
10+
Years in the making
A BETTER NIGHTSTICK TO STOP THIEVES™
Verify MC Stops Modern Cyber & Phishing Attacks while Keeping all Your Information 100% Secure
Verify MC™ keeps you safe from modern multi-prong cyber and phishing attacks that even the best services can’t, for pennies, and will actually pay for itself with innovative technology trusted by the healthcare market for over a decade. At the same time, A.I.D.E.N. keeps all your data secure.
What do we do? We break up our products and services into three parts: Foundation, Infrastructure, and Security. Security has two parts: Offensive and Defensive. We look at modern multi-pronged cyber and phishing attacks that even the best services let through and unmask them. Our systems can be implemented without change, and parts can be up and running within minutes of our first call. Yes, we talk to our customers!
How does VerifyMC work? VerifyMC looks at 91 digital, analog, and physical points, which we call Spatial Outlying Geometric Timed Identifiers, combined with a Temporal ID to create a 4D spatiotemporal index that identifies the fraud, assisted by a patent-pending SPARC KEY™ to stop the thieves. We even engage them live in many cases. A mouthful, that's why we wrote, "The Why & How." It's worth reading.
The Basics - Plug in a four-inch BOT, add any email accounts you want it to watch, answer some questions in a chat, and it goes to work. (Virtual or Docker available for on-site installation). Carriers and Freight Brokers, our web-based system can verify who someone is, and if the documents are part of fraud.
When you understand the technology and our commitment, the cost won’t even factor into the decision to become part of the solution. Please keep reading, or contact us to see the system in action.
-
Accounting Groups
At the heart of business, accounting staff are pressed every day to pay invoices, find new vendors, and approve charges someone else says are okay. This is where we stop cybercriminals and clear away any question about whether a person, place, or document is real.
-
Transportation Industry
Trucking, an explosive market, fertile ground for cyber terrorists, where we concentrate specific features to protect the Freight Broker and Carriers, the two biggest targets of theft.
-
Law Enforcement
Our mission is to provide law enforcement, starting with Sheriffs, with many of our tools and technologies to help identify and combat cyber-terrorists.
Stop Modern Cyber and Phishing Attacks in all businesses with special features designed for transportation and accounting.
CYBER THIEFS WITH AI ASSISTED TECHNOLOGY
You Paid a Fake Vendor Invoice that All Looked Real Scam
An elevator to know where. Shark Tank's own Barbara Corcoran was pinched by this scam, which involved a fake $388,700 invoice paid by accounting.
We see this daily now. One of the reasons we are speeding up our launch. This happened three times in two days before this post. You get a "legitimate" email that passes through Microsoft Exchange, one of the leading Phishing Attack Services. It goes into the stack to get paid. In one case, the boss said, "Pay the consultant, I hired three."
What all these variations of this attack have in common is that they most often involve multiple domains, a phone number you can call, and very professional documents. In some cases, they access the e-mail of the person who pays the bill after that person receives the invoice. They then send an email to the bank requesting that the wire transfer be sent.
One office accounting staff member explained, "I called the number on the consultant's invoice, and a nice lady answered and put me on hold. I was told to pay it, and we found out later it was all fake." She explained, "I took an elevator to know where, and didn't even know it until later."
What do all the cases of fraud have in common? They all had digital documents, domains, DNS settings, and even phone numbers that were spot-on accurate. They all passed the tests from the company's email and phishing-prevention vendors.
In each one of the cases we reviewed, Verify MC would have stopped them.


Carrier Identity Theft
Cybercriminals steal the identity of a legitimate trucking company, often by obtaining its USDOT number, MC authority, and contact details from public databases or by hacking.
After gaining the assignment, they switch roles to act as an unauthorized broker, reassigning the load to a legitimate but unwitting carrier at a lower rate. The scammers pocket the payment difference, often disappearing without compensating the actual hauler, or use the process to facilitate cargo theft by directing the load to fraudulent destinations.

Vendor Digital Takeover Attack
This is the toughest for other traditional vendors. You receive an email from one of your vendors containing an invoice and instructions to pay about $7,000 invoice. Yep, the payment instructions were updated. Accounting knows that happens.
Everything looked normal; there was even a number to call. Imagine that your current virus vendor and Microsoft won’t answer the phone, but the cyber-thieves will. So you pay the invoice and find out that the client’s DNS was hacked, giving the bad guys access to set up a new mail server. What's DNS? We protect it.
Every client of your vendor received an updated invoice. Half a million dollars, and they never get caught. Microsoft Exchange and conventional virus phishing protection let them through. Why? Because every mail record was correct, and there was nothing in the email to flag anyone.
But in this actual case, we would have stopped it.

Fuel Advance Scam
Fraudsters who pretend to be a trucking company or a driver with a valid CDL use impersonated credentials to book a load with a broker.
Shortly after, they request an advance payment for fuel or other expenses via quick-pay methods like Comchecks or wire transfers. Once the money is received, the scammers vanish without picking up the load, forcing the broker to rebook with a real carrier at additional cost while absorbing the lost advance.

Double Brokering Fraud
In this scam, perpetrators pose as a licensed carrier using fake or stolen identities to secure a freight load from a broker via load boards or direct outreach.
After gaining the assignment, they switch roles to act as an unauthorized broker, reassigning the load to a legitimate but unwitting carrier at a lower rate. The scammers pocket the payment difference, often disappearing without compensating the actual hauler, or use the process to facilitate cargo theft by directing the load to fraudulent destinations.

Fictitious Pickup and Cargo Theft
Scammers create phantom trucking companies with forged documents, fake websites, and spoofed phone numbers to appear legitimate and secure loads from brokers.
They then dispatch impostor drivers—who may have obtained or faked a CDL—to pick up the cargo under the guise of a real haul. After loading, the thieves divert the truck to a hidden location, steal the goods, and abandon the shipment, resulting in total loss for the broker and shipper.

Account Takeover and Invoice Fraud
Cyber criminals hack into brokers' or carriers' accounts on load boards, email systems, or payment platforms using phishing or malware.
Posing as legitimate parties, they alter invoices to reroute payments to their own accounts, create fake bookings by impersonating carriers, or intercept communications to demand ransoms for "held" loads. This digital impersonation exploits trust in the supply chain, leading to diverted funds and disrupted operations.
VerifyMC proactively detects and stops freight fraud as it happens—with your own digital Thermometer alert—keeping you and your business safe.
(This will Become a Portrait Video that will fill up mobile screen)
If You're a Trucker, Verify MC can help you stay safe. It's free. Freight Brokers, unite, for pennies you can put a safe door between you and cyber thieves.
4126+
Data Sources We Touch
Serving clients in every state of the Union, Canada, and Mexico
640+
Collective Years of Experience
We are Freight Brokers, Truckers, Technologist, and AI Experts
TRUCKER VERIFYMC HELPS
For truckers, it's your insurance to help protect your identity from theft.
Verify MC was started by people in and around the freight business for three decades. We are tied to no vendor, only one cause, to solve the growing fraud in trucking that is the lifeblood of America.
If you are a trucker or operate as a single-rig operator, the backbone of America, Trucker Verify MC is free. Why? You're asking, "There has to be a catch or angle?"
Nope. By helping single-rig operators, we make it harder for cyber-terrorists to operate, take you out of a digital landscape, and help us focus our technology on the criminals that threaten us all.
Sign up below, and we will add you to the growing list and send you an email with our "Three Steps to Stay Digitally Safe," along with free software we know will help. No. There is no paid version of the free software.






