What is Identity Theft?
The fraudulent use of someone's personal information — such as Social Security number, credit card details, or login credentials — to commit crimes or financial fraud.
Identity theft affects millions of people annually and can take years to fully resolve.
Types
- Financial: Opening credit cards, loans, or bank accounts in your name
- Medical: Using your insurance for healthcare services
- Tax: Filing fraudulent tax returns to claim your refund
- Criminal: Giving your identity during an arrest
- Synthetic: Combining real and fake data to create a new identity
- Child: Using a child's clean SSN (often goes undetected for years)
Warning Signs
- Unfamiliar accounts on your credit report
- Bills for services you didn't use
- IRS notices about income you didn't earn
- Debt collection calls for debts you don't owe
- Denied credit for no apparent reason
Prevention
- Freeze your credit at all three bureaus (Equifax, Experian, TransUnion)
- Use strong, unique passwords with a password manager
- Enable multi-factor authentication on all financial accounts
- Monitor your credit regularly
- Remove your info from data brokers to reduce exposure
- Use an anonymous LLC for business activities to keep your SSN off public filings
- Shred documents containing personal information
Related Terms
Credential Stuffing
An automated attack that uses stolen username/password pairs from one breach to try logging into other services, exploiting password reuse.
Data Breach
A security incident where protected, sensitive, or confidential data is accessed, stolen, or exposed by unauthorized individuals. Data breaches can result from hacking, insider threats, lost devices, or misconfigured systems.
PII (Personally Identifiable Information)
Any data that can be used to identify a specific individual, including name, address, phone number, email, Social Security number, and biometric data.
SIM Swapping
A social engineering attack where an attacker convinces a mobile carrier to transfer your phone number to their SIM card, hijacking SMS-based authentication.
Have more questions?
Use our guided flow to get the right next privacy step for Identity Theft.
Open Guided Flow