Synopses & Reviews
What will you do when you encounter identity theft within your business?Chances are, you have already lost money to identity theft and business fraud. Look no further than the latest newspaper headlines to know that it is an epidemic problem and an alarming reality from which no business—whether small or large—is immune.
Although you can't completely stop identity theft from happening, you can be prepared when it takes place. Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims is your practical guide for fully understanding and investigating identity theft.
"The training that I received from Judy Collins at MSU has been instrumental to my helping victims of identity theft and locating the person(s) who caused their nightmare. I have even used the training methods she outlines in this book on a homicide investigation and it paid off: the perpetrator is now in jail for the rest of his life. I can't say enough about Dr. Collins and her knowledge of tracking criminals on the Internet; she is a great asset to law enforcement."
—Anthony Abdallah, Police Detective, Inkster Police Department (CID), Inkster, Michigan
"This valuable book is an essential, pragmatic guide for the full understanding and investigation of identity theft crimes. It also establishes Dr. Judith Collins as a foremost national expert on this growing crime problem that threatens our future."
—Dr. Bruce L. Benson, Police Chief Emeritus, Associate Professor, Criminal Justice, Michigan State University
"Whether the investigator is working in the private or public sector, Dr. Collins presents valuable information on the methodology required to successfully resolve identity theft cases. The use of real-life investigations, with lessons learned, provides an intriguing and entertaining format while at the same time sharpening the investigator's skills. If you think investigating identity theft is not worthwhile because the crime is committed by individuals on randomly selected victims without specific objectives, goals, or purpose, you need to read this book."
—Rod Kinghorn, Director of Investigations, General Motors Global Security
"An excellent book. Judith Collins has spent many years investigating identity theft. Her willingness to share her knowledge with law enforcement, businesses, and victims is truly a benefit that cannot be found elsewhere."
—Juli Liebler, Captain, East Lansing Police Department, East Lansing, Michigan
"Well done. Smart idea. . . . This is an excellent, professionally written book . . . and much needed."
—Salman Anwar, Computer Forensic Engineer, Western Michigan University Police Department
"As a retired special agent with the Federal Bureau of Investigation, and having worked the past six years in the private sector, I found Dr. Collins's book to be an invaluable tool for both the private sector and the law enforcement community. Dr. Collins provides genuine insight into the complex issues surrounding identity theft. I am confident her book will assist in both the prevention of identity theft and the detection of those who prey on other's identities."
—Frank Laudan, Investigator, Securitas Security Services USA, Inc.
"Excellent guide! A must-read for anyone involved in investigating identity theft! Dr. Collins has become one of the most respected and knowledgeable authorities in this relatively new field."
—Detective Gary A. Guiles (Retired), Fraud Investigator, Lansing Police Department, Lansing, Michigan
Review
"Investigating Identity Theft has garnered praise from law-enforcement investigators around the US since it was published in May." (Financial IT Security, September 2006)
Synopsis
Are you equipped to investigate identity theft within your business?
If you run a business, chances are you have lost money to identity theft and business fraud. According to FBI statistics, identity theft is the nation's fastest growing crime, as well as the fastest growing category of Federal Trade Commission (FTC) complaints. Business employees who have access to sensitive business, customer, or other employee information perpetrate most identity theft fraud and cost organizations millions of dollars annually in lost productivity due to thefts of employee and customer identities. You need to know how you will respond whennot ifyour business is victimized by identity theft and business fraud.
Written by Judith Collins, a highly regarded expert on identity theft, Investigating Identity Theft is informed by the author's years of proactive experience through all aspects of conducting an investigation, from when the crime has been discovered to persecution of the perpetrator. It is an invaluable resource that helps business managers, auditors, criminal justice teachers, investigators, law enforcement officials, and identity theft victims:
- Know the crime and understand the criminal
- Equip computer security for identity fraud investigations
- Configure the computer for online investigations
- Understand the victim, then prepare to launch the investigation
- Authenticate and then investigate
- Understand issues underlying identity theft investigations, using actual case examples
- Take a walk through the Internet sites used by perpetrators
- Trace e-mail addresses, IP addresses, and URLs across the Internet
- Learn cyber-search techniques for investigating frauds committed using stolen identitiesover 1,000 Weblinks are provided to aid in fraud investigations
Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims gives readers a rare look at the process of conducting a successful identity theft investigation with practical, real-world guidance for each stage. The author's authentic examples of identity theft cases demonstrate how perpetrators can be brought to justice.
Synopsis
What will you do when you encounter identity theft within your business?
Chances are, you have already lost money to identity theft and business fraud. Look no further than the latest newspaper headlines to know that it is an epidemic problem and an alarming reality from which no business-whether small or large-is immune.
Although you can't completely stop identity theft from happening, you can be prepared when it takes place. Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims is your practical guide for fully understanding and investigating identity theft.
"The training that I received from Judy Collins at MSU has been instrumental to my helping victims of identity theft and locating the person(s) who caused their nightmare. I have even used the training methods she outlines in this book on a homicide investigation and it paid off: the perpetrator is now in jail for the rest of his life. I can't say enough about Dr. Collins and her knowledge of tracking criminals on the Internet; she is a great asset to law enforcement."
-Anthony Abdallah, Police Detective, Inkster Police Department (CID), Inkster, Michigan
"This valuable book is an essential, pragmatic guide for the full understanding and investigation of identity theft crimes. It also establishes Dr. Judith Collins as a foremost national expert on this growing crime problem that threatens our future."
-Dr. Bruce L. Benson, Police Chief Emeritus, Associate Professor, Criminal Justice, Michigan State University
"Whether the investigator is working in the private or public sector, Dr. Collins presents valuable information on the methodology required to successfully resolve identity theft cases. The use of real-life investigations, with lessons learned, provides an intriguing and entertaining format while at the same time sharpening the investigator's skills. If you think investigating identity theft is not worthwhile because the crime is committed by individuals on randomly selected victims without specific objectives, goals, or purpose, you need to read this book."
-Rod Kinghorn, Director of Investigations, General Motors Global Security
"An excellent book. Judith Collins has spent many years investigating identity theft. Her willingness to share her knowledge with law enforcement, businesses, and victims is truly a benefit that cannot be found elsewhere."
-Juli Liebler, Captain, East Lansing Police Department, East Lansing, Michigan
"Well done. Smart idea. . . . This is an excellent, professionally written book . . . and much needed."
-Salman Anwar, Computer Forensic Engineer, Western Michigan University Police Department
"As a retired special agent with the Federal Bureau of Investigation, and having worked the past six years in the private sector, I found Dr. Collins's book to be an invaluable tool for both the private sector and the law enforcement community. Dr. Collins provides genuine insight into the complex issues surrounding identity theft. I am confident her book will assist in both the prevention of identity theft and the detection of those who prey on other's identities."
-Frank Laudan, Investigator, Securitas Security Services USA, Inc.
"Excellent guide! A must-read for anyone involved in investigating identity theft! Dr. Collins has become one of the most respected and knowledgeable authorities in this relatively new field."
-Detective Gary A. Guiles (Retired), Fraud Investigator, Lansing Police Department, Lansing, Michigan
About the Author
Judith M. Collins, former associate professor at the School of Criminal Justice, Michigan State University (MSU), is now employed by the State Department, Washington, D.C. and can be reached at
[email protected]. Dr. Collins is a highly regarded expert on identity theft and has been a guest on National Public Radio and on local television and radio shows. She has also been quoted in various newspaper and magazine articles, is a frequent speaker on the subject, and conducts law enforcement training throughout the United States.
Table of Contents
A Message to Investigators.
Acknowledgments.
Foreword.
Chapter 1. “Real World” Cases: Solved And Unsolved.
Chapter 2. Know The Crime And Understand The Criminal.
Chapter 3. Computer Security For Identity Fraud Investigations.
Chapter 4. Configuring The Computer And Introduction To Cyber-Searching.
Chapter 5. Understand The Victim: Then Prepare For The Investigation.
Chapter 6. Authenticate Then Investigate.
Chapter 7. Identity Fraud Investigation: A Case Example.
Chapter 8. A Walk Through The World Wide Web.
Chapter 9. Tracing IP Addresses And URLs Across The WWW.
Chapter 10. Tracing E-mail Addresses.
Chapter 11. searching and Seizing: The Investigator's Role.
Appendix: List of Web Sites for Identity Theft Searches.
Notes.
Index.