Criminal Defense AttorneySt Mary's CountyThe Law Offices of Haskell & DyerTheft & Robbery ChargesWhite Collar CrimesSomeone Else’s Card, Your Charges: A St. Mary’s County Identity Theft and Credit Card Fraud Defense Guide

Bottom Line Up Front

Maryland prosecutes identity theft and credit card fraud under Criminal Law § 8-301 and the related provisions in Title 8. Penalties scale with the harm caused, ranging from misdemeanor exposure for low value cases to felony exposure that can reach fifteen years for serious schemes. These cases differ from ordinary theft prosecutions in one important way: they rely heavily on circumstantial digital evidence rather than direct testimony or physical evidence. The IP address, the email account, the device fingerprint, the surveillance footage at the ATM, the card reader data, and the bank’s transaction logs all become the building blocks of the State’s case. Each one is also a potential defense angle.

Identity theft cases in St. Mary’s County come from a wide range of scenarios. Stolen credit cards used at retailers along Route 235. Fraudulent online purchases attributed to a defendant’s IP address. Family members or roommates accused of using each other’s payment information. Federal contractors at PAX River accused of misusing colleague credentials. Online marketplace transactions that turned out to involve stolen accounts. The conduct patterns vary, but the evidence patterns share recurring features.

This article walks through how Maryland’s identity theft statute actually applies and where the defense usually finds traction. For the broader St. Mary’s County theft framework, see our complete theft and robbery defense guide.

The Statutory Framework

Section 8-301 of the Criminal Law Article prohibits the use of personal identifying information of another person, without consent, to obtain a benefit, credit, money, goods, services, or any other thing of value. Personal identifying information is broadly defined and includes name, address, date of birth, Social Security number, taxpayer identification number, financial account information, biometric data, and similar items.

The penalty scales with the value involved. Cases under $100 are misdemeanors with up to eighteen months. Cases at $100 to $1,500 reach five years. Cases at $1,500 to $25,000 reach ten years. Cases at $25,000 to $100,000 reach fifteen years. Cases over $100,000 reach twenty five years. The aggregation rules allow the State to combine multiple incidents into a single charging count when they are part of a continuing scheme.

Related offenses include credit card fraud under § 8-204, theft of identifying information under § 8-301(c) when no use yet occurred, possession of forgery devices under § 8-606, and the federal counterparts that can be charged in cases involving interstate or federal interests. Many cases include several of these counts on the same charging document.

Federal jurisdiction often runs parallel. Identity theft cases involving interstate financial systems, federal agencies, or large-dollar amounts can be charged in the United States District Court for the District of Maryland. Federal aggravated identity theft under 18 U.S.C. § 1028A carries a mandatory consecutive two year sentence on top of the underlying offense. A defendant facing parallel state and federal charges needs counsel familiar with both forums and an integrated defense strategy.

The Digital Evidence Chain

Identity theft prosecutions are built on chains of digital evidence. The State traces the alleged transaction from the financial institution’s records back through payment processors, card networks, merchant systems, and ultimately to a device or location associated with the defendant. Each link in the chain has documentation requirements, authentication issues, and potential reliability problems.

The bank’s transaction log establishes that a charge occurred. The merchant’s point of sale records establish where it was authorized. The card network’s processing records establish the routing. ATM surveillance video establishes the user (when ATM withdrawals are involved). IP address logs from the merchant or the bank establish the originating connection. Device identifiers from mobile apps, browser cookies, and account login records establish the device used.

Defense counsel reviews each link. Was the chain of custody for each record properly documented? Are the timestamps consistent across systems? Is the IP address actually associated with the defendant rather than a public network, a VPN, or a household with multiple users? Does the surveillance footage actually show the defendant, or is it ambiguous? Each question that the State cannot answer cleanly becomes a defense.

The shared device problem. Many identity theft cases involve devices, accounts, or networks that multiple people had access to. A household where several people shared a Wi-Fi network. A shared computer in a workplace. A family account on a streaming or shopping platform. The State’s evidence may show that the conduct came from a particular device or account, but proving that the defendant was the actual user can be difficult when others had equal access. Counsel develops the alternative-user theory carefully when the facts support it.

The Knowledge and Consent Elements

Identity theft requires the use of another person’s information without consent. Cases sometimes turn on whether the alleged victim actually consented to the use, whether the defendant reasonably believed they had consent, or whether the relationship between the parties supported an inference of consent that the alleged victim later rescinded. Family members, romantic partners, business partners, and longtime friends sometimes have informal arrangements that look like identity theft when later viewed through a criminal lens.

The defense develops the relationship facts carefully. Documentation of prior authorized use, witness accounts of family or partner financial arrangements, and contextual evidence of the relationship all become defense angles. A defendant who used a partner’s credit card with prior authorization but without specific consent for a particular transaction has a different case from a defendant who acquired the card information through deception.

Surveillance Video at the ATM

Cases involving ATM withdrawals, in-person purchases, or other physical-presence transactions often hinge on surveillance video. The State must connect the defendant to the person captured on camera. The video itself, the lighting conditions, the angle, the resolution, and the duration of the capture all factor into the identification analysis.

Defense counsel reviews the video frame by frame, looking for moments where identification is clear and moments where it is ambiguous. Photographic comparison evidence (the defendant’s appearance compared to the captured subject), facial recognition analysis (when used by the State), and witness identifications (when others viewed the video and identified the defendant) all become defense angles. Maryland courts have established frameworks for evaluating photographic identifications, and counsel uses those frameworks to challenge the State’s case.

Defense Strategy

Effective defense in identity theft cases follows several patterns. First, attack the digital evidence chain. Authentication challenges, chain-of-custody questions, and forensic analysis methodology all create opportunities to weaken or exclude the State’s circumstantial proof.

Second, develop the alternative-user theory when supported by the facts. If multiple people had access to the device, account, or location implicated in the offense, the State must prove that the defendant was the specific user. Failure to prove that linkage can produce reasonable doubt.

Third, evaluate the value calculation. The penalty tier depends on value, and cases that span multiple incidents sometimes involve disputed amounts. Reducing the State’s claimed value can drop the case from a higher tier to a lower one with substantially less exposure.

Fourth, address the federal exposure when applicable. Cases that have potential federal jurisdiction should be evaluated for the risk of federal indictment, with defense strategy designed to minimize that risk. Plea structures that resolve the state case favorably can sometimes reduce federal interest in the case.

Identity Theft and Credit Card Fraud Defense

Digital evidence cases require digital evidence defenses. Haskell & Dyer represents accused individuals on identity theft and credit card fraud cases throughout St. Mary’s County and in the federal courts.

Main Office: 301-627-5844

24/7 Hotline: 240-687-0179

Related Reading

Frequently Asked Questions

What is identity theft under Maryland law?

Identity theft occurs when someone uses another person’s personal identifying information without consent to obtain money, goods, services, or other benefits.

What counts as personal identifying information?

Personal identifying information includes items such as name, address, Social Security number, financial account details, date of birth, and other sensitive data used to identify an individual.

What are the penalties for identity theft in Maryland?

Penalties depend on the value involved. They range from misdemeanor charges for low value cases to felony charges with up to 25 years in prison for high value schemes.

Can identity theft cases also be charged federally?

Yes. Cases involving interstate transactions or federal systems may be charged in federal court, where penalties can include mandatory additional prison time.

What type of evidence is used in identity theft cases?

Evidence often includes transaction records, IP address logs, surveillance footage, device data, and account activity from financial institutions and merchants.

Can multiple people using the same device create a defense?

Yes. If multiple people had access to the same device or network, it can be difficult for the State to prove that a specific person committed the offense.

Does consent matter in identity theft cases?

Yes. If the person whose information was used gave consent, or if the defendant reasonably believed they had permission, it can be a strong defense.

How is surveillance video used in identity theft cases?

Surveillance footage, such as ATM or store cameras, is used to identify the person conducting transactions. The defense may challenge the clarity and accuracy of the identification.

What is the importance of the value in an identity theft case?

The total value of the alleged fraud determines the severity of the charges and potential penalties, with higher amounts leading to more serious felony exposure.

Can Haskell and Dyer defend identity theft and credit card fraud cases?

Yes. Haskell and Dyer represents individuals charged with identity theft and credit card fraud in St. Mary’s County and in federal court, focusing on challenging digital evidence and protecting the client’s future.

References

18 U.S.C. § 1028A (2024). Aggravated identity theft. Washington, DC: U.S. Government Publishing Office.

Maryland Code Annotated, Criminal Law Article § 8-204 (2024). Credit card fraud. Annapolis, MD: General Assembly of Maryland.

Maryland Code Annotated, Criminal Law Article § 8-301 (2024). Identity fraud. Annapolis, MD: General Assembly of Maryland.

Maryland Code Annotated, Criminal Law Article § 8-606 (2024). Possession of forgery devices. Annapolis, MD: General Assembly of Maryland.

Maryland Rules. (2024). Maryland Rules 5-901 to 5-902: Authentication and identification of evidence. Annapolis, MD: Court of Appeals of Maryland.

Legal Disclaimer: This article provides general information about Maryland identity theft law and is not legal advice. Reading it does not create an attorney client relationship with Haskell & Dyer. For a confidential consultation, call 301-627-5844 or our 24/7 hotline at 240-687-0179.

The Law Offices of Haskell & Dyer, LLC Practicing Law in Anne Arundel, Calvert, Charles, St. Mary’s, and Prince George’s Counties.

The Law Offices of Haskell & Dyer, LLC Practicing Law in Anne Arundel, Calvert, Charles, St. Mary’s, and Prince George’s Counties.

The information provided on this website, in our blog posts, social media content, videos, or other marketing materials by The Law Offices of Haskell & Dyer, LLC is for general informational purposes only. It does not constitute legal advice or establish an attorney-client relationship. While we strive to provide accurate and current information, legal matters are often complex and fact-specific. You should not act or rely on any information contained herein without seeking professional legal counsel directly from a licensed attorney. Contacting our firm does not create an attorney-client relationship until a formal agreement is signed. For legal advice specific to your situation, please get in touch with our office directly.