SlideShare uma empresa Scribd logo
1 de 44
Protect Your Vital Interests with Direct Access to the
Social Security Administration Master File
Consent Based Social Security Number Verification
A service of the Social Security Administration
Consent Based Social Security Number Verification
is access to the Social Security Administration record resources
Protect Your Vital Interests
It safeguards the reputation of companies that use it and
shields them from losses by mitigating the risks of fraud and identity theft
CBSV purifies, strengthens and enhances verification processes
with direct and instant access to the SSA Master File and Death Index as it
verifies Name, SSN, Date of Birth, Gender, and Death Indicator
Who – Companies and businesses nationwide
What – Premier personal identifier verification from the source
When – Available now with instant results
Where – Online access to the SSA Master File
Why – Mitigate fraud and identity theft and its associated losses
How – Contact your Gallant Background Checks representative
CBSV Answers the Questions
What is CBSV?
 Developed and administered by the Social Security Administration
 Verifies whether a Name, SSN, Date of Birth, Gender and Death Indicator match
the data in Social Security Administration’s Master File and Death Index
 Pilot began in 2002 and current version was launched November 2008
 Real-time online verification and handles large volume requests
 Used for all business verification purposes
Pre-employment, applicant, patient, student, tenant, loan originations, fraud investigations
 Requires signed consent of the Applicant/SSN holder on Form SSA-89
 Used for the specific business purpose designated on the SSA-89
What Are You Relying On?
Does your current method of verification have
CBSV has it!
100% Accuracy of Data Elements?
100% Protection against Synthetic Name Fraud?
100% Regulatory Compliance?
Putting it All Together
 Fraud and ID Theft Continue to Grow Despite Legislation
 Perpetrators Exploit System Vulnerabilities
 You are at Great Risk
 Best Protection is from the Official Source
 Immediate Action is Required
CBSV: Extra Layer of Verification
© 2011 CID, LLC
Social Security Numbers - They’re Everywhere!
Source: Lanny Britnell of IdentityTheftAmerica.com
Availability of Valid SSN Sources
Database Resources
Hundreds of Internet sites are used by criminals to ascertain SSN validity
www.ssnvalidator.com
www.usinfosearch.com
It’s too easy to find a valid number
Availability of SSN sources
puts companies at great risk!
CBSV mitigates SSN abuse
Synthetic Name Fraud
This creates a new, fraudulent credit profile that trusted authorities share with each other as genuine.
SSN integrity has been severely compromised in credit bureau profiles and other trusted authorities.
Also known as Synthetic Identity Fraud, this threat causes “piggy-backing” in credit bureau profiles.
The Federal Trade Commission says…
there are over 10 million more credit profiles
in the system than there are consumers!
Do you want to “verify” in pools of polluted profile information?
Synthetic Name Fraud is using one’s own name, date of birth and address with another persons SSN.
Court OK’s Fraudulent SSN use
We’re battling an uninformed judiciary!
(Source: http://caselaw.findlaw.com/co-court-of-appeals/1058355.html)
The appellate court found Mr. Montes-Rodriguez defrauded a car dealership which required an SSN on
its loan application.
The State Supreme Court however held that since he used his own name, birth date and address, the
use of another person’s SSN was not criminal impersonation. . . even though he also used her SSN for
employment as well.
This is classic Synthetic Name Fraud, even though Mr. Montes-Rodriguez did not know the victim.
It caused a false profile to be created and shared within the credit bureaus and other trusted authorities.
Use of a false SSN even without using the victim’s name is a core issue of ID theft.
CBSV would have stopped the auto scam and the job scam because it
verifies Name, SSN, Date of Birth, Gender, and Death Indicator!
October 2010: Colorado State Supreme Court over-ruled a lower court that convicted a man of criminal
impersonation when he fraudulently used the SSN of another person (a woman victim) when applying
for an auto loan.
This ID thief lived 14 years with a stolen SSN from a 3 year old boy slain
in 1982, passed a criminal background check and worked as a sworn
investigator for the Oregon Liquor Control Commission.
The identity of Jason Robert Evers was stolen by Doitchin Krastev.
How Many Minor Children Have Been Hired Today?
Source: http://www.katu.com/news/local/114718969.html Published: Jan 27, 2011
He was sentenced in January 2011
Synthetic Name Fraud
makes every business vulnerable!
CBSV mitigates Synthetic Name Fraud
The Elephant in the Room
Something BIG has been ignored and gone unaddressed!
Have you heard of Credit Profile Numbers?
© 2011 Computer Information Development, LLC
Credit Profile Numbers
Credit thieves have re-named stolen SSN’s by calling them
Credit Profile (or Credit Privacy) Numbers (CPN)
As we know, the SSA’s Enumeration at Birth (EAB) creates
a large pool of dormant SSN’s for credit thieves to draw from…
Unsuspecting children may not need to use their SSN until
they apply for a job, credit, or college and find that a
credit thief has stolen their identity
Have you seen the headlines?
By BILL DRAPER Associated Press Writer, KANSAS CITY, Mo. August 2, 2010 (AP)
“Thieves are targeting your kid's number long before the little one
even has a bank account.
Hundreds of online businesses are using computers to find dormant
Social Security numbers - usually those assigned to children who
don't use them - then selling those numbers.”
Source: http://abcnews.go.com/Business/wireStory?id=11305930
New ID theft targets kids' Social Security numbers,
could threaten credit system
Making the Headlines
Craigslist – Credit Profile Numbers on sale now!
SSN’s For Sale!
Typical CPN Craigslist Ad
Start a new credit profile?!? Who is allowed to do that?!?
Thieves use SSN validation sites on the Internet!
$100 for a stolen or fabricated SSN
False “tradelines” to prop up your stolen SSN
Do Not Attempt this. It’s a Federal offense.
Yes, it will pass because it’s a valid SSN – a stolen SSN, but a valid SSN
www.CPNheadquarters.com
Fraudulently Re-create a Credit Profile
Fraudulently Re-create a Credit Profile
http://mycpn.webs.com
Note: Contrary
to the claims on
this website,
this is
NOT LEGAL.
Fraudsters: Bold & Brazen
Credit thieves peddle their dishonest wares on You Tube!
800 FICO score in 5 minutes!
New credit profile with stolen SSN filled with fake “aged tradelines”!
This is a call to
action for honest
law-abiding citizens!
http://www.legalcpn.com
This is bad news
for unsuspecting
companies that
do not use CBSV.
Credit Profile Numbers
make businesses very susceptible!
CBSV stops the use of CPN’s
used to defraud companies
SSN Randomization – Changing SSN’s
• Random SSN’s begin June 25, 2011 / SSN no longer linked to “State of Issuance” or High Group list
• SSN Trace algorithms will no longer be useful / Old methods of verification will be obsolete
• Not just for EAB; legal immigrants, domestic violence victims / Criminals will attempt to exploit this
SSN Randomization
will have a major impact!
2011 is the Year of CBSV
 Carnegie Mellon University reports vulnerabilities of being able to properly “guess” an SSN
 ID Analytics says that over 20 million Americans have multiple SSN’s associated with their
names. 40 Million SSN’s are associated with multiple people and 6.1% have at least 2
SSN’s associated with their name.
 FTC says 500,000 people under the age of 18 are victims of ID theft every year. Many more
cases go unreported. 23% of all identity theft cases are caught once account is charged off
and sent to collection agencies.
Complacency - The Real Threat
It Happens Every Day…
True story from Southern California
An Audi dealership was not using CBSV. The sale was approved for an $80,000 Audi A8.
Life is good - except for the dealer just robbed by a credit thief!
The dealer ignored one identifier:
The man used a unisex name and perpetrated a crime with a women’s identity.
Gender
CBSV would’ve caught and prevented the fraudulent sale!
Wouldn’t the dealer gladly pay a few dollars to avoid being scammed?
In Compliance?
Some businesses have specific requirements.
CBSV is a premier method to satisfy SSN verification compliance requirements.
• Fannie Mae’s Loan Quality Initiative for mortgage lenders
• FTC’s Red Flags Rule for creditors (FACT Act or FACTA)
• Gramm-Leach-Bliley Act
• Patriot Act - Know Your Customer Section 326
• Dodd-Frank Wall Street Reform and Consumer Protection Act
• CIP and Identity Theft Prevention Program (ITPP), and others
Internal, State and Federal Requirements
Red Flags Rule
 Requires a written program to detect, prevent, and mitigate ID theft.
 For “financial institutions and creditors” including utility and telecom companies.
 Enforcement began January 1, 2011.
 The use of CBSV strengthens a Red Flags Rule policy
www.ftc.gov
Absolute Validation Methodology
• Current methodologies lead to major increases in Synthetic Name Fraud
• Absolute Validation is only obtained from the official issuing authority with the
primary identifiers of Name, SSN, Date of Birth, Gender, Death Indicator
• The Absolute Validation Methodology is Consent Based SSN Verification
• False credit profiles and “cross pollution” of personal identifier data within trusted
authorities (i.e., Credit/Consumer Reporting Agencies and proprietary database
sources) requires extreme caution in the use of these resources to validate identities
Know The Facts
SSNs were created in 1936 for wage and tax reporting purposes only.
SSNs were never intended to be used as a national identifier.
CRA’s and data brokers do not validate back to original SSA records.
Existing technologies created an “authentication fraud loop” because
trusted authorities share erroneous and fraudulent profile information.
Reliance on current technologies gives a false sense of security
to the company hoping for dependable information.
You have the best option available; unsurpassed verification from CBSV!
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]

Mais conteúdo relacionado

Mais procurados

Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft Rahmat Inggi
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentationRoel Palmaers
 

Mais procurados (18)

Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
online shopping
online shoppingonline shopping
online shopping
 
IDShield
IDShieldIDShield
IDShield
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 

Semelhante a CBSV%20INFORMATION[1]

Background Screening Webinar 1.0
Background Screening Webinar 1.0Background Screening Webinar 1.0
Background Screening Webinar 1.0Jmschwietz1
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09jwnollet
 
What are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theftWhat are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theftcFirst
 
IST Presentation
IST PresentationIST Presentation
IST Presentationguest1d1ed5
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect youIdentity Theft Protection
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Themmilfamln
 
ID Shield Services and Features
ID Shield Services and Features ID Shield Services and Features
ID Shield Services and Features Antonia McClammy
 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Identity Advocate
 
All about identity theft
All about identity theftAll about identity theft
All about identity theftMrwilson6
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theftFlora Runyenje
 
Group Presentation
Group PresentationGroup Presentation
Group Presentationdkmarshall
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
http://omercier.legalshieldassociate.com
http://omercier.legalshieldassociate.comhttp://omercier.legalshieldassociate.com
http://omercier.legalshieldassociate.comObger Mercier , MBA
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 

Semelhante a CBSV%20INFORMATION[1] (19)

Background Screening Webinar 1.0
Background Screening Webinar 1.0Background Screening Webinar 1.0
Background Screening Webinar 1.0
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
What are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theftWhat are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theft
 
Training for Foster Parents
Training for Foster ParentsTraining for Foster Parents
Training for Foster Parents
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
ID Shield Services and Features
ID Shield Services and Features ID Shield Services and Features
ID Shield Services and Features
 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity Theft
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
http://omercier.legalshieldassociate.com
http://omercier.legalshieldassociate.comhttp://omercier.legalshieldassociate.com
http://omercier.legalshieldassociate.com
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 

CBSV%20INFORMATION[1]

  • 1. Protect Your Vital Interests with Direct Access to the Social Security Administration Master File Consent Based Social Security Number Verification A service of the Social Security Administration
  • 2. Consent Based Social Security Number Verification is access to the Social Security Administration record resources Protect Your Vital Interests It safeguards the reputation of companies that use it and shields them from losses by mitigating the risks of fraud and identity theft CBSV purifies, strengthens and enhances verification processes with direct and instant access to the SSA Master File and Death Index as it verifies Name, SSN, Date of Birth, Gender, and Death Indicator
  • 3. Who – Companies and businesses nationwide What – Premier personal identifier verification from the source When – Available now with instant results Where – Online access to the SSA Master File Why – Mitigate fraud and identity theft and its associated losses How – Contact your Gallant Background Checks representative CBSV Answers the Questions
  • 4. What is CBSV?  Developed and administered by the Social Security Administration  Verifies whether a Name, SSN, Date of Birth, Gender and Death Indicator match the data in Social Security Administration’s Master File and Death Index  Pilot began in 2002 and current version was launched November 2008  Real-time online verification and handles large volume requests  Used for all business verification purposes Pre-employment, applicant, patient, student, tenant, loan originations, fraud investigations  Requires signed consent of the Applicant/SSN holder on Form SSA-89  Used for the specific business purpose designated on the SSA-89
  • 5. What Are You Relying On? Does your current method of verification have CBSV has it! 100% Accuracy of Data Elements? 100% Protection against Synthetic Name Fraud? 100% Regulatory Compliance?
  • 6. Putting it All Together  Fraud and ID Theft Continue to Grow Despite Legislation  Perpetrators Exploit System Vulnerabilities  You are at Great Risk  Best Protection is from the Official Source  Immediate Action is Required
  • 7. CBSV: Extra Layer of Verification © 2011 CID, LLC
  • 8. Social Security Numbers - They’re Everywhere! Source: Lanny Britnell of IdentityTheftAmerica.com
  • 9. Availability of Valid SSN Sources Database Resources Hundreds of Internet sites are used by criminals to ascertain SSN validity www.ssnvalidator.com www.usinfosearch.com
  • 10. It’s too easy to find a valid number
  • 11. Availability of SSN sources puts companies at great risk! CBSV mitigates SSN abuse
  • 12. Synthetic Name Fraud This creates a new, fraudulent credit profile that trusted authorities share with each other as genuine. SSN integrity has been severely compromised in credit bureau profiles and other trusted authorities. Also known as Synthetic Identity Fraud, this threat causes “piggy-backing” in credit bureau profiles. The Federal Trade Commission says… there are over 10 million more credit profiles in the system than there are consumers! Do you want to “verify” in pools of polluted profile information? Synthetic Name Fraud is using one’s own name, date of birth and address with another persons SSN.
  • 13. Court OK’s Fraudulent SSN use We’re battling an uninformed judiciary! (Source: http://caselaw.findlaw.com/co-court-of-appeals/1058355.html) The appellate court found Mr. Montes-Rodriguez defrauded a car dealership which required an SSN on its loan application. The State Supreme Court however held that since he used his own name, birth date and address, the use of another person’s SSN was not criminal impersonation. . . even though he also used her SSN for employment as well. This is classic Synthetic Name Fraud, even though Mr. Montes-Rodriguez did not know the victim. It caused a false profile to be created and shared within the credit bureaus and other trusted authorities. Use of a false SSN even without using the victim’s name is a core issue of ID theft. CBSV would have stopped the auto scam and the job scam because it verifies Name, SSN, Date of Birth, Gender, and Death Indicator! October 2010: Colorado State Supreme Court over-ruled a lower court that convicted a man of criminal impersonation when he fraudulently used the SSN of another person (a woman victim) when applying for an auto loan.
  • 14. This ID thief lived 14 years with a stolen SSN from a 3 year old boy slain in 1982, passed a criminal background check and worked as a sworn investigator for the Oregon Liquor Control Commission. The identity of Jason Robert Evers was stolen by Doitchin Krastev. How Many Minor Children Have Been Hired Today? Source: http://www.katu.com/news/local/114718969.html Published: Jan 27, 2011 He was sentenced in January 2011
  • 15. Synthetic Name Fraud makes every business vulnerable! CBSV mitigates Synthetic Name Fraud
  • 16. The Elephant in the Room Something BIG has been ignored and gone unaddressed! Have you heard of Credit Profile Numbers? © 2011 Computer Information Development, LLC
  • 17. Credit Profile Numbers Credit thieves have re-named stolen SSN’s by calling them Credit Profile (or Credit Privacy) Numbers (CPN) As we know, the SSA’s Enumeration at Birth (EAB) creates a large pool of dormant SSN’s for credit thieves to draw from… Unsuspecting children may not need to use their SSN until they apply for a job, credit, or college and find that a credit thief has stolen their identity Have you seen the headlines?
  • 18. By BILL DRAPER Associated Press Writer, KANSAS CITY, Mo. August 2, 2010 (AP) “Thieves are targeting your kid's number long before the little one even has a bank account. Hundreds of online businesses are using computers to find dormant Social Security numbers - usually those assigned to children who don't use them - then selling those numbers.” Source: http://abcnews.go.com/Business/wireStory?id=11305930 New ID theft targets kids' Social Security numbers, could threaten credit system Making the Headlines
  • 19. Craigslist – Credit Profile Numbers on sale now! SSN’s For Sale!
  • 20. Typical CPN Craigslist Ad Start a new credit profile?!? Who is allowed to do that?!? Thieves use SSN validation sites on the Internet! $100 for a stolen or fabricated SSN False “tradelines” to prop up your stolen SSN Do Not Attempt this. It’s a Federal offense. Yes, it will pass because it’s a valid SSN – a stolen SSN, but a valid SSN
  • 22. Fraudulently Re-create a Credit Profile http://mycpn.webs.com Note: Contrary to the claims on this website, this is NOT LEGAL.
  • 23. Fraudsters: Bold & Brazen Credit thieves peddle their dishonest wares on You Tube!
  • 24. 800 FICO score in 5 minutes! New credit profile with stolen SSN filled with fake “aged tradelines”! This is a call to action for honest law-abiding citizens! http://www.legalcpn.com This is bad news for unsuspecting companies that do not use CBSV.
  • 25. Credit Profile Numbers make businesses very susceptible! CBSV stops the use of CPN’s used to defraud companies
  • 26. SSN Randomization – Changing SSN’s • Random SSN’s begin June 25, 2011 / SSN no longer linked to “State of Issuance” or High Group list • SSN Trace algorithms will no longer be useful / Old methods of verification will be obsolete • Not just for EAB; legal immigrants, domestic violence victims / Criminals will attempt to exploit this
  • 27. SSN Randomization will have a major impact! 2011 is the Year of CBSV
  • 28.  Carnegie Mellon University reports vulnerabilities of being able to properly “guess” an SSN  ID Analytics says that over 20 million Americans have multiple SSN’s associated with their names. 40 Million SSN’s are associated with multiple people and 6.1% have at least 2 SSN’s associated with their name.  FTC says 500,000 people under the age of 18 are victims of ID theft every year. Many more cases go unreported. 23% of all identity theft cases are caught once account is charged off and sent to collection agencies. Complacency - The Real Threat
  • 29. It Happens Every Day… True story from Southern California An Audi dealership was not using CBSV. The sale was approved for an $80,000 Audi A8. Life is good - except for the dealer just robbed by a credit thief! The dealer ignored one identifier: The man used a unisex name and perpetrated a crime with a women’s identity. Gender CBSV would’ve caught and prevented the fraudulent sale! Wouldn’t the dealer gladly pay a few dollars to avoid being scammed?
  • 30. In Compliance? Some businesses have specific requirements. CBSV is a premier method to satisfy SSN verification compliance requirements.
  • 31. • Fannie Mae’s Loan Quality Initiative for mortgage lenders • FTC’s Red Flags Rule for creditors (FACT Act or FACTA) • Gramm-Leach-Bliley Act • Patriot Act - Know Your Customer Section 326 • Dodd-Frank Wall Street Reform and Consumer Protection Act • CIP and Identity Theft Prevention Program (ITPP), and others Internal, State and Federal Requirements
  • 32. Red Flags Rule  Requires a written program to detect, prevent, and mitigate ID theft.  For “financial institutions and creditors” including utility and telecom companies.  Enforcement began January 1, 2011.  The use of CBSV strengthens a Red Flags Rule policy www.ftc.gov
  • 33. Absolute Validation Methodology • Current methodologies lead to major increases in Synthetic Name Fraud • Absolute Validation is only obtained from the official issuing authority with the primary identifiers of Name, SSN, Date of Birth, Gender, Death Indicator • The Absolute Validation Methodology is Consent Based SSN Verification • False credit profiles and “cross pollution” of personal identifier data within trusted authorities (i.e., Credit/Consumer Reporting Agencies and proprietary database sources) requires extreme caution in the use of these resources to validate identities
  • 34. Know The Facts SSNs were created in 1936 for wage and tax reporting purposes only. SSNs were never intended to be used as a national identifier. CRA’s and data brokers do not validate back to original SSA records. Existing technologies created an “authentication fraud loop” because trusted authorities share erroneous and fraudulent profile information. Reliance on current technologies gives a false sense of security to the company hoping for dependable information. You have the best option available; unsurpassed verification from CBSV!