skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 184515 Find in a Library
Title: Identity Theft a Nightmare, Not Impostor, in Internet Age
Journal: Police: The Law Enforcement Magazine  Volume:24  Issue:7  Dated:July 2000  Pages:26-29
Author(s): Mark Watkins
Editor(s): Dennis Hall
Date Published: July 2000
Page Count: 4
Type: Report (Technical)
Format: Article
Language: English
Country: United States of America
Annotation: Jurisdictional issues, investigative techniques, legal questions, and the categorization of identity theft all complicate a growing law enforcement problem associated with identity theft in the Internet age.
Abstract: Identity theft as a crime does not fit neatly into the existing theft laws of most States, as someone's identity has no clearly defined value. Further, jurisdiction in identify theft cases is not always easy to determine and depends on how and where personal information is obtained and and how and where false identification is used. The Identity Theft and Assumption Deterrence Act of 1998 represents a positive step in preventing identity theft, but the law does not take into account thefts below the $50,000 to $100,000 threshold most U.S. attorneys use to determine if Federal prosecution should occur. Therefore, it is important that States have their own laws to allow local prosecution of identity theft cases. Steps police agencies and businesses can take to prevent identity theft are discussed, as well as procedures to follow in the investigation of such cases. The following specific suggestions for investigators are outlined: (1) Provide an incident report to the victim; (2) Have the victim request copies of his or her credit reports from major credit bureaus; (3) Obtain photographs or videotapes of the suspect or obtain the best possible physical description; (4) Identify the exact items obtained by the suspect; (5) Examine cellular telephone calls; (6) Steal the trash at the suspect's address to determine whether there may be additional victims; (7) Contact other law enforcement agencies and share case information; and (8) Develop probable cause for search and seizure warrants at target addresses. 3 photographs
Main Term(s): Computer related crime
Index Term(s): Computer aided operations; Criminal investigation; False identification; Fraud and abuse prevention measures; Police crime-prevention; Science and Technology; State laws; Theft offenses
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.