Free Course on Synthetic Identity Fraud
Subscribers only
Easy
Subscribers only
Easy
Undefined type
Synthetic Identity Fraud
2 Assessments, 5 Lessons
0% Not started
1 Assessment
1 Assessment, 1 Lesson
Subscribers only
1 Lesson
Subscribers only
Lesson Title: How Criminals Build Synthetic Identities Objective: Explore how fraudsters combine stolen real data and fabricated details to construct synthetic identities. Key Topics: 1. The use of real data, like Social Security numbers (especially of children or deceased individuals). 2. Fabricated information, such as fake names, addresses, and phone numbers. 3. Manipulating credit files to make synthetic identities seem legitimate. 4. How these identities evade detection for extended periods. 5. Real-world example: The New Tenant Who Never Existed.
1 Lesson
Subscribers only
Lesson Title: How Synthetic Identities Fool Banks and Lenders Objective: Teach how synthetic identities are used to manipulate credit systems and steal large sums of money. Key Topics: 1. Techniques like credit piggybacking to build credit history. 2. Opening new accounts and applying for loans with synthetic identities. 3. The “bust-out” scheme where fraudsters max out credit cards and loans before disappearing. 4. How long-term planning makes synthetic identity fraud lucrative. 5. Real-world example: The Credit Mastermind.
1 Lesson
Subscribers only
Lesson Title: How to Protect Your Business from Synthetic Identity Fraud Objective: Provide actionable strategies and tools for detecting and preventing synthetic identity fraud. Key Topics: 1. Multi-layered verification techniques (e.g., biometrics, phone number validation, and address checks). 2. The importance of credit monitoring and looking for unusual patterns in new accounts. 3. How behavioural analysis tools can detect synthetic identities based on digital behaviours. 4. Why fraudsters target businesses with weak detection protocols. 5. Real-world example: The False Startup.
1 Lesson
Subscribers only
Lesson Title: The Case of the Vanishing Breeder Objective: Apply the knowledge gained in a practical, interactive investigation to solve a real-world fraud case. Key Topics: 1. Investigating fraud by tracing digital transactions (e.g., Bitcoin payments). 2. Identifying whether a business or identity is synthetic. 3. Steps to uncover fraud and bring the perpetrator to justice. 4. The importance of continuous vigilance and awareness to combat evolving fraud tactics. 5. Real-world example: The Vanishing Breeder.
Follow
No Author Description
Session expired
Please log in again. The login page will open in a new tab. After logging in you can close it and return to this page.