Skip to main content

Identity Theft and Fraud

  • Chapter
  • First Online:
Innovating Government

Part of the book series: Information Technology and Law Series ((ITLS,volume 20))

Abstract

There are many different forms of identity theft. In 2004, I fell victim to one of the more common ones, debit card fraud. Someone had managed to copy my debit card and had also acquired my pin code. Presumably through a modified ATM, fitted with a card reader and a small hidden camera. Using the copied debit card and spied pin code, this person then managed to empty my entire checking’s account at various ATM’s abroad, in France and Italy. I had an overdraft facility, and the criminal was more than happy to take full advantage of that as well. Overnight, the little credit I had with the bank was converted into a 1,000 € debt.

Peter van Schijndel wrote his master’s thesis, at the Centre for eLaw, on the subject of Identity Theft. This chapter is based on Schijndel (2009).

Contribution received in 2010.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 149.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Kuiper 2004, provides some statistical data on the success-rate of claims for reimbursement after debit-card fraud: only 12.16% of all claims were awarded. At present banks are more forthcoming in compensating victims.

  2. 2.

    Prins 2007, identifies five different forms of identity all dependent on their context: (1) legal identity, (2) administrative identity, (3) cultural identity, (4) religious identity and (5) personal identity.

  3. 3.

    Reference is made to Foucalt and his idea of 'Gouvernementalité,’ Foucalt 1991, p. 100.

  4. 4.

    An avatar will usually ‘belong’ to a real person, but may in some cases not be a representation of that person. The owner may not recognize himself in the actions of his avatar: e.g., in the atrocities of war committed by his World of Warcraft avatar. The avatar and the person behind the avatar are in Locke's definition of identity, not the same person. Being the ‘owner’ of an avatar, and having instructed the avatar, will however be part of the identity of the real person.

  5. 5.

    The list is a condensed grouping of the examples given in: Clarke 1994.

  6. 6.

    The possibility is denied in De Vries et al. 2007, p. 219.

  7. 7.

    See Rost and Meints 2005, p. 217, where the concepts of ‘Identitätskolision’ and ‘Identitätswechsel’ are introduced.

  8. 8.

    Apparently it is quite common practice in the Netherlands for convicted criminals to pay someone else to report to prison and be incarcerated in their name. After a couple of weeks incarceration, the ‘fake’ criminal reports the confused identities and is released. The real criminal has by then disappeared.

  9. 9.

    Strictly speaking financial identity theft/fraud is a species of criminal identity theft/fraud, as wrongful financial gain is a crime.

  10. 10.

    United States Identity Theft and Assumption Deterrence Act, United States Code, title 18, s. 1028(a)(7).

  11. 11.

    Currently, a new bill regarding identity fraud in criminal proceeding is pending in the Dutch Senate (‘Eerste Kamer’) (‘Wet identiteitsvaststelling verdachten,veroordeelden en getuigen’, Kamerstukken I/II, 31 436). This bill focuses on the prevention of identity fraud in criminal legal proceedings. The bill is aimed at providing a more robust identification process. It however does not introduce penalty provision for identity theft that occurs despite these new attempts at prevention.

  12. 12.

    Hoge Raad (Supreme Court) 23 May 1921, NJ 1921/564.

  13. 13.

    Hoge Raad (Supreme Court) 3 December 1996, NJ 1997/574.

  14. 14.

    See among others De Vries et al. 2007, p. 219, and Prins and van der Meulen 2006, p. 11.

  15. 15.

    Nationale Ombudsman 2008, rapportnummer 2008/232, 21 October 2008. The report was later revised to make some factual changes, but the conclusions remained unchanged.

  16. 16.

    Ibid., paragraph. 28, p. 14. The convictions by default of appearance appear to be the result of the policy of the police to hand out the subpoena directly to the suspect while he is held at the police station. Subsequently the subpoena is no longer served at the home address of the suspect. If the suspect is incorrectly identified at the police office, the person mentioned in the subpoena is not aware that a subpoena was served on him.

  17. 17.

    Rechtbank (District court) The Hague 2 March 2009, LJN BH4957.

  18. 18.

    The case brought by Kowsoleea against the Dutch State was based on civil law, rather than administrative law as is usually the case in proceedings against the State. The claim was based on governmental tort (‘onrechtmatige overheidsdaad’). A governmental tort has the same legal requirements as a general tort, but the threshold for establishing wrongful behavior on the part of the State is higher than for a normal (legal) person, as the State has broad powers and authority to justify its actions. The reasoning behind the verdict in the Kowsoleea case, being based in civil law, would in principle also apply to cases not involving the State.

  19. 19.

    Rechtbank (District Court) The Hague 2 March 2009, LJN BH4957, consideration 3.6.

References

  • Clarke RA (1994) Human identification theory in information systems: management challenges and public policy issues. Information Technology & People 4

    Google Scholar 

  • Foucalt M (1991) Governmentality. In: Burchell G (ed) The foucault effect. University of Chicago Press, Chicago

    Google Scholar 

  • Grijpink JHAM (2005) Onze informatiesamenleving in wording. Privacy & Informatie 3

    Google Scholar 

  • Koops BJ, Leenes R (2006) ID theft, ID fraud and/or ID related crime. definitions matter. datenschutz und datensicherheit 9

    Google Scholar 

  • Kuiper I (2004) Pinpasfraude. Trouw, 2 December

    Google Scholar 

  • Locke J (1786) An essay concerning human understanding, 19th edn. Dublin (digital reproduction: Thomson Gale, 2003)

    Google Scholar 

  • LoPucki LM (2001) Human identification theory and the identity theft problem. Tex Law Rev 2001-1:89–135

    Google Scholar 

  • Marbus R (2009) Identiteitsmanagement in Nederland. de stand van zaken. ECP-EPN, April 2009

    Google Scholar 

  • Nationale Ombudsman (2008) rapportnummer 2008/232, 21 oktober 2008

    Google Scholar 

  • O’Harrow R (2005) No place to hide. Free Press, New York

    Google Scholar 

  • Poster M (2007) The secret self—the case of identity theft. Cult Stud 21:118–140

    Article  Google Scholar 

  • Prins JEJ (2007) Een recht op identiteit. Nederlands Juristenblad 14

    Google Scholar 

  • Prins JEJ, Meulen NS van der (2006) Identiteitsdiefstal: lessen uit het buitenland. Jusititïele Verkenningen 7

    Google Scholar 

  • Rost M, Meints M (2005) Authentisierung in sozial systemen. Identity theft strukturell betrachtet. Datenschutz und Datensicherheit 4

    Google Scholar 

  • Solove DJ (2004) The legal construction of identity theft, symposium: digital cops in a virtual environment. Yale Law School

    Google Scholar 

  • van der Meulen NS (2006) Achter de schermen: de ervaringen van slachtoffers van identiteitsroof. Justitiele Verkenningen 7

    Google Scholar 

  • van der Meulen NS (2009) Identiteitsfraude: de eerste stap, nu nog de rest. Computerrecht 38

    Google Scholar 

  • van Schijndel P (2009) Identiteitsdiefstal. Jongbloed Juridische Uitgevers, Den Haag

    Google Scholar 

  • Vries URMTH de et al (2007) Identiteitsfraude: een afbakening. WODC

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peter van Schijndel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 T.M.C. ASSER PRESS, The Hague, The Netherlands, and the authors 2011

About this chapter

Cite this chapter

van Schijndel, P. (2011). Identity Theft and Fraud. In: van der Hof, S., Groothuis, M. (eds) Innovating Government. Information Technology and Law Series, vol 20. T.M.C. Asser Press. https://doi.org/10.1007/978-90-6704-731-9_22

Download citation

Publish with us

Policies and ethics

Societies and partnerships