By B. Sullivan

The crime of the twenty-first century does not discriminate: identification robbery has hit traditional electorate and celebrities alike, from Oprah Winfrey to Steven Spielberg, and prices the economic system $50 billion a yr. Your Evil dual covers this exploding crime from each attainable perspective. It contains unique whodunit info from mastermind id thieves who've pilfered cash from part the contributors of the Forbes four hundred, in addition to unique interviews with a myriad of criminals within the Internet's underground, akin to Russian hackers who've extorted cash from U.S. banks. The e-book additionally matters a scathing indictment of the credits granting undefined, from bank card issuers to the secretive credits reporting organisations, who've misunderstood the crime from the beginning, were gradual to reply, and endure a lot of the accountability for the epidemic. ultimately, Bob Sullivan, writer and identification robbery professional, probes the tepid suggestions now being cobbled jointly by means of the and government.Bob Sullivan (Snohomish, WA), senior know-how author for MSNBC.com, is the nation's prime journalist overlaying identification fraud. He has written greater than a hundred articles at the topic seeing that 1996, and is a standard contributor to MSNBC, CNBC, NBC Nightly information, the this day convey, and numerous neighborhood NBC associates. With colleague Mike Brunker, Sullivan bought the celebrated 2002 Society reporters Public carrier Award for ongoing assurance of net fraud.

Show description

Read Online or Download Your Evil Twin: Behind the Identity Theft Epidemic PDF

Best security & encryption books

Internet and Wireless Security

Many firms are reworking their companies in the course of the improvement of data and communications applied sciences. the protection of this e-commerce is now a key enabler for companies and this ebook provides an outline of present and destiny infrastructures for e-business together with XML defense mechanisms and subsequent iteration Public Key Infrastructures (PKI), in addition to electronic archiving and instant defense that is set to be a big progress zone with the complete rollout of 3G cellular networks.

CompTIA Security+ SYO-201 Cert Guide

CompTIA® defense+ SY0-201 Cert advisor   David L. Prowse   DVD positive aspects whole perform examination   grasp each subject on CompTIA’s new safety+ SY0-201 examination. examine your wisdom and concentration your studying. Get the sensible place of work wisdom you would like!   Start-to-finish safeguard+ SY0-201 training from desktop safety advisor, safeguard+ coach, and writer David L.

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

The single entire advisor to designing, enforcing, and aiding cutting-edge certificate-based identification options with PKI   Layered strategy is designed to assist readers with commonly assorted backgrounds speedy research what they should understand Covers the full PKI venture lifecycle, making complicated PKI architectures easy to appreciate and installation Brings jointly conception and perform, together with on-the-ground implementers' wisdom, insights, top practices, layout offerings, and troubleshooting info    PKI exposed brings jointly the entire strategies IT and protection pros have to practice PKI in any surroundings, irrespective of how complicated or refined.

CompTIA Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001

Arrange your self for the latest CompTIA certification The CompTIA Cybersecurity Analyst+ (CSA+) learn consultant presents a hundred% assurance of all examination goals for the hot CSA+ certification. The CSA+ certification validates a candidate's talents to configure and use possibility detection instruments, practice facts research, determine vulnerabilities with a target of securing and keeping companies platforms.

Additional info for Your Evil Twin: Behind the Identity Theft Epidemic

Example text

While pimps never caught up with Jackson, the cops eventually did. Law enforcement agencies began to circle Jackson in late 1990, and his world would begin to unravel the next year. Insurance investigators from Geico and a local furniture store he had bilked had him arrested. But perhaps as a bit of poetic license, his first conviction involved theft of airline travel, using a technique not unlike that of famed impersonator Frank Abignale. Jackson had assumed the identity of a Federal Express employee with the same name and had been flying around the country for under $50, round trip, using the other Jackson’s employee discounts.

What he really did couldn’t have been any simpler,” Dunn argued. “There was nothing sophisticated about it. ” What should really be on trial, Dunn says today, is the system that made Jackson’s scams so easy. *** A month after being nabbed in the sting, while awaiting trial at Metropolitan Detention Center in Brooklyn, Jackson met scruffy, overweight Abraham Abdallah. Abdallah was also a career identity thief, in and out of jails since his teenage years. And, like Jackson, Abdallah had slowly escalated from simple frauds to far more serious identity thefts involving America’s rich and famous.

Months would pass before an investigator from Equifax called FBI Special Agent Kevin Barrows with an obvious break. During that delay the equal opportunity criminals continued to scoop up America’s financial secrets. In September, about 4,500 credit reports were ordered from the third of the major credit bureaus, TransUnion. This time, Central Texas Energy Supply’s account had been used to order the reports. Then on October 17, Barrows was told that telephone records had linked “M. ” to a residence in New Rochelle, New York.

Download PDF sample

Rated 4.21 of 5 – based on 22 votes