Question

By the time the New York identity theft fraud case was solved, over 30,000 people had...

By the time the New York identity theft fraud case was solved, over 30,000 people had suffered a total combined loss of over $2.7 million. This money had been stolen by a ring of New York residents who had accessed the victims’ credit information and exploited that information to steal the victims’ identity.

The fraud began when Linus Baptiste approached Philip Cummings about a plan to steal and sell people’s personal information. Philip Cummings had begun to work at Teledata Communications, Inc., a third-party credit-reporting agency that facilitates the retrieval of credit history data. Teledata had outstanding contracts with over 25,000 companies, allowing these companies to check on the creditworthiness of potential customers, thus creating a direct line past the three main credit bureaus. As a customer service representative, Cummings had obtained access to many confidential access codes. These access codes were used by the clients of Teledata to gain approval on credit requests. With access to these codes, Cummings had the opportunity to commit fraud.

In early 2013, Cummings and Baptiste began to steal credit reports. The two fraudsters sold this information to a group of Nigerian nationalists. The Nigerian nationalists would pay up to $60 for one person’s information. After some time, the Nigerian nationalists began to provide the two fraudsters with names and Social Security numbers to help facilitate the process even further.

To convert the information into money, the Nigerian nationalists would use the information to gain access to the victim’s bank accounts and other financial information. The group of Nigerian nationalists would then take the following steps:

  • Deplete the bank accounts of the victims through wire transfers.

  • Change the addresses of the accounts so the current information was not sent to the victim.

  • Order new checks to be written off of the victim’s bank accounts.

  • Order new ATM cards so the money could be taken out in cash.

  • Order new credit cards under the victim’s name.

  • Establish new lines of credit under the victim’s name.

By using these techniques, the fraud ring was able to steal over $2.7 million from consumers. This money was stolen over a period of about three years. The most intriguing aspect of the fraud was that Cummings quit working at Teledata half way through the fraud period, but was able to continue to steal the information for an additional two years. Cummings claimed that most of the access codes he had stolen while working at Teledata remained unchanged for the full two years after he left the company.

After three years, Cummings began to get greedy, and his greed led to the detection of fraud. Perceiving that he needed to make more money, Cummings stole around 15,000 credit reports from Teledata by using the access codes of Ford Motor Company. Then for the next four months, Cummings again stole a large number of names. This time, Cummings used the access codes of Washington Mutual Bank to steal 6,000 credit reports. Finally, three months later, Cummings made what would be his last big credit report theft. Using the access codes of Central Texas Energy Supply, Cummings was able to steal 4,500 credit reports.

After the theft using Ford’s access codes, Equifax, one of the three large credit bureaus in the United States, began to see the request spikes in Ford’s account. After the next two large batches of requests, Equifax decided to investigate further. Equifax found that almost all of the credit report requests came from one phone number and that the requests were done in large batches of about 100. The location of the phone number was found, and a search by federal authorities turned up a computer and other equipment that were used in the fraud.2

Cummings was prosecuted, sent to prison, and had to pay large fines. The victims faced the dreadful task of restoring their credit, a process that, in some cases, took a long time to complete.

The Book is Fraud Examination 6th Edition

For this assignment, you need to read Case Study #1 in Chapter 7 of your textbook about the Teledata Communications Inc. on page 221 of your textbook. After reading the case, please answer the four questions that follow at the top of page 222 (also written below).

1. Plan and coordinate an investigation in a manner that would not arouse suspicion from Cummings and Baptiste.

2. Create a vulnerability chart to coordinate the various elements of the possible fraud.

3. Assuming your investigation used surveillance and/or covert investigation techniques, what types of surveillance and/or covert operations would you use? How would technology play a role in this part of the investigation?

4. Finally, how would analysis of physical evidence help in this investigation? What types of physical evidence would be especially helpful?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Please do Upvote if you are served. Feel free to reach out in the comments

Cheers!!!

Answer:

1. So as to not excite doubt from Cummings and Baptiste I would recommend the accompanying measures to be received – abstain from making any open declarations, keep all parts of the examinations classified, include the senior administration however much as could be expected and in conclusion and if conceivable utilize covert activities.

2.

Complain response Evaluation of complaint Fraud type identification Create an investigation scheme Question the victim Begin

3. The clandestine activities that can be utilized are covert activity. The upside of utilizing a covert activity is that it won't upset the ordinary tasks. Innovation can be utilized to verify prove and guarantee that the proof isn't messed with.

4. Regarding physical proof the exploited people's credit data may be put away in a PC's hard circle or a CD or a pen drive or some other type of capacity gadget. Examination of the physical proof will help in the examination plan and casing charges and capture the suspects.

Add a comment
Know the answer?
Add Answer to:
By the time the New York identity theft fraud case was solved, over 30,000 people had...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Using the Internet, find a recent case in the news about business fraud (within the last...

    Using the Internet, find a recent case in the news about business fraud (within the last 18 months) that involved systems and/or information breach. Summarize the situation, identify the control issues that were compromised and discuss what could have been done to mitigate the loss. Please refer to the six questions on page 143 related to Case 5-1. Adapt those questions to your case in the news and they will serve as good guidance for your paper. To understand the...

  • CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of...

    CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of Personnel Management (OPM) is conducted, may have been extracted. Government offi responsible for recruiting and retaining a world-class cials say that the exposure of security clearance irn workforce to serve the American people and is also mation could pose a problem for years responsible for background investigations on pro- spective employees and security clearances. In June the OPM system, and its records were protected...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of...

    The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of several banks that are a part of the SWIFT network. The case is an example of the importance of information system controls. Explain some of the security risks associated with information systems as well as some security and control measures that can be implemented to protect against these security risks. Hackers Attack the SWIFT Global Banking Network SWIFT, which stands for Society for Worldwide...

  • write a summary after that answer the questions CASE 3.3 United Way of America In 1887,...

    write a summary after that answer the questions CASE 3.3 United Way of America In 1887, several of Denver's community and religious leaders established the Charity Organization Society. During its first year of operation, the organization raised a little more than $20,000, which it then distributed to several local charities. The charity-of-charities fundraising concept spread across the United States over the fol- lowing decades. After several name changes, the original Denver-based organization adopted the name United Way in 1963. United...

  • Case: Enron: Questionable Accounting Leads to CollapseIntroductionOnce upon a time, there was a gleaming...

    Case: Enron: Questionable Accounting Leads to CollapseIntroductionOnce upon a time, there was a gleaming office tower in Houston, Texas. In front of that gleaming tower was a giant “E,” slowly revolving, flashing in the hot Texas sun. But in 2001, the Enron Corporation, which once ranked among the top Fortune 500 companies, would collapse under a mountain of debt that had been concealed through a complex scheme of off-balance-sheet partnerships. Forced to declare bankruptcy, the energy firm laid off 4,000...

  • CASE 20 Enron: Not Accounting for the Future* INTRODUCTION Once upon a time, there was a...

    CASE 20 Enron: Not Accounting for the Future* INTRODUCTION Once upon a time, there was a gleaming office tower in Houston, Texas. In front of that gleaming tower was a giant "E" slowly revolving, flashing in the hot Texas sun. But in 2001, the Enron Corporation, which once ranked among the top Fortune 500 companies, would collapse under a mountain of debt that had been concealed through a complex scheme of off-balance-sheet partnerships. Forced to declare bankruptcy, the energy firm...

  • Fraud at Berry, CPA’s BERRY, CERTIFIED PUBLIC ACCOUNTANTS Brief History of the Firm In 1999, John...

    Fraud at Berry, CPA’s BERRY, CERTIFIED PUBLIC ACCOUNTANTS Brief History of the Firm In 1999, John Berry graduated from college with an accounting degree. After 10 years at an international accounting firm, John decided to start his firm, Berry, CPA’s. The firm, located in Oakwood, caters to local clients; specifically, John and his staff of four professionals specialize in non-public companies. The majority of the services provided by Berry, CPA’s are tax planning and preparation; however, the firm also performs...

  • internal project 1 anything helps! thank you!! Instructions: Study the case that starts on page 3...

    internal project 1 anything helps! thank you!! Instructions: Study the case that starts on page 3 carefully. Then write concise answers to the following questions regarding the internal control system of Duarf, Inc. Clearly label your responses with proper headings and subheadings. Be very specific and precise. Answers that appear to be beating around the bush will not get any credit. 1. What are the controls in place that under normal conditions should function well to prevent embezzlements or frauds?...

  • THE CASE Sameer Arkell and Marcy Haddow had worked for Crowdsite, an international computer repair service,...

    THE CASE Sameer Arkell and Marcy Haddow had worked for Crowdsite, an international computer repair service, for ten years. It therefore came as a surprise when they both received lay-off notices on a Friday afternoon early January 2015. Both were given severance packages that matched their seniority so they decided that this might be the catalyst to launch their own business repairing computers and related equipment for businesses in their community. Both were single and had no children, so no...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT