When identity theft is used in full force, the term “identity theft” does not tell the entire story. It could more accurately be called identity theft part one and identity theft part two because there can be at least two distinct theft parts.
Identity theft part one occurs when an individual’s personal information is captured in order to be used without their knowledge. Identity theft part two is the act of when that personal information is applied fraudulently - and not only can that part happen once, it can happen literally hundreds of times (within many unique systems).
The prevalence of identity theft is so high because of the vulnerability of systems to be manipulated. Certainly systems have shown the ability to detect and thwart fraudulent activity, but systems as a whole have yet to be sophisticated enough to discern all fraud as identity theft continues to be the pervasive issue that it is today. Not to mention the repetitive failure of systems to protect the information it holds.
No matter the safeguards entities believe that they have in place, identity theft has time and time again showed that it can pierce through (with skill, or not) and flourish.
Identity theft is an enticing crime as most incidents remain unsolved only leaving a multitude of unanswered questions for the victim, namely, How was my personal information accessed? Who stole my information? Where was it used? What was it used to gain?
The crime of identity theft is difficult to detect on the surface because the crime is hidden in seemingly real identities and correlating presumed appropriate activities. The outside of a system may appear pristine and run appropriately in its function. But by no means should the appearance of a functioning system and a perceived smooth running operation tell a story of accuracy. For the data a system manages and generates may not be authentic.
I know this all too well from personal experience. My personal information is commingled with the criminal who stole my identity. A simple search on the web reminds me of this reality. And, no one, except primarily the criminal and me, could quickly notice the inaccurate information that paints the wrong picture.
In the same spirit as it is suggested to be proactive and protect and manage your personal information since it is not a matter of if you are a victim of identity theft, it is when - any and all systems should be approached with the same vigor.
Photo by Joshua Coleman