U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Identity Theft and the Police Response: The Investigation

NCJ Number
209383
Journal
Police Chief Volume: 72 Issue: 3 Dated: March 2005 Pages: 46,48-50,52
Author(s)
Ed Dadisho
Date Published
March 2005
Length
5 pages
Annotation
This description of elements of the investigation of identity theft is presented under the broad categories of the preliminary investigation, the continued investigation, the obtaining of financial information, the identification of additional victims, and case preparation.
Abstract
The investigation begins with the victim's report of the identity theft. Victims should be informed of steps they should take in preparing for the investigation. This gives victims guidance for doing something constructive immediately. The author lists information and materials victims should provide police investigators. The next step is for investigators to examine all financial and credit bureau documents, which can be helpful in linking suspects to the crime. This section of the article lists the Federal, State, and local agencies that can assist in this step. Further, the article outlines the model law enforcement policy on identity theft developed by the International Association of Chiefs of Police. It is intended to guide police agencies in the development of protocols for accepting, recording, and investigating identity theft. Three ways are described for obtaining the financial information needed in an identity-theft case: a search warrant, subpoena power, or consent. Consent is the simplest and most cost-effective. Victims can provide information on bank and credit card statements, letters from creditors, merchant account statements, and any other financial documentation related to the crime that the victim might have. Identifying any additional victims is necessary in order to determine whether there might be an organized ring operating in the community. The case is most likely to be filed and prosecuted if the incriminating evidence is presented to the prosecutor in an organized format, such as in a binder with a contents page and dividers with tabs for each major section.