Entry
Reader's guide
Entries A-Z
Subject index
Identity Theft
Identity theft is one of the fastest growing crimes of the new millennium. It occurs when, for fraudulent purposes, someone uses bits and pieces of information about an individual—usually a Social Security number—to represent him- or herself as that person.
There are numerous varieties of identity theft. Examples of application fraud, also called “true name fraud,” include obtaining credit cards and loans in someone else's name and then not paying the bills, opening utility accounts, renting an apartment, getting a cellular phone, and purchasing a car or home. Another variety, account takeover, occurs when the thief obtains the account number of the victim's existing credit card or bank account by wallet theft, or perhaps by fishing transaction slips out of the trash. The perpetrator usually makes many purchases in a short period of time, often by mail order or over the Internet. Account takeover is often detected and halted early when the victim notices the fraudulent charges on his or her monthly account statement and reports them to the creditor.
One of the most serious types of identity fraud is criminal identity theft. This occurs when the perpetrator is arrested for crimes and provides the victim's name to law enforcement, thus giving that person a criminal record. Criminal identity theft and application fraud are often not detected by the victim for many months or even years.
Under federal law, victims are not liable for the bills accumulated by the thieves. But they do have the anxiety and frustration of spending months—sometimes years—restoring their credit history.
Crime Statistics
There are no sources of accurate statistics on identity theft. However, based on credit industry figures, the Privacy Rights Clearinghouse (PRC) estimates there were 500,000 to 700,000 thousand victims in 2000. A 1998 report by the U.S. General Accounting Office (GAO) tracked identity theft statistics from 1992 to 1997, based on figures provided by the Trans Union credit reporting agency (CRA). A graph in the report shows a dramatic sixteen-fold increase in the volume of telephone calls to Trans Union's fraud department during that six-year period (U.S. General Accounting Office 1998: 40). Other CRAs, such as Equifax and Experian, also maintain records on identity theft.
Reasons for the Growth of Identity Theft
There are three reasons why identity theft is rampant. First, it is easy for criminals to obtain the information needed, in particular, Social Security numbers (SSNs). Second, not all credit issuers use stringent application verification procedures, making it easy to obtain credit. Finally, because of law enforcement resource shortages and light sentences, the crime is low risk for the perpetrators.
Use of SSNs by the private sector has not to date been prohibited by law. As a result, SSNs are used as identification and account numbers by many entities, including insurance companies, universities, cable television companies, the military, banks, and brokerage firms. In about a dozen states, the SSN is used as the driver's license number.
Identity thieves obtain Social Security numbers by stealing mail, seeking documents that contain account numbers and Social Security numbers. They sift through the trash outside of businesses and residences to find unshredded documents containing identifying information. Dishonest employees can obtain the numbers in the workplace by obtaining access to personnel files or using credit reporting databases, commonly available in auto dealerships, realtors' offices, banks, and other businesses that approve loans.
...
- Crimes and Related Behaviors
- Antisocial Behavior
- Armed Robbery
- Arson
- Art Theft and Fraud
- Assassination
- Assault
- Banditry
- Barroom Violence
- Blackmail
- Bribery
- Bullying
- Burglary
- Campus Crime
- Capital Crimes
- Career Criminals
- Carjacking
- Child Homicide
- Child Maltreatment
- Child Neglect
- Child Physical Abuse
- Child Sexual Abuse
- Civil Disobedience
- Civil Order Crime
- Collective Violence
- Consumer Fraud
- Corporate Crime
- Crime Classification Systems
- Crime Reports and Statistics
- Crimes Against Persons With Disabilities
- Criminal History
- Cybercrime
- Delinquency
- Digital Crime
- Driving Under the Influence
- Drug Millionaires
- Drug Trafficking
- Elder Abuse
- Environmental Crime
- Euthanasia
- Family Violence
- Fencing
- Feuding
- Forgery
- Fraud
- Gambling
- Gangs
- Genocide
- Graffiti
- Hate Crimes
- Homicide and Murder
- Identity Theft
- Illicit Antiquities
- Infanticide
- Juvenile Crime and War
- Kidnapping
- Mass Murder
- Militias
- Missing Children
- Modus Operandi
- Money Laundering
- Obscenity and Pornography
- Organized Crime—Global
- Organized Crime—United States
- Piracy, Intellectual Property
- Piracy, Sea
- Political Corruption
- Prostitution
- Race and Violence
- Rape
- Rape, Date and Marital
- Recidivism
- Religious Deviance
- Riots
- Road Rage
- Robbery
- Same-Sex Abuse
- School Violence
- Scientific Misconduct
- Securities Fraud
- Sexual Violence
- Shoplifting
- Sibling Violence
- Smuggling
- Spectator Violence
- Sport Violence
- Spree Murder
- Stalking
- Stranger Violence
- Student Threats
- Suicide
- Terrorism
- Vagrancy
- War Crimes
- Witchcraft
- Women as Offenders
- Women Who Kill
- Workplace Violence
- Law and Justice
- Adversarial Justice
- Alternative Dispute Resolution
- Appeal/Appellate
- Arraignment
- Arrestee Drug Abuse Monitoring (ADAM) Program
- Assembly-Line Justice
- Bail and Bond
- Cameras in the Courtroom
- Charge Attrition
- Child Witness
- Civil Law Legal Traditions
- Clemency
- Common Law Legal Traditions
- Community Justice Programs
- Community Prosecution
- Comparative Law and Justice
- Competency to Stand Trial
- Court Structure, Federal
- Court Structure, State
- Court Unification
- Criminal Defenses
- Criminal Insanity
- Criminal Justice
- Criminal Law
- Criminal Trial
- Customary Law
- Death Sentence Outcomes
- Defense Counsel Systems
- Determinate Sentences
- Differentiated Case Management
- Discretionary Justice
- Diversion Programs
- Domestic Violence Courts
- Drug Courts
- Drug Legalization
- Drug Treatment
- Due Process
- Entrapment
- Exclusionary Rule
- Expert Witness
- Eyewitness Testimony
- Family Court
- Family Strengthening Programs
- Fines
- Get-Tough Initiatives
- Grand Jury
- Gun Control
- Habitual Felony Laws
- Harm Reduction
- Human Rights
- Indeterminate Sentences
- Inquisitorial Justice
- Intensive Probation Supervision
- International Criminal Court
- Judicial Selection Process
- Jury Nullification
- Jury System
- Justice
- Juvenile Court
- Juvenile Justice
- Juvenile Offenders in Adult Courts
- Mandatory Sentencing
- Mercy
- Military Justice
- Miranda Rights
- Online Victimization of Youth
- Pardon
- Plea Bargaining
- Probation
- Procedural Justice
- Prosecutorial Discretion
- Public Defender
- Race and Sentencing
- Rehabilitation Model
- Reintegration Model
- Release on Own Recognizance
- Restorative Justice
- Retributive Justice
- Revenge, Retribution, and Rehabilitation
- Scared Straight Programs
- Selective Incapacitation
- Sentencing
- Sentencing Guidelines
- Speedy Trial Legislation
- Split Sentence
- United States Supreme Court
- Whistle-Blowing
- Wickersham Commission
- Wrongful Convictions
- Zero Tolerance Policing
- Policing
- Alcohol, Tobacco and Firearms, Bureau of
- Arrest Clearance
- Arrest Practices
- Broken Windows Theory
- Citizen Review
- Community Policing
- Comparative Policing
- Confession
- Counterterrorism
- Criminal Investigation
- Deadly Force
- Detective Work
- Federal Bureau of Investigation
- Foot Patrol
- Geographic Information Systems
- Geographic Profiling
- Homicide Investigation
- Hot Spot Policing
- House Arrest
- Informants
- Interrogation
- KGB
- Mandatory Arrest
- Neighborhood Watch Programs
- Net Widening
- Police Attitudes and Behavior
- Police Corruption
- Police Information Systems
- Police Organizations
- Police Privatization
- Police Pursuits
- Police Strategies and Operations
- Police Technology
- Police Training and Selection
- Police, Killing of
- Private Security
- Problem-Oriented Policing
- Race and Policing
- Racial Profiling
- Recreational Law Enforcement
- Royal Canadian Mounted Police
- Rural Law Enforcement
- Scotland Yard
- Surveillance Abuse
- Women and Policing
- Zero Tolerance Policing
- Forensics
- Anthropology, Forensic
- Cognitive Interview
- Crime Analysis
- Crime Laboratory
- Crime Scene Assessment
- Criminal Profiling
- Criminalistics
- Detection of Deception
- DNA Testing
- Firearms Identification
- Forensic Behavioral Sciences
- Forensic Interrogation
- Forensic Polygraph
- Forensic Science
- Hypnosis
- Medical Examiner
- Odontology
- Psychiatry, Forensic
- Psychology, Forensic
- Questioned Documents/Ink Dating
- Scientific Evidence
- Toxicology
- Voice Identification
- Voice Stress Analysis
- Corrections
- Abolitionism
- Alcatraz
- Attica
- Auburn State Prison
- Boot Camps
- Corrections
- Corrections Officers
- Day Release
- Death Row
- Death Row Inmates
- Devil's Island
- Early Release Programs
- Eastern State Penitentiary
- Electronic Monitoring
- Elmira Reformatory
- Furlough Programs
- Halfway House
- International Imprisonments
- Joliet Correctional Center
- Leavenworth Federal Penitentiary
- New Generation Jails
- Parole
- Penal Colonies
- Preventive Detention
- Prison Overcrowding
- Prison Reform
- Prison Riots
- Prison Systems
- Prison Violence
- Prisoner Literature
- Prisoner Rights
- Prisoners, Elderly
- Race and Corrections
- Religion in Prison
- San Quentin
- Sex Offender Treatment
- Shelters
- Shock Incarceration
- Sing Sing
- Supermax Prisons
- Tucker State Farm
- Women in Prison
- Work Release
- Victimology
- Juvenile Victimization and Offending
- National Crime Victimization Survey
- Online Victimization of Youth
- Repeat Victimization
- Victim Advocates
- Victim Needs and Services
- Victim Rights and Restitution
- Victim Theories
- Victim-Offender Mediation
- Victim/Witness Protection
- Victimization
- Victims' Bill of Rights
- Women as Victims
- Punishment
- Sociocultural Context and Popular Culture
- Alcohol
- Buddhism
- Christianity
- Cinema
- Comic Books
- Commercial Sex Industry
- Conduct Norms and Crime
- Costs of Crime
- Crime and Everyday Life
- Daoism
- Demography
- Discrimination in the Criminal Justice Workplace
- Drugs
- Environmental Design
- Ethics
- Ethnicity and Race
- Fear of Crime
- Financial Costs and Benefits of Crime Prevention
- Gated Communities
- Gender
- Gun Control
- Hinduism
- HIV/AIDS in Criminal Justice
- Islam
- Judaism
- Literature, Fiction
- Literature, True Crime
- Masculinity, Anger, and Violence
- Media
- Moral Panic
- Policing Democracy
- Political Corruption
- Prisoner Literature
- Public Housing
- Public Opinion
- Risk
- Security Management
- Sensation Seeking
- Shame and Guilt
- Shinto
- Social Class
- Television
- Video and Computer Games
- Vigilantism
- International
- Alternative Punishments in Sub-Saharan Africa
- Australia
- Buddhism
- Canada
- Caribbean
- China
- Christianity
- Comparative Law and Justice
- Comparative Policing
- Counterterrorism
- Daoism
- Europe, Central Eastern
- France
- Genocide
- Germany
- Great Britain
- Hinduism
- Human Rights
- India
- Indonesia
- International Criminal Court
- International Imprisonments
- Islam
- Italian Mafia
- Italy
- Japan
- Judaism
- Latin America, Crime and Violence in
- Mexico
- Organized Crime—Global
- Penal Colonies
- Piracy, Intellectual Property
- Piracy, Sea
- Policing Democracy
- Political Corruption
- Poverty
- Russia
- Shinto
- Singapore
- Smuggling
- South Pacific Islands
- Sub-Saharan Africa
- Terrorism
- War Crimes
- Witchcraft
- Women and Crime in a Global Perspective
- Concepts and Theories
- Attachment Theory
- Biocriminology
- Broken Windows Theory
- Cartographic School of Criminology
- Control Theories
- Crime as Pathology
- Crime Control Model
- Critical Criminology
- Culture Conflict and Crime
- Deterrence Theory
- Deviance
- Economic Theories of Crime
- Education and Employment
- Evolutionary Perspectives on Crime
- Experimental Criminology
- Feminist Theory
- Integrative Theories
- Life-Course Theories
- Nonintervention Model
- Peacemaking Criminology
- Radical Criminology
- Social Control Theory
- Social Learning Theories
- Sociological Theories
- Strain Theory
- Trait Theories
- Research Methods and Information
- Sourcebook of Criminal Justice Statistics
- Arrestee Drug Abuse Monitoring (ADAM) Program
- Crime Classification Systems
- Crime Reports and Statistics
- Criminal Justice
- Criminology
- Ethnography of Crime and Punishment
- Information Systems
- National Crime Victimization Survey
- Self-Report Surveys
- Social Psychology
- Statistical Methods and Models
- Uniform Crime Reports
- Organizations and Institutions
- Alcatraz
- Alcohol, Tobacco, and Firearms
- Appendix 3: Professional and Scholarly Associations
- Attica
- Auburn State Prison
- Devil's Island
- Eastern State Penitentiary
- Elmira Reformatory
- Federal Bureau of Investigation
- International Criminal Court
- Italian Mafia
- Joliet Correctional Center
- KGB
- Leavenworth Federal Penitentiary
- Royal Canadian Mounted Police
- San Quentin
- Sing Sing
- Tucker State Farm
- United States Supreme Court
- Special Populations
- American Indians and Alaska Natives
- Animals in Criminal Justice
- Child Homicide
- Child Maltreatment
- Child Neglect
- Child Physical Abuse
- Child Sexual Abuse
- Child Witness
- Ethnicity and Race
- Homeless Men and Crime
- Homeless Women and Crime
- Infanticide
- Juvenile Court
- Juvenile Crime and War
- Juvenile Justice
- Juvenile Offenders in Adult Courts
- Juvenile Victimization and Offending
- Mentally Ill Offenders
- Military Justice
- Militias
- Missing Children
- Online Victimization of Youth
- Prisoners, Elderly
- School Violence
- Street Youth
- Student Threats
- Women and Crime in a Global Perspective
- Women and Policing
- Women as Offenders
- Women as Victims
- Women in Prison
- Women Who Kill
- Youth, At-Risk
- Youthful Offender
- Loading...
Get a 30 day FREE TRIAL
-
Watch videos from a variety of sources bringing classroom topics to life
-
Read modern, diverse business cases
-
Explore hundreds of books and reference titles
Sage Recommends
We found other relevant content for you on other Sage platforms.
Have you created a personal profile? Login or create a profile so that you can save clips, playlists and searches