SlideShare a Scribd company logo
THE CONSUMER
IDENTIFICATION
SYSTEM FROM THE
FRAUD PREVENTION
NETWORK
Protecting customers and
businesses from fraud
crimes
WHO ARE WE
• The Fraud Prevention Network has specialized in fraud prevention services for over
20 years beginning in 1997.
• We have over 43 years experience in Law Enforcement with a record of handling
over 50,000 fraud crimes
• We are a minority owned, women owned, and veteran owned business
• Registered with the Better Business Bureau
• DUNS # 019599993
• SBA Disadvantaged Business Registered
• Certified Government Contractor
• Incorporated in the State of Missouri as Abernathy Investigative Group LLC
Your personal information
can be stolen and sold
across the country
Every time you become a
victim, it can cost you
$1,440.00 to clear your
name
People can commit crimes
in your name and you will
have to prove you did not
do it
The Consumer Identification
system will protect you 24
hours a day, seven days a
week
YOU CAN
BECOME A
VICTIM AT
ANYTIME
HOW THE
SYSTEM
WORKS
Your photo,
fingerprint,
signature, and
identification will
be stored in a
secure database
When someone
attempts
to use your
identity, a identity
check will be
automatically to
verify that you are
the person making
the transaction
If it is not you, the
person will be
arrested and you
will be protected
WHAT YOU
WILL BE
PROTECTED
FROM
ID Theft Check Fraud
Credit card
fraud
Tax Refund
Fraud
Mortgage and
Title Fraud
Social security
Fraud
Healthcare
Fraud
HOW DO
YOU ENROLL
We will
come to
your home,
place of
business,
church or
community
center
We gather
the
information
and place it
in the
database
This
information
will allow
area
businesses
to verify
your
and protect
you and
their
business
from fraud
The
cost is
$15.00
per
year
per
person,
$65.00
for a
family
WHAT IS THE MARKET FOR THIS
SERVICE
30 million were victims of
some form of fraud in 2016.
That number is expected to
increase dramatically.
ID theft victims lost 16 Billion
in 2016
No system presently exists
that provides this form of
protection
WHAT IS THE RETURN ON INVESTMENT
Consumer Identification system Financial Forecast 2018
# customers Jan-18 Feb-18 Mar-18 Apr-18 May-18 Jun-18 Jul-18 Aug-18 Sep-18 Oct-18 Nov-18 Dec-18Total R.O.I.
1,500 22,500 22,500 22,500 22,500 22,500 22,500 22,500 22,500 22,500 22,500 22,500 22,500 270,000 40,500
3,000 45,000 45,000 45,000 45,000 45,000 45,000 45,000 45,000 45,000 45,000 45,000 45,000 540,000 81,000
4,500 67,500 67,500 67,500 67,500 67,500 67,500 67,500 67,500 67,500 67,500 67,500 67,500 810,000 121,500
6,000 90,000 90,000 90,000 90,000 90,000 90,000 90,000 90,000 90,000 90,000 90,000 90,000 1,080,000 162,000
7,500 112,500 112,500 112,500 112,500 112,500 112,500 112,500 112,500 112,500 112,500 112,500 112,500 1,350,000 202,500
10,000 150,000 150,000 150,000 150,000 150,000 150,000 150,000 150,000 150,000 150,000 150,000 150,000 1,800,000 270,000
11,500 172,500 172,500 172,500 172,500 172,500 172,500 172,500 172,500 172,500 172,500 172,500 172,500 2,070,000 310,500
13,000 195,000 195,000 195,000 195,000 195,000 195,000 195,000 195,000 195,000 195,000 195,000 195,000 2,340,000 351,000
14,500 217,500 217,500 217,500 217,500 217,500 217,500 217,500 217,500 217,500 217,500 217,500 217,500 2,610,000 391,500
15,500 232,500 232,500 232,500 232,500 232,500 232,500 232,500 232,500 232,500 232,500 232,500 232,500 2,790,000 418,500
17,000 255,000 255,000 255,000 255,000 255,000 255,000 255,000 255,000 255,000 255,000 255,000 255,000 3,060,000 459,000
18,500 277,500 277,500 277,500 277,500 277,500 277,500 277,500 277,500 277,500 277,500 277,500 277,500 3,330,000 499,500
20,000 300,000 300,000 300,000 300,000 300,000 300,000 300,000 300,000 300,000 300,000 300,000 300,000 6,600,000 540,000
These figures are based on the volume of customers gained each month at the same rate per month.
An additional 15% will be paid from company revenues in a cash reserve to guarantee the 15% return on investment
CALL OR CONTACT US FOR AN
APPOINTMENT
FRAUD PREVENTION NETWORK A
SERVICE OF ABERNATHY INVESTIGATIVE GROUP LLC
T-REX BLDG. SUITE 501
911 WASHINGTON AVENUE ST. LOUIS, MO. 63101
Call us at (314) 732-1189 or (314) 643-6195
Complete the attached form and fax it to (888) 690-2890
E mail us at fraudprotectionnetwork@outlook.com

More Related Content

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
Marius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
Expeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

The consumer identification system from the fraud prevention

  • 1. THE CONSUMER IDENTIFICATION SYSTEM FROM THE FRAUD PREVENTION NETWORK Protecting customers and businesses from fraud crimes
  • 2. WHO ARE WE • The Fraud Prevention Network has specialized in fraud prevention services for over 20 years beginning in 1997. • We have over 43 years experience in Law Enforcement with a record of handling over 50,000 fraud crimes • We are a minority owned, women owned, and veteran owned business • Registered with the Better Business Bureau • DUNS # 019599993 • SBA Disadvantaged Business Registered • Certified Government Contractor • Incorporated in the State of Missouri as Abernathy Investigative Group LLC
  • 3. Your personal information can be stolen and sold across the country Every time you become a victim, it can cost you $1,440.00 to clear your name People can commit crimes in your name and you will have to prove you did not do it The Consumer Identification system will protect you 24 hours a day, seven days a week YOU CAN BECOME A VICTIM AT ANYTIME
  • 4. HOW THE SYSTEM WORKS Your photo, fingerprint, signature, and identification will be stored in a secure database When someone attempts to use your identity, a identity check will be automatically to verify that you are the person making the transaction If it is not you, the person will be arrested and you will be protected
  • 5. WHAT YOU WILL BE PROTECTED FROM ID Theft Check Fraud Credit card fraud Tax Refund Fraud Mortgage and Title Fraud Social security Fraud Healthcare Fraud
  • 6. HOW DO YOU ENROLL We will come to your home, place of business, church or community center We gather the information and place it in the database This information will allow area businesses to verify your and protect you and their business from fraud The cost is $15.00 per year per person, $65.00 for a family
  • 7. WHAT IS THE MARKET FOR THIS SERVICE 30 million were victims of some form of fraud in 2016. That number is expected to increase dramatically. ID theft victims lost 16 Billion in 2016 No system presently exists that provides this form of protection
  • 8. WHAT IS THE RETURN ON INVESTMENT Consumer Identification system Financial Forecast 2018 # customers Jan-18 Feb-18 Mar-18 Apr-18 May-18 Jun-18 Jul-18 Aug-18 Sep-18 Oct-18 Nov-18 Dec-18Total R.O.I. 1,500 22,500 22,500 22,500 22,500 22,500 22,500 22,500 22,500 22,500 22,500 22,500 22,500 270,000 40,500 3,000 45,000 45,000 45,000 45,000 45,000 45,000 45,000 45,000 45,000 45,000 45,000 45,000 540,000 81,000 4,500 67,500 67,500 67,500 67,500 67,500 67,500 67,500 67,500 67,500 67,500 67,500 67,500 810,000 121,500 6,000 90,000 90,000 90,000 90,000 90,000 90,000 90,000 90,000 90,000 90,000 90,000 90,000 1,080,000 162,000 7,500 112,500 112,500 112,500 112,500 112,500 112,500 112,500 112,500 112,500 112,500 112,500 112,500 1,350,000 202,500 10,000 150,000 150,000 150,000 150,000 150,000 150,000 150,000 150,000 150,000 150,000 150,000 150,000 1,800,000 270,000 11,500 172,500 172,500 172,500 172,500 172,500 172,500 172,500 172,500 172,500 172,500 172,500 172,500 2,070,000 310,500 13,000 195,000 195,000 195,000 195,000 195,000 195,000 195,000 195,000 195,000 195,000 195,000 195,000 2,340,000 351,000 14,500 217,500 217,500 217,500 217,500 217,500 217,500 217,500 217,500 217,500 217,500 217,500 217,500 2,610,000 391,500 15,500 232,500 232,500 232,500 232,500 232,500 232,500 232,500 232,500 232,500 232,500 232,500 232,500 2,790,000 418,500 17,000 255,000 255,000 255,000 255,000 255,000 255,000 255,000 255,000 255,000 255,000 255,000 255,000 3,060,000 459,000 18,500 277,500 277,500 277,500 277,500 277,500 277,500 277,500 277,500 277,500 277,500 277,500 277,500 3,330,000 499,500 20,000 300,000 300,000 300,000 300,000 300,000 300,000 300,000 300,000 300,000 300,000 300,000 300,000 6,600,000 540,000 These figures are based on the volume of customers gained each month at the same rate per month. An additional 15% will be paid from company revenues in a cash reserve to guarantee the 15% return on investment
  • 9. CALL OR CONTACT US FOR AN APPOINTMENT FRAUD PREVENTION NETWORK A SERVICE OF ABERNATHY INVESTIGATIVE GROUP LLC T-REX BLDG. SUITE 501 911 WASHINGTON AVENUE ST. LOUIS, MO. 63101 Call us at (314) 732-1189 or (314) 643-6195 Complete the attached form and fax it to (888) 690-2890 E mail us at fraudprotectionnetwork@outlook.com