Aggravated Digital Identity Theft in USA

1. Meaning and Legal Framework

In the United States, aggravated digital identity theft is primarily prosecuted under 18 U.S.C. § 1028A, titled Aggravated Identity Theft. It is an enhanced federal offense that applies when a person:

  • Knowingly uses,
  • Without lawful authority,
  • The identity of another person,
  • During and in relation to certain felony violations (called “predicate offenses”).

These predicate offenses include crimes such as:

  • Wire fraud (18 U.S.C. § 1343)
  • Bank fraud (18 U.S.C. § 1344)
  • Immigration fraud
  • Computer fraud and hacking (18 U.S.C. § 1030)

Key Features of Aggravated Identity Theft

  1. Mandatory 2-year consecutive sentence
    The punishment runs in addition to the underlying felony sentence.
  2. Strict liability for “use of identity”
    Even brief or indirect use of another person’s identity qualifies.
  3. Digital applicability
    It commonly applies to:
    • Hacked accounts (email, banking, social media)
    • Stolen SSNs used online
    • Phishing and credential stuffing
    • Fraudulent online tax filings
    • Synthetic identity creation using real personal data

2. Elements Prosecutors Must Prove

To secure conviction under § 1028A, the government must show:

  1. The defendant knowingly transferred, possessed, or used a means of identification
  2. The identification belonged to another real person
  3. The act was without lawful authority
  4. The act occurred during and in relation to a qualifying felony

3. Important Case Laws (U.S. Federal Courts)

1. Flores-Figueroa v. United States (2009)

Issue: Whether the defendant must know the identity belongs to a real person.

Holding:
The Supreme Court ruled that the government must prove the defendant knew the identity belonged to another actual person.

Significance:
This case narrowed the scope of prosecution and became the foundational interpretation of § 1028A.

2. United States v. Abdelshafi (4th Cir. 2010)

Facts:
A medical provider used patients’ Medicaid IDs to submit fraudulent claims.

Holding:
Court held that misuse of patient identities in fraudulent billing constituted aggravated identity theft.

Significance:
Established that financial fraud using real patient data qualifies even in complex administrative systems.

3. United States v. Barrington (11th Cir. 2006)

Facts:
Defendant hacked into a university system and changed grades using student identities.

Holding:
Court affirmed conviction under identity theft statutes.

Significance:
One of the earliest cases recognizing digital academic system hacking as identity theft.

4. United States v. Miller (8th Cir. 2013)

Facts:
Defendant used stolen personal data to file fraudulent tax returns online.

Holding:
Court confirmed that filing electronic tax returns using stolen identities satisfies § 1028A.

Significance:
Clarified that IRS e-filing fraud is a core form of aggravated digital identity theft.

5. United States v. Spears (5th Cir. 2012)

Facts:
Defendant used stolen Social Security numbers to open bank accounts and conduct online transfers.

Holding:
Court upheld aggravated identity theft conviction.

Significance:
Confirmed that online banking fraud using real SSNs triggers mandatory sentencing enhancement.

6. United States v. Otuya (4th Cir. 2015)

Facts:
Defendant participated in an international fraud scheme using stolen identities to open accounts and move funds digitally.

Holding:
Court ruled that coordinated cyber fraud involving identity misuse qualifies under § 1028A.

Significance:
Expanded scope to transnational cybercrime networks using stolen identities.

7. United States v. Godin (1st Cir. 2012)

Facts:
Defendant used another person’s identity to obtain credit cards and conduct online purchases.

Holding:
Court upheld conviction, emphasizing misuse “in relation to” fraud offenses.

Significance:
Strengthened interpretation of “in relation to” as broadly inclusive of digital transactions.

4. How Courts Treat Digital Identity Theft Today

Modern U.S. courts interpret aggravated identity theft broadly in the digital context:

  • Any unauthorized use of real personal data online is sufficient
  • Physical possession of documents is not required
  • Digital footprints (IP logs, login records, device metadata) are strong evidence
  • Even short-term use (e.g., one fraudulent login session) qualifies

5. Key Legal Takeaways

  • Aggravated digital identity theft is an enhanced federal crime with mandatory prison time
  • It applies whenever identity misuse is tied to serious underlying fraud or hacking
  • Courts consistently treat online identity misuse as equal to physical identity theft
  • The Supreme Court has limited its scope slightly (knowledge requirement), but enforcement remains strict

LEAVE A COMMENT