The risks of identity theft include financial loss, wrongful arrest, reputational damage, emotional trauma, and long-term legal harm, as shown by the extraordinary William Woods case. Identity theft is often discussed as a cybercrime involving credit cards or hacked passwords, yet the real danger reaches far beyond bank fraud.
In one of the most disturbing modern cases, a man allegedly stole another person’s identity, built a prosperous life under that name, and persuaded authorities that the true victim was the fraud. This article explains how identity theft works, why victims struggle to prove the truth, what institutions often miss, and how individuals can reduce exposure.
It also examines the legal, psychological, and financial consequences that can last decades. Readers searching for practical guidance, historical context, and prevention strategies will find a complete reference here.
Key Takeaways
- Identity theft can destroy finances, freedom, and reputation.
- Victims may spend years proving who they are.
- Basic document security reduces many common risks.
- Institutions must verify identity with stronger controls.
- Early detection greatly limits long-term damage.
Identity theft is one of the most damaging crimes in the modern world because it attacks the foundation of daily life: proof of who you are. A person’s name, date of birth, government numbers, address history, and biometric records are used to access banking, employment, healthcare, housing, education, and travel. When those records are stolen or manipulated, the victim may lose control over systems that determine opportunity and credibility.
The phrase “the risks of identity theft” often brings to mind unauthorised credit card charges or phishing emails. Those are serious threats, but the deeper danger is that identity is the operating system of citizenship. Once corrupted, many parts of life malfunction at the same time.
A true story that revealed the worst-case scenario
The case involving William Woods and Matthew Keirans shocked many observers because it illustrated identity theft in its most extreme form. According to widely reported court records, the accused allegedly took the identity of William Woods decades ago after the two met while working at a hot dog stand. Over time, he reportedly obtained identification documents, opened accounts, married, had children, and secured a highly paid university position using the stolen name.
The most disturbing element was not only the theft itself, but the inversion of reality. When the real William Woods attempted to reclaim his identity, authorities were allegedly persuaded that Woods was the impostor.
He was jailed, then institutionalised, and reportedly medicated while insisting he was telling the truth. Only after determined investigative work and DNA evidence involving Woods’ biological father was the deception exposed. The impostor was later sentenced to prison.
This case demonstrates that identity theft can become systemic. Once false records are accepted by institutions, the burden of proof may fall on the victim.
Why identity theft is so dangerous
Identity theft is uniquely harmful because it combines multiple categories of damage at once. A stolen television can be replaced. A stolen bank card can be cancelled. A stolen identity can trigger legal disputes, debt claims, tax complications, employment barriers, housing denials, and criminal suspicion simultaneously.
Victims often face “administrative trauma”. This means repeated calls, forms, affidavits, police reports, credit disputes, document requests, and long waiting periods. The emotional toll can be severe. Many victims report anxiety, insomnia, humiliation, and distrust of institutions.
When identity theft lasts for years, it can distort life history itself. Employment records, marriages, addresses, criminal databases, and tax filings may become tangled with the wrong person.
Common forms of identity theft
Identity theft is not limited to dramatic impersonation cases. It appears in several common forms.
Financial identity theft occurs when criminals open credit cards, loans, or bank accounts using stolen details. This can damage credit scores and lead to debt collection.
Tax identity theft happens when fraudsters file tax returns in another person’s name to claim refunds.
Medical identity theft occurs when someone uses another person’s identity for treatment or prescriptions, potentially corrupting medical records.
Employment identity theft happens when a stolen identity is used to obtain work, sometimes creating tax liabilities for the victim.
Criminal identity theft occurs when an offender gives another person’s name during arrest or investigation.
Synthetic identity theft blends real and fabricated information to create a new false identity.
How criminals steal identities
Most identity theft begins with information leakage. Criminals gather fragments of data from breached databases, discarded mail, stolen wallets, phishing emails, fake job applications, social media oversharing, or compromised devices.
Once enough data points are collected, the criminal can answer security questions, reset passwords, or persuade organisations that they are the legitimate person. In more sophisticated cases, forged supporting documents are used to reinforce the lie.
The Woods case suggests another uncomfortable truth: confidence and persistence can sometimes exploit weak verification systems. If institutions rely too heavily on paper trails without deeper validation, deception may continue for years.
Warning signs you should never ignore
Identity theft often reveals itself through small anomalies first. Unexpected bank transactions, denied loan applications, missing mail, debt notices, unknown accounts on credit reports, tax filing rejections, or unfamiliar medical bills all deserve immediate attention.
Another warning sign is being locked out of accounts after no action on your part. Password reset notifications you did not request may indicate takeover attempts.
If government agencies or employers question records that should be straightforward, investigate promptly. Administrative confusion can be an early indicator of identity misuse.
The financial cost of identity theft
The direct financial cost may include stolen funds, fraudulent debts, legal fees, lost wages, travel expenses, document replacement fees, and time away from work. Indirect costs can be larger. Damaged credit may increase borrowing costs for years through higher interest rates or denied financing.
Business owners and freelancers face additional risk. A compromised identity can affect payment systems, vendor relationships, tax compliance, and reputation with clients.
For families, identity theft can delay mortgages, student finance, insurance claims, and inheritance matters.

The psychological cost
Many discussions underestimate the mental impact. Victims frequently describe a sense of violation because identity theft invades personal history. It can create fear that systems meant to protect people are unreliable.
When authorities fail to believe the victim, distress intensifies. In the Woods story, the allegation that the real victim was treated as delusional shows how psychologically destructive institutional disbelief can become.
Stress-related health effects may follow prolonged disputes, especially when housing, employment, or liberty are at stake.
How to protect yourself
Prevention cannot eliminate all risk, but it can significantly reduce exposure. Protect core documents such as passports, birth certificates, national insurance or social security records, and banking statements. Use secure storage at home and avoid carrying unnecessary sensitive documents daily.
Use unique passwords and a reputable password manager. Enable multi-factor authentication wherever available. Monitor bank accounts and credit reports regularly. Shred sensitive mail before disposal. Be cautious with unsolicited calls or emails requesting personal data.
Limit public sharing of birthdays, addresses, schools, family names, and other details often used in security questions. Criminals build profiles from fragments.

What to do if you become a victim
Act quickly. Contact banks and card issuers to freeze or close compromised accounts. Change passwords immediately. Report the matter to relevant fraud agencies and police. Notify credit bureaus and request fraud alerts or freezes where available.
Keep a written chronology of every call, case number, letter, and representative name. Documentation matters. Identity theft cases often become evidence-driven disputes.
Request copies of records linked to fraudulent activity. If employment, tax, or criminal misuse is involved, seek qualified legal assistance early.
Persistence is essential. Many cases are resolved only after repeated escalation.
Lessons for governments and institutions
Identity systems require more than document matching. Stronger controls include biometric verification where lawful, cross-checking source records, anomaly detection, multi-step review for conflicting claims, and rapid correction channels for victims.
Front-line staff also need training. Fraud victims may appear frustrated, confused, or emotional because they are under pressure, not because they are dishonest.
The Woods case is a warning that bureaucracies can amplify fraud when assumptions go unchallenged.
Why this matters more in a digital era
As more services move online, identity becomes increasingly centralised. Banking, healthcare, education, tax filing, remote work, and benefits systems all depend on digital credentials. This creates convenience, but also concentration risk. A compromised identity can now affect more systems faster than in previous decades.
Artificial intelligence may increase phishing realism, voice cloning, and document forgery attempts. Defensive verification methods must evolve at the same pace.

How to avoid identity theft
One practical response to the risks of identity theft is to combine careful personal habits with a dedicated identity monitoring service. LifeLock by Norton is one of the best-known services in this category. It is designed to help detect suspicious use of your personal information, alert you quickly, and provide restoration support if identity theft occurs. While no service can prevent every form of fraud, using LifeLock by Norton can significantly improve early detection and response times.
The first step is choosing the membership tier that matches your needs. LifeLock by Norton typically offers several plans with increasing levels of monitoring, alerts, reimbursement coverage, and credit features. Individuals with simple needs may choose a basic plan focused on identity alerts. Families, business owners, travellers, and people with broader digital exposure often benefit from higher tiers that include credit bureau monitoring, larger reimbursement limits, and more extensive support.
Once enrolled, begin by completing your profile accurately. Add your full legal name, date of birth, address history, phone numbers, email addresses, bank account ranges where supported, and other identity markers requested by the platform. The system uses these data points to monitor for suspicious activity linked to your identity. Accuracy matters because incomplete details can reduce the quality of alerts.
Next, activate monitoring tools inside your dashboard. LifeLock by Norton commonly monitors potential misuse of your Social Security number, address changes, court records, dark web exposure, data breach notifications, and certain financial activity depending on plan level. If criminals attempt to use your information to open accounts or redirect mail, alerts may help you act before damage spreads.
Credit monitoring is one of the most valuable features on eligible plans. This can include monitoring from one or more major credit bureaus. If a new credit card, loan inquiry, or significant change appears on your file, you may receive a notification. That allows you to investigate quickly, dispute fraud, and place freezes where necessary. Fast action often determines whether identity theft becomes a minor inconvenience or a long-term financial crisis.
Dark web monitoring is another important feature. Stolen credentials, passwords, and personal data are often traded in hidden online marketplaces. LifeLock by Norton can scan for selected personal details such as email addresses, phone numbers, or other identifiers appearing in known illicit channels. If found, you can immediately change passwords, secure accounts, and tighten security settings.
Many users overlook device security, yet compromised devices often lead to stolen identities. Norton membership bundles may include antivirus protection, malware defence, secure VPN access, password management, and privacy tools. Install these tools on laptops, phones, and tablets. Keeping devices secure reduces the chance of keystroke theft, phishing compromise, or spyware capturing sensitive information.
Another strong feature is identity restoration support. If fraud occurs, LifeLock by Norton typically provides access to specialists who guide recovery. This may include contacting banks, filing paperwork, disputing fraudulent accounts, and rebuilding records. Some plans also include reimbursement for eligible expenses such as lawyers, experts, or stolen funds within policy terms. Always read current plan documentation for exact limits and conditions.
Families can gain value through household coverage options where available. Children are increasingly targeted because their credit files may remain unchecked for years. Monitoring a child’s identity can reveal misuse early, especially if someone attempts to create accounts using their details.
To get the most from LifeLock by Norton, treat alerts as urgent. Review every notification promptly. Confirm legitimate activity, challenge anything unfamiliar, and keep records of actions taken. Also maintain good habits outside the platform: use unique passwords, enable multi-factor authentication, protect physical mail, and avoid sharing sensitive details casually online.
Travellers and remote workers may especially benefit from VPN tools and continuous monitoring because they often rely on public networks, shared devices, or multiple digital services. Entrepreneurs and freelancers can also benefit because identity theft may interrupt invoicing, tax records, and business banking.
LifeLock by Norton works best as part of a layered defence model. It does not replace common sense or guarantee immunity from fraud. It adds surveillance, alerts, recovery assistance, and cybersecurity tools that many people would struggle to manage alone. In a world where identity is tied to finance, employment, healthcare, and reputation, that additional layer can be highly valuable.
Final thoughts
The risks of identity theft extend far beyond money. They include damaged reputation, blocked opportunity, emotional trauma, false imprisonment, and years spent proving basic facts. The William Woods case stands as one of the clearest examples of how devastating identity theft can become when institutions accept false narratives.
Protecting identity requires vigilance from individuals and competence from organisations. Documents, passwords, monitoring, and rapid reporting all matter. So does a justice system willing to verify evidence rather than trust appearances.
Identity is not paperwork alone. It is access to normal life. When it is stolen, the consequences can be profound and enduring.
Follow Sweet TnT Magazine on WhatsApp

Every month in 2026 we will be giving away one Amazon eGift Card. To qualify subscribe to our newsletter.
When you buy something through our retail links, we may earn commission and the retailer may receive certain auditable data for accounting purposes.
Recent Articles
- Travel insurance: Why it matters more than ever for modern travellers
- The risks of identity theft: How one stolen name destroyed a life for 30 years
- How long does food poisoning last
- Yachting services and Hurricane Hole safety in Trinidad
- Working from home: Why remote and hybrid work are reshaping global employment
You may also like:
Luxury watch brands: Why they’re selling more now
Why right now is the best time to buy a Rolex
Gold standard: Why the world abandoned it and why it still matters today
Unlocking the future of wealth: Gold-backed cryptocurrency revolution
Quick guide to shipping ruby engagement rings from the UK
How to find an authentic turquoise ring?
The BMW i8: A once-in-a-lifetime opportunity to own a futuristic supercar for a fraction of its original price
Porsche Cayenne S E-Hybrid SUV and Coupe new expansion of the Cayenne
5 Great reasons to make use of an Australian airport limousine service
Book your Boston car service to Logan Airport by Blue Nile Livery Services
Discovering luxury villas in Ibiza with spectacular mountain views
Planning your dream holiday to some place far from home
5 Luxurious resorts in Trinidad and Tobago for New Yorkers craving a tropical escape
Where to spot celebrities in Trinidad: A guide for New Yorkers who love the stars
All the fun you can experience while on a private boat tour of DC
World-class marinas in the Caribbean for international sailors
Sailing the Southern Caribbean: Yachting hubs in Chaguaramas
Places to visit for the best experience first travel
How Singapore’s modern infrastructure attracts finance and tech nomads
The architectural marvel of Mille Fleurs Mansion, Port-of-Spain
Best places to stay in Port-of-Spain during your summer vacation
A day at Magdalena Grand Beach & Golf Resort, Tobago
Dubai billion-dollar secret: Why the world’s elite are whispering (and moving)
Explore awesome activities and places in Dubai and Abu Dhabi
Places to visit in Coorg, the ‘Scotland of India’
New York fashionistas: Discover how Trinidad’s designers are bringing Caribbean couture to NYC
Pinnacle of Italian craftsmanship: Kiton clothing
Macallen: A masterclass in marketing disguised as whisky history
Johnnie Walker 52 Year Old blended Scotch whisky: The ultimate gift for a season of celebration
Chopin Vodka marks 30 years with vintage spirit from vault
Gift ideas for the mom who loves gourmet food
Luxury Father’s Day gift ideas for the man who has everything
Book an unforgettable luxurious weekend for Dad this Father’s Day
Money management: Why financial planning determines wealth survival, not income
Spring wedding in Tobago: The definitive guide to planning a romantic Caribbean celebration
@sweettntmagazine
Discover more from Sweet TnT Magazine
Subscribe to get the latest posts sent to your email.
Sweet TnT Magazine Trinidad and Tobago Culture
You must be logged in to post a comment.