Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.


Check here if you're human


Man lived under stolen identity for more than a decade

Pin It

Identity cloning generally encompasses all types of identity theft. In most cases, the thief is intentionally living and functioning as the victim. The thief’s motivation may be to hide from the law, evade child support, or skirt immigration.

A man lived a quiet life with a steady job. But he wasn’t who he claimed to be. He was an identity thief. The ruse was so elaborate that his own girlfriend said she was unaware of it.

His victim lived hundreds of miles away and for over a decade, he was unaware that his identity had been stolen. When the victim applied for a passport for the first time, he learned that someone else already had a passport under his name, and had since 1996.

Prosecutors aren’t even sure of the perpetrator’s real name. The man claims he’s a German national who entered the country under his real name in 1983 via Mexico. He even got a birth certificate and a driver’s license.

In cases of identity theft, generally, the goal is to commit financial fraud. Kind of like a smash and grab. The thief comes in, wreaks havoc, makes a mess, destroys your credit, and then moves on to another victim. But with identity cloning, the person may actually pay the bills and live a decent life.

In some cases, though, that person may also be a sex offender or have other recurring legal troubles. Either way, at some point, there is inevitably a mess that needs to be cleaned up. Some people spend hundreds of hours, thousands of dollars, and face years of aggravation.

Our systems of identification rely on antiquated paper and plastic documents, often without photographs, coupled with ubiquitous numeric identifiers. Since the beginning and especially today, all forms of documentation are easily counterfeited. This means anyone can simply copy, scan, manipulate, and print a document, obtain your digits, and become you.

This means that your identity is anything but safe and secure. It is entirely vulnerable to attack, and may already be compromised.

Your best option is to lock it down in a way that makes it difficult for an identity thief to use it undetected, and in some cases makes your identity useless to a thief. And if your identity is ever compromised, McAfee Identity Protection fraud resolution agents work with you to restore your stolen identity.

About the Author
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.

Similar Posts

  • The 6 Types of Identity Theft
    #1 New Account Fraud Using another’s personal identifying information to obtain products and services using that person’s good credit standing.  This fraud often requires use of the victim’s Social Security number. Opening new utility, cell phone and/or credit card accounts are the most prevalent forms of new account fraud. #2 Account Takeover Fraud Using another person’s account numbers,
  • Credit Card Data Breaches Cost Big Bucks
    Javelin Strategy & Research estimates that credit and debit card issuers spent $252.7 million in 2009 replacing more than 70 million cards compromised by data breaches. In 2009, an estimated 39 million debit cards and 33.3 million credit cards were reissued due to data breaches, for a total of 72.2 million. An estimated 20% of those
  • Family Identity Theft is Ugly
    Identity theft isn’t just the stuff of exciting movie and TV dramas; this happens in real life—and often. In fact, that Target breach that made headlines, Neiman Marcus, those 1. 2 Billion records the Russian cyber gang hacked: all identity theft. In 2012, according to one research firm, 12.6 million people in the U.S. alone were
  • What is Synthetic Identity Theft?
    Identity theft is first and foremost a problem because we rely on numerical identifiers that attach humans to credit and a variety of services. Once a criminal gets hold of those identifiers, he can simply be you. But when that thief takes on those numerical identifiers and attaches another name or date of birth, he
  • ID Thief Gets 5 Years for Stealing Identities of More Than 50 People
    In California, an identity thief was recently sentenced to five years in prison for committing what appears to be classic new account fraud. The thief reportedly used a victim’s identity to open a mailbox at a shipping store in Modesto, which he often used to have fraudulently issued credit cards and other financial and identity

Leave a Comment

You must be logged in to post a comment.

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in
Browse by Month

Browse by Category