โ† Back to all modules
๐Ÿชช
๐Ÿ’ป Tech-Savvy Adults ยท Module 9

Identity Theft Prevention

Protect your family's identities with credit monitoring, dark web awareness, and child identity protection strategies.

๐Ÿ”“

Understanding the Identity Theft Ecosystem

Identity theft isn't a single crime โ€” it's a chain of events that starts with data collection and ends with financial exploitation. Understanding the chain helps you break it.

The Identity Theft Chain

Step 1: Data Collection
Attackers gather personal information through:

  • Data breaches โ€” Company databases are hacked, exposing customer records (name, email, SSN, DOB, address)
  • Phishing โ€” You're tricked into providing credentials or personal information
  • Physical theft โ€” Stolen mail, wallets, documents from cars or homes
  • Social engineering โ€” Calling companies while impersonating you to gather account details
  • Public records โ€” Property records, court filings, birth announcements, obituaries
  • Social media โ€” Birthday, hometown, mother's maiden name, employer, children's names
  • Dark web marketplaces โ€” Buying pre-packaged identity data for as little as $5-$20

Step 2: Identity Assembly
A complete identity package includes:

  • Full legal name
  • Social Security number
  • Date of birth
  • Current and previous addresses
  • Mother's maiden name
  • Phone number and email
  • Existing account details (banks, utilities)

The more of these an attacker has, the more convincingly they can impersonate you.

Step 3: Exploitation
With sufficient information, the thief can:

  • Open new credit accounts โ€” Credit cards, loans, store credit lines in your name
  • Take over existing accounts โ€” Call your bank, pass security questions, change the password
  • File fraudulent tax returns โ€” File before you do, claiming your refund
  • Obtain medical care โ€” Use your insurance for treatment, contaminating your medical records
  • Employment fraud โ€” Work under your SSN, leaving you with the tax liability
  • Criminal identity theft โ€” Give your identity during an arrest, leaving you with a criminal record
  • Synthetic identity theft โ€” Combine your SSN with a fake name and DOB to create a new "person"

Types of Identity Theft by Target

Adult Identity Theft:
The most common form. Adults have existing credit histories, bank accounts, and tax obligations that can be exploited immediately.

Child Identity Theft:
Particularly insidious because:

  • Children have clean SSNs with no credit history
  • No one monitors a child's credit
  • Theft may not be discovered for 10-15 years
  • A child's SSN is often exposed through school, medical, or government databases

Senior Identity Theft:
Elder family members are targeted because they often have significant savings, good credit, and may be less familiar with digital threats.

Deceased Identity Theft (Ghosting):
Deceased individuals' identities are stolen from obituaries and death records before the death is reported to credit bureaus.

The Scale of the Problem

  • 1.4 million identity theft reports filed with the FTC in 2024
  • Average loss per victim: $1,000+ (but can reach hundreds of thousands)
  • Average time to resolve: 100-200 hours over 6-12 months
  • 1 in 50 children are victims of identity theft
  • Many victims experience identity theft multiple times because stolen data is sold repeatedly

Why It Keeps Getting Worse

Three factors drive the increase in identity theft:

  1. Data breach acceleration โ€” More services store your data, more breaches expose it. Your SSN has likely been exposed multiple times.
  2. AI-powered attacks โ€” AI makes phishing and social engineering more convincing and scalable.
  3. Underground economy maturation โ€” Dark web marketplaces make it trivially easy to buy stolen identities, complete with customer support and money-back guarantees.

The good news: most identity theft is preventable with the right defensive measures. That's what the rest of this module covers.

1 / 5

๐Ÿ›ก๏ธ CyberSafe โ€” Online safety training for the whole family.