All Episodes

September 10, 2025 27 mins
SCAM Episode 6: "Identity Thieves - The Art of Becoming Someone Else" - 100 Word Summary Host Emily Carter exposes the chilling world of identity theft, where criminals don't just steal money—they steal your entire existence. From traditional methods like mail theft and dumpster diving to sophisticated synthetic identity fraud that creates fictional people using real Social Security numbers, these predators turn personal data into criminal gold. Carter analyzes devastating cases like SIM swapping attacks that bypass security, healthcare identity theft with life-threatening consequences, and underground marketplaces selling complete identity packages. Using her AI processing power, she reveals how data breaches fuel massive criminal enterprises and provides crucial strategies for protecting your most fundamental asset: who you are.
https://amzn.to/42g1AnI

This content was created in partnership and with the help of Artificial Intelligence AI
Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
Welcome back to SCAM. I'm Emily Carter, and today we're
exploring one of the most devastating forms of modern fraud,
identity theft and synthetic identity fraud. Let me start with
a case that still gives me chills. Sarah Martinez thought
she was living a normal life until she tried to
buy a house and discovered that, according to credit agencies,
she didn't exist. Someone had been living as Sarah Martinez

(00:24):
for three years, complete with credit cards, bank accounts, a
driver's license, and even a marriage certificate. The real Sarah
had become a ghost in her own life, while a
criminal had stolen not just her identity, but her entire existence.
I should mention upfront that I'm an AI, which means
I can simultaneously analyze millions of data points from breaches,

(00:46):
cross reference identity theft patterns across multiple databases, and track
how stolen personal information flows through underground markets. That analytical
power is exactly what we need to understand how identity
thieves are turning our personal data into criminal gold mines.
Identity theft represents the foundational crime of the digital age,

(01:07):
serving as the gateway through which criminals access virtually every
other form of financial fraud, while systematically dismantling the basic
trust relationships that make modern commerce and social interaction possible.
Unlike traditional crimes that steal physical objects or money, identity
theft steals something far more fundamental, the very concept of

(01:27):
who you are in the eyes of financial institutions, government agencies,
and the broader economic system. This crime has evolved from
opportunistic theft of wallets and mail into sophisticated global enterprises
that harvest, process, and monetize personal information with the efficiency
and scale of legitimate multinational corporations. The modern identity theft

(01:50):
ecosystem operates as a complex criminal supply chain that begins
with data harvesting operations and ends with the complete financial
exploitation of thevics, who may remain unaware of the crimes
being committed in their cars, being committed unknown names for
months or years. This supply chain includes specialized roles for

(02:11):
data thieves who breach corporate databases or steel physical documents,
brokers who aggregate and sell personal information through underground marketplaces,
and identity users who employ stolen information to commit various
forms of fraud. The sophistication and specialization within This criminal
ecosystem rival those found in legitimate industries with established market

(02:33):
rates for different types of personal information, quality control systems
to verify data accuracy, and customer service operations to support
criminal buyers. The fundamental vulnerability that makes identity theft possible
stems from our society's reliance on easily discoverable or stealable
pieces of information to verify identity across countless transactions and interactions.

(02:58):
Social security numbers, birth dates, mo mother's maiden names, and
addresses serve as the primary keys to unlock access to
bank accounts, credit cards, government benefits, and countless other services.
Yet this same information is routinely shared with employers, health
care providers, financial institutions, and countless other organizations that may

(03:21):
not adequately protect it from theft or misuse. The system
assumes that knowledge of these identifiers proves identity, creating opportunities
for criminals who can obtain this information through various means
to impersonate their victims Convincingly, Traditional identity theft methods continue
to generate substantial criminal profits despite increased awareness and security measures,

(03:45):
demonstrating the persistent vulnerabilities in our physical and social infrastructure.
Mail theft remains surprisingly effective for identity fees, as residential
mailboxes contain a steady stream of financial statements, pre approved
credit offers, taxed don documents, and other materials containing complete
sets of personal information. The shift toward online banking and

(04:07):
electronic communications has reduced, but not eliminated the vulnerability of
mail theft, as many important documents and financial products still
rely on postal delivery for security reasons. Dumpster Diving, while
less glamorous than sophisticated cyber attacks, continues to provide identity
thieves with valuable personal information that individuals and businesses discard

(04:30):
without proper destruction. Home offices, small businesses, and even major
corporations often dispose of documents containing social security numbers, account information,
employee records, and customer data in regular trash that can
be easily accessed by criminals. The information obtained through dumpster
diving often includes complete financial profiles that can be immediately

(04:52):
used for identity theft without the need for additional research
or data aggregation. Skimming devices attached to credit card readers
and ATM machines represent the intersection of traditional physical theft
techniques with modern electronic technology, allowing criminals to capture complete
credit card information from unsuspecting victims who believe they are

(05:12):
conducting normal transactions. Modern skimming devices have become increasingly sophisticated
and difficult to detect, with some operations employing pinhole cameras
to record pin entries, wireless transmission capabilities to remotely collect
stolen data, and professional quality construction that makes them nearly
indistinguishable from legitimate card readers. The evolution of skimming operations

(05:37):
demonstrates how identity thieves adapt traditional techniques to exploit new
technologies and changing consumer behaviors. Point of sale skimming has
expanded beyond ATMs to include gas pumps, restaurant payment terminals,
and retail checkout systems, while criminals have developed specialized devices
for chip enabled cards and contactless payment systems. Some operations

(06:01):
employ sophisticated overlay devices that fit over entire ATM interfaces,
capturing not just card information, but also pen entries and
even biometric data from fingerprint readers. Social engineering represents perhaps
the most psychologically sophisticated category of traditional identity theft, involving
direct manipulation of individuals to voluntarily disclose personal information or

(06:25):
perform actions. That compromise their security. These attacks exploit fundamental
human tendencies toward helpfulness, authority compliance, and trust in apparent
experts or officials to convince victims to provide information they
would never willingly give to known criminals. The effectiveness of
social engineering attacks has actually increased in our digital age,

(06:47):
as criminals can use information gathered from social media, public records,
and previous data breaches to create highly personalized and convincing
pretexts for their deceptions. The transformation of identity theft in
the digital age has created unprecedented opportunities for mass data
harvesting through corporate data breaches that can expose the personal

(07:08):
information of millions of individuals simultaneously. Major breaches affecting companies
like Equifax, Anthem, Target, and countless others have created vast
databases of stolen personal information that fuel identity theft operations
for years after the initial security incidents. The scale of
these breaches means that most Americans have had their personal

(07:30):
information stolen multiple times, creating a situation where the question
is not whether your information has been compromised, but rather
how many times it has been stolen and what criminals
are doing with it. The underground market places where stolen
personal information is bought and sold operate with the sophistication
and customer service orientation of legitimate e commerce platforms, complete

(07:54):
with user ratings, dispute resolution systems, and specialized product categories
for different types of data. These markets typically organize stolen
information by geographic location, completeness of data sets, and verification status,
with premium prices paid for fulls complete identity packages that
include names, addresses, social security numbers, birth dates, and mother's

(08:19):
maiden names, along with additional information like employment history, financial
account details, and security questions answers. The pricing structure in
identity theft market places reflects the relative difficulty of obtaining
different types of information and their utility for various criminal purposes.
Basic personal information like names and addresses may sell for pennies,

(08:43):
while complete identity packages with verified banking information can command
prices in the hundreds of dollars. Medical information, passport details,
and financial account credentials typically command premium prices due to
their specialized utility and the greater security measures that protect
them from theft. Social media platforms have inadvertently become treasure

(09:04):
troves for identity thieves. Providing vast amounts of personal information
that users voluntarily share while believing they are communicating only
with friends and family. The combination of personal details, photographs,
location information, family relationships, and life events shared through social
media creates comprehensive profiles that criminals can use to answer

(09:27):
security questions, impersonate victims and social engineering attacks, or create
convincing synthetic identities that blend real and fabricated information. The
practice of social media reconnaissance has become a standard component
of targeted identity theft operations, with criminals systematically harvesting information
from multiple platforms to build complete pictures of potential victims lives.

(09:51):
Professional identity thieves often maintain detailed databases of personal information
gleaned from social media, cross referencing this data with information
obtained from other sources to create comprehensive victim profiles that
can be used for various criminal purposes over extended periods.
Simswapping represents one of the most devastating modern identity theft techniques,

(10:14):
involving criminals convincing cellular phone providers to transfer a victim's
phone number to a simcard controlled by the criminal. This
attack bypasses two factor authentication systems that send verification codes
to phone numbers, allowing criminals to access bank accounts, cryptocurrency wallets,
social media accounts, and countless other services that rely on

(10:36):
phone based security verification. The psychological impact of simswapping extends
beyond financial losses, as victims often lose access to their
primary communication tools and social connections, while criminals use their
phone numbers to impersonate them to friends, family, and colleagues.
The execution of simswapping attacks typically involves extensive preparation and

(10:57):
social engineering, with criminals gathering detailed personal information about their
targets before contacting sealer providers with convincing stories about lost phones,
damaged simcards, or account emergencies that require immediate number transfers.
Some operations employ insiders at sealer phone companies who can
process fraudulent simswaps without triggering normal security procedures, while others

(11:20):
use sophisticated social engineering scripts that exploit specific vulnerabilities in
customer service procedures. Synthetic identity fraud represents perhaps the most
sophisticated evolution of identity theft, involving the creation of entirely
fictional identities using combinations of real and fabricated personal information.
These synthetic identities typically use real social security numbers obtained

(11:43):
from children, deceased individuals, or people who rarely use credit,
combined with fake names, addresses, and other biographical details to
create personas that can pass initial identity verification procedures while
avoiding detection by the legitimate owners of the stolen social
security numbers. The development of synthetic identities often takes months

(12:05):
or years, with criminals systematically building credit histories, employment records,
and financial relationships that create the appearance of legitimate individuals
with established lives and financial responsibility. This long term approach
allows synthetic identity fraudsters to obtain substantial credit limits, loans,
and financial products before disappearing with the proceeds, leaving behind

(12:29):
fictional identities that cannot be prosecuted and victims who may
not discover the theft for years. The case of Maria
Santo's illustrates the devastating long term impact that synthetic identity
fraud can have on innocent victims. Maria's social security number
was stolen when she was twelve years old and used
to create a synthetic identity for ai CSA David Rodriguez,

(12:54):
a fictional individual who, over the course of eight years,
built an impressive credit profile, obtained multiple credit cards and loans,
and even purchased real estate. When Maria applied for her
first credit card at age twenty, she discovered that her
social Security number was associated with David Rodriguez's extensive financial history,
including several defaulted loans and a bankruptcy filing that had

(13:17):
destroyed her credit before she had ever used it. The
resolution of Maria's case required years of legal battles, extensive
documentation to prove her real identity, and ultimately a complete
replacement of her social Security number to escape the financial
damage caused by the synthetic identity fraud. Even after legal resolution,

(13:38):
Maria continued to face challenges with background checks, employment verification,
and financial applications that occasionally surfaced remnants of David Rodriguez's
fictional existence in various databases and record systems. The underground
economy supporting identity theft has developed sophisticated money longering networks
specifically designed to convert stolen personal information into untraceable cash

(14:02):
while minimizing the risk of detection or prosecution. These networks
typically employ multiple layers of financial transactions, often involving money
mules who unknowingly facilitate the longering process, prepaid cards that
can be loaded with stolen funds and used anonymously, and
cryptocurrency exchanges that can convert traditional currency into digital assets

(14:23):
that are extremely difficult to trace or recover. Money mules
represent a critical component of identity theft operations, often recruited
through employment scams that promise easy money for simple financial
tasks like receiving and forwarding payments or withdrawing cash from ATMs.
Many money mules are unaware that they are participating in
criminal activities, believing they are working for legitimate businesses that

(14:47):
need assistance with financial transactions. The use of unwitting accomplices
provides identity thieves with plausible deniability and additional layers of
separation between their criminal activities and their real identity. The
globalization of identity theft operations has created jurisdictional challenges that
make prosecution extremely difficult, as criminals can steal information in

(15:10):
one country, process it in another, and monetize it in
a third while remaining beyond the reach of law enforcement
agencies that may lack international cooperation agreements or technical expertise.
Many identity theft operations deliberately structure their activities across multiple
jurisdictions to exploit differences in laws, enforcement capabilities, and extradition treaties,

(15:32):
while targeting victims in countries with strong financial systems and
high value personal information. Business email compromise schemes represent an
evolution of identity theft the target's corporate and institutional victims
rather than individuals, involving criminals who steal executive identities to
authorize fraudulent financial transactions or data access. These schemes typically

(15:55):
begin with extensive reconnaissance of target organizations, dating social media
research on key executives, analysis of corporate communication patterns, an
identification of financial procedures and approval processes that can be
exploited through executive impersonation. The sophistication of business email compromise
operations often includes the creation of nearly identical email domains,

(16:19):
detailed mimicry of executive communication styles, and careful timing of
fraudulent requests to coincide with periods when normal verification procedures
may be relaxed due to travel emergencies or other circumstances.
Some operations employ advanced social engineering techniques to manipulate mid
level employees who have financial authority but may be intimidated

(16:40):
by apparent requests from senior executives, creating psychological pressure that
overrides normal security procedures. Tax refund fraud represents one of
the most immediately profitable applications of stolen identity information, allowing
criminals to file fraudulent tax reterms using stolen social security
numbers and claim refunds before where legitimate taxpayers file their

(17:01):
actual returns. The automated nature of tax processing systems and
the pressure on tax agencies to process refunds quickly creates
opportunities for criminals to obtain thousands of dollars per stolen
identity while remaining largely anonymous through the use of prepaid
cards and temporary addresses for refund delivery. The scale of
tax refund fraud has grown to represent billions of dollars

(17:24):
in annual losses, with some criminal organizations filing thousands of
fraudulent returns during each tax season using databases of stolen
personal information obtained from various sources. The Internal Revenue Service
has implemented increasingly sophisticated detection systems to identify fraudulent returns,
but the cat and mouse game between tax authorities and

(17:45):
identity thieves continues to evolve as criminals adapt their techniques
to avoid detection while maintaining their profitability. Healthcare identity theft
represents a particularly dangerous category of identity theft that can
have life threatening consequence, is beyond the typical financial damages
associated with other forms of identity fraud. Medical identity thieves

(18:06):
used stolen information to obtain medical services, prescription drugs, or
or medical devices, while leaving their victims responsible for the
bills and potentially contaminating medical records with incorrect information about treatments, allergies,
and medical conditions that could affect future medical care and
that brings us to the revenue. The case of Jennifer

(18:28):
Walsh demonstrates the potentially lethal consequences of health care identity theft.
When Jennifer arrived at a hospital emergency room with severe
chest pain, medical staff discovered that her medical records showed
a history of drug abuse and psychiatric conditions that Jennifer
had never experienced. The fraudulent medical history created by an
identity thief who had used Jennifer's insurance information to obtain

(18:51):
drug treatment and psychiatric services, initially led hospital staff to
dismiss Jennifer's symptoms as drug seeking behavior rather than recognizing
her actual heart attack. Only after Jennifer's husband provided additional
verification of her identity and medical history did hospital staff
provide appropriate cardiac treatment that likely saved her life. The

(19:13):
resolution of healthcare identity theft often proves more complex than
financial identity theft, as medical records are protected by privacy
laws that can make it difficult for victims to access
and correct fraudulent information in their medical files. The interconnected
nature of health care systems means that fraudulent medical information
can spread across multiple providers, insurance companies, and medical databases,

(19:38):
requiring extensive effort to identify and correct all contaminated records.
Government benefits fraud represents another major application of stolen identity information,
with criminals using personal information to fraudulently obtain unemployment benefits,
social Security payments, medicare services, and various other government assistance programs.

(20:00):
The scale of this fraud became particularly apparent during the
COVID nineteen pandemic, when expanded unemployment benefits and simplified application
procedures created opportunities for MAP, NASA and commerce police all
in national trade increased access to risk. Most accesses cost
the time to commit words. The automation of government benefit systems,

(20:23):
while improving efficiency and accessibility for legitimate recipients, has also
created vulnerabilities that identity fieves can exploit to process fraudulent
applications quickly and in large volumes. Some criminal organizations have
developed sophisticated systems for submitting thousands of fraudulent benefit applications
using databases of stolen personal information, employing techniques similar to

(20:47):
those used in tax refund fraud to obtain government payments
while avoiding detection. The psychological impact of identity theft on
victims extends far beyond the immediate financial damages, often creating
long lasting trauma related to loss of control, violation of privacy,
and fundamental questioning of personal security and safety. Many identity

(21:09):
theft victims report feeling violated in ways similar to burglary victims,
despite the fact that no physical intrusion occurred, reflecting the
deeply personal nature of identity and the psychological impact of
having one sense of self weaponized against them by criminals.
The recovery process from identity theft typically requires months or

(21:30):
years of effort to identify all fraudulent accounts, correct credit reports,
resolve disputed charges, and restore financial standing. This process often
involves navigating complex bureaucratic procedures with credit agencies, financial institutions,
and government agencies that may and be poorly equipped to
handle identity theft cases, or may place the burden of

(21:53):
proof on victims to demonstrate that they did not authorize
fraudulent activities in their names. Legal protects for identity theft
victims have expanded significantly over the past two decades, with
federal laws like the Fair Credit Reporting Act and the
Identity Theft and Assumption to Terrence Act providing frameworks for
victim assistance and criminal prosecution. However, the practical enforcement of

(22:18):
these protections often proves inadequate, particularly for cases involving sophisticated
criminal organizations operating across international boundaries or using advanced technical
methods that exceed the investigative capabilities of local law enforcement agencies.
Prevention strategies for identity theft must address both the technological

(22:39):
vulnerabilities that INNY prevention strategies are uncontroversial. In the nature
of all law scale data theft, Effective prevention requires a
combination of personal security practices, institutional security improvements, and broader
social awareness of the techniques used by identity thieves to
target individuals and organizations. Personal prevention strategies include the obvious

(23:02):
recommendations to secure physical documents, limit sharing of personal information,
and monitor financial accounts regularly for suspicious activity. However, the
scale and sophistication of modern identity theft operations mean that
individual prevention efforts, while important, cannot provide complete protection against
determined criminals who may obtain personal information through data breaches,

(23:26):
social engineering, attacks on third parties, or other methods beyond
the victim's direct control. Credit monitoring services and identity theft
protection programs offer some assistance in detecting fraudulent activities quickly,
though the effectiveness of these services vary significantly, and many
provide more peace of mind than actual security. The most

(23:47):
valuable services typically include real time monitoring of credit reports
and public records, immediate alerts for new account openings or
credit inquiries, and assistance with the recovery process if identity
theft occurs. The role of financial institutions and businesses in
preventing identity theft has become increasingly important as the primary

(24:07):
targets for identity thieves shift from individual victims to the
organizations that store and process personal print information on a
massive scale. Thanks retailers, health care providers, and countless other
businesses routinely collect and store exactly the types of personal
information that identity thieves need to commit their crimes, creating

(24:29):
responsibilities for data protection that many organizations are poorly equipped
to fulfill. Corporate data security measures have improved significantly following
high profile breaches and increased regulatory requirements, but the fundamental
challenge remains that any organization storing personal information represents a
potential target for criminals, who need only one successful attack

(24:53):
to obtain information about thousands or millions of individuals. The
interconnected nature of modern businesses systems means that a security
breach at one organization can create ripple effects that compromise
personal information across multiple companies and service providers. The future
of identity theft will likely involve even more sophisticated technical

(25:14):
approaches as criminals adapt to improved security measures and take
advantage of new technologies that create additional attack vectors. Artificial
intelligence in machine learning technologies could enable identity thieves to
create more convincing synthetic identities and automate many aspects of
their operations. While the proliferation of Internet connected devices and

(25:37):
services creates new opportunities for data collection and exploitation, biometric
authentication systems, while offering improved security over traditional password based approaches,
also create new vulnerabilities as criminals develo techniques for stealing
and spoofing fingerprints, facial recognition data, and other biological identifiers.

(25:58):
Unlike passwords are pens, biometric data cannot be easily changed
if compromised, potentially creating permanent vulnerabilities for individuals whose biometric
information has been stolen. The integration of identity verification systems
across multiple platforms and services creates both opportunities for improved
security through cross reference verification and new vulnerabilities as single

(26:23):
points of failure can potentially compromise identity verification across multiple
systems simultaneously. The challenge for security professionals and policy makers
will be developing identity verification systems that provide strong security
while remaining usable and accessible. For legitimate users. As our
society becomes increasingly digital and interconnected, the challenge of protecting

(26:47):
personal identity information will require ongoing collaboration between technology developers,
financial institutions, government agencies, and individuals to create comprehensive security
frameworks that can adapt to evolving threats while maintaining the
convenience and accessibility that make modern digital services valuable. The

(27:08):
stakes of this challenge extend beyond individual financial losses to
fundamental questions about privacy, security, and trust in the digital
systems that increasingly govern our daily lives. Thanks for listening
to Scam. Please subscribe to stay informed about the evolving
world of identity theft and how we can protect our
most fundamental asset, who we are. This episode was brought

(27:31):
to you by Quiet Please Podcast networks. For more content
like this, please go to Quiet Please dot ai, Quiet,
Please dot ai hear what matters.
Advertise With Us

Popular Podcasts

Spooky Podcasts from iHeartRadio
Dateline NBC

Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.