Using AI to create more convincing identities
  • Deepfakes: Synthetic media for identity verification
  • Cryptocurrency Integration: Using crypto for identity fraud
  • Cross-Platform Attacks: Coordinated synthetic identity fraud

Evolving Defences

  • Advanced ML: More sophisticated detection models
  • Biometric Evolution: Enhanced biometric verification
  • Blockchain: Immutable identity records
  • Industry Collaboration: Enhanced fraud sharing

Conclusion

Synthetic identity fraud is a significant and growing threat. Effective detection and prevention require:

  • Enhanced identity verification
  • Credit building pattern analysis
  • Network analysis to identify fraud rings
  • Behavioural analysis
  • Multi-layered prevention strategies

The key is to detect synthetic identities early, before they can cause significant financial damage. This requires analytical thinking, technical skills, and a deep understanding of identity fraud patterns.