What Is an Obituary Pirate: AI-Driven Online Fraud Schemes

End‑of‑Life Planning • Digital Safety

What Is an Obituary Pirate: AI‑Driven Online Fraud Schemes

Obituary piracy preys on grief. What began as copycat sites now includes AI‑generated videos and fabricated death notices. Learn how it works and how to protect a loved one’s legacy.

What Is an Obituary Pirate?

Obituary piracy happens when someone scrapes, copies, or fabricates obituaries to profit from clicks, commit fraud, or steal identities.

These operations mine personal details from public obituaries—names, dates, and family relationships—to:

  • Generate ad revenue by reposting or reading obituaries on websites and video channels.
  • Solicit fake donations via memorial pages or fundraiser lookalikes.
  • Collect sensitive information from mourners through bogus forms.
Example: A channel uses synthetic voice to read real obituaries, monetized with ads. It may be legal to republish public records, but it’s ethically troubling.

Why Obituary Pirates Do It

1) Ad Revenue

Reposting obituaries on sites or as auto‑narrated videos generates advertising income per view.

2) Fake Donation Pages

Scammers pose as grieving families to collect money that never reaches real people.

3) Phishing for Data

Look‑alike flower or gift sites harvest emails, addresses, and card details.

4) Identity Theft

Details from obituaries are used to open credit, claim benefits, or impersonate the deceased or relatives.

Data point: The AARP estimates nearly 2.5 million deceased Americans become identity‑theft victims each year.

Source: AARP — “Ghosting: Identity Theft of the Dead”.

How Do They Gather the Data?

Typical data points pirates extract:

  • Full names and nicknames
  • Birth and death dates
  • Surviving relatives’ names
  • Funeral service locations and times
  • Home addresses (if published)

They scrape legitimate sites (e.g., newspaper or memorial platforms) and social media, then reuse or remix details for malicious purposes.

How to Protect Yourself from Obituary Pirates

Limit Personal Info in Obituaries
  • Avoid full birthdates.
  • Do not list home addresses.
  • Use first names for survivors (e.g., “her son John”).

Tip: Use data‑broker removal tools to reduce public exposure where possible.

Do Not Engage with Suspicious Posts
  • Avoid commenting, clicking, or sharing shady reposts or random channel videos.
  • Warn close contacts privately if the obituary is about someone you know.
Monitor and Notify
  • Alert credit bureaus and add a deceased alert where applicable.
  • Consider an identity protection service.

Social Security Administration: 1‑800‑772‑1213

Report Obituary Fraud

Also keep records for local authorities and the funeral home.


Helpful Guide

How to Delete Online Accounts of a Dead Person: Step‑by‑Step Guide

Conclusion

Obituary piracy is a growing threat in the digital age. By understanding how pirates operate and limiting sensitive details, you can protect a loved one’s legacy and reduce the risk of exploitation. Honor the departed by safeguarding their story—so their memory remains a source of peace, not profit.

FAQs

How do scammers use obituary information?

They extract personal details to lure users with clickbait, commit identity theft, run donation scams, or republish obituaries for profit.

Can identity theft happen after someone dies?

Yes. Criminals often exploit identities before banks and agencies finish updating records.

Can an obituary scam happen while someone lives?

Yes. Pirates may leverage trending names to drive traffic to their sites or channels.

How can I prevent my loved one’s obituary from being stolen?

Limit personal details, use trusted platforms, and avoid publishing full birthdates or exact addresses.

Are obituary pirates illegal?

Republishing public information may be legal in some cases, but using it for fraud is a crime.

What should I do if I suspect obituary fraud?

Report to IC3, the Social Security Administration, the hosting platforms, and local authorities; keep evidence and communication records.

Back to blog