It's Not Always about the Money: Why the State Identity Theft Laws Fail to Adequately Address Criminal Record Identity Theft

By Perl, Michael W. | Journal of Criminal Law and Criminology, Fall 2003 | Go to article overview

It's Not Always about the Money: Why the State Identity Theft Laws Fail to Adequately Address Criminal Record Identity Theft


Perl, Michael W., Journal of Criminal Law and Criminology


I. INTRODUCTION

In October of 1995, Joshua Sours received a letter from Kohl's department store stating that "he owed money to the store in restitution for theft." (1) In fact, Sours's criminal record showed convictions for retail theft and possession of marijuana. (2) The problem was that Sours did not commit these offenses, was never arrested, never appeared in court, and never pled guilty to the offenses. (3)

So what happened to Joshua Sours? Upon receiving the letter from Kohl's, Sours informed police authorities that something was wrong. (4) A subsequent investigation revealed that when the suspect of the Kohl's theft was arrested, he identified himself as Joshua Sours, attended one hearing, pled guilty to the charges, was sentenced to a day in jail, and was then released by authorities. (5) When Sours learned of these past events, a "quick look at the police photo" clarified what had happened. (6) Sours realized that the true perpetrator of the crimes was actually a high school friend, using Sours's identity to protect himself from obtaining a tainted criminal record. (7)

Sours was a victim of criminal record identity theft, (8) a form of identity theft whose popularity continues to rise throughout the country. (9) Criminal record identity theft occurs when the identity thief obtains a victim's personal information (10) and then commits crimes, traffic violations, or other illegal activities while acting as the victim. (11) Instead of providing law enforcement with her own personal information, the identity thief provides the victim's personal information in order for the identity thief to avoid criminal convictions and legal sanctions in her own name. (12) This Comment will address this specific form of identity theft in further detail.

Although identity theft is a crime in almost every state, (13) as well as a federal felony, most state identity theft laws need to be amended to adequately detect, prevent, and prosecute criminal record identity theft because most identity theft prosecutions occur at the state level. (14) This Comment will explore the current state identity theft laws in detail and explain the provisions that are necessary to comprehensively address criminal record identity theft.

Before addressing the identity theft laws in more detail, Part II will provide some general background information about the crime of identity theft. It will explain the specific ways an identity thief obtains a victim's personal information and the various ways in which the thief may use that information, including criminal record purposes. Part III will then examine the current identity theft laws to see if and how these laws address criminal record identity theft. It will explain that although some states recognize criminal record identity theft as a crime, many states treat criminal record and financial identity theft differently in various ways. (15) It will also explain that the current laws fail to adequately address the statute of limitations issue as well as "reverse criminal record identity theft," a specific form of criminal record identity theft. (16) Finally, Part IV will explore two potential ways that the problem of criminal record identity theft may be better controlled. (17)

II. BACKGROUND

Identity theft is the fastest growing crime in the United States. (18) Due to the widespread growth of identity theft, in 1999 the Federal Trade Commission ("FTC") began collecting consumer complaints (19) related to identity theft in the Identity Theft Clearinghouse. (20) Between 2000 and 2001 alone, both the numbers of inquiries to the FTC related to identity theft and the reported identity theft victims nearly tripled. (21) Moreover, the FTC reports that the number of identity theft claims more than doubled between 2001 and 2002. (22) Thus, with the number of incidents of identity theft reported to the FTC between 2000 and 2002 increasing from nearly 31,000 to about 162,000, today there are more than five times as many reported incidents of identity theft as there were only three years ago.

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

It's Not Always about the Money: Why the State Identity Theft Laws Fail to Adequately Address Criminal Record Identity Theft
Settings

Settings

Typeface
Text size Smaller Larger
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.