Assess the Virtual or Internet-facilitated methods by which computer criminals steal an identity. Assess the Virtual or Internet-facilitated methods by which computer criminals steal an identity. Elaborate with examples of your own.