Identity Theft Types and Categories: A Complete Reference

Identity theft encompasses a broad spectrum of fraudulent schemes in which a perpetrator obtains and misuses another person's personal identifying information without authorization. The Federal Trade Commission (FTC) classifies identity theft across more than a dozen distinct categories, each defined by the credential type exploited and the harm produced. Accurate classification matters because recovery pathways, reporting requirements, and legal remedies differ substantially by type. This reference maps the recognized taxonomy used by federal agencies, consumer reporting bodies, and law enforcement.


Definition and scope

Identity theft is defined under federal law at 18 U.S.C. § 1028 as the knowing transfer, possession, or use of a means of identification of another person with intent to commit unlawful activity. The statute covers a wide range of identifying instruments — Social Security numbers, financial account credentials, biometric data, and government-issued document numbers. Aggravated identity theft under 18 U.S.C. § 1028A carries a mandatory 2-year consecutive sentence on top of the underlying offense.

The FTC's Consumer Sentinel Network, which logs identity theft complaints from across the United States, recorded over 1.4 million identity theft reports in 2023 (FTC Consumer Sentinel Network Data Book 2023). That volume underscores the scale of the problem and the diversity of methods through which personal data is exploited. The identity-theft-statistics-us reference page aggregates current complaint volumes by category and state.

The scope of identity theft spans five primary credential domains:

  1. Financial credentials — bank account numbers, credit card data, payment card PINs
  2. Government-issued identifiers — Social Security numbers, driver's license numbers, passport numbers
  3. Medical identifiers — insurance member IDs, Medicare/Medicaid numbers, provider credentials
  4. Tax identifiers — Employer Identification Numbers, filing PINs, W-2 data
  5. Synthetic combinations — fabricated profiles blending real and fictitious data elements

How it works

Identity theft operates through three sequential phases regardless of the specific variant:

  1. Acquisition — The perpetrator obtains identifying information through data breaches, phishing, mail theft, social engineering, skimming devices, or dark web purchases. The data-breach-and-identity-theft and phishing-and-identity-theft pages detail these acquisition vectors separately.

  2. Exploitation — The perpetrator applies the stolen data to open new accounts, file fraudulent tax returns, claim government benefits, obtain medical services, or impersonate the victim in criminal proceedings.

  3. Concealment — Fraudulent activity is routed through layered accounts, synthetic identity profiles, or jurisdictions with weaker verification requirements to delay detection. Synthetic identity fraud, in which a real Social Security number is paired with a fictitious name, is particularly difficult to detect because no single real person receives account statements.

The Federal Bureau of Investigation (FBI) and the FTC both document that the average time between credential theft and victim discovery can exceed 12 months for account-level fraud, and longer for medical or benefit fraud.


Common scenarios

The recognized categories of identity theft, as tracked by the FTC and defined in federal statute, include:


Decision boundaries

Determining which category applies to a given incident governs both the reporting pathway and the recovery process. The following distinctions are operationally significant:

New account fraud vs. account takeover fraud — New account fraud involves accounts the victim never opened; account takeover involves existing accounts the victim holds. Credit bureau disputes under FCRA apply to both, but fraud alerts and account-level notifications function differently across the two scenarios.

True-name fraud vs. synthetic identity fraud — True-name fraud uses a victim's actual name alongside their stolen credentials. Synthetic identity fraud (synthetic-identity-theft) uses a real Social Security number with a fabricated name; the victim may never receive collection notices because no account exists in their name.

Civil identity exposure vs. criminal identity theft — Civil exposure (fraudulent credit accounts) is addressed through the credit dispute process and FTC reporting at IdentityTheft.gov. Criminal identity theft, where a victim's identity is used during an arrest or prosecution, requires engagement with law enforcement and the courts, as detailed at identity-theft-police-report-guide.

Single-vector vs. compound identity theft — A perpetrator may exploit a single credential type in isolation or combine medical, financial, and tax fraud in a coordinated scheme. Compound cases typically require simultaneous action across the IRS, credit bureaus, HHS, and potentially the Social Security Administration (SSA).

Incident classification should precede any recovery action. The identity-theft-reporting-steps page maps the correct agency contacts and documentation requirements for each category listed above.


References

📜 2 regulatory citations referenced  ·  🔍 Monitored by ANA Regulatory Watch  ·  View update log

Explore This Site