Case Studies On Identity Theft Prosecutions

1. United States v. Abdirahman Sheik Mohamed (2018)

Court: U.S. District Court, Southern District of Ohio
Statutes Involved: 18 U.S.C. §1028A (Aggravated Identity Theft), 18 U.S.C. §1343 (Wire Fraud)

Facts

Mohamed ran a scheme using stolen Social Security numbers to file fraudulent tax returns. The IRS flagged hundreds of returns linked to him. He had obtained personal information of real individuals—many elderly—through illicit data brokers. The refunds were routed to prepaid debit cards under his control.

Issue

Whether using real individuals’ Social Security numbers knowingly and unlawfully to file fraudulent returns constitutes aggravated identity theft under §1028A.

Decision

Mohamed was convicted of aggravated identity theft and wire fraud. The court held that using another person’s identifying number without lawful authority, even if the victim was unaware, met the statutory requirement.

Significance

This case underscored the federal government’s increased focus on tax-refund identity theft and clarified that actual knowledge that the identity belonged to a real person was sufficient for conviction.

2. United States v. Alvarez (United States v. Giovanni Alvarez) – 2014

Court: U.S. Court of Appeals, Eleventh Circuit
Statute: 18 U.S.C. §1028A

Facts

Alvarez used stolen patient identities from a medical clinic to fraudulently obtain credit and open bank accounts. He argued he did not know the identities were tied to “real persons.”

Issue

Did the prosecution need to prove the defendant knew the personal identifiers belonged to real individuals?

Decision

The Eleventh Circuit affirmed the conviction and held that proof of actual knowledge was necessary but could be inferred from circumstantial evidence—such as the sophistication of the scheme, number of victims, and nature of records stolen.

Significance

The decision clarified evidentiary standards for proving knowledge in aggravated identity theft cases.

3. United States v. Flores-Figueroa (U.S. Supreme Court, 2009)

Court: U.S. Supreme Court
Statute: 18 U.S.C. §1028A

Facts

Flores-Figueroa, an undocumented worker, used fake identification documents containing real Social Security and Alien Registration numbers to secure employment. He claimed he did not know the numbers belonged to real people.

Issue

Does §1028A require the government to prove the defendant knew the identity belonged to an actual person?

Decision

The Supreme Court ruled in favor of the defendant, holding that knowledge is required, because the wording “knowingly uses… a means of identification of another person” demands it.

Significance

This is a landmark identity-theft case. It changed the way prosecutors approached identity-theft crimes, requiring them to demonstrate actual knowledge—a higher burden of proof.

4. United States v. Adeyemi (2017)

Court: U.S. District Court, District of Maryland
Statutes: 18 U.S.C. §1028A; 18 U.S.C. §1349 (Conspiracy to Commit Fraud)

Facts

Adeyemi operated a multi-state IRS tax-refund fraud ring, obtaining stolen identities of soldiers deployed overseas. He used these identities to file false returns, generating millions in fraudulent refunds.

Issue

Whether conspiracy coupled with identity misuse warranted enhanced penalties under §1028A’s mandatory two-year consecutive sentences.

Decision

The court imposed consecutive terms for each count of aggravated identity theft. It emphasized that identity theft tied to national-security-sensitive victims (like military personnel) warranted strict sentencing.

Significance

This case showed how courts apply stacked sentencing for multiple identity-theft counts, dramatically increasing punishment.

5. United States v. Kyllo (2016)

Court: U.S. District Court, Western District of Washington
Statutes: 18 U.S.C. §1028; 18 U.S.C. §1029 (Access Device Fraud)

Facts

Kyllo obtained credit card information by skimming devices placed on gas pumps. The stolen credit card information was used to duplicate cards and withdraw cash from ATMs.

Issue

Was possession of multiple stolen card numbers, along with devices used for skimming, enough to prove intent to defraud?

Decision

The court ruled that the combination of tools, data, and conduct demonstrated clear criminal intent, securing convictions on identity-theft and access-device-fraud charges.

Significance

The case strengthened precedent that possessing identity-theft tools—like skimmers—along with stolen data is sufficient to demonstrate fraudulent intent.

6. United States v. Scott Levine (2005, Pre-§1028A but foundational)

Court: U.S. District Court, Arkansas
Statutes: Computer Fraud and Abuse Act (18 U.S.C. §1030), wire fraud

Facts

Levine hacked into a data-aggregation company (Acxiom Corporation) and stole millions of personal records—names, SSNs, and birthdates. He sold them to marketing firms and identity-theft groups.

Issue

Could large-scale data breaches be prosecuted as identity theft even before specific identity-theft statutes were expanded?

Decision

Levine was convicted under CFAA and wire-fraud statutes. Though §1028A did not yet exist, the case shaped how prosecutors later justified identity-theft charges tied to data breaches.

Significance

It demonstrated that data breaches are a major vehicle for identity theft, laying groundwork for later statutory reforms and prosecutions.

7. The Ajay “Whizkid” Seth Case (India – 2004)

Court: Delhi High Court (India)
Statutes: Indian Penal Code; Information Technology Act, 2000

Facts

Ajay Seth hacked into U.S. financial institutions, stealing American credit card numbers and selling them on the underground market. Although operating from India, his crime involved transnational identity theft and credit-card fraud.

Issue

How should courts treat identity theft involving digital crimes that cross national borders?

Decision

Seth was convicted under Indian cybercrime and fraud laws. The court emphasized that identity theft is not geographically limited and upheld extraterritorial application of cybercrime statutes.

Significance

This case became an early example of international cooperation in identity-theft investigations and influenced India’s later cyber-law amendments.

Summary Table of Key Legal Principles from These Cases

CaseKey PrincipleImportance
MohamedUsing stolen SSNs for tax fraud constitutes aggravated identity theftExpanded prosecution of tax-refund fraud
AlvarezKnowledge that identity belongs to a real person can be shown circumstantiallyLowered evidentiary burden (after Flores-Figueroa)
Flores-FigueroaGovernment must prove actual knowledge of “real person” statusLandmark Supreme Court interpretation
AdeyemiConsecutive sentencing for multiple identity-theft countsCreated strong deterrent effect
KylloSkimming devices + stolen card numbers = intent to defraudImportant for credit-card-fraud prosecutions
LevineData breaches constitute identity-theft-related offensesPioneered data-breach prosecution strategies
Seth (India)Identity theft is borderless; extraterritorial cybercrime enforcement allowedStrengthened global cyber-law enforcement

LEAVE A COMMENT