Fraudsters tend to leave a trail of their past exploits. Our technology operates a background check, based on different public data sources, to identify: