Criminal Identity Theft: When Someone Uses Your Identity for Crimes

Criminal identity theft occurs when a perpetrator presents another person's identifying information to law enforcement during an arrest, citation, or criminal investigation. Unlike financial identity theft or tax identity theft, this variant attaches criminal records, warrants, and court obligations directly to the victim's legal identity — with consequences that can persist for years through background checks, employment screenings, and licensing databases. This page documents the structure, mechanics, regulatory framework, and classification boundaries of criminal identity theft as a distinct offense category within the broader identity theft types and definitions taxonomy.



Definition and scope

Criminal identity theft is formally defined by the Federal Trade Commission (FTC) as a scenario in which an impersonator gives a victim's personal information — name, date of birth, Social Security number, or government-issued identification — to police or court officers in connection with an arrest or criminal proceeding (FTC, Consumer Information: Identity Theft). The offense produces a corrupted criminal record in the victim's name rather than the perpetrator's.

The scope extends beyond a single arrest. Criminal identity records propagate through interconnected databases: local law enforcement repositories, state criminal justice information systems, the FBI's National Crime Information Center (NCIC), and third-party background check aggregators licensed under the Fair Credit Reporting Act (FCRA, 15 U.S.C. § 1681 et seq.). A single fraudulent encounter can generate a warrant, a conviction record, a probation obligation, or a sex offender registry listing — all appearing under the victim's legal name and identifiers.

The identity theft statistics for the US context is significant: the FTC's Consumer Sentinel Network logged over 1.1 million identity theft reports in 2022 (FTC Consumer Sentinel Network Data Book 2022), with criminal identity theft representing a smaller but disproportionately damaging subset due to the difficulty of remediation.


Core mechanics or structure

Criminal identity theft follows a recognizable operational structure with discrete phases:

Phase 1 — Identity acquisition. The perpetrator obtains identifying documents or data. Physical theft of a wallet, purse, or mail is one vector; digital acquisition through phishing and identity theft schemes, data breaches, or dark web purchases from compromised databases is another. State-issued driver's licenses are among the most exploited documents because they serve as primary identification in most law enforcement encounters.

Phase 2 — Document presentation. During a traffic stop, arrest, or court summons, the perpetrator presents the victim's name, date of birth, and identifying number — either verbally or through a counterfeit or stolen physical document. Some perpetrators use the victim's actual stolen driver's license; others fabricate a fraudulent license bearing the victim's data.

Phase 3 — Record generation. Law enforcement creates an arrest record, citation, or booking entry tied to the presented identity. If the perpetrator fails to appear for a court date, a bench warrant issues under the victim's name. If convicted in absentia or through a plea, a conviction record attaches.

Phase 4 — Database propagation. The corrupted record enters state criminal justice information systems and, for qualifying offenses, the NCIC. Third-party background check vendors ingest state criminal repository data on licensing schedules ranging from real-time access to monthly batch updates, meaning propagation speed and correction lag vary significantly by state.

Phase 5 — Discovery by victim. Victims typically discover criminal identity theft through a job application denial, a failed tenant background check, an unexpected traffic stop resulting in arrest on an outstanding warrant, or receipt of a court summons for a proceeding they had no knowledge of.


Causal relationships or drivers

The primary structural driver of criminal identity theft is the absence of biometric verification at point-of-contact in most routine law enforcement encounters. Standard traffic stops rely on name, date of birth, and document number — data points that can be fabricated or transferred. Only a small fraction of jurisdictions have deployed real-time biometric cross-referencing at the patrol level.

A secondary driver is document fraud accessibility. The availability of high-quality counterfeit identification documents, combined with the volume of legitimate documents lost through mail theft and identity fraud or physical wallet theft, provides perpetrators with a reliable supply of viable presentation materials.

Criminal history database architecture creates a third causal pathway. Most state criminal justice information systems were not designed with victim identity correction workflows. Expungement and sealing processes, where they exist, are designed for defendants — not for individuals who were never defendants in the first instance. This structural gap means that even after a victim proves their innocence, the administrative pathway to correction is often lengthy and jurisdiction-specific.

Perpetrators with prior criminal records and active warrants have the strongest incentive to substitute another's identity, as verification systems prioritize warrant-matching against presented data rather than biometric confirmation of identity. The social security number protection failure mode is particularly acute when a perpetrator has pre-obtained a victim's SSN, enabling more convincing impersonation through consistent data presentation across multiple fields.


Classification boundaries

Criminal identity theft is distinct from adjacent identity theft categories in both mechanism and consequence:

Criminal identity theft vs. financial identity theft: Financial identity theft generates fraudulent accounts and debt in the victim's name; criminal identity theft generates arrest records, warrants, and convictions. The remediation pathway for financial fraud runs through credit bureaus and the FCRA dispute process. Criminal record remediation runs through courts and law enforcement agencies with no equivalent standardized federal framework.

Criminal identity theft vs. synthetic identity fraud: Synthetic fraud creates a blended or fabricated identity, typically for financial gain. Criminal identity theft uses an existing, real person's identity and attaches real legal consequences to a real individual.

Criminal identity theft vs. impersonation for gain: When a perpetrator uses another's identity to obtain employment, government benefits, or professional licenses, the mechanism overlaps but the record produced differs — employment fraud generates HR and tax records rather than criminal justice records.

Jurisdictional classification: Under 18 U.S.C. § 1028 (Identity Fraud) and 18 U.S.C. § 1028A (Aggravated Identity Theft), federal law criminalizes the knowing transfer or use of another's means of identification without lawful authority. Aggravated identity theft, which carries a mandatory 2-year consecutive sentence when committed in connection with certain felonies, applies when the fraudulent identity use occurs during or in relation to a predicate federal offense.

All 50 states have enacted identity theft statutes, though the specific provisions addressing criminal identity theft — as distinct from financial identity theft — vary substantially in how they define remediation rights for victims.


Tradeoffs and tensions

The primary institutional tension in criminal identity theft cases is between the integrity of the criminal justice record and the burden of proof placed on victims. Law enforcement agencies treat their records as presumptively accurate; the evidentiary standard for correcting a criminal record typically requires affirmative proof that the victim was not present — an inversion of standard evidentiary logic.

A secondary tension exists between victim privacy and the notification mechanisms needed to catch propagation errors. To correct a corrupted record across multiple jurisdictions, victims must repeatedly disclose the existence of the fraudulent record — which itself risks further exposure of identifying information during the correction process.

Background check vendors licensed under the FCRA are required to maintain reasonable procedures for maximum possible accuracy (15 U.S.C. § 1681e(b)) and to conduct reinvestigation of disputed information within 30 days. However, the source of the inaccurate criminal record is the law enforcement agency, not the background check vendor — creating a dispute chain in which the vendor has limited ability to correct source data without agency cooperation.

Court systems present a parallel tension: expungement and identity theft victim certification processes (available in states including California, New York, and Texas) require judicial action, meaning correction timelines depend on court docket availability, which in large jurisdictions can extend 6 to 18 months.

The identity theft reporting process itself creates friction — victims must simultaneously navigate law enforcement agencies (who may be skeptical of claims that their records are wrong), prosecutors' offices, courts, and federal databases — without a single coordinating authority.


Common misconceptions

Misconception: A police report automatically corrects a criminal record.
Filing a police report for criminal identity theft creates a report of the crime — it does not amend or expunge the underlying fraudulent criminal record. Record correction requires separate action through the originating law enforcement agency, the relevant court, and the state criminal repository.

Misconception: The FTC Identity Theft Report is sufficient for criminal record disputes.
The FTC Identity Theft Report (generated at IdentityTheft.gov) is a legally recognized document useful for disputing fraudulent accounts with creditors and credit bureaus under FCRA. It is not an instrument for correcting criminal justice records, which are controlled by law enforcement and judicial agencies, not credit regulatory frameworks.

Misconception: Criminal identity theft only affects people with prior criminal history.
Perpetrators specifically target individuals with clean records because a clean background reduces the likelihood of database flags during the impersonation event. Victims with no prior encounters with the criminal justice system are often unaware of the fraud for longer periods, allowing more extensive record corruption.

Misconception: The perpetrator must be apprehended before the victim's record can be cleared.
Most state victim certification processes and federal identity theft victim procedures do not require perpetrator arrest or conviction as a prerequisite for record correction, though the practical difficulty of proving the fraud increases significantly without law enforcement cooperation or an identified suspect.

Misconception: Criminal identity theft is rare relative to financial identity theft.
While criminal identity theft constitutes a smaller fraction of total identity theft reports than financial variants, the consequences — arrest on someone else's warrant, loss of employment, loss of professional licensing — make it one of the most harmful categories in terms of life disruption per incident.


Checklist or steps (non-advisory)

The following sequence reflects the procedural steps documented by the FTC (IdentityTheft.gov) and the Privacy Rights Clearinghouse for addressing criminal identity theft. This is a structural reference of documented steps, not legal advice.

Step 1 — Obtain a copy of the fraudulent criminal record. Request a criminal background check through the relevant state criminal repository. In most states, individuals have the right to obtain their own criminal history record.

Step 2 — File an FTC Identity Theft Report. Generate the report at IdentityTheft.gov. This document serves as a federal declaration of the theft and supports subsequent dispute actions.

Step 3 — File a police report for criminal identity theft. File a separate report with local law enforcement documenting the impersonation. Some jurisdictions have dedicated identity theft units. This is distinct from — and in addition to — the FTC report. See the identity theft police report reference for jurisdiction-specific procedures.

Step 4 — Contact the originating law enforcement agency. Reach the agency that created the fraudulent record. Request their process for identity theft victim review. Provide government-issued identification, fingerprints if requested, and the FTC Identity Theft Report.

Step 5 — Request a Certificate of Identity (or equivalent state instrument). Many states — including California (Penal Code § 530.6) and New York — issue formal certificates or orders attesting that the named individual is a victim of identity theft, not the person who committed the underlying offense. This certificate can be presented to future law enforcement contacts and background check requestors.

Step 6 — File with the state criminal repository. State repositories such as California's Department of Justice or New York's Division of Criminal Justice Services maintain centralized records that feed background check vendors. A formal dispute with the repository initiates the correction process for all downstream records.

Step 7 — Dispute background check vendor records. Under the FCRA, contact background check vendors that have produced reports containing the fraudulent record. Provide the FTC report, the police report, and any state-issued certificate. Vendors must conduct reinvestigation within 30 days.

Step 8 — Monitor records for re-propagation. Even after correction, fraudulent records can reappear if source databases are not fully corrected. Periodic criminal record monitoring, particularly through state repository self-check programs, is a documented component of the remediation process.


Reference table or matrix

Dimension Criminal Identity Theft Financial Identity Theft Synthetic Identity Fraud
Primary record affected Criminal justice databases, court records Credit bureau files, bank records Credit bureau files (fabricated profile)
Governing federal framework 18 U.S.C. § 1028, § 1028A FCRA (15 U.S.C. § 1681); FDCPA FCRA; Bank Secrecy Act
Primary remediation authority Law enforcement agencies; courts Credit bureaus; creditors Credit bureaus
Federal standardized dispute path None — agency/court-specific Yes — FCRA § 611 reinvestigation Yes — FCRA § 611 (limited)
Typical discovery mechanism Warrant arrest; background check failure Credit denial; unexplained debt None (victim is often non-existent)
Perpetrator incentive Evade arrest; avoid outstanding warrant Financial gain Financial gain (credit access)
Victim harm profile Arrest, employment loss, licensing denial Debt, credit damage Rare (victim may not exist)
Correction timeline 6–18+ months (court-dependent) 30–90 days (FCRA reinvestigation) 30–90 days (FCRA reinvestigation)
State certification available? Yes — in most states (varies by statute) N/A N/A
FTC report utility Supportive but not dispositive Primary dispute instrument Primary dispute instrument

References

📜 6 regulatory citations referenced  ·  🔍 Monitored by ANA Regulatory Watch  ·  View update log

Explore This Site