authentication credential verification encryption identity theft identity verification live background check man-in-the-middle attack background checks internet security microsoft .net authentication criminal background check identity 2.0 land attack people search security logic bombs