skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 218779 Add to Shopping cart Find in a Library
Title: Combating Identity Theft: A Strategic Plan
Corporate Author: President's Identity Theft Task Force
United States of America
Date Published: April 2007
Page Count: 203
Sponsoring Agency: National Institute of Justice/NCJRS
Rockville, MD 20849
President's Identity Theft Task Force
Washington, DC 20500
Sale Source: National Institute of Justice/NCJRS
Box 6000
Rockville, MD 20849
United States of America
Document: PDF
Type: Legislation/Policy Description
Format: Document
Language: English
Country: United States of America
Annotation: This report and supplement outline the President’s Task Force on Identity Theft’s strategic plan for combating identity theft and provide helpful information for implementing the strategy.
Abstract: The President’s Task Force on Identity Theft recommends a four-pronged strategy for combating identity theft: (1) Prevention: reduce opportunities for thieves to access data; (2) Prevention: make it more difficult for thieves to misuse consumer data; (3) Victim Recovery: help consumers repair their credit and lives; and (4) Law Enforcement: investigate, prosecute, and punish identity thieves. Recommendations toward implementing this strategy are presented, such as limiting the unnecessary use of social security numbers in the public sector and developing concrete guidance and best practices for safeguarding data. Identity theft is defined as the misuse of another person’s personal information to commit fraud. Identity theft has three stages, each of which are addressed in the strategic approach against identity theft: (1) the identity thief attempts to gain a victim’s personal information; (2) the thief attempts to misuse the information once it is acquired; and (3) the identity thief completes the crime as the victim begins to realize the harm. The misuse of personal information by identity thieves generally falls into two broad categories: (1) existing account fraud, in which the thief gains access to existing credit lines and accounts to steal from the victim; and (2) new account fraud, in which thieves use personal information to open new accounts in the victim’s name. The report also identifies the prevalence and costs of identity theft, what is known about identity thieves, and how identity theft happens. Different types of identity theft are identified, such as common theft and dumpster diving; employee/insider theft; electronic intrusions or hackings; social engineering (using trickery to obtain personal information); stolen media; and skimming. The appendixes offer examples of protocols and proposed language. The supplemental information offered in Volume II presents a variety of information on remediation tools for victims and laws relating to identification documents. Appendixes, endnotes
Main Term(s): Governmental planning; Identity Theft
Index Term(s): Crime prevention planning; Prosecution
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.