{"id":12574,"date":"2026-03-12T18:02:56","date_gmt":"2026-03-12T17:02:56","guid":{"rendered":"https:\/\/evidency.io\/?p=12574"},"modified":"2026-03-12T18:18:42","modified_gmt":"2026-03-12T17:18:42","slug":"prevention-document-fraud","status":"publish","type":"post","link":"https:\/\/evidency.io\/en\/prevention-document-fraud\/","title":{"rendered":"Document fraud: why detection is no longer sufficient (and how to act earlier)"},"content":{"rendered":"<p><strong>Key takeaways<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Document fraud represents a tangible risk for businesses<\/li>\n\n\n\n<li>Generative AI makes the production of forged documents easier<\/li>\n\n\n\n<li>Detection occurs when the fraud has already taken place<\/li>\n\n\n\n<li>An evidence-based approach makes it possible to act upstream by securing documents<\/li>\n\n\n\n<li>Prevention and detection are complementary in combating document fraud<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Document fraud in 2025\u201326: a phenomenon that has reached a new scale<\/h2>\n\n\n\n<p>69% of French companies report having been targeted by at least one attempt at document fraud [1]. In France, the annual cost exceeds \u20ac65 billion, or around 2.5% of national GDP [2]. Digital falsifications increased by 244% between 2023 and 2024, surpassing physical counterfeits for the first time: 57% of detected document fraud cases are now digital [3].<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The influence of AI in document falsification<\/h3>\n\n\n\n<p>Until recently, producing a convincing forged document required genuine technical expertise. That requirement has almost disappeared.<\/p>\n\n\n\n<p>Among individuals who have used forged documents, 37% relied on a generative AI solution, a figure already approaching the 42% who used traditional editing software [2].<\/p>\n\n\n\n<p>The acceleration does not stop there. <a href=\"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/\">Deepfakes<\/a> now rank among the top five global fraud threats, with a 1,100% increase during the first quarter of 2025 in the United States [4].<\/p>\n\n\n\n<p>Platforms offering \u201cFraud-as-a-Service\u201d now provide ready-to-use falsification kits. In addition, AI fraud agents are capable of generating forged documents on demand and adapting their strategies in real time [4]. Our white paper examines these new fraud vectors as well as the criminal ecosystem that is emerging around them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The normalisation of document fraud<\/h3>\n\n\n\n<p>The figures illustrating this normalisation are telling:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>10.8% of French citizens acknowledge having already used a forged document, reporting a self-declared success rate of 73% [2]<\/li>\n\n\n\n<li>Among individuals under 35, more than 20% admit to having falsified documents in order to open a bank account or obtain credit [5]<\/li>\n<\/ul>\n\n\n\n<p>Document fraud is no longer confined to organised crime. It is becoming embedded in everyday practices, making detection increasingly difficult.<\/p>\n\n\n\n<p>Faced with this transformation, control mechanisms remain necessary. However, they encounter limitations that organisations would be mistaken to underestimate.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why detection alone is no longer sufficient to address document fraud<\/h2>\n\n\n\n<p>Human checks, document analysis software, sampling-based verification and artificial intelligence tools: <a href=\"https:\/\/evidency.io\/en\/document-fraud-detection-in-business\/\">detection mechanisms<\/a> have multiplied. These responses are useful. However, they share three structural weaknesses that limit their effectiveness.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The quality of forged documents<\/h3>\n\n\n\n<p>A document generated by a latest-generation AI no longer displays the visual anomalies (inconsistent fonts, pixelated logos, approximate alignment) that previously made falsifications easier to identify.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The time problem<\/h3>\n\n\n\n<p>Detection occurs after the document has been received. When fraud is identified, the loss has often already occurred. The organisation finds itself reacting in an attempt to recover funds that may already have disappeared.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The technological race<\/h3>\n\n\n\n<p>Sampling approaches inevitably allow some fraudulent documents to pass through. Statistical approaches detect only previously identified patterns: as long as a new modus operandi has not been recognised, it remains undetected.<\/p>\n\n\n\n<p>At the same time, falsification tools evolve at the same pace as, or faster than, detection technologies.<\/p>\n\n\n\n<p>The challenge is therefore to intervene earlier in the chain: not by focusing on the fraudster, but on the document itself, making it verifiable from the moment it is created.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The evidence-based approach: securing the document from its creation<\/h2>\n\n\n\n<p>The aim is not to replace detection but to complement it with a mechanism that acts upstream. The evidence-based approach consists of securing documents at the moment they are issued so that any attempt at falsification leaves a verifiable trace. When stakeholders are aware of this, the attempt itself may be discouraged.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The principle<\/h3>\n\n\n\n<p>A document secured at issuance becomes verifiable at any point in its lifecycle through three simultaneous guarantees:<\/p>\n\n\n\n<p>The integrity of the document, meaning certainty that its content has not been altered since its creation<br>The identity of the issuer, allowing any recipient to verify that the document genuinely originates from the organisation indicated<br>Its anchoring in time, through the application of a legally reliable and enforceable date<\/p>\n\n\n\n<p>If one of these guarantees is missing, the chain of trust breaks. Their combination, however, makes any attempt at falsification detectable.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The three mechanisms<\/h3>\n\n\n\n<p><a href=\"https:\/\/evidency.io\/en\/qualified-timestamping\/\">Qualified electronic timestamping<\/a> fixes the document at a specific moment in time. It calculates a cryptographic hash of the content and associates it with a reliable date and time. If even a single character is modified after the timestamp is applied, the hash no longer matches and the alteration becomes evident. In practice, this means that an invoice timestamped at the moment of issuance carries proof of its production date, and a contract secured in this way cannot be backdated.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/evidency.io\/en\/electronic-seal\/\">electronic seal<\/a> links the document to the <a href=\"https:\/\/evidency.io\/en\/corporate-digital-identity-secure-business\/\">organisation that produced it<\/a>. The recipient can verify within seconds that the invoice, certificate or statement received genuinely originates from the legal entity indicated. Unlike an electronic signature, which commits an individual to a legal act, the electronic seal commits the organisation itself. It can therefore be applied automatically to large volumes of outgoing documents without manual intervention.<\/p>\n\n\n\n<p><a href=\"https:\/\/evidency.io\/en\/electronic-archiving\/\">Electronic archiving<\/a> preserves the evidence over time. A timestamped and sealed document loses its evidential strength if the conditions of its storage do not ensure its long-term integrity. Qualified electronic archiving guarantees the durability, readability and integrity of documents for the entire legally or contractually required retention period.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The legal framework<\/h3>\n\n\n\n<p>These three services are not merely matters of best practice. The eIDAS Regulation grants them harmonised legal recognition across all Member States of the European Union.<\/p>\n\n\n\n<p>Only the qualified level, delivered by a Qualified Trust Service Provider (QTSP) that has successfully completed a conformity audit, benefits from reinforced legal presumptions that reverse the burden of proof: it becomes the responsibility of the party challenging the integrity or date of a document to demonstrate that they are inaccurate. In the context of litigation or an audit, this advantage is considerable.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The deterrent effect<\/h3>\n\n\n\n<p>One aspect that organisations still underestimate is the deterrent dimension of this approach. A supplier that informs its clients that all invoices are sealed and timestamped, and that an online verification portal allows their authenticity to be checked, changes the equation for the fraudster. The attempt becomes riskier for its author and the probability of success decreases significantly.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">From theory to practice: which documents should be secured first<\/h2>\n\n\n\n<p>The evidence-based approach is not theoretical. It is already deployed in several sectors.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">A concrete example: the AQP standard<\/h3>\n\n\n\n<p>Road construction provides a telling example. Faced with repeated fraud involving asphalt delivery notes, the sector structured the AQP (Assurance Qualit\u00e9 Pesage) framework as early as 1996, formalised through standard <a href=\"https:\/\/evidency.io\/en\/fraud-prevention-construction-sector\/\">NF P 98-750<\/a>. The digitalisation of these delivery notes became possible through the integration of qualified timestamping, electronic sealing and an online verification portal.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Sector overview<\/h3>\n\n\n\n<p>In banking and financial services, account statements, balance certificates and KYC documentation are frequent targets. <a href=\"https:\/\/evidency.io\/en\/understanding-dora-regulation-requirements\/\">The DORA Regulation<\/a>, applicable since January 2025, reinforces obligations relating to the integrity of data and digital documents.<\/p>\n\n\n\n<p>In insurance, claims declarations, expert reports and contract amendments are regularly subject to falsification attempts involving dates, amounts or coverage conditions.<\/p>\n\n\n\n<p>In real estate, technical diagnostics, pre-sale agreements and property condition reports circulate between multiple intermediaries. Each transmission creates an opportunity for falsification.<\/p>\n\n\n\n<p>In industry, material compliance certificates, quality-control reports and delivery notes underpin the trust between supplier and contractor. The falsification of a compliance certificate in sectors such as aerospace, automotive or pharmaceuticals may have consequences extending far beyond financial loss.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">An investment in digital trust<\/h2>\n\n\n\n<p>Detection remains a necessary component. However, it addresses only documents received and operates after the event. Prevention through evidence operates on a different level: it secures documents issued by the organisation and alters the conditions under which fraud can occur.<\/p>\n\n\n\n<p>This approach forms part of a broader movement aimed at strengthening digital trust in dematerialised exchanges. As documents increasingly migrate to digital formats, an organisation\u2019s capacity to guarantee the authenticity of its own documents becomes a marker of reliability.<\/p>\n\n\n\n<p>Those that anticipate this requirement will gain an advantage that goes beyond regulatory compliance: they will have built, document by document, the foundation of trust on which their commercial, legal and institutional relationships depend.<\/p>\n\n\n\n<p>To explore the subject further, our white paper \u201cDocument fraud: when prevention is better than cure\u201d examines each mechanism, provides sector-specific feedback and sets out ten recommendations for deploying a document fraud prevention strategy.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/evidency.io\/en\/contact-evidency\/\" style=\"background-color:#0c0171\">Secure your digital documents with Evidency solutions<\/a><\/div>\n<\/div>\n\n\n\n<p><strong>Sources<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Allianz Trade\u2013DFCG, <em>Fraud Study 2022<\/em>: https:\/\/www.allianz-trade.fr\/actualites\/etude-fraude-2022.html<\/li>\n\n\n\n<li>Tessi Document Fraud Observatory, <em>Initial Report 2025<\/em>: https:\/\/www.tessi.eu\/fr\/observatoire-tessi-de-la-fraude-documentaire\/<\/li>\n\n\n\n<li>Entrust Cybersecurity Institute, <em>2025 Identity Fraud Report<\/em> (November 2024): https:\/\/www.entrust.com\/sites\/default\/files\/documentation\/reports\/2025-identity-fraud-report.pdf<\/li>\n\n\n\n<li>Sumsub, <em>Identity Fraud Report 2025\u20132026<\/em> (November 2025): https:\/\/sumsub.com\/fraud-report-2025\/ ; <em>Synthetic Identity Document Fraud Surges 300% in the U.S.<\/em>: https:\/\/sumsub.com\/newsroom\/synthetic-identity-document-fraud-surges-300-in-the-u-s-sumsub-warns-e-commerce-healthtech-and-fintech-at-risk\/<\/li>\n\n\n\n<li>IN BANQUE (with Capgemini Invent and Tessi), <em>The French and their bank in 2024<\/em> (15 July 2024): https:\/\/www.inbanque.com\/etude-les-francais-et-leur-banque-en-2024-les-principaux-enseignements\/<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><em>Disclaimer<\/em><\/strong><\/p>\n\n\n\n<p><em>The opinions, presentations, figures and estimates set forth on the website including in the blog are for informational purposes only and should not be construed as legal advice. For legal advice you should contact a legal professional in your jurisdiction.<\/em><\/p>\n\n\n\n<p><em>The use of any content on this website, including in this blog, for any commercial purposes, including resale, is prohibited, unless permission is first obtained from Evidency. Request for permission should state the purpose and the extent of the reproduction. For non-commercial purposes, all material in this publication may be freely quoted or reprinted, but acknowledgement is required, together with a link to this website.<\/em><\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Key takeaways Document fraud in 2025\u201326: a phenomenon that has reached a new scale 69% of French companies report having been targeted by at least one attempt at document fraud [1]. In France, the annual cost exceeds \u20ac65 billion, or around 2.5% of national GDP [2]. Digital falsifications increased by 244% between 2023 and 2024, [&hellip;]<\/p>\n","protected":false},"author":246879326,"featured_media":12588,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[6491],"tags":[],"ppma_author":[6457],"class_list":["post-12574","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraud","author-stephane-pere"],"acf":{"profil":"","bio":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Document fraud and AI: preventing rather than detecting<\/title>\n<meta name=\"description\" content=\"Detecting forged documents is no longer sufficient. An evidence-based approach secures documents from issuance through timestamping, electronic seals and qualified archiving.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/evidency.io\/en\/prevention-document-fraud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Document fraud and AI: preventing rather than detecting\" \/>\n<meta property=\"og:description\" content=\"Detecting forged documents is no longer sufficient. An evidence-based approach secures documents from issuance through timestamping, electronic seals and qualified archiving.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/evidency.io\/en\/prevention-document-fraud\/\" \/>\n<meta property=\"og:site_name\" content=\"Evidency\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-12T17:02:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T17:18:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/fraude-documentaire.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"St\u00e9phane P\u00e8re\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"St\u00e9phane P\u00e8re\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/evidency.io\/en\/prevention-document-fraud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/evidency.io\/en\/prevention-document-fraud\/\"},\"author\":{\"name\":\"St\u00e9phane P\u00e8re\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/1888314d58ec64690ef29f8594d44cbf\"},\"headline\":\"Document fraud: why detection is no longer sufficient (and how to act earlier)\",\"datePublished\":\"2026-03-12T17:02:56+00:00\",\"dateModified\":\"2026-03-12T17:18:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/evidency.io\/en\/prevention-document-fraud\/\"},\"wordCount\":1568,\"publisher\":{\"@id\":\"https:\/\/evidency.io\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/prevention-document-fraud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/fraude-documentaire.webp\",\"articleSection\":[\"Fraud\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/evidency.io\/en\/prevention-document-fraud\/\",\"url\":\"https:\/\/evidency.io\/en\/prevention-document-fraud\/\",\"name\":\"Document fraud and AI: preventing rather than detecting\",\"isPartOf\":{\"@id\":\"https:\/\/evidency.io\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/evidency.io\/en\/prevention-document-fraud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/prevention-document-fraud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/fraude-documentaire.webp\",\"datePublished\":\"2026-03-12T17:02:56+00:00\",\"dateModified\":\"2026-03-12T17:18:42+00:00\",\"description\":\"Detecting forged documents is no longer sufficient. An evidence-based approach secures documents from issuance through timestamping, electronic seals and qualified archiving.\",\"breadcrumb\":{\"@id\":\"https:\/\/evidency.io\/en\/prevention-document-fraud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/evidency.io\/en\/prevention-document-fraud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/prevention-document-fraud\/#primaryimage\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/fraude-documentaire.webp\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/fraude-documentaire.webp\",\"width\":950,\"height\":500,\"caption\":\"Fraude documentaire et IA - prevenir plutot que detecter\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/evidency.io\/en\/prevention-document-fraud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Evidency\",\"item\":\"https:\/\/evidency.io\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Document fraud: why detection is no longer sufficient (and how to act earlier)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/evidency.io\/en\/#website\",\"url\":\"https:\/\/evidency.io\/en\/\",\"name\":\"Evidency\",\"description\":\"Sp\u00e9cialiste de la preuve num\u00e9rique\",\"publisher\":{\"@id\":\"https:\/\/evidency.io\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/evidency.io\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/evidency.io\/en\/#organization\",\"name\":\"Evidency\",\"url\":\"https:\/\/evidency.io\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg\",\"width\":275,\"height\":58,\"caption\":\"Evidency\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/evidency-io\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/1888314d58ec64690ef29f8594d44cbf\",\"name\":\"St\u00e9phane P\u00e8re\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/image\/d13b2274f4c8cd6020ef82e1cf02bac2\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Stephane.webp\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Stephane.webp\",\"caption\":\"St\u00e9phane P\u00e8re\"},\"description\":\"St\u00e9phane is the Managing Director of Evidency. Formerly the Chief Data Officer at The Economist Group, he has over 20 years of international experience in the technology and media sectors.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/stephanepere\/\"],\"url\":\"https:\/\/evidency.io\/author\/stephane-pere\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Document fraud and AI: preventing rather than detecting","description":"Detecting forged documents is no longer sufficient. An evidence-based approach secures documents from issuance through timestamping, electronic seals and qualified archiving.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/evidency.io\/en\/prevention-document-fraud\/","og_locale":"en_US","og_type":"article","og_title":"Document fraud and AI: preventing rather than detecting","og_description":"Detecting forged documents is no longer sufficient. An evidence-based approach secures documents from issuance through timestamping, electronic seals and qualified archiving.","og_url":"https:\/\/evidency.io\/en\/prevention-document-fraud\/","og_site_name":"Evidency","article_published_time":"2026-03-12T17:02:56+00:00","article_modified_time":"2026-03-12T17:18:42+00:00","og_image":[{"width":950,"height":500,"url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/fraude-documentaire.webp","type":"image\/webp"}],"author":"St\u00e9phane P\u00e8re","twitter_card":"summary_large_image","twitter_misc":{"Written by":"St\u00e9phane P\u00e8re","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/evidency.io\/en\/prevention-document-fraud\/#article","isPartOf":{"@id":"https:\/\/evidency.io\/en\/prevention-document-fraud\/"},"author":{"name":"St\u00e9phane P\u00e8re","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/1888314d58ec64690ef29f8594d44cbf"},"headline":"Document fraud: why detection is no longer sufficient (and how to act earlier)","datePublished":"2026-03-12T17:02:56+00:00","dateModified":"2026-03-12T17:18:42+00:00","mainEntityOfPage":{"@id":"https:\/\/evidency.io\/en\/prevention-document-fraud\/"},"wordCount":1568,"publisher":{"@id":"https:\/\/evidency.io\/en\/#organization"},"image":{"@id":"https:\/\/evidency.io\/en\/prevention-document-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/fraude-documentaire.webp","articleSection":["Fraud"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/evidency.io\/en\/prevention-document-fraud\/","url":"https:\/\/evidency.io\/en\/prevention-document-fraud\/","name":"Document fraud and AI: preventing rather than detecting","isPartOf":{"@id":"https:\/\/evidency.io\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/evidency.io\/en\/prevention-document-fraud\/#primaryimage"},"image":{"@id":"https:\/\/evidency.io\/en\/prevention-document-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/fraude-documentaire.webp","datePublished":"2026-03-12T17:02:56+00:00","dateModified":"2026-03-12T17:18:42+00:00","description":"Detecting forged documents is no longer sufficient. An evidence-based approach secures documents from issuance through timestamping, electronic seals and qualified archiving.","breadcrumb":{"@id":"https:\/\/evidency.io\/en\/prevention-document-fraud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/evidency.io\/en\/prevention-document-fraud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/prevention-document-fraud\/#primaryimage","url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/fraude-documentaire.webp","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/fraude-documentaire.webp","width":950,"height":500,"caption":"Fraude documentaire et IA - prevenir plutot que detecter"},{"@type":"BreadcrumbList","@id":"https:\/\/evidency.io\/en\/prevention-document-fraud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Evidency","item":"https:\/\/evidency.io\/en\/"},{"@type":"ListItem","position":2,"name":"Document fraud: why detection is no longer sufficient (and how to act earlier)"}]},{"@type":"WebSite","@id":"https:\/\/evidency.io\/en\/#website","url":"https:\/\/evidency.io\/en\/","name":"Evidency","description":"Sp\u00e9cialiste de la preuve num\u00e9rique","publisher":{"@id":"https:\/\/evidency.io\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/evidency.io\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/evidency.io\/en\/#organization","name":"Evidency","url":"https:\/\/evidency.io\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/","url":"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg","width":275,"height":58,"caption":"Evidency"},"image":{"@id":"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/evidency-io\/"]},{"@type":"Person","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/1888314d58ec64690ef29f8594d44cbf","name":"St\u00e9phane P\u00e8re","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/image\/d13b2274f4c8cd6020ef82e1cf02bac2","url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Stephane.webp","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Stephane.webp","caption":"St\u00e9phane P\u00e8re"},"description":"St\u00e9phane is the Managing Director of Evidency. Formerly the Chief Data Officer at The Economist Group, he has over 20 years of international experience in the technology and media sectors.","sameAs":["https:\/\/www.linkedin.com\/in\/stephanepere\/"],"url":"https:\/\/evidency.io\/author\/stephane-pere\/"}]}},"modified_by":"Cl\u00e9a Guinaudeau","authors":[{"term_id":6457,"user_id":246879326,"is_guest":0,"slug":"stephane-pere","display_name":"St\u00e9phane P\u00e8re","avatar_url":{"url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Stephane-1.webp","url2x":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Stephane-1.webp"},"author_category":"1","first_name":"St\u00e9phane","description_complete":"St\u00e9phane has double Master Degrees in Business &amp; Law, and a 20 year experience in technology, media and market intelligence. Before stepping into the role of Managing Director at Evidency, he served as Chief Data Officer at The Economist Group, where he oversaw and shaped data strategy, analytics, and digital transformation efforts across international operations.\r\nHaving worked across markets and cultures, St\u00e9phane is skilled at aligning diverse teams, product, engineering, legal, compliance, operations, around shared goals.","domaine_dexpertise":"<ul>\r\n \t<li>Digital transformation<\/li>\r\n \t<li>Regulation and compliance<\/li>\r\n \t<li>Data strategy<\/li>\r\n<\/ul>","last_name":"P\u00e8re","user_url":"","job_title":"Managing Director","linkedin":"https:\/\/www.linkedin.com\/in\/stephanepere\/","description":"St\u00e9phane is the Managing Director of Evidency. Formerly the Chief Data Officer at The Economist Group, he has over 20 years of international experience in the technology and media sectors."}],"_links":{"self":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/12574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/users\/246879326"}],"replies":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/comments?post=12574"}],"version-history":[{"count":13,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/12574\/revisions"}],"predecessor-version":[{"id":12608,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/12574\/revisions\/12608"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/media\/12588"}],"wp:attachment":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/media?parent=12574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/categories?post=12574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/tags?post=12574"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/ppma_author?post=12574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}