logo
The Long Tail Of Identity Theft: What I Learned After Being Doxxed

The Long Tail Of Identity Theft: What I Learned After Being Doxxed

Forbes16-07-2025
Fraud case news headline in newspaper
I study fraud and cybercrime for a living. Then I became a case study.
I've spent years as part of the fraud-fighting community, publishing academic research, sharing insights almost daily on LinkedIn, and speaking at conferences around the country. While much of my work to educate and raise awareness has been embraced, not everyone is a fan. In 2022, after I publicly reported on the alarming rise of check fraud in the U.S. and spoke with several major media outlets, I became a target.
The first text message arrived around 7 a.m. I initially dismissed it. But the second message was far more explicit and wasn't just a vague threat—it was personal. My full Social Security number, home address, and a direct warning: 'got your addy, know where all y'all live. stop looking into the check fraud or your credit going low.
Screenshots of first (left) and second threatening text messages received on my personal cell
Concerned for my safety, my university immediately assigned a campus police officer to accompany me wherever I went. While this measure helped deflect any potential physical threats, something more insidious was already in motion. The same criminal actor who threatened me via text had posted my full identity—name, SSN, DOB, address, even my credit report—to one of the underground fraud forums my team had been monitoring.
While this exposure was deeply unsettling, it also presented a rare and valuable opportunity: for the first time, I could observe, up close and in real time, how quickly leaked identity data gets exploited by fraudsters.
Why it's So Hard to Link Data Exposure to Fraud
Most leaked personal data, whether stolen from breaches, checks, phishing attacks or malware, circulates through opaque and decentralized criminal networks. The data is often sold or shared in encrypted Telegram groups, invite-only forums, or dark web marketplaces with no clear timestamps. Because of this, researchers rarely know when an identity was first listed for sale or accessed by bad actors. On the other end, when that identity is eventually used to commit fraud—say, to open a bank account or apply for credit—it might not be detected for weeks or even months, if at all.
Even if you know when an identity was leaked, matching it to a fraud attempt is nearly impossible. Institutions (financial firms, credit bureaus, government agencies, and public databases) operate in silos. There is no centralized system to link the moment of exposure to the moment of exploitation. Without visibility into the dark web and cross-platform monitoring, it's nearly impossible to draw a clear, causal line between when an identity is posted for sale and when it's exploited.
To complicate matters further, linking a fraud attempt to a specific leak often requires access to sensitive internal records—such as KYC data or transaction logs—that are protected by privacy laws and corporate policies. The result is a murky, delayed, and ethically constrained landscape, where timelines are incomplete and attribution is uncertain.
Unless the identity in question happens to be your own.
A Front-Row Seat to Fraud: The First 96 Hours
At exactly 9:56 a.m. on March 29, 2022 — minutes after receiving the second threatening message — my personal information was leaked to a Telegram fraud group: full name, address, SSN, date of birth, and even a PDF of my credit report.
I began searching online fraud markets to see if my information had been posted. I found it almost immediately. I alerted my identity theft protection provider, then sat and waited. Within a couple of days alerts started arriving. These alerts suggested that by March 30 — less than 24 hours after the leak of my identity — fraudsters had used my identity to attempt to open accounts at multiple financial institutions, as well as pull my credit report. Working with a victim specialist, we carefully reviewed the suspicious activity and flagged each questionable inquiry. In total, 10 alerts arrived within that first day.
I also requested my ChexSystems report to track any new bank accounts opened in my name (ChexSystems is a consumer reporting agency that tracks deposit accounts across U.S. financial institutions). When that report arrived, it showed six fraudulent accounts had been opened within four days of the leak.
Screenshot of my personal identifiers as appeared on the First Telegram Group Which Shared it.
One account in particular stood out: as if to make a point, the fraudsters had gone so far as to mail a debit card linked to one of the fraudulent accounts directly to my home address. The card bore my name and came with a phone number I was supposed to call to activate it.
ChecXsystem report of bank accounts created using my stolen identity
Debit Card received in my residence as a result of fraudsters using my identity to create a new bank ... More account
After the Storm: Analyzing the Long Tail of Identity Exploitation
After that first month, things went quiet. The alerts stopped, and I assumed the worst was behind me. I was wrong.
Just a few weeks ago, a letter arrived from the Lifeline Support Center in New York. For context, Lifeline is a federal program that provides monthly subsidies for phone or internet services to low-income individuals. According to the letter, someone had used my identity to apply for these benefits, and I was now being asked to upload supporting documents to complete the application.
I had never applied for Lifeline. This was a clear signal: my stolen identity was still actively being used, this time to exploit a government assistance program.
Realizing I'd grown complacent, I decided to dig deeper—this time using more sophisticated tools and data sources to see what was happening in the background. With access to internal databases from SentiLink, a major identity verification and fraud detection company I work with, I searched for any records of identity theft attempts tied to my name and Social Security number. What I found was eye-opening.
In total, there were 5 incidents in March 2022, three in April, two in May, then one in August 2023, and another in April 2024.
Zooming out, several patterns in the fraudsters' behavior began to emerge. First, most of the applications used freshly-created email addresses, likely spun up for the express purpose of the fraud, and cycled through different contact details. Across the board, there was a consistent rotation of emails, phone numbers, and physical addresses, likely designed to evade identity verification systems. Interestingly, while some fraudsters used burner phones or untraceable contact information, others left behind real, personally identifiable phone numbers — even as they were in the act of identity theft.
Second, the fraud attempts showed how broad and adaptive the strategy had become. My identity had been used to apply for everything from consumer loans and property leases to telecom services, federal benefits, and even a tax-related service.
Third, the volume of activity slowed over time. By mid-2022, the pace had noticeably dropped — perhaps due to increased monitoring, the flagging of my data in fraud databases, or simply the reuse value of the leaked information.
But in August 2023, a new and unusual application surfaced — one that included a traceable phone number. For the first time, I was able to link the fraud back to a specific individual. The applicant, who appears to live in New Jersey, has a lengthy criminal record, including charges for breaking and entering, assault, and battery.
Then, in April 2024, my identity was used yet again, this time in connection with a tax-related service. Specifically, an account was created under my name with a tax preparation service, followed by an attempt to fraudulently file my taxes. Unlike the earlier flurry of activity, this attempt was targeted and seasonal, aligned with tax season, and likely designed to take advantage of high-volume government processing windows.
One final and important note from my analysis: it does not appear that any organized fraud ring was behind the continued misuse of my identity. Instead, the pattern suggests individual actors — likely monitoring Telegram fraud channels — picked up my information and incorporated it into their own schemes. My data had become part of a wider fraud supply chain, passed from one bad actor to the next, each adapting it to their own criminal playbook.
Most Recent Use of My Stolen Identity with the LifeLine Support Center in NY
What This Means for You
My experience underscores a sobering reality: once your identity is exposed, you're not a one-time victim. You're probably a long-term asset in a criminal system where your personal data can be recycled, traded, and exploited for years. The fraud may come in waves, or return over time in stealthier, more targeted forms.
If this happens to you, here's what I learned the hard way:
The initial incident is rarely the end. It's usually just the opening move. In this harsh reality, the most powerful protection isn't just a freeze or a lock — it's awareness and proactivity. Once your information is out there, you're not just guarding against fraud — you're managing an active threat that learns how to adapt. Staying on top of how your identity is being used isn't paranoia, it's a necessity.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Ukrainian drone attack sets Russian oil depot on fire as Zelenskyy announces prisoner exchange
Ukrainian drone attack sets Russian oil depot on fire as Zelenskyy announces prisoner exchange

The Hill

time5 hours ago

  • The Hill

Ukrainian drone attack sets Russian oil depot on fire as Zelenskyy announces prisoner exchange

An overnight Ukrainian drone attack on an oil depot near Russia's Black Sea resort of Sochi sparked a major fire, Russian officials said Sunday, as the two countries traded strikes and the Ukrainian president announced a prisoner exchange. More than 120 firefighters attempted to extinguish the blaze, which was caused by debris from a downed drone striking a fuel tank, Krasnodar regional Gov. Veniamin Kondratyev said on Telegram. Videos on social media appeared to show huge pillars of smoke billowing above the oil depot. Russia's civil aviation authority, Rosaviatsia, temporarily stopped flights at Sochi's airport. Farther north, authorities in the Voronezh region reported that four people were wounded in another Ukrainian drone strike. Russia's Defense Ministry said its air defenses shot down 93 Ukrainian drones over Russia and the Black Sea overnight into Sunday. Meanwhile, in southern Ukraine, a Russian missile strike hit a residential area in the city of Mykolaiv, according to the State Emergency Services, wounding seven people. The Ukrainian air force said Sunday Russia launched 76 drones and seven missiles against Ukraine. It said 60 drones and one missile were intercepted, but 16 others and six missiles hit targets across eight locations. The reciprocal attacks came at the end of one of the deadliest weeks in Ukraine in recent months, after a Russian drone and missile attack on Thursday killed 31 people, including five children, and wounded over 150. The continued attacks come after U.S. President Donald Trump last week gave Russian President Vladimir Putin a shorter deadline — Aug. 8 — for peace efforts to make progress. Trump has threatened to impose new economic sanctions on Russia if progress is not made, while expressing doubt about how effective they would be. 'You know, they're wily characters, and they're pretty good at avoiding sanctions, so we'll see what happens,' Trump said Sunday evening of the Russians. He said his special envoy Steve Witkoff may travel to Russia on Wednesday or Thursday, the final days before his new deadline. Ukrainian President Volodymyr Zelenskyy said Sunday that Ukraine and Russia have agreed to exchange 1,200 prisoners following their latest round of negotiations in Istanbul in July. 'There is an agreement to exchange 1,200 people,' he wrote on X, saying that the lists of individuals to be swapped were being worked on and that they were working to 'unblock the return of our civilians.' There was no immediate comment from Russia. Zelenskyy also said he discussed with top Ukrainian officials 'the negotiation track – specifically, the implementation of the agreements reached during the meetings with the Russian side in Istanbul, as well as preparations for a new meeting.' Each of the three rounds of talks between the countries this year has resulted in prisoner exchanges but yielded no breakthrough in reaching a ceasefire.

Ukrainian drone attack sets Russian oil depot on fire; Zelensky announces prisoner swap
Ukrainian drone attack sets Russian oil depot on fire; Zelensky announces prisoner swap

Los Angeles Times

time12 hours ago

  • Los Angeles Times

Ukrainian drone attack sets Russian oil depot on fire; Zelensky announces prisoner swap

An overnight Ukrainian drone attack on an oil depot near Russia's Black Sea resort of Sochi sparked a major fire, Russian officials said Sunday, as the two countries traded strikes and the Ukrainian president announced a prisoner exchange. More than 120 firefighters attempted to extinguish the blaze, ignited after debris from a downed drone struck a fuel tank, Krasnodar regional Gov. Veniamin Kondratyev said on Telegram. Videos on social media appeared to show huge pillars of smoke billowing above the oil depot. Russia's civil aviation authority, Rosaviatsiya, temporarily stopped flights at Sochi's airport. Farther north, authorities in the Voronezh region reported that four people were wounded in another Ukrainian drone strike. Russia's Defense Ministry said its air defenses shot down 93 Ukrainian drones over Russia and the Black Sea overnight into Sunday. Meanwhile, in southern Ukraine, a Russian missile strike hit a residential area in the city of Mykolaiv, wounding seven people, according to the State Emergency Services, The Ukrainian air force said Sunday that Russia had launched 76 drones and seven missiles against Ukraine. It said 60 drones and one missile were intercepted, while 16 others and six missiles hit targets across eight locations. The reciprocal attacks came at the end of one of the deadliest weeks in Ukraine in recent months, after a Russian drone and missile attack Thursday killed 31 people, including five children, and wounded more than 150. The continued attacks come days after President Trump moved up his self-declared deadline — to Aug. 8 — for Russia to show progress on peace efforts. Trump said Thursday that special envoy Steve Witkoff is heading to Russia to push Moscow to agree to a ceasefire in its war with Ukraine and has threatened new economic sanctions if progress is not made. Ukrainian President Volodymyr Zelensky said Sunday that Ukraine and Russia have agreed to exchange 1,200 prisoners after their latest round of negotiations in Istanbul in July. 'There is an agreement to exchange 1,200 people,' he wrote on X, saying that the lists of individuals to be swapped were being settled and that his government was working to 'unblock the return of our civilians.' There was no immediate comment from Russia. Zelensky also said he discussed with top Ukrainian officials 'the negotiation track — specifically, the implementation of the agreements reached during the meetings with the Russian side in Istanbul, as well as preparations for a new meeting.' Each of the three rounds of talks between the countries this year has resulted in prisoner exchanges but yielded no breakthrough toward a ceasefire.

Digital Footprints as Evidence: How Online Activity Can Shape Court Cases
Digital Footprints as Evidence: How Online Activity Can Shape Court Cases

Time Business News

time18 hours ago

  • Time Business News

Digital Footprints as Evidence: How Online Activity Can Shape Court Cases

The intersection of digital technology and courtroom proceedings has reached a critical juncture, with legal experts warning that Americans' online behaviors are increasingly becoming their own worst enemies in litigation. Recent comprehensive analysis by The Texas Law Dog reveals a startling reality: your digital presence may be silently sabotaging your legal rights, regardless of how secure you believe your privacy settings to be. Legal professionals are witnessing an unprecedented shift in how evidence is gathered and presented in courtrooms across America. What many citizens fail to recognize is that every click, post, and digital interaction creates a permanent record that can be legally accessed and weaponized against them during litigation proceedings. The scope of this phenomenon extends far beyond what most individuals anticipate. Research tracking digital evidence usage across major social media platforms including Facebook, LinkedIn, X (formerly Twitter), Instagram, YouTube, and TikTok has uncovered compelling statistics that should concern every internet user. Data analysis spanning from fall 2022 through fall 2023 demonstrates that digital evidence played a decisive role in approximately half a million legal cases, fundamentally altering trial outcomes and settlement negotiations. A dangerous misconception pervades public understanding of digital privacy. Many users operate under the false assumption that privacy controls on social media platforms provide legal protection against evidence discovery. This belief has proven catastrophically wrong in countless courtrooms nationwide. Federal courts have established clear precedent regarding digital evidence admissibility. Under established Federal Rules of Evidence, judges consistently rule that relevant social media content qualifies as legitimate evidence, regardless of privacy settings or user intentions when posting. The American Bar Association has documented the systematic approach courts use to authenticate digital evidence, noting that social media posts present unique verification challenges compared to traditional electronic communications like emails or text messages. The authentication process requires courts to examine multiple factors, including potential account access by third parties, the possibility of planted evidence, and the overall reliability of the digital platform. However, once authenticated, this evidence carries substantial weight in judicial proceedings. The practical implications of digital evidence have been demonstrated through numerous high-profile legal cases that serve as cautionary tales for social media users. In the landmark case Romano v. Steelcase Inc. , a plaintiff's claims of permanent, home-confining injuries were completely undermined when defense attorneys successfully obtained access to her supposedly private Facebook and MySpace accounts. The content revealed activities and lifestyle patterns that directly contradicted her sworn testimony about physical limitations. Similarly, the Nucci v. Target Corp. case illustrates how seemingly innocent social media activity can destroy a legal claim. The plaintiff, who sued for significant injuries and emotional trauma following a slip-and-fall incident, was compelled by the court to provide recent Facebook photographs. These images revealed a lifestyle inconsistent with her claimed injuries and emotional distress, ultimately weakening her case and reducing potential compensation. Insurance companies have rapidly adapted to this new evidentiary landscape, deploying sophisticated digital investigation techniques to challenge claims. Adjusters now routinely scour social media platforms for content that contradicts injury claims, seeking evidence of physical activities that appear inconsistent with alleged limitations or emotional states that don't align with claimed psychological distress. This systematic approach to digital evidence gathering has fundamentally shifted the power dynamic in personal injury litigation. What previously required expensive private investigators and extensive surveillance can now be accomplished through comprehensive social media analysis, making it easier and more cost-effective for insurance companies to challenge legitimate claims. Given this evolving legal landscape, individuals must approach their online presence with the same caution they would exercise when giving sworn testimony. Every post, photograph, and interaction should be evaluated through the lens of potential legal scrutiny. Legal experts recommend implementing comprehensive digital hygiene practices, including regular privacy audits, careful consideration of all posted content, and understanding that deletion doesn't guarantee permanent removal. The key is recognizing that your digital footprint extends far beyond your immediate social circle and can be accessed by opposing legal teams with proper court authorization. As Matt Aulsbrook from The Texas Law Dog emphasizes, 'The digital age has fundamentally changed how legal cases are won and lost. Understanding the permanent nature of online activity and its potential legal implications isn't just advisable—it's essential for protecting your rights and ensuring fair legal outcomes.' The message is clear: in today's interconnected world, your smartphone screen might as well be a courtroom window, and every post could become evidence in ways you never imagined. TIME BUSINESS NEWS

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store