Criminal Identity Theft: When Someone Uses Your Identity in Legal Proceedings
Criminal identity theft occurs when an impostor presents another person's identifying information to law enforcement or judicial authorities during an arrest, citation, or legal proceeding. Unlike financial identity theft, which targets credit and banking systems, criminal identity theft contaminates court records, criminal databases, and law enforcement files — creating a false criminal history under the victim's name that can surface in background checks, employment screenings, and future law enforcement encounters. The consequences for victims are documented by the Federal Trade Commission as among the most difficult forms of identity theft to resolve, often requiring court orders and sustained engagement with multiple state and local agencies.
Definition and scope
Criminal identity theft is classified as a distinct category under identity theft law because the harm is embedded in governmental records rather than financial ones. Under 18 U.S.C. § 1028, knowingly using another person's means of identification — including a name, date of birth, or Social Security number — to commit or facilitate a federal offense constitutes identity theft, with penalties extending up to 15 years imprisonment for aggravated offenses.
At the state level, all 50 states maintain dedicated identity theft statutes, though the specific criminalization of using another's identity in legal proceedings is addressed through criminal impersonation and false personation codes. California Penal Code § 530.5, for example, explicitly covers the unauthorized use of another's personal information for unlawful purposes. The National Conference of State Legislatures (NCSL) maintains a current compilation of state-level statutes covering identity theft categories, including criminal impersonation.
The scope of criminal identity theft extends beyond misdemeanor encounters. Victims may find warrants issued in their name, convictions recorded under their identity, or parole violations attributed to them — each requiring independent legal remediation.
For a broader orientation to how this and related identity theft categories are organized within the service sector, see the identity theft providers section of this resource.
How it works
Criminal identity theft follows a recognizable operational sequence:
- Identity acquisition — The impostor obtains a victim's name, date of birth, and often a Social Security number through theft, purchase on fraud marketplaces, or social engineering.
- Presentation to authorities — During a traffic stop, arrest, or court appearance, the impostor presents the victim's identity rather than their own, either verbally or through counterfeit or borrowed documents.
- Record generation — Law enforcement systems log the encounter under the victim's identity. Citations, booking records, and arrest reports are filed accordingly.
- Court processing — If the impostor fails to appear for scheduled hearings, the court issues a bench warrant or default judgment under the victim's name and identifying information.
- Database propagation — The record enters state criminal repositories and, depending on severity, the FBI's National Crime Information Center (NCIC), administered under 28 U.S.C. § 534.
- Discovery by victim — The victim typically discovers the false record during a background check, a traffic stop, or a denial of employment or housing — sometimes years after the original incident.
The gap between steps 2 and 6 is the primary driver of harm severity. Records embedded in NCIC or state repositories are not self-correcting; removal requires formal legal action and active agency cooperation.
Common scenarios
Criminal identity theft manifests most frequently across three distinct scenarios:
Traffic and misdemeanor stops — The most common presentation. An individual stopped for a minor traffic violation provides a victim's name and date of birth when they lack a valid license or fear outstanding warrants. The resulting citation, if unpaid, generates a failure-to-appear record under the victim's identity.
Arrest processing — A more serious variant in which the impostor is booked, fingerprinted, and processed under the victim's identity. In jurisdictions where fingerprint records are not systematically cross-referenced against identity databases at booking, the false identity may persist through conviction. The FBI's Criminal Justice Information Services (CJIS) Division manages the Integrated Automated Fingerprint Identification System (IAFIS), but local booking records may not immediately trigger biometric verification.
Probation and parole violations — An impostor on probation or parole uses a victim's identity to avoid detection of a violation. When the violation is recorded, it appears under the victim's name in state supervision databases.
The contrast between the traffic stop scenario and the arrest scenario is significant: traffic-related false records are generally addressable through local court orders, while arrest and conviction records embedded in state repositories require a formal factual innocence or identity theft petition process, which in California, for example, is governed by Penal Code § 851.8.
Decision boundaries
Determining whether a case constitutes criminal identity theft — as opposed to related fraud categories — depends on three classification factors:
- Jurisdiction of the false record: Federal records (NCIC entries, federal court records) require engagement with federal agencies; state records are remediated through state processes.
- Type of proceeding: Civil court impersonation, such as using a false identity in a civil lawsuit, is generally classified under fraud or perjury statutes rather than criminal identity theft codes.
- Nature of the identifying information used: Presenting only a name verbally may constitute criminal impersonation; presenting a fabricated or stolen government-issued document elevates the offense and the remediation complexity.
The FTC's IdentityTheft.gov platform provides structured reporting pathways for criminal identity theft victims, including documentation templates accepted by law enforcement agencies. Victims with records in criminal databases are directed to the relevant state attorney general or court of record for the jurisdiction where the false record originated.
For professionals navigating this sector, the identity theft provider network purpose and scope and the how to use this identity theft resource pages describe how service providers and legal professionals are categorized within this reference structure.