When a case is escalated, SentiLink's Fraud Intelligence Team may have more details about the case and may refer to the following taxonomy.
Synthetic Fraud Labels
Clear – NOT a synthetic identity; the applicant is applying with their own name, DOB, and SSN.
First Party Synthetic – Name and DOB belong to the applicant, but the SSN provided in the application is nontrivially different from the applicant's true SSN (i.e. not a mere typo).
Third Party Synthetic – The combination of name, DOB, and SSN is entirely fictitious.
IDT Synthetic – The fraudster is using a real base identity and committing fraud by inserting an SSN that doesn’t belong to the base identity.
Friendly Synthetic – The name/DOB/SSN is a combination of the applicant’s own true information and that which belongs to an associate (e.g., the SSN of a relative or someone who shares the same address).
Friendly Fraud Synthetic – Known relative/associate of applicant is inserting a synthetic SSN into the identity of the victim OR combining their own PII with the SSN of a deceased relative/associate or minor child.
Benign Synthetic – The applicant is using an SSN which does not belong to them, but this is because they do not have an SSN of their own.
Benign Associated – Applicant is associated with other SSNs because they have committed benign_synthetic in the past.
Associated – The applicant supplied their own name, DOB, and SSN but has evidence of creating or attempting to create synthetic identities (with at least a month of history of use).
Other Synthetic Fraud-Related Labels
Pedantic – The SSN provided has a typo (1-3 digits off from the true SSN) that does not appear to be malicious.
Malicious Pedantic – The SSN provided has been maliciously fiddled with (in contrast to the pedantic label, which reflects a mere typo).
Wrong DOB – The application has the wrong DOB, but no other signs point to synthetic fraud.
Test Application – Reserved for obvious test applications (e.g., name is TEST ONLY, or email is [email protected], or situations like JOHN DOE at 1600 Pennsylvania Ave, San Francisco CA 99999).
Organization – The input SSN is an EIN or TIN that belongs to the individual’s business and can be proven through records in third-party sources. Most typically found with business loan applications.
Potential EIN – The SSN supplied on the application is suspected to be an EIN or TIN that belongs to the individual’s business, but we cannot verify that with third-party providers. Most typically found with business loan applications.
Bad Juvenile – Applicant is a juvenile (under 18) but has changed their DOB to appear of age (first-party juvenile fraud).
Underage – Applicant is under 18 (e.g., custodial accounts).
Additional Verification Required – We are unable to determine if the SSN/name/DOB combo is tied to a real person, but there is no overt evidence it is a synthetic identity.
Identity Theft Labels
Clear – Not identity theft.
ID Theft – The applicant appears to be using a stolen identity.
Potential Scam Victim – There is evidence of ID theft in the application; SentiLink consortium data and/or open-source information indicate potential victim involvement.
Friendly Fraud – The applicant’s complete identity is being maliciously used by a relative or associate because the applicant’s phone or email belongs to an associate.
Friendly Fraud Synthetic – Known relative/associate of applicant is inserting a synthetic SSN into the identity of the victim OR combining their own PII with the SSN of a deceased relative/associate or minor child.
Friendly Spouse – The applicant is using the phone and/or email that belongs to their spouse. Unable to prove malice.
Friendly Parent – The applicant is using the phone and/or email that belongs to their parent/child. Unable to prove malice.
Friendly Other – The applicant is using the phone and/or email that belongs to an associate who is not a spouse, parent, or child. Unable to prove malice.
Juvenile Identity Abuse – This label is used for people using their child’s information (with the correct name/SSN but a different YOB) to apply for loans.
Identity Abuse Labels
Referral Abuse – The applicant submits multiple applications with the same institution and uses different phones and/or emails for each one in an attempt to avoid duplicate detection. The end goal is to abuse a referral incentive program.
Additional Verification Required – We are unable to make an ID Theft determination and recommend proceeding with additional verification steps.
Abuse – The applicant is not synthetic but shows signs of abusing the credit system to misrepresent their creditworthiness. Examples could include:
- A large number of purchased authorized user tradelines (being tied to authorized user addresses).
- Bust-out intention.
- Recent financial judgments.
Assumed Identity Abuse – The identity belongs to a real person who was in the U.S. on a visa but was sold/stolen after they left the country.
