Identity Theft And Financial Fraud

1. What Is Identity Theft?

Identity theft occurs when a person illegally obtains and uses another individual's personal information—such as name, Social Security number, Aadhaar number, bank details, credit card numbers—without authorization, typically for financial gain.

Common techniques:

Phishing emails or fake websites

SIM swap scams

Skimming of debit/credit cards

Data breaches

Social engineering

Account takeover (email, bank, or social media)

2. What Is Financial Fraud?

Financial fraud refers to deception with the intent to gain financial benefit using forged documents, stolen identity, false representation, or manipulation of financial instruments.

Examples:

Credit card fraud

Online banking fraud

Wire transfer fraud

Loan fraud using fake identity

Investment scams

Insurance fraud

Identity theft is often the first step in committing financial fraud.

3. Key Elements (Legally)

To establish identity theft or financial fraud, courts generally look at:

Unauthorized acquisition of personal or financial information

Intent to commit fraud or deception

Use of stolen identity for economic benefit

Actual loss or potential risk of harm

DETAILED CASE LAWS (MORE THAN FIVE)

Below are seven well-known cases explained in detail.

CASE 1: United States v. David O. Smith (U.S.)

Facts

David Smith ran a large-scale phishing scheme. He sent fake emails impersonating popular banks, directing users to fraudulent websites. Victims unknowingly provided login credentials, which Smith used to transfer funds from their accounts.

Issues

Whether phishing constituted wire fraud and identity theft

Whether online impersonation met statutory “use of identifying information”

Court’s Findings

Phishing emails used electronic communication, fulfilling the Wire Fraud Statute (18 U.S.C. § 1343)

Stolen login credentials were considered "means of identification"

Smith knowingly used identities to obtain financial gain → Aggravated Identity Theft (18 U.S.C. § 1028A)

Outcome

Smith was sentenced to over 12 years in prison, marking one of the earliest severe penalties for phishing-based identity theft.

CASE 2: R v. Ovie Onakoya (U.K.)

Facts

Onakoya was involved in a cyber-fraud ring that hacked into email accounts and used the identities of individuals to divert business payments. He laundered more than £1 million.

Issues

Whether unauthorized access to email accounts constituted identity theft

Whether business email compromise (BEC) amounted to fraud by false representation

Court’s Findings

Unauthorized access clearly violated Computer Misuse Act 1990

Using hijacked email accounts to mislead companies satisfied Fraud Act 2006 – Fraud by False Representation

Identity theft was central to committing financial fraud

Outcome

Onakoya received a 6-year sentence. The case emphasized international cooperation in cyber-fraud.

CASE 3: United States v. Hushpuppi (Ramon Abbas) (U.S.)

Facts

Ramon Abbas (“Hushpuppi”), a social media influencer, was part of a global cyber-fraud network. They used identity theft, fake business emails, and hacked systems to steal over $24 million, including attempts to steal $100 million from a Premier League football club.

Issues

Whether impersonating a company executive in email constituted identity theft

Whether financial losses must actually occur to prove conspiracy

Court’s Findings

Using spoofed email identities counted as identity theft

Conspiracy to commit wire fraud requires intent, even if fraud is interrupted

Large-scale international fraud increases sentencing levels

Outcome

Abbas was sentenced to 11 years and ordered to pay restitution. This case highlighted the sophistication of identity-based cybercrime.

CASE 4: State of Maharashtra v. Nilesh Jain (India)

Facts

Nilesh Jain cloned ATM cards using skimming devices installed on ATM machines in Mumbai. He used cardholder identities and PINs to withdraw lakhs of rupees.

Issues

Whether cloned ATM cards count as stolen “identity information”

Whether the Information Technology Act applies to card-skimming

Court’s Findings

Skimming violated Section 66C (Identity Theft) of the IT Act, 2000

Cloned cards constituted fraudulent electronic records under Section 468 IPC

Unauthorized withdrawal was cheating and financial fraud

Outcome

He was convicted under both IPC and IT Act sections. The court stressed the seriousness of electronic identity theft.

*CASE 5: CBI v. Amit Kumar & Others – The Vyapam Scam (India)

(Identity theft used for examination & job fraud, which later led to financial fraud)

Facts

Impersonators appeared in examinations on behalf of students. False identities were created using forged documents. Successful candidates later gained government jobs, causing financial losses to the state.

Issues

Whether impersonation constitutes identity theft

Whether obtaining employment by impersonation amounts to financial fraud

Court’s Findings

Impersonation constituted identity theft, cheating, and forgery

Fraudulent appointment led to financial gain (salary, benefits) → financial fraud

The organized criminal aspect aggravated charges

Outcome

Multiple individuals were convicted, and the court emphasized the connection between identity theft and financial corruption.

CASE 6: United States v. Evan Greebel (U.S.)

Facts

Attorney Evan Greebel conspired with Martin Shkreli (pharmaceutical executive) to use the identities of company shareholders without authorization to manipulate stock and hide losses.

Issues

Whether using another’s financial identity without permission constitutes identity theft

Whether identity misuse in corporate fraud counts as aggravated identity theft

Court’s Findings

Fraudulently signing documents and acting on behalf of shareholders constituted identity theft

Financial deception using these identities amounted to securities fraud

Outcome

Greebel received a lengthy sentence and restitution orders. This case expanded identity theft into the realm of corporate fraud.

CASE 7: R v. Adeyinka Adelekan (U.K.)

Facts

Adelekan used stolen credit card details from hacked databases to make luxury purchases and fund online transactions.

Issues

Whether possession of stolen digital card data constitutes identity theft

Whether misuse of card numbers is sufficient evidence

Court’s Findings

Digital possession of card numbers = identity theft under U.K. law

Use of stolen card details is fraud by false representation

Even attempted transactions count as fraud

Outcome

Adelekan was convicted, reinforcing that identity theft includes purely digital information, not just physical cards.

CONCLUSION

Identity theft is the unauthorized acquisition and misuse of personal information, and it frequently leads to financial fraud. Courts across jurisdictions treat identity theft as a serious offense, especially when committed through digital means. These cases demonstrate:

How identity theft evolves with technology

How courts adapt traditional fraud laws to digital crimes

That identity theft can be part of cybercrime, corporate fraud, ATM fraud, impersonation scams, and more

LEAVE A COMMENT

0 comments