Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims
What will you do when you encounter identity theft within your business?
Chances are, you have already lost money to identity theft and business fraud. Look no further than the latest newspaper headlines to know that it is an epidemic problem and an alarming reality from which no business-whether small or large-is immune.
Although you can't completely stop identity theft from happening, you can be prepared when it takes place. Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims is your practical guide for fully understanding and investigating identity theft.
"The training that I received from Judy Collins at MSU has been instrumental to my helping victims of identity theft and locating the person(s) who caused their nightmare. I have even used the training methods she outlines in this book on a homicide investigation and it paid off: the perpetrator is now in jail for the rest of his life. I can't say enough about Dr. Collins and her knowledge of tracking criminals on the Internet; she is a great asset to law enforcement."
-Anthony Abdallah, Police Detective, Inkster Police Department (CID), Inkster, Michigan
"This valuable book is an essential, pragmatic guide for the full understanding and investigation of identity theft crimes. It also establishes Dr. Judith Collins as a foremost national expert on this growing crime problem that threatens our future."
-Dr. Bruce L. Benson, Police Chief Emeritus, Associate Professor, Criminal Justice, Michigan State University
"Whether the investigator is working in the private or public sector, Dr. Collins presents valuable information on the methodology required to successfully resolve identity theft cases. The use of real-life investigations, with lessons learned, provides an intriguing and entertaining format while at the same time sharpening the investigator's skills. If you think investigating identity theft is not worthwhile because the crime is committed by individuals on randomly selected victims without specific objectives, goals, or purpose, you need to read this book."
-Rod Kinghorn, Director of Investigations, General Motors Global Security
"An excellent book. Judith Collins has spent many years investigating identity theft. Her willingness to share her knowledge with law enforcement, businesses, and victims is truly a benefit that cannot be found elsewhere."
-Juli Liebler, Captain, East Lansing Police Department, East Lansing, Michigan
"Well done. Smart idea. . . . This is an excellent, professionally written book . . . and much needed."
-Salman Anwar, Computer Forensic Engineer, Western Michigan University Police Department
"As a retired special agent with the Federal Bureau of Investigation, and having worked the past six years in the private sector, I found Dr. Collins's book to be an invaluable tool for both the private sector and the law enforcement community. Dr. Collins provides genuine insight into the complex issues surrounding identity theft. I am confident her book will assist in both the prevention of identity theft and the detection of those who prey on other's identities."
-Frank Laudan, Investigator, Securitas Security Services USA, Inc.
"Excellent guide! A must-read for anyone involved in investigating identity theft! Dr. Collins has become one of the most respected and knowledgeable authorities in this relatively new field."
-Detective Gary A. Guiles (Retired), Fraud Investigator, Lansing Police Department, Lansing, Michigan
What people are saying - Write a review
We haven't found any reviews in the usual places.
A Guide for Businesses Law Enforcement and Victims Chapter 1 REAL WORLD CASES SOLVED AND UNSOLVED
A Guide for Businesses Law Enforcement and Victims Chapter 2 KNOW THE CRIME AND UNDERSTAND THE CRIMINAL
A Guide for Businesses Law Enforcement and Victims Chapter 3 COMPUTER SECURITY FOR IDENTITY FRAUD INVESTIGATIONS
A Guide for Businesses Law Enforcement and Victims Chapter 4 CONFIGURING THE COMPUTER AND INTRODUCTION TO CYBERSEARCHING
A Guide for Businesses Law Enforcement and Victims Chapter 5 UNDERSTAND THE VICTIM THEN PREPARE FOR THE INVESTIGATION
A Guide for Businesses Law Enforcement and Victims Chapter 6 AUTHENTICATE THEN INVESTIGATE
A Guide for Businesses Law Enforcement and Victims Chapter 7 IDENTITY FRAUD INVESTIGATION A CASE EXAMPLE
A Guide for Businesses Law Enforcement and Victims Chapter 8 A WALK THROUGH THE WORLD WIDE WEB
A Guide for Businesses Law Enforcement and Victims Chapter 9 TRACING IP ADDRESSES AND URLS ACROSS THE WWW
A Guide for Businesses Law Enforcement and Victims Chapter 10 TRACING EMAIL ADDRESSES
A Guide for Businesses Law Enforcement and Victims Chapter 11 SEARCHING AND SEIZING THE INVESTIGATORS ROLE
A Guide for Businesses Law Enforcement and Victims Appendix A LIST OF WEB SITES FOR IDENTITY THEFT SEARCHES
A Guide for Businesses Law Enforcement and Victims NOTES
Other editions - View all
al Qaeda Ann Blakely bank Brevard County browser bar California CapitalOne Chapter checks Clerk of Circuit Clerk of Courts Click Code Colorado computer’s County Court Records Search credit card fraud criminal database Date Denton County Department of Corrections Directory domain name Donavon Adams driver’s license e-mail address e-mail message EPLS–Excluded Parties Listing Equifax evidence Exhibit Florida Clerk Fort Bend County fraud investigator fraudulent header ID–Drivers License Calculator identity fraud identity theft investigations identity theft networks InfoSpace Innovis Internet Protocol IP address located Maria Lopez merchandise Michigan obtain Official Records Search Parties Listing System–Search perpetrators Phone Number police department police officer Public Records Search Qaeda Recorded Document Search retail account San Bernardino County Search by Name search engines server Service shadowcrew Social Security number Step stolen identities telephone number Unique ID–Drivers License victim Wayback Machine Whois