What Is Identity Theft? How It Happens and How to Prevent It

Identity theft occurs when someone uses another person's personal information without permission for fraud or other crimes. This article covers types, methods, and prevention.

The InfoNexus Editorial TeamMay 7, 20264 min read

What Is Identity Theft?

Identity theft occurs when an individual's personal identifying information is obtained and used by another person without authorization, typically to commit fraud or other crimes. Personal information exploited in identity theft commonly includes full legal names, Social Security numbers (in the United States), dates of birth, passport numbers, bank account credentials, credit card numbers, and medical insurance identifiers. Identity theft is a criminal offense in all U.S. states and in most countries worldwide. According to the U.S. Federal Trade Commission (FTC), identity theft has consistently been the most reported category of consumer fraud, with over 1.4 million reports filed in 2023 alone.

Types of Identity Theft

Identity theft manifests in several distinct forms depending on what information is stolen and how it is exploited:

  • Financial identity theft: The most common type. The perpetrator uses stolen credentials to open new credit accounts, take out loans, make unauthorized purchases, or drain existing bank accounts.
  • Tax identity theft: A fraudulent tax return is filed using the victim's Social Security number to claim a refund before the legitimate taxpayer files.
  • Medical identity theft: The perpetrator uses stolen health insurance information to obtain medical care, prescriptions, or equipment. This can corrupt the victim's medical records with inaccurate information.
  • Criminal identity theft: An offender provides a victim's name and identification to law enforcement during an arrest or investigation, leaving the victim with a false criminal record.
  • Child identity theft: A child's Social Security number is stolen and used to establish fraudulent credit histories. This often goes undetected for years because children do not typically monitor their credit.
  • Synthetic identity theft: The perpetrator combines real and fabricated information (e.g., a real Social Security number with a fictitious name and birthdate) to create a new identity used to obtain credit.

How Identity Theft Occurs

Identity thieves use a wide range of methods to obtain personal information, from sophisticated cyberattacks to low-tech physical theft:

MethodDescriptionInformation Targeted
Data breachesUnauthorized access to corporate databases containing customer recordsUsernames, passwords, SSNs, payment cards
PhishingFraudulent emails, texts, or websites impersonating legitimate entitiesLogin credentials, payment data
Malware / spywareSoftware installed on victim's device to capture keystrokes or screen contentsPasswords, banking credentials
Mail theftStealing physical mail containing financial statements or pre-approved offersAccount numbers, SSN
Dumpster divingRetrieving discarded documents with personal informationAccount numbers, medical records
Account takeoverCredential stuffing using leaked username/password pairsEmail, financial accounts
SIM swappingSocial engineering a mobile carrier to transfer phone number to attacker's SIMTwo-factor authentication bypass

The Role of Data Breaches

Large-scale data breaches — unauthorized disclosures of personal records held by organizations — are among the most significant sources of identity theft. Notable breaches include the 2017 Equifax breach (147 million records exposed, including SSNs and birth dates), the 2021 T-Mobile breach (54 million customer records), and the 2023 MOVEit breach (affecting hundreds of organizations and tens of millions of individuals). Stolen records from data breaches are typically sold on dark web marketplaces, where they are purchased by identity thieves who exploit the information months or years after the initial breach. The proliferation of breached data has created a persistent background environment of risk for individuals whose information has been exposed.

Warning Signs of Identity Theft

  • Unexpected bills, collection notices, or account statements for accounts the individual did not open.
  • Unexplained charges appearing on existing bank or credit card statements.
  • Denial of credit applications due to negative information the individual did not expect.
  • Missing expected mail, possibly indicating the postal address has been changed by a fraudster.
  • IRS notification that a tax return has already been filed using the individual's SSN.
  • Medical Explanation of Benefits statements for services not received.
  • Alerts from credit monitoring services about new accounts or hard inquiries.

Prevention Measures

MeasureDescriptionProtects Against
Credit freezeRestricts access to credit report, preventing new account openingsNew account fraud
Multi-factor authentication (MFA)Requires a second verification factor beyond a passwordAccount takeover
Password managerGenerates and stores unique strong passwords for each accountCredential stuffing, phishing
Credit monitoringAlerts to changes in credit report (new accounts, hard inquiries)Financial identity theft
Document shreddingDestroy documents containing personal information before disposalDumpster diving
Mail monitoring / USPS Informed DeliveryTrack expected mail to detect theft or mail forwarding fraudMail theft

Legal Framework and Victim Recourse

In the United States, the primary federal law addressing identity theft is the Identity Theft and Assumption Deterrence Act of 1998, which made identity theft a federal crime punishable by up to 15 years imprisonment and fines. The Fair Credit Reporting Act (FCRA) gives consumers the right to dispute inaccurate information in credit reports caused by identity theft. Victims can place a fraud alert with the three major credit bureaus (Equifax, Experian, TransUnion) — which requires lenders to take extra steps before opening new accounts — or implement a credit freeze, which is more comprehensive. The FTC's IdentityTheft.gov platform provides a personalized recovery plan for U.S. victims. The European Union's GDPR establishes data protection obligations that, when enforced, reduce the risk of data breaches contributing to identity theft.

cybersecurityfraudpersonal safety

Related Articles