Why you Should Watch Out for Teen Identity Theft

  • By David Lukic
  • Published: Apr 16, 2021
  • Last Updated: Mar 18, 2022

 No one is immune to identity theft, even young children and teens. Typically, criminals target those who are less likely to be aware of teen identity theft, so criminals can ride the money train for as long as possible.

Identity Theft Statistics

According to a 2018 study performed by Javelin Strategy & Research, two-thirds of all identity theft victims are under the age of 8. Roughly 20% are between the ages of 8 and 12. Children are ripe for this type of fraud, and the experts estimate that 1 million children are victims of identity fraud every year. The losses stemming from identity theft total more than $2.67 billion.

According to the same study, teens are more at risk after a data breach than adults. Their findings showed that 39% of teens were victimized after a data breach, where only 19% of adults were.

The Federal Trade Commission (FTC) says that 18-29-year-olds are the group that is most at risk for identity theft. Those 18 and under are becoming a larger target group as well.

teen identity theft

What is Identity Theft?

Identity theft is when someone steals your social security number, birth date, and other identifying information and pretends to be you so they can apply for credit cards, mortgages, loans, or commit other types of fraud like filing a tax return with the IRS to get a refund. Scammers are often total strangers, but they can also be someone related to you or a close friend.

Unfortunately, identity theft is very common, and children and teens are often targeted due to the fact they are not yet using their credit.

Why Are Teens Targeted for Identity Theft?

Teenagers make great targets for scams for a number of reasons. Identity thieves target people who are easiest and who won’t notice the fraud so they can maximize their profits. Some reasons that these criminals target teens are:

Online Use - Teens spend a large amount of time online signing up for accounts, gaming, and communicating on social media. This makes them very visible as targets. They may also not be stingy with sharing personal details, unaware of the dangers.

Undetected Use - Teens won’t start using their credit to take out loans for a while; therefore, the fraudster can use their identity and reap the benefits sometimes for years before the damage is detected. Usually, teens realize something is wrong when they apply for a driver’s license or attend college and try to take out school loans.

Unworried - Teens also tend to be unconcerned about identity theft and don’t worry about the consequences believing it won’t happen to them. That’s no guarantee, and that lax attitude may put them at risk.

What is Teen Identity Theft, How Do Thieves Steal it?

Teenage identity theft can happen in various ways; it is the same for teens as adults. Sometimes scammers steal your mail, hack into your computer or mobile device and steal information that way. If teens are included in any data breaches, their information may be compromised. Many schools have been targeted for data breaches lately. A phishing email is another tool used by identity thieves to get an unsuspecting teen to click a link, enter information or unwittingly download malicious software.

Unfortunately, due to the fact that a young person’s information can be used for so long, teens are particularly vulnerable to becoming victims of identity theft. According to NBC News, a thief can purchase a child’s social security number on the dark web for about $2.

Red Flags That Your Teen’s Identity Has Been Stolen

Some warning signs that your teenager may be a victim of teen identity theft are:

  • They start receiving pre-approved credit card offers and loans in the mail. 
  • They receive a bank statement or credit card statement in your child’s name, and they have no accounts.
  • You receive calls from a collection agency about overdue balances on fraudulent credit file accounts.
  • They apply for a student loan or driver’s license and find out that someone already has one using their social security number.
  • Your child’s credit report shows accounts and a full credit history that does not belong to them. 
  • Your teen is arrested for a crime they never committed.

Teenage Identity Theft

How To Stay Safe from Teen Identity Theft

Cleaning up identity theft is much more complicated than preventing it. Thankfully, there are steps you can take to prevent teen identity theft.

  • Always be sure to be cautious about giving out personal information like your social security number, birth date, bank account details, your home address, phone numbers, or mother’s maiden name.
  • Never download software from untrusted sources.
  • Do not click links in email or text messages. Visit the website yourself using a clean browser window.
  • Monitor your credit report, you can get a free copy every year.
  • Put a credit freeze on your child’s credit report until they need it. That way, no one can open new accounts in their name without you thawing it. Contact each of the credit reporting agencies to do this. 
  • Shred documents with personal information on them before throwing them in the trash.
  • Always use very strong passwords on computers, tablets, and mobile phones.
  • Avoid storing personal information on a cell phone without using a biometric to secure it like FaceID or Fingerprint ID. 
  • Keep computers and mobile devices locked with a PIN.
  • Store your social security card and birth certificate at home in a safe location. 
  • Protect your PIN when entering it at a gas station or ATM. 
  • Never put your social security number on your resume.

What to Do if You Are the Victim of Identity Fraud

If you do become the victim of identity fraud, take the steps below as soon as possible.

  • Contact local law enforcement and file a report.
  • Put a fraud alert on your credit report with all three major credit bureaus (Experian, TransUnion, and Equifax).
  • Contact the FTC to file a complaint online or by calling 1-877-438-4338.
  • Review all your bank and credit card accounts and request new cards if anything has been tampered with. 
  • Get a free copy of your credit report every year to review all activity and verify the information.
  • Sign up for credit and identity monitoring to let the experts keep an eye on things for you. 
  • Contact the Identity Theft Resource Center for more help.
About the Author
IDStrong Logo

Related Articles

What is Mail Theft and How to Prevent It in 3 Simple Steps

One of the many ways that identity thieves get their hands on your personal information is through ... Read More

Credit Card Fraud: What Is It and How To Protect Yourself Against It

Credit card fraud is a fact of life, and most Americans have experienced it or know someone who ha ... Read More

Lost or Stolen Phone? Don’t Panic, Follow These Steps

Most of us are tethered to our smartphones like a lifeline. In these tiny little computers, we car ... Read More

Stolen or Lost Wallet: What to Do?

Anyone who has ever lost their wallet or purse, or had it stolen, knows that instant spark of pani ... Read More

7 Most Common Types of Identity Theft That Can Happen to You

Identity theft is a major concern for many Americans these days with data breaches, ransomware att ... Read More

Latest Articles

What is Single Sign-On: The Benefits and Importance of Implementing SSO

What is Single Sign-On: The Benefits and Importance of Implementing SSO

Every day, more people get online - most do it for leisure, but organizations are increasingly moving into the digital environment.

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close