Passport Identity Theft: Document Fraud and US State Department Procedures

Passport identity theft involves the fraudulent acquisition, use, or manufacture of US passport credentials through deception or document manipulation. It intersects federal criminal statutes, US Department of State administrative procedures, and broader identity theft types and categories enforced at both the civil and criminal levels. The consequences extend beyond travel disruption — a compromised passport can enable financial fraud, immigration violations, and criminal identity fraud across multiple jurisdictions.

Definition and scope

A US passport is a federal identity document issued under the authority of the US Department of State pursuant to 22 U.S.C. § 211a. Passport identity theft occurs when a person's identity or personal information is used — without authorization — to apply for, alter, obtain fraudulent use of, or impersonate the holder of a US passport.

The scope of this fraud category spans two distinct document classes:

Fraud involving either document falls under 18 U.S.C. § 1543 (forgery or false use of passport) and 18 U.S.C. § 1542 (false statement in application for passport), both enforced by the US Department of State's Diplomatic Security Service (DSS). Penalties under 18 U.S.C. § 1543 carry a maximum sentence of 25 years imprisonment when the offense is connected to drug trafficking or terrorism, and up to 10 years for standard violations (18 U.S.C. § 1543).

Passport fraud is classified within the government benefits identity theft and criminal identity theft spectrums when the stolen document is used to circumvent law enforcement or claim federal entitlements.

How it works

Passport identity theft operates through 4 primary mechanisms:

  1. Application fraud — A fraudster submits a passport application using a real person's identity documents (birth certificate, Social Security card) while substituting their own photograph. This exploits the separation between identity verification and biometric capture.
  2. Theft and impersonation — A physical passport is stolen and used by someone who bears a resemblance to the legitimate holder. Physical security features such as the RFID chip encoded under ICAO standards and the laser-perforated personal data page are designed to deter this, but low-scrutiny crossings remain a vulnerability.
  3. Document alteration — A genuine passport's biographical data page is chemically or digitally modified. The US passport's polycarbonate data page, introduced in the e-Passport upgrade program, significantly increases the difficulty of physical alteration compared to earlier laminated formats.
  4. Synthetic identity construction — Fraudsters combine real and fabricated identity elements to manufacture a profile that passes identity verification. This connects directly to the broader synthetic identity theft fraud pattern, where a Social Security number belonging to one individual is paired with a fabricated name and birthdate to generate supporting documents.

The Diplomatic Security Service operates a dedicated Passport Fraud Program that coordinates with US Customs and Border Protection (CBP) and the FBI's Identity Theft Task Forces to detect application fraud at post offices and passport acceptance facilities.

Common scenarios

Scenario A: Lost or stolen passport used for border crossing
A legitimate passport is stolen and sold on secondary markets. The buyer, if sufficiently similar in appearance to the holder, uses the document for land border crossings where biometric verification may be less rigorous than at international airports.

Scenario B: Child's identity used to generate a passport
Minor children, whose Social Security numbers are rarely monitored for credit or travel activity, are targeted for application fraud. This overlaps significantly with child identity theft patterns. The fraudulent passport may remain undiscovered for years.

Scenario C: Deceased individual's identity
An identity thief obtains a birth certificate for a deceased person and submits a passport application before the death is registered in Social Security Administration records. The Social Security Administration's Death Master File and its integration with State Department systems provides one verification layer, but gaps in reporting timelines exist.

Scenario D: Insider document fraud
In cases documented by DSS prosecutions, acceptance facility employees at post offices or courthouses have fraudulently certified applications or failed to verify supporting documents, enabling fraudulent issuances.

Decision boundaries

Distinguishing passport identity theft from related fraud categories requires attention to the mechanism and the federal nexus:

Fraud Type Primary Document Primary Federal Authority
Passport identity theft US passport (book or card) Dept. of State / DSS, 18 U.S.C. §§ 1542–1543
Driver license identity theft State-issued DL/ID State DMV, 18 U.S.C. § 1028
Social Security fraud SSN / SS card SSA OIG, 42 U.S.C. § 408
Criminal identity fraud Any government ID DOJ, varies by state

The driver license identity theft category shares procedural overlap with passport fraud — both involve government-issued identity documents — but driver license fraud falls under state jurisdiction absent a federal nexus.

Victims of passport identity theft should initiate reporting through the identity theft reporting steps process, including filing with the FTC at IdentityTheft.gov and submitting a report to the State Department's passport fraud reporting line operated by DSS. If the fraudulent passport was used to commit crimes in another person's name, a police report for identity theft establishes the evidentiary record required by both DSS and the courts.

Remediation differs materially from financial identity theft: there is no credit bureau dispute mechanism for passport fraud. The State Department revokes fraudulently issued passports and may require the legitimate holder to reapply with enhanced identity verification through a Regional Passport Agency rather than an acceptance facility.

References

📜 5 regulatory citations referenced  ·  🔍 Monitored by ANA Regulatory Watch  ·  View update log

Explore This Site