In our tech-based society, smartphones, tablets, and other mobile devices are central to our daily lives. One can confidently assume that nearly every American has a mobile device or access to one, leading us to believe that mobile will be the next frontier when it comes to identity authentication.
Accurate identification papers are essential to safeguarding financial and legal transactions as well as many other sensitive exchanges. Specialty ultraviolet lights are important instruments used in the fight against fraudulent presentation. The right detection tools can augment existing fraud detection practices while empowering your employees and agents with greater defenses against the use of false identity documents.
Topics: identity theft, verification of ID, Employee Verification, authenticating drivers licenses, authenticating driver's licenses, counterfeit ID, ID Verification, fraud prevention protection, fraud prevention
When an identity is stolen, the damage can extend far beyond the credit report of the victim. When the identity is used to procure credit or services, the companies that do business with the stolen identity are secondary victims. In lawsuit settlements, it is rare for a victim to recover more than 10% of the goods and services stolen by the time one considers the legal fees and the frequent inability of the defendant to pay. For Small to Medium Businesses (SMBs), these costs can become crippling and are always detrimental.
The New Year is bringing a change to the credit card industry. In the United States, credit card companies will be transitioning to the EMV card system. Now credit cards will be embedded with a smart chip. The chips are the credit cards companies’ preventative method against credit card fraud.
So what is EMV? It is the card system known as Europay, which is the standard for Visa and MasterCard in Europe.
The usage of fake IDs in an in environment like a Gentlemen’s Club typically is for underage drinking or illegal entry. We do not normally associate the use of fake IDs at’such clubs in order to get a job. Although not a common occurrence in the Gentlemen’s Club industry, the hiring of underage performers is an issue that has recently surfaced in the public eye.A recent case in Florida, in which a 13 year old girl was hired as a performer under a fake ID, has brought the industry under scrutiny for permitting sex trafficking practices to occur under their watch. This is not a common occurrence within the industry but one isolated incident is enough to blemish an industry’s reputation.
The following information is scary. Stop reading now unless you have a robust identity authentication system in place for your business.
Our nuclear plants have become like mini-fortresses following 9/11. Concerns over attacks on land or of targeted aircraft crashes led to the proposal of numerous new safety laws and regulations; the overriding focus being on the threat from without. All this focus on external forces however has missed the largest threat to nuclear power plant safety that actually has manifested itself. And it came from within.
In a recent speech to the GOP faithful, Presidential Candidate Mitt Romney held up Arizona’s immigration control program, which relies heavily on a public database called E-Verify, as the model for the nation. Unfortunately, as sometimes happens during public discussions, it made for a better sound bite than a practical plan.
Romney told the crowd “I think you see a model in Arizona. They passed a law here that says -- that says that people who come here and try and find work, that the employer is required to look them up on E-Verify”, the database that would allow employers to determine the immigration status of applicants. He cited a reported 14% drop in the number of illegal immigrants in Arizona as proof it worked.
If elected, he promised to export the Arizona model to the nation at large: “I will make sure we have an E-Verify system and require employers to check the documents of workers, and to check E- Verify." Mr. Romney did not have command of all the relevant facts, however. The E-Verify database only checks the names on documents for employment eligibility. No effort is made to check on the authenticity of the documents themselves.
If the documents presented are forged, the entire logic of E-Verify breaks down. Illegal immigrants with stolen identities will easily circumvent the checks because that identity they assume does have legal status. In short, E-Verify will only catch the low-hanging fruit from illegal immigrants. Those even slightly more sophisticated will be able to obtain a counterfeit driver’s license and social security card using information taken from an unsuspecting victim, and will easily pass the check.
This is not a new discovery, either. Back in 2010 an independent evaluation of E-Verify by Westat, a Rockville, Maryland-based social science research firm, commissioned by the USCIS (U.S. Citizenship and Immigration Service) Office of Policy and Strategy found that more than half (54%) of the unauthorized workers flagged by E-Verify were flagged because of some form of identity fraud.
In other words, most of the illegal workers who try to pass themselves off as legal used a stolen identity -- most likely a forged driver’s license or social security card. There are likely many more of them who used forged documents and were never flagged by E-Verify -- which, after all, is not set up for document authentication. That major flaw did not escape the attention of the Society for Human Resource Management, which said the Westat report supports what they have been saying for years -- “that E-Verify doesn’t have the proper protections and safeguards in place for detecting identity fraud”.
The world has changed much since September 11, 2001. Awareness of how fragile our way of life can be, what steps must be taken to protect it and what might happen if we don't, is now a constant part of our national psyche. It is probably safe to say that while the degree of American military involvement overseas may fluctuate with the times and conditions, the War on Terror at home likely will not. Although anti-terrorism efforts are focused on potential overt acts of violence by international terrorist groups, it is specter of domestic covert acts intended to generate funding for terrorism that is at the forefront of our national security efforts.
The Patriot Act expanded the concept of terrorism to include domestic terrorism. The Act states, in pertinent part:
(5) the term `domestic terrorism' means activities that--
`(A) involve acts dangerous to human life that are a violation of the criminal laws of the United States or of any State;
`(B) appear to be intended--
`(i) to intimidate or coerce a civilian population;
`(ii) to influence the policy of a government by intimidation or coercion; or
`(iii) to affect the conduct of a government by mass destruction, assassination, or kidnapping; and
`(C) occur primarily within the territorial jurisdiction of the United States.'.
Detecting activities intended to finance terrorism is extremely difficult. Financial institutions are not expected to distinguish terrorist financing from other criminal misuse of the financial system. They are, however, tasked with ascertaining whether any transactions are suspicious, either because they are unusual or, by their very nature, are indicative of potential criminal activity.
Money laundering is at the heart of most illegal financial transactions and is made possible through the use of identity theft. Many measures have been enacted to require financial institutions and other businesses to detect and assist the U.S. government in preventing money laundering. These include, among others, the Bank Secrecy Act, regulations from the Office of Foreign Assets Control, the Know Your Customer Act, the Fair and Accurate Credit Transactions Act and the Red Flags Rule developed by the FTC.
Underlying these statutes, regulations and rules is the basic concept of identifying the person who attempts to conduct a financial transaction (e.g., a wire transfer, purchase of a money order, opening a new account, etc.) with the intention of ultimately funding terrorism or other criminal activity. Because identifying the person suspected of engaging in such activity is paramount to any criminal investigation, priority is placed on identity verification.
There are many identity verification tools available. The Fraud Fighter™ line of identity authentication equipment provides the degree of technological sophistication and effectiveness necessary to ensure compliance with the laws pertaining to the monitoring of financial transactions and identity verification.
Modeled on the same concepts used to secure IT networks from intrusion, Fraud Fighter™ will optimize organizations' regulatory compliance framework by helping structure an intelligently "layered" approach to the problem. "Layering", in this context, means targetting the appropriate level of technology at the appropriate level of threat. So, for those areas where risk exposure is minimal, lower end (and less expensive) equipment can be utilized, while higher risk activities are equipped with the higher-end, most technolgically advanced soutions.
One of the biggest concerns of any financial institution – that is, any institution that routes payments between individuals / organizations, or which accepts payments over time – is money laundering. Profits obtained from some nefarious activity need to be 'washed' through the system to remove any trace of their origin; and individuals have found no shortage of ways to wash them – creating shell companies, giving out loans to themselves, buying and selling casino chips, or simply paying for everything in cash. Indeed, as our previous article about the depth and breadth of the practice showed, laundering comes in a variety of creative shapes and sizes, with some more apparent than others.