Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Defining synthetic identity fraud once and for all

By Jeffrey Feinstein
fraud-prevention-freepik.jpg
November 1, 2021

I had the honor of serving on a Federal Reserve committee this past winter to define synthetic identity fraud. The result of this effort was the release of a paper that defines it for the industry, an essential step forward in the fight against this pervasive threat.


Fraudsters Thrive on Imprecision

Synthetic identity fraud can be a perfect crime. Fraudsters can simulate information and find loopholes to register that information in credit systems. It often goes unnoticed because there is no consumer victim contacting a lender to report a fraudulent account. Financial institutions often treat losses tied to synthetic identities as credit losses because they lack any ties to real consumers who report a stolen identity. This makes it hard for banks to identify and remediate in their fraud queues.


Fraudsters simulate positive behavior to entice lenders to offer them credit and ultimately default on that credit. As a result, they “hide” among credit defaults. The figure below* shows the proportions of credit charge-offs that are likely synthetic identity fraud from one such portfolio. In this study, roughly 21.3% of the defaulting consumers engaged in some form of identity manipulation, and 6.1% of the charge-offs were truly fabricated identities.


One of the best ways to fight fraud is clearly understanding identity patterns at various stages of the fraud scheme. One obstacle in achieving clarity is that companies don’t share a common language and definition in their fight against synthetic identity fraud. The fraudster needs to only find one gap in the system by luck, cleverness or both. We can’t develop unified strategies to combat synthetic identity fraud if we can’t define it. The Federal Reserve’s unifying definition adds much-needed clarity and consistency.


LexisNexisRisk.jpg



Confusion Drives the Lack of Consistency in Defining Synthetic Identity Fraud 

As defined by the Federal Reserve, synthetic fraud comes from “the use of a combination of personally identifiable information to fabricate a person or entity in order to commit a dishonest act for personal or financial gain." This definition is intended to be common across industries. The Federal Reserve closed a gap in how affected industries should think about synthetic fraud. Fraudsters who utilize synthetic identities are most successful when they take advantage of a weak link in a company’s fraud defenses. Fraudsters rely on confusion and inconsistency, so lack of definitional clarity helped fraudsters thrive in a variety of ways.


First, a fraudster does not care if they are stealing from a bank, credit union, insurer, government, payment processor, individual, or other entity. Fraudsters like varying their targets because they know that different industries are less coordinated in their response compared to two entities from the same industry or institution. This helps fraudsters hone their methods while also subverting institution or industry-specific fraud reduction efforts. Synthetic fraudsters vary their schemes across industries. When fighting fraud, fraud mitigation teams and analysts in different verticals may use the same term, but they are fighting different types of fraud, which prohibits consistent response to these schemes.


Second, confusion also stems from the industry trend to define and manage first-party fraud and third-party fraud by different processes. First-party fraud indicates a fraud that a consumer executes in their own name. Third-party fraud involves a consumer who is the victim of a fraudster, such as through identity theft. Businesses often manage these two types of fraud differently in industry workflows. This means that synthetic identities — which are third parties committing first-party fraud on fake identities — do not fit cleanly in either workflow. By mixing synthetic fraud with typical first-party fraud or third-party fraud workflows, one can miss the nuances of synthetic fraud entirely.*


Third, an issue lies in the gap between fraud controls and credit risk management controls. A synthetic identity is generally a highly curated ‘consumer’ who pays their bills over time until they stop paying. When a low-risk and high-revenue consumer stops paying their bills, the account management workflow will usually push the account towards a collections queue, not a fraud queue. Therefore, it’s common to see collection portfolios littered with these sorts of synthetic identities — consumers who seem to have stopped paying their bills suddenly. There is little feedback to the underwriting team to flag these forms of identity manipulation because they are flagged as uncollectable rather than fraud write-offs.


Finally, the fast evolution of fraud creates a series of variants that get increasingly more complex. Internal definitions of synthetic identity fraud may become either outdated or overly generalized after fraud analysts identify them, or worse, analysts may start using very broad definitions of synthetic identity fraud under an “all else” mindset. This sort of catch-all performance definition becomes self-defeating and further confuses the synthetic identity fraud concept, making it harder to define and prevent.


The Advantages of the Federal Reserve Definition

There is real value in the Federal Reserve’s official guidance on the elements that are most critical in identifying synthetic identity fraud. This helps make the definition consistent for all credit issuers. The definition is also high level and lays out the relevant information for diagnosing.


The definition lays out four use cases: credit repair, fraud for living, payment default schemes and other criminal activity, such as money laundering and human trafficking. It is critical to note that they are all characterized by different schemes and fraud types. The definition also lays out a series of identity and behavioral markers of this type of fraud. This is important because the combination of identity elements with behavioral elements helps differentiate synthetic behavior from other types of fraud and non-fraud behavior. The Federal Reserve definition also supports a certain amount of flexibility and interpretation. If the Federal Reserve laid out specific criteria, fraudsters would likely have pivoted to make the definition obsolete quickly.


What’s Next?

The definitions from the Federal Reserve are clarifying but stop short of mitigation methods. This is important because laying out specific mitigation methods can be self-defeating. Doing so would equally hard code responses and inform fraudsters on what screens to bypass to be successful. Since fraudsters tend to evolve and change approaches, we need to use strong forensics and data mining to identify variants that may emerge. Methods to address synthetic identity fraud should focus on disrupting the fraudster’s business models. This forensics approach can help fraud analysts better understand a broader picture of identity.



*Metrics are from LexisNexis Risk Solutions proprietary data sources.

KEYWORDS: bank security fraud detection fraud prevention risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jeffrey feinstein
Jeffrey Feinstein, Ph. D., is vice president of advanced analytic strategy at LexisNexis Risk Solutions. Feinstein is a thought-leader in risk and fraud analytics and credit bureau scoring, with 20 years of experience in the industry. Feinstein leads a team of over 100 data scientists in efforts to use innovative analytic solutions, techniques and content to address business problems across industries. He focuses on identifying behavioral data patterns descriptive of synthetic identities and stolen identities, as well as attitudes and behaviors underlying credit scoring. He has eight U.S. patents, including three related to credit scoring.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • blue-green screen with thin lines

    46 percent of organizations faced synthetic identity fraud in 2022

    See More
  • bots

    How to shut down bad bots once and for all

    See More
  • Technology in the talent gap

    How security leaders can close the tech talent gap — once and for all

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!