Internet Fraud Casebook

Book description

Real case studies on Internet fraud written by real fraud examiners

Internet Fraud Casebook: The World Wide Web of Deceit is a one-of-a-kind collection of actual cases written by the fraud examiners who investigated them. These stories were hand-selected from hundreds of submissions and together form a comprehensive, enlightening and entertaining picture of the many types of Internet fraud in varied industries throughout the world.

Each case outlines how the fraud was engineered, how it was investigated, and how perpetrators were brought to justice

Topics included are phishing, on-line auction fraud, security breaches, counterfeiting, and others

Other titles by Wells: Fraud Casebook, Principles of Fraud Examination, and Computer Fraud Casebook

This book reveals the dangers of Internet fraud and the measures that can be taken to prevent it from happening in the first place.

Table of contents

  1. Copyright
  2. Preface
  3. Internet Fraud Tree
  4. 1. Phantom Figurines
    1. 1.1. A House Divided
    2. 1.2. Internet Auction Figures
    3. 1.3. Vanishing Act
    4. 1.4. Mounting Complaints
    5. 1.5. Modeling a Case
    6. 1.6. Bid Winner
    7. 1.7. Proving a Negative
    8. 1.8. The Witnesses
    9. 1.9. Restitution and Bankruptcy
    10. 1.10. About the Author
  5. 2. From Russia With Love?
    1. 2.1. More Than a Name Change
    2. 2.2. The Captain
    3. 2.3. Hook, Line and Sinker
    4. 2.4. The Honeymoon Is Over
    5. 2.5. Two Is Better Than One
    6. 2.6. A Revealing History
    7. 2.7. Annulment and Deportation
    8. 2.8. About the Author
  6. 3. Behind a Smoke Screen
    1. 3.1. Shin Tao
    2. 3.2. The Gathering Storm
    3. 3.3. New Challenges
    4. 3.4. Redemption and Raids
    5. 3.5. About the Author
  7. 4. Cars, Cards, Chemicals And Crayons
    1. 4.1. The Benefits of Early Morning Banking
    2. 4.2. Following an Online Trail
    3. 4.3. The Credit Card Lifter
    4. 4.4. Insanity and Bulls**t
    5. 4.5. The Jig Is Up
    6. 4.6. Felonies, Felonies and Felonies
    7. 4.7. Sentencing
    8. 4.8. About the Author
  8. 5. Small-Town Boys
    1. 5.1. Thrown Together by Fate
    2. 5.2. A Ruined Cup of Coffee
    3. 5.3. Making the Right Connections
    4. 5.4. Gone Phishing
    5. 5.5. Coming out of Their Shell
    6. 5.6. About the Author
  9. 6. Dangerous Diet
    1. 6.1. Local Market
    2. 6.2. The Beauty Queen
    3. 6.3. The Same Defense Twice?
    4. 6.4. About the Author
  10. 7. The Suburban Spoofer
    1. 7.1. The Survivor
    2. 7.2. An Unexpected Move
    3. 7.3. A Checkered Past
    4. 7.4. Repeat Victim
    5. 7.5. Special Delivery
    6. 7.6. The Flood Gates Opened
    7. 7.7. About the Author
  11. 8. Don'T Mess With Texas
    1. 8.1. Abuse of Power
    2. 8.2. The Handover
    3. 8.3. Mysterious Payments
    4. 8.4. Security Breaches
    5. 8.5. Deceptively Simple
    6. 8.6. God's Plan?
    7. 8.7. The Bank Records
    8. 8.8. The Final Tally
    9. 8.9. Lack of Remorse
    10. 8.10. About the Author
  12. 9. Hot Wire
    1. 9.1. Onward and Upward
    2. 9.2. Night Watch
    3. 9.3. Information Deployment
    4. 9.4. Trip Wire
    5. 9.5. Mission Accomplished
    6. 9.6. About the Author
  13. 10. A Business Within A Business
    1. 10.1. Surfing on the Job
    2. 10.2. Failed Controls
    3. 10.3. Covering the Bases
    4. 10.4. Across the Table
    5. 10.5. Good Behavior
    6. 10.6. About the Author
  14. 11. Double Play
    1. 11.1. Free Lunch for Fraudsters?
    2. 11.2. The Investigator Became the Victim
    3. 11.3. The Tables Were Turned
    4. 11.4. Double Agent
    5. 11.5. Sweet Relief
    6. 11.6. About the Author
  15. 12. The eBay-Fraud Brothers
    1. 12.1. Entrepreneurial Spirit
    2. 12.2. FBI Tip
    3. 12.3. Caught on Tape
    4. 12.4. Two for One
    5. 12.5. About the Author
  16. 13. Not-So-Precious Metals
    1. 13.1. The Deal
    2. 13.2. Welcome to the Family
    3. 13.3. Compliance Check?
    4. 13.4. Deepening Relationship
    5. 13.5. All That Glitters Is Not Gold
    6. 13.6. The Investigation
    7. 13.7. The Jig Is Up
    8. 13.8. Falling through the Cracks
    9. 13.9. About the Author
  17. 14. The Cool-Cash Syndicate
    1. 14.1. Phishing
    2. 14.2. Card Cloning
    3. 14.3. Extrapolation
    4. 14.4. Saving for a Home
    5. 14.5. Can I Get Your Number?
    6. 14.6. Falling Like Dominoes
    7. 14.7. The Syndicate Dissolves
    8. 14.8. About the Author
  18. 15. Dastardly Design
    1. 15.1. Perfect Fit?
    2. 15.2. Lunchtime Alarm
    3. 15.3. Calling in the Big Guns
    4. 15.4. You Can't Hide
    5. 15.5. Gee, Look at This Gmail!
    6. 15.6. About the Author
  19. 16. The Reckless Clerk
    1. 16.1. WestBank Conflict
    2. 16.2. Roots of the Problem
    3. 16.3. Sounding the Alarm
    4. 16.4. If at First You Don't Succeed . . .
    5. 16.5. A Lazy Caller
    6. 16.6. Catching the Rat
    7. 16.7. About the Author
  20. 17. Close Quarters
    1. 17.1. Polar Opposites
    2. 17.2. A Disturbing Claim
    3. 17.3. Long-Distance Sleuthing
    4. 17.4. Role Reversal?
    5. 17.5. A Fruitful Harvest
    6. 17.6. Photo Finish
    7. 17.7. About the Author
  21. 18. Playing With Fire
    1. 18.1. Community-Based Fraudsters
    2. 18.2. High-Profile Victims
    3. 18.3. Getting Our Hands Dirty
    4. 18.4. The Ultimate Betrayal
    5. 18.5. About the Author
  22. 19. Hack, Pump And Dump
    1. 19.1. The Perfect Storm
    2. 19.2. China Gold
    3. 19.3. Empty Nest Egg
    4. 19.4. A Fad or a Ring?
    5. 19.5. Timing Is Everything
    6. 19.6. The Monster Strikes Back
    7. 19.7. A Multi-Headed Hydra
    8. 19.8. Where Is the Head?
    9. 19.9. About the Author
  23. 20. Dangerous Learning Curve
    1. 20.1. Introducing Internet Banking
    2. 20.2. Control Lapse
    3. 20.3. Follow the Money
    4. 20.4. A Slap on the Wrist Gone Awry
    5. 20.5. About the Author
  24. 21. The Sherwood Boys
    1. 21.1. An International Assembly
    2. 21.2. The Tentacles Start to Spread
    3. 21.3. On the Case
    4. 21.4. Shell Companies
    5. 21.5. High-Tech Organization
    6. 21.6. Offshore Banking
    7. 21.7. The Search Continues
    8. 21.8. About the Author
  25. 22. The Broken Nest Egg
    1. 22.1. International Cast of Characters
    2. 22.2. A Victim's Shame
    3. 22.3. Escalating Transfers
    4. 22.4. Reinforced Partnership
    5. 22.5. Mounting Fees
    6. 22.6. An Unsatisfactory End
    7. 22.7. About the Author
  26. 23. One More Lap To Go
    1. 23.1. Meneo Bank
    2. 23.2. Billy Lo Needs a Loan?
    3. 23.3. The Investigation
    4. 23.4. Under New Management
    5. 23.5. Phishing for PINs
    6. 23.6. Prepaid Cards, Politics and Arson
    7. 23.7. The Outcome of the Investigation
    8. 23.8. About the Author
  27. 24. Death And Taxes
    1. 24.1. The Tax Man Cometh
    2. 24.2. The Name Game
    3. 24.3. Code Violations
    4. 24.4. What's in a Name?
    5. 24.5. Family Bond
    6. 24.6. Have a Cookie
    7. 24.7. A Rose by Any Other Name . . .
    8. 24.8. Paying the Piper
    9. 24.9. About the Author
  28. 25. Keeping It All In The Family
    1. 25.1. The Rise of Condor
    2. 25.2. Double Trouble
    3. 25.3. Skirting Controls
    4. 25.4. A Discrete Tip
    5. 25.5. The Call for Help
    6. 25.6. Snooping Around
    7. 25.7. The Confrontation
    8. 25.8. Enter the CFEs
    9. 25.9. Like Mother, Like Son
    10. 25.10. About the Author
  29. 26. No Security In Online Advance Fees
    1. 26.1. Formal Introductions
    2. 26.2. Wide Reach
    3. 26.3. The Art of Delaying
    4. 26.4. About the Author
  30. 27. The G.I. Hacker
    1. 27.1. A New Beginning
    2. 27.2. The Mathises
    3. 27.3. Sabotage
    4. 27.4. Following the IP Trail
    5. 27.5. Surveillance and Searches
    6. 27.6. Angry Intent
    7. 27.7. About the Author
  31. 28. The Wrong Suspect
    1. 28.1. A Call from an Old Friend
    2. 28.2. The Big Picture
    3. 28.3. Focusing on the Details
    4. 28.4. Collaborative Investigation
    5. 28.5. About the Author
  32. 29. Dribbling On The Internet
    1. 29.1. The Disgruntled Investor
    2. 29.2. Suspicious Web Site
    3. 29.3. An Australian Diversion
    4. 29.4. Mounting Pressure
    5. 29.5. Home Visit
    6. 29.6. Man-to-Man Chat
    7. 29.7. Cease and Desist
    8. 29.8. About the Author
  33. 30. Behind The Mask
    1. 30.1. Picture-Perfect Compliance
    2. 30.2. Occupational Curiosity
    3. 30.3. Passing of the Torch
    4. 30.4. Details Emerge
    5. 30.5. About the Author
  34. 31. Online Pharmacy
    1. 31.1. Supply and Demand
    2. 31.2. TPG's Clientele
    3. 31.3. Online Marketplace
    4. 31.4. Deflecting Blame
    5. 31.5. The Tip of the Iceberg
    6. 31.6. Defining the Crime
    7. 31.7. Sentencing
    8. 31.8. About the Author
  35. 32. The Porn Procurement Process
    1. 32.1. The Air Force Procurement Process
    2. 32.2. Small Transactions Pack a Big Punch
    3. 32.3. Refund Request
    4. 32.4. Establishing Contact
    5. 32.5. Just Deserts — and Ketchup
    6. 32.6. About the Author
  36. 33. Gambling On A Profit
    1. 33.1. The Wrong Bet
    2. 33.2. The Tip-Off
    3. 33.3. Unchecked Manipulation
    4. 33.4. Bouncing the Accounting Ball
    5. 33.5. Calling the Bluff
    6. 33.6. Chasing the Crooks
    7. 33.7. About the Author
  37. 34. The Solitaire Trader
    1. 34.1. Unauthorized Transfer
    2. 34.2. Not for the First Time
    3. 34.3. The Enemy Within
    4. 34.4. Tea for Two
    5. 34.5. A New Direction
    6. 34.6. About the Author
  38. 35. The Big Brother He Never Had
    1. 35.1. The American Dream
    2. 35.2. A Window of Opportunity
    3. 35.3. The Perfect Storm
    4. 35.4. A Picture Is Worth a Thousand Words
    5. 35.5. Remittances to the Motherland
    6. 35.6. Mixed Results
    7. 35.7. About the Author
  39. 36. Wanted: Your Money
    1. 36.1. United Online
    2. 36.2. The Reports Were Piling Up
    3. 36.3. A Long-Term Plan
    4. 36.4. Time Is Running Out
    5. 36.5. About the Author
  40. 37. The Business Of Making Money
    1. 37.1. Online Money from Money Online
    2. 37.2. Not-So-Excellent Technology
    3. 37.3. The Master Impersonator
    4. 37.4. Missing Checks and Double-Checks
    5. 37.5. Boring, Boring, Boring
    6. 37.6. About the Author
  41. 38. Failure To Deliver
    1. 38.1. Sentimental Value
    2. 38.2. Collecting Complaints
    3. 38.3. Still No Response
    4. 38.4. Accepting Responsibility
    5. 38.5. About the Author
  42. 39. Cyber Psycho
    1. 39.1. Flying into Danger
    2. 39.2. Intimidation and Bullying
    3. 39.3. Home Invasion
    4. 39.4. Who's Crazy Here?
    5. 39.5. Piecing It Together
    6. 39.6. Overdue Answers
    7. 39.7. Where's the Justice?
    8. 39.8. About the Author
  43. 40. Drag Queens And Drugs
    1. 40.1. High-School Reunion
    2. 40.2. Equal-Opportunity Fraud
    3. 40.3. The Investigation
    4. 40.4. The Low-Tech Side
    5. 40.5. Closing in on the Suspects
    6. 40.6. Searching for Clues
    7. 40.7. The Junkyard Dogs
    8. 40.8. A Treasure Trove of Evidence
    9. 40.9. Prosecution
    10. 40.10. About the Author
  44. 41. Wire Transfers From Nowhere
    1. 41.1. The Mathematics of Profit
    2. 41.2. A Pattern Emerges
    3. 41.3. A Fortuitous Error
    4. 41.4. Combining Forces
    5. 41.5. Early Morning Surprises
    6. 41.6. The Outcome
    7. 41.7. About the Authors
  45. Glossary

Product information

  • Title: Internet Fraud Casebook
  • Author(s):
  • Release date: July 2010
  • Publisher(s): Wiley
  • ISBN: 9780470643631