After identity theft is committed, follow-on crimes occur. Identify five types of follow-on crimes.

What will be an ideal response?


Once armed with enough stolen personal identification data, the process of identity theft is executed and follow-on crimes are committed by:

1. Calling credit card companies, asking them to change the address "your" bill is mailed to and quickly running up charges on accounts. The victim may be unaware of any problems for a month or more. This practice is called account takeover.
2. Opening up new, fraudulent, credit card accounts using the victim's name, banking information, Social Security information, and other data. The first hint of trouble for a victim may be when a card company or collection agency calls because the "account" is in serious arrears.
3. Establishing new accounts for wireless telephone service, which go unpaid.
4. Opening bank accounts on which they write worthless checks.
5. Using counterfeit checks and debit cards to drain victims' banking accounts.
6. Purchasing cars by taking out loans using the victim's name, defaulting on payments, and then fleeing with what is now a stolen vehicle.
7. Using the victim's identity if involved in an automobile accident, stopped for a traffic violation, or arrested by the police. If released by the police or bonded out of jail following an arrest, they don't show up for any required court appearance and an arrest warrant is issued in the victim's name.
8. Fraudulently obtaining other types of identification, including passports, drivers' licenses, Department of Defense cards, and Social Security numbers.
9. Committing mail, investment, telemarketing, and Social Security frauds.

Criminal Justice

You might also like to view...

Sir Robert Peel?s concept of uniformed police was primarily supposed to

A) give police a sense of unity and pride. B) distinguish police officers from military officers. C) make police stand out in a crowd to discourage crime. D) make police easily identifiable to citizens who required hel

Criminal Justice

Training evolves from a logical and cyclic process

Indicate whether the statement is true or false.

Criminal Justice

Answer the following statement(s) true (T) or false (F)

1. The UCR is a “summary-based system,” meaning these data are a summary, or total count, of crimes based on the reporting agencies. 2. Homicides are less likely to be underreported compared to other crimes counted in the UCR. 3. Compared to other offenses such as forcible rape, robbery, and aggravated assault, homicide offenses are less likely to have details about the incident, such as the victims and/or offenders. 4. SHR collects additional information pertaining to the incident including details of the murder victim and offender, their relationship to one another, the weapon used, and the circumstances in each criminal homicide. 5. The NVSS data is a subset of the General Social Survey (GSS).

Criminal Justice

The first step after submitting an application to a department is the ________________

Fill in the blank(s) with correct word

Criminal Justice