Identity Theft Handbook: Detection, Prevention, and Security / Edition 1

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $49.83
Usually ships in 1-2 business days
(Save 39%)
Other sellers (Hardcover)
  • All (9) from $49.83   
  • New (5) from $56.95   
  • Used (4) from $49.83   

Overview

Praise for Identity Theft Handbook Detection, Prevention, and Security

"No one in the world is more knowledgeable about identity theft than Mr. Biegelman. This book has it all: well-written and researched, chock full of illustrative examples, and insightful tips on how to reduce and prevent this burgeoning crime."
Joseph T. Wells, CFE, CPA, founder and Chairman, Association of Certified Fraud Examiners

"Martin has done it again! His latest book provides insightful guidance, extremely helpful suggestions, and practical examples that will be your best defense against identity theft. This book is a must-read for anyone who cares about protecting their financial health and reputation as well as those of us who protect and counsel others."
George A. Stamboulidis, Esquire, Managing Partner of the New York office and head of the White Collar Defense & Corporate Investigations Team, Baker Hostetler LLP

"In the same way he has unselfishly shared his vast knowledge on the establishment of financial investigations units and world-class compliance programs, Mr. Biegelman has once again delivered what will undoubtedly become the authoritative work on identity theft."
Scott Moritz, Executive Director, Daylight Forensic & Advisory

"No consumer or business is immune from identity theft and all would be well advised to read this book by a renowned, innovative investigator with a unique blend of knowledge, story-telling ability, and experience as a federal investigator and now as an industry fraud expert in one of the largest companies in the world. Martin Biegelman has devoted his life to fighting crime, protecting consumers and businesses, and teaching thousands of investigators and auditors."
Kenneth Hunter, former chief postal inspector and former president & CEO, Council of Better Business Bureaus

"This is an ideal read for those whose daily tasks involve fighting identity theft, and also those wishing to learn about this crime for the first time. It should also be mandatory reading for legislators, regulators, and other policymakers seeking to define and resolve issues of data privacy."
George E. Curtis, JD, Executive Director, Economic Crime Institute, and Professor of Criminal Justice, Utica College

"The issue of identity theft is one of the most important and controversial of our time. Martin does a masterful job of bringing value to both the naive consumer and the educated professional with his new book on the subject. He set the bar very high with his previous works and his latest on identity theft continues the trend."
Dan Wachtler, President & CEO, IPSA International, Inc.

"Some executives will read this book after they discover that private information they were entrusted to hold on to was not held tight enough. Others will read Martin Biegelman's Identity Theft Handbook before a leak occurs. I recommend the latter."
Roy Snell, CEO, Society of Corporate Compliance and Ethics

Read More Show Less

Product Details

  • ISBN-13: 9780470179994
  • Publisher: Wiley
  • Publication date: 2/9/2009
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 349
  • Sales rank: 1,207,583
  • Product dimensions: 7.20 (w) x 10.00 (h) x 1.40 (d)

Meet the Author

Martin T. Biegelman has been fighting fraud, including identity theft, for more than thirty years in various roles in law enforcement, consulting, and the corporate sector. He is currently Director of Financial Integrity for Microsoft Corporation, where he built and leads a worldwide fraud detection, investigation, and prevention program. Biegelman is both a Certified Fraud Examiner and Certified Ethics and Compliance Professional, as well as a sought-after speaker and author on white-collar crime, identity theft, corruption, fraud prevention, and compliance issues. He is the author of Building a World-Class Compliance Program and coauthor of Executive Roadmap to Fraud Prevention and Internal Control, both published by Wiley.

Read More Show Less

Table of Contents

About the Author.

Foreword.

Preface.

Acknowledgements.

1. The Identity Theft Explosion.

What is Identity Theft?

It Is Not Rocket Science.

Early Days of Credit Cards.

Limiting Losses.

Jail Order Fraud.

Identity Theft was Not a High Priority.

2. Game of The Name: How It All Began.

First Identity Theft Victim.

Identity Fraud Connection.

History of Credit Cards.

Growth of Credit Card Fraud.

Even Postal Employees Will Steal.

Recidivism is Common.

Mail Theft and Phony ID.

The Circulation: A Southern California Crime Syndicate.

3. How Identity Theft Occurs.

Criminal Roles of Identity Thieves.

How Identity Thieves Steal Your Good Name.

4. Student Loan Fraud and the Theft of Identity.

Growth and Impact of Student Loan Fraud.

Financial Fleecing 101: The Case of John Edward Christensen.

A Family Affair of Fraud.

Trying to Make Amends.

Compromise of Student Loan Data.

Admission to the Ivy League Through ID Theft.

More Cases.

It Is Not Just an American Problem.

Department of Education's Outreach Prevention Program.

5. Nigerian Criminal Enterprises.

FBI Recognizes the Growing Identity Theft Threat.

Genesis of the Problem.

Credit Card and Identity Fraud.

Highly Confidential Identity Theft “Training Manual”.

Check Fraud.

Advance Fee or “419” Fraud.

Senate Hearings.

Nigerian Criminal Enterprises.

Ongoing Threat of Fraud.

6. Methamphetamine, The Mails, and Check Washing.

Mail Theft Problem.

Check Washing: A New Spin on Mail Theft.

All “Methed” Up: The Drug Connection.

Origin of the Problem.

Changing Face of Check Forgery.

Prevention Efforts.

The Problem Continues Today.

7. The Violent Side of Identity Theft.

Chicago Parcel Bomb Murder Case.

Mail Theft Turned Violent.

An Identity Thief Turns His Brutality on Law Enforcement.

8. Medical Identity Theft.

It Is Often an Insider.

Unprotected Medical Files.

Being Your Own Detective.

Snooping Eyes.

Theft and Fraudulent Use of Physician Names and Licenses.

Life-and-Death Consequences.

It Started with an Innocent Advertisement.

Arizona's Identity Theft Problem.

Heath Insurance Portability and Accountability Act.

Healthcare Records on the Web.

National Health Information Network.

Prevention and Security.

And So It Continues.

9. Fake IDs.

Fake IDs on the Web.

Senate Hearing on Phony IDs.

Justice Served.

Interstate Identity Theft and Fake ID Ring.

Operation Catchnet.

Major Fraudulent Document Manufacturing Ring.

Using Identities of the Dead.

10. Legislation and Criminal Statutes.

Criminal Statutes.

Legislative Acts.

Impact of Legislation.

11. Law Enforcement Efforts.

Metro Richmond Identity Theft Task Force.

Operation Reconcile.

Felony Lane Gang.

Law Enforcement Efforts to Enact Antifraud Legislation.

M.I.A.M.I. Program.

Financial Industry Mail Security Initiative.

12. Teens And Young Adults as Victims And Perpetrators.

Teenage Hackers.

Teen Déjà Vu.

It's So Easy, Even a Child Can Do It.

Evil Mentor.

Child ID Theft.

Prevention and Security for Teenagers and Young Adults.

13. Victims and Victimization.

An Identity Theft Nightmare.

Getting a New SSN If All Else Fails.

Operation Gaffle.

Victim and Witness Rights.

Victim Notification System.

Recent Milestones in 'Victims' Rights.

“The Best-Laid Plans of Mice and Men Often Go Awry”.

Forever Vigilant.

14. The San Diego Experience.

Destination of Choice.

Rise of the NDCBU.

Unforeseen Achilles' Heel.

Thefts and Frauds of the 1980s and 1990s.

Impact of Meth in San Diego.

Emergence of Organized Gangs.

The Way It Is Today.

15. The Rich, The Famous, and The Dead Get No Peace.

Dumpster Diving Hits a Home Run.

No Rest for the Dead.

Genealogy and the Risk of Identity Theft.

Who is John Doe?

What's a Genealogist to Do?

Identity Thieves are Equal Opportunity Abusers.

16. Identity Theft Goes Global.

Australia.

Japan.

United Kingdom.

Morocco.

Brazil.

Russia.

India.

China.

Global Phishing Scheme.

Terrorism And Identity Theft.

Global Identity Theft and Money-Laundering Ring.

17. Privacy and Data Breaches.

Loss of Privacy.

Defining "Privacy".

Data Breaches.

Insider Threats.

Your Home is Their Castle.

Carelessness as a Contributing Factor.

Wireless (In)Fidelity.

T.J. Maxx Attack.

P2P Networks.

Botnets: Zombie Armies of the Internet.

Plunder Down Under.

Protecting PII.

18. Identity Theft Research.

Saint Xavier University Study of Identity Theft Incidents.

The President's Identity Theft Task Force.

Federal Trade Commission's 2006 Survey Report.

19. The Center for Identity Management and Information Protection.

About CIMIP

CIMIP and Utica College.

Identity Fraud Trends and Patterns: Building A Data-Based Foundation for Proactive Enforcement.

Executive Summary.

Implications for Law Enforcement.

20. Preventing Identity Theft: The 21 Rules You Must Use.

21. The Future of Identity Theft.

Predicting the Future.

Making Money From Identity Theft.

Proactive Approach and Education Outreach.

No Country for Identity Thieves.

Appendix: Designing an Effective Identity Theft Red Flags Rule Compliance Program.

Index.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)