Identity Theft and Fraud

  • Peter van SchijndelEmail author
Part of the Information Technology and Law Series book series (ITLS, volume 20)


There are many different forms of identity theft. In 2004, I fell victim to one of the more common ones, debit card fraud. Someone had managed to copy my debit card and had also acquired my pin code. Presumably through a modified ATM, fitted with a card reader and a small hidden camera. Using the copied debit card and spied pin code, this person then managed to empty my entire checking’s account at various ATM’s abroad, in France and Italy. I had an overdraft facility, and the criminal was more than happy to take full advantage of that as well. Overnight, the little credit I had with the bank was converted into a 1,000 € debt.


Financial Gain Identity Theft Real Person Debit Card Identity Switch 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. Clarke RA (1994) Human identification theory in information systems: management challenges and public policy issues. Information Technology & People 4Google Scholar
  2. Foucalt M (1991) Governmentality. In: Burchell G (ed) The foucault effect. University of Chicago Press, ChicagoGoogle Scholar
  3. Grijpink JHAM (2005) Onze informatiesamenleving in wording. Privacy & Informatie 3Google Scholar
  4. Koops BJ, Leenes R (2006) ID theft, ID fraud and/or ID related crime. definitions matter. datenschutz und datensicherheit 9Google Scholar
  5. Kuiper I (2004) Pinpasfraude. Trouw, 2 DecemberGoogle Scholar
  6. Locke J (1786) An essay concerning human understanding, 19th edn. Dublin (digital reproduction: Thomson Gale, 2003)Google Scholar
  7. LoPucki LM (2001) Human identification theory and the identity theft problem. Tex Law Rev 2001-1:89–135Google Scholar
  8. Marbus R (2009) Identiteitsmanagement in Nederland. de stand van zaken. ECP-EPN, April 2009Google Scholar
  9. Nationale Ombudsman (2008) rapportnummer 2008/232, 21 oktober 2008Google Scholar
  10. O’Harrow R (2005) No place to hide. Free Press, New YorkGoogle Scholar
  11. Poster M (2007) The secret self—the case of identity theft. Cult Stud 21:118–140CrossRefGoogle Scholar
  12. Prins JEJ (2007) Een recht op identiteit. Nederlands Juristenblad 14Google Scholar
  13. Prins JEJ, Meulen NS van der (2006) Identiteitsdiefstal: lessen uit het buitenland. Jusititïele Verkenningen 7Google Scholar
  14. Rost M, Meints M (2005) Authentisierung in sozial systemen. Identity theft strukturell betrachtet. Datenschutz und Datensicherheit 4Google Scholar
  15. Solove DJ (2004) The legal construction of identity theft, symposium: digital cops in a virtual environment. Yale Law SchoolGoogle Scholar
  16. van der Meulen NS (2006) Achter de schermen: de ervaringen van slachtoffers van identiteitsroof. Justitiele Verkenningen 7Google Scholar
  17. van der Meulen NS (2009) Identiteitsfraude: de eerste stap, nu nog de rest. Computerrecht 38Google Scholar
  18. van Schijndel P (2009) Identiteitsdiefstal. Jongbloed Juridische Uitgevers, Den HaagGoogle Scholar
  19. Vries URMTH de et al (2007) Identiteitsfraude: een afbakening. WODCGoogle Scholar

Copyright information

© T.M.C. ASSER PRESS, The Hague, The Netherlands, and the authors 2011 2011

Authors and Affiliations

  1. 1.Hoyng Monegier LLPAmsterdamThe Netherlands
  2. 2.The Centre for eLaw, Leiden UniversityLeidenThe Netherlands

Personalised recommendations