did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470444764

Identity Theft Handbook : Detection, Prevention, and Security

by
  • ISBN13:

    9780470444764

  • ISBN10:

    0470444762

  • Format: eBook
  • Copyright: 2009-01-01
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $78.95
We're Sorry.
No Options Available at This Time.

Summary

Not a week goes by when identity theft isn t mentioned in the media or that a Congressional outcry isn t heard about this unrelenting crime. The first authoritative book on identity theft, Identity Theft Handbook is written by a career professional who has spent over 25 years investigating and preventing identity theft in both the public and private sectors. Its rich real-world content includes interviews with government and private sector thought leaders. As well, the costs of identity theft, future trends, and prevention guidance is discussed. For investigators, auditors, and managers.

Table of Contents

About the Author
Foreword
Preface
Acknowledgements
The Identity Theft Explosion
What is Identity Theft?
It Is Not Rocket Science
Early Days of Credit Cards
Limiting Losses
Jail Order Fraud
Identity Theft was Not a High Priority
Game of The Name: How It All Began
First Identity Theft Victim
Identity Fraud Connection
History of Credit Cards
Growth of Credit Card Fraud
Even Postal Employees Will Steal
Recidivism is Common
Mail Theft and Phony ID
The Circulation: A Southern California Crime Syndicate
How Identity Theft Occurs
Criminal Roles of Identity Thieves
How Identity Thieves Steal Your Good Name
Student Loan Fraud and the Theft of Identity
Growth and Impact of Student Loan Fraud
Financial Fleecing 101: The Case of John Edward Christensen
A Family Affair of Fraud
Trying to Make Amends
Compromise of Student Loan Data
Admission to the Ivy League Through ID Theft
More Cases
It Is Not Just an American Problem
Department of Education's Outreach Prevention Program
Nigerian Criminal Enterprises
FBI Recognizes the Growing Identity Theft Threat
Genesis of the Problem
Credit Card and Identity Fraud
Highly Confidential Identity Theft "Training Manual"
Check Fraud
Advance Fee or "419" Fraud
Senate Hearings
Nigerian Criminal Enterprises
Ongoing Threat of Fraud
Methamphetamine, The Mails, and Check Washing
Mail Theft Problem
Check Washing: A New Spin on Mail Theft
All "Methed" Up: The Drug Connection
Origin of the Problem
Changing Face of Check Forgery
Prevention Efforts
The Problem Continues Today
The Violent Side of Identity Theft
Chicago Parcel Bomb Murder Case
Mail Theft Turned Violent
An Identity Thief Turns His Brutality on Law Enforcement
Medical Identity Theft
It Is Often an Insider
Unprotected Medical Files
Being Your Own Detective
Snooping Eyes
Theft and Fraudulent Use of Physician Names and Licenses
Life-and-Death Consequences
It Started with an Innocent Advertisement
Arizona's Identity Theft Problem
Heath Insurance Portability and Accountability Act
Healthcare Records on the Web
National Health Information Network
Prevention and Security
And So It Continues
Fake IDs
Fake IDs on the Web
Senate Hearing on Phony IDs
Justice Served
Interstate Identity Theft and Fake ID Ring
Operation Catchnet
Major Fraudulent Document Manufacturing Ring
Using Identities of the Dead
Legislation and Criminal Statutes
Criminal Statutes
Legislative Acts
Impact of Legislation
Law Enforcement Efforts
Metro Richmond Identity Theft Task Force
Operation Reconcile
Felony Lane Gang
Law Enforcement Efforts to Enact Antifraud Legislation
M.I.A.M.I. Program
Financial Industry Mail Security Initiative
Teens And Young Adults as Victims And Perpetrators
Teenage Hackers
Teen Déjà Vu
It's So Easy, Even a Child Can Do It
Evil Mentor
Child ID Theft
Prevention and Security for Teenagers and Young Adults
Victims and Victimization
An Identity Theft Nightmare
Getting a New SSN If All Else Fails
Operation Gaffle
Victim and Witness Rights
Victim Notification System
Recent Milestones in 'Victims' Rights
"The Best-Laid Plans of Mice and Men Often Go Awry"
Forever Vigilant
The San Diego Experience
Destination of Choice
Rise of the NDCBU
Unforeseen Achilles' Heel
Thefts and Frauds of the 1980s and 1990s
Impact of Meth in San Diego
Emergence of Organized Gangs
The Way It Is Today
The Rich, The Famous, and The Dead Get No Peace
Dumpster Diving Hits a Home Run
No Rest for the Dead
Genealogy and the Risk of Identity Theft
Who is John Doe?
What's a Genealogist to Do?
Identity Thieves are Equal Opportunity Abusers
Identity Theft Goes Global
Australia
Japan
United Kingdom
Morocco
Brazil
Russia
India
China
Global Phishing Scheme
Terrorism And Identity Theft
Global Identity Theft and Money-Laundering Ring
Privacy and Data Breaches
Loss of Privacy
Defining "Privacy"
Data Breaches
Insider Threats
Your Home is Their Castle
Carelessness as a Contributing Factor
Wireless (In)Fidelity
T.J. Maxx Attack
P2P Networks
Botnets: Zombie Armies of the Internet
Plunder Down Under
Protecting PII
Identity Theft Research
Saint Xavier University Study of Identity Theft Incidents
The President's Identity Theft Task Force
Federal Trade Commission's 2006 Survey Report
The Center for Identity Management and Information Protection
About CIMIP
CIMIP and Utica College
Identity Fraud Trends and Patterns: Building A Data-Based Foundation for Proactive Enforcement
Executive Summary
Implications for Law Enforcement
Preventing Identity Theft: The 21 Rules You Must Use
The Future of Identity Theft
Predicting the Future
Making Money From Identity Theft
Proactive Approach and Education Outreach
No Country for Identity Thieves
Appendix: Designing an Effective Identity Theft Red Flags Rule Compliance Program
Index
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program