Used surveillance and covert investigation techniques

Assignment Help Operation Management
Reference no: EM131642821

By the time the New York identity theft fraud case was solved, more than 30,000 people had suffered a total combined loss in excess of $2.7 million. This money had been stolen by a ring of New York residents who accessed the victims’ credit information and exploited that information to steal the victims’ identity. The fraud began when Linus Baptiste approached Philip Cummings about a plan to steal and sell people’s personal information. Philip Cummings had begun to work at Teledata Communications, Inc., a third party credit-reporting agency that facilitates the retrieval of credit history data. Teledata had outstanding contracts with more than 25,000 companies, allowing these companies to check on the creditworthiness of potential customers, thus creating a direct line past the three main credit bureaus. As a customer service representative, Cummings had obtained access to many confidential access codes. These access codes were used by the clients of Teledata to gain approval on credit requests. With access to these codes, Cummings had the opportunity to commit fraud. In early 2000, Cummings and Baptiste began to steal credit reports. The two fraudsters had a buyer for the information in a group of Nigerian nationalists. The Nigerians would pay up to $60 for one person’s information. After some time, the Nigerian nationalists began to provide the two fraudsters with names and social security numbers to help facilitate the process even further. To convert the information into money, the Nigerians used the information to gain access to the victim’s bank accounts and other financial information. The Nigerians would then: Deplete the bank accounts of the victims through wire transfers. Change the addresses of the accounts so the current information was not sent to the victims. Order new checks to be written off of the victim’s bank accounts. Order new ATM cards so the money could be taken out in cash. Order new credit cards under the victim’s names. Establish new lines of credit under the victim’s name. By using these techniques, the fraud ring was able to steal more than $2.7 million from consumers. This money was stolen over a period of about three years from late 1999 to late 2002. The most intriguing aspect of the fraud was that Cummings quit working at Teledata in early 2000, but was able to continue to steal the information for an additional two years. Cummings claimed that most of the access codes he stole while working at Teledata remained unchanged for the full two years after he left the company. Finally, in early 2002, Cummings began to get greedy and his greed led to the detection of fraud. Perceiving that he needed to make more money, Cummings stole about 15,000 credit reports from Teledata by using the access codes of Ford Motor Company. Then from February 2002 to May 2002, Cummings again stole a large number of names. This time Cummings used the access codes of Washington Mutual Bank to steal 6,000 credit reports. Finally, in September 2002, Cummings made what would be his last big credit report theft. Using the access codes of Central Texas Energy Supply, Cummings was able to steal 4,500 credit reports. After the theft using Ford’s access codes, Equifax, one of the three large credit bureaus in the United States, began to see the request spikes in Ford’s account. After the next two large batches of requests, Equifax decided to investigate further. Equifax found that almost all of the credit report requests came from one phone number, and that the request were done in large batches of about 100. The location of the phone number was found and a search by federal authorities turned up a computer and other equipment used in the fraud

Question

Assuming your investigation used surveillance and/or covert investigation techniques, what types of surveillance and/or covert operations would you use? how would technology play a role in this part of the investigation?

Reference no: EM131642821

Questions Cloud

Determine the times interest earned ratio : For the FY 2016, Alpha Company had net sales of $950,000 and net income of $55,000, determine the Times Interest Earned Ratio
What is a preference under the bankruptcy code : What is a preference under the bankruptcy code? What time period is reviewed to determine if a preference has occurred?
Determine the quick ratio and current ratio : For the FY 2016, Alpha Company's balance sheet included the following current items: determine the Quick Ratio and Current Ratio
What is the company average cost : It costs a company $35,000 to produce 700 graphing calculators. The company's cost will be $35,070 if it produces an additional graphing calculator.
Used surveillance and covert investigation techniques : Assuming your investigation used surveillance and/or covert investigation techniques, what types of surveillance and/or covert operations would you use?
Discuss sources of bias for quantitative research : Discuss sources of bias for both quantitative and qualitative research. For quantitative research, be sure to address both random and systematic bias.
Determine alpha company net cash flows : Use this information to determine Alpha Company's Net Cash Flows from Financing Activities
How user interactions with systems will evolve : Anticipate how user interactions with systems will evolve over the next 20 years. Provide specific examples to support your response.
The possible consequences on other european union members : What are the possible consequences on other European Union members and the U.S?

Reviews

Write a Review

Operation Management Questions & Answers

  Which of the following do you believe is the primary reason

Which of the following do you believe is the primary reason for over diversification? Industrial policies, such as taxes and antitrust regulation

  Consider same organization mechanistic-organic or hybrid

With regard to your current organization (or one with which you are familiar), which design structure is being used? Would you consider this same organization mechanistic, organic, or hybrid? Do you believe this structure and design are effective giv..

  Translated into continued successful market positioning

Determine whether Logitech’s past ability to innovate can be translated into continued successful market positioning. If not, what competitive advantage can Logitech exploit to maintain its position as an industry leader?

  What is the reorder point for westside auto in given problem

What is the reorder point for Westside Auto in given Problem? Show the general formula for the reorder point for the EOQ model with backorders.

  Discuss the major objectives of defense strategy

Time-to-exploitation is the elapsed time between when vulnerability is discovered and when it’s exploited. That time has shrunk from months to minutes so IT staff have ever-shorter timeframes to find and fix flaws before being compromised by an attac..

  What is the quality-productivity ratio

Airphone, Inc., manufactures cellular telephones at a processing cost of $81 per unit. The company produces an average of 250 phones per week and has a yield of 80% good-quality phones, resulting in 20% defective phones, 55% of which can be rework..

  Describe the sources of power you can use to ensure

Describe the sources of power you can use to ensure that the advertising and production departments will help you make and sell toothpaste more effectively

  Illustrate what is supermarket as it is used in mrp

Illustrate what is "supermarket" as it is used in MRP. Elucidate how does it alter responsibility for dealing with lead-time offsets.

  How much safety stock should be carried

Authentic Thai rattan chairs (shown in the photo) are delivered to Gary Schwartz's chain of retail stores, called The Kathmandu Shop, once a year. Given the following demand probabilities during the lead time, how much safety stock should be carrie..

  Perform analysis to support the decision

Your company (Acme Iron) is considering leasing a new computer, you and your team need to perform analysis to support the decision making process. The lease lasts for 9 years.

  Can terrorism be considered form of political communication

Can terrorism be considered a form of political communication? If yes, what are terrorism trying to convey. Discuss the issues that impact the effectiveness of their efforts. If no, what is the purpose of terrorism? How do arguments about censorship ..

  What is a behavioural theory of leadership

What is a behavioural theory of leadership? Choose one of the behavioural leadership theories and explain it.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd