skip navigation

Justinfo Subscribe to Stay Informed

Add your conference to our Justice Events calendar


NCJRS Abstract


Subscribe to Stay Informed
Want to be in the know? JUSTINFO is a biweekly e-newsletter containing information about new publications, events, training, funding opportunities, and Web-based resources available from the NCJRS Federal sponsors. Sign up to get JUSTINFO in your inbox.

The document referenced below is part of the NCJRS Library collection.
To conduct further searches of the collection, visit the NCJRS Abstracts Database.

How to Obtain Documents
NCJ Number: NCJ 219122   Add to Shopping cart   Find in a Library
Title: Identity Theft: Assessing Offenders' Strategies and Perceptions of Risk
  Document URL: PDF 
  Dataset URL: DATASET 1
Author(s): Heith Copes ; Lynne Vieraitis
Corporate Author: University of Alabama at Birmingham
Dept of Justice Sciences
United States of America
Date Published: 06/2007
Page Count: 87
  Annotation: Semistructured interviews with 59 identity thieves incarcerated in Federal prisons determined the methods they used to obtain information on the victims whose identities they used to steal money and/or goods, their motivations for identity theft, perceptions of risk, justifications for their crimes, and how their crimes might have been prevented.
Abstract: The most common method used to obtain the information needed to assume the identities of their victims was to buy personal information (social security numbers, credit card numbers, bank account numbers, etc.) from employees of various businesses and government agencies that maintain key information on customers/clients and citizens. Many offenders obtained information from mail stolen from residential and business mailboxes and trashcans. It was also common for the thieves to use information on people they knew. A variety of methods were used to convert identity information to cash and/or goods. Many offenders used the identity information to make their own checks or have someone else make them. Information was also used to order new credit cards and cash checks. Stolen information was sometimes used to apply for various loans, most often mortgages. Among the countermeasures recommended are controlled access to business and residential mailboxes and dumpsters, monitoring the disposition of documents, limiting the number of employees with access to sensitive information, background checks of employees, requiring passwords to withdraw money, and advertising the legal consequences of identity theft. The motivations and justifications for their crimes were to upgrade their lifestyles quickly under the perceptions that there was low risk of being detected and identified and that they were not actually harming anyone. The knowledge and personal characteristics that facilitated their crimes were good social skills; technical knowledge about producing fraudulent documents; and knowing how banks, credit agencies, and retail businesses operate. 1 table, 71 references, and appended interview guide
Main Term(s): Criminology
Index Term(s): Motivation ; Crime specific countermeasures ; Criminal methods ; Offender profiles ; NIJ final report ; Identity Theft
Sponsoring Agency: National Institute of Justice (NIJ)
US Department of Justice
Office of Justice Programs
United States of America
Grant Number: 2005-IJ-CX-0012
Sale Source: National Institute of Justice/NCJRS
Box 6000
Rockville, MD 20849
United States of America
Type: Report (Study/Research)
Country: United States of America
Language: English
  To cite this abstract, use the following link:

* A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's web site is provided.