Design vulnerability chart to coordinate the various element

Assignment Help Accounting Basics
Reference no: EM131240460

Theft and Concealment Investigation

Read the following case study and respond according to the instructions at the end:

By the time the New York identity theft fraud case was solved, more than 30,000 people had suffered a total combined loss of more than $2.7 million. This money had been stolen by a ring of New York residents who had accessed the victims' credit information and exploited that information to steal the victims' identities.

The fraud began when Linus Baptiste approached Philip Cummings about a plan to steal and sell people's personal information. Philip Cummings had begun to work at Teledata Communications, Inc., a third-party credit-reporting agency that facilitates the retrieval of credit history data. Teledata had outstanding contracts with more than 25,000 companies, allowing these companies to check on the creditworthiness of potential customers, thus creating a direct line past the three main credit bureaus. As a customer service representative, Cummings had obtained access to many confidential access codes. These access codes were used by the clients of Teledata to gain approval on credit requests. With access to these codes, Cummings had the opportunity to commit fraud.

In early 2000, Cummings and Baptiste began to steal credit reports. The two fraudsters sold this information to a group of Nigerian nationalists. The Nigerian nationalists would pay up to $60 for one person's information. After some time, the Nigerians began to provide Cummings and Baptiste with names and Social Security numbers to help facilitate the process even further.

To convert the information into money, the Nigerians would use the information to gain access to the victims' bank accounts and other financial information. The group of Nigerians would then take the following steps:

• Deplete the bank accounts of the victims through wire transfers.
• Change the addresses of the accounts so the current information was not sent to the victims.
• Order new checks to be written off of the victims' bank accounts.
• Order new ATM cards so the money could be taken out in cash.
• Order new credit cards under the victims' names.
• Establish new lines of credit under the victims' names.

By using these techniques, the fraud ring was able to steal more than $2.7 million from consumers. This money was stolen over a period of three years, from late 1999 to late 2002. An intriguing aspect of the fraud was that Cummings quit working at Teledata in early 2000, but was able to continue to steal the information for an additional two years. Cummings claimed that most of the access codes he had stolen while working at Teledata remained unchanged for the full two years after he left the company.

Finally, in early 2002, Cummings began to get greedy ,and his greed led to the detection of fraud. Desiring to make even more money, Cummings stole around 15,000 credit reports from Teledata by using the access codes of Ford Motor Company. Then from February 2002 to May 2002, Cummings again stole a large number of names. This time, Cummings used the access codes of Washington Mutual Bank (now Chase Bank) to steal 6,000 credit reports. Finally, in September 2002, Cummings made what would be his last big credit report theft. Using the access codes of Central Texas Energy Supply, Cummings was able to steal 4,500 credit reports.

After the theft using Ford's access codes, Equifax, one of the three large credit bureaus in the United States, began to see the request spikes in Ford's account. After the next two large batches of requests, Equifax decided to investigate further. Equifax found that almost all of the credit report requests came from one phone number, and that the requests were done in batches of about 100. The location of the phone number was found, and a search by federal authorities turned up a computer and other equipment that were used in the fraud.

In September 2004, Cummings pled guilty to the crime and was later sentenced to 14 years in prison. The victims faced the dreadful task of restoring their credit, a process that can take years to complete.

In your paper, assuming you are an agent with the Federal Bureau of Investigation:

a. Describe the stages and all aspects of coordinating an investigation in a manner that would not arouse the suspicions of Cummings and Baptiste.

b. Design a vulnerability chart to coordinate the various elements of the possible fraud.

Your paper must be in a Word document of three to five pages in length. If you wish to include calculations in support of your response, place them in the form of a table within your paper. Cite at least two resources supporting your responses, other than the course textbook. The CSU-Global Library is a good place to find these resources. Format your paper in accordance with CSU-Global Guide to Writing and APA Requirements.

Reference no: EM131240460

Questions Cloud

What is the business datavision is in : What is the business Datavision is in? What behaviors are required in order to manage the business? What kinds of problems are found by Dave Bennan and how do these problems compare with the kinds of behavior, just listed, that are required to run ..
Determine the net tension in the bolts : Water flows through the pipe shown in Fig. P14.32. Determine the net tension in the bolts if minor losses are neglected and the wheels on which the pipe rests are frictionless.
Would you agree to engage in a strike : How did the growth of big business impact the American dream? Explain which leisure opportunities could be part of the American dream. What part did the anti-immigration sentiment play in the American dream?
What will be you ethical framework as you practice : What will be you ethical framework as you practice the profession of accounting? What will you do when you find fraud or other inappropriate behaviors in others?
Design vulnerability chart to coordinate the various element : Design a vulnerability chart to coordinate the various elements of the possible fraud. Describe the stages and all aspects of coordinating an investigation in a manner that would not arouse suspicions of Cummings and Baptiste.
Determine lift coefficient of airplane for these condition : A Piper Cub airplane has a gross weight of 1750 lbf, a cruising speed of 115 mph, and a wing area of 179 ft2 . Determine the lift coefficient of this airplane for these conditions.
Promoting and maintaining a web site : Promoting and Maintaining a Web Site List at least four steps in the self-testing process.
Problem regarding the enterprise architecture : The reason I picked Web Services as a point, on the grounds that the Web is extending increasingly each and regular. You can now use programming, for example, Microsoft office on the web in stages, for example, Google Docs.
Analysis of heat and mass transfer : In order to maximize the benefits of microwave drying, further studies are required at lower power outputs with different microwave power cycles.

Reviews

Write a Review

 

Accounting Basics Questions & Answers

  Do you think crimes of globalization are likely to increase

do you think crimes of globalization are likely to increase or diminish in the next century? what are some of the

  Accounting cycle-sample financial statements

Collect the 4 main financial statements from credible sources (newspaper, peer-reviewed journals, investor relations, web sites or annual reports. Create a flow chart that illustrates the steps in the accounting cycle.

  Determine the acceptability of management practices used

The geocentric attitude reflects the belief that the overall quality of management recommendations, rather than the location of managers, should determine the acceptability of management practices used to guide multiunitional corporations.

  Write a brief memorandum for the working papers

1. Research this issue and write a brief memorandum for the working papers describing the issue and summarizing the appropriate method of accounting for the development costs.

  Write a memo to vice president explaining nature of risk

When designing an information system, the designers are increasingly concerned with the risks associated with technology and information system. Write a memo to the Vice President explaining to him the general nature of risk.

  Business had been slow since the beginning of the year

Ken, a salaried employee, was terminated from his company in April of this year. Business had been slow since the beginning of the year, and each of the operating plants had laid off workers.

  Invoice within the discount period

A retailer purchases merchandise with a catalog list price of $40,000. The retailer receives a 27% trade discount and credit terms of 2/10, n/30. How much cash will be needed to pay this invoice within the discount period?

  Boise corp had a margin of safety of 394000 last month with

boise corp had a margin of safety of 394000 last month with sales revenue of 1120000 and fixed costs of 333960.a.what

  The balance sheet of watson company as of december 31 20x1

the balance sheet of watson company as of december 31 20x1 follows. watson companybalance sheetdecember 31

  Weighted-average method gifford

6-38 Weighted-Average MethodGifford, Inc. produces a single model of a popular cell phone in large quantities. A single cell phone moves through two departments, assembly and testing. The manufac- turing costs in the assembly department during Ma..

  Find the financial statements for a publicly traded company

To participate in follow-up discussion, choose one of the companies that a classmate has reviewed, examine the company's financial statements, and provide your own commentary on it. All posts should be grammatically correct and proofread for spell..

  Excess of issue price over par-common stock

Dividends payable $30.00 13 Common stock, $10 par 100 50 14 Paid-in capital: Excess of issue price over par-common stock 250 125 15 Retained earnings 955 730 16 Total liabilities and stockholders' equity 1510 1065

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd