First identity theft cases date back centuries, from impostors in ancient Rome faking citizenship to the 16th-century Martin Guerre case, where a man assumed another’s identity to claim his life. Today, identity thieves don’t need fake documents or disguises. They can hack personal accounts, steal sensitive data, and cause serious financial and legal problems with just a few clicks. This article explores 10 identity theft cases, showing how criminals pulled off their schemes, what mistakes made people vulnerable, and how you can protect yourself from becoming their next target.
Violeta Lyskoit
March 26, 2025
According to the most recent data provided by Consumer Sentinel Network, the Federal Trade Commission (FTC) received 1,036,903 identity theft case reports in 2023. This number represents 19.2% of all reports received by the FTC that year, making identity theft the most commonly reported type of complaint.
Nearly half (416,582) of recent identity theft cases involved credit card fraud, either through the misuse of existing credit cards or fraudulent applications for new ones. The report also highlights a significant increase in identity fraud cases over time. In 2001, the FTC received only 86,250 reports, compared to over 1 million in 2023.
Although identity theft cases haven’t increased steadily every year, they have risen significantly over the past two decades. It's important to note that this data only includes reports from US residents, meaning the total number of cases worldwide is much higher.
Identity theft involves more than stolen credit card numbers — thieves can drain bank accounts, ruin credit scores, and even frame innocent people for crimes they didn’t commit. Below are some of the most famous cases of identity theft, which show just how diverse and damaging this crime can be.
Abraham Abdallah took identity theft to the next level by targeting some of the world’s wealthiest individuals, including Steven Spielberg, Oprah Winfrey, Warren Buffet, and Michael Bloomberg. He used publicly available records and social engineering tactics to impersonate his victims.
Abdallah allegedly used mobile phones and virtual voicemail services to track packages ordered in his victims' names and access messages from anywhere in the US. The New York Police Department believes he cloned identities, created fake addresses for deliveries, and raided personal bank accounts.
Abdallah attempted to steal over $80 million before authorities caught him in 2001. Upon his arrest, police discovered nearly 21,000 fraudulent or blank credit cards, along with hundreds of celebrities' home addresses and Social Security numbers (SSNs), at Abdallah's home. He pleaded guilty to 12 charges, including wire and mail fraud, credit card fraud, conspiracy, and identity theft (The Guardian, 2001; The Guardian, 2002).
What you can learn from this:
One of the biggest identity theft cases in US history involves Philip Cummings, a help desk employee at a company that provided software for financial institutions to access credit reports. With access to sensitive customer data, Cummings exploited his position to freely download consumer credit reports.
Cummings sold stolen consumer credit reports to identity thieves, who used them to open fraudulent credit card accounts and take out loans in victims' names. Over the years, Cummings’ identity theft scheme affected more than 33,000 individuals and caused millions of dollars in losses. He was eventually caught and sentenced to 14 years in prison in 2004 (DOJ, 2002; FBI, 2004; NBC, 2004).
What you can learn from this case:
In this disturbing story of identity theft, Wendy Brown, a 33-year-old woman, used her 15-year-old daughter’s birth certificate and SSN to enroll in high school. She wanted to relive her youth, join the cheerleading squad, and experience teenage life again.
Brown attended classes, hung out with students, and tried to blend in until school officials eventually uncovered the deception. In 2010, a court found her not guilty of identity theft due to mental illness (Justia, 2010).
What you can learn from this case:
Some stories about identity theft aren’t just about personal or financial gain — some cases are driven by motives like revenge, espionage, or political agendas. One such case involved Nicole McCabe, an Australian woman living in Israel, who became the victim of identity theft. Her name and passport details were allegedly stolen by the Israeli secret service and used in a covert operation to assassinate a Hamas leader in Dubai.
McCabe first learned of her passport's link to the crime from a radio news bulletin. Even though she had done nothing wrong, her stolen identity dragged her into an international scandal. She was eventually cleared, but the fate of the true perpetrators remains unknown (The Sydney Morning Herald, 2010; France24, 2010).
What you can learn from this case:
Senita Dill and Ronald Knowles used stolen personal information, including names, dates of birth, and SSNs, to file hundreds of fraudulent tax returns, pocketing refunds meant for unsuspecting victims. Their scam resulted in over $3.5 million in fraudulent tax refunds.
Dill was sentenced to 324 months in prison, while Knowles received a 70-month sentence. In addition to their prison terms, both defendants were ordered to serve three years of court supervision and repay $3,978,211 in restitution to the IRS.
Dill and Knowles pleaded guilty in October 2012 to conspiracy to file false claims and access device fraud. Dill also pleaded guilty to aggravated identity theft (DOJ, 2012; DOJ, 2014).
What you can learn from this case:
John Podesta, Hillary Clinton’s campaign chairman, became a high-profile victim of identity theft through phishing when he received an email that appeared to be a legitimate Google security alert. The email tricked him into entering his credentials on a fake login page, which gave hackers access to his email account.
The data breach led to thousands of leaked emails, shaping public perception during the 2016 US presidential election. While phishing scams have existed for decades, this case demonstrated how a single successful attack could have global consequences. The criminals responsible were never arrested (Vox, 2016; CBS News, 2016; BBC, 2016).
What you can learn from this case:
In arguably one of the worst identity theft cases, Turhan Lemont Armstrong orchestrated a scheme that exploited children's Social Security numbers to commit financial fraud. He and his accomplices stole SSNs from minors and used them to create "synthetic identities" — fake identities that appeared legitimate to lenders.
In addition to using fraudulently obtained credit cards, Armstrong and his co-conspirators made cash withdrawals using point-of-sale terminals maintained by "collusive merchants." These merchants knowingly assisted the criminals, which allowed them to bypass normal security measures. Armstrong’s team also applied for loans using the stolen identities.
Because children rarely use credit before adulthood, these scams often go undetected for years. According to court documents, the total financial loss in this case amounted to $3,305,609. Armstrong was eventually caught and sentenced to more than 21 years in federal prison (ICE, 2020; ICE, 2019).
What you can learn from this case:
Eddy Alexandre, the CEO of EminiFX, ran a fraudulent cryptocurrency investment platform that promised investors high returns with minimal risk. He lured people in by claiming they could earn at least 5% in weekly returns through an automated trading system. In reality, the platform was a Ponzi scheme — Alexandre used money from new investors to pay off earlier investors while pocketing millions for himself.
EminiFX scammed thousands of investors out of over $248 million. Many victims were members of the Haitian-American community, whom Alexandre specifically targeted with misleading promises of financial security. In 2023, he pleaded guilty to fraud charges and was sentenced to nine years in prison (DOJ, 2023; DOJ, 2023, DOJ, 2022).
What you can learn from this case:
Jeff Drobman fell victim to SIM swapping when scammers tricked his mobile provider into transferring his phone number to a new SIM card. Once they gained control of his number, they accessed his text messages and used SMS-based two-factor authentication to log into his bank account and steal $21,000.
By hijacking his phone number, the fraudsters bypassed security measures and drained Drobman’s financial accounts. This case highlights how even trusted security protocols can be compromised when attackers gain control of a victim’s personal device (NBC Los Angeles, 2020).
What you can learn from this case:
Imagine getting a call from a loved one, their voice shaking, begging for help. It sounds exactly like them — but it’s not. Scammers are now using AI-generated voice cloning to fake hostage situations and trick people into paying ransom.
One mother, Jennifer DeStefano, lived through this nightmare. She got a call that sounded just like her 15-year-old daughter, sobbing and pleading for help. A scammer claimed they had kidnapped her and demanded money immediately.
This terrifying scam, reported by CNN in April 2023, shows how criminals use AI to copy voices from social media and other public sources. The scammers may also spoof caller IDs and gather personal details to make their threats seem real. Many victims panic and send money before realizing their loved ones were never in danger (CNN, 2023).
What you can learn from this case:
Shimon Hayut, better known as "The Tinder Swindler," tricked women on dating apps by posing as Simon Leviev, the son of Israeli diamond billionaire Lev Leviev. He claimed to be a wealthy businessman in danger, desperately in need of financial help. He promised to repay everything his victims had lent him — but he never did.
Instead, Hayut used the money to fund his lavish lifestyle while moving on to his next victim. He scammed women out of millions, leaving many in financial ruin. Authorities eventually caught him, but he only served a short prison sentence (Forbes, 2022; Times of Israel, 2019).
What you can learn from this case:
Identity theft is a growing problem, and the biggest cases often stem from the same mistakes — oversharing online, failing to research, and ignoring red flags. Scammers exploit these vulnerabilities and take advantage of them. Many victims don’t realize what’s happening until they lose money.
However, you can avoid becoming a target by following a few smart habits. Below, we’ll outline simple steps to help you stay safe and avoid becoming the next identity theft case study.
Hackers don’t need advanced tricks to steal identities. Often, they rely on easy-to-find information — your name, birthday, and even answers to common security questions. A quick social media search can reveal everything they need.
Follow these tips to protect yourself:
Identity theft often goes unnoticed until serious damage is done. The sooner you detect it, the easier it is to prevent further harm.
Common warning signs of identity theft include:
Scammers love to impersonate banks, government agencies, and even family members to trick people into giving away sensitive information. These phishing attacks often look and sound convincing.
To stay safe:
Your phone and computer hold a goldmine of personal data. If a hacker gains access, they can take over your accounts in minutes.
Keep your devices secure by:
If you suspect identity theft or want to prevent unauthorized loans in your name, freezing your credit is one of the strongest defenses. A credit freeze stops anyone from opening new accounts using your information.
To freeze your credit, contact each of the three major credit reporting agencies — Equifax, Experian, and TransUnion. Freezing your credit won’t affect your existing accounts, but it will make it harder for scammers to take out loans or access credit accounts linked to your identity.
Identity fraud isn’t always preventable, but staying informed and taking precautions can make all the difference. By securing your information, watching for warning signs, and acting quickly when something seems off, you can greatly reduce the risk of becoming a victim.
What should you do if your identity is stolen? Act fast — report the fraud, freeze your credit, and secure your accounts to limit the damage. The faster you respond, the better your chances of stopping further misuse and recovering your identity.
Keeping track of every account and transaction can be overwhelming. An identity theft protection service like NordProtect does the heavy lifting by monitoring your personal information and alerting you to suspicious activity.
NordProtect can:
Although an identity theft protection service won’t stop identity theft entirely, it adds an extra layer of security and helps you take action before things get worse.
Violeta is a copywriter who turns cybersecurity from confusing to clear. She helps people stay a step ahead of identity thieves with simple, practical advice.
The credit scores provided are based on the VantageScore 3.0® credit score by TransUnion® model. Lenders use a variety of credit scores and may utilize a different scoring model from VantageScore 3.0® credit score to assess your creditworthiness.
You have numerous rights under the FCRA, including the right to dispute inaccurate information in your credit report(s). Consumer reporting agencies are required to investigate and respond to your dispute but are not obligated to change or remove accurate information that is reported in compliance with applicable law. While this plan can provide you assistance in filing a dispute, the FCRA allows you to file a dispute for free with a consumer reporting agency without the assistance of a third party.
No single product can fully prevent identity theft or monitor every single transaction.
Some features may require authentication and a valid Social Security Number to activate. To access credit reports, scores, and/or credit monitoring services (“Credit Monitoring Services”), you must successfully pass your identity authentication with TransUnion®, and your VantageScore 3.0® credit score file must contain sufficient credit history information. If either of these requirements is not met, you will not be able to access our Credit Monitoring Services. It may take a few days for credit monitoring to start after a successful enrollment.
NordProtect’s dark web monitoring service scans various sources where users’ compromised personal information is suspected of being published or leaked, with new sources added frequently. However, there is no guarantee that NordProtect will locate and monitor every possible site or directory where consumers' compromised personal information is leaked or published. Accordingly, we may not be able to notify you of all your personal information that may have been compromised.
Identity protection benefits are currently available to all customers residing in the United States, including U.S. territories and the District of Columbia, with the exception of residents of New York and Washington. NordProtect is not a licensed insurance producer. Benefits under the Group Policy are issued and covered by HSB Specialty Insurance Company. You can find further details and exclusions in the Summary of Benefits.
Our identity theft restoration service is part of a comprehensive identity theft recovery package that offers a reimbursement of up to $1 million for identity recovery expenses. To access the support of an identity restoration case manager, you must file a claim with HSB, which NordProtect has partnered with to provide the coverage. HSB is a global specialty insurance company and one of the largest cyber insurance writers in the U.S.