Identity Theft Handbook: Detection, Prevention and Security

Identity Theft Handbook 


By Martin T. Biegelman, CFE 



Identity theft is an evil with a life of its own. It has grown from just an American problem into a worldwide epidemic that shows no signs of ending. If you want to learn about the past, present and future of identity theft, as well as how to best protect your organization and yourself form this global plague, Identity Theft Handbook: Detection, Prevention and Security is a must-read.

This is the first authoritative book on identity theft written by a career professional with a lifetime investigating and preventing identity theft in both the public and private sectors. Informative, comprehensive and insightful, Identity Theft Handbook covers:


The history and explosive growth of identity theft

Data breaches and assault on privacy

Case studies of criminals ignominiously admitted to the “Identity Theft Hall of Infamy”

Phishing, pharming, botnets, wireless and P2P risk

Insights from thought leaders in identity theft investigation, research and prevention

Victims rights and how to fight back

The twenty-one prevention rules you must use to stop identity theft


Understanding the enormity of this problem is essential in fighting back. Whether you’re a CEO, CFO, compliance officer, auditor, risk management professional, or fraud examiner, Identity Theft Handbook is your best source for understanding and protecting against identity theft.



Product Details:
Copyright 2009
ISBN 978-0-470-17999-4
Hardcover, 349 pages
John Wiley & Sons Publishing

Table of Contents:


Chapter 1: The Identity Theft Explosion

Chapter 2: Game of The Name: How It All Began

Chapter 3: How Identity Theft Occurs

Chapter 4: Student Loan Fraud and the Theft of Identity

Chapter 5: Nigerian Criminal Enterprises

Chapter 6: Methamphetamine, The Mails, and Check Washing

Chapter 7: The Violent Side of Identity Theft

Chapter 8: Medical Identity Theft

Chapter 9: Fake IDs

Chapter 10: Legislation and Criminal Statutes

Chapter 11: Law Enforcement Efforts

Chapter 12: Teens And Young Adults as Victims And Perpetrators

Chapter 13: Victims and Victimization

Chapter 14: The San Diego Experience

Chapter 15: The Rich, The Famous, and The Dead Get No Peace

Chapter 16: Identity Theft Goes Global

Chapter 17: Privacy and Data Breaches

Chapter 18: Identity Theft Research

Chapter 19: The Center for Identity Management and Information Protection

Chapter 20: Preventing Identity Theft: The 21 Rules You Must Use

Chapter 21: The Future of Identity Theft

Appendix: Designing an Effective Identity Theft Red Flags Rule Compliance Program