This glossary explains technical terms, abbreviations, and jargon commonly used by synthetic identity vendors and in our intelligence reports. Understanding these terms helps interpret vendor descriptions and threat assessments.

Document Types
Scannable
A fake ID with a barcode or magnetic stripe that can be read by standard ID verification scanners. These scanners are commonly used at bars, clubs, banks, government offices, and retail stores for age verification and identity checks. Many fake IDs don't scan properly, so vendors advertise "scannable" as a premium feature that makes the fake ID more convincing and harder to detect.
Example: "Selling scannable fake IDs that work at banks and casinos"
Driver's License (DL)
A government-issued identification document that authorizes an individual to operate motor vehicles. Fake driver's licenses are commonly sold by vendors and are used for identity verification, age verification, and opening accounts. They may be advertised as "scannable" or "state-specific."
SSN (Social Security Number)
A nine-digit number issued by the U.S. Social Security Administration to track individuals for Social Security purposes. SSNs are critical identity documents and are heavily targeted by fraudsters. Vendors may sell fake SSNs, stolen SSNs, or SSNs associated with synthetic identities.
Example: "Selling SSN cards with matching driver's licenses"
ID Card
A government-issued identification card (often a state ID) used for identity verification. Fake ID cards are commonly sold alongside driver's licenses and may be advertised as "scannable" or "high-quality" with features like holograms and UV marks.
PSD Template
A Photoshop Document (PSD) template file containing editable layers for creating fake identification documents. These templates allow fraudsters to customize names, addresses, photos, and other details. PSD templates are often sold for specific states or countries.
Example: "Selling editable PSD templates for all 50 US states"
Identity Services
KYC Bypass
Know Your Customer (KYC) bypass services help fraudsters evade identity verification requirements used by banks, cryptocurrency exchanges, payment processors, and other financial institutions. These services may include fake documents, synthetic identities, or methods to circumvent verification systems.
Example: "KYC bypass for bank account opening" or "KYC verification bypass service"
Synthetic Identity
A fake identity created by combining real and fake information. For example, using a real SSN with a fake name and address, or creating a completely fabricated identity. Synthetic identities are used to open accounts, build credit, and commit fraud while avoiding detection.
Example: "Synthetic identity packages with credit history"
Selfie Verification / Selfie Pass
A service that helps bypass identity verification systems that require users to take a selfie photo. These services may provide pre-verified accounts, methods to fake selfie verification, or tools to manipulate verification processes.
Example: "Selfie verification bypass for TikTok shops"
CPN (Credit Privacy Number)
A nine-digit number marketed as an alternative to SSNs for credit purposes. While CPNs are sometimes legitimate (used by victims of identity theft), they are often misused for fraud. Vendors may sell CPN packages with credit repair services or use them to create synthetic identities.
Example: "CPN packages with tradelines for credit building"
Fullz
A complete set of personal information about an individual, typically including name, address, date of birth, SSN, driver's license number, and sometimes financial information. "Fullz" are sold on underground markets and used for identity theft and fraud.
Example: "Selling fullz with bank account access"
Payment & Methods
BTC / Cryptocurrency Payment
Bitcoin or other cryptocurrency payments. Many vendors prefer cryptocurrency because it offers relative anonymity and is harder to trace than traditional payment methods. Common cryptocurrencies include Bitcoin (BTC), Ethereum (ETH), and Monero (XMR).
Example: "Payment accepted in BTC, ETH, or Monero"
Verified Account
A pre-verified account on a platform (bank, payment processor, social media, etc.) that has already passed identity verification. These accounts are sold to fraudsters who want to skip the verification process. Often includes login credentials and may be tied to fake or stolen identities.
Platform & Infrastructure
Telegram Channel
A messaging channel on the Telegram platform used by vendors to advertise services, communicate with customers, and share updates. Telegram is popular among fraud vendors because it offers encryption, anonymity, and is harder for law enforcement to monitor than traditional websites.
Infrastructure Cluster
A group of domains or services that share common infrastructure, such as hosting providers, CDNs, payment processors, or registrars. Identifying infrastructure clusters helps link related operations and vendors, even when they use different domain names or identities.
Threat Assessment Terms
High-Risk Domain
A domain associated with fraudulent activity, identity theft, or other illegal operations. High-risk domains may be flagged based on multiple factors including services offered, infrastructure patterns, payment methods, and threat intelligence indicators.
Vendor Type
A classification of vendors based on their primary services. Common types include fake document vendors, KYC bypass services, synthetic identity providers, and fraud-as-a-service operations. Understanding vendor types helps assess threat levels and operational patterns.