Resolving Identity Fraud: A Field Guide
- Date: June 20, 2023
- Author(s):
- John Buzzard
- Report Details: 22 pages, 9 graphics
- Research Topic(s):
- Fraud & Security
- Fraud Management
Foreword
This report, sponsored by AARP, explores the aftermath of identity fraud and the resolution process from the perspective of identity fraud victims and their trusted circle of supporters who may, from time to time, assist in resolving identity fraud that affects a friend or family member.
This report was adapted from the annual identity fraud report, titled The Butterfly Effect, which was published by Javelin Strategy & Research in March 2023. Javelin maintains complete independence in its data collection, findings, and analysis.
Overview
Most identity fraud victims react to their victimization with shock, fear, and frustration. Feelings of disbelief and anger are justified amid a genuine and personal violation of privacy. The challenges of gaining a complete understanding of what has occurred, and the subsequent resolution process, can consume large quantities of time and resources—including that of individuals who are voluntarily assisting victims with the multitude of tasks required to mitigate such a complicated scenario. The following survival guide has been created to enlighten victims and their trusted circle of supporters about the basic process of recovering from and resolving identity fraud after it has occurred.
Download Complimentary Whitepaper
Related content
Wealth Management Fraud: An Easy Target for Scams
Traditional identity fraud and identity fraud scams are equal-opportunity crimes, in that anyone with a digital footprint is a potential target. But as affluence rises, so does con...
P2P Scams and Fraud: Addressing Financial Institutions’ Precarious Position
Peer-to-peer (P2P) payments are essential in a world where cash is less commonly carried, digital transactions are popular and convenient, and ease, privacy, and security drive con...
2023 Know Your Customer Solution Scorecard
Know Your Customer (KYC) protocols are the bedrock of robust identity verification. Understanding at a granular level whom an organization is doing business with translates into a ...