I have one last question regarding identity theft.
The problem investigating a computer crime is knowing who is sitting on the chair and typing on the keyboard. With someone using a card, how can we be sure the one using the card is the right owner?