identity theft identity theft protection strong authentication identity verification fraud two factor authentication logic bombs biometrics criminal background check identity authentication microsoft .net authentication authentication man-in-the-middle attack online fraud land attack credit card fraud identity 2.0 id theft live