If you want an eye-opening look at how identity theft is being monetized, read the indictment of Christina Chapman. It’s a master class in how fraudulent job identity schemes work—and how disturbingly easy it is to pull off.
I was already familiar with some of the basic tactics, but a few details stopped me in my tracks:
Pre-Vetting the Stolen You
When bad actors buy identity packs off the dark web, they typically get 10–15 profiles, including name, Social Security number, driver’s license, and sometimes even work history and education credentials.
But here's the twist I didn’t expect: they run background checks on the identities before deciding which one to use.
Let that sink in.
They’re setting up accounts with background check platforms, plugging in the stolen profiles, and discarding any that come back with a criminal record or other red flags.
In other words, your identity might not even be good enough for scammers.
Drug Testing? No Problem.
I assumed drug tests would be a major blocker for fraud—but not so.
Turns out companies often allow applicants to present temporary driver’s licenses at the drug screening site. These documents usually don’t include photos, holograms, or watermarks.
So, the scammers just send someone else—often a clean tester—to show up with the fake name and pass the test. The clinic checks the ID, sees a matching name, and lets it slide.
Meanwhile, the real person behind the stolen identity is completely unaware that they’ve “p(i)assed” a drug test they never took.
A Taxing Problem
They filed taxes using the stolen identities so they could claim the tax refunds. ***This service was an add-on.
However clever Ms Chapman might be in the scammer arts, she is clearly not a good business person. In exchange for risking a lifetime in federal prison, Ms. Chapman made only $176,000 over a two year period. She ended up getting 9 years.
Bottom line is that she helped funnel nearly $17 million to North Korea—and made less than $20,000 a year for her trouble.
Girl needs a union.