Read More about fast-id page

Shufti globally launches webinr-icon - a new kind of identity solution!

Shufti globally launches - a new kind of identity solution!

Read more

Why You Need to Verify Identity Online

verify identity compress

5 Unusual Ways Stolen Identities Can be Used Online

The need to verify identity in the digital space has arisen rapidly in the past few years. Here’s a scenario that will make it clear:

Imagine this you’re sitting at home relaxing and watching TV, suddenly there is a knock on the door and you ask who it is and you hear a voice that says, “Open up, this is the FBI”. Well, that would be something that would get your heartbeat racing. When you open the door to let them in and they speak to you and say that you are involved in suspicious activities related to a terrorist organisation. Now, that’s something to give you a heart attack especially if you have no idea what they are talking about. When you tell them exactly that, they show you your social media page. You look at it, see its your picture and your name, but you don’t recognise the cover picture or the multitude of posts that show your support for a popular terrorist group. That’s when you realise that your identity has been stolen and used to create this fake social media profile.

The case above is based on a true story that was a revenge scenario but still it is a crime. Although, social media sites are working towards KYC verification processes it still needs a lot of improvement before they can put an effective stop to such incidences.

As we proceed in this article we will look at five unusual ways stolen identities can be used online. This will make the case for the need to verify identity online. Some of the cases mentioned below have actually happened.

Free Airline Rides

Imagine this you have been accumulating bonus miles with your favourite airliner and then you see after a while that your miles have been utilised and that you have taken flights and upgrades that you never knew about. You check through the details and find out the address and other account details are changed. Well, guess what your identity has been stolen and the thief has changed the email to a fake one.  One would think that there would be an added layer of security, especially when you are about to make changes to your profile; like a system that would verify identity online.

Free Doctor Checkup

The Internet is a powerful medium where more and more businesses and service providers are turning to cater their customers and clients. For example, did you know you can get an online consultation with a medical doctor? Well, that is the case, a person started getting bills on his credit card for doctor consultations. I mean this is something you would remember, no? Somebody had impersonated him and using his credit card had had consultations with an online doctor. Eventually the impersonator was caught but the idea in itself was pretty new.

Getting Away with a Crime

Imagine you knew a secret about someone. You know that they would pay for something like that to go away. Yes, we’re talking about blackmail. There have been reported cases where a stolen identity was used to extort money. A fake bank account based on the victim’s identity was created and extorted money was transferred and used via cards made on the name of the stolen identity. If identity theft wasn’t a crime on its own they went on to go for extortion and blackmail as well. The awful part is, this was done online without the presence of any individual.

Profiting on Your Taxes

One person’s loss is another person’s gain. In this case loss of identity critical information such as your social security number to a stranger. This type although unusual is very much common. People use the stolen identity of a person including their social security number and use it to request a tax return claiming a fraudulent refund. Usually, if the IRS receives the fraudulent return before you file, the IRS will send your refund check to the first person in this case the identity thief. It is the thief who profits from the claim and the victim looses out on money. All this can be easily countered if there is a mechanism to verify identity easily.

Free Electricity

Identity thieves take advantage of people with good credit score to secure free electricity. Using a fake billing address, the stolen identity and financial details of the victim they apply online for a change of electricity service provider. As is with most companies they see the score and start supplying the electricity. The victim never realises that their information has been compromised until the collectors come knocking by that time the thief has already moved on to another victim. If only these online utility service providers would verify identity online.

How you can Verify Identity to Protect Yourself

Having mentioned some of the unusual ways that identity thieves use stolen identities we need to discuss upon the importance of keeping one’s information safe and secure:

As a general rule of thumb, do not give away information over websites unless you know them to be trustworthy and secure. Also, be aware of individuals representing government agencies and companies asking for your social security number over the phone. Do not give sensitive information over the phone.

Review your credit report at least quarterly.

Keep your Social Security number private.

If your information has been compromised, contact your bank, the companies in concern as well as the collection agencies and credit score companies. Contact your lawyer for further legal advice.

Inquire About Security Measures

Ask companies that store your personal and sensitive information regarding what security measures they have placed to prevent online identity theft and impersonation. Get two-step verification wherever there is an option. Financial institutions as well as utility bill providers that have online account opening services have the option of opting for third-party ID verifiers.  Such companies check for forgeries through live documentation checking and matching via their KYC verification process.

Recommended For You:

Related Posts

Blog

Proof of Income: The Most Common Types of Documents Used to Determine a Client’s Financial Status

Proof of income is a vital requirement in many financial and professional contexts. Recently, the...

Proof of Income: The Most Common Types of Documents Used to Determine a Client’s Financial Status Explore More

Blog

The Priorities – FinCEN Issues First Governmentwide AML/CFT Guidelines

What is the Goal of FinCEN’s AML/CFT Priorities?CorruptionCybercrimeFraudProliferation FinancingT...

The Priorities – FinCEN Issues First Governmentwide AML/CFT Guidelines Explore More

Blog

Facial Recognition | The Principles of Responsible Use and the Legal Landscape

One of the most popular uses of AI nowadays is facial recognition. In all likelihood, it’s ...

Facial Recognition | The Principles of Responsible Use and the Legal Landscape Explore More

Blog

Contact-free ID authentication – combating fraud during COVID-19 outbreak

Coronavirus outbreak, which was initially thought of as some sort of common flu in the Chinese ci...

Contact-free ID authentication – combating fraud during COVID-19 outbreak Explore More

Blog

Securing Identities in the Age of AI with Identity Verification

The digital age has offered unprecedented convenience and connection, but it has also introduced ...

Securing Identities in the Age of AI with Identity Verification Explore More

Blog

The need for identity verification solutions spiking in demand

At present, we are living in a digital world. Everyone is on the internet which is an anonymous s...

The need for identity verification solutions spiking in demand Explore More

Blog, Identity & KYC

Online Age Verification Keeps A Tight Rein On Minors

According to The Newyork Times, online age verification is a daunting task, even for experts. How...

Online Age Verification Keeps A Tight Rein On Minors Explore More

Blog

How ID Verification Helps in Fighting Digital Scams?

ID VERIFICATION: Digital scams are common phenomena and it affects all types of businesses in eve...

How ID Verification Helps in Fighting Digital Scams? Explore More

Blog

AML Compliance in the Insurance Sector – Red Flags to Look Out For

The insurance sector commonly faces criminal activities like money laundering and terrorist finan...

AML Compliance in the Insurance Sector – Red Flags to Look Out For Explore More

Blog

Blockchain and Identity Theft: Potential Challenges and how to Tackle Them

Blockchain has become increasingly popular because of its potential to provide secure transaction...

Blockchain and Identity Theft: Potential Challenges and how to Tackle Them Explore More

Blog

Understanding False Positives in AML Transaction Monitoring

Financial institutions such as banks, neo-banks, insurance companies, investment companies, finte...

Understanding False Positives in AML Transaction Monitoring Explore More

Blog

Forensic Document Verification Solutions – A Key Step in Eliminating Identity Fraud

With emerging technologies, the demand for online services and products is skyrocketing, raising ...

Forensic Document Verification Solutions – A Key Step in Eliminating Identity Fraud Explore More

Blog, Identity & KYC, Online Marketplace

Why 2 Factor Authentication is vital for Online Identity Risk Management?

Online identity risk management is becoming harder and harder on cyberspace. It is a headache for...

Why 2 Factor Authentication is vital for Online Identity Risk Management? Explore More

Blog, Business Technology

Identity Verification Fuels Growth of Ride Sharing Industry

The ride-sharing industry is growing at a huge pace. As per Orbi’s research, the ride-shari...

Identity Verification Fuels Growth of Ride Sharing Industry Explore More

Blog, Financial Crime / AML, Identity & KYC

5AMLD: Implications for Cryptocurrency

What is 5AMLD? As part of the Action Plan against terrorism, the 5th Anti-Money Laundering Direct...

5AMLD: Implications for Cryptocurrency Explore More

Blog, Online Marketplace

Why age verification matters to online businesses?

Identity verification services are fast becoming a business norm for companies that are enthusias...

Blog

Safeguarding Ride-Hailing Services with Identity Verification Solutions

With the global digitization, mobility services are known to the world before the pandemic has ir...

Safeguarding Ride-Hailing Services with Identity Verification Solutions Explore More

Blog

Source of Funds | A Critical Step in Mitigating the Risk of Money Laundering

As the world continues on a path of digitization, business operations persist to undergo signific...

Source of Funds | A Critical Step in Mitigating the Risk of Money Laundering Explore More

Blog

COVID Passports – Bringing Convenience to the Travel & Tourism Sector

“Sorry, the earth is closed today.”  Tony Stark’s sarcastic dialogue became the worst possible re...

COVID Passports – Bringing Convenience to the Travel & Tourism Sector Explore More

Blog

Liveness Detection | An Extra Layer of Protection Against Spoofing and Fraud

The consumer demand for biometric and facial authentication technologies is rising, with the mark...

Liveness Detection | An Extra Layer of Protection Against Spoofing and Fraud Explore More

Blog

5 reasons why passwords are no more safe – What’s next?

Online platforms are using passwords to secure the privacy and data of their users – but ar...

5 reasons why passwords are no more safe – What’s next? Explore More

Blog

Enhanced Digital Security with Facial Recognition and Liveness detection

The increasing number of cyber-attacks and online fraud calls out for strong security measures. U...

Enhanced Digital Security with Facial Recognition and Liveness detection Explore More

Blog, Online Marketplace

Why age verification matters to online businesses?

Identity verification services are fast becoming a business norm for companies that are enthusias...

Blog

All You Need to Know About Facial Recognition

Rapid digitisation over the past few years has led to the adoption of facial recognition for many...

All You Need to Know About Facial Recognition Explore More

Blog, Identity & KYC

What are the Different Types and Solutions of ID Verification?

Customer identification is not an option for some businesses, it’s a must. Ignoring due diligence...

What are the Different Types and Solutions of ID Verification? Explore More

Blog

Mobile Payments – Way of the Future or a Fad of the Digital Age?

Are we moving towards a world where retailers may one day say “We don’t take cash”? As mobile pay...

Mobile Payments –  Way of the Future or a Fad of the Digital Age? Explore More

Blog

Ensuring Compliance and Preventing Losses Due to Fraud in the Banking Sector

Banks are thought to be the most important part of the financial system, playing a vital role in ...

Ensuring Compliance and Preventing Losses Due to Fraud in the Banking Sector Explore More

Blog

How the US Aims to Fight Financial Crimes and Global Corruption in 2022

2022 is looking like the year of change in the USA when it comes to combating illicit financial c...

How the US Aims to Fight Financial Crimes and Global Corruption in 2022 Explore More

Blog

Top 10 AML Trends to Watch for in 2022

In 2021, the increasing scope of regulatory sanctions has affected businesses globally. The use o...

Top 10 AML Trends to Watch for in 2022 Explore More

Blog

Digital Passports Driving the need for Biometric Verification at Airports

Digital or chipped biometric passports have automated the verification process at airports. The e...

Digital Passports Driving the need for Biometric Verification at Airports Explore More

Blog

Card-Not-Present (CNP) Fraud – How to Prevent False Chargebacks?

The eCommerce industry continues to grow rapidly, so are fraudulent activities. According to Stat...

Card-Not-Present (CNP) Fraud – How to Prevent False Chargebacks? Explore More

Blog

Fraud Prevention – Challenges, Strategies, Best Practices, and Technologies

The twenty-first century is by far the most revolutionary time in the history of humans in terms ...

Fraud Prevention – Challenges, Strategies, Best Practices, and Technologies Explore More

Blog, Online Marketplace

How Identity Verification Makes Remote Account Opening Efficient for Banks

Banks have a lot to benefit from the remote account opening service as it allows them to bring a ...

How Identity Verification Makes Remote Account Opening Efficient for Banks Explore More

Blog

How Can You Make Your Onboarding Process Cost-Effective?

The customer onboarding process can cost your business a fortune if it is complex. In the modern ...

How Can You Make Your Onboarding Process Cost-Effective? Explore More

Blog

Post-pandemic eCommerce Landscape Calling for Robust ID Verification Solution

During the coronavirus pandemic, the e-commerce industry has witnessed a significant increase in ...

Post-pandemic eCommerce Landscape Calling for Robust ID Verification Solution Explore More

Blog

How Artificial Intelligence is taking ID verification to the next level?

Identity theft is deemed as a growing problem. Particularly with the increase in online shopping,...

How Artificial Intelligence is taking ID verification to the next level? Explore More

Blog

Art Market in the Frame of Money Laundering

The highly volatile finance and crypto sector is not appealing for many investors, so they turn t...

Art Market in the Frame of Money Laundering Explore More

Blog

KYC Verification – The Need for Customer Due Diligence in Co-Working Spaces

The development of coworking platforms has led to a business transformation that brings security ...

KYC Verification – The Need for Customer Due Diligence in Co-Working Spaces Explore More

Blog

Know Your Patient (KYP) | Significance in Fighting Patient Identity Theft & Scams

The global medicare industry is a common target for fraudsters looking to gain access to patients...

Know Your Patient (KYP) |  Significance in Fighting Patient Identity Theft & Scams Explore More

Blog

KYC in 2021 – Shaking Things Up in the Financial World

Despite the considerable investments made by industry leaders, KYC is still a challenge in the fi...

KYC in 2021 – Shaking Things Up in the Financial World Explore More

Blog

5 Key Cybersecurity Threats for 2020

Cybersecurity threats have become remarkably common and they continue to gain traction with the p...

5 Key Cybersecurity Threats for 2020 Explore More

Biometric Technology, Blog, Online Marketplace

Face Verification Becoming Vital For Travel Industry

Over the past few years, biometric technology has become increasingly mainstream. This is due in ...

Face Verification Becoming Vital For Travel Industry Explore More

Blog

AML Screening – Identifying and Overcoming Challenger Banks’ Weaknesses

There are approximately 77 challenger banks in Europe alone, the best range amongst the other reg...

AML Screening – Identifying and Overcoming Challenger Banks’ Weaknesses Explore More

Blog

COVID-19 pandemic turning into a financial crime threat

A few months back when the World Health Organization (WHO) declared coronavirus a “pandemic” it l...

COVID-19 pandemic turning into a financial crime threat Explore More

Blog

Video KYC in 2024 | A Step Towards Digital Evolution

The striking surge in theft and fraud through digitisation is a growing concern for many business...

Video KYC in 2024 | A Step Towards Digital Evolution Explore More

Blog

AUSTRAC’s ML/TF Risk Assessment Report on Foreign Subsidiary Banks [Part 4]

This blog covers the last chapter of our four-part series on AUSTRAC’s money laundering and terro...

AUSTRAC’s ML/TF Risk Assessment Report on Foreign Subsidiary Banks [Part 4] Explore More

Blog

Identity Verification Isn’t Just for Compliance Anymore

Identity verification solutions are well-known in regulatory compliance environments, particularl...

Identity Verification Isn’t Just for Compliance Anymore Explore More

Blog

Top 5 Payment Trends Transforming the Commerce Sector in 2021

Financial markets across the globe saw many unpredictable changes due to the pandemic last year. ...

Top 5 Payment Trends Transforming the Commerce Sector in 2021 Explore More

Blog

Eradicating Financial Crimes in Online Gambling using NFC Verification

Emerging technologies have altogether revolutionized the online gambling industry and instead of ...

Eradicating Financial Crimes in Online Gambling using NFC Verification Explore More

Blog

10 factors shaping the identity verification industry in 2020

The identity verification industry is expected to grow steadily during the forecast period, reach...

10 factors shaping the identity verification industry in 2020 Explore More

Blog

Securing Telehealth Services and Fighting Identity Fraud with Shufti’s ID Verification Solution

The telehealth industry has been completely revolutionized by services ranging from medical essen...

Securing Telehealth Services and Fighting Identity Fraud with Shufti’s ID Verification Solution Explore More

Blog

Online Payment Fraud and the Role of AML Transaction Monitoring

Imposing travel restrictions worldwide after the COVID-19 pandemic led to an unprecedented surge ...

Online Payment Fraud and the Role of AML Transaction Monitoring Explore More

Blog

How Optical Character Recognition Improves the Process of Identity Verification for Businesses

Evolving technologies have created a competitive market where every business strives to optimize ...

How Optical Character Recognition Improves the Process of Identity Verification for Businesses Explore More

Blog

Impact of Beneficial Ownership Transparency on Real Estate Crimes

The high price tags of real estate in the US open doors for corrupt politicians, kleptocrats, and...

Impact of Beneficial Ownership Transparency on Real Estate Crimes Explore More

Blog

What To Consider When Implementing Forensic Document Verification Services

As the demand for digital products and services has skyrocketed, so does the need for verificatio...

What To Consider When Implementing Forensic Document Verification Services Explore More

Blog

Customer Risk Assessment: Strengthening Security in the Digital Age

Business partners, vendors, and third parties play essential roles in daily operations, contribut...

Customer Risk Assessment: Strengthening Security in the Digital Age Explore More

Blog

AML Compliance for the Crypto Sector – How VASPs Can Adhere to the Regulations

With cryptocurrencies gaining traction and entering the mainstream, financial regulators are asse...

AML Compliance for the Crypto Sector – How VASPs Can Adhere to the Regulations Explore More

Blog

Lithuania’s AML Regulations – How the EU’s FinTech Hub Prevents Financial Crime

Emerging FinTech firms around the world spend almost one-third of their overall budgets on develo...

Lithuania’s AML Regulations – How the EU’s FinTech Hub Prevents Financial Crime Explore More

Blog, Fraud Prevention

Face Verification Technology Grooving in the Education Sector

We are now in a golden age of face recognition. The main reason for rapid adoption is recognition...

Face Verification Technology Grooving in the Education Sector Explore More

Blog

UK’s Digital Identity Framework – Cornerstone of Reliable ID

In today’s technology-driven era, digital identity is becoming inevitable. Physical interactions ...

UK’s Digital Identity Framework – Cornerstone of Reliable ID Explore More

Blog

Identity Verification vs Authentication: The Key Differences

Organisations today face significant concerns regarding data breaches and identity theft. Nearly ...

Identity Verification vs Authentication: The Key Differences Explore More

Blog

AML Screening – Combating Money Laundering in Luxury Vehicle Dealings

Financial criminals usually look for priceless items like art, antiquities, as well as luxury veh...

AML Screening – Combating Money Laundering in Luxury Vehicle Dealings Explore More

Blog

Top Cryptocurrency Trends to Look Out for in 2022

2021 has been a remarkable year for cryptocurrency as because of COVID-19 outbreak crypto industr...

Top Cryptocurrency Trends to Look Out for in 2022 Explore More

Blog

Impact of California Consumer Privacy Act on Online Businesses

California consumer privacy act has been revolutionizing consumer data regulations. The act was p...

Impact of California Consumer Privacy Act on Online Businesses Explore More

Blog

How machine learning changed facial recognition technology?

We are entering a new era of fast and secure authentication clubbed with a perfect storm of digit...

How machine learning changed facial recognition technology? Explore More

Blog

Document Verification Services – The Secret Sauce to Keep Fraudsters Away

Forging someone’s documents is something bad enough but selling them on the dark web is just rubb...

Document Verification Services – The Secret Sauce  to Keep Fraudsters Away Explore More

Blog

5 Technology Trends To Disrupt Banking in 2020

Living in the digital era, technology is driving major changes in almost every industry. Whether ...

5 Technology Trends To Disrupt Banking in 2020 Explore More

Blog

7 Best KYC and Fraud Prevention Tips for Online Businesses

With the explosion of internet and web applications, the online interaction between consumers and...

7 Best KYC and Fraud Prevention Tips for Online Businesses Explore More

Blog

Significance of Facial Recognition Technology in FinTech Fraud Detection

Compliance with Anti-Money Laundering (AML) requirements is challenging for financial organisatio...

Significance of Facial Recognition Technology in FinTech Fraud Detection Explore More

Blog

Shufti’s AML Screening Solution – How to Comply with Germany’s AML Regulations

The stability of the global economy is at risk pertaining to the rapidly growing issues of money ...

Shufti’s AML Screening Solution – How to Comply with Germany’s AML Regulations Explore More

Blog

Enhanced Due Diligence – How to Identify and Deal with High-Risk Customers

Business relationships always come with associated risks that require carefully implemented measu...

Enhanced Due Diligence – How to Identify and Deal with High-Risk Customers Explore More

Blog

A Statistical Analysis of Prevalent Crimes in the Global Financial Industry – [2022 Overview]

Over the past few years, the financial industry has witnessed significant technological changes, ...

A Statistical Analysis of Prevalent Crimes in the Global Financial Industry – [2022 Overview] Explore More

Take the next steps to better security.

Contact us

Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

Contact us

Request demo

Get free access to our platform and try our products today.

Get started