Assess the Virtual or Internet-facilitated methods by which computer criminals steal an identity.