______ involves the perpetrator posing as someone else during apprehension.
Criminal identity theft
Financial identity theft
Identity cloning
Medical identity theft