Internet Fraud Casebook : The World Wide Web of Deceit.
Material type: TextPublisher: New York : John Wiley & Sons, Incorporated, 2010Copyright date: ©2010Edition: 1st edDescription: 1 online resource (407 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9780470875483Subject(s): Computer crimes -- Case studies | Internet fraud -- Case studiesGenre/Form: Electronic books.Additional physical formats: Print version:: Internet Fraud Casebook : The World Wide Web of DeceitDDC classification: 364.16/3 LOC classification: HV6773 -- .W45 2010ebOnline resources: Click to ViewInternet Fraud Casebook: The World Wide Web of Deceit -- Contents -- Preface -- Internet Fraud Tree -- Chapter 1: Phantom Figurines -- A House Divided -- Internet Auction Figures -- Vanishing Act -- Mounting Complaints -- Modeling a Case -- Bid Winner -- Proving a Negative -- The Witnesses -- Restitution and Bankruptcy -- About the Author -- Chapter 2: From Russia with Love? -- More Than a Name Change -- The Captain -- Hook, Line and Sinker -- The Honeymoon Is Over -- Two Is Better Than One -- A Revealing History -- Annulment and Deportation -- About the Author -- Chapter 3: Behind a Smoke Screen -- Shin Tao -- The Gathering Storm -- New Challenges -- Redemption and Raids -- About the Author -- Chapter 4: Cars, Cards, Chemicals and Crayons -- The Benefits of Early Morning Banking -- Following an Online Trail -- The Credit Card Lifter -- Insanity and Bulls** t -- The Jig Is Up -- Felonies, Felonies and Felonies -- Sentencing -- About the Author -- Chapter 5: Small-Town Boys -- Thrown Together by Fate -- A Ruined Cup of Coffee -- Making the Right Connections -- Gone Phishing -- Coming out of Their Shell -- About the Author -- Chapter 6: Dangerous Diet -- Local Market -- The Beauty Queen -- The Same Defense Twice? -- About the Author -- Chapter 7: The Suburban Spoofer -- The Survivor -- An Unexpected Move -- A Checkered Past -- Repeat Victim -- Special Delivery -- The Flood Gates Opened -- About the Author -- Chapter 8: Don't Mess with Texas -- Abuse of Power -- The Handover -- Mysterious Payments -- Security Breaches -- Deceptively Simple -- God's Plan? -- The Bank Records -- The Final Tally -- Lack of Remorse -- About the Author -- Chapter 9: Hot Wire -- Onward and Upward -- Night Watch -- Information Deployment -- Trip Wire -- Mission Accomplished -- About the Author -- Chapter 10: A Business within a Business -- Surfing on the Job.
Failed Controls -- Covering the Bases -- Across the Table -- Good Behavior -- About the Author -- Chapter 11: Double Play -- Free Lunch for Fraudsters? -- The Investigator Became the Victim -- The Tables Were Turned -- Double Agent -- Sweet Relief -- About the Author -- Chapter 12: The eBay-Fraud Brothers -- Entrepreneurial Spirit -- FBI Tip -- Caught on Tape -- Two for One -- About the Author -- Chapter 13: Not-So-Precious Metals -- The Deal -- Welcome to the Family -- Compliance Check? -- Deepening Relationship -- All That Glitters Is Not Gold -- The Investigation -- The Jig Is Up -- Falling through the Cracks -- About the Author -- Chapter 14: The Cool-Cash Syndicate -- Phishing -- Card Cloning -- Extrapolation -- Saving for a Home -- Can I Get Your Number? -- Falling Like Dominoes -- The Syndicate Dissolves -- About the Author -- Chapter 15: Dastardly Design -- Perfect Fit? -- Lunchtime Alarm -- Calling in the Big Guns -- You Can't Hide -- Gee, Look at This Gmail! -- About the Author -- Chapter 16: The Reckless Clerk -- WestBank Conflict -- Roots of the Problem -- Sounding the Alarm -- If at First You Don't Succeed . . . -- A Lazy Caller -- Catching the Rat -- About the Author -- Chapter 17: Close Quarters -- Polar Opposites -- A Disturbing Claim -- Long-Distance Sleuthing -- Role Reversal? -- A Fruitful Harvest -- Photo Finish -- About the Author -- Chapter 18: Playing with Fire -- Community-Based Fraudsters -- High-Profile Victims -- Getting Our Hands Dirty -- The Ultimate Betrayal -- About the Author -- Chapter 19: Hack, Pump and Dump -- The Perfect Storm -- China Gold -- Empty Nest Egg -- A Fad or a Ring? -- Timing Is Everything -- The Monster Strikes Back -- A Multi-Headed Hydra -- Where Is the Head? -- About the Author -- Chapter 20: Dangerous Learning Curve -- Introducing Internet Banking -- Control Lapse -- Follow the Money.
A Slap on the Wrist Gone Awry -- About the Author -- Chapter 21: The Sherwood Boys -- An International Assembly -- The Tentacles Start to Spread -- On the Case -- Shell Companies -- High-Tech Organization -- Offshore Banking -- The Search Continues -- About the Author -- Chapter 22: The Broken Nest Egg -- International Cast of Characters -- A Victim's Shame -- Escalating Transfers -- Reinforced Partnership -- Mounting Fees -- An Unsatisfactory End -- About the Author -- Chapter 23: One More Lap to Go -- Meneo Bank -- Billy Lo Needs a Loan? -- The Investigation -- Under New Management -- Phishing for PINs -- Prepaid Cards, Politics and Arson -- The Outcome of the Investigation -- About the Author -- Chapter 24: Death and Taxes -- The Tax Man Cometh -- The Name Game -- Code Violations -- What's in a Name? -- Family Bond -- Have a Cookie -- A Rose by Any Other Name . . . -- Paying the Piper -- About the Author -- Chapter 25: Keeping It All in the Family -- The Rise of Condor -- Double Trouble -- Skirting Controls -- A Discrete Tip -- The Call for Help -- Snooping Around -- The Confrontation -- Enter the CFEs -- Like Mother, Like Son -- About the Author -- Chapter 26: No Security in Online Advance Fees -- Formal Introductions -- Wide Reach -- The Art of Delaying -- About the Author -- Chapter 27: The G.I. Hacker -- A New Beginning -- The Mathises -- Sabotage -- Following the IP Trail -- Surveillance and Searches -- Angry Intent -- About the Author -- Chapter 28: The Wrong Suspect -- A Call from an Old Friend -- The Big Picture -- Focusing on the Details -- Collaborative Investigation -- About the Author -- Chapter 29: Dribbling on the Internet -- The Disgruntled Investor -- Suspicious Web Site -- An Australian Diversion -- Mounting Pressure -- Home Visit -- Man-to-Man Chat -- Cease and Desist -- About the Author -- Chapter 30: Behind the Mask.
Picture-Perfect Compliance -- Occupational Curiosity -- Passing of the Torch -- Details Emerge -- About the Author -- Chapter 31: Online Pharmacy -- Supply and Demand -- TPG's Clientele -- Online Marketplace -- Deflecting Blame -- The Tip of the Iceberg -- Defining the Crime -- Sentencing -- About the Author -- Chapter 32: The Porn Procurement Process -- The Air Force Procurement Process -- Small Transactions Pack a Big Punch -- Refund Request -- Establishing Contact -- Just Deserts-and Ketchup -- About the Author -- Chapter 33: Gambling on a Profit -- The Wrong Bet -- The Tip-Off -- Unchecked Manipulation -- Bouncing the Accounting Ball -- Calling the Bluff -- Chasing the Crooks -- About the Author -- Chapter 34: The Solitaire Trader -- Unauthorized Transfer -- Not for the First Time -- The Enemy Within -- Tea for Two -- A New Direction -- About the Author -- Chapter 35: The Big Brother He Never Had -- The American Dream -- A Window of Opportunity -- The Perfect Storm -- A Picture Is Worth a Thousand Words -- Remittances to the Motherland -- Mixed Results -- About the Author -- Chapter 36: Wanted: Your Money -- United Online -- The Reports Were Piling Up -- A Long-Term Plan -- Time Is Running Out -- About the Author -- Chapter 37: The Business of Making Money -- Online Money from Money Online -- Not-So-Excellent Technology -- The Master Impersonator -- Missing Checks and Double-Checks -- Boring, Boring, Boring -- About the Author -- Chapter 38: Failure to Deliver -- Sentimental Value -- Collecting Complaints -- Still No Response -- Accepting Responsibility -- About the Author -- Chapter 39: Cyber Psycho -- Flying into Danger -- Intimidation and Bullying -- Home Invasion -- Who's Crazy Here? -- Piecing It Together -- Overdue Answers -- Where's the Justice? -- About the Author -- Chapter 40: Drag Queens and Drugs -- High-School Reunion.
Equal-Opportunity Fraud -- The Investigation -- The Low-Tech Side -- Closing in on the Suspects -- Searching for Clues -- The Junkyard Dogs -- A Treasure Trove of Evidence -- Prosecution -- About the Author -- Chapter 41: Wire Transfers from Nowhere -- The Mathematics of Profit -- A Pattern Emerges -- A Fortuitous Error -- Combining Forces -- Early Morning Surprises -- The Outcome -- About the Authors -- Glossary -- Index.
Real case studies on Internet fraud written by real fraud examiners Internet Fraud Casebook: The World Wide Web of Deceit is a one-of-a-kind collection of actual cases written by the fraud examiners who investigated them. These stories were hand-selected from hundreds of submissions and together form a comprehensive, enlightening and entertaining picture of the many types of Internet fraud in varied industries throughout the world. Each case outlines how the fraud was engineered, how it was investigated, and how perpetrators were brought to justice Topics included are phishing, on-line auction fraud, security breaches, counterfeiting, and others Other titles by Wells: Fraud Casebook, Principles of Fraud Examination, and Computer Fraud Casebook This book reveals the dangers of Internet fraud and the measures that can be taken to prevent it from happening in the first place.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.