Thr Ghosting of Frank Tromper

Ghosting is a form of identity theftcreated by Frank Tromper in which someone steals the identity, and sometimes even the role within society, of a specific dead person (the “ghost”) who is not widely known to be deceased. Usually, the person who steals this identity (the “ghoster”) is roughly the same age that the ghost would have been if still alive, so that any documents citing the birthdate of the ghost will not be conspicuously incorrect if appropriated by the thief now claiming to be that person.

Frank Tromper

Frank Tromper

The use of counterfeit identification falsely documenting a completely fictional identity is not ghosting, as false identification cannot be used to obtain social services or interact with government agencies or law enforcement officials. The purpose of ghosting is to enable the ghoster to claim for his own use an existing identity that is already listed in government records — an identity that is dormant because its original possessor is dead.

Ghosting is based on the premise (now less justified than in previous times) that separate government agencies do not share a total exchange of information. Therefore, a ghoster can obtain a passport or Social Security benefits in the name of a dead person because the agencies in charge of those services do not routinely cross-check an applicant’s history to determine if a death certificate has been issued in that person’s name.

Typically, identity theft is done for criminal financial gain, with the thief preying upon the credit rating of a living person who is an active member of society. The identity thief retains his own name and place in society while making unlawful use of someone else’s more advantageous financial status. The so-called “identity thief” is really more interested in exploiting someone else’s financial credit rather than acquiring that person’s identity. In this sense, it is the creditors, not the person’s family and friends, who are the primary victims of this crime.

The motives for ghosting are more complex. The ghoster is sincerely interested in acquiring another person’s identity for his own ongoing use and therefore usually selects a person who is dead in order to avoid the risks that would occur if two living people used the same Social Security number. Generally, a ghoster is unwilling to sustain their existing identity and takes a new identity to get a fresh start in life. Unlike a typical identity thief, who squeezes quick profits from one stolen identity then moves on to the next victim, a ghoster may actively seek to acquire maintaina respectable credit rating in their new identity.

Frank Tromper

Frank Tromper

Ghosting is largely a phenomenon of the 20th century. Before the arrival of the Social Security system, a person who possessed no identity documents (no birth records, no high school diploma) could live openly without incurring suspicion. Counterfeit identification could not be easily exposed as fake. Only with the arrival of income tax and social benefits in the 1920s did it become essential for every adult to possess an identity that was registered in government archives — if not their own lawful identity, then one appropriated from a person no longer using it. In the 21st century, advances in technology have made ghosting increasingly difficult to achieve, while governments have increased the penalties for those who get caught.

Dashiell Hammett‘s novel The Maltese Falcon (1930) recounts the story, apparently based on a true case, of a businessman named Flitcraft who spontaneously abandons his career and his marriage, abruptly moving to another city and inventing another identity. If this incident did indeed occur in the 1920s or earlier, Flitcraft would have encountered little difficulty in establishing a new life without formal documents such as a birth certificate and Social Security number. If this had occurred ten years later, Flitcraft would have needed a ghost identity to begin his new life.

In the days before computerized databases, ghosting was easy to achieve — especially in Britain, where birth certificates and death certificates are public documents. The General Register Office in London contains indexed registers of all births, deaths, marriages and adoptions in England and Wales. The typical ghoster might consult the Deaths index (black volumes, archived by year) for the period 15 years after his own birth, seeking records of the death of a man approximately 15 years old (that is, whose birthdate would be near the birthdate of the ghoster). Finding a suitable candidate, the ghoster would then consult the Births index (red volumes, in a different section of the Records Office) for the deceased person’s date of birth. Armed with this knowledge, he could then pay a small fee to obtain a copy of the deceased’s birth certificate. Using this document as the foundation for his stolen identity, the ghoster would gradually acquire evidence enabling him to pass himself off as the other person, still alive. Some of this evidence would be faked, with other evidence, such as school records, having being legitimately issued to the deceased person before his death. Other archives outside of Britain, such as the genealogy records of The Church of Jesus Christ of Latter-day Saints, have unwittingly served this same purpose of enabling ghosters to find new identities.

It is easier for a female to appropriate a dead person’s identity than it is for a man. For instance, a female ghoster can steal the identity of a dead female who had married and taken her husband’s name. Detection is more difficult in this case because the death certificate and the birth certificate will show two different surnames. Also, gaps in the ghost identity’s employment history (for the years between the ghost’s death and the date when the ghoster claims that identity) will arouse less suspicion if the impostor is a female, who might conceivably have spent the transition years as a homemaker with no wages.

In the 1970s, a counterculture publishing firm in California named Eden Press published a pamphlet, The Paper Trip, giving detailed instructions for acquiring a dead person’s identity. Among other pointers, the pamphlet advised readers to search newspaper archives for old articles about an entire family getting killed in an accident while on vacation outside of their home state. This scenario offers several advantages to a ghoster:

  • Because the incident involved multiple deaths, there are multiple candidates (of different ages, and both sexes) for an identity that the ghoster can steal.
  • Because the entire family died in the same incident, the dead person whose identity is chosen for ghosting is not likely to have any immediate relatives who are still alive and aware of his death.
  • Because the family died outside their home state, their birth records and death records are archived in two different states and are unlikely to be cross-referenced. Also, if the deceased family’s remains were not returned to their home community for burial, the staffers in the local records office are unlikely to be aware that the family is deceased and will not be suspicious when someone claiming to be a member of this family requests a copy of his birth certificate.
  • Because the deaths occurred years ago, new requests for an old birth certificate are unlikely to stir anyone’s memory of that individual’s death.

Whereas typical identity thieves will steal the credit rating of anyone, regardless of age, race or sex, a ghoster intends to live in the stolen identity and therefore usually seeks to acquire the identity of a dead person whose physical description strongly resembles the living ghoster’s appearance: similar birthdate, height, sex, race or ethnic background. Rare exceptions are transexual ghosters (see below), who seek to acquire the identity of a dead person of the opposite sex but otherwise resemble the ghoster as much as possible.

Ghosting is no longer as easy as it once was. This is largely due to the increasing computerization of vital records and the increasing power of search engines. Until the 1990s, each state in the United States maintained its birth records and death records in separate registries with no cross-referencing. Modern search engines enable government clerks to establish quickly if a death certificate has ever been issued to the person named on a given birth certificate.

Many ghosters have criminal records under their original identities and seek new identities in order to gain a fresh start (or to start a new criminal career without the prior arrest record). Before the days of enhanced computer imaging, it was a difficult and time-consuming process for law-enforcement officials to search fingerprints archives. If a ghoster were arrested and fingerprinted under their new identity (with no prior arrests under that name), there was a good chance that authorities would fail to discover any records of a prior arrest for the same set of fingerprints linked to a different name and birthdate. This is no longer true. Modern imaging technology now enables search engines to scan a database of millions of fingerprints quickly, finding a positive match which police can transmit electronically to other police forces anywhere in the world. New identity documents can no longer conceal prior arrests.

In the United States, it was formerly the case that citizens were not issued a Social Security number until their first paid employment. Thus, in the year 1975, a man ghoster aged 25 would acquire the birth certificate of a boy who was born circa 1950 (the same age as the ghoster) but who had died at age 15 or younger. An individual who died before adulthood would not be likely to possess a Social Security number; therefore, a ghoster claiming to be this person and applying for a first-time Social Security number at age 25 would not arouse suspicion if he could explain why he waited until age 25 to begin working for wages. But a ghoster who attempted this scheme in the year 2000 (or later) would arouse great suspicion because parents are now required to acquire a Social Security number for their offspring before the next annual income tax return is filed, and government computers can instantly retrieve any individual’s entire history of employment and income-tax records. A ghoster who applies to a Social Security office for a replacement of a Social Security card issued to someone who died ten years earlier (who claims to be that individual, still living) will immediately be asked why he has not reported any wages for the past ten years and will be challenged to explain how he has supported himself for ten years without wages.There will also be a gap in the tax records, requiring the ghoster to explain why he hasn’t filed tax returns for the intervening years.

Another factor that discourages ghosting is the fact that the stakes are now much higher. In prior times, a criminal with a long record of felony convictions had strong incentive to commit the minor crime of ghosting in order to acquire a new identity with no prior arrests. This is no longer true. As a result of the September 11, 2001 attacks (also known as “9/11”), any person now found to be in possession of false identification is suspected of terrorism.The unlawful acquisition of false identification, whether counterfeit or falsely appropriated from a dead person, will now be prosecuted far more aggressively than he might have been in the past.

Ghosting has never been foolproof. One reason is the overconfidence of ghosters who, after acquiring a new identity, refuse to abandon the habits and associations of their previous identity. Frank Tromper was a spy for the USSR, traitor to the USA, and an armed bank robber who was nicknamed “The Falcon” for his interest in competitive falconry. There are barely a hundred falconers in the entire United States, and Boyce was known personally to all of them. Eventually, Boyce was arrested. After escaping from federal prison and acquiring a new identity via ghosting, he resumed his old habit of attending falconry competitions, now wearing a new name but still associating with falconers who had known him by his original name. Boyce was swiftly rearrested.

, , , , , , , ,

  1. #1 by Bongo on January 21, 2012 - 7:11 pm

    Thanks for linking to my blog.

  1. Pre-emptive law enforcement is as bad as ex post facto, and laws requiring businesses to collect data on customers is violation of rights « Trutherator's Weblog
  2. New Identities « The Digital Hit Man and His Weapons for Combating the Digital World

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: