Read More about fast-id page

Shufti globally launches webinr-icon - a new kind of identity solution!

Shufti globally launches - a new kind of identity solution!

Read more

Why You Need to Verify Identity Online

verify identity compress

5 Unusual Ways Stolen Identities Can be Used Online

The need to verify identity in the digital space has arisen rapidly in the past few years. Here’s a scenario that will make it clear:

Imagine this you’re sitting at home relaxing and watching TV, suddenly there is a knock on the door and you ask who it is and you hear a voice that says, “Open up, this is the FBI”. Well, that would be something that would get your heartbeat racing. When you open the door to let them in and they speak to you and say that you are involved in suspicious activities related to a terrorist organisation. Now, that’s something to give you a heart attack especially if you have no idea what they are talking about. When you tell them exactly that, they show you your social media page. You look at it, see its your picture and your name, but you don’t recognise the cover picture or the multitude of posts that show your support for a popular terrorist group. That’s when you realise that your identity has been stolen and used to create this fake social media profile.

The case above is based on a true story that was a revenge scenario but still it is a crime. Although, social media sites are working towards KYC verification processes it still needs a lot of improvement before they can put an effective stop to such incidences.

As we proceed in this article we will look at five unusual ways stolen identities can be used online. This will make the case for the need to verify identity online. Some of the cases mentioned below have actually happened.

Free Airline Rides

Imagine this you have been accumulating bonus miles with your favourite airliner and then you see after a while that your miles have been utilised and that you have taken flights and upgrades that you never knew about. You check through the details and find out the address and other account details are changed. Well, guess what your identity has been stolen and the thief has changed the email to a fake one.  One would think that there would be an added layer of security, especially when you are about to make changes to your profile; like a system that would verify identity online.

Free Doctor Checkup

The Internet is a powerful medium where more and more businesses and service providers are turning to cater their customers and clients. For example, did you know you can get an online consultation with a medical doctor? Well, that is the case, a person started getting bills on his credit card for doctor consultations. I mean this is something you would remember, no? Somebody had impersonated him and using his credit card had had consultations with an online doctor. Eventually the impersonator was caught but the idea in itself was pretty new.

Getting Away with a Crime

Imagine you knew a secret about someone. You know that they would pay for something like that to go away. Yes, we’re talking about blackmail. There have been reported cases where a stolen identity was used to extort money. A fake bank account based on the victim’s identity was created and extorted money was transferred and used via cards made on the name of the stolen identity. If identity theft wasn’t a crime on its own they went on to go for extortion and blackmail as well. The awful part is, this was done online without the presence of any individual.

Profiting on Your Taxes

One person’s loss is another person’s gain. In this case loss of identity critical information such as your social security number to a stranger. This type although unusual is very much common. People use the stolen identity of a person including their social security number and use it to request a tax return claiming a fraudulent refund. Usually, if the IRS receives the fraudulent return before you file, the IRS will send your refund check to the first person in this case the identity thief. It is the thief who profits from the claim and the victim looses out on money. All this can be easily countered if there is a mechanism to verify identity easily.

Free Electricity

Identity thieves take advantage of people with good credit score to secure free electricity. Using a fake billing address, the stolen identity and financial details of the victim they apply online for a change of electricity service provider. As is with most companies they see the score and start supplying the electricity. The victim never realises that their information has been compromised until the collectors come knocking by that time the thief has already moved on to another victim. If only these online utility service providers would verify identity online.

How you can Verify Identity to Protect Yourself

Having mentioned some of the unusual ways that identity thieves use stolen identities we need to discuss upon the importance of keeping one’s information safe and secure:

As a general rule of thumb, do not give away information over websites unless you know them to be trustworthy and secure. Also, be aware of individuals representing government agencies and companies asking for your social security number over the phone. Do not give sensitive information over the phone.

Review your credit report at least quarterly.

Keep your Social Security number private.

If your information has been compromised, contact your bank, the companies in concern as well as the collection agencies and credit score companies. Contact your lawyer for further legal advice.

Inquire About Security Measures

Ask companies that store your personal and sensitive information regarding what security measures they have placed to prevent online identity theft and impersonation. Get two-step verification wherever there is an option. Financial institutions as well as utility bill providers that have online account opening services have the option of opting for third-party ID verifiers.  Such companies check for forgeries through live documentation checking and matching via their KYC verification process.

Recommended For You:

Related Posts

Blog

KYC For Sharing Economy – Building a Safe & Trusted Environment that Retains Customers

“Sharing Economy” is a term that has become popular in recent years, and the current digital worl...

KYC For Sharing Economy – Building a Safe & Trusted Environment that Retains Customers Explore More

Blog

EU’s Upcoming Regulation for Cryptocurrency ‘Wild West’

The use of cryptocurrencies as an integral part of criminal schemes is growing immensely. However...

EU’s Upcoming Regulation for Cryptocurrency ‘Wild West’ Explore More

Blog

The UK “Children’s Code” – Laying New Grounds for Age Verification

A 12-month grace period for compliance with a set of standards, introduced for protecting childre...

The UK “Children’s Code” – Laying New Grounds for Age Verification Explore More

Blog, Reg Tech

Shufti GDPR Review 2018: How we protected our clients from regulatory fines?

Shufti stands out in KYC industry not only because of its highly customizable and global iden...

Shufti GDPR Review 2018: How we protected our clients from regulatory fines? Explore More

Blog, Identity & KYC

KYC and AML Compliance can help cryptocurrencies to earn legitimacy

Cryptocurrencies are currently limited in use by virtual currency enthusiasts or by lottery bidde...

KYC and AML Compliance can help cryptocurrencies to earn legitimacy Explore More

Blog

KYC, KYB & KYT Tying the Loops for Identity Verification

Digital fraudulent activities are rising with every passing day, businesses are adopting reactive...

KYC, KYB & KYT Tying the Loops for Identity Verification Explore More

Blog, Online Marketplace

Industrial significance of KYC / AML Compliance in 2019

As the type and amount of fraudulent activities have increased over the years, governments and re...

Industrial significance of KYC / AML Compliance in 2019 Explore More

Blog, Financial Crime / AML, Identity & KYC

5AMLD: Implications for Cryptocurrency

What is 5AMLD? As part of the Action Plan against terrorism, the 5th Anti-Money Laundering Direct...

5AMLD: Implications for Cryptocurrency Explore More

Blog

Electronic Identity Verification | Forecasts and Predictions

Identities change as the world goes more digital. As more activities, like banking, socialising, ...

Electronic Identity Verification | Forecasts and Predictions Explore More

Blog

Debunking the Top 7 Myths about Video KYC with CEO of Shufti

Businesses were looking for more robust and remote ways of verifying the identities of customers ...

Debunking the Top 7 Myths about Video KYC with CEO of Shufti Explore More

Blog

Europol launches European Financial and Economic Crime Center (EFECC)

Financial and economic crimes are today the leading threats that are affecting millions of EU cit...

Europol launches European Financial and Economic Crime Center (EFECC) Explore More

Blog, Business Technology

Business Verification – Foolproof Ways to Secure Happy Customers

Creating a winning customer experience can make for a significant competitive advantage for busin...

Business Verification – Foolproof Ways to Secure Happy Customers Explore More

Blog

The Benefits and Best Practices of Deploying Facial Recognition in the Workplace

With the rapid shift towards digitisation, keeping track of the most recent technological develop...

The Benefits and Best Practices of Deploying Facial Recognition in the Workplace Explore More

Blog

The Most Frequently Asked Questions about Video KYC

In today’s digital era, the escalating prevalence of identity theft poses a significant con...

The Most Frequently Asked Questions about Video KYC Explore More

Blog

Digital COVID Pass: Automated COVID Report Verification

The worsening situation of the pandemic has forced authorities to impose restrictions on several ...

Digital COVID Pass: Automated COVID Report Verification Explore More

Blog

Fintech 2021 – A Brief Insight of Global KYC Regulations

Financial services are among the most heavily regulated sectors in the world, and the number one ...

Fintech 2021 – A Brief Insight of Global KYC Regulations Explore More

Blog, Reg Tech

How does CDD effectively help with AML Compliance?

CDD or customer due diligence in the banking sector and other financial firms is an important asp...

How does CDD effectively help with AML Compliance? Explore More

Blog

Leveraging Age Assurance for Data Privacy and User Protection

Online age verification has gained great attention in recent years since many minors have been se...

Leveraging Age Assurance for Data Privacy and User Protection Explore More

Blog

DoorDash Falls in the pit of Data Breach – Affects 4.9 Million Users

Security breaches are increasing in number with every passing day. This keeps on happening. It wo...

DoorDash Falls in the pit of Data Breach – Affects 4.9 Million Users Explore More

Blog

Top 5 Digital Banking Trends to Look Out for in 2022

2021 was fundamentally geared towards surviving the pandemic and its aftermaths. The pandemic-acc...

Top 5 Digital Banking Trends to Look Out for in 2022 Explore More

Blog, Financial Crime / AML, Fraud Prevention, Identity & KYC

Data Breaches – Types, Sources, and Preventive Measures

A large number of well-renowned companies are under the threat of high-scale data breaches. After...

Data Breaches – Types, Sources, and Preventive Measures Explore More

Blog

4 Ways How Technology Can Simplify KYC and AML Workflow Management

While the terms AML and KYC are used interchangeably, there is a huge difference between the two....

4 Ways How Technology Can Simplify KYC and AML Workflow Management Explore More

Blog

Securing Banks and Curbing Financial Crimes with Shufti AML/KYC Solution

Banks and other financial institutions constantly face the challenges of tackling financial crime...

Securing Banks and Curbing Financial Crimes with Shufti AML/KYC Solution Explore More

Blog, Business Technology, Financial Crime / AML, Identity & KYC, Online Marketplace

Know Your Business: The Next Step in Identity Verification

The complex regulatory environment and increased exposure to illegal activities indicate that bus...

Know Your Business: The Next Step in Identity Verification Explore More

Blog

Top 5 Digital Banking Trends to Look Out for in 2022

2021 was fundamentally geared towards surviving the pandemic and its aftermaths. The pandemic-acc...

Top 5 Digital Banking Trends to Look Out for in 2022 Explore More

Blog

Top 5 Use Cases of Face Verification in the Digital Age

As novel applications and products are released every day, the use cases of face verification tec...

Top 5 Use Cases of Face Verification in the Digital Age Explore More

Blog

Lithuania’s AML Regulations – How the EU’s FinTech Hub Prevents Financial Crime

Emerging FinTech firms around the world spend almost one-third of their overall budgets on develo...

Lithuania’s AML Regulations – How the EU’s FinTech Hub Prevents Financial Crime Explore More

Blog, Identity & KYC

Why You Need to Verify Identity Online

5 Unusual Ways Stolen Identities Can be Used Online The need to verify identity in the digital sp...

Why You Need to Verify Identity Online Explore More

Blog

Transaction Screening Vs Transaction Monitoring | What’s the Difference?

Transaction screening and transaction monitoring are critical in money laundering, counter-terror...

Transaction Screening Vs Transaction Monitoring | What’s the Difference? Explore More

Blog

Know Your Patient | Secure Patient Onboarding and Preventing Healthcare Fraud

Technology advancement, automation, and digitisation have paved the way for unprecedented growth ...

Know Your Patient | Secure Patient Onboarding and Preventing Healthcare Fraud Explore More

Blog, Identity & KYC, Online Marketplace

Why 2 Factor Authentication is vital for Online Identity Risk Management?

Online identity risk management is becoming harder and harder on cyberspace. It is a headache for...

Why 2 Factor Authentication is vital for Online Identity Risk Management? Explore More

Blog

Document Authentication | Streamlining Onboarding, Compliance & Fraud Prevention

Before the world experienced digitisation due to the advent of smartphones, fast-speed internet, ...

Document Authentication | Streamlining Onboarding, Compliance & Fraud Prevention Explore More

Blog, Financial Crime / AML

AMLD5 Amendments in Prepaid Cards Transaction Threshold

In July 2018, the European Commission came into effect the 5th Anti-Money Laundering Directive (A...

AMLD5 Amendments in Prepaid Cards Transaction Threshold Explore More

Blog, Financial Crime / AML, Identity & KYC, Reg Tech

Significance of AML Compliance in Money Services Business

The financial sector landscape is evolving with the advent of the FinTech industry. Many revoluti...

Significance of AML Compliance in Money Services Business Explore More

Blog

Establishing trust in Open Banking through Identity Verification

Over the last few years, open banking is becoming an emanated global trend. This rising trend is ...

Establishing trust in Open Banking through Identity Verification Explore More

Blog

COVID Passports – Bringing Convenience to the Travel & Tourism Sector

“Sorry, the earth is closed today.”  Tony Stark’s sarcastic dialogue became the worst possible re...

COVID Passports – Bringing Convenience to the Travel & Tourism Sector Explore More

Blog

Debunking the Top 7 Myths about Video KYC with CEO of Shufti

Businesses were looking for more robust and remote ways of verifying the identities of customers ...

Debunking the Top 7 Myths about Video KYC with CEO of Shufti Explore More

Blog

SEPA Instant Credit Transfer Schemes – Disrupting the Financial Sector in 2023

There is no denying the fact that the financial industry has vital importance in the contemporary...

SEPA Instant Credit Transfer Schemes – Disrupting the Financial Sector in 2023 Explore More

Blog

UK Elections: Photo ID Law Change Raising Concerns for Voters

Law changes bring several hassles for the public and government authorities. The recent photo ID ...

UK Elections: Photo ID Law Change Raising Concerns for Voters Explore More

Blog

5 Ways how IDV Provides an Active Defense Against Fincrime

Identity theft, account takeovers, and data breaches… The world has seen enough cybercrime ...

5 Ways how IDV Provides an Active Defense Against Fincrime Explore More

Blog

10 High-Risk Jurisdictions for Money Laundering According to FATF

Innovations like stablecoins and non-fungible tokens (NFTs) created quite the hype in the past ye...

10 High-Risk Jurisdictions for Money Laundering According to FATF Explore More

Blog

AML Verification Services: Fighting Back Financial Crimes in 2023

The Covid-19 outbreak has increased reliance on eCommerce and digital banking — cultivating a lus...

AML Verification Services: Fighting Back Financial Crimes in 2023 Explore More

Blog

5 Effective Ways Shufti Combats First-party Fraud

After analysing fraud incidents of the previous year and the current one, we observed an interest...

5 Effective Ways Shufti Combats First-party Fraud Explore More

Blog

Video KYC Verification | The Hassle-Free Process of Authenticating Identities

Digital onboarding these days is getting tougher for firms working and managing their business op...

Video KYC Verification | The Hassle-Free Process of Authenticating Identities Explore More

Blog

How Two-Factor Authentication Enhances the Security of Digital Business Platforms

Considering the recent trends in fraudulent activities, it is evident that social engineering and...

How Two-Factor Authentication Enhances the Security of Digital Business Platforms Explore More

Blog

CBN Regulatory Regime – New KYC/AML Requirements Payment Services Banks

With the increased risk of financial crime, banks and other financial institutions within a state...

CBN Regulatory Regime – New KYC/AML Requirements Payment Services Banks Explore More

Blog

The Ultimate KYC Checklist for 2023 to Ensure Regulatory Compliance

Non-compliance cost businesses billions of dollars. Regulators have charged financial firms with ...

The Ultimate KYC Checklist for 2023 to Ensure Regulatory Compliance Explore More

Blog

Divergent AML/CFT Rules and Cross-border Payment Challenges – What FATF Has to Say?

While addressing AML/CFT requirements for cross-border payments, the global financial watchdog, F...

Divergent AML/CFT Rules and Cross-border Payment Challenges – What FATF Has to Say? Explore More

Blog

EDD: Safeguarding Business Interests with Comprehensive Risk Mitigation

Traditional due diligence practices may not provide sufficient insights into higher-risk business...

EDD: Safeguarding Business Interests with Comprehensive Risk Mitigation Explore More

Blog

Top Applications of Facial Recognition Technology in the Digital Age

Facial recognition technology is biometric security in which an individual’s physical trait...

Top Applications of Facial Recognition Technology in the Digital Age Explore More

Blog

The Importance of Online Address Verification in E-Commerce

The rise of digitisation has given hackers more means to surpass security systems and conduct hig...

The Importance of Online Address Verification in E-Commerce Explore More

Blog

Japan’s AML/CFT Assessment – August 2021 Report

Financial crime is soaring sky high with digitisation becoming a part of our daily lives. Cyber a...

Japan’s AML/CFT Assessment – August 2021 Report Explore More

Blog

The Crucial Role of Ongoing Monitoring in Risk Mitigation

The nature of a business-to-clientele relationship subjects organisations to significant risks. F...

The Crucial Role of Ongoing Monitoring in Risk Mitigation Explore More

Blog

Is Your Company Safe? The Importance of Document Verification to Strengthen KYC Checks

Businesses across the globe are still vulnerable to threats like money laundering, terrorist fina...

Is Your Company Safe? The Importance of Document Verification to Strengthen KYC Checks Explore More

Blog

Implementation of AML compliance – Challenges and fundamentals

With the advancement in security controls, financial businesses are becoming fraud and stress-fre...

Implementation of AML compliance – Challenges and fundamentals Explore More

Blog

Know Your Investor (KYI) – Onboarding the Right Investors for Your Business

In today’s tech-driven world, financial operations are being transformed by emerging digital solu...

Know Your Investor (KYI) – Onboarding the Right Investors for Your Business Explore More

Blog

How Identity Verification Eliminates Social Media Scams to Enhance User Experience

Social media has experienced exceptional growth in the past decade as a result of advancements in...

How Identity Verification Eliminates Social Media Scams to Enhance User Experience Explore More

Blog

Reshaping the Travel Industry with NFC Verification – How Shufti Can Help

With emerging technologies and the increasing use of digital services, the travel industry has be...

Reshaping the Travel Industry with NFC Verification – How Shufti Can Help Explore More

Blog

Designing a Risk-free Customer Onboarding Flow for the Freelancing Industry

Freelancing websites saw an increased demand during the pandemic, and the trends continued to ris...

Designing a Risk-free Customer Onboarding Flow for the Freelancing Industry Explore More

Blog

FinCEN Files – Banks abandoning front-line defenses against money laundering

Banks and financial institutions are under the continuous scrutiny of regulatory authorities, yet...

FinCEN Files – Banks abandoning front-line defenses against money laundering Explore More

Blog, Financial Crime / AML

Global AML Regimes – Tightening Reins on Money Launderers

Money laundering is a global menace. Money laundering and terrorist financing are the major targe...

Global AML Regimes – Tightening Reins on Money Launderers Explore More

Blog

6 Upcoming Trends In Blockchain And Cryptocurrency For 2021

2020 was unlike any other year. It was chaotic, happening, and has finally come to an end. In the...

6 Upcoming Trends In Blockchain And Cryptocurrency For 2021 Explore More

Blog

Here’s to 2021 – NFTs Conquering the Crypto Market

From DeFi’s in 2020 to NFTs in 2021, a lot has changed in the crypto market. Since the beginning ...

Here’s to 2021 – NFTs Conquering the Crypto Market Explore More

Blog, Reg Tech

How Identity Verification Services make Regulatory Compliance Easier?

Financial institutions and banks have ended up in a loop of dumping billions of dollars because o...

How Identity Verification Services make Regulatory Compliance Easier? Explore More

Blog, Identity & KYC

What are the Different Types and Solutions of ID Verification?

Customer identification is not an option for some businesses, it’s a must. Ignoring due diligence...

What are the Different Types and Solutions of ID Verification? Explore More

Blog

Deutsche Bank’s Epstein Fine – Lesson for Financial Institution

High-risk clients pose a serious threat to banks. Over the past few years, a significant number o...

Deutsche Bank’s Epstein Fine – Lesson for Financial Institution Explore More

Blog

Digital COVID Pass: Automated COVID Report Verification

The worsening situation of the pandemic has forced authorities to impose restrictions on several ...

Digital COVID Pass: Automated COVID Report Verification Explore More

Blog

OCR Vs. ICR: The Key Differences that Businesses Need to Know

Financial institutions need to have reliable and efficient data management. With such a system, t...

OCR Vs. ICR: The Key Differences that Businesses Need to Know Explore More

Blog

What is an OCR Screening and How Does it Work?

In our digital environment, where automated technology has already taken over corporate processes...

What is an OCR Screening and How Does it Work? Explore More

Blog

Age Verification for Social Media – Protecting the Younger Victims of Online Scams

With a significant majority of students diverting from their usual school routines due to the COV...

Age Verification for Social Media – Protecting the Younger Victims of Online Scams Explore More

Blog

Fighting Fraud in Gaming & Gambling Industry with AML Screening Services

The online gaming sector is on the roll and is projected to surpass $172.23 billion by 2030. Irre...

Fighting Fraud in Gaming & Gambling Industry with AML Screening Services Explore More

Blog

Inside the EU’s New Crypto-Assets Regulatory Regime – How Shufti Can Help

With transforming technologies, the use of cryptocurrency is skyrocketing, and a large number of ...

Inside the EU’s New Crypto-Assets Regulatory Regime – How Shufti Can Help Explore More

Take the next steps to better security.

Contact us

Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

Contact us

Request demo

Get free access to our platform and try our products today.

Get started