The most common technique involves combining a real social security number with a name and birthdate other than the ones associated with the number.
Synthetic identity theft is more difficult to track as it doesn't show on either person's credit report directly, but may appear as an entirely new file in the credit bureau or as a subfile on one of the victim's credit reports.
There's an app for that." This statement summed up the ease with which these hackers are accessing all kinds of information online.
The new program for infecting users' computers is called Zeus; and the program is so hacker friendly that even an inexperienced hacker can operate it.
Examples might be illegal immigrants, people hiding from creditors or other individuals, or those who simply want to become "anonymous" for personal reasons.
Another example are posers, a label given to people who use somebody else's photos and information through social networking sites.
One problem that victims of criminal identity theft may encounter is that various data aggregators might still have the incorrect criminal records in their databases even after court and police records are corrected.
Thus it is possible that a future background check will return the incorrect criminal records.
Mostly, posers create believable stories involving friends of the real person they are imitating.
Unlike identity theft used to obtain credit which usually comes to light when the debts mount, concealment may continue indefinitely without being detected, particularly if the identity thief is able to obtain false credentials in order to pass various authentication tests in everyday life.
This is just one example of the kinds of impact that may continue to affect the victims of identity theft for some months or even years after the crime, aside from the psychological trauma that being 'cloned' typically engenders.