Creating an alternate identity

by | Jul 23, 2022 | Anonymous Living, Creating an alternate identity, New Identity | 2 comments

How to Create a New Identity: A Fictional Exploration

Let me begin by stating that I am making this entire story up on how to create a new identity. Imagine you are in charge of sending sleeper spies into the US.

The year is 1983, and the landscape of identity creation is rapidly evolving. As technology advances, identity databases grow more sophisticated, making it increasingly challenging to produce alternate identities. Just a decade ago, the process was relatively straightforward: one could arrive in the country and apply for a driver’s license, Social Security card, and bank account, often using the identity of a deceased child. Today, the complexities have multiplied, and these challenges will continue to intensify.

Identity Farming: The Concept

Identity farming involves creating alternate identities over a long period. Here’s a fictional scenario to illustrate the concept:

  1. Creating Identities for Children: Begin by applying for Social Security numbers for a few children. This is the foundation of identity farming. Once you have Social Security numbers, you can gradually build their identities.
  2. Establishing Financial History: As time passes, open bank accounts for these children. Start small with savings accounts, then gradually move to checking accounts. Over the years, ensure regular transactions, such as small deposits and withdrawals, to establish a credible financial history.
  3. Building Credit: Apply for credit cards in their names as they “grow” older. Maintain these accounts responsibly by making purchases and paying off balances on time. This will create a strong credit history that is crucial for a believable identity.
  4. Registering for Taxes and Voting: Prepare their tax reports annually. Even if they have minimal income, filing taxes will give them legitimacy. Register them to vote once they reach the legal age. This step further ties them into government databases.
  5. Creating a Physical Presence: Assign addresses to these identities, even if it’s just a mailbox. A consistent address is essential for receiving mail, government documents, and other verification forms.
  6. Education Records: Create records showing that these children are being homeschooled. This can include fabricated report cards, teacher evaluations, and even participation in extracurricular activities.

Overcoming Specific Challenges

To maintain these identities, you might need someone to sign documents as parents or guardians. Doctors must complete birth certificates, so you may need a cooperative doctor willing to help. Completing documents that attest to homeschooling these children can further legitimize their existence.

Financial Activity: Regular financial activity is essential to keep the identities believable. This includes depositing money into their bank accounts, withdrawing from ATMs, and using their credit cards for everyday purchases. Each transaction builds a credible financial history.

Physical Presence: Although you cannot obtain driver’s licenses and photo IDs in their names, this might not be a significant hurdle. With over 20 million adult citizens in the US lacking photo IDs, this absence might not raise immediate red flags.

Exploring the Possibilities

Despite these hurdles, identity farming could successfully create an alternate identity. The question remains: Is there any aspect of your life for which you must appear physically?

The “Highlander Effect”

Immortals might potentially use this method to perpetuate themselves by creating their children, taking on those identities over time, and then eliminating their parents. They might even appear in their driver’s license photos while sporting blue spiked hair for the boy and a beard for the father. This concept is supposedly popular in Highlander fan literature. The goal is not to invent a new threat for a movie storyline but to highlight data’s critical role in our daily lives.

The Role of Data in Our Lives

We all have a data shadow that follows us around. More and more institutions are interacting with our data shadows rather than with us, creating an alternate identity, as I’ve said. When we apply for a driver’s license or passport, we occasionally cross paths with our data shadows, and earlier, less secure exchanges verify those contacts. The rest of the world ignores the tenuous bond between us and our plastic cards, assuming that our photo IDs permanently attach us to our data shadows. (And REAL-ID won’t help, either.)

My impression is that our data shadows are becoming different from us and are taking on a life of their own. Our shadows are the current focus; we are incidental. We might even lose our need for these shadows as our society depends more and more on them. Without us, our data shadows can lead perfectly regular lives.

Case Studies

  • Case Study 1: The Misuse of Data Shadows in Identity Theft
    • A criminal group successfully obtained personal information through data breaches.
    • They used this data to create fraudulent identities, open bank accounts, and apply for loans.
    • Victims discovered the theft only after their credit scores plummeted, highlighting how their data shadows had been manipulated without their knowledge.
  • Case Study 2: Data Shadows in Healthcare
    • An individual received incorrect medical treatment due to a hospital database mix-up.
    • Their data shadow had been merged with another patient’s records, leading to dangerous prescription errors.
    • This case underscores the critical importance of accurate data management and the potentially life-threatening consequences of errors.

Case Studies

  • Case Study 3: The Impact of Data Shadows on Employment
    • A job applicant was denied employment after a background check showed a criminal record.
    • Further investigation revealed the record belonged to someone with a similar name and date of birth.
    • The applicant’s data shadow had been incorrectly linked to the criminal record, causing significant personal and professional setbacks.
  • Case Study 4: Financial Exclusion Due to Data Shadows
    • A person applying for a mortgage was denied due to a poor credit history that wasn’t theirs.
    • Their data shadow included inaccuracies from identity fraud incidents years prior.
    • Despite proving their true identity, the errors in their data shadow made financial recovery and obtaining loans extremely difficult.
  • Case Study 5: Government Surveillance and Data Shadows
    • Activists found themselves under scrutiny due to their online activities.
    • Their data shadows, including social media interactions and browsing history, were used by authorities to build profiles and monitor their movements.
    • This case highlights concerns about privacy and the extent to which data shadows can influence personal freedoms and security.

These case studies illustrate the growing influence of data shadows in various aspects of life and emphasize the need for careful data management and personal vigilance in protecting one’s digital identity.

Conclusion

This fictional exploration underscores data’s critical role in daily life and highlights the complexities and theoretical possibilities of creating an alternate identity. Navigating this intricate process requires an in-depth understanding of legal, financial, and personal data management, making it crucial to seek expert guidance.

Creating a new identity involves numerous steps and considerations, such as:

  1. Legal Compliance: Understanding and adhering to legal frameworks is essential. Failure to do so can result in severe consequences, including legal action and financial penalties.
  2. Data Management: Building and maintaining a credible identity requires meticulous management of various data points, including financial transactions, tax filings, and educational records. This ensures the identity appears authentic and trustworthy.
  3. Security Measures: Protecting your new identity from detection and fraud requires robust security measures. This includes using secure communication channels, encrypted data storage, and consistent monitoring of your digital footprint.
  4. Financial Planning: Establishing and maintaining a solid financial history is crucial. This involves opening and managing bank accounts, credit cards, and other financial instruments in the new identity’s name.
  5. Expert Consultation: Consulting with professionals with experience and expertise in identity creation can significantly increase the chances of success. They can provide tailored advice, identify potential pitfalls, and offer risk mitigation strategies.

Solutions

Amicus International specializes in providing professional advice and solutions tailored to your unique needs. With a team of experienced experts, they offer a comprehensive range of services, including:

  • Legal Advice: Navigating the legal aspects of identity creation to ensure compliance and minimize risks.
  • Data Strategy: Develop a robust data management plan to build a credible and sustainable identity.
  • Security Solutions: Implementing advanced security measures to protect your new identity from detection and fraud.
  • Financial Services: Assisting with the creation and management of financial histories, including bank accounts, credit cards, and tax filings.
  • Ongoing Support: Providing continuous support and monitoring to ensure your new identity’s long-term success and security.

Whether you’re exploring creating a new identity for privacy, security, or other reasons, the experienced team at Amicus International can help you navigate these challenges with confidence and discretion. By leveraging their expertise, you can ensure that every aspect of your new identity is meticulously planned and executed, minimizing risks and maximizing the chances of success.

Contact Amicus International today to learn more about how they can assist you in achieving your goals and securing your future with a new identity. Their professional advice and comprehensive services provide a solid foundation for creating a sustainable and credible alternate identity, empowering you to live with peace of mind and security.