An identity fraud ring is a group of people actively collaborating to commit identity fraud. This study is the first to investigate the interconnections of identity manipulators and identity fraudsters to identify rings of criminals working in collaboration.
While many of these fraud rings are made up of two or more career criminals, surprisingly, others are family members or groups of friends. The ring members may be either stealing victimsí identities or improperly sharing and manipulating personal identifying information such as dates-of-birth (DOB) and Social Security numbers (SSNs) on applications for credit and services.
Other findings of the study include:
- States with the highest numbers of fraud rings include Alabama, the Carolinas, Delaware, Georgia, Mississippi and Texas. The three-digit ZIP codes with the most fraud rings observed are areas around Washington DC; Tampa, Fla.; Greenville, Miss.; Macon, Ga.; Detroit; and Montgomery, Ala.
- While many fraud rings occur in cities, a surprisingly high number were also found in rural areas of the country.
- A large number of families are working together in fraud rings, even using each otherís SSNs and DOBs. However, rings made up of friends are more common, with the majority of fraud rings made up of members with different last names.
Each fraud ring can be examined in detail, showing the conspirators' locations, ages and relationships. For example, ID:A Labs identified a family of five in Florida involved in a fraud ring for more than three years.
The family, with ages ranging from 24 to 37, had filed at least 130 fraudulent applications, using more than eight SSNs and 11 DOBs during that time period.
ID:A Labs looked at approximately 1.7 billion identity risk events including applications for credit cards, wireless phones, payday loans, utilities, and other financial services credit products. It also examined changes in personal identifying information among accounts such as changes in name, address, DOB and SSN.
This information is supplemented with authorization requests and other third-party data. The study examined data in the ID Network from January 2009 to September 2012.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.