"Criminals use phone calls, emails, and other methods to obtain personal information, then use it to commit identity theft." . . . . .