top of page
griffin jd.jpg

PROJECT: CHILD IDENTITY THEFT

YOU MAY SHARE THIS PUBLIC DOCUMENT

 

Child identity theft is a growing concern worldwide, including in South Africa.

Criminals use children’s personal information, such as ID numbers, to open fraudulent accounts or commit crimes.

Since children typically do not check their credit profiles, such scams can go undetected for years. 

Raising awareness is essential to prevent such fraud.

 

KEY FACTS:

  • TARGETING UNUSED IDENTITIES:

    • Scammers target children's ID numbers because they are rarely monitored.

  • LONG-TERM CONSEQUENCES:

    • Fraudulent activities under a child's name may affect their creditworthiness, education loans, and job opportunities later in life.

  • SOURCES OF INFORMATION:

    • School or medical records breaches.

    • Phishing scams directed at parents.

    • Hacking databases of government or private organisations.

  • COMMON SCAMS:

    • False applications for credit cards or loans.

    • Using a child’s ID number for employment or to commit crimes.

    • Purchasing goods or services fraudulently.

 

PREVENTION:

  • SAFEGUARD PERSONAL INFORMATION:

    • Keep children’s birth certificates and ID copies secure.

    • Avoid sharing their details on unsecured platforms or with unverified entities.

  • EDUCATE PARENTS AND GUARDIANS:

    • Teach parents about phishing scams.

    • Encourage them to verify requests for personal information.

  • MONITOR RECORDS:

    • Periodically check if accounts or loans are linked to the child’s ID.

    • Request a credit report using their ID number (where applicable).

  • SCHOOLS AND INSTITUTIONS:

    • Ensure schools, healthcare providers, and other institutions handling children’s information adhere to strict data protection standards.

    • Advocate for awareness programs in schools.

  • GOVERNMENT MEASURES:

    • Advocate for better safeguards in systems like the Department of Home Affairs.

    • Push for laws and policies addressing child identity fraud specifically.

 

Child identity theft in the cyber realm can lead to a range of crimes due to the misuse of stolen personal information online. Cybercriminals often target children because they typically have clean credit histories

and are less likely to monitor their digital footprint.


  • SOCIAL MEDIA AND ONLINE ACCOUNT FRAUD:

    • Fake social media profiles: Using a child's name and identity to create fraudulent profiles for scams, cyberbullying, or impersonation.

    • Phishing: Sending messages under the child's name to trick others into revealing personal or financial information.

    • Online reputation damage: Posting inappropriate or illegal content under the child's identity leads to long-term reputation issues.

  • E-COMMERCE AND ONLINE SHOPPING FRAUD:

    • Unauthorised purchases: Using a child’s identity to create accounts on e-commerce platforms like Amazon or eBay to make fraudulent purchases.

    • Subscription fraud: Signing up for streaming services, gaming accounts, or other online subscriptions using stolen child identities.

  • CYBER EXTORTION AND EXPLOITATION:

    • Blackmail: Threatening the child or their family after obtaining sensitive information from stolen accounts.

    • Exploitation: Using stolen identities to access child-targeted platforms or engage in predatory behaviour.

  • DATA BREACH EXPLOITATION:

    • Dark web transactions: Selling a child's personal information, such as ID numbers, on the dark web for profit.

    • Credential stuffing: Using stolen credentials to access other accounts linked to the child or their family.

  • FINANCIAL CYBERCRIMES:

    • Credit card fraud: Opening online credit card accounts or virtual wallets (like PayPal or Venmo) in the child's name to make illicit transactions.

    • Cryptocurrency fraud: Setting up crypto trading or wallet accounts using a child’s identity to conduct illegal trades or launder money.

  • EDUCATIONAL PLATFORM FRAUD:

    • Application Fraud: Using stolen identities to apply for student loans or financial aid.

    • Test and Certification Fraud: Impersonating the child online to take standardized tests or obtain certifications fraudulently.

  • ONLINE EMPLOYMENT FRAUD:

    • Gig Economy Exploitation: Registering on freelance platforms like Fiverr or Uber Eats using the child’s identity to earn income or commit fraud.

    • Fake Job Postings: Using a child’s identity to set up fake job advertisements and scam others.

  • HEALTH AND INSURANCE CYBER FRAUD:

    • Online Health Services: Accessing telemedicine services or purchasing prescriptions under a child's name.

    • Medical Records Theft: Using online portals to alter or misuse medical histories tied to the child’s identity.

  • GAMING AND VIRTUAL WORLD FRAUD:

    • Gaming Account Fraud: Hacking or creating gaming accounts under a child’s name to steal in-game currency or conduct illegal trades.

    • Virtual Property Theft: Using the child's identity to purchase and sell virtual assets in games or metaverse platforms.

  • CYBERTERRORISM OR RADICALISATION:

    • Impersonation: Using a child’s identity to register on extremist websites or forums, leading to false links with criminal activity.

    • Cyber Harassment: Conducting cyberattacks under the child’s name to harass individuals or organisations.

  • INTERNET OF THINGS (IoT) EXPLOITATION:

    • Smart Device Fraud: Using stolen identities to register or hack into IoT devices (e.g., smart home systems, wearable devices) for surveillance or malicious activity.

  • DARK WEB ACTIVITY:

    • Identity Leasing: Selling the child’s stolen identity to others seeking a clean slate to evade detection.

    • Cyber Black Market Transactions: Using the child’s credentials to purchase illegal goods, including drugs or weapons.

 

CONSEQUENCES:

  • Long-term reputational damage, including false online activity, may create records difficult to erase.

  • The child may face challenges accessing digital services or platforms when the fraud is discovered.

  • Cybercrimes tied to their identity can cause stress, anxiety, and loss of trust in online spaces.

  • Fear of repeated victimisation as a child may become overly cautious or fearful of using digital platforms, worrying that their identity will be misused again.

  • Realising that their personal information was exploited can make them distrust others, especially authority figures or institutions tasked with their protection.

  • If a child's identity is misused (e.g., posting offensive content or committing cybercrimes), they may face judgment or exclusion from peers and fear the social stigma stemming from it.

  • They may feel personally responsible for the crime and extremely guilty, even though it was beyond their control.

  • Feeling vulnerable because of the loss of control over their identity can make children feel powerless or devalued.

  • For older children or teens, the misuse of their identity can lead to struggles with self-perception and confidence.

  • Some children may become afraid to engage with technology or social media, limiting their participation in normal social or educational activities.

  • They might develop a general fear of using the internet, believing it is unsafe.

  • Knowing someone exploited their personal information can lead to feelings of anger and helplessness.

  • Legal or administrative efforts to clear their name can be confusing and prolonged, overwhelming them.

  • Younger children may struggle to articulate what happened or how they feel, leading to emotional withdrawal.

  • Social Alienation: If their reputation has been damaged, they may experience bullying or exclusion, further isolating them.

  • Constant stress about the consequences of identity theft, such as ruined credit or false accusations, can contribute to feelings of sadness and hopelessness.

  • If their daily life is disrupted by the aftermath of identity theft, it can lead to a sense of helplessness.

  • Worry and stress related to identity theft can make it harder for children to concentrate on schoolwork or other activities.

  • Persistent emotional distress may lead to a decline in academic performance or participation in extracurricular activities.

  • Families may experience tension if parents or siblings struggle to understand the child's emotional reaction or inadvertently blame them for the situation.

  • If identity theft has financial repercussions for the family, this stress can spill over into the child's emotional well-being.

  •  Even after the issue is resolved, children may carry a lifelong fear of being targeted again.

  • The trauma may lead to reluctance to manage personal financial matters or engage in activities that require trust in others.

 

WHAT TO DO IF YOUR CHILD'S IDENTITY IS STOLEN:

  • File a police report and report the fraud to the South African Police Services (SAPS).

  • Alert all financial institutions by informing banks, creditors, and other institutions involved in the fraudulent transactions.

  • Contact the relevant credit bureaus and notify Experian, TransUnion, or other local credit bureaus to flag the ID number.

  • Notify the Department of Home Affairs as they may assist in verifying and rectifying ID-related issues.

  • Seek legal advice for assistance in clearing the fraud.

 

By taking proactive measures and spreading awareness, communities in South Africa can protect children from identity theft and its long-term repercussions. Child identity theft is a growing concern worldwide, including in South Africa.


Criminals use children’s personal information, such as ID numbers, to open fraudulent accounts or commit crimes.

Since children typically do not check their credit profiles, such scams can go undetected for years. 

Raising awareness is essential to prevent such fraud.

 

Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Channel.

This channel is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.


How to Join the WhatsApp Channel:

1. Make sure you have the latest version of WhatsApp on your device.

2. Click on the link below to join the Mike Bolhuis Daily Projects WhatsApp Channel:

3. Follow the prompts to join the channel.

4. Make sure you click on "Follow", then click on the "bell"-icon (🔔)

 
CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.

ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.
 

Regards,

Mike Bolhuis

Specialist Investigators into

Serious Violent, Serious Economic Crimes & Serious Cybercrimes

PSIRA Reg. 1590364/421949

Mobile: +27 82 447 6116

Fax: 086 585 4924

Follow us on Facebook to view our projects -


EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.


STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.


POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv

 
SSS TASK TEAM:
 
 

Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.


Our mailing address is:

Mike Bolhuis Specialised Security Services

PO Box 15075 Lynn East

Pretoria, Gauteng 0039

South Africa

Add us to your address book


THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.

950 views0 comments

Recent Posts

See All

コメント


bottom of page