Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims

Front Cover
John Wiley & Sons, Feb 17, 2006 - Business & Economics - 272 pages
1 Review
What will you do when you encounter identity theft within your business?

Chances are, you have already lost money to identity theft and business fraud. Look no further than the latest newspaper headlines to know that it is an epidemic problem and an alarming reality from which no business-whether small or large-is immune.

Although you can't completely stop identity theft from happening, you can be prepared when it takes place. Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims is your practical guide for fully understanding and investigating identity theft.

"The training that I received from Judy Collins at MSU has been instrumental to my helping victims of identity theft and locating the person(s) who caused their nightmare. I have even used the training methods she outlines in this book on a homicide investigation and it paid off: the perpetrator is now in jail for the rest of his life. I can't say enough about Dr. Collins and her knowledge of tracking criminals on the Internet; she is a great asset to law enforcement."
-Anthony Abdallah, Police Detective, Inkster Police Department (CID), Inkster, Michigan

"This valuable book is an essential, pragmatic guide for the full understanding and investigation of identity theft crimes. It also establishes Dr. Judith Collins as a foremost national expert on this growing crime problem that threatens our future."
-Dr. Bruce L. Benson, Police Chief Emeritus, Associate Professor, Criminal Justice, Michigan State University

"Whether the investigator is working in the private or public sector, Dr. Collins presents valuable information on the methodology required to successfully resolve identity theft cases. The use of real-life investigations, with lessons learned, provides an intriguing and entertaining format while at the same time sharpening the investigator's skills. If you think investigating identity theft is not worthwhile because the crime is committed by individuals on randomly selected victims without specific objectives, goals, or purpose, you need to read this book."
-Rod Kinghorn, Director of Investigations, General Motors Global Security

"An excellent book. Judith Collins has spent many years investigating identity theft. Her willingness to share her knowledge with law enforcement, businesses, and victims is truly a benefit that cannot be found elsewhere."
-Juli Liebler, Captain, East Lansing Police Department, East Lansing, Michigan

"Well done. Smart idea. . . . This is an excellent, professionally written book . . . and much needed."
-Salman Anwar, Computer Forensic Engineer, Western Michigan University Police Department

"As a retired special agent with the Federal Bureau of Investigation, and having worked the past six years in the private sector, I found Dr. Collins's book to be an invaluable tool for both the private sector and the law enforcement community. Dr. Collins provides genuine insight into the complex issues surrounding identity theft. I am confident her book will assist in both the prevention of identity theft and the detection of those who prey on other's identities."
-Frank Laudan, Investigator, Securitas Security Services USA, Inc.

"Excellent guide! A must-read for anyone involved in investigating identity theft! Dr. Collins has become one of the most respected and knowledgeable authorities in this relatively new field."
-Detective Gary A. Guiles (Retired), Fraud Investigator, Lansing Police Department, Lansing, Michigan
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

A Guide for Businesses Law Enforcement and Victims Chapter 1 REAL WORLD CASES SOLVED AND UNSOLVED
1
A Guide for Businesses Law Enforcement and Victims Chapter 2 KNOW THE CRIME AND UNDERSTAND THE CRIMINAL
17
A Guide for Businesses Law Enforcement and Victims Chapter 3 COMPUTER SECURITY FOR IDENTITY FRAUD INVESTIGATIONS
43
A Guide for Businesses Law Enforcement and Victims Chapter 4 CONFIGURING THE COMPUTER AND INTRODUCTION TO CYBERSEARCHING
55
A Guide for Businesses Law Enforcement and Victims Chapter 5 UNDERSTAND THE VICTIM THEN PREPARE FOR THE INVESTIGATION
67
A Guide for Businesses Law Enforcement and Victims Chapter 6 AUTHENTICATE THEN INVESTIGATE
89
A Guide for Businesses Law Enforcement and Victims Chapter 7 IDENTITY FRAUD INVESTIGATION A CASE EXAMPLE
104
A Guide for Businesses Law Enforcement and Victims Chapter 8 A WALK THROUGH THE WORLD WIDE WEB
131
A Guide for Businesses Law Enforcement and Victims Chapter 9 TRACING IP ADDRESSES AND URLS ACROSS THE WWW
143
A Guide for Businesses Law Enforcement and Victims Chapter 10 TRACING EMAIL ADDRESSES
154
A Guide for Businesses Law Enforcement and Victims Chapter 11 SEARCHING AND SEIZING THE INVESTIGATORS ROLE
175
A Guide for Businesses Law Enforcement and Victims Appendix A LIST OF WEB SITES FOR IDENTITY THEFT SEARCHES
183
A Guide for Businesses Law Enforcement and Victims NOTES
249
A Guide for Businesses Law Enforcement and Victims INDEX
251
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page viii - Acknowledgments This book could not have been written without the help of many people.

About the author (2006)

Judith M. Collins, former associate professor at the School of Criminal Justice, Michigan State University (MSU), is now employed by the State Department, Washington, D.C. and can be reached at jula@charter.net. Dr. Collins is a highly regarded expert on identity theft and has been a guest on National Public Radio and on local television and radio shows. She has also been quoted in various newspaper and magazine articles, is a frequent speaker on the subject, and conducts law enforcement training throughout the United States.

Bibliographic information