Synthetic Identity Fraud & the Public Sector: Using Pipl to Detect Synthetic Identities
In the first two posts of this series, we discussed what synthetic identities are and how they’re used to commit fraud. We also mentioned that synthetic identities are notoriously difficult to detect, making the prevention of their use to commit fraud nearly impossible.Unfortunately for the fraudsters, there’s a tool that exposes the telltale signs of a synthetic identity. The time to identify synthetic identities is during their first deployment – preventing them from applying for government benefits or a line of credit.
Read More >