Criminal identity theft is more than just a financial nightmare. Unlike other forms of fraud, it can drag you into legal trouble for offenses you didn’t commit, damage your public record, and leave you struggling to clear your name. In this guide, we'll explain what criminal identity theft is, how it happens, and how to spot the warning signs. You'll also learn what steps to take if you fall victim to this fraud and how to stay protected.
Lukas Tamašiūnas
July 21, 2025
Criminal identity theft is a type of fraud that involves using someone’s personal information (like their name, Social Security number, or date of birth) to commit a crime or evade law enforcement. Such identity theft can result in a criminal record being tied to your name. It can also lead to arrest warrants or denied employment opportunities. Victims often face lengthy legal processes to clear their name, along with emotional stress and damage to their reputation.
Criminal identity theft happens when someone uses stolen personal information to commit crimes in your name. Criminals use various tactics to obtain this information and exploit it for impersonation. Once scammers access your details, they may impersonate you during an arrest or create fake identification documents in your name.
Let’s look at the most common tactics identity thieves use to access personal information.
When companies, hospitals (cases of medical identity theft have been reported), or government agencies suffer data breaches, the personal information of thousands — sometimes even millions — of people may be exposed. Criminals often buy or trade this data on the dark web and use it to impersonate victims.
Malware is malicious software designed to damage your device or gain unauthorized access to your system. If your computer or phone is infected, a hacker can access sensitive details like login credentials, scanned documents, or even messages that reveal your date of birth or address. Scammers can then use this information to impersonate you or forge fake IDs.
Malware often spreads through phishing emails, bogus ads, and fake security warnings. These tactics are meant to confuse and push you to take action, like clicking links or downloading files, which can lead to malware infections.
While often associated with financial fraud, credit card skimming can lead to broader identity theft. Skimmers are small, hidden devices placed on ATMs or gas pumps that capture your card information. When combined with other personal data, your card details could be part of a larger profile used to commit criminal identity theft.
Synthetic identity theft blends real information (like a legitimate SSN) with fake details (such as a fake name or birthdate) to create an entirely new identity. These synthetic identities are often used to commit fraud, obtain loans, or even commit crimes under a made-up name.
Public Wi-Fi networks (like those in coffee shops or airports) can be unsafe. Cybercriminals can intercept data you send over unsecured connections, such as login credentials or scanned IDs. If you’ve accessed sensitive services (like email or banking apps) on a public network, your identity could be stolen without your knowledge.
Social engineering involves attackers psychologically manipulating people into revealing confidential information. Let’s take a look at some examples of social engineering tactics.
Once criminals gather enough of your data, they can use it during an arrest or investigation to pass themselves off as you.
Criminal identity theft is a felony offense under federal and most state laws. Convictions can lead to long prison sentences, especially if the crime involves fraud, tax evasion, or large financial losses. Fines can reach tens of thousands of dollars.
Because these crimes frequently cross state lines, they may trigger federal charges under laws like the Identity Theft and Assumption Deterrence Act. That means victims and defendants alike can be pulled into multi-jurisdictional legal proceedings. To secure a conviction, prosecutors must prove that the accused knowingly used stolen information with the intent to defraud.
Aside from criminal penalties, perpetrators may face civil lawsuits. Victims can sue for damages, including lost wages, legal expenses, and emotional distress, even if the perpetrator avoids jail time.
Because criminal identity theft often goes unnoticed until it causes serious harm, it’s important to stay alert for these signs that indicate you may be a victim of criminal identity theft:
If any of these red flags show up, take action immediately. Contact a legal professional or legal aid service to discuss your concerns and what you can do about them.
If you discover that someone has used your identity to commit a crime, act quickly and follow these critical steps:
If you’d like to learn more, you can take a look at our guide on what to do if your identity is stolen.
Clearing your name is possible, but it requires time, documentation, and legal persistence. Follow these steps to clear your records after criminal identity theft:
The process of clearing your record can be complicated, but it’s not impossible. Using the right channels and acting immediately can help manage the damages caused by identity theft.
A service like NordProtect helps provide support during recovery through an identity theft recovery service, which includes access to a dedicated identity restoration case manager. NordProtect users may receive up to $1 million to cover qualifying identity theft recovery costs, including legal fees and document replacement, subject to a $100 deductible.
Preventing criminal identity theft begins with smart, consistent habits and the right protective tools. Start by using strong, unique passwords across your accounts and enabling two-factor authentication wherever possible. Avoid using public Wi-Fi for sensitive activities. If you need to connect while on the go, protect yourself with a trusted VPN.
At home, be sure to shred any documents that contain personal information before discarding them. You should also limit how much personal data you share online, especially details like your full birthdate or home address, which can be used to impersonate you.
To stay ahead of threats, monitor your credit regularly for any unfamiliar activity, and check your criminal record annually to catch any false entries early. You may also want to consider identity theft insurance to give you peace of mind.
For added protection, consider using NordProtect, an all-around identity theft protection service that offers 24/7 dark web monitoring, credit monitoring services with immediate notifications, and actionable security alerts. These features allow you to respond before a criminal has the chance to use your identity.
Lukas is curious and keen on sharing his knowledge with everyone, which can make him quite annoying at times. Regardless, he believes in the power of being informed and loses a wrinkle every time someone gets cybersecurity insurance or downloads a two-factor authentication app.
The credit scores provided are based on the VantageScore 3.0® credit score by TransUnion® model. Lenders use a variety of credit scores and may utilize a different scoring model from VantageScore 3.0® credit score to assess your creditworthiness.
You have numerous rights under the FCRA, including the right to dispute inaccurate information in your credit report(s). Consumer reporting agencies are required to investigate and respond to your dispute but are not obligated to change or remove accurate information that is reported in compliance with applicable law. While this plan can provide you assistance in filing a dispute, the FCRA allows you to file a dispute for free with a consumer reporting agency without the assistance of a third party.
No single product can fully prevent identity theft or monitor every single transaction.
Some features may require authentication and a valid Social Security Number to activate. To access credit reports, scores, and/or credit monitoring services (“Credit Monitoring Services”), you must successfully pass your identity authentication with TransUnion®, and your VantageScore 3.0® credit score file must contain sufficient credit history information. If either of these requirements is not met, you will not be able to access our Credit Monitoring Services. It may take a few days for credit monitoring to start after a successful enrollment.
NordProtect's dark web monitoring service scans various sources where users' compromised personal information is suspected of being published or leaked, with new sources added frequently. However, there is no guarantee that NordProtect will locate and monitor every possible site or directory where consumers' compromised personal information is leaked or published. Accordingly, we may not be able to notify you of all your personal information that may have been compromised.
Identity and cyber protection benefits are available to customers residing in the U.S., including U.S. territories and the District of Columbia, with the exception of residents of New York and Washington. Benefits under the Master Policy are issued and covered by HSB Specialty Insurance Company. You can find further details and exclusions in the summary of benefits.
Our identity theft restoration service is part of a comprehensive identity theft recovery package that offers a reimbursement of up to $1 million for identity recovery expenses. To access the support of an identity restoration case manager, you must file a claim with HSB, which NordProtect has partnered with to provide the coverage. HSB is a global specialty insurance company and one of the largest cyber insurance writers in the U.S.