Ghosting (identity theft)

Last updated

Ghosting is a form of identity theft in which someone steals the identity, and sometimes even the role within society, of a specific dead person (the "ghost") whose death is not widely known. Usually, the person who steals this identity (the "ghoster") is roughly the same age that the ghost would have been if still alive, so that any documents citing the birthdate of the ghost will not be conspicuously incorrect if appropriated by the thief now claiming to be that person.

Contents

The use of counterfeit identification falsely documenting a completely fictional identity is not ghosting, as false identification cannot be used to obtain social services or interact with government agencies or law enforcement officials. The purpose of ghosting is to enable the ghoster to appropriate an existing identity that is already listed in government records—an identity that is dormant because its original possessor is dead.

General description

Typically, identity theft is done for criminal financial gain, with the thief preying upon the credit rating of a living person who is an active member of society. The identity thief retains their own key name and place in society while making unlawful use of someone else's more advantageous financial status. The so-called "identity thief" is really more interested in exploiting someone else's financial credit rather than acquiring that person's identity. In this sense, it is the creditors, not the person's family and friends, who are the main victims.

The motives for ghosting are more complex. The ghoster is sincerely interested in acquiring another person's identity for their own ongoing use, therefore the ghoster usually takes a dormant identity in order to avoid the risks that would occur if two living people used the same Social Security number. Generally, a ghoster is unwilling to sustain their existing identity and takes a new identity to get a fresh start in life. Unlike a typical identity thief, who squeezes quick profits from one stolen identity then moves on to the next victim, a ghoster may actively seek to acquire and maintain a respectable credit rating in their new identity.

Ghosting is largely a phenomenon of the 20th century. Before the arrival of the Social Security system, a person who possessed no identity documents (no birth records, no high school diploma) could live openly without incurring suspicion. Counterfeit identification could not be easily detected. Only with the arrival of income tax and social benefits in the 1920s did it become essential for every adult to possess an identity that was registered in government archives—if not their own lawful identity, then one appropriated from a dead person. In the 21st century, advances in technology have made ghosting increasingly difficult to achieve, while governments have increased the penalties for those who get caught.

Dashiell Hammett's novel The Maltese Falcon (1930) recounts the story, apparently based on a true case, of a businessman named Flitcraft who spontaneously abandons his career and his marriage, abruptly moving to another city and inventing another identity. If this incident did indeed occur in the 1920s or earlier, Flitcraft would have encountered little difficulty in establishing a new life without formal documents such as a birth certificate and Social Security number. If this had occurred ten years later, Flitcraft would have needed a ghost identity to begin his new life. [1]

In the days before computerized databases, ghosting was easy to achieve—especially in Britain, where birth certificates and death certificates are public documents. The General Register Office in London contains indexed registers of all births, deaths, marriages and adoptions in England and Wales. The typical ghoster might consult the Deaths index (black volumes, archived by year) for the period 15 years after their own birth, seeking records of the death of a man approximately 15 years old (that is, whose birthdate would be near the birthdate of the ghoster). Finding a suitable candidate, the ghoster would then consult the Births index (red volumes, in a different section of the Records Office) for the deceased person's date of birth. Armed with this knowledge, they could then pay a small fee to obtain a copy of the deceased's birth certificate. Using this document as the foundation for the stolen identity, the ghoster would gradually acquire evidence enabling them to pass as the other person, still alive. Some of this evidence would be faked, with other evidence, such as school records, having been legitimately issued to the deceased before their death. Other archives outside of Britain, such as the genealogy records of the Church of Jesus Christ of Latter-day Saints, have unwittingly served this same purpose of enabling ghosters to find new identities.

It is easier for a female to appropriate a dead person's identity than it is for a male. For instance, a female ghoster can steal the identity of a dead female who had married and taken her husband's name. Detection is more difficult in this case because the death certificate and the birth certificate will show two different surnames. Also, gaps in the ghost identity's employment history (for the years between the ghost's death and the date when the ghoster claims that identity) will arouse less suspicion if the impostor is a female, who might conceivably have spent the transition years as a homemaker with no wages.

In the 1970s, a counterculture publishing firm in California named Eden Press published a pamphlet, The Paper Trip, giving detailed instructions for acquiring a dead person's identity. Among other pointers, the pamphlet advised readers to search newspaper archives for old articles about an entire family getting killed in an accident while on vacation outside of their home state. This scenario offers several advantages to a ghoster:

Whereas typical identity thieves will steal the credit rating of anyone, regardless of age, race or sex, a ghoster intends to live in the stolen identity and therefore usually seeks to acquire the identity of a dead person whose physical description strongly resembles the living ghoster's appearance: similar birthdate, height, sex, race or ethnic background.

Drawbacks

Ghosting is no longer as easy as it once was. This is largely due to the increasing computerization of vital records and the increasing power of search engines. Until the 1990s, each state in the United States maintained its birth records and death records in separate registries with no cross-referencing. Modern search engines enable government clerks to establish quickly if a death certificate has ever been issued to the person named on a given birth certificate.

Many ghosters have criminal records under their original identities and seek new identities in order to gain a fresh start (or to start a new criminal career without the prior arrest record). Before the days of enhanced computer imaging, it was a difficult and time-consuming process for law-enforcement officials to search fingerprints archives. If a ghoster were arrested and fingerprinted under their new identity (with no prior arrests under that name), there was a good chance that authorities would fail to discover any records of a prior arrest for the same set of fingerprints linked to a different name and birthdate. This is no longer true. Modern imaging technology now enables search engines to scan a database of millions of fingerprints quickly, finding a positive match which police can transmit electronically to other police forces anywhere in the world. New identity documents can no longer conceal prior arrests.

In the United States, it was formerly the case that citizens were not issued a Social Security number until their first paid employment. Thus, in the year 1975, a man ghoster aged 25 would acquire the birth certificate of a boy who was born circa 1950 (the same age as the ghoster) but who had died at age 15 or younger. An individual who died before adulthood would not be likely to possess a Social Security number; therefore, a ghoster claiming to be this person and applying for a first-time Social Security number at age 25 would not arouse suspicion if he could explain why he waited until age 25 to begin working for wages. But a ghoster who attempted this scheme in the year 2000 (or later) would arouse great suspicion because parents are now required to acquire a Social Security number for their offspring before the next annual income tax return is filed, and government computers can instantly retrieve any individual's entire history of employment and income-tax records. A ghoster who applies to a Social Security office for a replacement of a Social Security card issued to someone who died ten years earlier (who claims to be that individual, still living) will immediately be asked why he has not reported any wages for the past ten years and will be challenged to explain how he has supported himself for ten years without wages.[ citation needed ] There will also be a gap in the tax records, requiring the ghoster to explain why he hasn't filed tax returns for the intervening years.

Another factor that discourages ghosting is the fact that the stakes are now much higher. In prior times, a criminal with a long record of felony convictions had strong incentive to commit the minor crime of ghosting in order to acquire a new identity with no prior arrests. This is no longer true. The unlawful acquisition of false identification, whether counterfeit or falsely appropriated from a dead person, will now be prosecuted far more aggressively than it might have been in the past.[ citation needed ]

Ghosting has never been foolproof. One reason is the overconfidence of ghosters who, after acquiring a new identity, refuse to abandon the habits and associations of their previous identity. Christopher John Boyce was a spy for the USSR and an armed bank robber who was nicknamed "The Falcon" for his interest in competitive falconry. There are barely a hundred falconers in the United States, and Boyce was known personally to all of them. After escaping from federal prison and acquiring a new identity via ghosting, Boyce resumed his old habit of attending falconry competitions, now wearing a new name but still associating with falconers who had known him by his original name.[ citation needed ] Boyce was swiftly rearrested.

Types of ghosters

Most ghosters are running away from something: a criminal record, a marriage, or bad debts. Unlike more typical identity thieves, it is often the case that a ghoster is a former criminal who genuinely desires to reform and who seeks an unblemished identity (even if acquired illegally) as a necessary part of the process. Several members of the Revolutionary Youth Movement of the 1960s eventually disavowed their radical pasts and wished to erase ties to their earlier actions. In several cases, former radicals were able to evade arrest for more than 20 years because, through ghosting, they acquired new identities in which they proceeded to live entirely law-abiding lives. During the Vietnam War, many young men in the United States avoided the draft by fleeing to Canada or other nations, where they acquired ghost identities enabling them to live as natives of those countries.

During the days of racial segregation in the United States and apartheid in South Africa, light-skinned mulattos who were legally defined as Negroes had strong incentive to pass as Caucasians. Some of these individuals may have stolen the identities of deceased white persons,[ citation needed ] acquiring birth certificates that listed them as "white." (In South Africa, there was a third legal category of colored people, which would make the transition less noticeable.)

Famous examples

The American film actor Wallace Ford was a successful ghoster. Born in England under the name Samuel Jones, he was estranged from his family at an early age and placed in a school in Canada. At the age of 15, Jones became a hobo and stowed away aboard freight trains with a fellow hobo named Wallace Ford. The two boys eventually were in a train accident; Jones survived, but Ford was killed. Jones then appropriated the other man's name and some aspects of his biography, becoming a successful actor under the name Wallace Ford, eventually starring on Broadway and in Hollywood films. [2] As "Wallace Ford", Jones used the real Ford's birthdate and other statistics on all of his own tax returns and official documents, even applying for a passport as Wallace Ford for his 1937 return to England. Only shortly before his death in 1966 did the actor reveal the complete truth about his identity.

Jones (Ford) was fortunate to have an ideal candidate for his ghost identity: a dead person of his own race, sex and approximate age whose death was never officially recorded. (No one came forward to identify the real Wallace Ford's remains.) Typically, ghosters seeking a dead person's identity must choose someone whose death has been recorded in public archives, creating a risk that, after donning this new identity, the ghoster will eventually be confronted with a copy of his "own" death certificate.

In the mid-2000s, the British prison officer John Darwin staged his death in a kayaking accident, before acquiring a birth certificate of a long-deceased infant, John Jones, with which he acquired a passport. Darwin, who has learned of the technique of ghosting from spy novels such as the Day of the Jackal, searched local newspaper records in his town’s library to find a suitable identity. He choose Jones, a child born in a nearby town five months before Darwin, but who died from enteritis five weeks after his birth, based on their similar background. Darwin lived for a period under the assumed identity of Jones in Panama before being recognised after being photographed in the name of Jones along with his wife, who had joined him in the country. In 2011, following his release from prison after being convicted of fraud, Darwin apologised to Jones’ siblings for using their dead brother’s name, explaining: "I picked out of the records one that was born more or less the same time as me. It could have been anyone. I am sorry for my crime and for any hurt it has caused. There was no malice intended."

Ghosters have appeared in fiction. One example is Seymour Skinner, the grade-school principal in The Simpsons . Several years after his first appearance on this series, Skinner revealed that he was an impostor who had stolen the real Seymour Skinner's life and identity after the real Skinner was captured in Vietnam and sold to a shoe-producing company in China. Don Draper, the main character in AMC's Mad Men , is another example of a ghoster, obtaining his identity from a deceased superior officer during the Korean War. In the film The Day of the Jackal the would-be assassin assumes the identity of a deceased person to hide his movements from the authorities.

In Naruto , the character Obito used the identity of Uchiha Madara until it was revealed that the real Madara is dead by Kabuto.

In My Father Is Strange , a Korean drama, Byun Han-soo is revealed to actually be Lee Yoon Seok. The real Byun Han-soo died in an explosion in the US. His body was mistaken for his friend Lee Yoon Seok as they had switched coats- which had each other's passports in. Mr Lee didn't correct the mistake as he wanted him, his girlfriend and his soon-to-be-born son to escape the title of ex-convict that was tied to his real name.

Kimberly Maria McLean, a.k.a. Lori Erica Kennedy Ruff (October 16, 1968 – December 24, 2010), was an identity thief who remained unidentified for nearly six years after her death. She was eventually identified as a native of suburban Philadelphia who left home at age 18, in the fall of 1986, because she did not get along with her mother and stepfather. Within the next two years, she obtained the birth certificate of Becky Sue Turner, a 2-year-old girl who had died with her two sisters in a house fire in 1971. McLean used the child's birth certificate to obtain an Idaho state identification card, then moved to Texas and had her name legally changed to Lori Erica Kennedy.

Related Research Articles

<span class="mw-page-title-main">Name change</span> Legal act by a person of adopting a different name

Name change is the legal act by a person of adopting a new name different from their current name.

<span class="mw-page-title-main">Identity theft</span> Deliberate use of someone elses identity, usually as a method to gain a financial advantage

Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964. Since that time, the definition of identity theft has been legally defined throughout both the U.K. and the U.S. as the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.

A birth certificate is a vital record that documents the birth of a person. The term "birth certificate" can refer to either the original document certifying the circumstances of the birth or to a certified copy of or representation of the ensuing registration of that birth. Depending on the jurisdiction, a record of birth might or might not contain verification of the event by a healthcare professional such as a midwife or doctor.

An identity document is any document that may be used to prove a person's identity. If issued in a small, standard credit card size form, it is usually called an identity card, or passport card. Some countries issue formal identity documents, as national identification cards that may be compulsory or non-compulsory, while others may require identity verification using regional identification or informal documents. When the identity document incorporates a person's photograph, it may be called photo ID.

A necronym is the name of or a reference to a person who has died. Many cultures have taboos and traditions associated with referring to the deceased, ranging from at one extreme never again speaking the person's real name, bypassing it often by way of circumlocution, to, at the other end, mass commemoration via naming other things or people after the deceased.

<span class="mw-page-title-main">Death certificate</span> Official record of a persons death

A death certificate is either a legal document issued by a medical practitioner which states when a person died, or a document issued by a government civil registration office, that declares the date, location and cause of a person's death, as entered in an official register of deaths.

<span class="mw-page-title-main">Nipsey Russell</span> American entertainer (1918–2005)

Julius "Nipsey" Russell was an American actor, comedian, poet, and dancer best known for his appearances as a panelist on game shows from the 1960s through the 1990s, including Match Game, Password, Hollywood Squares, To Tell the Truth, and Pyramid. His appearances were often distinguished by short, humorous poems he recited during the broadcast, which led to his nickname "the poet laureate of television". He had one of the leading roles in the film version of The Wiz as the Tin Man. He was a frequent guest on the Dean Martin Celebrity Roast series and often appeared on Late Night with Conan O'Brien during the program's early years.

A national identification number, national identity number, or national insurance number or JMBG/EMBG is used by the governments of many countries as a means of tracking their citizens, permanent residents, and temporary residents for the purposes of work, taxation, government benefits, health care, and other governmentally-related functions.

The Malaysian identity card is the compulsory identity card for Malaysian citizens aged 12 and above. The current identity card, known as MyKad, was introduced by the National Registration Department of Malaysia on 5 September 2001 as one of four MSC Malaysia flagship applications and a replacement for the High Quality Identity Card, Malaysia became the first country in the world to use an identification card that incorporates both photo identification and fingerprint biometric data on an in-built computer chip embedded in a piece of plastic. The main purpose of the card as a validation tool and proof of citizenship other than the birth certificate, MyKad may also serve as a valid driver's license, an ATM card, an electronic purse, and a public key, among other applications, as part of the Malaysian Government Multipurpose Card (GMPC) initiative, if the bearer chooses to activate the functions.

Civil registration is the system by which a government records the vital events of its citizens and residents. The resulting repository or database has different names in different countries and even in different subnational jurisdictions. It can be called a civil registry, civil register, vital records, and other terms, and the office responsible for receiving the registrations can be called a bureau of vital statistics, registry of vital records and statistics, registrar, registry, register, registry office, or population registry. The primary purpose of civil registration is to create a legal document that can be used to establish and protect the rights of individuals. A secondary purpose is to create a data source for the compilation of vital statistics.

In the United States, identity documents are typically the regional state-issued driver's license or identity card, while also the Social Security card and the United States Passport Card may serve as national identification. The United States passport itself also may serve as identification. There is, however, no official "national identity card" in the United States, in the sense that there is no federal agency with nationwide jurisdiction that directly issues an identity document to all US citizens for mandatory regular use.

The Social Security Death Index (SSDI) was a database of death records created from the United States Social Security Administration's Death Master File until 2014. Since 2014, public access to the updated Death Master File has been via the Limited Access Death Master File certification program instituted under Title 15 Part 1110. Most persons who have died since 1936 who had a Social Security Number (SSN) and whose death has been reported to the Social Security Administration are listed in the SSDI. For most years since 1973, the SSDI includes 93 percent to 96 percent of deaths of individuals aged 65 or older. It was frequently updated; the version of June 22, 2011 contained 89,835,920 records.

The Death Master File (DMF) is a computer database file made available by the United States Social Security Administration since 1980. It is known commercially as the Social Security Death Index (SSDI). The file contains information about persons who had Social Security numbers and whose deaths were reported to the Social Security Administration from 1962 to the present; or persons who died before 1962, but whose Social Security accounts were still active in 1962. As of 2018, the file contained information on 111 million deaths.

Nictzin Wilstone Dyalhis was an American chemist and short story writer who specialized in the genres of science fiction and fantasy. He wrote as Nictzin Dyalhis. During his lifetime he attained a measure of celebrity as a writer for the pulp fiction magazine Weird Tales.

A posthumous birth is the birth of a child after the death of a parent. A person born in these circumstances is called a posthumous child or a posthumously born person. Most instances of posthumous birth involve the birth of a child after the death of its father, but the term is also applied to infants delivered shortly after the death of the mother, usually by caesarean section.

The Lebanese identity card is a compulsory Identity document issued to citizens of the Republic of Lebanon by the police on behalf of the Lebanese Ministry of Interior or in Lebanese embassies/consulates (abroad) free of charge. It is proof of identity, citizenship and residence of the Lebanese citizens.

<span class="mw-page-title-main">Lori Erica Ruff</span> American identity thief (1968–2010)

Lori Erica Kennedy Ruff, was an American identity thief, who committed suicide in the driveway of her former in-laws' home in Longview, Texas on December 24, 2010. Following Ruff's death, her ex-husband and in-laws discovered through documents found in a lock box in her closet that she been living under a false name when she married into the family. Coupled with her secretive behavior, which had contributed to the collapse of her marriage, Ruff's true identity remained unknown for nearly six years after her death.

Australia does not have a national identity card. Although Australia Post, which is government owned, does have a nationwide identity card called a Keypass but it is not accepted everywhere and you may need alternate forms of ID. Various Identity documents of Australia may be used or required to prove a person's identity instead of a national identity card, whether for government or commercial purposes such as:

<span class="mw-page-title-main">Documento Nacional de Identidad (Peru)</span> National identity card of Peru

The Documento Nacional de Identidad (DNI) (Spanish for 'National Identity Document') is the only personal identity card recognized by the Peruvian Government for all civil, commercial, administrative, judicial acts and, in general, for all those cases in which, by legal mandate, it must be presented. It is a public document, personal, and non-transferable and also constitutes the only title of right to the suffrage of the person in whose favor it has been granted. Its issuance is in charge of the National Registry of Identification and Civil Status (RENIEC).

References

  1. Pepper, Andrew (2020). "Dashiell Hammett's The Maltese Falcon as World Literature: Global Circuits of Translation, Money, and Exchange". MFS Modern Fiction Studies. 66 (4): 702–723. doi: 10.1353/mfs.2020.0048 . ISSN   1080-658X. S2CID   201451269.
  2. Feramisc, Thomas M.; Peggy Moran Koster (2003). The Mummy Unwrapped: Scenes Left on Universal's Cutting Room Floor. McFarland. pp. 138–139. ISBN   0-7864-1368-9.