A 9‑Digit Number Can Get You Hired—So Why Are States Expanding E‑Verify in 2026 When It Still Can’t Prove You’re You?
E‑Verify’s green light can feel like certainty, but watchdogs say it mainly matches records—not the person in front of the employer. That gap is where borrowed identities keep working.

Key Points
- 1Recognize the limits: E‑Verify confirms work authorization via record matching, but it often cannot prove the applicant’s identity.
- 2Understand the loophole: accurate borrowed or stolen SSNs can still return “Employment Authorized,” as GAO warns about persistent identity-theft vulnerability.
- 3Follow the rules: TNCs aren’t final, and DOJ says employers can’t punish workers while they contest and resolve mismatches.
A nine-digit number can open doors.
In American hiring, that number is often a Social Security number, typed into an online portal that promises employers certainty: E‑Verify. The system’s result—“Employment Authorized”—lands with the weight of a green light. Managers exhale. Payroll proceeds. A job begins.
Yet the clean finality of that phrase masks a quieter truth that federal watchdogs have been repeating for years. E‑Verify is not built to answer the question most people assume it answers. It is designed to verify employment authorization, not to prove identity. When those two ideas get blurred—especially in a labor market that runs on speed—identity fraud can slip through.
E‑Verify can be a strong check on paperwork—and a weak shield against borrowed identities.
— — TheMurrow Editorial
The paradox matters beyond politics. It shapes how employers manage risk, how authorized workers get protected, and how unauthorized work persists through the oldest trick in the hiring book: using someone else’s information that matches government records.
What E‑Verify Actually Verifies—and What It Doesn’t
That distinction sounds technical until you translate it into everyday hiring reality. E‑Verify asks: do the identifiers entered—name, date of birth, Social Security number, document data—match a record for a person who is authorized to work? The system is not fundamentally designed to answer: is the person standing in front of the employer the rightful owner of those identifiers?
That gap is not merely theoretical. The Government Accountability Office (GAO) has warned that E‑Verify remains vulnerable to identity theft, meaning someone can present valid-looking information that matches government records without being the person those records describe. GAO framed identity fraud as a “significant challenge” for the program and noted E‑Verify often cannot detect it. (Source: GAO‑11‑146)
The “Employment Authorized” Result Can Be Misleading
The practical implication is uncomfortable: a system widely perceived as a lock functions, in some circumstances, more like a keypad that accepts any correct code—regardless of who typed it.
E‑Verify answers whether the identifiers match. It does not always answer whether the person matches.
— — TheMurrow Editorial
The Core Trade-Off: Scale Versus Certainty
Both sides are arguing about the same thing: whether the United States wants employment verification to double as identity verification. Right now, it largely does not.
The Hiring Workflow: Where E‑Verify Fits (and Where It Doesn’t)
That sequencing matters. Employers often experience E‑Verify as the decisive moment, but the system only checks what the employer enters based on what the employee presented. If the source documents are borrowed, counterfeit, or mismatched in subtle ways, E‑Verify may not catch it unless the mismatch is visible to SSA/DHS databases.
What Employers Actually Do
Typical E‑Verify workflow
- ✓The employee completes Section 1 of the Form I‑9.
- ✓The employer reviews documents and completes Section 2.
- ✓If the employer uses E‑Verify, they enter the employee’s information into the system.
- ✓E‑Verify returns a result such as “Employment Authorized” or a mismatch that triggers a formal process.
This is a process built around record matching and employer data entry. It is not a live identity check administered by the government.
A Case Study in the Ordinary
Oversight reports have pointed directly at this vulnerability. GAO has repeatedly emphasized identity theft as a gap that E‑Verify cannot reliably close. (Source: GAO‑11‑146)
A system built for eligibility can’t automatically become a system built for identity.
— — TheMurrow Editorial
“Tentative Nonconfirmation”: The System’s Friction—and Workers’ Rights
A TNC is not a final finding of unauthorized work. It is a signal that something in the record match failed—sometimes for benign reasons: name changes, data entry mistakes, or unupdated agency records. For employees, the TNC is where the system’s promise of certainty collides with the messiness of real life.
The Legal Guardrails Employers Must Follow
That safeguard is easy to state and hard to enforce in a busy workplace. Employers worry about compliance risk; workers worry about retaliation or stigma. The system tries to balance both.
Why TNCs Don’t Solve the Identity-Fraud Problem
That is why watchdogs emphasize the difference between catching mismatches and confirming identity. The former is what E‑Verify does reliably; the latter is what the program struggles to do at scale.
The Nine Digits Problem: How Borrowed Identities Slip Through
GAO has described identity theft as a persistent vulnerability in E‑Verify, one that the system often cannot detect. (Source: GAO‑11‑146) That assessment has shown up repeatedly in policy debates for a reason: it maps onto the real-world incentives that drive identity borrowing.
Why the System Can Be Fooled by Accurate Fraud
To detect identity fraud, you typically need something more than matching:
- A stronger document security check
- A higher-confidence identity proofing step
- Or a biometric comparison
E‑Verify, as designed, is not a biometric system. It is a confirmation of records, mediated by employer inputs.
What This Means for Authorized Workers
Photo Matching: A Helpful Feature That Isn’t Identity Proof
Photo Matching sounds like a direct answer to the identity problem. The catch is in the mechanics—and in how limited the feature is.
Why Photo Matching Has Limits
Manual comparison introduces variability. Some employers train staff carefully; others rush. Some workforces rely on high-volume onboarding; others hire rarely. The tool is only as consistent as the human being clicking the buttons.
Photo Matching Still Isn’t Biometric Proof
Photo matching can reduce certain kinds of document fraud. It does not eliminate the fundamental issue GAO has identified: E‑Verify can be vulnerable to identity theft, particularly when the presented data and documentation align with existing records.
What the Watchdogs Say: GAO and DHS OIG on the Identity Gap
GAO: Identity Theft Is a “Significant Challenge”
That is not a marginal critique. It goes to the center of the program’s credibility, particularly when E‑Verify is marketed—formally or informally—as a definitive answer to unauthorized work.
DHS OIG (2021): Process Improvements and Manual Weak Points
In plain terms: the government’s own watchdog sees E‑Verify as a useful system with operational vulnerabilities that matter, especially where identity is concerned.
Older Evaluations Still Shape Today’s Debate
Key Insight
So What Should Employers—and Workers—Do With This Reality?
Practical Takeaways for Employers
Key implications from the research:
- Train hiring staff on TNC rules. DOJ’s IER guidance is clear: no adverse action while a worker resolves a TNC. (Source: justice.gov)
- Prioritize accurate data entry. Many mismatches can stem from simple errors; accuracy reduces unnecessary TNCs and disruptions.
- Use Photo Matching carefully where it applies. OIG’s critique highlights the employer-dependent nature of manual review; consistency matters. (Source: OIG‑21‑56)
- Understand the identity-theft limitation. GAO has made the point bluntly: E‑Verify cannot reliably detect identity fraud in many cases. (Source: GAO‑11‑146)
Practical Takeaways for Workers
- A TNC is not a final denial of authorization.
- The law restricts employers from punishing workers for contesting and resolving a mismatch. (Source: DOJ IER FAQs)
Workers also benefit from maintaining consistent records—especially around name changes—and ensuring SSA and DHS records reflect updates where required. E‑Verify is a matching system; mismatches often arise when databases lag behind life events.
The Policy Choice Hiding in Plain Sight
E‑Verify’s current design reflects a compromise. The results reflect it too.
Editor’s Note
Conclusion: The Verdict E‑Verify Can’t Deliver
E‑Verify is built to match records, and it often does that quickly. Federal oversight—GAO on identity theft, DHS OIG on process weaknesses and manual photo review—shows why the system can still be gamed by a person holding the right data but the wrong identity. The system’s critics are right about the gap; the system’s defenders are right that it was never meant to be a national identity proofing regime.
The danger lies in pretending the gap does not exist. Employers deserve an honest understanding of what E‑Verify does on their behalf, and workers deserve a process that does not punish them for database mismatches. Policy makers, meanwhile, should stop selling E‑Verify as a moral verdict. It is a compliance tool—effective in some lanes, porous in others—and the nine-digit number problem sits squarely in the porous part.
1) Does E‑Verify confirm someone’s identity?
2) Why can E‑Verify return “Employment Authorized” for someone using a stolen SSN?
3) What is a Tentative Nonconfirmation (TNC)?
4) Can an employer fire someone because of a TNC?
5) What is Photo Matching in E‑Verify?
6) What did the DHS Inspector General find about E‑Verify?
7) If E‑Verify has gaps, why do employers use it?
Frequently Asked Questions
Does E‑Verify confirm someone’s identity?
E‑Verify primarily confirms whether the information provided on Form I‑9 matches SSA/DHS records indicating work authorization. It is not a full identity-proofing system. GAO has warned the program remains vulnerable to identity theft and often cannot detect identity fraud when accurate stolen or borrowed information is used. (Source: GAO‑11‑146; e-verify.gov)
Why can E‑Verify return “Employment Authorized” for someone using a stolen SSN?
Because E‑Verify checks whether entered identifiers match government records. If a worker uses an SSN and biographical data that correctly match a record for a work-authorized person, the system can return “Employment Authorized” even if the person presenting the information is not the rightful holder. GAO has described identity theft as a significant challenge for E‑Verify. (Source: GAO‑11‑146)
What is a Tentative Nonconfirmation (TNC)?
A TNC occurs when the information an employer submits to E‑Verify does not match SSA or DHS records. E‑Verify distinguishes between SSA mismatches and DHS mismatches, and some cases require additional time or manual review (“Needs More Time”). A TNC is not a final finding of ineligibility. (Source: e-verify.gov)
Can an employer fire someone because of a TNC?
Not while the employee is resolving it. The DOJ’s Immigrant and Employee Rights Section (IER) states employers may not take adverse action against an employee because of a TNC if the employee chooses to contest and resolve the mismatch. Employers must follow the required process. (Source: justice.gov, IER FAQs)
What is Photo Matching in E‑Verify?
Photo Matching is a feature where E‑Verify displays a photo associated with certain documents, and the employer compares it to the photo on the employee’s document. It can help reduce some document fraud, but it relies on employer review and is not a biometric identity verification system. (Source: e-verify.gov)
What did the DHS Inspector General find about E‑Verify?
In a 2021 report, the DHS Office of Inspector General concluded USCIS needed to improve E‑Verify’s employment eligibility verification process. The report highlighted limits in confirming identity, including that photo matching is not fully automated and depends on employers to manually review photos. (Source: OIG‑21‑56, Aug. 2021)















