. . "which can then be used for identity theft, extortion, or other crimes." . .