Investigating Identity Theft


Book Description

What will you do when you encounter identity theft within your business? Chances are, you have already lost money to identity theft and business fraud. Look no further than the latest newspaper headlines to know that it is an epidemic problem and an alarming reality from which no business-whether small or large-is immune. Although you can't completely stop identity theft from happening, you can be prepared when it takes place. Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims is your practical guide for fully understanding and investigating identity theft. "The training that I received from Judy Collins at MSU has been instrumental to my helping victims of identity theft and locating the person(s) who caused their nightmare. I have even used the training methods she outlines in this book on a homicide investigation and it paid off: the perpetrator is now in jail for the rest of his life. I can't say enough about Dr. Collins and her knowledge of tracking criminals on the Internet; she is a great asset to law enforcement." -Anthony Abdallah, Police Detective, Inkster Police Department (CID), Inkster, Michigan "This valuable book is an essential, pragmatic guide for the full understanding and investigation of identity theft crimes. It also establishes Dr. Judith Collins as a foremost national expert on this growing crime problem that threatens our future." -Dr. Bruce L. Benson, Police Chief Emeritus, Associate Professor, Criminal Justice, Michigan State University "Whether the investigator is working in the private or public sector, Dr. Collins presents valuable information on the methodology required to successfully resolve identity theft cases. The use of real-life investigations, with lessons learned, provides an intriguing and entertaining format while at the same time sharpening the investigator's skills. If you think investigating identity theft is not worthwhile because the crime is committed by individuals on randomly selected victims without specific objectives, goals, or purpose, you need to read this book." -Rod Kinghorn, Director of Investigations, General Motors Global Security "An excellent book. Judith Collins has spent many years investigating identity theft. Her willingness to share her knowledge with law enforcement, businesses, and victims is truly a benefit that cannot be found elsewhere." -Juli Liebler, Captain, East Lansing Police Department, East Lansing, Michigan "Well done. Smart idea. . . . This is an excellent, professionally written book . . . and much needed." -Salman Anwar, Computer Forensic Engineer, Western Michigan University Police Department "As a retired special agent with the Federal Bureau of Investigation, and having worked the past six years in the private sector, I found Dr. Collins's book to be an invaluable tool for both the private sector and the law enforcement community. Dr. Collins provides genuine insight into the complex issues surrounding identity theft. I am confident her book will assist in both the prevention of identity theft and the detection of those who prey on other's identities." -Frank Laudan, Investigator, Securitas Security Services USA, Inc. "Excellent guide! A must-read for anyone involved in investigating identity theft! Dr. Collins has become one of the most respected and knowledgeable authorities in this relatively new field." -Detective Gary A. Guiles (Retired), Fraud Investigator, Lansing Police Department, Lansing, Michigan




Identity Theft Handbook


Book Description

Not a week goes by when identity theft isn t mentioned in the media or that a Congressional outcry isn t heard about this unrelenting crime. The first authoritative book on identity theft, Identity Theft Handbook is written by a career professional who has spent over 25 years investigating and preventing identity theft in both the public and private sectors. Its rich real-world content includes interviews with government and private sector thought leaders. As well, the costs of identity theft, future trends, and prevention guidance is discussed. For investigators, auditors, and managers.




Cybercrime Investigations


Book Description

Cybercrime continues to skyrocket but we are not combatting it effectively yet. We need more cybercrime investigators from all backgrounds and working in every sector to conduct effective investigations. This book is a comprehensive resource for everyone who encounters and investigates cybercrime, no matter their title, including those working on behalf of law enforcement, private organizations, regulatory agencies, or individual victims. It provides helpful background material about cybercrime's technological and legal underpinnings, plus in-depth detail about the legal and practical aspects of conducting cybercrime investigations. Key features of this book include: Understanding cybercrime, computers, forensics, and cybersecurity Law for the cybercrime investigator, including cybercrime offenses; cyber evidence-gathering; criminal, private and regulatory law, and nation-state implications Cybercrime investigation from three key perspectives: law enforcement, private sector, and regulatory Financial investigation Identification (attribution) of cyber-conduct Apprehension Litigation in the criminal and civil arenas. This far-reaching book is an essential reference for prosecutors and law enforcement officers, agents and analysts; as well as for private sector lawyers, consultants, information security professionals, digital forensic examiners, and more. It also functions as an excellent course book for educators and trainers. We need more investigators who know how to fight cybercrime, and this book was written to achieve that goal. Authored by two former cybercrime prosecutors with a diverse array of expertise in criminal justice and the private sector, this book is informative, practical, and readable, with innovative methods and fascinating anecdotes throughout.




Taking Charge


Book Description

Identity theft happens when someone steals your personal information and uses it without your permission. It is a serious crime that can wreak havoc with your finances, credit history, and reputation – and it can take time, money, and patience to resolve. The Federal Trade Commission (FTC), the nation's consumer protection agency, prepared this guide to help you repair the damage that identity theft can cause, and reduce the risk of identity theft happening to you.If you suspect that someone has stolen your identity, acting quickly is the best way to limit the damage. Setting things straight involves some work. This guide has tips, worksheets, blank forms, and sample letters to guide you through the recovery process. It covers:• what identity theft victims must do immediately• what problems may crop up• how you can reduce your risk of identity theft




Investigating White-collar Crime


Book Description

The 11 chapters of this book are intended to assist police investigators in obtaining the evidence required to prove the distinctive criminal elements of embezzlement and fraud. The first chapter defines "white-collar crime" and describes types of white-collar crime under the categories of crimes by individuals, crimes in the furtherance of legitimate business, and criminal activity disguised as legitimate business. The international scope of white-collar crime and the enforcement of white-collar crime are then discussed. The second chapter focuses on the white-collar crime of embezzlement, which occurs when a person fraudulently appropriates to his/her own benefit money or property entrusted to him/her by another without the effective consent of the owner. Fraud is the subject of the third chapter. Fraud occurs when a person obtains the property of another by deception. The deception involves making representations that are knowingly false by the design of the offender, and these representations are made with the intent to defraud a targeted victim. Relying on these false representations, the victim is induced to voluntarily give his/her property to the offender. The fourth chapter, a new chapter in this second edition, addresses identity theft, its incidence and costs, and the laws that it violates. The remaining chapters focus on the practical aspects of investigating embezzlement, fraud, and identity theft. Separate chapters cover accounting theory for investigators; auditing theory for investigators; financial interviewing and interrogation; public information, subpoenas, and search warrants; evidence and documentation; proving illicit transactions; and case preparation and the investigative report. Seven appendixes pertain to the numerical system of the American Bankers Association, the affidavit of financial information, area assignments of Social Security numbers, a guide to sources for financial information, consent to search, customer consent and authorization for access to financial records, and statement of rights.




Identity Theft


Book Description

An overall plan on how to minimize readers risk of becoming a victim, this book was designed to help consumers and institutions ward off this ever-growing threat and to react quickly and effectively to recover from this type of crime. It is filled with checklists on who one should notify in case they become a victim and how to recover an identity.




Take Charge


Book Description




The Complete Idiot's Guide to Recovering from Identity Theft


Book Description

A clear path out of the nightmare Identity theft is one of the fastest growing crimes in the United States and in many cases the victim has no knowledge of the theft until the situation is dire. Author Mari J. Frank, an attorney and advocate for victims of identity theft, takes the reader through every step necessary to reclaim their identity and wipe the records of theft off of all reports. • Covers every kind of fraud including bank, credit card, loans, insurance, medical, government, tax, professional license, business, employer, and online • A step–by–step process to reclaiming identity and wiping the records of theft off all reports




Identity Theft in the 21st Century


Book Description

Identity theft is sometimes considered a victimless crime, but readers will discover the truth about this damaging kind of crime as they learn about its history and the ways identity thieves work today. Essential facts about the methods identity thieves use—including stealing mail and hacking computers—are presented through comprehensive main text, comprehensive sidebars, and informative fact boxes. Readers also discover the ways the latest technology is used to find and stop identity thieves and how people can pursue a career in investigating identity theft. Detailed photographs are included to enhance this engaging reading experience.




Phishing


Book Description

"Phishing" is the hot new identity theft scam. An unsuspecting victim receives an e-mail that seems to come from a bank or other financial institution, and it contains a link to a Web site where s/he is asked to provide account details. The site looks legitimate, and 3 to 5 percent of people who receive the e-mail go on to surrender their information-to crooks. One e-mail monitoring organization reported 2.3 billion phishing messages in February 2004 alone. If that weren't enough, the crooks have expanded their operations to include malicious code that steals identity information without the computer user's knowledge. Thousands of computers are compromised each day, and phishing code is increasingly becoming part of the standard exploits. Written by a phishing security expert at a top financial institution, this unique book helps IT professionals respond to phishing incidents. After describing in detail what goes into phishing expeditions, the author provides step-by-step directions for discouraging attacks and responding to those that have already happened. In Phishing, Rachael Lininger: Offers case studies that reveal the technical ins and outs of impressive phishing attacks. Presents a step-by-step model for phishing prevention. Explains how intrusion detection systems can help prevent phishers from attaining their goal-identity theft. Delivers in-depth incident response techniques that can quickly shutdown phishing sites.