Identity Theft Handbook: Detection, Prevention and Security



Identity theft is an evil with a life of its own. It has grown from just an American problem into a worldwide epidemic that shows no signs of ending. If you want to learn about the past, present and future of identity theft, as well as how to best protect your organization and yourself form this global plague, "Identity Theft Handbook: Detection, Prevention and Security" is a must-read. 

This is the first authoritative book on identity theft written by a career professional with a lifetime investigating and preventing identity theft in both the public and private sectors. Informative, comprehensive and insightful, " Identity Theft Handbook" covers:

  • The history and explosive growth of identity theft
  • Data breaches and assault on privacy
  • Case studies of criminals ignominiously admitted to the “Identity Theft Hall of Infamy”
  • Phishing, pharming, botnets, wireless and P2P risk
  • Insights from thought leaders in identity theft investigation, research and prevention
  • Victims rights and how to fight back
  • The twenty-one prevention rules you must use to stop identity theft

Understanding the enormity of this problem is essential in fighting back. Whether you’re a CEO, CFO, compliance officer, auditor, risk management professional, or fraud examiner, " Identity Theft Handbook" is your best source for understanding and protecting against identity theft.

Product Details

ISBN 978-0-470-17999-4
Hardcover, 349 PAGES

Table of Contents:

  • Chapter 1: The Identity Theft Explosion
  • Chapter 2: Game of The Name: How It All Began
  • Chapter 3: How Identity Theft Occurs
  • Chapter 4: Student Loan Fraud and the Theft of Identity
  • Chapter 5: Nigerian Criminal Enterprises
  • Chapter 6: Methamphetamine, The Mails, and Check Washing
  • Chapter 7: The Violent Side of Identity Theft
  • Chapter 8: Medical Identity Theft
  • Chapter 9: Fake IDs
  • Chapter 10: Legislation and Criminal Statutes
  • Chapter 11: Law Enforcement Efforts
  • Chapter 12: Teens And Young Adults as Victims And Perpetrators
  • Chapter 13: Victims and Victimization
  • Chapter 14: The San Diego Experience
  • Chapter 15: The Rich, The Famous, and The Dead Get No Peace
  • Chapter 16: Identity Theft Goes Global
  • Chapter 17: Privacy and Data Breaches
  • Chapter 18: Identity Theft Research
  • Chapter 19: The Center for Identity Management and Information Protection
  • Chapter 20: Preventing Identity Theft: The 21 Rules You Must Use
  • Chapter 21: The Future of Identity Theft
  • Appendix: Designing an Effective Identity Theft Red Flags Rule Compliance Program