SlideShare a Scribd company logo
By the time the New York identity theft fraud case was solved,
more than 30,000 people had suffered a total combined loss in
excess of $2.7 million. This money had been stolen by a ring of
New York residents who accessed the victims’ credit
information and exploited that information to steal the victims’
identity. The fraud began when Linus Baptiste approached
Philip Cummings about a plan to steal and sell people’s
personal information. Philip Cummings had begun to work at
Teledata Communications, Inc., a third party credit-reporting
agency that facilitates the retrieval of credit history data.
Teledata had outstanding contracts with more than 25,000
companies, allowing these companies to check on the
creditworthiness of potential customers, thus creating a direct
line past the three main credit bureaus. As a customer service
representative, Cummings had obtained access to many
confidential access codes. These access codes were used by the
clients of Teledata to gain approval on credit requests. With
access to these codes, Cummings had the opportunity to commit
fraud. In early 2000, Cummings and Baptiste began to steal
credit reports. The two fraudsters had a buyer for the
information in a group of Nigerian nationalists. The Nigerians
would pay up to $60 for one person’s information. After some
time, the Nigerian nationalists began to provide the two
fraudsters with names and social security numbers to help
facilitate the process even further. To convert the information
into money, the Nigerians used the information to gain access to
the victim’s bank accounts and other financial information. The
Nigerians would then:
Deplete the bank accounts of the victims through wire transfers.
Change the addresses of the accounts so the current information
was not sent to the victims.
Order new checks to be written off of the victim’s bank
accounts.
Order new ATM cards so the money could be taken out in cash.
Order new credit cards under the victim’s names.
Establish new lines of credit under the victim’s name.
By using these techniques, the fraud ring was able to steal more
than $2.7 million from consumers. This money was stolen over
a period of about three years from late 1999 to late 2002. The
most intriguing aspect of the fraud was that Cummings quit
working at Teledata in early 2000, but was able to continue to
steal the information for an additional two years. Cummings
claimed that most of the access codes he stole while working at
Teledata remained unchanged for the full two years after he left
the company.
Finally, in early 2002, Cummings began to get greedy and his
greed led to the detection of fraud. Perceiving that he needed to
make more money, Cummings stole about 15,000 credit reports
from Teledata by using the access codes of Ford Motor
Company. Then from February 2002 to May 2002, Cummings
again stole a large number of names. This time Cummings used
the access codes of Washington Mutual Bank to steal 6,000
credit reports. Finally, in September 2002, Cummings made
what would be his last big credit report theft. Using the access
codes of Central Texas Energy Supply, Cummings was able to
steal 4,500 credit reports. After the theft using Ford’s access
codes, Equifax, one of the three large credit bureaus in the
United States, began to see the request spikes in Ford’s account.
After the next two large batches of requests, Equifax decided to
investigate further. Equifax found that almost all of the credit
report requests came from one phone number, and that the
request were done in large batches of about 100. The location of
the phone number was found and a search by federal authorities
turned up a computer and other equipment used in the fraud.
Assuming you are an agent with the Federal Bureau of
Investigation, provide a substantial response to at least one of
the questions below: How would you coordinate an
investigation in a manner that would not cause suspicion from
Cummings and Baptiste? Create a vulnerability chart. What are
the elements of the possible fraud? (It is best if you can include
this directly into your post. If you run into a problem with
formatting, you can attach a Word document or Excel file for
this). Share highlights in your post.
Assuming your investigation used surveillance and/or covert
investigation techniques, what types of surveillance and/or
covert operations would you use? How would technology play a
role in this part of the investigation?
How would analysis of physical evidence help in this
investigation? What types of physical evidence would be
especially helpful?

More Related Content

Similar to By the time the New York identity theft fraud case was solved, more .docx

Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
Identity Theft Protection
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
Bucacci Business Solutions
 
Anil final
Anil finalAnil final
Anil final
Rakshith Shetty
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
- Mark - Fullbright
 
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
jesusamckone
 
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
herminaprocter
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
pat7777
 
World Com Corporate Fraud and its Fall
World Com Corporate Fraud and its FallWorld Com Corporate Fraud and its Fall
World Com Corporate Fraud and its Fall
Muhammad Yousuf Abdul Qadir
 
Cyber law11
Cyber law11Cyber law11
Cyber law11
maradabudkinsantosh
 
Identity Theft * Canada
Identity Theft * CanadaIdentity Theft * Canada
Identity Theft * Canada
- Mark - Fullbright
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout History
Protected Harbor
 
CYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxCYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptx
HetaDesai13
 
Training for Bank Employees
Training for Bank EmployeesTraining for Bank Employees
Training for Bank Employees
- Mark - Fullbright
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
New Kmart Data Breach lawsuit spotlights PCI DSS
 New Kmart Data Breach lawsuit spotlights PCI DSS New Kmart Data Breach lawsuit spotlights PCI DSS
New Kmart Data Breach lawsuit spotlights PCI DSS
David Sweigert
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 

Similar to By the time the New York identity theft fraud case was solved, more .docx (20)

Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
Anil final
Anil finalAnil final
Anil final
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
 
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
 
wrld com ppt
wrld com pptwrld com ppt
wrld com ppt
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
World Com Corporate Fraud and its Fall
World Com Corporate Fraud and its FallWorld Com Corporate Fraud and its Fall
World Com Corporate Fraud and its Fall
 
Cyber law11
Cyber law11Cyber law11
Cyber law11
 
Identity Theft * Canada
Identity Theft * CanadaIdentity Theft * Canada
Identity Theft * Canada
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout History
 
CYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxCYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptx
 
Training for Bank Employees
Training for Bank EmployeesTraining for Bank Employees
Training for Bank Employees
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
New Kmart Data Breach lawsuit spotlights PCI DSS
 New Kmart Data Breach lawsuit spotlights PCI DSS New Kmart Data Breach lawsuit spotlights PCI DSS
New Kmart Data Breach lawsuit spotlights PCI DSS
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 

More from PazSilviapm

Case Study Clinical LeadersDavid Rochester enjoys his role as a C.docx
Case Study Clinical LeadersDavid Rochester enjoys his role as a C.docxCase Study Clinical LeadersDavid Rochester enjoys his role as a C.docx
Case Study Clinical LeadersDavid Rochester enjoys his role as a C.docx
PazSilviapm
 
CASE STUDY Clinical  Journal Entry  1 to 2 pages A 21 month .docx
CASE STUDY Clinical  Journal Entry  1 to 2 pages A 21 month .docxCASE STUDY Clinical  Journal Entry  1 to 2 pages A 21 month .docx
CASE STUDY Clinical  Journal Entry  1 to 2 pages A 21 month .docx
PazSilviapm
 
CASE STUDY 5Exploring Innovation in Action The Dimming of the Lig.docx
CASE STUDY 5Exploring Innovation in Action The Dimming of the Lig.docxCASE STUDY 5Exploring Innovation in Action The Dimming of the Lig.docx
CASE STUDY 5Exploring Innovation in Action The Dimming of the Lig.docx
PazSilviapm
 
Case Study 2A 40 year-old female presents to the office with the c.docx
Case Study 2A 40 year-old female presents to the office with the c.docxCase Study 2A 40 year-old female presents to the office with the c.docx
Case Study 2A 40 year-old female presents to the office with the c.docx
PazSilviapm
 
Case Study Horizon Horizon Consulting Patti Smith looked up at .docx
Case Study Horizon  Horizon Consulting Patti Smith looked up at .docxCase Study Horizon  Horizon Consulting Patti Smith looked up at .docx
Case Study Horizon Horizon Consulting Patti Smith looked up at .docx
PazSilviapm
 
Case Study EvaluationBeing too heavy or too thin, having a disabil.docx
Case Study EvaluationBeing too heavy or too thin, having a disabil.docxCase Study EvaluationBeing too heavy or too thin, having a disabil.docx
Case Study EvaluationBeing too heavy or too thin, having a disabil.docx
PazSilviapm
 
Case Study Disney Corporation1, What does Disney do best to connec.docx
Case Study Disney Corporation1, What does Disney do best to connec.docxCase Study Disney Corporation1, What does Disney do best to connec.docx
Case Study Disney Corporation1, What does Disney do best to connec.docx
PazSilviapm
 
Case Study 3  Exemplar of Politics and Public Management Rightly Un.docx
Case Study 3  Exemplar of Politics and Public Management Rightly Un.docxCase Study 3  Exemplar of Politics and Public Management Rightly Un.docx
Case Study 3  Exemplar of Politics and Public Management Rightly Un.docx
PazSilviapm
 
Case Study 2 Structure and Function of the Kidney Rivka is an ac.docx
Case Study 2 Structure and Function of the Kidney Rivka is an ac.docxCase Study 2 Structure and Function of the Kidney Rivka is an ac.docx
Case Study 2 Structure and Function of the Kidney Rivka is an ac.docx
PazSilviapm
 
Case Study 2 Plain View, Open Fields, Abandonment, and Border Searc.docx
Case Study 2 Plain View, Open Fields, Abandonment, and Border Searc.docxCase Study 2 Plain View, Open Fields, Abandonment, and Border Searc.docx
Case Study 2 Plain View, Open Fields, Abandonment, and Border Searc.docx
PazSilviapm
 
Case Study 2 Collaboration Systems at Isuzu Australia LimitedDue .docx
Case Study 2 Collaboration Systems at Isuzu Australia LimitedDue .docxCase Study 2 Collaboration Systems at Isuzu Australia LimitedDue .docx
Case Study 2 Collaboration Systems at Isuzu Australia LimitedDue .docx
PazSilviapm
 
Case FormatI. Write the Executive SummaryOne to two para.docx
Case FormatI. Write the Executive SummaryOne to two para.docxCase FormatI. Write the Executive SummaryOne to two para.docx
Case FormatI. Write the Executive SummaryOne to two para.docx
PazSilviapm
 
Case Study #2 Diabetes Hannah is a 10-year-old girl who has recentl.docx
Case Study #2 Diabetes Hannah is a 10-year-old girl who has recentl.docxCase Study #2 Diabetes Hannah is a 10-year-old girl who has recentl.docx
Case Study #2 Diabetes Hannah is a 10-year-old girl who has recentl.docx
PazSilviapm
 
case scenario being used for this discussion postABS 300 Week One.docx
case scenario being used for this discussion postABS 300 Week One.docxcase scenario being used for this discussion postABS 300 Week One.docx
case scenario being used for this discussion postABS 300 Week One.docx
PazSilviapm
 
Case Study #2Alleged improper admission orders resulting in mor.docx
Case Study #2Alleged improper admission orders resulting in mor.docxCase Study #2Alleged improper admission orders resulting in mor.docx
Case Study #2Alleged improper admission orders resulting in mor.docx
PazSilviapm
 
Case Study 1Denise is a sixteen-year old 11th grade student wh.docx
Case Study 1Denise is a sixteen-year old 11th grade student wh.docxCase Study 1Denise is a sixteen-year old 11th grade student wh.docx
Case Study 1Denise is a sixteen-year old 11th grade student wh.docx
PazSilviapm
 
Case AssignmentI. First read the following definitions of biodiver.docx
Case AssignmentI. First read the following definitions of biodiver.docxCase AssignmentI. First read the following definitions of biodiver.docx
Case AssignmentI. First read the following definitions of biodiver.docx
PazSilviapm
 
Case and questions are In the attchmentExtra resources given.H.docx
Case and questions are In the attchmentExtra resources given.H.docxCase and questions are In the attchmentExtra resources given.H.docx
Case and questions are In the attchmentExtra resources given.H.docx
PazSilviapm
 
Case C Hot GiftsRose Stone moved into an urban ghetto in order .docx
Case C Hot GiftsRose Stone moved into an urban ghetto in order .docxCase C Hot GiftsRose Stone moved into an urban ghetto in order .docx
Case C Hot GiftsRose Stone moved into an urban ghetto in order .docx
PazSilviapm
 
Case Assignment must be 850 words and use current APA format with a .docx
Case Assignment must be 850 words and use current APA format with a .docxCase Assignment must be 850 words and use current APA format with a .docx
Case Assignment must be 850 words and use current APA format with a .docx
PazSilviapm
 

More from PazSilviapm (20)

Case Study Clinical LeadersDavid Rochester enjoys his role as a C.docx
Case Study Clinical LeadersDavid Rochester enjoys his role as a C.docxCase Study Clinical LeadersDavid Rochester enjoys his role as a C.docx
Case Study Clinical LeadersDavid Rochester enjoys his role as a C.docx
 
CASE STUDY Clinical  Journal Entry  1 to 2 pages A 21 month .docx
CASE STUDY Clinical  Journal Entry  1 to 2 pages A 21 month .docxCASE STUDY Clinical  Journal Entry  1 to 2 pages A 21 month .docx
CASE STUDY Clinical  Journal Entry  1 to 2 pages A 21 month .docx
 
CASE STUDY 5Exploring Innovation in Action The Dimming of the Lig.docx
CASE STUDY 5Exploring Innovation in Action The Dimming of the Lig.docxCASE STUDY 5Exploring Innovation in Action The Dimming of the Lig.docx
CASE STUDY 5Exploring Innovation in Action The Dimming of the Lig.docx
 
Case Study 2A 40 year-old female presents to the office with the c.docx
Case Study 2A 40 year-old female presents to the office with the c.docxCase Study 2A 40 year-old female presents to the office with the c.docx
Case Study 2A 40 year-old female presents to the office with the c.docx
 
Case Study Horizon Horizon Consulting Patti Smith looked up at .docx
Case Study Horizon  Horizon Consulting Patti Smith looked up at .docxCase Study Horizon  Horizon Consulting Patti Smith looked up at .docx
Case Study Horizon Horizon Consulting Patti Smith looked up at .docx
 
Case Study EvaluationBeing too heavy or too thin, having a disabil.docx
Case Study EvaluationBeing too heavy or too thin, having a disabil.docxCase Study EvaluationBeing too heavy or too thin, having a disabil.docx
Case Study EvaluationBeing too heavy or too thin, having a disabil.docx
 
Case Study Disney Corporation1, What does Disney do best to connec.docx
Case Study Disney Corporation1, What does Disney do best to connec.docxCase Study Disney Corporation1, What does Disney do best to connec.docx
Case Study Disney Corporation1, What does Disney do best to connec.docx
 
Case Study 3  Exemplar of Politics and Public Management Rightly Un.docx
Case Study 3  Exemplar of Politics and Public Management Rightly Un.docxCase Study 3  Exemplar of Politics and Public Management Rightly Un.docx
Case Study 3  Exemplar of Politics and Public Management Rightly Un.docx
 
Case Study 2 Structure and Function of the Kidney Rivka is an ac.docx
Case Study 2 Structure and Function of the Kidney Rivka is an ac.docxCase Study 2 Structure and Function of the Kidney Rivka is an ac.docx
Case Study 2 Structure and Function of the Kidney Rivka is an ac.docx
 
Case Study 2 Plain View, Open Fields, Abandonment, and Border Searc.docx
Case Study 2 Plain View, Open Fields, Abandonment, and Border Searc.docxCase Study 2 Plain View, Open Fields, Abandonment, and Border Searc.docx
Case Study 2 Plain View, Open Fields, Abandonment, and Border Searc.docx
 
Case Study 2 Collaboration Systems at Isuzu Australia LimitedDue .docx
Case Study 2 Collaboration Systems at Isuzu Australia LimitedDue .docxCase Study 2 Collaboration Systems at Isuzu Australia LimitedDue .docx
Case Study 2 Collaboration Systems at Isuzu Australia LimitedDue .docx
 
Case FormatI. Write the Executive SummaryOne to two para.docx
Case FormatI. Write the Executive SummaryOne to two para.docxCase FormatI. Write the Executive SummaryOne to two para.docx
Case FormatI. Write the Executive SummaryOne to two para.docx
 
Case Study #2 Diabetes Hannah is a 10-year-old girl who has recentl.docx
Case Study #2 Diabetes Hannah is a 10-year-old girl who has recentl.docxCase Study #2 Diabetes Hannah is a 10-year-old girl who has recentl.docx
Case Study #2 Diabetes Hannah is a 10-year-old girl who has recentl.docx
 
case scenario being used for this discussion postABS 300 Week One.docx
case scenario being used for this discussion postABS 300 Week One.docxcase scenario being used for this discussion postABS 300 Week One.docx
case scenario being used for this discussion postABS 300 Week One.docx
 
Case Study #2Alleged improper admission orders resulting in mor.docx
Case Study #2Alleged improper admission orders resulting in mor.docxCase Study #2Alleged improper admission orders resulting in mor.docx
Case Study #2Alleged improper admission orders resulting in mor.docx
 
Case Study 1Denise is a sixteen-year old 11th grade student wh.docx
Case Study 1Denise is a sixteen-year old 11th grade student wh.docxCase Study 1Denise is a sixteen-year old 11th grade student wh.docx
Case Study 1Denise is a sixteen-year old 11th grade student wh.docx
 
Case AssignmentI. First read the following definitions of biodiver.docx
Case AssignmentI. First read the following definitions of biodiver.docxCase AssignmentI. First read the following definitions of biodiver.docx
Case AssignmentI. First read the following definitions of biodiver.docx
 
Case and questions are In the attchmentExtra resources given.H.docx
Case and questions are In the attchmentExtra resources given.H.docxCase and questions are In the attchmentExtra resources given.H.docx
Case and questions are In the attchmentExtra resources given.H.docx
 
Case C Hot GiftsRose Stone moved into an urban ghetto in order .docx
Case C Hot GiftsRose Stone moved into an urban ghetto in order .docxCase C Hot GiftsRose Stone moved into an urban ghetto in order .docx
Case C Hot GiftsRose Stone moved into an urban ghetto in order .docx
 
Case Assignment must be 850 words and use current APA format with a .docx
Case Assignment must be 850 words and use current APA format with a .docxCase Assignment must be 850 words and use current APA format with a .docx
Case Assignment must be 850 words and use current APA format with a .docx
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
JezreelCabil2
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

By the time the New York identity theft fraud case was solved, more .docx

  • 1. By the time the New York identity theft fraud case was solved, more than 30,000 people had suffered a total combined loss in excess of $2.7 million. This money had been stolen by a ring of New York residents who accessed the victims’ credit information and exploited that information to steal the victims’ identity. The fraud began when Linus Baptiste approached Philip Cummings about a plan to steal and sell people’s personal information. Philip Cummings had begun to work at Teledata Communications, Inc., a third party credit-reporting agency that facilitates the retrieval of credit history data. Teledata had outstanding contracts with more than 25,000 companies, allowing these companies to check on the creditworthiness of potential customers, thus creating a direct line past the three main credit bureaus. As a customer service representative, Cummings had obtained access to many confidential access codes. These access codes were used by the clients of Teledata to gain approval on credit requests. With access to these codes, Cummings had the opportunity to commit fraud. In early 2000, Cummings and Baptiste began to steal credit reports. The two fraudsters had a buyer for the information in a group of Nigerian nationalists. The Nigerians would pay up to $60 for one person’s information. After some time, the Nigerian nationalists began to provide the two fraudsters with names and social security numbers to help facilitate the process even further. To convert the information into money, the Nigerians used the information to gain access to the victim’s bank accounts and other financial information. The Nigerians would then: Deplete the bank accounts of the victims through wire transfers. Change the addresses of the accounts so the current information was not sent to the victims. Order new checks to be written off of the victim’s bank accounts. Order new ATM cards so the money could be taken out in cash. Order new credit cards under the victim’s names.
  • 2. Establish new lines of credit under the victim’s name. By using these techniques, the fraud ring was able to steal more than $2.7 million from consumers. This money was stolen over a period of about three years from late 1999 to late 2002. The most intriguing aspect of the fraud was that Cummings quit working at Teledata in early 2000, but was able to continue to steal the information for an additional two years. Cummings claimed that most of the access codes he stole while working at Teledata remained unchanged for the full two years after he left the company. Finally, in early 2002, Cummings began to get greedy and his greed led to the detection of fraud. Perceiving that he needed to make more money, Cummings stole about 15,000 credit reports from Teledata by using the access codes of Ford Motor Company. Then from February 2002 to May 2002, Cummings again stole a large number of names. This time Cummings used the access codes of Washington Mutual Bank to steal 6,000 credit reports. Finally, in September 2002, Cummings made what would be his last big credit report theft. Using the access codes of Central Texas Energy Supply, Cummings was able to steal 4,500 credit reports. After the theft using Ford’s access codes, Equifax, one of the three large credit bureaus in the United States, began to see the request spikes in Ford’s account. After the next two large batches of requests, Equifax decided to investigate further. Equifax found that almost all of the credit report requests came from one phone number, and that the request were done in large batches of about 100. The location of the phone number was found and a search by federal authorities turned up a computer and other equipment used in the fraud. Assuming you are an agent with the Federal Bureau of Investigation, provide a substantial response to at least one of the questions below: How would you coordinate an investigation in a manner that would not cause suspicion from Cummings and Baptiste? Create a vulnerability chart. What are the elements of the possible fraud? (It is best if you can include this directly into your post. If you run into a problem with
  • 3. formatting, you can attach a Word document or Excel file for this). Share highlights in your post. Assuming your investigation used surveillance and/or covert investigation techniques, what types of surveillance and/or covert operations would you use? How would technology play a role in this part of the investigation? How would analysis of physical evidence help in this investigation? What types of physical evidence would be especially helpful?