Identity Theft

I. Introduction to Identity Theft

Identity theft occurs when someone fraudulently obtains and uses another person’s personal information—such as Social Security numbers, bank account details, or credit card numbers—for financial gain or other benefits.

Key Features of Identity Theft

Unauthorized access to personal information

Intent to commit fraud or theft

Financial or reputational harm to the victim

Legal Framework

In the U.S., identity theft is primarily covered under 18 U.S.C. § 1028 (fraud and related activity in connection with identification documents).

Many other countries have statutes criminalizing identity theft and related fraud.

Identity theft cases often involve electronic fraud, phishing, or document forgery.

II. Legal Principles in Identity Theft Cases

Courts generally focus on:

Proof of intent to defraud or gain advantage

Use of another person’s personal information

Causation of financial or reputational harm

Evidence linking the defendant to the fraudulent act

Judges also consider aggravating factors, such as the use of technology, organized crime involvement, and harm to vulnerable victims.

III. Case Law Examples

1. United States v. Morris, 928 F.2d 504 (2d Cir. 1991, USA)

Facts: Robert Tappan Morris created a computer worm that infected thousands of computers, indirectly stealing computing resources.

Legal Issue: Whether unauthorized use of computer systems constituted identity-related fraud under the law.

Decision: The court upheld conviction under the Computer Fraud and Abuse Act, emphasizing that unauthorized access for personal or financial gain qualifies as a crime.

Significance: Early case linking computer misuse to identity and resource theft, establishing that identity theft is not limited to financial data.

2. United States v. Larson, 495 F.3d 1092 (9th Cir. 2007, USA)

Facts: The defendant stole credit card numbers and personal data online to make fraudulent purchases.

Legal Issue: Whether the act constituted identity theft under 18 U.S.C. § 1028(a).

Decision: Court held that using stolen personal information to obtain credit or goods constitutes identity theft, even if no physical documents were used.

Significance: Confirmed that digital or electronic identity theft is fully prosecutable under federal law.

3. Commonwealth v. Johnson, 93 Mass. App. Ct. 489 (Massachusetts, 2018)

Facts: Johnson obtained the personal information of elderly victims and opened bank accounts in their names, withdrawing funds.

Legal Issue: Intent to defraud and vulnerability of victims.

Decision: Court convicted Johnson of multiple counts of identity theft and fraud.

Significance: Highlights that targeting vulnerable populations is an aggravating factor in sentencing, reflecting the social harm of identity theft.

4. People v. Simmons, 2017 IL App (1st) 153456 (Illinois, USA)

Facts: Simmons used stolen identities to obtain driver’s licenses and state benefits fraudulently.

Legal Issue: Whether misuse of government-issued IDs constitutes identity theft.

Decision: Court upheld conviction for identity theft, emphasizing that fraudulent representation using someone else’s identity violates state law.

Significance: Reinforces that identity theft encompasses both financial and government identity documents.

5. R v. Rowe [2009] EWCA Crim 219 (UK)

Facts: The defendant stole personal information and bank cards, withdrawing funds from victims’ accounts.

Legal Issue: Whether electronic theft and misuse of banking information constituted identity theft under UK law.

Decision: Court upheld conviction for fraud by false representation and identity theft.

Significance: UK courts treat identity theft seriously, covering both physical and digital methods of deception.

6. United States v. Cosentino, 2010 WL 743937 (D. Conn., USA)

Facts: Cosentino engaged in a multi-state scheme stealing personal information to open fraudulent credit accounts.

Legal Issue: Whether interstate schemes constitute federal identity theft and mail fraud.

Decision: Court convicted Cosentino under federal identity theft statutes, using evidence from multiple states.

Significance: Shows that cross-border or interstate identity theft is prosecutable under federal law, emphasizing cooperation between jurisdictions.

7. State v. Smith, 2015 NCBC 37 (North Carolina, USA)

Facts: Smith used stolen tax identification numbers to file fraudulent tax returns.

Legal Issue: Whether tax-related fraud qualifies as identity theft.

Decision: Court convicted Smith for identity theft and fraud, emphasizing harm to government and individuals.

Significance: Tax-related fraud is considered a form of identity theft, broadening the scope beyond bank accounts and credit cards.

IV. Key Observations

Digital dimension is central: Most modern identity theft cases involve online or electronic methods (Larson, Morris).

Financial and social harm matters: Courts consider both economic loss and social consequences, particularly for vulnerable populations (Johnson).

Interstate and international scope: Identity theft often crosses jurisdictions, making federal or international law relevant (Cosentino).

Aggravating factors increase penalties: Use of technology, targeting vulnerable victims, or large-scale schemes lead to harsher sentences.

Identity theft encompasses government IDs and tax information: Courts interpret identity theft broadly (Simmons, Smith).

V. Conclusion

Identity theft is a serious and evolving crime due to technological advancements and digitalization. Case law demonstrates that courts:

Treat identity theft as a serious criminal offense regardless of physical or digital form.

Use federal and state statutes to address cross-border or interstate identity theft.

Impose harsher penalties when vulnerable populations are targeted.

Judicial interpretation continues to adapt as technology changes the ways personal information is stolen and misused.

LEAVE A COMMENT