But if the thief used an electronic fund transfer, federal law applies.
Or the thief might use your information to sign up for cell phone service.
Now, an ordinary thief would probably use violence in a case like this.
We want to know what the thieves used for transportation.
It was the same door that the thieves used on Sunday.
The thieves well knew the tunnels of the highest level and used them often.
Then a thief could use each credit card only one time, making detection much more difficult.
Beyond the town, Nancy chose the road which she felt certain the thieves had used.
The thieves used a variety of methods, Federal agents said.
These thieves often use technology to fudge financial records or move money between bank accounts.