{"id":6801,"date":"2024-07-11T06:58:06","date_gmt":"2024-07-11T10:58:06","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=6801"},"modified":"2025-03-18T18:39:21","modified_gmt":"2025-03-18T18:39:21","slug":"who-do-i-contact-if-someone-is-using-a-deceased-persons-identity","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/","title":{"rendered":"How to Report Identity Theft of a Deceased Person? Who to Call?"},"content":{"rendered":"\n<p><span style=\"font-weight: 400;\">Losing someone you love is devastating and difficult to go through. Now, imagine the horror of discovering their identity has been stolen, their memory tainted by fraud and deceit. What\u2019s even worse is that this isn\u2019t a rare occurrence. In fact, it\u2019s a growing threat.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Scammers prey on the vulnerable, and they don\u2019t discriminate, either.&nbsp; They steal from the young and old, the rich and poor, tearing apart the lives of those already grappling with immeasurable loss.&nbsp;<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-identity-theft-of-the-deceased\"><span class=\"ez-toc-section\" id=\"What_Is_Identity_Theft_of_the_Deceased\"><\/span><span style=\"font-weight: 400;\">What Is Identity Theft of the Deceased?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Identity theft after death is not a victimless crime. The consequences are devastating and far-reaching. Consider the financial ruin these predators unleash. Bank accounts are drained, credit cards maxed out, and loans taken out in the deceased&#8217;s name.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The surviving family, already burdened with grief, is left to untangle the financial mess, often facing insurmountable debt and shattered credit scores. The emotional toll is immense, a cruel twist of the knife during an already difficult time.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">But the damage doesn&#8217;t stop at finances. These criminals can wreak havoc on the deceased&#8217;s reputation, posting harmful content or spreading false information under their name.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The deceased becomes a puppet in a twisted game, their legacy tarnished by the actions of malicious actors. The pain inflicted on loved ones is immeasurable as they witness the digital desecration of the person they cherished.<\/span><\/p>\n\n\n\n<figure>\n  <picture>\n    <!-- Mobile image -->\n    <source \n      srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/How_to_Report_Identity_Theft_of_a_Deceased_Person-1-scaled.jpg\"\n      media=\"(max-width: 767px)\"\n    >\n\n    <!-- Desktop fallback (required) -->\n    <img decoding=\"async\" \n      src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/How_to_Report_Identity_Theft_of_a_Deceased_Person-scaled.jpg\"\n      alt=\"How to Report Identity Theft of a Deceased Person\"\n      style=\"width:100%; height:auto;\"\n    >\n  <\/picture>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-are-deceased-individuals-targeted\"><span class=\"ez-toc-section\" id=\"Why_Are_Deceased_Individuals_Targeted\"><\/span><span style=\"font-weight: 400;\">Why Are Deceased Individuals Targeted?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">So why are the deceased targeted? The grim truth is that their information is often less protected. Many assume that once someone passes, their digital presence fades away.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">But social media accounts, email addresses, and online profiles often remain active, ripe for exploitation. Grieving families, understandably preoccupied with their loss, may not immediately address these digital vulnerabilities.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Criminals see this as an opportunity, preying on the assumption that loved ones are too overwhelmed to notice or take action. These predators are cunning and relentless.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">They scour obituaries and social media for personal details, using any scrap of information to piece together a digital puzzle. They may hack into email accounts, impersonate the deceased online, or even use their social security number to apply for credit.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">These tactics are not only illegal but morally reprehensible, exploiting the vulnerability of those who have already suffered a profound loss. The emotional distress inflicted on surviving family and friends is immeasurable, adding another layer of trauma to an already unbearable situation.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">These predators are cunning and relentless. They scour obituaries and social media for personal details, using any scrap of information to piece together a digital puzzle. They may hack into email accounts, impersonate the deceased online, or even use their social security number to apply for credit.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-report-identity-theft-of-a-deceased-person-who-do-i-contact\"><span class=\"ez-toc-section\" id=\"How_to_Report_Identity_Theft_of_a_Deceased_Person_Who_Do_I_Contact\"><\/span><span style=\"font-weight: 400;\">How to Report Identity Theft of a Deceased Person? Who Do I Contact?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">So, what should you do in the face of such a violation? For starters, swift action is a must. Don&#8217;t let these criminals continue to exploit your loved one&#8217;s identity.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Reach out to the following organizations and authorities immediately:<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-credit-bureaus\"><span class=\"ez-toc-section\" id=\"Credit_Bureaus\"><\/span><span style=\"font-weight: 400;\">Credit Bureaus<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">First, contact the major credit bureaus (Equifax, Experian, and TransUnion) and request a &#8220;deceased alert&#8221; be placed on your loved one&#8217;s credit reports. This prevents new accounts from being opened in their name. Provide them with a copy of the death certificate to verify the information.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-social-security-administration\"><span class=\"ez-toc-section\" id=\"The_Social_Security_Administration\"><\/span><span style=\"font-weight: 400;\">The Social Security Administration<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Next, notify the SSA (Social Security Administration) of your loved one&#8217;s passing. This is essential to prevent the misuse of their social security number for fraudulent purposes. The SSA will update their records accordingly and can offer guidance on further steps to take.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-banks\"><span class=\"ez-toc-section\" id=\"The_Banks\"><\/span><span style=\"font-weight: 400;\">The Banks<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Don&#8217;t forget about banks and financial institutions where your loved one held accounts. Alert them to the situation and provide them with a copy of the death certificate. They will freeze the accounts and guide you through the process of closing them or transferring them to the appropriate beneficiaries.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-social-media\"><span class=\"ez-toc-section\" id=\"Social_Media\"><\/span><span style=\"font-weight: 400;\">Social Media<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">If your loved one had an active presence on <\/span><a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/social-media-blackmail-scams\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span style=\"font-weight: 400;\">social media<\/span><\/a><span style=\"font-weight: 400;\">, reach out to those platforms, as well. Most social media companies have specific procedures for handling accounts of deceased users. You can typically request the removal of the account or have it memorialized.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-law\"><span class=\"ez-toc-section\" id=\"The_Law\"><\/span><span style=\"font-weight: 400;\">The Law<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Finally, don&#8217;t hesitate to reach out to your <\/span><a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/what-can-the-police-do-about-blackmail\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span style=\"font-weight: 400;\">nearest law enforcement<\/span><\/a><span style=\"font-weight: 400;\"> agency. File a police report detailing the identity theft and provide any evidence you have gathered. This not only documents the crime but also initiates an investigation that could lead to the apprehension of the perpetrator.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Remember, thorough documentation is key. Keep records of all your communications with these organizations, including names, dates, and any reference numbers you receive. This paper trail will be invaluable if you need to escalate the issue or pursue legal action.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The proactive steps you take will go a long way in protecting your loved one\u2019s identity. But it will also send a powerful message to the criminals responsible for stealing it.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-can-digital-forensics-help\"><span class=\"ez-toc-section\" id=\"How_Can_Digital_Forensics_Help\"><\/span><span style=\"font-weight: 400;\">How Can Digital Forensics Help?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Losing someone we love is devastating, and <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/phishing-and-identity-theft\/\" type=\"link\" id=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/phishing-and-identity-theft\/\">having their identity stolen<\/a> on top of that is just cruel. It&#8217;s a nightmare no one should have to face alone. Here at Digital Forensics, we get it. The shock, the anger, the confusion \u2014 it&#8217;s overwhelming, but we&#8217;ve been down this road before.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The good news is that you have us on your side. We\u2019re a team of digital experts who specialize in bringing these scammers to justice. Think of us as your partners in this \u2013 we&#8217;re here to guide you through the whole process every step of the way.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">We know time is of the essence in these situations, so we offer a rapid response service that gets you a full report within 24 hours. And with a 90% success rate for our clients, you can trust that we\u2019ll work as hard as it takes to get the results you want. <\/span><a href=\"https:\/\/www.digitalforensics.com\/contact-us\" target=\"_blank\" rel=\"noreferrer noopener\"><span style=\"font-weight: 400;\">Contact us today<\/span><\/a><span style=\"font-weight: 400;\"> to talk.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Sources:<\/span><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.investopedia.com\/personal-finance\/top-three-credit-bureaus\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><span style=\"font-weight: 400;\">Top 3 Credit Bureaus: How They Work and What They Know About You | Investopedia<\/span><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.ssa.gov\/agency\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><span style=\"font-weight: 400;\">Contact Social Security | SSA<\/span><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.ncoa.org\/article\/top-5-financial-scams-targeting-older-adults\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><span style=\"font-weight: 400;\">The Top 5 Financial Scams Targeting Older Adults | NCOA<\/span><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.usa.gov\/report-crime\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><span style=\"font-weight: 400;\">Report a crime | USAGov<\/span><\/a><\/li>\n<\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"Losing someone you love is devastating and difficult to go through. Now, imagine the horror of discovering their&hellip;","protected":false},"author":126,"featured_media":6837,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[773],"tags":[],"class_list":{"0":"post-6801","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-extortion","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Report Identity Theft of a Deceased Person<\/title>\n<meta name=\"description\" content=\"Did a scammer steal the identity of someone you love who has passed away? Find out what your options are and what you can do to fight back.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Report Identity Theft of a Deceased Person? Who to Call?\" \/>\n<meta property=\"og:description\" content=\"Did a scammer steal the identity of someone you love who has passed away? Find out what your options are and what you can do to fight back.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-11T10:58:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-18T18:39:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/07\/BLOG_DFC_WHO_DO_I_CONTACT_IF_SOMEONE_IS_USING_A_DECEASED_PERSONS_IDENTITY_1080x1080px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"How to Report Identity Theft of a Deceased Person? Who to Call?\",\"datePublished\":\"2024-07-11T10:58:06+00:00\",\"dateModified\":\"2025-03-18T18:39:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\\\/\"},\"wordCount\":1015,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/BLOG_DFC_WHO_DO_I_CONTACT_IF_SOMEONE_IS_USING_A_DECEASED_PERSONS_IDENTITY_1080x1080px.jpg\",\"articleSection\":[\"Resources and Articles for Victims of Extortion Scams\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\\\/\",\"name\":\"How to Report Identity Theft of a Deceased Person\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/BLOG_DFC_WHO_DO_I_CONTACT_IF_SOMEONE_IS_USING_A_DECEASED_PERSONS_IDENTITY_1080x1080px.jpg\",\"datePublished\":\"2024-07-11T10:58:06+00:00\",\"dateModified\":\"2025-03-18T18:39:21+00:00\",\"description\":\"Did a scammer steal the identity of someone you love who has passed away? Find out what your options are and what you can do to fight back.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/BLOG_DFC_WHO_DO_I_CONTACT_IF_SOMEONE_IS_USING_A_DECEASED_PERSONS_IDENTITY_1080x1080px.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/BLOG_DFC_WHO_DO_I_CONTACT_IF_SOMEONE_IS_USING_A_DECEASED_PERSONS_IDENTITY_1080x1080px.jpg\",\"width\":1080,\"height\":1080,\"caption\":\"Identity theft after death: Know who to contact for help.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources and Articles for Victims of Extortion Scams\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Report Identity Theft of a Deceased Person? Who to Call?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Report Identity Theft of a Deceased Person","description":"Did a scammer steal the identity of someone you love who has passed away? Find out what your options are and what you can do to fight back.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/","og_locale":"en_US","og_type":"article","og_title":"How to Report Identity Theft of a Deceased Person? Who to Call?","og_description":"Did a scammer steal the identity of someone you love who has passed away? Find out what your options are and what you can do to fight back.","og_url":"https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2024-07-11T10:58:06+00:00","article_modified_time":"2025-03-18T18:39:21+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/07\/BLOG_DFC_WHO_DO_I_CONTACT_IF_SOMEONE_IS_USING_A_DECEASED_PERSONS_IDENTITY_1080x1080px.jpg","type":"image\/jpeg"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"How to Report Identity Theft of a Deceased Person? Who to Call?","datePublished":"2024-07-11T10:58:06+00:00","dateModified":"2025-03-18T18:39:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/"},"wordCount":1015,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/07\/BLOG_DFC_WHO_DO_I_CONTACT_IF_SOMEONE_IS_USING_A_DECEASED_PERSONS_IDENTITY_1080x1080px.jpg","articleSection":["Resources and Articles for Victims of Extortion Scams"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/","url":"https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/","name":"How to Report Identity Theft of a Deceased Person","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/07\/BLOG_DFC_WHO_DO_I_CONTACT_IF_SOMEONE_IS_USING_A_DECEASED_PERSONS_IDENTITY_1080x1080px.jpg","datePublished":"2024-07-11T10:58:06+00:00","dateModified":"2025-03-18T18:39:21+00:00","description":"Did a scammer steal the identity of someone you love who has passed away? Find out what your options are and what you can do to fight back.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/07\/BLOG_DFC_WHO_DO_I_CONTACT_IF_SOMEONE_IS_USING_A_DECEASED_PERSONS_IDENTITY_1080x1080px.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/07\/BLOG_DFC_WHO_DO_I_CONTACT_IF_SOMEONE_IS_USING_A_DECEASED_PERSONS_IDENTITY_1080x1080px.jpg","width":1080,"height":1080,"caption":"Identity theft after death: Know who to contact for help."},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/who-do-i-contact-if-someone-is-using-a-deceased-persons-identity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Resources and Articles for Victims of Extortion Scams","item":"https:\/\/www.digitalforensics.com\/blog\/extortion\/"},{"@type":"ListItem","position":3,"name":"How to Report Identity Theft of a Deceased Person? Who to Call?"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/6801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=6801"}],"version-history":[{"count":6,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/6801\/revisions"}],"predecessor-version":[{"id":14478,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/6801\/revisions\/14478"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/6837"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=6801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=6801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=6801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}