Information to steal the victims identities

Assignment Help Finance Basics
Reference no: EM13946715

Read the following case study and respond according to the instructions at the end:


By the time the New York identity theft fraud case was solved, more than 30,000 people had suffered a total combined loss of more than $2.7 million. This money had been stolen by a ring of New York residents who had accessed the victims' credit information and exploited that information to steal the victims' identities. 

The fraud began when Linus Baptiste approached Philip Cummings about a plan to steal and sell people's personal information. Philip Cummings had begun to work at Teledata Communications, Inc., a third-party credit-reporting agency that facilitates the retrieval of credit history data. Teledata had outstanding contracts with more than 25,000 companies, allowing these companies to check on the creditworthiness of potential customers, thus creating a direct line past the three main credit bureaus. As a customer service representative, Cummings had obtained access to many confidential access codes. These access codes were used by the clients of Teledata to gain approval on credit requests. With access to these codes, Cummings had the opportunity to commit fraud.

In early 2000, Cummings and Baptiste began to steal credit reports. The two fraudsters sold this information to a group of Nigerian nationalists. The Nigerian nationalists would pay up to $60 for one person's information. After some time, the Nigerians began to provide Cummings and Baptiste with names and Social Security numbers to help facilitate the process even further.

To convert the information into money, the Nigerians would use the information to gain access to the victims' bank accounts and other financial information. The group of Nigerians would then take the following steps:

  • Deplete the bank accounts of the victims through wire transfers.
  • Change the addresses of the accounts so the current information was not sent to the victims.
  • Order new checks to be written off of the victims' bank accounts.
  • Order new ATM cards so the money could be taken out in cash.
  • Order new credit cards under the victims' names.
  • Establish new lines of credit under the victims' names.

By using these techniques, the fraud ring was able to steal more than $2.7 million from consumers. This money was stolen over a period of three years, from late 1999 to late 2002. An intriguing aspect of the fraud was that Cummings quit working at Teledata in early 2000 but was able to continue to steal the information for an additional two years. Cummings claimed that most of the access codes he had stolen while working at Teledata remained unchanged for the full two years after he left the company.

Finally, in early 2002, Cummings began to get greedy, and his greed led to the detection of fraud. Desiring to make even more money, Cummings stole around 15,000 credit reports from Teledata by using the access codes of Ford Motor Company. Then from February 2002 to May 2002, Cummings again stole a large number of names. This time, Cummings used the access codes of Washington Mutual Bank (now Chase Bank) to steal 6,000 credit reports. Finally, in September 2002, Cummings made what would be his last big credit report theft. Using the access codes of Central Texas Energy Supply, Cummings was able to steal 4,500 credit reports.

After the theft using Ford's access codes, Equifax, one of the three large credit bureaus in the United States, began to see the request spikes in Ford's account. After the next two large batches of requests, Equifax decided to investigate further. Equifax found that almost all of the credit report requests came from one phone number and that the requests were done in batches of about 100. The location of the phone number was found, and a search by federal authorities turned up a computer and other equipment that were used in the fraud.

In September 2004, Cummings pled guilty to the crime and was later sentenced to 14 years in prison. The victims faced the dreadful task of restoring their credit, a process that can take years to complete.

In your paper, assuming you are an agent with the Federal Bureau of Investigation:

Describe the stages and all aspects of coordinating an investigation in a manner that would not arouse the suspicions of Cummings and Baptiste.

Design a vulnerability chart to coordinate the various elements of the possible fraud.

Your paper must be in a Word document of three to five pages. If you wish to include calculations in support of your response, place them in the form of a table within your paper. Outside references are not required but may be included. Format your paper in accordance with CSU-Global Guide to Writing and APA Requirements.

Reference no: EM13946715

Questions Cloud

Advantages and three disadvantages for this business form : There are seven forms of business: sole proprietorship, partnership, limited liability partnership, limited liability company (including the single member LLC), S Corporation, Franchise, and Corporation.
What is the rate of heat removal : What is the rate of heat removal per unit width of the fin? Generate a plot of the heat removal rate per unit width of the fin for motorcycle speeds ranging from 10 to 100 km/h.
Evaluates the performance of several popular algorithms : This paper evaluates the performance characteristics of several popular compression algorithms and explores two strategies for improving ratios without significantly impacting computation time.
How long will a d cell battery requires a current : How long will a D cell battery of 3.7V, with an ampere-hour rating of 2200mAH, that is connected in a circuit which requires a current of 20 mA?
Information to steal the victims identities : By the time the New York identity theft fraud case was solved, more than 30,000 people had suffered a total combined loss of more than $2.7 million. This money had been stolen by a ring of New York residents who had accessed the victims' credit infor..
Determine the amount of energy provided to the circuit : Suppose a dc source has a potential difference of 6.00 V and the current is 0.100 A. Determine the amount of energy provided to the circuit in 1.00 s. How much energy is transferred to the load in 1.00 hour?
What is the meaning of the cia triad in information security : What is the difference between Symmetric and Asymmetric Key Cryptography
Identifying which current topic or issue in management : Before you begin this Discussion, determine which one of the two topics or issues you examined in the Assignment due this week will still be significant 12 months from today. Search the Walden Library for at least one article that supports your pr..
Draw a block diagram of a processor : Draw a block diagram of a processor, memory, peripheral and DMA controller connected with a systemDraw a block diagram of a processor.

Reviews

Write a Review

Finance Basics Questions & Answers

  Computing the break-even point in units

Shock Electronics sells portable heaters for $25 each unit, and the variable expenses to manufacture them is $17. Mr. Amps estimates that the fixed costs are $96,000.

  Fishhook just went public and is considering a bond issue

FishHook (FH) just went public and is considering a bond issue with warrants attached

  You have invested 20 percent of your portfolio in homer inc

you have invested 20 percent of your portfolio in homer inc. 40 percent in marge co. and 20 percent in bart resources.

  Difference between the cost of capital and the irr indicate

What does the difference between the cost of capital and the IRR indicate?

  Create a trade crisis between the u.s. and russian firms

Explain how an irrevocable L/C would normally facilitate the business transaction between the Russian importer and Ocean Traders of North America (the U.S. exporter).b. Explain how the cancellation of the L/C could create a trade crisis between the..

  Talbot industries is considering an expansion project the

talbot industries is considering an expansion project. the necessary equipment could be purchased for 9 million and the

  What are the 5 major factors that distinguish

what are the 5 major factors that distinguish multinational financial management from financial management as

  Explain why the present value of a cash flow stream

Explain why the present value of a cash flow stream, and the asset associated therewith; fluctuate in value with the level of interest rates in the capital markets.

  Differences between fixed income-common stock securities

Write a 500-word summary to accompany your matrix explaining the significance of understanding the differences between fixed income and common stock securities in terms of providing sound financial management for a corporation.

  Last year chuck company issued a 10-year 12 semiannual

last year chuck company issued a 10-year 12 semiannual coupon bond at its par value of 1000. currently the bond can be

  The company wants a profit of 80000 how many units would

the following information is for a product manufactured and sold by rivera corporationsales price per unit 30 variable

  Abbot enterprises issued a bond having a par value of 1000

abbot enterprises issued a bond having a par value of 1000 a 7 year life and a 12 coupon rate. if interest is paid

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd