{"id":17880,"date":"2020-03-17T20:28:10","date_gmt":"2020-03-18T04:28:10","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/03\/17\/news-11613\/"},"modified":"2020-03-17T20:28:10","modified_gmt":"2020-03-18T04:28:10","slug":"news-11613","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/03\/17\/news-11613\/","title":{"rendered":"Child identity theft, part 1: On familiar fraud"},"content":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Tue, 03 Mar 2020 20:17:19 +0000<\/strong><\/p>\n<p>In 2013, 30-year-old Axton Betz-Hamilton received an angry phone call from her father two weeks after her mother, Pam, died.<\/p>\n<p>&#8220;What the hell were you thinking?&#8221; <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.elle.com\/culture\/books\/a29477523\/axton-betz-hamilton-identity-theft-less-people-know-about-us-book\/\" target=\"_blank\">he screamed<\/a>. He had just unearthed a credit card statement in her name that had run over its limit from a box of her mother\u2019s paperwork.  <\/p>\n<p>Betz-Hamilton reasoned that the statement must be from one of the credit cards taken out by her identity thief, who had been using her Social Security number (SSN) since she was only 11. She wondered what the statement was doing in her mother\u2019s possession.<\/p>\n<p>&#8220;I don&#8217;t know,&#8221; her father had said, &#8220;but it&#8217;s here in this file folder, along with your birth certificate.&#8221; At that moment, Betz-Hamilton knew she had found the elusive identity thief who destroyed her life and put her father and long-dead grandfather into severe debt. Her own mom.<\/p>\n<hr class=\"wp-block-separator is-style-dots\" \/>\n<p>Identity theft is a genuine problem that strikes fear in most adults. For parents or guardians of children under the age of 18, however, the thought may not come to mind. However, child identity theft does happen, and this type of fraud is, frighteningly, becoming more common.<\/p>\n<p>Child identity theft, also known as child identity fraud, usually occurs when someone takes a minor\u2019s <a rel=\"noreferrer noopener\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/what-is-personal-information-in-legal-terms-it-depends\/\" target=\"_blank\">personally identifiable information (PII)<\/a> and other data. At the top of the list is the Social Security Number (SSN), which parents usually receive as soon as their child is born. Other data that can be swiped are children&#8217;s names, physical addresses, dates of birth, and social media credentials.<\/p>\n<p>A study by Javelin Strategy &amp; Research revealed that, overall, more than 1 million US children had their identities stolen in 2017.<\/p>\n<p>Having a child\u2019s identity stolen is not that different from stealing an adult\u2019s identity. In most cases, minors&#8217; data is leaked through <a href=\"https:\/\/www.nytimes.com\/2015\/04\/18\/your-money\/a-childs-vulnerability-to-identity-theft.html\">data breaches<\/a>. Sometimes, parents inadvertently give away their child\u2019s data, not knowing that they can choose to mostly withhold it. <\/p>\n<p>Take, for example, a mother who fills out forms at the doctor\u2019s office. Although many healthcare providers ask for an SSN, <a href=\"https:\/\/www.allstate.com\/blog\/child-social-security-number\/\">it is not always required<\/a>. Instead, the <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/0040-child-identity-theft\">Federal Trade Commission (FTC) advises<\/a> parents and guardians to provide an alternative form of identification. Or they can also only give out the last four digits of the child\u2019s SSN.<\/p>\n<p>Child identity fraud has also been linked with cyberbullying. The <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.javelinstrategy.com\/coverage-area\/2018-child-identity-fraud-study\" target=\"_blank\">2018 Child Identity Fraud Study<\/a> found that both bullying and fraud arise from the same vulnerabilities in a child: the tendency to overshare personal information online. <\/p>\n<p>\u201cChildren who are unprepared to protect themselves from online risks are likely to encounter individuals who wish to target them emotionally or financially,\u201d said Al Pascual, Senior Vice President, Research and Head of Fraud &amp; Security at Javelin Strategy &amp; Research. \u201cBullied children may be more vulnerable to fraud as they are taken advantage of when they seek friendship online.\u201d<\/p>\n<p>Minors who are cyberbullied are <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.javelinstrategy.com\/node\/59561\" target=\"_blank\">at least nine times more likely<\/a> to be victimized by fraudsters compared to those who aren\u2019t bullied. But another emerging trend in child identity theft establishes an even more worrying trend: What happens when the very people children <em>should <\/em>trust with their information are the ones abusing it?<\/p>\n<h3>What is familiar fraud?<\/h3>\n<p>While we usually connote adult identity theft with anonymous scammers, child identity theft may not always be conducted by the faceless, hooded hacker we see in stock photos and crime dramas. <\/p>\n<p>Javelin Strategy &amp; Research&#8217;s 2018 study found that 60 percent of child identity fraud victims <a href=\"https:\/\/www.javelinstrategy.com\/node\/59561\">personally know their thief<\/a>. Known scammers range from the child\u2019s parent, relative, or family friend to a hired caretaker or teacher. This is called familiar fraud.<\/p>\n<p>Familiar fraud is a type of fraud wherein family members are found out as perpetrators of identity theft within the family. It\u2019s a <a href=\"https:\/\/www.cnbc.com\/2015\/07\/21\/identity-theft-victims-may-know-the-culprit.html\">husband stealing his wife\u2019s identity<\/a>, aunties stealing their niece\u2019s identity, one sibling after another\u2019s, or\u2014in Betz-Hamilton\u2019s case\u2014a parent stealing their child\u2019s, partner\u2019s, and father\u2019s identities. <\/p>\n<p>Sometimes, fraud is also considered \u201cfamiliar\u201d in nature if it is <a href=\"https:\/\/www.cnbc.com\/2015\/07\/21\/identity-theft-victims-may-know-the-culprit.html\">perpetrated by someone who is close to the family<\/a> but not blood relatives. This could be friends, neighbors, or even coworkers.<\/p>\n<p>Unlike other fraud, familiar fraud isn\u2019t always conducted with an intent to harm. Sometimes, parents steal and use their child\u2019s identity to subscribe to services, giving the reason that the child benefits from these services as well. However, according to Robert P. Chappell Jr., law enforcement veteran and author of the book <em>Child Identity Theft: What Every Parent Needs to Know<\/em>, this <a rel=\"noreferrer noopener\" aria-label=\"justification is a stretch (opens in a new tab)\" href=\"https:\/\/www.amazon.com\/Child-Identity-Theft-Every-Parent\/dp\/1442218622\" target=\"_blank\">justification is a stretch<\/a>.<\/p>\n<hr class=\"wp-block-separator is-style-wide\" \/>\n<p class=\"has-text-align-center\"><em>Recommended reading: <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.malwarebytes.com\/identity-theft\/\" target=\"_blank\">What is identity fraud?<\/a><\/em><\/p>\n<hr class=\"wp-block-separator is-style-wide\" \/>\n<p>There are several motivations behind identity thieves within the family. A parent or relative might be acting out of desperation, such as wanting to receive healthcare benefits but being unable to apply because they struggle with bad credit. At times, it is suggested, such relatives couldn\u2019t help it due to <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.cambridge.org\/core\/journals\/advances-in-psychiatric-treatment\/article\/psychiatric-and-psychological-aspects-of-fraud-offending\/1B192F7E3AE4BAA1ED9BF1BFEA8F7063\" target=\"_blank\">psychiatric and psychological issues<\/a>. Let us also not discount plain old greed. <\/p>\n<p>Familiar fraudsters often keep the fraud going for as long as they can. Since they usually know their victim enough to pose as them and have ready access to mail with sensitive information\u2014thus making familiar fraud another form of <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Crime_of_opportunity\" target=\"_blank\">crime of opportunity<\/a>\u2014they can easily access accounts and even open new ones under their victim\u2019s name.<\/p>\n<p>When familiar fraud is brought to light, victims are forced to make a difficult decision: file a report against a family member or stay in debt. Sadly, victims tend to go for the latter. They are reluctant to file a report against their familial identity thief or cooperate with fraud investigations as they don\u2019t want to get them in trouble despite of the trouble this has caused <em>them<\/em>. They also do this to avoid family backlash, drama, and to preserve family relationships.<\/p>\n<p>If victims <em>do<\/em> take action on the familiar fraud, <a href=\"https:\/\/www.cnbc.com\/2015\/07\/21\/identity-theft-victims-may-know-the-culprit.html\">they don\u2019t often get support from other family members<\/a> as they find it unfathomable for a relative to be perpetrators of fraud against another relative.<\/p>\n<p>If familiar fraud victims are willing to give their relative thief a pass, they are only putting themselves at a disadvantage. This is because it limits them from the available options, they can take to address the problem, which is their sullied identities due to poor credit. No police report or fraud investigation could also mean that lenders would be less inclined to consider their debt as fraudulent.<\/p>\n<h3>What are the repercussions of child identity theft within the family?<\/h3>\n<p>Effects of fraud, in general, could be immediate and long-lasting. But familiar fraud drags a lot more with it. It can go beyond merely going out of pocket fighting the problem (although this is a significant one). Familiar fraud deeply affects victims mentally, emotionally, and sometimes physically.<\/p>\n<p>Apart from a wrecked credit, child victims of identity theft may find it difficult to believe that someone they fully trust, such as a parent, could harm them this way by letting them pay for their bad debts. This leads to emotional and psychological trauma. They may feel violated, betrayed, and guilty. In a study, Experian found that adults who had been child fraud victims <a href=\"https:\/\/www.experian.com\/blogs\/ask-experian\/the-emotional-toll-of-child-identity-theft\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">reported<\/a> feeling stressed, angered, and concerned. The experience also affected their <a href=\"https:\/\/www.lifelock.com\/learn-identity-theft-resources-lasting-effects-of-identity-theft.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">feelings of self-worth<\/a>, thus tending to feel <a href=\"https:\/\/www.experian.com\/blogs\/ask-experian\/the-emotional-toll-of-child-identity-theft\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">suicidal<\/a>.<\/p>\n<p>Not only that: the physical well-being of identity fraud victims may manifest signs of struggle from the ordeal. In a <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.idtheftcenter.org\/images\/page-docs\/Aftermath_2017.pdf\" target=\"_blank\">2017 <em>Identity Theft: The Aftermath<\/em> report<\/a> [PDF], the Identity Theft Resource Center (ITRC) reported that stress (64.3 percent) topped the list. This is followed by loss of concentration or focus (37.1 percent); fatigue (35 percent); aches, pains, stomach issues, heart palpitations, and sweating (23.1 percent); sleep disturbances (48.3 percent); and an inability to work due to these physical symptoms (28.7 percent). This is why a number of victims usually <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.experian.com\/blogs\/ask-experian\/the-emotional-toll-of-child-identity-theft\/\" target=\"_blank\">seek the help of professionals<\/a> to deal with their trauma.<\/p>\n<hr class=\"wp-block-separator is-style-dots\" \/>\n<p>In part 2 of this blog series, we\u2019ll be touching on signs that your child\u2019s identity may have been compromised, the digital footprints parents leave behind for their kids and the correlation to fraud, and how parents can reclaim their child\u2019s identity.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/awareness\/2020\/03\/child-identity-theft-part-1-on-familiar-fraud\/\">Child identity theft, part 1: On familiar fraud<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/awareness\/2020\/03\/child-identity-theft-part-1-on-familiar-fraud\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Tue, 03 Mar 2020 20:17:19 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/awareness\/2020\/03\/child-identity-theft-part-1-on-familiar-fraud\/' title='Child identity theft, part 1: On familiar fraud'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/shutterstock_674605543.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>In this two-part series on child identity theft, we shed light on the growing problem of familiar fraud, where those entrusted with a minor&#8217;s information are the very ones who abuse it.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/awareness\/\" rel=\"category tag\">Awareness<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/child-identity-fraud\/\" rel=\"tag\">child identity fraud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/child-identity-theft\/\" rel=\"tag\">child identity theft<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cyberbullying\/\" rel=\"tag\">cyberbullying<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/familiar-fraud\/\" rel=\"tag\">familiar fraud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fraud\/\" rel=\"tag\">fraud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/id-theft\/\" rel=\"tag\">ID theft<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/identity-theft\/\" rel=\"tag\">identity theft<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/personally-identifiable-information\/\" rel=\"tag\">personally identifiable information<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pii\/\" rel=\"tag\">PII<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/awareness\/2020\/03\/child-identity-theft-part-1-on-familiar-fraud\/' title='Child identity theft, part 1: On familiar fraud'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/awareness\/2020\/03\/child-identity-theft-part-1-on-familiar-fraud\/\">Child identity theft, part 1: On familiar fraud<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[15496,24385,24386,6503,24387,9751,24388,3921,19130,19131],"class_list":["post-17880","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-awareness","tag-child-identity-fraud","tag-child-identity-theft","tag-cyberbullying","tag-familiar-fraud","tag-fraud","tag-id-theft","tag-identity-theft","tag-personally-identifiable-information","tag-pii"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17880"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17880\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17880"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}