Tackling the trillion dollar identity fraud crisis

1 June 2019 Access Control & Identity Management

Fraud costs trillions of dollars to world economies annually. For consumers whose identity data has been stolen, the impact on their lives can vary from being a nuisance to financial and emotional trauma.

Worldwide, around 40% of consumers have been the targets of identity theft syndicates at least once. Worth trillions of US dollars annually, identity theft has historically been fairly easy to achieve – particularly for larger crime syndicates. As a result, businesses are buckling under the weight of fraud-related losses due to identity theft scams.

However, the 4th Industrial Revolution has enabled a combination of mobile phones, sophisticated 3D facial identity algorithms and systems linked to government ID bureaus, to make it possible to accurately identify and authenticate someone remotely. Businesses can now authenticate new or existing customers without them having to show up in person – the entire process is seamless, secure, remote and digital.

Lance Fanaroff
Lance Fanaroff

Lance Fanaroff, a director of iiDENTIFii, a company that provides a remote biometric digital authentication and automated on-boarding technology platform, says people want to be able to open a bank account without going into a bank or buy something without going to a shopping centre.

“It’s critical that an individual’s online identity is protected. We have built a technology platform that, using a mobile phone, can prove the identity of a person within 30 seconds and with an accuracy of 1 error in 10 000. The current ratio is about 11 inaccuracies per 100 using standard biometrics,” he says.

Using a mobile phone and an official identity document, the technology platform does four critical things:

• It proves that the person is alive.

• It matches the selfie the user has taken with the image on their ID document.

• The data is then extracted off the identity document – including the person’s name, surname and ID number.

• All the data is then matched with a facial biometric at an issuing authority or government department – Home Affairs, for example.

Says Fanaroff: “Using that golden triangle of identity, we can prove the individual is who they say they are. Only then do we onboard them.

“Through three-dimensional analysis, we can prove that the individual online is really alive. The depth of our facial recognition algorithms means we can recognise anyone from any region of the globe - we can handle on-boarding of all ethnicities.”

He says false accept and reject rate are also minimised. “The false accept rate is the risk that an organisation will onboard the wrong individual and enable identity theft. The false reject rate is when the correct person is dismissed and rejected. We have to balance fraud with friction by minimising both,” says Fanaroff.

Businesses can ensure that all consumers being enrolled are thoroughly vetted with digital identity verification technologies and that the transactions that pose the highest risk are gated with multi-factor authentication. These technologies will protect businesses and consumers from data theft and change the economics of fraud, so that it is no longer in favour of the criminals.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The role of safe storage in mitigating burglary and fire risk
Gunnebo Safe Storage Africa Products & Solutions Fire & Safety Smart Home Automation
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Risks of open-source intelligence escalating in crime
Security Services & Risk Management Residential Estate (Industry) Smart Home Automation
CMS estimates that open-source intelligence has played a role in 20 - 30% of robberies over the past 12 months. In cybercrime, global research consistently shows that many offences rely on some form of open-source data exploitation.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
The role of safe storage in mitigating burglary and fire risk
Smart Home Automation Fire & Safety
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.