Sponsored Links
-->

Sunday, June 10, 2018

What is Ghosting?
src: identity.utexas.edu

Ghosting is a form of identity theft in which someone steals the identity, and sometimes even the role within society, of a specific dead person (the "ghost") who is not widely known to be deceased. Usually, the person who steals this identity (the "ghoster") is roughly the same age that the ghost would have been if still alive, so that any documents citing the birthdate of the ghost will not be conspicuously incorrect if appropriated by the thief now claiming to be that person.

The use of counterfeit identification falsely documenting a completely fictional identity is not ghosting, as false identification cannot be used to obtain social services or interact with government agencies or law enforcement officials. The purpose of ghosting is to enable the ghoster to claim for their own use an existing identity that is already listed in government records--an identity that is dormant because its original possessor is dead.

Ghosting is based on the premise (now less justified than in previous times) that separate government agencies do not share a total exchange of information. Therefore, a ghoster can obtain a passport or Social Security benefits in the name of a dead person because the agencies in charge of those services do not routinely cross-check an applicant's history to determine if a death certificate has been issued in that person's name.


Video Ghosting (identity theft)



General description

Typically, identity theft is done for criminal financial gain, with the thief preying upon the credit rating of a living person who is an active member of society. The identity thief retains their own name and place in society while making unlawful use of someone else's more advantageous financial status. The so-called "identity thief" is really more interested in exploiting someone else's financial credit rather than acquiring that person's identity. In this sense, it is the creditors, not the person's family and friends, who are the primary victims of this crime.

The motives for ghosting are more complex. The ghoster is sincerely interested in acquiring another person's identity for their own ongoing use and therefore usually selects a person who is dead in order to avoid the risks that would occur if two living people used the same Social Security number. Generally, a ghoster is unwilling to sustain their existing identity and takes a new identity to get a fresh start in life. Unlike a typical identity thief, who squeezes quick profits from one stolen identity then moves on to the next victim, a ghoster may actively seek to acquire and maintain a respectable credit rating in their new identity.

Ghosting is largely a phenomenon of the 20th century. Before the arrival of the Social Security system, a person who possessed no identity documents (no birth records, no high school diploma) could live openly without incurring suspicion. Counterfeit identification could not be easily exposed as fake. Only with the arrival of income tax and social benefits in the 1920s did it become essential for every adult to possess an identity that was registered in government archives--if not their own lawful identity, then one appropriated from a person no longer using it. In the 21st century, advances in technology have made ghosting increasingly difficult to achieve, while governments have increased the penalties for those who get caught.

Dashiell Hammett's novel The Maltese Falcon (1930) recounts the story, apparently based on a true case, of a businessman named Flitcraft who spontaneously abandons his career and his marriage, abruptly moving to another city and inventing another identity. If this incident did indeed occur in the 1920s or earlier, Flitcraft would have encountered little difficulty in establishing a new life without formal documents such as a birth certificate and Social Security number. If this had occurred ten years later, Flitcraft would have needed a ghost identity to begin his new life.

In the days before computerized databases, ghosting was easy to achieve--especially in Britain, where birth certificates and death certificates are public documents. The General Register Office in London contains indexed registers of all births, deaths, marriages and adoptions in England and Wales. The typical ghoster might consult the Deaths index (black volumes, archived by year) for the period 15 years after their own birth, seeking records of the death of a man approximately 15 years old (that is, whose birthdate would be near the birthdate of the ghoster). Finding a suitable candidate, the ghoster would then consult the Births index (red volumes, in a different section of the Records Office) for the deceased person's date of birth. Armed with this knowledge, they could then pay a small fee to obtain a copy of the deceased's birth certificate. Using this document as the foundation for the stolen identity, the ghoster would gradually acquire evidence enabling them to pass as the other person, still alive. Some of this evidence would be faked, with other evidence, such as school records, having been legitimately issued to the deceased before their death. Other archives outside of Britain, such as the genealogy records of The Church of Jesus Christ of Latter-day Saints, have unwittingly served this same purpose of enabling ghosters to find new identities.

It is easier for a female to appropriate a dead person's identity than it is for a male. For instance, a female ghoster can steal the identity of a dead female who had married and taken her husband's name. Detection is more difficult in this case because the death certificate and the birth certificate will show two different surnames. Also, gaps in the ghost identity's employment history (for the years between the ghost's death and the date when the ghoster claims that identity) will arouse less suspicion if the impostor is a female, who might conceivably have spent the transition years as a homemaker with no wages.

In the 1970s, a counterculture publishing firm in California named Eden Press published a pamphlet, The Paper Trip, giving detailed instructions for acquiring a dead person's identity. Among other pointers, the pamphlet advised readers to search newspaper archives for old articles about an entire family getting killed in an accident while on vacation outside of their home state. This scenario offers several advantages to a ghoster:

  • Because the incident involved multiple deaths, there are multiple candidates (of different ages, and both sexes) for an identity that the ghoster can steal.
  • Because the entire family died in the same incident, the dead person whose identity is chosen for ghosting is not likely to have any immediate relatives who are still alive and aware of their death.
  • Because the family died outside their home state, their birth records and death records are archived in two different states and are unlikely to be cross-referenced. Also, if the deceased family's remains were not returned to their home community for burial, the staffers in the local records office are unlikely to be aware that the family is deceased and will not be suspicious when someone claiming to be a member of this family requests a copy of the birth certificate.
  • Because the deaths occurred years ago, new requests for an old birth certificate are unlikely to stir anyone's memory of that individual's death.

Whereas typical identity thieves will steal the credit rating of anyone, regardless of age, race or sex, a ghoster intends to live in the stolen identity and therefore usually seeks to acquire the identity of a dead person whose physical description strongly resembles the living ghoster's appearance: similar birthdate, height, sex, race or ethnic background. Rare exceptions are transsexual ghosters (see below), who seek to acquire the identity of a dead person of the opposite sex but otherwise resemble the ghoster as much as possible.


Maps Ghosting (identity theft)



Drawbacks

Ghosting is no longer as easy as it once was. This is largely due to the increasing computerization of vital records and the increasing power of search engines. Until the 1990s, each state in the United States maintained its birth records and death records in separate registries with no cross-referencing. Modern search engines enable government clerks to establish quickly if a death certificate has ever been issued to the person named on a given birth certificate.

Many ghosters have criminal records under their original identities and seek new identities in order to gain a fresh start (or to start a new criminal career without the prior arrest record). Before the days of enhanced computer imaging, it was a difficult and time-consuming process for law-enforcement officials to search fingerprints archives. If a ghoster were arrested and fingerprinted under their new identity (with no prior arrests under that name), there was a good chance that authorities would fail to discover any records of a prior arrest for the same set of fingerprints linked to a different name and birthdate. This is no longer true. Modern imaging technology now enables search engines to scan a database of millions of fingerprints quickly, finding a positive match which police can transmit electronically to other police forces anywhere in the world. New identity documents can no longer conceal prior arrests.

In the United States, it was formerly the case that citizens were not issued a Social Security number until their first paid employment. Thus, in the year 1975, a man ghoster aged 25 would acquire the birth certificate of a boy who was born circa 1950 (the same age as the ghoster) but who had died at age 15 or younger. An individual who died before adulthood would not be likely to possess a Social Security number; therefore, a ghoster claiming to be this person and applying for a first-time Social Security number at age 25 would not arouse suspicion if he could explain why he waited until age 25 to begin working for wages. But a ghoster who attempted this scheme in the year 2000 (or later) would arouse great suspicion because parents are now required to acquire a Social Security number for their offspring before the next annual income tax return is filed, and government computers can instantly retrieve any individual's entire history of employment and income-tax records. A ghoster who applies to a Social Security office for a replacement of a Social Security card issued to someone who died ten years earlier (who claims to be that individual, still living) will immediately be asked why he has not reported any wages for the past ten years and will be challenged to explain how he has supported himself for ten years without wages. There will also be a gap in the tax records, requiring the ghoster to explain why he hasn't filed tax returns for the intervening years.

Another factor that discourages ghosting is the fact that the stakes are now much higher. In prior times, a criminal with a long record of felony convictions had strong incentive to commit the minor crime of ghosting in order to acquire a new identity with no prior arrests. This is no longer true. The unlawful acquisition of false identification, whether counterfeit or falsely appropriated from a dead person, will now be prosecuted far more aggressively than he might have been in the past.

Ghosting has never been foolproof. One reason is the overconfidence of ghosters who, after acquiring a new identity, refuse to abandon the habits and associations of their previous identity. Christopher John Boyce was a spy for the USSR, traitor to the USA, and an armed bank robber who was nicknamed "The Falcon" for his interest in competitive falconry. There are barely a hundred falconers in the entire United States, and Boyce was known personally to all of them. After escaping from federal prison and acquiring a new identity via ghosting, Boyce resumed his old habit of attending falconry competitions, now wearing a new name but still associating with falconers who had known him by his original name. Boyce was swiftly rearrested.


How to Write an Obituary That is ID Theft Proof | MyIDCare
src: www.myidcare.com


Types of ghosters

Most ghosters are running away from something: a criminal record, a marriage, or bad debts. Unlike more typical identity thieves, it is often the case that a ghoster is a former criminal who genuinely desires to reform and who seeks an unblemished identity (even if acquired illegally) as a necessary part of the process. Several members of the Revolutionary Youth Movement of the 1960s eventually disavowed their radical pasts and wished to erase ties to their earlier actions. In several cases, former radicals were able to evade arrest for more than 20 years because, through ghosting, they acquired new identities in which they proceeded to live entirely law-abiding lives. During the Vietnam war, many young men in the United States avoided the draft by fleeing to Canada or other nations, where they acquired ghost identities enabling them to live as natives of those countries.

During the days of racial segregation in the United States and apartheid in South Africa, light-skinned mulattos who were legally defined as Negroes had strong incentive to pass as Caucasians. Some of these individuals may have stolen the identities of deceased white persons, acquiring birth certificates that listed them as "white." (In South Africa, there was a third legal category of colored people, which would make the transition less noticeable.)


New NTIS Guidelines Limit Access To the Death Master File
src: www.streamlineverify.com


Famous examples

The American film actor Wallace Ford was a successful ghoster. Born in England under the name Samuel Jones, he was estranged from his family at an early age and placed in a school in Canada. At the age of 15, Jones became a hobo and stowed away aboard freight trains with a fellow hobo named Wallace Ford. The two boys eventually were in a train accident; Jones survived, but Ford was killed. Jones then appropriated the other man's name and some aspects of his biography, becoming a successful actor under the name Wallace Ford, eventually starring on Broadway and in Hollywood films. As "Wallace Ford," Jones used the real Ford's birthdate and other statistics on all of his own tax returns and official documents, even applying for a passport as Wallace Ford for his 1937 return to England. Only shortly before his death in 1966 did the actor reveal the complete truth about his identity.

Jones (Ford) was fortunate to have an ideal candidate for his ghost identity: a dead person of his own race, sex and approximate age whose death was never officially recorded. (No one came forward to identify the real Wallace Ford's remains.) Typically, ghosters seeking a dead person's identity must choose someone whose death has been recorded in public archives, creating a risk that, after donning this new identity, the ghoster will eventually be confronted with a copy of his "own" death certificate.

Ghosters have appeared in fiction. One example is Seymour Skinner, the grade-school principal in The Simpsons. Several years after his first appearance on this series, Skinner revealed that he was an impostor who had stolen the real Seymour Skinner's life and identity after the real Skinner was captured in Vietnam and sold to a shoe-producing company in China. Don Draper, the main character in AMC's Mad Men, is another example of a ghoster, obtaining his identity from a deceased superior officer during the Korean War. In the film The Day of the Jackal the would-be assassin assumes the identity of a deceased person to hide his movements from the authorities.

In Naruto, the character Obito used the identity of Uchiha Madara until it was revealed that the real Madara is dead by Kabuto.

In Father is Strange, a Korean drama, Byun Han-soo is revealed to actually be Lee Yoon Seok. The real Byun Han-soo died in an explosion in the US. His body was mistaken for his friend Lee Yoon Seok as they had switched coats- which had each other's passports in. Mr Lee didn't correct the mistake as he wanted him, his girlfriend and his soon-to-be-born son to escape the title of ex-convict that was tied to his real name.


New NTIS Guidelines Limit Access To the Death Master File
src: www.streamlineverify.com


References

Source of the article : Wikipedia

Comments
0 Comments