{"id":21144,"date":"2024-07-15T09:29:32","date_gmt":"2024-07-15T09:29:32","guid":{"rendered":"https:\/\/www.complycube.com\/?p=21144"},"modified":"2025-02-18T16:53:05","modified_gmt":"2025-02-18T16:53:05","slug":"generative-ai-fraud-and-identity-verification","status":"publish","type":"post","link":"https:\/\/www.complycube.com\/en\/generative-ai-fraud-and-identity-verification\/","title":{"rendered":"Generative AI Fraud and Identity Verification"},"content":{"rendered":"\r\n<div class=\"cc-block tldr\">\r\n<p><strong>TL;DR:<\/strong> <strong>Generative AI fraud<\/strong> is making <strong>synthetic identities<\/strong>, <strong>document fraud<\/strong>, and<strong> ID fraud<\/strong> easier to scale, while many businesses still rely on outdated <strong>identity verification<\/strong> checks. This guide explores how modern <strong>generative AI fraud detection<\/strong>, combining <strong>live document capture, biometric liveness, NFC<\/strong>, and <strong>device intelligence<\/strong>, helps prevent <strong>online fraud<\/strong> and keep <strong>identity attacks<\/strong> in check.<\/p>\r\n<\/div>\r\n\r\n\r\n<h2 class=\"wp-block-heading\">What is Generative AI?<\/h2>\r\n\r\n\r\n<p>Gen AI is a technology that can create new text, images, videos, and other content. It&#8217;s powered by advanced models trained on huge volumes of real-world data. From a few written or visual prompts, it can generate content that looks highly realistic. Fraudsters exploit this to produce convincing fake IDs and supporting documents at scale.\u00a0<\/p>\r\n\r\n\r\n<p>Generative models learn patterns in the data they&#8217;re fed and then generate new variations. This is often called <a href=\"https:\/\/openai.com\/index\/efficient-training-of-language-models-to-fill-in-the-middle\/\" target=\"_blank\" rel=\"nofollow noopener\">data augmentation<\/a> through machine learning. In a fraud context, it means endlessly tweaking documents and faces until something passes checks. As a result, AI-enabled fraud is faster, cheaper, and harder to spot with legacy controls.<\/p>\r\n\r\n\r\n<h2 class=\"wp-block-heading\">What is Document Fraud?<\/h2>\r\n\r\n\r\n<p>Document fraud is when someone uses falsified or tampered documents to pass themselves off as someone they&#8217;re not. The goal is to deceive a business, institution, or individual. These forged documents can support a wide range of illegal activities. They are widely used across the modern economy, from finance to employment and immigration.\u00a0<\/p>\r\n\r\n<p><\/p>\r\n<ul class=\"wp-block-list\">\r\n\t<li>Financial fraud &#8211; using falsified documents (including financial information such as a credit report) to acquire a loan or for tax-related identity theft or credit card theft.<\/li>\r\n\r\n\r\n\t<li>Employment fraud &#8211; tampering with documents or VISA records or records to attain a job you are unqualified for or are not legally allowed to do.<\/li>\r\n\r\n\r\n\t<li>Immigration fraud &#8211; using false documents to gain immigration rights, cross borders, or claim certain benefits.<\/li>\r\n<\/ul>\r\n<p>\r\n<\/p>\r\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"577\" class=\"wp-image-21145\" src=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/Gen-AI-document-fraud-1024x577.jpg\" alt=\"An ID fraud check solution mitigates how document fraud and ID fraud is used maliciously.\" srcset=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/Gen-AI-document-fraud-1024x577.jpg 1024w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/Gen-AI-document-fraud-300x169.jpg 300w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/Gen-AI-document-fraud-768x433.jpg 768w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/Gen-AI-document-fraud-1536x866.jpg 1536w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/Gen-AI-document-fraud-2048x1154.jpg 2048w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/Gen-AI-document-fraud-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\r\n<p>\r\n<\/p>\r\n<p>Victims of any type of fraud should file a report with the Federal Trade Commission (FTC). Reporting identity theft, impersonation scams, or document fraud helps authorities understand how widespread these crimes really are. This information allows the FTC to spot emerging patterns, target enforcement, and coordinate with other agencies. In turn, it supports stronger consumer protections, remedial action, and future legislation designed to reduce fraud.<\/p>\r\n<p>\r\n<\/p>\r\n<p>Fraud can be conducted in many ways. We&#8217;ve all seen <em>Catch Me If You Can<\/em>, where a young Leonardo Di Caprio makes a fool out of a Tom Hanks detective. In the 1960s, it was far simpler to create counterfeit personal or financial information in the form of IDs, bank statements, or even bank checks.<\/p>\r\n<p>\r\n<\/p>\r\n<p>In the era of digitalization, data scraping and basic photo editing tools already made it easier to create counterfeit documents. Fraudsters could copy logos, reuse stolen data, and adjust images just enough to fool basic checks. Now, with the rise of Gen AI, the barrier has dropped even further. Anyone can produce highly realistic fake IDs and supporting documents with just a few prompts.<\/p>\r\n<p>\r\n<\/p>\r\n<h2 class=\"wp-block-heading\">What is Generative AI Fraud?<\/h2>\r\n<p>\r\n<\/p>\r\n<p>Generative AI fraud is the use if Gen AI tools to create counterfeit documents, images, or identities. The aim is to bypass security systems that rely on visual checks, template matching, or basic biometrics. Fraudsters generate or manipulate IDs, selfies, and supporting documents until something slips through. An example of the Gen AI fraud process can be seen in the illustration below:<\/p>\r\n<p>\r\n<\/p>\r\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"577\" class=\"wp-image-21169\" src=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/Gen-AI-document-fraud-4-1024x577.jpg\" alt=\"Generative AI fraud detection tools must be used to detect AI fraudulent methodologies\" srcset=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/Gen-AI-document-fraud-4-1024x577.jpg 1024w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/Gen-AI-document-fraud-4-300x169.jpg 300w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/Gen-AI-document-fraud-4-768x433.jpg 768w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/Gen-AI-document-fraud-4-1536x866.jpg 1536w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/Gen-AI-document-fraud-4-2048x1154.jpg 2048w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/Gen-AI-document-fraud-4-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\r\n<p>\r\n<\/p>\r\n<p>&nbsp;<\/p>\r\n<p>\r\n<\/p>\r\n<p>As displayed above, Generative AI fraud can be used alongside identity theft for synthetic data generation to create what apear like genuine accounts. Leveraging fraudulently generated images, bad actors can create convincing new accounts with a different individual&#8217;s identification documents and bypass security systems used by Financial Institutions (FIs) across the world.<\/p>\r\n<p>\r\n<\/p>\r\n<p>This Deloitte report suggests that the adoption of compliance technologies is giving criminals the advantage over firms when it comes to leveraging Gen AI to circumvent compliance security programs. If this development continues past 2024, the global financial system could be at risk of exceeding today&#8217;s volume of money laundering.<\/p>\r\n<p>\r\n<\/p>\r\n<p>The solution to not only preventing this figure from rising but actively reducing it, is adopting compliance solutions that make use of the same advanced technologies that attempt to breach FIs. This is made clear through many national and international regulatory bodies, such as:<\/p>\r\n<p>\r\n<\/p>\r\n<ul class=\"wp-block-list\">\r\n\t<li>The US Department of the Treasure (DoT)<\/li>\r\n\r\n\r\n\t<li>The Financial Conduct Authority (FCA).<\/li>\r\n\r\n\r\n\t<li>The Monetary Authority of Singapore (MAS).<\/li>\r\n\r\n\r\n\t<li>The Financial Action Task Force (FATF).<\/li>\r\n<\/ul>\r\n<p>\r\n<\/p>\r\n<p>\r\n<\/p>\r\n<p>\r\n<\/p>\r\n<div class=\"cc-block case-study\">\r\n<h3><strong>Case Study: Hong Kong: Deepfake \u201cSelfies\u201d Open Accounts at 30 Banks<\/strong><\/h3>\r\n<h3 data-start=\"317\" data-end=\"375\">Problem: Deepfakes Bypass KYC Across Hong Kong Banks<\/h3>\r\n<p data-start=\"376\" data-end=\"950\">In April 2025, the Israeli Money Laundering and Terrorist Financing Prohibition Authority (IMPA) reported a case where a fraud network used deepfake technology to replace criminals\u2019 faces with images taken from stolen IDs. Using these manipulated selfies, fraudsters <strong data-start=\"637\" data-end=\"704\">successfully opened accounts at 30 different banks in Hong Kong<\/strong>, then used those accounts to launder <strong data-start=\"742\" data-end=\"766\">over USD 1.2 million<\/strong>.<\/p>\r\n<h3 data-start=\"952\" data-end=\"1000\">Solution: How ComplyCube Could Have Helped<\/h3>\r\n<p data-start=\"1001\" data-end=\"1521\">ComplyCube\u2019s stack could have added multiple lines of defence here: advanced <strong data-start=\"1078\" data-end=\"1098\">liveness and presentation attack detection (PAD)<\/strong>\u00a0to detect deepfake artefacts in selfie streams, <strong data-start=\"1147\" data-end=\"1179\">document and selfie cross-checks<\/strong> with NFC chip data where available, and <strong data-start=\"1220\" data-end=\"1243\">device intelligence<\/strong> to expose patterns such as the same devices, IP ranges, or emulators being reused across \u201cdifferent\u201d customers and banks.\u00a0<\/p>\r\n<h3 data-start=\"1523\" data-end=\"1577\">Outcomes: Likely Impact With ComplyCube in Place<\/h3>\r\n<p data-start=\"1578\" data-end=\"2035\">With ComplyCube in the flow, many of those 30 applications would have raised a high-risk score due to repeated devices, abnormal onboarding, or inconsistencies between document, chip and selfie. That would have limited the number of accounts opened, reduced the total amount laundered, and generated richer signals for suspicious activity reports (SARs), helping both the banks and local FIUs intervene earlier.<\/p>\r\n<\/div>\r\n<p>\r\n<\/p>\r\n<h2 class=\"wp-block-heading\">Generative AI Fraud Detection<\/h2>\r\n<p>\r\n<\/p>\r\n<h2 class=\"wp-block-heading\">\r\n<\/h2>\r\n<p>\r\n<\/p>\r\n<p>Detecting Gen AI fraud requires advanced machine learning to leverage similar data sets that are used to create fraudulent documents and images. When verification systems utilize the same &#8211; or similar &#8211; data sets, they can identify the patterns that Generative AI fraud technologies would create to bypass traditional methods. These tools significantly increase a firm&#8217;s fraud detection capabilities.<\/p>\r\n<p>\r\n<\/p>\r\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"577\" class=\"wp-image-18048\" src=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/03\/automated_kyc_verification_idv-1024x577.jpg\" alt=\"KYC Software vendors provide seamless identity verification solutions\" srcset=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/03\/automated_kyc_verification_idv-1024x577.jpg 1024w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/03\/automated_kyc_verification_idv-300x169.jpg 300w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/03\/automated_kyc_verification_idv-768x433.jpg 768w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/03\/automated_kyc_verification_idv-1536x866.jpg 1536w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/03\/automated_kyc_verification_idv-2048x1154.jpg 2048w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/03\/automated_kyc_verification_idv-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\r\n<p>\r\n<\/p>\r\n<h3 class=\"wp-block-heading\">Document Verification<\/h3>\r\n<p>\r\n<\/p>\r\n<h3 class=\"wp-block-heading\">\r\n<\/h3>\r\n<p>\r\n<\/p>\r\n<p>For the most reliable results, document verification processes must be conducted live and during the client acquisition process. Document liveness ensures that the uploaded image will not have been tampered with, as it must have come from a user&#8217;s smartphone camera to be completed. The process then examines all available data spots from the ID.<\/p>\r\n<p>\r\n<\/p>\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" class=\"wp-image-17987\" src=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/02\/document-verification-kyv-complycube-1024x577.jpg\" alt=\"Document Verification: anti fraud solutions\" srcset=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/02\/document-verification-kyv-complycube-1024x577.jpg 1024w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/02\/document-verification-kyv-complycube-300x169.jpg 300w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/02\/document-verification-kyv-complycube-768x433.jpg 768w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/02\/document-verification-kyv-complycube-1536x866.jpg 1536w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/02\/document-verification-kyv-complycube-2048x1154.jpg 2048w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/02\/document-verification-kyv-complycube-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\r\n<p>\r\n<\/p>\r\n<ul class=\"wp-block-list\">\r\n\t<li>Visual Inspection Zone (VIZ)<\/li>\r\n\r\n\r\n\t<li>Machine Readable Zone (MRZ)<\/li>\r\n\r\n\r\n\t<li>RFID chip<\/li>\r\n\r\n\r\n\t<li>Barcodes<\/li>\r\n<\/ul>\r\n<p>\r\n<\/p>\r\n<ul class=\"wp-block-list\"><\/ul>\r\n<p>\r\n<\/p>\r\n<p>Near-Field Communication (NFC) verification takes this process even further by reading an embedded chip inside the document that provides an immutable data transfer. NFC verification captures the stock image of a document in far greater quality than an image upload ever could, permitting greater biometric matching and assurance of unadulterated documents. For more information, read <a href=\"https:\/\/www.complycube.com\/en\/what-is-nfc-id-verification\/\">What is NFC ID Verification?<\/a><\/p>\r\n<p>\r\n<\/p>\r\n<p>\r\n<\/p>\r\n<p>\r\n<\/p>\r\n<h3 class=\"wp-block-heading\">Biometric Verification<\/h3>\r\n<p>\r\n<\/p>\r\n<h3 class=\"wp-block-heading\">\r\n<\/h3>\r\n<p>\r\n<\/p>\r\n<p>Biometric verification, or selfie verification, is used to add a secondary layer of identity assurance for businesses. Following the data capture and verification from the document, biometric verification is used to match for similarities between the stock image in the ID, and the facial biometrics in the selfie.<\/p>\r\n<p>\r\n<\/p>\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" class=\"wp-image-17064\" src=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2023\/08\/complycube-biometric-verification-analysis-1024x577.jpg\" alt=\"biometric verification analysis\" srcset=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2023\/08\/complycube-biometric-verification-analysis-1024x577.jpg 1024w, https:\/\/www.complycube.com\/wp-content\/uploads\/2023\/08\/complycube-biometric-verification-analysis-300x169.jpg 300w, https:\/\/www.complycube.com\/wp-content\/uploads\/2023\/08\/complycube-biometric-verification-analysis-768x433.jpg 768w, https:\/\/www.complycube.com\/wp-content\/uploads\/2023\/08\/complycube-biometric-verification-analysis-1536x866.jpg 1536w, https:\/\/www.complycube.com\/wp-content\/uploads\/2023\/08\/complycube-biometric-verification-analysis-2048x1154.jpg 2048w, https:\/\/www.complycube.com\/wp-content\/uploads\/2023\/08\/complycube-biometric-verification-analysis-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\r\n<p>\r\n<\/p>\r\n<p>&nbsp;<\/p>\r\n<p>\r\n<\/p>\r\n<p>Again, liveness is crucial, as it ensures that the image has not been edited with or generated by AI. PAD verification builds digital 3D structures around the face to analyze skin tones and micro-expressions, check for masks, and detect pixel alteration. For more information, read <a href=\"https:\/\/www.complycube.com\/en\/liveness-detection-best-practices-for-anti-spoofing-security\/\">Liveness Detection: Best Practices for Anti-Spoofing Security.<\/a><\/p>\r\n<p>\r\n<\/p>\r\n<p>\r\n<\/p>\r\n<p>\r\n<\/p>\r\n<p>ComplyCube&#8217;s selfie verification engine can also be used as an age estimation solution. It provides accurate yet frictionless security for age-gated goods while preventing fraudulent individuals from gaining access.<\/p>\r\n<p>\r\n<\/p>\r\n<h3 class=\"wp-block-heading\">Device Intelligence<\/h3>\r\n<p>\r\n<\/p>\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" class=\"wp-image-30230\" src=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/2-1024x577.png\" alt=\"A digital interface showcasing a multi-step identity verification process, including document upload, facial recognition, and approval status, designed with a clean, minimalist layout and user-centric UI elements.\" srcset=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/2-1024x577.png 1024w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/2-300x169.png 300w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/2-768x433.png 768w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/2-1536x866.png 1536w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/2-2048x1154.png 2048w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/07\/2-18x10.png 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\r\n<p>\r\n<\/p>\r\n<p>Even with strong document and biometric checks, some synthetic identities still slip through, especially when they\u2019re orchestrated by well-coordinated fraud networks. This is where device intelligence becomes the missing layer in many IDV flows, adding context about <em data-start=\"266\" data-end=\"271\">how<\/em> a user is accessing your platform, not just <em data-start=\"316\" data-end=\"321\">who<\/em> they claim to be.<\/p>\r\n<p>\r\n<\/p>\r\n<p>Device intelligence looks at signals from the user\u2019s device and network: the hardware and operating system, browser attributes, IP address, and whether the time zone and geolocation make sense for the claimed identity. It also detects riskier setups such as emulators, virtual machines, or rooted\/jailbroken devices, and spots automated behaviour like scripted form fills or unnaturally fast, repetitive interactions.\u00a0<\/p>\r\n<p>\r\n<\/p>\r\n<p>When these signals are correlated across sessions and accounts, businesses can start to see fraud rings rather than isolated incidents. High-risk onboarding attempts can be flagged before completion, and step-up checks can be applied only when the device risk is elevated. In combination with Gen AI fraud detection and advanced IDV, device intelligence turns identity verification from a static document check into a dynamic, risk-based assessment of the person, their device, and their behaviour over time.<\/p>\r\n<p>\r\n<\/p>\r\n<div class=\"cc-block key-takeaways\">\r\n<h3>Key Takeaways<\/h3>\r\n<ul>\r\n\t<li data-start=\"2938\" data-end=\"3076\"><strong data-start=\"2938\" data-end=\"2985\">Gen AI lowers the barrier to document fraud<\/strong>: Anyone can generate realistic IDs and supporting documents, making fraud more scalable.<\/li>\r\n\t<li data-start=\"3079\" data-end=\"3217\"><strong data-start=\"3079\" data-end=\"3124\">Document-only checks are no longer enough<\/strong>: Visual inspection, MRZ, and even basic liveness can be fooled by sophisticated attackers.<\/li>\r\n\t<li data-start=\"3220\" data-end=\"3376\"><strong data-start=\"3220\" data-end=\"3261\">Biometrics need strong liveness (PAD)<\/strong>: 3D face maps, micro-expression analysis, and pixel-level checks are vital to stop deepfakes and replay attacks.<\/li>\r\n\t<li data-start=\"3379\" data-end=\"3561\"><strong data-start=\"3379\" data-end=\"3430\">Device intelligence is a crucial \u201cthird signal\u201d<\/strong>: Device fingerprinting, reputation, and behavioral patterns help link seemingly separate applications and highlight fraud rings.<\/li>\r\n\t<li data-start=\"3564\" data-end=\"3748\"><strong data-start=\"3564\" data-end=\"3602\">Use device re-authentication when users log back in <\/strong>to confirm it\u2019s the original device (and not a new device in a remote location), reducing the risk of account takeover.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<p>\r\n<\/p>\r\n<h2 class=\"wp-block-heading\">Is Your Platform Protected from Generative AI Fraud?<\/h2>\r\n<p>\r\n<\/p>\r\n<h2 class=\"wp-block-heading\">\r\n<\/h2>\r\n<p>\r\n<\/p>\r\n<p>Generative AI has fundamentally changed document fraud. It\u2019s no longer enough to check a single ID and selfie at onboarding and hope for the best. As this article has shown, modern attacks blend AI-generated documents, deepfakes, synthetic identities, and coordinated device use to slip past legacy controls and then exploit your platform through credit card fraud, mule activity, and complex money flows.<\/p>\r\n<p>\r\n<\/p>\r\n<p>To keep pace, businesses need layered, continuously adaptive defenses. That means combining live document checks, NFC reads, biometric liveness, device intelligence, and machine-learning anomaly detection to monitor behavior across many channels over time. When these signals work together, fraud rings become visible, false positives fall, and genuine customers move through your flows with far less friction.<\/p>\r\n<p>\r\n<\/p>\r\n<p>If you\u2019re rethinking your fraud strategy in light of Gen AI, our team at ComplyCube can help you design and implement a verification stack that matches your risk profile, products, and markets. <strong data-start=\"1146\" data-end=\"1275\"><a title=\"\" href=\"https:\/\/www.complycube.com\/en\/contact\/contact-sales\/\" target=\"_blank\" rel=\"noopener\">Get in touch with our team<\/a> <\/strong>to explore how ComplyCube can help protect your platform from Generative AI-driven document fraud.<\/p>\r\n<p>\r\n<\/p>\r\n<p>\r\n<\/p>\r\n<p>\r\n<\/p>\r\n<p>&nbsp;<\/p>\r\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Generative AI fraud detection is crucial to combat document fraud. Robust Identity Verification processes can stop ID fraud at its root, but finding the right solution can be challenging for many businesses.<\/p>\n","protected":false},"author":35,"featured_media":30229,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[6],"tags":[53],"class_list":["post-21144","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides","tag-identity-verification"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.complycube.com\/en\/wp-json\/wp\/v2\/posts\/21144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.complycube.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.complycube.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.complycube.com\/en\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.complycube.com\/en\/wp-json\/wp\/v2\/comments?post=21144"}],"version-history":[{"count":0,"href":"https:\/\/www.complycube.com\/en\/wp-json\/wp\/v2\/posts\/21144\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.complycube.com\/en\/wp-json\/wp\/v2\/media\/30229"}],"wp:attachment":[{"href":"https:\/\/www.complycube.com\/en\/wp-json\/wp\/v2\/media?parent=21144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.complycube.com\/en\/wp-json\/wp\/v2\/categories?post=21144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.complycube.com\/en\/wp-json\/wp\/v2\/tags?post=21144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}