1 00:00:17.475 --> 00:00:19.325 It's essentially leaking data, 2 00:00:19.625 --> 00:00:22.165 but a particular kind of data leak. 3 00:00:22.235 --> 00:00:26.805 It's basically broker sends deal to lender, 4 00:00:27.345 --> 00:00:28.805 um, lender 5 00:00:29.345 --> 00:00:32.885 or someone at lender, um, leaks. 6 00:00:32.885 --> 00:00:36.445 That data point to a third party, um, that 7 00:00:37.145 --> 00:00:38.565 the broker isn't aware of, 8 00:00:38.665 --> 00:00:40.965 and the, uh, the client that's being sent there isn't aware 9 00:00:40.965 --> 00:00:44.605 of, uh, that party calls the client kind of cold 10 00:00:44.625 --> 00:00:47.245 and tells them either, Hey, I know you have like an approval 11 00:00:47.245 --> 00:00:48.445 with X, Y, and Z lender. 12 00:00:49.065 --> 00:00:50.965 Um, we can get you a better deal. 13 00:00:51.505 --> 00:00:54.165 Um, just send over your bank statements or application, 14 00:00:54.165 --> 00:00:55.365 or, we already have your bank statements 15 00:00:55.365 --> 00:00:58.045 and application work with us and let's get you funded. 16 00:01:03.555 --> 00:01:08.325 There's no a hundred percent surefire way to prevent this. 17 00:01:08.405 --> 00:01:10.125 I have these sorts of conversations all the time 18 00:01:10.355 --> 00:01:14.565 with my brokers and with my lending partners. 19 00:01:14.905 --> 00:01:19.125 Uh, the reality is all it takes is a single rogue agent, um, 20 00:01:19.345 --> 00:01:22.605 at a lender, whether it's an underwriter or a processor 21 00:01:23.025 --> 00:01:26.445 or a sales rep, uh, to be engaged in activity like this. 22 00:01:26.625 --> 00:01:29.005 And it isn't necessarily a systemic thing, um, 23 00:01:29.225 --> 00:01:30.245 at a lending source. 24 00:01:30.345 --> 00:01:33.365 So it's, it's hard to completely prevent. 25 00:01:33.665 --> 00:01:37.085 But the, the, the best practice, uh, 26 00:01:37.425 --> 00:01:39.925 for preventing back backdooring is simply 27 00:01:40.025 --> 00:01:43.885 to have strong partnerships, uh, with your lenders, um, 28 00:01:45.115 --> 00:01:47.925 that the people that you hire fully, um, 29 00:01:48.145 --> 00:01:53.045 and make sure that your data is organized, um, 30 00:01:53.305 --> 00:01:55.165 and you understand where your files are going. 31 00:02:01.185 --> 00:02:05.365 If you're getting backdoored, um, the, I would say the, 32 00:02:05.545 --> 00:02:10.405 the best method to smoke out, uh, the perpetrator, 33 00:02:10.945 --> 00:02:15.565 uh, would be to target, uh, single submission. 34 00:02:15.705 --> 00:02:18.965 And that submission either is a business 35 00:02:19.115 --> 00:02:20.525 that you know very well 36 00:02:20.665 --> 00:02:24.085 or someone that's close to you, uh, that you could kind 37 00:02:24.085 --> 00:02:25.525 of just let them know what's going on 38 00:02:25.545 --> 00:02:28.925 and have them ready to give you the information on this. 39 00:02:29.465 --> 00:02:33.085 Uh, send that submission to the lender, um, 40 00:02:33.275 --> 00:02:36.245 that you're assuming is involved, uh, in this 41 00:02:36.265 --> 00:02:40.645 and just kind of like follow the breadcrumbs, um, that, uh, 42 00:02:41.185 --> 00:02:43.085 number that you put on the application, 43 00:02:43.085 --> 00:02:44.405 whether it's the actual business 44 00:02:44.405 --> 00:02:47.645 or like, say you put like your own phone number 45 00:02:47.665 --> 00:02:50.805 or someone at the company's, uh, phone number, um, 46 00:02:51.675 --> 00:02:52.925 will end up being called 47 00:02:53.225 --> 00:02:55.845 or texted, um, if you are getting backdoored. 48 00:02:56.185 --> 00:02:59.765 Um, and then just have the person sort of play along 49 00:02:59.865 --> 00:03:02.365 and just, uh, try to, try to find the pattern. 50 00:03:07.905 --> 00:03:11.205 I'm telling them to look out for the sorts 51 00:03:11.205 --> 00:03:12.685 of patterns that we mentioned earlier. 52 00:03:12.825 --> 00:03:16.805 If, if you ever hear, you know, like half a dozen, 53 00:03:17.085 --> 00:03:20.365 a half a dozen separate occasions that XY, 54 00:03:20.445 --> 00:03:24.645 Z broker is in competition on your file, like of course, um, 55 00:03:25.355 --> 00:03:29.165 data sources matter if you're sourcing leads the way 56 00:03:29.165 --> 00:03:31.765 that we're sourcing them, there shouldn't be 57 00:03:32.665 --> 00:03:34.685 random brokers coming out of the woodwork. 58 00:03:35.105 --> 00:03:37.645 Uh, calling are applications 59 00:03:38.025 --> 00:03:41.405 and if there are, you need to, you know, identify this 60 00:03:41.405 --> 00:03:42.685 with management and we'll take care of it.