SlideShare a Scribd company logo
The Problem:
The Illinois Secretary of State
(ILSOS), for years have been taking
measures to detect and prevent
identity theft in its state. The ILSOS
has two primary departments
responsible for ensuring the integrity
of the State’s drivers’ licenses and
identification cards, the Driver
Services Department and the
SOS Police Department. Both
departments originally worked with
Viisage to implement the new digital
driver’s license system in 1998,
replacing the old film-based system.
The requirements for the solution
were based on the need to develop
and issue secure credentials.
Within a short period of time, the
implementation team recognized
the growing problem of identity
theft. Given this reality, the ILSOS
was determined to enhance the
State driver’s licensing process in
order to protect the state’s citizens.
The Solution:
The completed Illinois identity
solution combined advanced
credentialing technology with
Viisage’s FaceEXPLORER, a face
recognition application designed
to handle large database mining
and image management. This
technology is an important tool
used by agencies like the ILSOS
to detect and deter identity theft.
Employing FaceEXPLORER enables
effective and efficient means for
conducting background checks,
screening watch lists, and managing
and analyzing large digital image
databases.
The ILSOS, comprised of 136
locations, provides over-the-counter
driver’s licenses to Illinois citizens.
These locations service nearly
15,000 customers each day, adding
8,000 to 12,000 new images to the
central database of digital images
daily. Therefore, the FaceEXPLORER
solution used by the ILSOS was
expanded by networking the image
database with the Illinois State
Police, allowing them immediate
access to the growing database of
images.
Additionally, the solution enabled
ILSOS and law enforcement
investigators to compare digital
images from many sources, such
as video surveillance photos, snap
shots, sketches, and composite
photos, to the ILSOS digital driver’s
license database of facial images.
Case Study: Illinois Secretary of State
Partners with Viisage to Fight Identity Theft
“The Viisage identity
solution is invaluable
in helping the ID
Crimes Unit of the
SOS Police continue
to successfully
identify, investigate,
and prosecute
identity theft and
fraud cases.”
-Michael Mayer
Director of Driver Services,
ILSOS
296 Concord Road, 3rd Floor
Billerica, MA 01821
Telephone	 978-932-2200
Facsimile	 978-932-2225
The Results:
Identity Theft and Fraud Discovered
Ruby Haywood, a 67 year old criminal imposter, was working as part of a gang
when she stole the wallets of unsuspecting women. She used the information
in the stolen wallets to obtain valid Illinois driver’s licenses under the victims’
names, but replacing the victims’ photos with her own. With the valid
identification cards in hand, Ruby used her victims’ identities to gain access
to their bank accounts, transfer funds from one account to another, and write
bad checks against their accounts. By the end of 2001 she had stolen nearly
$275,000 and the identities of thirteen women.
Ruby’s reign of identity theft terror however would soon
be at an end. The Viisage face recognition system,
designed to identify duplicate facial images and report
those duplicates to the authorities, quickly found
multiple names and identification cards associated with
Ruby’s likeness. The Illinois Secretary of State Driver
Services Fraud Unit matched the images on file in the
driver’s license database with video tapes taken from the
banks to prove the crime, leading to Ruby’s arrest.
Bottom line: thanks to Viisage’s comprehensive facial
recognition solution ILSOS was able to track down Ruby,
and sentence her to four years in jail.
Accomplishments
As of May 2004, nearly 5,800 driver’s licenses have been cancelled
statewide, and in the Chicago jurisdiction alone there were 31 arrests,
including 18 felonies and 13 misdemeanors, where three or more identities
were established from July 2003 to May 2004.
The ILSOS and Viisage teams worked closely to
design a system that enables the ILSOS and state law
enforcement agencies to work together to identify,
investigate, and prosecute fraud. The Viisage solution
was selected because of its technical superiority and
pricing, and the ILSOS continues to work with Viisage
because its identity solutions stand out as a result of
the company’s industry-leading technology and unique
understanding of customer needs.
This is the Viisage advantage.
“Both the use of
face recognition
and the use of
stored images on
file in the proofing
process have
resulted in the
earlier detection
and prevention of
fraud that would
have otherwise
gone unnoticed,
maybe for years.”
-Beth Langen
Division Administrator,
Division of Policy and
Programs, Drivers Services,
“The images provided
to us through the face
recognition enabled
driver’s license sys-
tem were the key to
making this case”
– Captain Joe Gabuzzi,
SOS Police, ID Crimes Unit
“Viisage has learned
our business and listens
to our ideas regarding
how the system should
work.”
–Beth Langen, Division
Administrator, Division of
Policy and Programs, Drivers
Services, ILSOS
www.L1id.com

More Related Content

What's hot

Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Johann Lo
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
IJCNCJournal
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
guest1d1ed5
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
Sudeshna07
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
praveen1792
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedVidaB
 
India Legal 17 June 2019
India Legal 17 June 2019India Legal 17 June 2019
India Legal 17 June 2019
ENC
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsBlake A. Klinkner
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
Donald E. Hester
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
MD Alauddin
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
Bucacci Business Solutions
 
ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS
ICFAI Business School
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Maruti Nandan
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
shaks9151
 
Cybertorts
CybertortsCybertorts
Cybertorts
panabaha
 

What's hot (17)

Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
India Legal 17 June 2019
India Legal 17 June 2019India Legal 17 June 2019
India Legal 17 June 2019
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
 
ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
 
Cybertorts
CybertortsCybertorts
Cybertorts
 

Viewers also liked

Decoding the Polar Code, for Owners & Operators of Vessels.
Decoding the Polar Code, for Owners & Operators of Vessels.Decoding the Polar Code, for Owners & Operators of Vessels.
Decoding the Polar Code, for Owners & Operators of Vessels.
Wayne Hurley
 
High Density I/O Modules for Industrial Process Control
High Density I/O Modules for Industrial Process ControlHigh Density I/O Modules for Industrial Process Control
High Density I/O Modules for Industrial Process Control
Instrument Specialties, Inc.
 
The Ins and Outs of Isolation: A Guide to Selecting The Right Isolator
The Ins and Outs of Isolation: A Guide to Selecting The Right IsolatorThe Ins and Outs of Isolation: A Guide to Selecting The Right Isolator
The Ins and Outs of Isolation: A Guide to Selecting The Right Isolator
Instrument Specialties, Inc.
 
8 أشهر-من-ظاهرة-الانتحارفي-مصر
8 أشهر-من-ظاهرة-الانتحارفي-مصر8 أشهر-من-ظاهرة-الانتحارفي-مصر
8 أشهر-من-ظاهرة-الانتحارفي-مصر
التنسيقية المصرية للحقوق والحريات
 
VINOTECA LIEBHERR WKb3212
VINOTECA LIEBHERR WKb3212VINOTECA LIEBHERR WKb3212
VINOTECA LIEBHERR WKb3212
Alsako Electrodomésticos
 
Gs vector Collection Plus
Gs vector Collection PlusGs vector Collection Plus
Gs vector Collection Plus
Miller Indigo
 
Mobilize Your Integrated Learning Platform
Mobilize Your Integrated Learning PlatformMobilize Your Integrated Learning Platform
Mobilize Your Integrated Learning Platform
D2L Barry
 
Pwcs 04 week 2
Pwcs 04 week 2Pwcs 04 week 2
Pwcs 04 week 2
HCEfareham
 
JBEI Highlights May 2016
JBEI Highlights May 2016JBEI Highlights May 2016
JBEI Highlights May 2016
Irina Silva
 
8 Major Trends in the Global ELT Field
8 Major Trends in the Global ELT Field8 Major Trends in the Global ELT Field
8 Major Trends in the Global ELT Field
Phung Huy
 
حدود وطن- ام اسوار سجن
حدود وطن- ام اسوار سجنحدود وطن- ام اسوار سجن

Viewers also liked (12)

Decoding the Polar Code, for Owners & Operators of Vessels.
Decoding the Polar Code, for Owners & Operators of Vessels.Decoding the Polar Code, for Owners & Operators of Vessels.
Decoding the Polar Code, for Owners & Operators of Vessels.
 
High Density I/O Modules for Industrial Process Control
High Density I/O Modules for Industrial Process ControlHigh Density I/O Modules for Industrial Process Control
High Density I/O Modules for Industrial Process Control
 
The Ins and Outs of Isolation: A Guide to Selecting The Right Isolator
The Ins and Outs of Isolation: A Guide to Selecting The Right IsolatorThe Ins and Outs of Isolation: A Guide to Selecting The Right Isolator
The Ins and Outs of Isolation: A Guide to Selecting The Right Isolator
 
8 أشهر-من-ظاهرة-الانتحارفي-مصر
8 أشهر-من-ظاهرة-الانتحارفي-مصر8 أشهر-من-ظاهرة-الانتحارفي-مصر
8 أشهر-من-ظاهرة-الانتحارفي-مصر
 
VINOTECA LIEBHERR WKb3212
VINOTECA LIEBHERR WKb3212VINOTECA LIEBHERR WKb3212
VINOTECA LIEBHERR WKb3212
 
Gs vector Collection Plus
Gs vector Collection PlusGs vector Collection Plus
Gs vector Collection Plus
 
Mobilize Your Integrated Learning Platform
Mobilize Your Integrated Learning PlatformMobilize Your Integrated Learning Platform
Mobilize Your Integrated Learning Platform
 
Pwcs 04 week 2
Pwcs 04 week 2Pwcs 04 week 2
Pwcs 04 week 2
 
JBEI Highlights May 2016
JBEI Highlights May 2016JBEI Highlights May 2016
JBEI Highlights May 2016
 
The native language effect
The native language effectThe native language effect
The native language effect
 
8 Major Trends in the Global ELT Field
8 Major Trends in the Global ELT Field8 Major Trends in the Global ELT Field
8 Major Trends in the Global ELT Field
 
حدود وطن- ام اسوار سجن
حدود وطن- ام اسوار سجنحدود وطن- ام اسوار سجن
حدود وطن- ام اسوار سجن
 

Similar to L1 - Illinois Case Study

Exploring the Role of AI in Criminal Charges in Miami.pdf
Exploring the Role of AI in Criminal Charges in Miami.pdfExploring the Role of AI in Criminal Charges in Miami.pdf
Exploring the Role of AI in Criminal Charges in Miami.pdf
The Kirlew Law Firm
 
Identity Theft : A Serious Crime
Identity Theft : A Serious CrimeIdentity Theft : A Serious Crime
Identity Theft : A Serious Crime
Tanzim Rizwan
 
418 Automated Criminal Identification System using Face Detection and.pptx
418 Automated Criminal Identification System using Face Detection and.pptx418 Automated Criminal Identification System using Face Detection and.pptx
418 Automated Criminal Identification System using Face Detection and.pptx
Shivanig12
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial Recognition
Jennifer York
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
hyacinthshackley2629
 
Steven Greschner - About Me
Steven Greschner  - About MeSteven Greschner  - About Me
Steven Greschner - About Me
NextNet Partners
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primer
Hector Dominguez
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
Emily Smith
 
Maui County - Police Commission - Voice of the Community
Maui County - Police Commission - Voice of the CommunityMaui County - Police Commission - Voice of the Community
Maui County - Police Commission - Voice of the Community
Clifton M. Hasegawa & Associates, LLC
 
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawThe Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawMatt Johnson
 
Role of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementRole of Biometrics in Law Enforcement
Role of Biometrics in Law Enforcement
Bahaa Abdulhadi
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
Martha Brown
 
The Power of Identity
The Power of IdentityThe Power of Identity
The Power of Identity
InteractiveNEC
 
250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx
vickeryr87
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
- Mark - Fullbright
 
An Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaAn Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South Africa
Tracy Morgan
 
Frs
FrsFrs

Similar to L1 - Illinois Case Study (20)

elec reporting
elec reportingelec reporting
elec reporting
 
Exploring the Role of AI in Criminal Charges in Miami.pdf
Exploring the Role of AI in Criminal Charges in Miami.pdfExploring the Role of AI in Criminal Charges in Miami.pdf
Exploring the Role of AI in Criminal Charges in Miami.pdf
 
Identity Theft : A Serious Crime
Identity Theft : A Serious CrimeIdentity Theft : A Serious Crime
Identity Theft : A Serious Crime
 
418 Automated Criminal Identification System using Face Detection and.pptx
418 Automated Criminal Identification System using Face Detection and.pptx418 Automated Criminal Identification System using Face Detection and.pptx
418 Automated Criminal Identification System using Face Detection and.pptx
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial Recognition
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
Steven Greschner - About Me
Steven Greschner  - About MeSteven Greschner  - About Me
Steven Greschner - About Me
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primer
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
Maui County - Police Commission - Voice of the Community
Maui County - Police Commission - Voice of the CommunityMaui County - Police Commission - Voice of the Community
Maui County - Police Commission - Voice of the Community
 
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]
 
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawThe Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
 
Role of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementRole of Biometrics in Law Enforcement
Role of Biometrics in Law Enforcement
 
923L16_INH_new
923L16_INH_new923L16_INH_new
923L16_INH_new
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
The Power of Identity
The Power of IdentityThe Power of Identity
The Power of Identity
 
250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
An Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaAn Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South Africa
 
Frs
FrsFrs
Frs
 

More from Nick Iandolo

ISM - BW Email Blast Screen Shot
ISM - BW Email Blast Screen ShotISM - BW Email Blast Screen Shot
ISM - BW Email Blast Screen ShotNick Iandolo
 
VDNS - VelocityDomain Webpage
VDNS - VelocityDomain WebpageVDNS - VelocityDomain Webpage
VDNS - VelocityDomain WebpageNick Iandolo
 
VDNS - Promo Flyer
VDNS - Promo FlyerVDNS - Promo Flyer
VDNS - Promo FlyerNick Iandolo
 
VDNS - HM Ships - Enterprise
VDNS - HM Ships - EnterpriseVDNS - HM Ships - Enterprise
VDNS - HM Ships - EnterpriseNick Iandolo
 
Prime Video Project Bid Proposal
Prime Video Project Bid ProposalPrime Video Project Bid Proposal
Prime Video Project Bid ProposalNick Iandolo
 
GI Pony Spec Sheet - final
GI Pony Spec Sheet - finalGI Pony Spec Sheet - final
GI Pony Spec Sheet - finalNick Iandolo
 
L1 - AutoTest Scheduler Webpage
L1 - AutoTest Scheduler WebpageL1 - AutoTest Scheduler Webpage
L1 - AutoTest Scheduler WebpageNick Iandolo
 
Satcon - Press Releases
Satcon - Press ReleasesSatcon - Press Releases
Satcon - Press ReleasesNick Iandolo
 
Villa Francesca - press release
Villa Francesca - press releaseVilla Francesca - press release
Villa Francesca - press releaseNick Iandolo
 

More from Nick Iandolo (10)

ISM - BW Email Blast Screen Shot
ISM - BW Email Blast Screen ShotISM - BW Email Blast Screen Shot
ISM - BW Email Blast Screen Shot
 
VDNS - VelocityDomain Webpage
VDNS - VelocityDomain WebpageVDNS - VelocityDomain Webpage
VDNS - VelocityDomain Webpage
 
VDNS - Promo Flyer
VDNS - Promo FlyerVDNS - Promo Flyer
VDNS - Promo Flyer
 
VDNS - HM Ships - Enterprise
VDNS - HM Ships - EnterpriseVDNS - HM Ships - Enterprise
VDNS - HM Ships - Enterprise
 
Prime Video Project Bid Proposal
Prime Video Project Bid ProposalPrime Video Project Bid Proposal
Prime Video Project Bid Proposal
 
GI Pony Spec Sheet - final
GI Pony Spec Sheet - finalGI Pony Spec Sheet - final
GI Pony Spec Sheet - final
 
L1 - AutoTest Scheduler Webpage
L1 - AutoTest Scheduler WebpageL1 - AutoTest Scheduler Webpage
L1 - AutoTest Scheduler Webpage
 
L1 - DAS Family
L1 - DAS FamilyL1 - DAS Family
L1 - DAS Family
 
Satcon - Press Releases
Satcon - Press ReleasesSatcon - Press Releases
Satcon - Press Releases
 
Villa Francesca - press release
Villa Francesca - press releaseVilla Francesca - press release
Villa Francesca - press release
 

L1 - Illinois Case Study

  • 1. The Problem: The Illinois Secretary of State (ILSOS), for years have been taking measures to detect and prevent identity theft in its state. The ILSOS has two primary departments responsible for ensuring the integrity of the State’s drivers’ licenses and identification cards, the Driver Services Department and the SOS Police Department. Both departments originally worked with Viisage to implement the new digital driver’s license system in 1998, replacing the old film-based system. The requirements for the solution were based on the need to develop and issue secure credentials. Within a short period of time, the implementation team recognized the growing problem of identity theft. Given this reality, the ILSOS was determined to enhance the State driver’s licensing process in order to protect the state’s citizens. The Solution: The completed Illinois identity solution combined advanced credentialing technology with Viisage’s FaceEXPLORER, a face recognition application designed to handle large database mining and image management. This technology is an important tool used by agencies like the ILSOS to detect and deter identity theft. Employing FaceEXPLORER enables effective and efficient means for conducting background checks, screening watch lists, and managing and analyzing large digital image databases. The ILSOS, comprised of 136 locations, provides over-the-counter driver’s licenses to Illinois citizens. These locations service nearly 15,000 customers each day, adding 8,000 to 12,000 new images to the central database of digital images daily. Therefore, the FaceEXPLORER solution used by the ILSOS was expanded by networking the image database with the Illinois State Police, allowing them immediate access to the growing database of images. Additionally, the solution enabled ILSOS and law enforcement investigators to compare digital images from many sources, such as video surveillance photos, snap shots, sketches, and composite photos, to the ILSOS digital driver’s license database of facial images. Case Study: Illinois Secretary of State Partners with Viisage to Fight Identity Theft “The Viisage identity solution is invaluable in helping the ID Crimes Unit of the SOS Police continue to successfully identify, investigate, and prosecute identity theft and fraud cases.” -Michael Mayer Director of Driver Services, ILSOS
  • 2. 296 Concord Road, 3rd Floor Billerica, MA 01821 Telephone 978-932-2200 Facsimile 978-932-2225 The Results: Identity Theft and Fraud Discovered Ruby Haywood, a 67 year old criminal imposter, was working as part of a gang when she stole the wallets of unsuspecting women. She used the information in the stolen wallets to obtain valid Illinois driver’s licenses under the victims’ names, but replacing the victims’ photos with her own. With the valid identification cards in hand, Ruby used her victims’ identities to gain access to their bank accounts, transfer funds from one account to another, and write bad checks against their accounts. By the end of 2001 she had stolen nearly $275,000 and the identities of thirteen women. Ruby’s reign of identity theft terror however would soon be at an end. The Viisage face recognition system, designed to identify duplicate facial images and report those duplicates to the authorities, quickly found multiple names and identification cards associated with Ruby’s likeness. The Illinois Secretary of State Driver Services Fraud Unit matched the images on file in the driver’s license database with video tapes taken from the banks to prove the crime, leading to Ruby’s arrest. Bottom line: thanks to Viisage’s comprehensive facial recognition solution ILSOS was able to track down Ruby, and sentence her to four years in jail. Accomplishments As of May 2004, nearly 5,800 driver’s licenses have been cancelled statewide, and in the Chicago jurisdiction alone there were 31 arrests, including 18 felonies and 13 misdemeanors, where three or more identities were established from July 2003 to May 2004. The ILSOS and Viisage teams worked closely to design a system that enables the ILSOS and state law enforcement agencies to work together to identify, investigate, and prosecute fraud. The Viisage solution was selected because of its technical superiority and pricing, and the ILSOS continues to work with Viisage because its identity solutions stand out as a result of the company’s industry-leading technology and unique understanding of customer needs. This is the Viisage advantage. “Both the use of face recognition and the use of stored images on file in the proofing process have resulted in the earlier detection and prevention of fraud that would have otherwise gone unnoticed, maybe for years.” -Beth Langen Division Administrator, Division of Policy and Programs, Drivers Services, “The images provided to us through the face recognition enabled driver’s license sys- tem were the key to making this case” – Captain Joe Gabuzzi, SOS Police, ID Crimes Unit “Viisage has learned our business and listens to our ideas regarding how the system should work.” –Beth Langen, Division Administrator, Division of Policy and Programs, Drivers Services, ILSOS www.L1id.com