<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by FraudFighter on Medium]]></title>
        <description><![CDATA[Stories by FraudFighter on Medium]]></description>
        <link>https://medium.com/@fraudfighter?source=rss-7862ba80bc6------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*1SMYJoy_A_LMs7LA--4swA.png</url>
            <title>Stories by FraudFighter on Medium</title>
            <link>https://medium.com/@fraudfighter?source=rss-7862ba80bc6------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sun, 17 May 2026 19:31:11 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@fraudfighter/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Top 5 Ways to Keep Your Rental Equipment Safe from Theft and Fraud]]></title>
            <link>https://medium.com/@fraudfighter/top-5-ways-to-keep-your-rental-equipment-safe-from-theft-and-fraud-a8afe300a689?source=rss-7862ba80bc6------2</link>
            <guid isPermaLink="false">https://medium.com/p/a8afe300a689</guid>
            <category><![CDATA[theft]]></category>
            <category><![CDATA[equipment]]></category>
            <category><![CDATA[equipment-rental]]></category>
            <category><![CDATA[fraud-detection]]></category>
            <category><![CDATA[fraud]]></category>
            <dc:creator><![CDATA[FraudFighter]]></dc:creator>
            <pubDate>Thu, 30 May 2024 12:02:31 GMT</pubDate>
            <atom:updated>2024-05-30T12:02:31.642Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*zug0Wh6E-LbcQdzFi1hXzg.png" /></figure><p>No one wants to face a significant loss, especially in the equipment rental industry where the theft of just one piece of equipment can have a profound impact on your business. Lengthy police investigations, increased insurance premiums, and missed rental opportunities all contribute to the devastating effects of equipment theft. Therefore, it is crucial to safeguard valuable assets from fraud and theft.</p><p>By implementing robust security measures, you can protect your equipment and reduce the risk of unauthorized use or loss, ensuring the continuity of your business operations. Below, we will dive into some of the top ways to ensure your equipment is kept safe from criminals. These steps are paramount to ensuring the smooth operation and profitability of your business.</p><h3>The top 5 ways to keep your rental equipment safe:</h3><h3>1. Lighting &amp; Fencing:</h3><p>Enhancing the physical security of your rental equipment yard and store front with adequate lighting and secure fencing can act as a deterrent to potential thieves. Well-lit areas make it harder for criminals to operate under the cover of darkness, while sturdy fences help prevent unauthorized access to your premises. Making sure all your equipment is stored in these secure conditions can significantly decrease theft losses at your facility.</p><p>Although lighting may appear insignificant, any form of deterrence against criminals attempting to steal from your business is essential. Neglecting basic security measures only serves to make a thief’s job easier, which is something you definitely want to avoid.</p><h3>2. Video Surveillance:</h3><p>Installing video surveillance cameras in strategic locations within your rental equipment store / yard can serve as a valuable tool in deterring criminal activity and providing evidence in the case of theft. Make sure cameras are adequately spread out and keep in view all entrances / exits as well as high value equipment.</p><p>Cameras work as both a deterrent to criminals as well as an aid to investigators in the case of theft. By capturing footage of any suspicious behavior, you can assist law enforcement in investigating any incidents of theft that occur.</p><h3>3. Security Training:</h3><p>Providing comprehensive security training to your staff is essential in preventing fraud and theft. Educate your employees on how to recognize and respond to security threats, implement strict access control measures, and conduct regular security drills to ensure everyone is prepared to handle potential incidents effectively. Make sure employees are trained in all theft and fraud prevention tools used at your business.</p><h3>4. Asset Tracking System / GPS:</h3><p>While the methods we have mentioned above are all necessary to a secure equipment rental business, they do not address the issue of protecting assets that have left your facility. Investing in an asset tracking system or GPS technology allows you to monitor the location and movement of your rental equipment in real-time. In the event your equipment is stolen from your renter by criminals, you can use the GPS to track the whereabouts of your asset and quickly identify any suspicious activity or unauthorized use, enabling prompt action to be taken to recover the equipment.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*eBDtIwV7954_2Hcx.png" /></figure><p>GPS systems can vary significantly in the level of precision they provide in their results. The more accurate the location information they offer, the more beneficial they are. GPS systems with a wider mile radius of where your equipment is located are less effective for tracking down stolen equipment. In such cases, law enforcement may struggle to take action if they lack precise location details.</p><h3>5. ID Authentication:</h3><p>Despite having a GPS system in place, your business remains vulnerable to the risk of a dishonest renter failing to return the equipment. Many insurance companies classify a renter keeping the equipment as “voluntary parting,” which is seen as a form of fraud rather than theft. In such scenarios, you may find yourself in a challenging position with no recourse for reimbursement or replacement if a customer fails to return the equipment.</p><p>Fortunately, establishing a comprehensive identity verification procedure for customers renting your equipment can aid in confirming their identity and deterring fraudulent activities. By mandating customers to present valid identification (like a driver’s license or passport) during the rental process, followed by verification through an ID authentication system (such as PALIDIN), which conducts numerous authenticity tests and cross-checks with a global ID database, you can mitigate the chances of identity theft and unauthorized rentals.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1000/0*7uIPZ5Aruav7xgUw.jpg" /></figure><p>Frequently, this measure alone serves as a deterrent to individuals intending to use a counterfeit or stolen ID for renting purposes. Those who believe their sophisticated fake ID can bypass scrutiny are in for an unwelcome revelation when they receive a “FAILED” outcome.</p><p>In the event where a customer uses their legitimate ID and later fails to return a piece of equipment, you can provide the transaction report generated during the initial ID scan to aid law enforcement in their efforts to track down the criminal.</p><h4>Summary:</h4><p>By integrating these 5 essential security protocols into your rental equipment business, you can effectively diminish the risk of fraud and theft, fortify your assets, and uphold the confidence of your clientele. Emphasizing security measures not only safeguards your financial standing but also elevates the standing and endurance of your enterprise within the competitive equipment rental sector.</p><p><em>Originally published at </em><a href="https://blog.fraudfighter.com/top-5-ways-to-keep-your-rental-equipment-safe-from-theft-and-fraud"><em>https://blog.fraudfighter.com</em></a><em>.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a8afe300a689" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Do you need fraud prevention at your equipment rental business?]]></title>
            <link>https://medium.com/@fraudfighter/do-you-need-fraud-prevention-at-your-equipment-rental-business-d709d5e709cd?source=rss-7862ba80bc6------2</link>
            <guid isPermaLink="false">https://medium.com/p/d709d5e709cd</guid>
            <category><![CDATA[equipment]]></category>
            <category><![CDATA[fraud-detection]]></category>
            <category><![CDATA[fraud]]></category>
            <category><![CDATA[equipment-rental]]></category>
            <category><![CDATA[fraud-prevention]]></category>
            <dc:creator><![CDATA[FraudFighter]]></dc:creator>
            <pubDate>Wed, 15 May 2024 13:01:05 GMT</pubDate>
            <atom:updated>2024-05-15T13:01:05.977Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ODZt9qYaDfOCB9EBL5MLOg.png" /></figure><p>You might be asking yourself; do I really need to pay for another service? Sometimes it seems like all the costs required to run a business don’t have an equal benefit. People will tell you that you need robust marketing (such as a fancy website, Google Ads and more), accounting systems, and even more robust theft prevention (such as GPS trackers for equipment and special locks). So, on top of all of that, is additional fraud prevention necessary or just a waste of money?</p><p>In this article we will dive into a few scenarios you might find yourself in and take an in-depth look into fraud prevention.</p><p>Scenario 1: You haven’t been hit by fraud.</p><p>Great news! This is the ideal situation and we’re happy your business hasn’t been targeted by criminals yet. Your good fortune could be due to a variety of factors. Perhaps you already have implemented a fraud prevention system that has stopped any fraudulent transactions from going through.</p><p>Or perhaps you run an operation in a small town, and feel you know most, if not all, of the customers who come into your business. Occasionally, someone you don’t recognize comes in and rents from you, but so far you haven’t suffered any losses due to stolen equipment. That’s wonderful! If only fraudsters knew how to leave a good thing alone…</p><p>Scenario 2: That other rental equipment company got hit.</p><p>You’ve heard from others that an equipment company a few towns over was hit with a 10k+ loss when a piece of their equipment was not returned by someone using a Fake ID at the time of renting.</p><p>The circumstances for your business may be different than theirs. The rental company may have been in a larger town, or more lackadaisical about its theft prevention. Your business might already have a GPS tracking system, secure locks, and security cameras. In that case, you should be good even if someone were to never return your equipment, right?</p><p>Scenario 3: You experience a loss.</p><p>Maybe you went years without being targeted by fraudsters, but today it finally happened. A piece of your equipment was never returned by one of your customers. The good news is you have GPS trackers on your equipment, and you know right where it is. Your local police might have the time and resources to investigate and get it back for you, which would be great. However, that’s not always the case, as we’ve heard our fair share of stories from clients where a GPS location wasn’t enough for the stretched-thin local authorities to investigate the fraud.</p><p>So now you are out $10,000+ for the equipment.</p><p>You would think this is where your insurance would come in. Unfortunately, many equipment insures have loopholes for this <a href="https://support.sharegrid.com/en/articles/734006-what-if-a-renter-is-unresponsive-and-does-not-return-my-equipment">particular type of theft </a>. Unreturned equipment (as opposed to equipment that was stolen from the equipment rental business or the renter) is often considered “voluntary parting,” a type of <strong>fraud </strong>and not theft, and is therefore not covered under the policy. Even on the off chance that your insurance does cover fraud, you could be hit with costly premium hikes going forward. Furthermore, most plans have a deductible. So, in addition to losing the initial piece of equipment, now you must pay the deductible before you receive any assistance from your insurance company in terms of monetary relief.</p><p>Even if your business has never found itself in this 3rd scenario, there is a good chance it will be in the future. So, let us look at the ways to avoid “voluntarily parting” with tens of thousands of dollars.</p><p>How does Fraud Prevention help avoid scenario 3?</p><p>If you do any research on the matter, you will see there are several different methods out there to prevent fraud (data checks, AI, ID verification, etc.). To keep it simple, we will focus on simple ID Authentication, which is where you ensure that the physical ID (such as a Driver’s License or Passport) is real and authentic. This type of fraud prevention is more straightforward and prevents fraudsters who might use real stolen data to pass data checks.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*gBt65run6RC9nNU1.png" /></figure><p>Let’s dive into the 3 main benefits of ID Authentication:</p><p>Deterrence</p><p>Adding an ID scanner at your rental counter can deter criminals from attempting to go through with the rental in the first place. For these fraudsters, it’s one thing to have a convincing fake ID that they were planning to use to steal your equipment. It is another to watch you conduct a live authentication scan of that fake ID right there while they stand in the store.</p><p>If a customer was planning to steal the equipment after renting with their actual ID, this step can be a deterrence as well. The ID authentication system has the ability to save scans that can later be presented to law enforcement. We’ll circle back to this point in a moment.</p><p>Catching Fake IDs</p><p>If the fraudster decides to go through with the transaction, the ID scanning system will run dozens of forensic tests on the document and reference them against a robust global document library for comparison. If the document result comes up as FAILED, you’ll know something fishy is going on and can avoid renting and losing your equipment.</p><p>Record Keeping</p><p>ID Authentication systems, such as <a href="https://palidin.fraudfighter.com/">PALIDIN </a>, allow you to keep transaction reports of scans that were conducted. These reports can be saved with your other rental paperwork (such as the equipment rental agreement) or stored individually. Transaction reports can be crucial in the event of finding a fake ID (which you could then share with law enforcement).</p><p>Even if a piece of equipment is fraudulently kept by a renter who used a valid real ID, the transaction report could be the extra piece of information the police would need in their investigation. Ensuring your equipment is found and returned to you in a timelier manner.</p><p>Like GPS trackers, fraud prevention doesn’t solve it all, but it is a necessary addition to your loss prevention strategy. The benefits of ID Authentication outweigh the cost and can ultimately save your business from $10k+ of losses.</p><p>Interested in learning more about a solution that could be right for you? Reach out to our dedicated <a href="https://palidin.fraudfighter.com/contact-us">fraud prevention team </a>.</p><p><em>Originally published at </em><a href="https://blog.fraudfighter.com/do-you-need-fraud-prevention-at-your-equipment-rental-business"><em>https://blog.fraudfighter.com</em></a><em>.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=d709d5e709cd" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[3 Best Fraud Prevention Practices for Dealerships]]></title>
            <link>https://medium.com/@fraudfighter/3-best-fraud-prevention-practices-for-dealerships-4986593f8809?source=rss-7862ba80bc6------2</link>
            <guid isPermaLink="false">https://medium.com/p/4986593f8809</guid>
            <category><![CDATA[fraud]]></category>
            <category><![CDATA[fraud-prevention]]></category>
            <category><![CDATA[cars]]></category>
            <category><![CDATA[dealership]]></category>
            <category><![CDATA[identity-theft]]></category>
            <dc:creator><![CDATA[FraudFighter]]></dc:creator>
            <pubDate>Fri, 26 Apr 2024 12:52:07 GMT</pubDate>
            <atom:updated>2024-04-26T12:52:07.788Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*beNEQJz8ierc-gfP4btQMA.png" /></figure><p>The reality is identity fraud has and will continue to rise. Over recent years, we have seen fraudsters consistently come up with more elaborate schemes to steal or fabricate identities. With these imposter IDs they then defraud businesses. Unfortunately, the auto industry is no exception to the trend, and as we discussed in our recent article, <a href="https://blog.fraudfighter.com/the-alarming-rise-of-car-theft-due-to-fraud">The Alarming Rise of Car Theft Due to Fraud (fraudfighter.com) </a>, car theft due to fraud has been on the rise with over 80,000 cars stolen in 2023 alone using this method.</p><p>On top of the alarming quantity, each stolen vehicle can cost a dealership a considerable amount in losses (on average about $100K) due to the original car value, insurance premiums, and time/resources invested into the car’s recovery. How can dealerships battle the ever-growing problem of fraud? While we have our own ideas, we thought we’d reach out to some of the dealerships who use our software and see what practices and procedures have been working for them.</p><p>Below, we have three of the most common responses from our customers:</p><p><strong>Scan ALL Drivers’ Licenses</strong></p><p>Many of the dealerships said they have a strict policy of ensuring all drivers’ licenses are scanned through an identity authentication system (such as PALIDIN). The system helps stop fraudsters by running over 36+ forensic level tests and data crosschecks on the various security features of the document to ensure authenticity. This step is therefore crucial in ensuring fake IDs do not slip through. Below is a graphic showing some of the features that can be found on an ID.</p><p>On top of the features displayed above, there are many additional security features which are invisible to the naked eye such as infra-red, Ultraviolet (UV), or magnetic ink. While sophisticated fraudsters may be able to copy some of these details on their fakes, most will still fail several tests when put through a robust ID scanner and authentication system.</p><p><em>When should the ID scan be conducted? </em>Depends on the policies at your dealership. While some of our clients scan licenses just before the auto purchase is made, others make sure to authenticate earlier in the process such as before a test drive is done by the prospect.</p><p><em>What if my client is remote? </em>Many of our dealerships use both PALIDIN Desktop and PALIDIN WebID to ensure scans can be done for customers no matter where they are located.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*sVe0widjlUNgKCiT.png" /></figure><p>PALIDIN Desktop is our in-branch solution that utilizes both a physical ID scanner and a computer desktop system to scan IDs. This system runs on an annual subscription with unlimited scans, making it the perfect choice for the majority of authentications done by our dealers. This system can be kept at the reception desk or even the desk where the deal is processed.</p><p>PALIDIN WebID on the other hand, is our solution for clients whose customers are conducting the transaction remotely. Our dealers simply send out a secure link to their customer who will then follow the prompts to scan their ID and take a live selfie of themselves. The system will then not only authenticate the ID, but will also do a facial match to make sure the person in the photo is in fact the owner of the ID. This solution works perfectly for customers who are getting the car delivered directly to them or scheduling a time to pick up their car from a lot.</p><p><em>What if the PALIDIN system goes down? </em>Our dealers recommend a few different steps depending on the situation. While our support is always ready to help, some dealerships require that management be informed of equipment issues before a sales representative reaches out to FraudFighter support. Many of our clients agree, that if for any reason a license cannot be scanned, management should be looped in before the deal is completed and a photocopy of the ID should be taken for records.</p><p><strong>Secure the scan results screen</strong></p><p>Our dealers know that keeping the Personal Identifying Information (PII) of their customers secure is of the upmost importance. This means limiting who sees and who has access to private information. Many dealers limit who can see the physical desktop monitor that displays ID scan results. Some ways to do this are to strategically position computer(s) to limit viewing access by the public and adding privacy screens to control which angles information can be seen from. Our clients do their part to ensure non-authorized people are not getting hold of private PII information.</p><p>PALIDIN Desktop also lets you control which information is shown on the results screen, giving you options to reduce the amount of PII displayed on the screen. Furthermore, scan results can be saved to a folder with a password requirement to prevent access from bad actors.</p><p><strong>Include a Copy of the Driver’s License with every deal</strong></p><p>Regulatory compliance is essential for many dealerships. Thus, keeping thorough records of scan results is critical. Many of our dealers have their own internal policies to ensure scan results are kept with the original deal information. While some print out all deals and scan results and file them securely away, others store them in digital folders and add the saved transaction report from PALIDIN. No matter the method it is saved, limiting PII displayed on the transaction report can also help to keep information safe. Our dealers have found that in general, the main information they need is as follows:</p><ul><li>Customer Name</li><li>Customer Address</li><li>Customer Date of Birth</li><li>DL#</li><li>DL Expiration Date</li><li>Passed Result</li></ul><p>While having a photo on the saved report is helpful, the personnel at the dealership are primarily responsible for confirming identity and ensuring the person in front of them matches the photo on the physical ID. Clear communication between reception, sales reps, and management is critical for stopping fraudsters and keeping the fleet safe.</p><p>By taking the steps outlined above, our customers have seen a sharp decrease in fraud both at their physical branches and during remote transactions. Got some killer fraud prevention tips of your own you’d like to share? Add a comment below!</p><p><em>Originally published at </em><a href="https://blog.fraudfighter.com/3-best-fraud-prevention-practices-for-dealerships"><em>https://blog.fraudfighter.com</em></a><em>.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=4986593f8809" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[The Shocking Truth About Unsecure Contractor Hiring Sites]]></title>
            <link>https://medium.com/@fraudfighter/the-shocking-truth-about-unsecure-contractor-hiring-sites-6a7602bc9b31?source=rss-7862ba80bc6------2</link>
            <guid isPermaLink="false">https://medium.com/p/6a7602bc9b31</guid>
            <category><![CDATA[fraud]]></category>
            <category><![CDATA[identity-theft]]></category>
            <category><![CDATA[home-renovation]]></category>
            <category><![CDATA[contractors]]></category>
            <category><![CDATA[fraud-detection]]></category>
            <dc:creator><![CDATA[FraudFighter]]></dc:creator>
            <pubDate>Tue, 30 Jan 2024 20:21:37 GMT</pubDate>
            <atom:updated>2024-01-30T20:21:37.625Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*p2U2Wr9DVPdWxfzdlAlj6w.png" /></figure><p>In today’s digital age, hiring a contractor for home improvement projects has become easier than ever. With just a few clicks, you can find numerous websites offering contractor services. However, not all these platforms prioritize security and identity authentication, leaving homeowners vulnerable to scams and fraudulent activities.</p><p>In this blog post, we will delve into the risks associated with unsecure contractors for hire sites and shed light on the potential dangers of hiring contractors without proper precautions.</p><h3><strong>The allure of convenience</strong></h3><p>Unsecure contractor hiring sites often boast of their user-friendly interfaces and easy account setup processes. They lure homeowners with promises of hassle-free contractor hiring, allowing both individuals and contractors to create accounts without rigorous identity verification. This convenience, however, comes at a cost, as it opens the door for scammers to exploit unsuspecting homeowners.</p><h3><strong>The perils of minimal identity verification</strong></h3><p>One of the major drawbacks of unsecure contractor hiring sites is the lack of stringent identity authentication protocols. Unlike reputable platforms that require contractors to provide valid licenses, certifications, and proof of insurance, unsecure sites often skip these crucial steps. This omission allows fraudulent individuals to create fake contractor profiles, posing as professionals but with malicious intent.</p><h3><strong>A cautionary tale</strong></h3><p>To illustrate the dangers of unsecure contractor hiring sites, let’s consider the unfortunate experience of a close friend. Our friend, excited about renovating their home, turned to one of these contractors for hire sites to find the right fit for an upcoming guest bathroom renovation project. They were enticed by the promises of quick and affordable services, overlooking the lack of identity authentication done for the contractor on the site they used. After selecting a contractor, they met with him in person and got his opinion and quote on the bathroom remodel. All seemed good and our friend promptly paid the deposit to get the project started. The contractor did some demolition that day and said he would be back in a day or two to continue the work. A week went by, and they still hadn’t heard back from the contractor even after numerous attempts to reach him. In due time, it became clear the contractor had vanished, leaving our friend with a half-finished project and a big financial loss.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*wm35owWoiLLfuBRw.png" /></figure><h3><strong>The prevalence of contractor scams</strong></h3><p>The story of our friend is, unfortunately, not an isolated incident. Numerous reports and articles highlight the prevalence of contractor scams on unsecure platforms.</p><p>While unsecure contractor hiring sites present risks, there are steps homeowners can take to protect themselves. First and foremost, it is crucial to research and choose reputable platforms that prioritize security and identity authentication. Additionally, homeowners should thoroughly vet contractors, requesting proof of licenses, insurance, and references. Seeking recommendations from trusted sources and reading online reviews can also help in making informed decisions.</p><h3><strong>To wrap it all up</strong></h3><p>While the convenience of contractor hiring sites may be tempting, it is essential to prioritize security and identity authentication when selecting professionals for home improvement projects. The cautionary tale of our friend and the numerous reported scams serve as reminders of the potential risks involved. By being vigilant, conducting thorough research, and choosing reputable platforms, homeowners can minimize the chances of falling victim to contractor scams and ensure a safe and successful home renovation experience.</p><p>Connect with us on ours social to stay up to date on the latest fraud trends!</p><p><em>Originally published at </em><a href="https://blog.fraudfighter.com/the-dangers-of-unsecure-contractor-hiring-sites-a-cautionary-tale"><em>https://blog.fraudfighter.com</em></a><em>.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=6a7602bc9b31" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Gaps Exposed in Gun Shop Background Checks and Ammunition Sales]]></title>
            <link>https://medium.com/@fraudfighter/gaps-exposed-in-gun-shop-background-checks-and-ammunition-sales-751a061efcac?source=rss-7862ba80bc6------2</link>
            <guid isPermaLink="false">https://medium.com/p/751a061efcac</guid>
            <category><![CDATA[identity-verification]]></category>
            <category><![CDATA[gun-control]]></category>
            <category><![CDATA[fraud]]></category>
            <category><![CDATA[fraud-detection]]></category>
            <category><![CDATA[identity-theft]]></category>
            <dc:creator><![CDATA[FraudFighter]]></dc:creator>
            <pubDate>Tue, 16 Jan 2024 20:21:32 GMT</pubDate>
            <atom:updated>2024-01-16T20:21:32.789Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*HySdkzSaBN08ORU2" /></figure><p>The U.S. Government Accountability Office (GAO) has been sending out undercover congressional investigators into gun shops nationwide since before 2000 to assess the effectiveness of Federal and state background checks for firearms purchases. What they uncovered has raised critical concerns about the vulnerabilities in the system and the potential dangers associated with firearms/ammunition sales.</p><p>Investigations revealed <a href="https://www.cbsnews.com/htdocs/pdf/gao_firearms.pdf">startling gaps</a> in the background check process at gun shops across the United States. These undercover congressional investigators, equipped with stolen information, successfully passed both Federal (NICS) and state background checks, highlighting the need for increased vigilance in the fight against gun violence.</p><p>The National Instant Criminal Background Check System (NICS) was designed to prevent individuals with criminal records, mental health issues, or other disqualifying factors from purchasing firearms. While it has been effective in many cases, the operation demonstrated that individuals armed with stolen identities can exploit these checks. Fraud has been a looming shadow on the industry for some time and no one is safe when considering the variety of means criminals have at their disposal to attack reputable businesses.</p><h3>Minors Accessing Ammunition</h3><p>In addition to the concerns about background checks, the investigation shed light on another critical issue: the ease with which minors can access ammunition illegally. The sale of ammunition is considered separate from firearms, although it is arguably just as dangerous. The possession of live ammunition by individuals who should not have access to it poses significant risks.</p><p>In most states, there are no requirements for background checks when purchasing ammunition. This means that minors, with the help of Fake IDs and stolen information, can successfully acquire ammunition without facing the same scrutiny applied to firearms purchases. This is a glaring oversight in the nation’s firearms regulations, as ammunition is the lifeblood of any firearm, and its misuse can result in <a href="https://fox4kc.com/news/fox4-investigates-how-easy-is-it-for-minors-to-buy-gun-ammunition-despite-it-being-illegal/">tragic consequences</a> for individuals and their communities.</p><h3>The Urgent Need for Reform</h3><p>The revelations from the GAO investigation underscore the urgent need for reform in the realm of firearms regulations and background checks. The gaps in the system that allowed undercover investigators to pass background checks using stolen information raise questions about the effectiveness of the NICS system and the databases used for background checks.</p><p>Furthermore, the ease with which minors can obtain ammunition without background checks is a matter of grave concern. To address these issues, there is a pressing need for:</p><ol><li><strong>Improved Data Accuracy: </strong>Ensuring that databases used for background checks are accurate and up-to-date to prevent criminals from slipping through the cracks.</li><li><strong>Stricter Ammunition Controls: </strong>Implementing regulations that require background checks for the purchase of ammunition, closing the existing loopholes.</li><li>Heightened Security Measures: Mandating more robust <a href="https://palidin.fraudfighter.com/">identity verification and authentication methods</a> for firearms and ammunition transactions, making it more challenging for criminals to exploit the system using stolen information or</li><li><a href="https://blog.fraudfighter.com/how-synthetic-ids-pose-a-threat-to-gun-businesses">synthetic IDs</a>.</li><li><strong>Interagency Coordination: </strong>Promoti<strong>ng </strong>cooperation between federal, state, and local agencies to ensure that background checks are thorough and effective.</li></ol><p>The GAO’s investigation has exposed critical flaws in the nation’s background check and ammunition sale systems. Addressing these vulnerabilities is essential to enhance public safety and prevent individuals with ill intentions from obtaining firearms and ammunition. Comprehensive reform is necessary to create a more secure and responsible firearms environment in the United States.</p><h3>The Liability for Gun Shops</h3><p>Without these reforms, one might assume firearms businesses who run a background check on their customers are no longer lia ble for any fraudulent purchases. However, this is unfortunately not the case. Gun shops have a significant liability if they fail to conduct proper identity verification and authentication when selling firearms to customers. Simply relying on submitting the ATF form for a background check is not enough to cover all their bases.</p><p>In some cases, illegal purchases slip through due to criminals’ use of fake or stolen information. This can have huge negative consequences for the shop and in some extreme cases, can lead to the ATF closing the store. Additionally, the issue of minors illegally purchasing ammunition highlights the importance of accurate age verification records. Gun shops must ensure they have robust systems in place to verify the authenticity of IDs and accurately record the age verification process to mitigate potential legal and reputational risks.</p><p><em>Originally published at </em><a href="https://blog.fraudfighter.com/gaps-exposed-in-gun-shop-background-checks-and-ammunition-sales"><em>https://blog.fraudfighter.com</em></a><em>.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=751a061efcac" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Who wins? Data Verification vs ID Authentication]]></title>
            <link>https://medium.com/@fraudfighter/who-wins-data-verification-vs-id-authentication-46b736681239?source=rss-7862ba80bc6------2</link>
            <guid isPermaLink="false">https://medium.com/p/46b736681239</guid>
            <category><![CDATA[identity-verification]]></category>
            <category><![CDATA[identity-theft]]></category>
            <category><![CDATA[fraud-prevention]]></category>
            <category><![CDATA[data-verification]]></category>
            <category><![CDATA[fraud-detection]]></category>
            <dc:creator><![CDATA[FraudFighter]]></dc:creator>
            <pubDate>Tue, 02 Jan 2024 19:17:29 GMT</pubDate>
            <atom:updated>2024-01-02T19:17:29.023Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*2RxkCSumIoIQyI1mkiiypA.png" /></figure><p>Recent trends in fraud have created the imperative to authenticate the identity of your customers to ensure you know exactly who you are conducting business with. But what is the best way to “know your customer”? With terms thrown around such as verification, validation, authentication, etc., it can be confusing to know what steps need to be taken to ensure you can effectively put a stop to fraud.</p><p>Here is a brief summary of two of those terms — ID Data Verification and Identity Document (ID) Authentication.</p><p>Put simply, identity data verification is an effort to establish data accuracy. It is the process of confirming the integrity and consistency of the data. Verification involves checking data against a set of predefined rules or standards to ensure that it is valid and reliable.</p><p>The main objective of data verification is to identify any errors, inconsistencies, or discrepancies in the data. In the case of KYC, this would mean verifying that the Personal Identity Information (PII) given to you by your client is accurate.</p><h3>How do you verify data on an ID?</h3><p>ID data can be verified by ensuring the information on the front of the ID (i.e. — the printed information, such as name, birthdate, ID#, and expiration date) matches what is digitally encoded on the document, whether in the barcode, magnetic strip, machine-readable-zone (“MRZ”), digital watermark or RFID chip. Making sure data is correct and consistent is just one way you can help prevent fraud in real estate transactions.</p><p>Some verification services might additionally send the “PII” to be compared to public-records data, such as DMV records or private identity databases, to make sure the data matches what is on file with the issuing authority for the document.</p><h3>What is ID Authentication?</h3><p>By definition, ID Authentication is the process of authenticating the genuineness of the source of the data (e.g. — the document). It involves verifying the physical identity document itself for authenticity, rather than just the data contained within it. This ensures that the physical document being presented was genuinely issued by a government agency and not a fake created by a forgery operation.</p><p>The difficulty from a transactional perspective lies in the fact that so many different types of ID Document exist. In the US, alone, there are more than 1,100 types of official, government-issued credential documents. This one fact renders it virtually impossible to authenticate a document without some form of tool or solution.</p><h3>How does ID Authentication work?</h3><p>Modern Identity Documents are among the most securely produced documents in the world. Great care has been taken to make forgery or alteration of ID documents very challenging.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*mMTFX_koC0bZ6YU5.png" /></figure><p>This is achieved by layering security printing techniques and features into the design and production of the document.</p><p>Authentication, then, involves testing for the presence of these and many other design features to make sure that the document contains the requisite design, printing and security features it should have.</p><p>The term “forensic” is often used in connection with ID Document Authentication. This is because it may require a unique set of physical tools and objects in order to perform the level of testing required. Ultraviolet and/or infrared light, magnification, magnetic detectors, high resolution imagers and more are involved in performing a truly high-confidence physical document authentication.</p><h3>Why is ID Authentication more secure than Data Verification?</h3><p>The simple fact is: almost every single American has had their PII hacked at some point over the past decade. Just check out <a href="https://informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/#bysensitivity">this alarming graphic</a> from information is beautiful. This is exacerbated by the fact that the international organized crime groups involved in professional ID forgery have evolved the use of data processing tools to make efficient use of this hacked data. It is not difficult to produce, or purchase, a forged document that contains genuine PII information that will match the information in the DMV database. That is because the data is being offered in online marketplaces for as little as $0.10 per individual record.</p><p>This means that data verification is sufficient only to detect and prevent fraud performed by amateur operations.</p><p>Forensic ID document authentication on the other hand, is far more difficult to fool. It requires extraordinary skill to produce the dozens of high-tech security printing techniques used to secure ID documents. In some cases, absent the involvement of a corrupt government agency that has access to the technology, it can be impossible to produce the security features.</p><h3>Why not do Both?</h3><p>Of course, there is no reason why we should not consider doing both of these processes, both ID Document Authentication and ID Data Verification. Best-practice would further indicate that — when conducting a “remote” transaction when the customer will not physically come to your place of business, that a facial-match also should be performed to ensure that the person conducting the transaction is, in fact, the person whose face is pictured on the authenticated ID document.</p><p>Leave a comment below and let us know what your experience has been using Data Verification or ID Authentication!</p><p><em>Originally published at </em><a href="https://blog.fraudfighter.com/who-wins-data-verification-vs-id-authentication"><em>https://blog.fraudfighter.com</em></a><em>.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=46b736681239" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[The Alarming Rise of Car Theft Due to Fraud]]></title>
            <link>https://medium.com/@fraudfighter/the-alarming-rise-of-car-theft-due-to-fraud-76a11f653e46?source=rss-7862ba80bc6------2</link>
            <guid isPermaLink="false">https://medium.com/p/76a11f653e46</guid>
            <category><![CDATA[fraud]]></category>
            <category><![CDATA[crime]]></category>
            <category><![CDATA[identity-theft]]></category>
            <category><![CDATA[automotive]]></category>
            <category><![CDATA[fraud-prevention]]></category>
            <dc:creator><![CDATA[FraudFighter]]></dc:creator>
            <pubDate>Fri, 27 Oct 2023 21:01:38 GMT</pubDate>
            <atom:updated>2023-10-27T21:01:38.347Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*FQ1ywNiCy2FYY1uGCGU8Pg.png" /></figure><p>Car theft has been a persistent issue for decades, causing significant financial losses and distress for dealerships and car owners alike. However, the rise of vehicle theft resulting from identity fraud in the last year is concerning to say the least. In the year 2023 alone, there have been over 80,000 cars stolen from auto dealerships using this method. This alarming trend has shaken the auto industry, prompting the need for innovation and the use of identity authentication solutions to combat this growing problem.</p><p>According to a recent investigation by the Federal Trade Commission (FTC), auto banditry has reached unprecedented levels in the DC-Maryland-Virginia (DMV) area (although several other locations across the USA have experienced an uptick as well). A recent <a href="https://wjla.com/features/i-team/dc-maryland-virginia-car-theft-carjacking-crime-fraud-white-collar-auto-industry-thieves-stealing-vehicles-ftc-investigation-federal-trade-commission-bethesda-euro-motorcars">article published by ABC 7 News</a> dives into the tactics used by fraudsters and what methods local dealerships are taking to counteract it.</p><p>Criminals are utilizing sophisticated techniques to deceive both financial institutions and auto dealerships, resulting in a surge of stolen vehicles. This includes using stolen or fake IDs, fake paystubs, and more to create a realistic identity of someone who appears to be a valid “natural” person.</p><p>Fraudsters use this mix of stolen and fabricated Personal Identifying Information (PII) to open new accounts and secure loans from financial institutions. Once the financing has been secured, they head to the dealer. While there, the fraudster makes their “purchase” and drives off with the vehicle of their choice. Several months later, it becomes apparent that the payments for their loan are not being fulfilled and the individual who supposedly “bought” the car cannot be found.</p><p>The repercussions of trickster auto appropriation extend far beyond just the financial losses suffered by individuals. Auto dealerships face significant reputational damage, customer distrust, and increased insurance premiums. The average stolen car from a dealership ends up costing them roughly $100K. This includes not only the original cost of the car (which can easily range from $30,000 to $70,000), but also the substantial time and resources required to recover stolen vehicles. On top of that, every stolen vehicle leads to missed business opportunities and decreased customer trust and satisfaction.</p><p><strong>The Game-Changer in Auto Fraud Prevention</strong></p><p>In the battle against fraudulent car theft, <a href="https://palidin.fraudfighter.com/">PALIDIN</a> has emerged as a powerful tool for auto dealerships. PALIDIN is an advanced identity authentication solution that helps prevent fraud at the point of sale. By leveraging cutting-edge technology, PALIDIN verifies customer identities, detects fake documents, and flags suspicious activities in real-time.</p><p>How PALIDIN Works</p><p>PALIDIN works by utilizing automated forensic techniques to authenticate the identity documents presented by customers at auto dealerships. By running the documents against a global database of IDs and conducting various tests, PALIDIN accurately verifies the authenticity of the ID. This helps prevent identity thieves from using forged or counterfeit documents to engage in fraudulent activities at the dealership. PALIDIN offers multiple solutions, such as <a href="https://palidin.fraudfighter.com/desktop">PALIDIN Desktop</a>, which can be integrated into the front desk buying process for convenient and efficient identity authentication, and <a href="https://palidin.fraudfighter.com/webid">PALIDIN WebID</a>, which offers authentication for remote car buyers.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*99PgUg6_dTwZkH0i.png" /></figure><p>Benefits of PALIDIN for Auto Dealerships:</p><ul><li>Enhanced Security: PALIDIN provides an additional layer of security, ensuring that only legitimate customers are granted access to vehicles.</li><li>Improved Customer Experience: By preventing fraud, PALIDIN helps create a safer environment for customers, enhancing their trust and satisfaction.</li><li>Cost Savings: Implementing PALIDIN can save auto dealerships substantial financial losses associated with car theft through fraud, including insurance claims and vehicle recovery expenses.</li><li>Strengthened Reputation: By actively addressing the issue of car theft due to fraud, auto dealerships can build a reputation for prioritizing customer safety and security.</li></ul><p>The alarming rise of car theft resulting from fraud poses a significant threat to the auto industry. To combat this growing problem, innovative solutions like PALIDIN have emerged as a game-changer for auto dealerships. By leveraging advanced identity authentication technology, PALIDIN helps prevent fraud, protect customer interests, and safeguard the reputation of the dealership.</p><p><em>Originally published at </em><a href="https://blog.fraudfighter.com/the-alarming-rise-of-car-theft-due-to-fraud"><em>https://blog.fraudfighter.com</em></a><em>.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=76a11f653e46" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Preventing Seller Fraud in Real Estate Transactions]]></title>
            <link>https://medium.com/@fraudfighter/preventing-seller-fraud-in-real-estate-transactions-7d220283b7fc?source=rss-7862ba80bc6------2</link>
            <guid isPermaLink="false">https://medium.com/p/7d220283b7fc</guid>
            <category><![CDATA[real-estate]]></category>
            <category><![CDATA[identity-theft]]></category>
            <category><![CDATA[real-estate-news]]></category>
            <category><![CDATA[fraud]]></category>
            <category><![CDATA[fraud-prevention]]></category>
            <dc:creator><![CDATA[FraudFighter]]></dc:creator>
            <pubDate>Wed, 11 Oct 2023 18:42:03 GMT</pubDate>
            <atom:updated>2023-10-11T18:42:03.396Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*68CfBB-aPK8jTVcL" /></figure><p>In the fast-paced world of real estate, it’s essential to stay one step ahead of fraudsters.</p><p>Real estate transactions involve substantial sums of money, making them an attractive target for fraudsters. One common form of fraud in the real estate industry is seller fraud, where individuals misrepresent their ownership or property details to deceive buyers.</p><p>To combat this growing threat, innovative solutions like PALIDIN have emerged to provide robust identity authentication and prevent seller fraud. In this article, we will explore how PALIDIN can effectively safeguard real estate transactions and protect buyers from falling victim to fraudulent sellers.</p><h3><strong>The Risks of Seller Fraud in Real Estate</strong></h3><p>There are several ways seller fraud can be committed during a real estate sale transaction. For purposes of this article, we will be focused on fraud performed via identity theft.</p><p>Fraud involving seller impersonation occurs when dishonest people pretend to be property owners in order to sell houses or vacant lots that they do not own. If the fraudsters are not detected, those buyers who fall victim risk losing at least their down payment and potentially the entire purchase price of the property if the deal were conducted in cash.</p><p>Earlier this year, the Secret Service issued a consumer alert warning of an uptick in seller impersonation fraud. Real estate experts have also noted a substantial spike in incidents, with 73% reporting an increase in these scams since the beginning of the year.</p><p>These fraudulent transactions can result in considerable financial losses and legal issues for the true property owner, title insurance and escrow agencies, and buyers.</p><h3><strong>Remote Real Estate Transactions; Shortage of Properties for Sale</strong></h3><p>Exacerbating the already steep upward trend in seller impersonation fraud has been the speed at which real estate transactions have so readily and easily evolved to remote transactions. That is — a transaction wherein the seller never meets any of the parties involved -not his own selling agent, the escrow and title agents, or the buyers. <br>The pandemic caused a rapid spike in this type of transaction as in-person business meetings were replaced by Zoom calls and emails.</p><p>This, then, has enabled a new, savvy type of criminal, able and willing to research public records to identify properties unencumbered by mortgages and liens. The most common property type for these schemes is vacant land when the buyer will be less inclined to require an on-site inspection because there are no buildings to be worried about. Also, because there is no one living on the premises who might be around should the buyer decide to have a drive by to look at the property.</p><p>Another accelerant on the seller impersonation fire has been the shortage of available properties for sale. Tight inventory has made some buyers desperate to move on any property they can find — so much so that they may be willing to forego what has been fairly standard cautionary practice in real estate sales for years, such as contingencies put in place to allow an inspector to examine the property, or for a clear title search to be returned prior to close.</p><h3><strong>PALIDIN: An Advanced Identity Authentication Solution</strong></h3><p>PALIDIN is a state-of-the-art identity authentication solution that utilizes cutting-edge technology to verify the authenticity of seller identities and documents. By implementing PALIDIN in real estate transactions, buyers and real estate professionals can have confidence that they are dealing with legitimate sellers, reducing the risk of falling victim to fraud.</p><p>Document Verification and Authentication:<br>PALIDIN employs automated forensic techniques to verify the legitimacy of seller identification documents, such as driver licenses, passports, and other relevant paperwork. This process ensures that the documents presented by sellers are genuine and have not been tampered with or forged.</p><p>Real-Time Authentication: <br>PALIDIN’s real-time authentication capabilities enable immediate verification of seller identities during the transaction process. This eliminates delays and allows buyers to make informed decisions based on accurate and up-to-date information.</p><p>Deterrence and Fraud Prevention: <br>PALIDIN’s overt form of authentication acts as a powerful deterrent to potential fraudsters. Sellers attempting to misrepresent their identities or property details are less likely to proceed with fraudulent activities when they know their actions will be exposed.</p><p>Enhanced Due Diligence: <br>By incorporating PALIDIN into real estate transactions, real estate professionals can enhance their due diligence processes. PALIDIN provides comprehensive fraud detection tools, allowing users to identify patterns, trends, and potential red flags associated with seller fraud.</p><h3><strong>Building Trust and Reputation</strong></h3><p>Implementing identity authentication in the sales process demonstrates a commitment to transparency and security in real estate transactions. Buyers will have greater trust in the process, knowing that their interests are protected, and sellers can benefit from a positive reputation as trustworthy and legitimate sellers.</p><p>Seller fraud poses a significant risk to real estate transactions, but with advanced identity authentication capabilities, real estate professionals can confidently engage in property transactions, knowing that they are protected from fraudulent sellers.</p><p>Leveraging PALIDIN’s document verification, real-time authentication, and fraud prevention features, the real estate industry can safeguard its integrity, build trust among buyers, and ensure secure and transparent transactions.</p><p>In the fast-paced world of real estate, it’s essential to stay one step ahead of fraudsters.</p><p>Real estate transactions involve substantial sums of money, making them an attractive target for fraudsters. One common form of fraud in the real estate industry is seller fraud, where individuals misrepresent their ownership or property details to deceive buyers.</p><p>To combat this growing threat, innovative solutions like PALIDIN have emerged to provide robust identity authentication and prevent seller fraud.</p><p><em>Originally published at </em><a href="https://blog.fraudfighter.com/preventing-seller-fraud-in-real-estate"><em>https://blog.fraudfighter.com</em></a><em>.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=7d220283b7fc" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Fake IDs run rampant in the USA]]></title>
            <link>https://medium.com/@fraudfighter/fake-ids-run-rampant-in-the-usa-96c4b81cdd77?source=rss-7862ba80bc6------2</link>
            <guid isPermaLink="false">https://medium.com/p/96c4b81cdd77</guid>
            <category><![CDATA[fake-id]]></category>
            <category><![CDATA[report]]></category>
            <category><![CDATA[fraud]]></category>
            <category><![CDATA[crime]]></category>
            <category><![CDATA[fraud-detection]]></category>
            <dc:creator><![CDATA[FraudFighter]]></dc:creator>
            <pubDate>Tue, 12 Sep 2023 19:33:28 GMT</pubDate>
            <atom:updated>2023-09-12T19:33:28.971Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*8fYSKUuvOfMZc-0j-HzbVQ.png" /></figure><p>IDscan.net recently released a report, <a href="https://idscan.net/idscan-net-releases-inaugural-fake-id-report/#:~:text=IDScan.net%20has%20completed%20its%20first%20ever%20analysis%20of,related%20to%20usage%20of%20fake%20IDs%20by%20minors.">Fake ID Report 2023</a>, which reveals crucial insights into the current state of fake IDs and ID fraud. Fake IDs continue to become more and more sophisticated making it harder for the average person to spot. In their report, IDscan.net found that 97% of fake IDs seized in 2020 were imported from China or Hong Kong. Over the years, the US Customs and Border Protection (CBP) has intercepted several of these shipments including <a href="https://nypost.com/2019/11/28/cbp-seizes-thousands-of-fake-ids-headed-from-china-to-new-york/">3000 fake licenses</a> headed to New York. Unfortunately, many still make their way over successfully and are utilized by criminals and underage patrons alike.</p><p><em>How common are fake IDs among underage users?</em></p><p>A report by the <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5133174/">National Library of Medicine</a> found that 40% of underage college students currently or have previously owned a fake ID. Many of these are used to get into bars or purchase alcohol at a store. Visiting dispensaries or casinos is another common use of fake IDs. Female college students appear to be slightly more likely than their male counterparts to own a fake ID. However, male students are more likely to get caught attempting to use them.</p><p><em>How do students get fake IDs?</em></p><p>As a nation, we are well aware that fake IDs are a massive problem. Yet, most fakes still seem to slip past the CBP and land in the hands of teenagers and young adults. How does this happen? An <a href="https://www.nytimes.com/2015/02/08/education/edlife/fake-ids-or-why-would-a-student-order-a-tea-set.html">article</a> published by the New York Times details one way in which these illicit IDs slip through. Students are often able to order these IDs online. The Chinese sellers frequently change website URLs and emails to evade being caught by authorities.</p><p>The seller will ask the buyer to send personal identifying information (PII) about themselves, a photo, and a payment. Often, the buyer is unsure if the business is legitimate until they receive the IDs. This buying method puts students in danger of not only being scammed out of a large chunk of money, but also of potential future fraud due to handing over some of their PII. <br>If the transaction was legitimate, the fake ID will ship to the buyer. Often, these IDs are hidden in packaging with other objects such as bracelets, tea sets, or other cheap items to avoid being flagged during shipping. Many sellers will also send multiple copies of a fake ID so that buyers have a backup if one is confiscated while being used.</p><p><em>What to look for in a fake ID?</em></p><p>Fake IDs often have mismatched information on them. The graphic below shows some of the most common incorrect information that can be found on a fake.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*bsoLm7Rn1d1VTCZ0.png" /></figure><p>However, carefully examining these details can be time consuming and prone to error. Many of the newer fake IDs can be extremely difficult to distinguish by eye for the average person. ID authentication systems are often needed for quick and accurate verification.</p><p><em>Which businesses are being targeted?</em></p><p>As mentioned above, Fake IDs are commonly used at bars, nightclubs, liquor stores, cannabis dispensaries, and casinos. In 2022, more than <a href="https://www.wgrz.com/article/news/local/more-than-550-young-people-ticketed-for-using-fake-ids-drinking-underage-during-nys-summer-campaign/71-240e4e91-39e1-4ed3-8b32-e11440037ebe">550 people across New York State</a> were ticketed for trying to purchase alcohol with a fake ID. The state had launched their “Operation Prevent” campaign to ramp up enforcement efforts to help reduce underage drinking and driving. Law enforcement also ticketed those breaking the Alcoholic Beverage Control Law.</p><p>In many cases, serving underage patrons (regardless of whether the business was aware they were underage) can put a business at significant risk. In 2022, several notable bars were shut down across the US for serving alcohol to underage drinkers, including a Twin Peaks location, Reggie’s, City Bar, and many more. Recently, states have begun passing laws for an affirmative defense. For businesses in these states (AZ, CT, NV, NY, NC, OH, OR, PA, TX, UT, and WV) they can integrate an ID authentication system into their transaction processing in order to avoid problems, as these laws dictate a release of any liability the establishment may be exposed to if they scan IDs through an authentication and age verification system during the sale of an age-restricted product.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*7P_UmLpDMVogdmgZ.png" /></figure><p>ID authentication systems can help detect 95% or more of all fake IDs. By implementing technology like <a href="https://palidin.fraudfighter.com/">PALIDIN</a>, business can help law enforcement crack down on underage drinking and prove their own due diligence.</p><p><em>Originally published at </em><a href="https://blog.fraudfighter.com/fake-ids-run-rampant-in-the-usa"><em>https://blog.fraudfighter.com</em></a><em>.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=96c4b81cdd77" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[How Fraud Affected Consumers and Businesses Alike in 2022]]></title>
            <link>https://medium.com/@fraudfighter/how-fraud-affected-consumers-and-businesses-alike-in-2022-c411b0b8a6a?source=rss-7862ba80bc6------2</link>
            <guid isPermaLink="false">https://medium.com/p/c411b0b8a6a</guid>
            <category><![CDATA[fraud-prevention]]></category>
            <category><![CDATA[identity-theft]]></category>
            <category><![CDATA[business]]></category>
            <category><![CDATA[data-breach]]></category>
            <category><![CDATA[fraud]]></category>
            <dc:creator><![CDATA[FraudFighter]]></dc:creator>
            <pubDate>Wed, 24 May 2023 20:36:30 GMT</pubDate>
            <atom:updated>2023-05-24T20:36:30.741Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*svCsqsyGykzsaxddYYBQow.png" /></figure><p>Nearing the end of Q2 in 2023, it seems like fraud is already abundant. T-Mobile had yet another <a href="https://www.reuters.com/technology/t-mobile-says-investigating-data-breach-affecting-37-mln-accounts-2023-01-19/">huge data breach</a> putting over 37 million customers’ information at risk and it appears that <a href="https://www.cnn.com/2023/01/23/politics/pandemic-unemployment-benefits-fraud-house-republicans/index.html">$60 billion dollars</a> of pandemic benefits may have gone to fraudsters instead of actual people in need. On the business side, predictions are that worldwide eCommerce Fraud will reach a staggering <a href="https://chainstoreage.com/study-total-e-commerce-fraud-2023-will-exceed-200-billion">$200 billion</a> this year.</p><p>To understand how we got here, let’s look back at what some of the biggest fraud trends were last year for both consumers and businesses alike.</p><p><strong>An Overview of Fraud in 20222</strong>Consumers</p><p>According to the <a href="https://www.ftc.gov/business-guidance/blog/2023/02/ftc-crunches-2022-numbers-see-where-scammers-continue-crunch-consumers">FTC</a>, consumers lost almost $8.8 billion to fraud scams, up 30% from the year prior. The FTC received over 5.2 million reports of fraud with the top categories of fraud reported being imposter scams, debt collection scams, and identity theft. For individuals, imposter scams ranked 1#. In these types of scams, fraudsters often impersonate government officials or businesses to trick individuals into sending money or giving away their personal information.</p><p>While consumers of all ages were impacted by fraud last year, it appears older adults were particularly vulnerable. The FTC found that adults aged 60 and over reported the highest median losses from fraud at $1,000 per person. Scammers often target older adults with imposter scams such as fake tech support calls or sweepstakes scams. These scams can be particularly devastating for older adults who may have limited financial resources.</p><p>Businesses</p><p>Signifyd’s <a href="https://resources.signifyd.com/c/2023-state-of-fraud-report?x=JZbZbE&amp;_pfses=Xi6FWnYS2kaNhK1mATEjuUUx#page=1">The State of Fraud 2023</a> report found that in 2022 fraud pressure on businesses increased 34% from the year prior. Fraudsters continued to use multiple methods to game the system including account takeover fraud, synthetic identity fraud, and credit card fraud. These fraudsters tended to target high-end luxury items such as mobile devices, jewelry, automobiles, luxury goods, and more.</p><p>Luckily, last year wasn’t all bad news. While fraud attempt numbers may still shock, the good news is fraud prevention measures are working. In PwC’s <a href="https://www.pwc.com/gx/en/forensics/gecsm-2022/PwC-Global-Economic-Crime-and-Fraud-Survey-2022.pdf">Global Economic Crime and Fraud Survey 2022</a> they found that rates of successful fraud attempts reported by organizations have gone down 3% since 2018. By enhancing fraud protections, many businesses have substantially reduced their susceptibility towards fraud.</p><p>For businesses hit by fraud, the PwC survey found two forms of fraud were most prevalent: cyber fraud and customer fraud. While most industries had cybercrime listed at the top, there were two major exceptions, financial services and retailers. Both had customer fraud in the number one position. Warding off customer fraud is a precarious position for any business to be in, requiring that the balance between the client’s experience and fraud prevention measures is just right. Too strict measures could turn away legitimate customers or decrease customer satisfaction, whereas too little could lead to an uptick in fraudulent transactions. However, these measures are crucial to protecting a business’ bottom-line as well as consumers who may themselves be victims of identity theft.</p><p><strong>Online Imposter Scams</strong></p><p>The FBI’s Internet Crime Complain Center (IC3) has been <a href="https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf">tracking fraud trends</a> and complaints from consumers for many years now. In the last five years, reports submitted by consumers show $27.6 billion losses, over $10 billion of which occurred just in 2022. The most prevalent type of crime? <strong>Phishing.</strong></p><p>Email phishing scams are a type of imposter scam where fraudsters attempt to trick individuals into revealing sensitive information such as passwords, credit card numbers, bank information, or social security numbers. Phishing emails often appear to come from legitimate sources, such as banks or other financial institutions, and they typically contain a link that directs the recipient to a fake website designed to look like the real thing. Once the victim enters their information, the fraudsters can use it to steal money, commit identity theft, or make fraudulent transactions.</p><p>More recently, these scams have targeted employees and businesses by sending emails that look like they are coming from a member of the business’ organization. Some examples are emails that ask for updated W-2 information, claim that an employee is requesting their direct deposit information be updated, or an email from a “supervisor” asking for a purchase to be made. In their <a href="https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf">report</a>, the IC3 found that $2.7 billion was lost to Business Email Compromise scams.</p><p>To avoid falling victim to email phishing scams, it is important to be vigilant and cautious when opening emails or clicking on links. One way for consumers and business to protect themselves is to always verify the sender’s email address and look for any suspicious or unusual elements in the email, such as poor grammar, odd email URLs, or unusual requests for information. If the email is claiming to be from someone the sender knows, they should double-check with the sender via a different method of communication before replying to the email or clicking any links.</p><p>Unfortunately, many consumers can relate to the experience of having their credit card information stolen or compromised by a phishing scam. According to research done by <a href="https://www.security.org/digital-safety/credit-card-fraud-report/">Security.org</a>, 65% of American credit and credit card holders have been victim to fraud in their lifetime. This is an increase from the 58% they saw in 2021.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*ww7v4Lk7Vm0SfGOL.png" /></figure><p>Consumers can take several precautions to protect themselves from credit card fraud such as regularly monitoring credit card statements and reporting any unauthorized charges immediately. Many banks and financial institutions provide free email/text alerts to immediately let the consumer know when a suspicious transaction has appeared on their account. Consumers should also be cautious when providing their credit card information online and only use secure (HTTP<strong><em>S</em></strong>) websites.</p><p><strong>Online Ecommerce Fraud</strong></p><p>Running a business online not only opens the door to additional profits but also several types of scams. Fraudsters can target online businesses in a variety of ways, including through account takeover attacks, identity theft, and credit card fraud. Account takeover attacks occur when a fraudster gains access to a customer’s account by stealing their login credentials through data hacks or phishing schemes. Once inside the account, the fraudster can make unauthorized purchases. These unauthorized purchases can result in devastating losses for a business. According to the <a href="https://risk.lexisnexis.com/insights-resources/research/us-ca-true-cost-of-fraud-study">LexisNexis 2023 True Cost of Fraud Study <em>for Ecommerce and Retail</em></a>, the cost of fraud for US merchants has increased by 19.8% since 2019. Each $1 of fraud cost US eCommerce retailers $3.75 in 2022.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/624/0*u08Dw_W4169h4IIc.png" /></figure><p>Another way fraudsters can target online businesses is identity theft. By stealing a customer’s PII, such as their name, address, and social security number, fraudsters can open new accounts or make fraudulent purchases. Criminals often target financial institutions first by creating a <a href="https://blog.fraudfighter.com/synthetic-identity-fraud">Synthetic Identity</a>. Once they can establish substantial borrowing power, they then go to retailers to conduct fraudulent transactions.</p><p>Implementing Know-Your-Customer (KYC) procedures is an important step that businesses can take to prevent various forms of fraud. One simple way to do this is by including an identity verification check such as <a href="https://www.fraudfighter.com/palidin-identity-authentication">PALIDIN</a> in your normal transaction process. PALIDIN is a fast and secure solution that businesses can use to authenticate the identity documents of their customers, no matter where they are. With PALIDIN, businesses can quickly and easily verify the identity of their customers, reducing the risk of credit card fraud and other types of financial crime.</p><p>Taking the extra step to prevent fraud not only stops criminal transactions but also helps build trust with customers. While we may think of consumers’ and businesses’ experiences of fraud as two separate things, they are often interconnected and when fraud affects one of them, it also affects the other. By doing their due diligence to make sure they KYC, businesses can help protect individuals who may be victims of identity theft while also preventing business losses.</p><p><em>Originally published at </em><a href="https://blog.fraudfighter.com/how-fraud-affected-consumers-and-businesses-alike-in-2022"><em>https://blog.fraudfighter.com</em></a><em>.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c411b0b8a6a" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>