{"id":15971,"date":"2026-03-18T10:07:20","date_gmt":"2026-03-18T10:07:20","guid":{"rendered":"https:\/\/newestek.com\/?p=15971"},"modified":"2026-03-18T10:07:20","modified_gmt":"2026-03-18T10:07:20","slug":"can-you-prove-the-person-on-the-other-side-is-real","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15971","title":{"rendered":"Can you prove the person on the other side is real?"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>In my role, I spend a lot of time thinking about what \u201ctrust\u201d means when money, grief and identity collide. By 2026, the real competition in our space won\u2019t be who automates fastest or offers the most AI features. It will be who can still tell a legitimate executor, beneficiary or family representative from a manufactured persona.<\/p>\n<p>We\u2019re building with AI because the benefits are undeniable. But we\u2019re also watching that same technology change the economics of impersonation. Synthetic identities and deepfake-enabled scams have moved from edge cases into constant pressure that slowly wears down controls we <a href=\"https:\/\/sumsub.com\/fraud-report-2025\/\">used to trust<\/a>. On paper, identity programs still look strong. Under real-world attack conditions, too many become a thin perimeter that collapses once an adversary applies realism at scale.<\/p>\n<p>In estate and identity-related work, that erosion of trust carries extra weight. A synthetic identity can easily misdirect distributions, delay rightful claims and drag families into disputes because the evidence trail looks \u201ccomplete\u201d even when the person isn\u2019t real.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>The rise of the digital ghost<\/h2>\n<p><a href=\"https:\/\/www.bostonfed.org\/news-and-events\/news\/2025\/04\/synthetic-identity-fraud-financial-fraud-expanding-because-of-generative-artificial-intelligence.aspx\">Synthetic identity fraud<\/a> means manufacturing whole \u201cpeople\u201d who never existed\u2014the digital ghosts. Generative models can produce government-style documents, plausible histories and supporting media that clear routine checks, allowing a fake identity to look consistent across systems, channels and time.<\/p>\n<p>That\u2019s why the cost can be far higher than a single loss event. A synthetic identity can enter an ecosystem, behave normally long enough to blend in and surface later at the exact moment a claim, profile change or payout is needed. When it succeeds, it pollutes the baselines we used to depend on\u2014risk models, case triage and the patterns analysts learn to trust.<\/p>\n<p><a href=\"https:\/\/www.buffalo.edu\/ubnow\/stories\/2026\/01\/lyu-conversation-deep-fakes-2026.html\">Deepfakes raise the stakes<\/a> further by collapsing the boundary between \u201cdigital\u201d and \u201chuman.\u201d Video calls, voice verification and live interactions used to feel like stronger proof. Now an adversary can show up with a face, a voice and a coherent story long enough to pass a rushed review.<\/p>\n<p>If identity is spoofable, every downstream control runs on contaminated truth, even when the process is compliant and well-documented.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Exploiting the deceased and the dormant<\/h2>\n<p>Attackers follow leverage. Dormant, legacy and deceased identities create leverage because they already come with history, which serves as scaffolding for a synthetic persona to climb.<\/p>\n<p>I have seen how quickly a subdued record can become an entry point. An adversary pairs an older account or identity footprint with newly generated documents and a polished support interaction. They request a profile change, a contact update or a payment redirection. They push for a new credential, a new device or a new channel. Each looks like a minute detail in isolation. In sequence, it\u2019s a takeover that feels earned because the activity resembles real life.<\/p>\n<p>Traditional trust signals struggle here. Device fingerprinting, behavioral analytics and static biometrics can help, but AI now targets those signals directly. Typing rhythm can be imitated. Mouse movement can be simulated. Voices can be cloned well enough to fool humans who are tired or rushed. Even experienced reviewers lose their advantage because the obvious seams appear less often.<\/p>\n<p>That is why this threat feels different inside estate-facing workflows. There is usually a compelling story attached to the request. There is often urgency. There is often emotion. Attackers understand that human pressure and procedural pressure create openings that technical controls alone do not close.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Establishing a new standard of proof<\/h2>\n<p>There\u2019s no plug-and-play fix for synthetic identity. Addressing it means moving past \u201cWho is this?\u201d to a more forensic question such as \u201cHow did this identity\u2014and its digital footprint\u2014come to exist?\u201d<\/p>\n<p>That shift raises the standard of proof. It prioritizes provenance, issuer verification and cross-channel consistency over surface-level plausibility. It also changes how teams operate. We can\u2019t keep identity signals scattered across separate tools, queues and owners. We need a shared risk view built from independent signals that either reinforce confidence or reveal contradictions.<\/p>\n<p>In practice, we examine where artifacts came from, how they were created and whether they were altered. We require stronger proof when risk changes and correlates across channels instead of trusting a single checkpoint.<\/p>\n<p>We also have to tighten internal access and auditability. If attackers can impersonate external claimants, they can also target internal workflows. Privileged actions need least privilege, just-in-time access and forensic-grade trails.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Engineering accountability into internal workflows<\/h2>\n<p>Continuous verification has to be a deliberate design choice. A mature program ties the level of proof to the risk of what\u2019s happening right now. A new device shouldn\u2019t be treated like a routine login. A request to change payout instructions should face a higher threshold than a simple record view or address update.<\/p>\n<p>That same discipline must apply internally. High-impact roles and machine identities need named owners, documented credential succession plans and access trails that can be reconstructed without guesswork. When something goes wrong, you don\u2019t want an argument about who <em>might<\/em> have done it. You want evidence.<\/p>\n<p>Regulators and boards are moving this way because the old model assumes identity stays stable once \u201cverified.\u201d AI breaks that assumption. Organizations that treat identity assurance as measurable, with clear risk appetite and regular adversarial testing, will be best positioned to defend their decisions with confidence.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>The 2026 readiness test<\/h2>\n<p>As we look toward 2026, I keep coming back to one question. Can you prove, at any moment, that the identities behind your highest-impact actions belong to real, accountable humans?<\/p>\n<p>If the answer is vague, then AI accelerates the wrong things. It accelerates decisions based on polluted data. It accelerates workflows that can be hijacked by believable fakes. It accelerates outcomes that look compliant until the moment you need to defend them.<\/p>\n<p>In our business, we are not just managing accounts and records. We are protecting legacies, resolving obligations and serving people who often have one chance to get it right. Synthetic identity turns that responsibility into a security problem, a governance problem and a human problem all at the same time. Let\u2019s treat it like the new ground truth.<\/p>\n<p><strong>This article is published as part of the Foundry Expert Contributor Network.<br \/><a href=\"https:\/\/www.csoonline.com\/expert-contributor-network\/\">Want to join?<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In my role, I spend a lot of time thinking about what \u201ctrust\u201d means when money, grief and identity collide. By 2026, the real competition in our space won\u2019t be who automates fastest or offers the most AI features. It will be who can still tell a legitimate executor, beneficiary or family representative from a manufactured persona. We\u2019re building with AI because the benefits are&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15971\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15971","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15971"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15971\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15971"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15971"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}