"Stolen Information" from our apps can give illegals False ID's and we pay the Taxes
Information obtained via theft from applications and other digital sources is frequently exploited to facilitate identity theft and the fabrication of fraudulent documents for undocumented individuals. Criminal organizations and illicit online marketplaces utilize data breaches to acquire personal information, which is subsequently employed in the production of counterfeit identification documents or to circumvent employment verification systems.
Equifax Workforce Solutions
How Stolen Application Data Enables the Creation of Forged Identification Documents
Sources of Data from Breaches: Personal data, including Social Security Numbers (SSNs), are commonly extracted from data breaches involving applications and various digital platforms. Such information is often sold on dark web marketplaces at prices as low as $150.
Shadow Markets: Advanced criminal networks leverage stolen data to manufacture counterfeit Social Security cards and permanent resident cards, commonly referred to as “green cards.”
Synthetic Identity Fraud: Perpetrators may generate entirely fictitious “synthetic” identities by merging stolen SSNs—frequently belonging to minors or deceased individuals—with different names, thereby evading background verification procedures.
Assumption of Authentic Identities: In certain instances, undocumented individuals utilize stolen government-issued documents, such as birth certificates and SSNs, to fully assume the identity of a U.S. citizen for the purpose of applying for other legitimate identification documents.
Equifax Workforce Solutions
Primary Applications of These Forged Identities
Employment Verification: It is estimated that approximately 75% of unauthorized workers of working age employ fraudulent SSNs to pass employment verification processes, including systems such as E-Verify.
Application-Based Fraud: Reports indicate that undocumented individuals manipulate identity verification processes in gig economy applications, such as grocery delivery and ride-sharing platforms, by utilizing compromised identification credentials to work under false names.
Benefit Fraudulent Claims: Stolen identities are often exploited to fraudulently apply for government benefits, including disability assistance or Medicaid, thereby resulting in legal and financial complications for the rightful owners of the authentic identities.
Protective Measures
Federal agencies such as Immigration and Customs Enforcement (ICE) and Homeland Security Investigations (HSI) prioritize the investigation of document and benefit fraud to mitigate these digital vulnerabilities. To safeguard personal information, it is advisable to review the location services settings on mobile devices and regularly monitor credit reports for any unusual or unauthorized activity.
Methods you can use to “Detect” a False ID
Businesses may utilize an integrated approach comprising manual inspection, specialized hardware, and automated software solutions to identify fraudulent identification documents. As of April 2026, the deployment of artificial intelligence technologies combined with real-time database cross-referencing has become the standard method for achieving high-accuracy detection.
1. Manual Inspection Techniques
Although manual assessments are less effective against sophisticated forgeries, they remain an essential initial measure:
- Tactile Examination: Assess the physical attributes of the ID by feeling for raised lettering—commonly present on authentic Social Security cards and certain state-issued identification documents—alongside irregularities in thickness or “bubbling” within the lamination, which may indicate alterations.
- Light Examination: Hold the identification document against a powerful light source to observe for laser-perforated patterns, such as the California bear, which are discernible only when backlit.
- Microprinting: Utilize a magnifying device to inspect for fine, sharply defined text, often appearing as a solid line on counterfeit IDs produced by inferior printers.
- Security Features: Tilt the document to verify that holographic overlays shift smoothly and that color-shifting inks exhibit correct hue alterations, ensuring authenticity of holographic elements.
2. Specialized Verification Hardware
In environments with high volume or elevated risk, dedicated hardware enables more comprehensive analysis:
- Ultraviolet (UV) Light Scanners: Authentic identification documents contain covert images or texts visible solely under ultraviolet illumination.
- Barcode and Machine-Readable Zone (MRZ) Readers: Scanners facilitate immediate comparison between information encoded in the PDF417 barcode on the reverse side and the printed data on the front; discrepancies serve as significant indicators of forgery.
- Near Field Communication (NFC) Chip Readers: Numerous modern passports and electronic identification documents (”eIDs”) incorporate encrypted chips. Mobile applications utilizing NFC technology can extract genuine data directly from these chips, rendering forgery exceedingly difficult.
3. Automated Software and Artificial Intelligence Solutions
Contemporary platforms leverage AI to identify anomalies imperceptible to human inspection:
- Biometric Matching: Systems such as Jumio and Onfido compare live facial selfies—incorporating “liveness detection” protocols to prevent deepfake manipulation—with the photograph embedded within the identification document.
- Database Cross-Verification: Software applications perform real-time queries against government or private databases to validate whether provided identification numbers and personal details correspond with official records.
- Employment Verification (E-Verify): Employers within the United States can utilize the E-Verify system—at no cost—to cross-check Form I-9 data against records maintained by the Department of Homeland Security and the Social Security Administration.
- Top ID Verification Providers (2026)
- Provider
- Best For
- Key Features
- IDScan.net
- Retail/Hospitality
- VeriScan app, age verification, and visitor management.
- Intellicheck
- High-Accuracy Retail
- Direct access to DMV data for near-instant ID validation.
- Signzy
- Financial Institutions
- Deepfake-resistant biometrics and no-code onboarding.
- Persona
- Tech/Marketplaces
- Link analysis to find patterns across different users.
Passing “E-Verify” does Not mean the ID “Id is Real”
Passing E-Verify does not constitute definitive proof of the authenticity of a valid identification document. Rather, it indicates that the information provided—such as the individual’s name and Social Security number—exists within and accurately matches a record in the government’s database. This process presents a significant vulnerability that malicious actors may exploit through various forms of identity fraud. The following outlines reasons why E-Verify can be deceived:
1. “Borrowed” or Stolen Identities
An individual working without authorization may utilize legitimate personal information obtained from a U.S. citizen, such as their name and Social Security number—often acquired through illicit means on the dark web via data breaches. In such cases, E-Verify will return an “Employment Authorized” result, confirming the data’s validity within the database. However, it does not verify that the individual presenting the identification is the actual owner of the data.
2. Sophisticated “Scannable” Counterfeit Documents
Contemporary counterfeiters produce highly convincing fake identification documents equipped with barcodes on the reverse side that perfectly correspond to the personal information printed on the front. When an employer inputs this information into E-Verify, the system may confirm validity despite the physical document being fraudulent. The underlying data is accurate, but the document itself is counterfeit.
3. Limitations of E-Verify’s Photo Matching Capabilities
While E-Verify features a “Photo Match” function, its application is limited to specific document types, including:
- U.S. Passports and Passport Cards
- Permanent Resident (”Green”) Cards
- Employment Authorization Documents (EAD)
For other identification forms, such as State-issued Driver’s Licenses or Social Security Cards, E-Verify generally does not display photographic information. This limitation facilitates the use of fake licenses paired with stolen Social Security numbers, as visual verification is not facilitated through the system.
4. Synthetic Identity Fraud
Criminal entities may create “synthetic” identities by combining genuine, stolen Social Security numbers—often originating from minors or inactive records—with different names. If such an identity has been used extensively enough to generate a verifiable trail, it can sometimes evade standard validation procedures.
Strategies to Mitigate These Vulnerabilities
To address these risks, organizations frequently employ Identity Verification (IDV) software preceding the use of E-Verify. These supplementary measures include:
- Physical Document Verification: Assessing for security features such as ultraviolet holograms and microprinting that are not detectable by E-Verify.
- Biometric Verification: Implementing “liveness checks” or facial recognition technologies to confirm that the individual’s physical appearance corresponds to the photograph on the identification document.
Americans “On the Hook” for Taxes for joobs tThey Never Worked!
If an individual employs your Social Security Number (SSN) to secure employment, the employer is responsible for reporting the accrued earnings to the Internal Revenue Service (IRS) and the Social Security Administration (SSA) under your name. Consequently, the IRS may observe income reported under your SSN that you did not include in your tax filings. This discrepancy will likely lead the IRS to presume that you have underreported your income, prompting them to issue a bill for the unpaid taxes along with applicable interest and penalties [1, 2, 4].
**Mechanisms of Occurrence**
*Income Discrepancy:* The IRS may receive a W-2 or 1099 form from an employer unknown to you. When you file your tax return excluding this income, their automated systems flag the inconsistency as “missing” income [2, 4].
*Unemployment Benefit Fraud:* Should a fraudster utilize your SSN to claim unemployment benefits, those benefits are considered taxable income. You might subsequently receive a 1099-G form indicating benefits you did not receive [3].
**Indicators and Notices**
*IRS Notice CP2000:* This notification is the most common alert indicating a potential issue. It notifies you that the income reported by third parties does not correspond with the information on your tax return [4].
*Social Security Statement Inaccuracies:* Your annual benefits statement may reflect earnings substantially higher than your actual income, signaling possible fraudulent activity [1].
**Recommended Immediate Protective Actions**
*Contact the IRS Identity Protection Specialized Unit:* Call at 1-800-908-4490 to report the fraudulent use of your SSN concerning employment income.
*Complete and Submit Form 14039:* This form, known as the Identity Theft Affidavit, informs the IRS that your SSN has been compromised and is being used fraudulently [1, 4].
*Notify the Affected Employer:* Contact the employer associated with the suspicious W-2 and inform them that an individual is using a stolen identity. Request a corrected W-2 (W-2c) indicating zero earnings attributed to you [1, 2].
*Request an Identity Protection Personal Identification Number (IP PIN):* Seek this six-digit code from the IRS, which prevents others from filing a tax return using your SSN [1, 4].
**Long-Term Implications**
Although it is possible to resolve these discrepancies over time, the process often involves extensive documentation and can take several months to establish that you were not responsible for the employment in question. Until necessary corrections are made, such issues may delay your legitimate tax refunds [1, 4
Fraud Cases Grew Dramatically from 2021-2025]. Americans ARE PAYInG!
Let’s thank all those who want to keep illegal aliens here! Just look what they do for us.
Employment-related identity theft constitutes a significant and escalating concern, with documented reports of such fraudulent activity increasing by approximately 61% between the years 2021 and 2025. In the calendar year 2025 alone, there were over 74,000 reported incidents of employment or tax-related fraud to the Federal Trade Commission (FTC) within the first nine months of that year.
Key Statistics Concerning Employment Identity Theft:
- Widespread Impact: In 2024, approximately 37,556 cases were reported specifically pertaining to employment-related identity theft, representing a 20% increase compared to the preceding year.
- Systemic Issue: It is estimated that approximately 75% of unauthorized workers in the United States rely on fraudulently obtained Social Security Numbers (SSNs) to secure employment.
- Scale of the Problem: A Treasury Department report from 2018 documented over 1.3 million instances of employment-related identity theft over a five-year span.
- Recovery Challenges: Resolving such cases is notably protracted; as of 2025, the average duration for the Internal Revenue Service (IRS) to resolve identity theft victim assistance cases has risen to approximately 21 months.
Underlying Causes:
- Invisible Theft: The majority of victims remain unaware of the misuse of their SSNs until they receive an IRS Notice CP2000 for income they did not earn or their legitimate tax return is rejected.
- Vulnerable Populations: Children constitute prime targets for such fraud, given that their SSNs are typically “clean” and may remain unused for employment or credit for many years, thereby allowing fraudulent activity to go undetected for decades.
- Dark Web Availability: Stolen SSNs are frequently available on illicit online marketplaces for as little as $150, often obtained through large-scale data breaches and cyber-attacks on applications and databases.
Preventative Measures:
- Risk Monitoring: Experts recommend conducting an annual review of one’s Social Security Earnings Record. The detection of income attributed to an employer never employed by the individual serves as a definitive indication of employment-related identity theft.
Everyone keeps parroting the same empty excuses: “They should be here,” or “We need them,” or some convoluted nonsense about how “they don’t commit crimes.” Well, look at the chaos they’re causing! They’re tearing apart people’s lives and livelihoods under the guise of being “innocent.” It’s infuriating! And the one question that burns me up — why won’t they just become U.S. citizens?
The answer is obvious: they take advantage of us, draining our resources, stealing our money, and then going after more in tax refunds. Who cares if they’re stealing from us? We didn’t work for that money anyway! And yet, we’re the ones unfairly spending hours and hours on endless paperwork just because we allowed these illegal aliens to sneak into our country and rob us blind. It’s a disgrace!
To everyone who prances around claiming to have compassion for illegals and praising their so-called “greatness,” let me set the record straight—you’re blind, and your misguided sympathy is truly infuriating. These people—who contribute nothing but chaos—are robbing hard-working American citizens of their hard-earned money, and you’re applauding them for it!
How dare you sit there and justify this injustice, as if it’s some noble act? Imagine if it were happening to you—how would you feel knowing strangers are taking what’s yours, unearned and undeserved! And when these illegals become citizens? That’s when the real outrage begins! Suddenly, having their own SSN becomes a “bad” thing?
They’d be unable to continue stealing from others so easily. They’d be forced to face the reality that they must follow the same rules as everyone else—pay their fair share, work legitimately, and stop leeching off the system. But no, they’d rather keep getting that free money from the state and government, milking the system without a care in the world. It’s sick, it’s unjust, and it’s about time people woke up and saw the truth behind their false compassion!
This is the “Why Factor” of why we need to deport them all. The ones you believe have not committed crimes may be the ones stealing peoples identities.
Stay tuned for more
G
