1. Protect Your Vital Interests with Direct Access to the
Social Security Administration Master File
Consent Based Social Security Number Verification
A service of the Social Security Administration
2. Consent Based Social Security Number Verification
is access to the Social Security Administration record resources
Protect Your Vital Interests
It safeguards the reputation of companies that use it and
shields them from losses by mitigating the risks of fraud and identity theft
CBSV purifies, strengthens and enhances verification processes
with direct and instant access to the SSA Master File and Death Index as it
verifies Name, SSN, Date of Birth, Gender, and Death Indicator
3. Who – Companies and businesses nationwide
What – Premier personal identifier verification from the source
When – Available now with instant results
Where – Online access to the SSA Master File
Why – Mitigate fraud and identity theft and its associated losses
How – Contact your Gallant Background Checks representative
CBSV Answers the Questions
4. What is CBSV?
Developed and administered by the Social Security Administration
Verifies whether a Name, SSN, Date of Birth, Gender and Death Indicator match
the data in Social Security Administration’s Master File and Death Index
Pilot began in 2002 and current version was launched November 2008
Real-time online verification and handles large volume requests
Used for all business verification purposes
Pre-employment, applicant, patient, student, tenant, loan originations, fraud investigations
Requires signed consent of the Applicant/SSN holder on Form SSA-89
Used for the specific business purpose designated on the SSA-89
5. What Are You Relying On?
Does your current method of verification have
CBSV has it!
100% Accuracy of Data Elements?
100% Protection against Synthetic Name Fraud?
100% Regulatory Compliance?
6. Putting it All Together
Fraud and ID Theft Continue to Grow Despite Legislation
Perpetrators Exploit System Vulnerabilities
You are at Great Risk
Best Protection is from the Official Source
Immediate Action is Required
8. Social Security Numbers - They’re Everywhere!
Source: Lanny Britnell of IdentityTheftAmerica.com
9. Availability of Valid SSN Sources
Database Resources
Hundreds of Internet sites are used by criminals to ascertain SSN validity
www.ssnvalidator.com
www.usinfosearch.com
11. Availability of SSN sources
puts companies at great risk!
CBSV mitigates SSN abuse
12. Synthetic Name Fraud
This creates a new, fraudulent credit profile that trusted authorities share with each other as genuine.
SSN integrity has been severely compromised in credit bureau profiles and other trusted authorities.
Also known as Synthetic Identity Fraud, this threat causes “piggy-backing” in credit bureau profiles.
The Federal Trade Commission says…
there are over 10 million more credit profiles
in the system than there are consumers!
Do you want to “verify” in pools of polluted profile information?
Synthetic Name Fraud is using one’s own name, date of birth and address with another persons SSN.
13. Court OK’s Fraudulent SSN use
We’re battling an uninformed judiciary!
(Source: http://caselaw.findlaw.com/co-court-of-appeals/1058355.html)
The appellate court found Mr. Montes-Rodriguez defrauded a car dealership which required an SSN on
its loan application.
The State Supreme Court however held that since he used his own name, birth date and address, the
use of another person’s SSN was not criminal impersonation. . . even though he also used her SSN for
employment as well.
This is classic Synthetic Name Fraud, even though Mr. Montes-Rodriguez did not know the victim.
It caused a false profile to be created and shared within the credit bureaus and other trusted authorities.
Use of a false SSN even without using the victim’s name is a core issue of ID theft.
CBSV would have stopped the auto scam and the job scam because it
verifies Name, SSN, Date of Birth, Gender, and Death Indicator!
October 2010: Colorado State Supreme Court over-ruled a lower court that convicted a man of criminal
impersonation when he fraudulently used the SSN of another person (a woman victim) when applying
for an auto loan.
14. This ID thief lived 14 years with a stolen SSN from a 3 year old boy slain
in 1982, passed a criminal background check and worked as a sworn
investigator for the Oregon Liquor Control Commission.
The identity of Jason Robert Evers was stolen by Doitchin Krastev.
How Many Minor Children Have Been Hired Today?
Source: http://www.katu.com/news/local/114718969.html Published: Jan 27, 2011
He was sentenced in January 2011
17. Credit Profile Numbers
Credit thieves have re-named stolen SSN’s by calling them
Credit Profile (or Credit Privacy) Numbers (CPN)
As we know, the SSA’s Enumeration at Birth (EAB) creates
a large pool of dormant SSN’s for credit thieves to draw from…
Unsuspecting children may not need to use their SSN until
they apply for a job, credit, or college and find that a
credit thief has stolen their identity
Have you seen the headlines?
18. By BILL DRAPER Associated Press Writer, KANSAS CITY, Mo. August 2, 2010 (AP)
“Thieves are targeting your kid's number long before the little one
even has a bank account.
Hundreds of online businesses are using computers to find dormant
Social Security numbers - usually those assigned to children who
don't use them - then selling those numbers.”
Source: http://abcnews.go.com/Business/wireStory?id=11305930
New ID theft targets kids' Social Security numbers,
could threaten credit system
Making the Headlines
20. Typical CPN Craigslist Ad
Start a new credit profile?!? Who is allowed to do that?!?
Thieves use SSN validation sites on the Internet!
$100 for a stolen or fabricated SSN
False “tradelines” to prop up your stolen SSN
Do Not Attempt this. It’s a Federal offense.
Yes, it will pass because it’s a valid SSN – a stolen SSN, but a valid SSN
22. Fraudulently Re-create a Credit Profile
http://mycpn.webs.com
Note: Contrary
to the claims on
this website,
this is
NOT LEGAL.
23. Fraudsters: Bold & Brazen
Credit thieves peddle their dishonest wares on You Tube!
24. 800 FICO score in 5 minutes!
New credit profile with stolen SSN filled with fake “aged tradelines”!
This is a call to
action for honest
law-abiding citizens!
http://www.legalcpn.com
This is bad news
for unsuspecting
companies that
do not use CBSV.
25. Credit Profile Numbers
make businesses very susceptible!
CBSV stops the use of CPN’s
used to defraud companies
26. SSN Randomization – Changing SSN’s
• Random SSN’s begin June 25, 2011 / SSN no longer linked to “State of Issuance” or High Group list
• SSN Trace algorithms will no longer be useful / Old methods of verification will be obsolete
• Not just for EAB; legal immigrants, domestic violence victims / Criminals will attempt to exploit this
28. Carnegie Mellon University reports vulnerabilities of being able to properly “guess” an SSN
ID Analytics says that over 20 million Americans have multiple SSN’s associated with their
names. 40 Million SSN’s are associated with multiple people and 6.1% have at least 2
SSN’s associated with their name.
FTC says 500,000 people under the age of 18 are victims of ID theft every year. Many more
cases go unreported. 23% of all identity theft cases are caught once account is charged off
and sent to collection agencies.
Complacency - The Real Threat
29. It Happens Every Day…
True story from Southern California
An Audi dealership was not using CBSV. The sale was approved for an $80,000 Audi A8.
Life is good - except for the dealer just robbed by a credit thief!
The dealer ignored one identifier:
The man used a unisex name and perpetrated a crime with a women’s identity.
Gender
CBSV would’ve caught and prevented the fraudulent sale!
Wouldn’t the dealer gladly pay a few dollars to avoid being scammed?
30. In Compliance?
Some businesses have specific requirements.
CBSV is a premier method to satisfy SSN verification compliance requirements.
31. • Fannie Mae’s Loan Quality Initiative for mortgage lenders
• FTC’s Red Flags Rule for creditors (FACT Act or FACTA)
• Gramm-Leach-Bliley Act
• Patriot Act - Know Your Customer Section 326
• Dodd-Frank Wall Street Reform and Consumer Protection Act
• CIP and Identity Theft Prevention Program (ITPP), and others
Internal, State and Federal Requirements
32. Red Flags Rule
Requires a written program to detect, prevent, and mitigate ID theft.
For “financial institutions and creditors” including utility and telecom companies.
Enforcement began January 1, 2011.
The use of CBSV strengthens a Red Flags Rule policy
www.ftc.gov
33. Absolute Validation Methodology
• Current methodologies lead to major increases in Synthetic Name Fraud
• Absolute Validation is only obtained from the official issuing authority with the
primary identifiers of Name, SSN, Date of Birth, Gender, Death Indicator
• The Absolute Validation Methodology is Consent Based SSN Verification
• False credit profiles and “cross pollution” of personal identifier data within trusted
authorities (i.e., Credit/Consumer Reporting Agencies and proprietary database
sources) requires extreme caution in the use of these resources to validate identities
34. Know The Facts
SSNs were created in 1936 for wage and tax reporting purposes only.
SSNs were never intended to be used as a national identifier.
CRA’s and data brokers do not validate back to original SSA records.
Existing technologies created an “authentication fraud loop” because
trusted authorities share erroneous and fraudulent profile information.
Reliance on current technologies gives a false sense of security
to the company hoping for dependable information.
You have the best option available; unsurpassed verification from CBSV!