did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470179994

Identity Theft Handbook : Detection, Prevention, and Security

by
  • ISBN13:

    9780470179994

  • ISBN10:

    0470179996

  • Format: Hardcover
  • Copyright: 2009-02-09
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $90.00

Summary

Not a week goes by when identity theft isn t mentioned in the media or that a Congressional outcry isn t heard about this unrelenting crime. The first authoritative book on identity theft, Identity Theft Handbook is written by a career professional who has spent over 25 years investigating and preventing identity theft in both the public and private sectors. Its rich real-world content includes interviews with government and private sector thought leaders. As well, the costs of identity theft, future trends, and prevention guidance is discussed. For investigators, auditors, and managers.

Author Biography

Martin T. Biegelman has been fighting fraud, including identity theft, for more than thirty years in various roles in law enforcement, consulting, and the corporate sector. He is currently Director of Financial Integrity for Microsoft Corporation, where he built and leads a worldwide fraud detection, investigation, and prevention program. Biegelman is both a Certified Fraud Examiner and Certified Ethics and Compliance Professional, as well as a sought-after speaker and author on white-collar crime, identity theft, corruption, fraud prevention, and compliance issues. He is the author of Building a World-Class Compliance Program and coauthor of Executive Roadmap to Fraud Prevention and Internal Control, both published by Wiley.

Table of Contents

About the Authorp. xv
Forewordp. xvii
Prefacep. xix
Acknowledgmentsp. xxiii
The Identity Theft Explosionp. 1
What Is Identity Theft?p. 2
It Is Not Rocket Sciencep. 3
Early Days of Credit Cardsp. 6
Limiting Lossesp. 8
Jail Order Fraudp. 10
Identity Theft Was Not a High Priorityp. 11
Game of the Name: How it All Beganp. 13
First Identity Theft Victimp. 14
Identity Fraud Connectionp. 14
History of Credit Cardsp. 15
Growth of Credit Card Fraudp. 17
Even Postal Employees Will Stealp. 20
Recidivism Is Commonp. 21
Mail Theft and Phony IDp. 22
The Circulation: A Southern California Crime Syndicatep. 22
How Identity Theft Occursp. 27
Criminal Roles of Identity Thievesp. 28
How Identity Thieves Steal Your Good Namep. 28
Student Loan Fraud and the Theft of Identityp. 45
Growth and Impact of Student Loan Fraudp. 46
Financial Fleecing 101: The Case of John Edward Christensenp. 47
A Family Affair of Fraudp. 48
Trying to Make Amendsp. 49
Compromise of Student Loan Datap. 49
Admission to the Ivy League through ID Theftp. 50
More Casesp. 52
It Is Not Just an American Problemp. 52
DePartment of Education's Outreach Prevention Programp. 53
Nigerian Criminal Enterprisesp. 57
FBI Recognizes the Growing Identity Theft Threatp. 58
Genesis of the Problemp. 59
Credit Card and Identity Fraudp. 60
Highly Confidential Identity Theft "Training Manual"p. 60
Check Fraudp. 62
Advance Fee or "419" Fraudp. 62
Senate Hearingsp. 64
Nigerian Criminal Enterprisesp. 68
Ongoing Threat of Fraudp. 70
Methamphetamine, the Mails, and Check Washingp. 73
Mail Theft Problemp. 74
Check Washing: A New Spin on Mail Theftp. 75
All "Methed" Up: The Drug Connectionp. 76
Origin of the Problemp. 78
Changing Face of Check Forgeryp. 80
Prevention Effortsp. 81
The Problem Continues Todayp. 82
The Violent Side of Identity Theftp. 85
Chicago Parcel Bomb Murder Casep. 88
Mail Theft Turned Violentp. 90
An Identity Thief Turns His Brutality on Law Enforcementp. 93
Medical Identity Theftp. 97
It Is Often an Insiderp. 98
Unprotected Medical Filesp. 98
Being Your Own Detectivep. 99
Snooping Eyesp. 99
Theft and Fraudulent Use of Physician Names and Licensesp. 100
Life-and-Death Consequencesp. 102
It Started with an Innocent Advertisementp. 102
Arizona's Identity Theft Problemp. 102
Health Insurance Portability and Accountability Actp. 103
Healthcare Records on the Webp. 104
National Health Information Networkp. 105
Prevention and Securityp. 107
And So It Continuesp. 110
Fake IDSp. 113
Fake IDs on the Webp. 114
Senate Hearing on Phony IDsp. 115
Justice Servedp. 116
Interstate Identity Theft and Fake ID Ringp. 116
Operation Catchnetp. 119
Major Fraudulent Document Manufacturing Ringp. 122
Using Identities of the Deadp. 122
Legislation and Criminal Statutesp. 129
Criminal Statutesp. 130
Legislative Actsp. 136
Impact of Legislationp. 148
Law Enforcement Effortsp. 151
Metro Richmond Identity Theft Task Forcep. 151
Operation Reconcilep. 152
Felony Lane Gangp. 154
Law Enforcement Efforts to Enact Antifraud Legislationp. 157
M.I.A.M.I. Programp. 159
Financial Industry Mail Security Initiativep. 160
Teens and Young Adults as Victims and Perpetratorsp. 163
Teenage Hackersp. 164
Teen Deja Vup. 165
It Is So Easy, Even a Child Can Do Itp. 169
Evil Mentorp. 171
Child ID Theftp. 172
Prevention and Security for Teenagers and Young Adultsp. 173
Victims and Victimizationp. 177
An Identity Theft Nightmarep. 178
Getting a New SSN If All Else Failsp. 178
Operation Gafflep. 179
Victim and Witness Rightsp. 181
Victim Notification Systemp. 184
Recent Milestones in Victims' Rightsp. 187
"The Best-Laid Plans of Mice and Men Often Go Awry"p. 188
Forever Vigilantp. 189
The San Diego Experiencep. 191
Destination of Choicep. 191
Rise of the NDCBUp. 192
Unforeseen Achilles' Heelp. 193
Thefts and Frauds of the 1980s and 1990sp. 194
Impact of Meth in San Diegop. 196
Emergence of Organized Gangsp. 200
The Way It Is Todayp. 200
The Rich, the Famous, and the Dead Get no Peacep. 205
Dumpster Diving Hits a Home Runp. 206
No Rest for the Deadp. 207
Genealogy and the Risk of Identity Theftp. 208
Who Is John Doe?p. 214
What Is a Genealogist to Do?p. 215
Identity Thieves Are Equal Opportunity Abusersp. 217
Identity Theft Goes Globalp. 221
Australiap. 222
Japanp. 222
United Kingdomp. 223
Moroccop. 223
Brazilp. 224
Russiap. 224
Indiap. 225
Chinap. 226
Global Phishing Schemep. 226
Terrorism and Identity Theftp. 226
Global Identity Theft and Money-Laundering Ringp. 229
Privacy and Data Breachesp. 239
Loss of Privacyp. 239
Defining "Privacy"p. 240
Data Breachesp. 241
Insider Threatsp. 243
Your Home Is Their Castlep. 244
Carelessness as a Contributing Factorp. 244
Wireless (In)Fidelityp. 245
T.J. Maxx Attackp. 246
P2P Networksp. 248
Botnets: Zombie Armies of the Internetp. 250
Plunder Down Underp. 251
Protecting PIIp. 258
Identity Theft Researchp. 263
Saint Xavier University Study of Identity Theft Incidentsp. 264
The President's Identity Theft Task Forcep. 268
Federal Trade Commission's 2006 Survey Reportp. 274
The Center For Identity Management and Information Protectionp. 277
About CIMIPp. 277
CIMIP and Utica Collegep. 278
Identity Fraud Trends and Patterns: Building a Data-Based Foundation for Proactive Enforcementp. 279
Executive Summaryp. 279
Implications for Law Enforcementp. 290
Preventing Identity Theft: 21 Rules You Must Usep. 295
Future of Identity Theftp. 313
Predicting the Futurep. 314
Making Money from Identity Theftp. 315
Proactive Approach and Education Outreachp. 319
No Country for Identity Thievesp. 325
Appendix: Designing an Effective Identity Theft Red Flags Rule Compliance Programp. 329
Indexp. 339
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program