Forensics Journal - Stevenson University 2010 | Page 40

STEVENSON UNIVERSITY Book Review: Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims by Judith M. Collins Veronica Arze As individuals and businesses rely more on technology and technology continues to advance, new methods to commit identity theft have surfaced. With the introduction of and the growing reliance on the Internet for everyday tasks such as online banking, online shopping, and loan applications, identity theft via the Internet is becoming more popular. In her book, Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims, Judith M. Collins provides guidance for investigators and victims investigating identity thefts with the assistance of the Internet itself. Following these initial chapters are two chapters dedicated to educating readers on configuring their computers for Internet security and online investigations. These two chapters are primarily written for investigators new to the internet. Regardless, the information provided is useful for any reader as a check to ensure proper computer security is enabled. Exercises and tutorials are included in these chapters and serve as how-to steps for any reader not familiar with settings on their computer. Collins dedicates part of chapter four to an introduction to search engines and directories. Search engines are critical to online investigations when the investigator has minimal information on the crime, i.e. an address, phone number, or name. Collins provides excellent examples of this in chapter seven where she presents a case example of an identity theft investigation performed with search engines. Collins is a highly regarded expert on identity theft and a former associate professor at the School of Criminal Justice at Michigan State University. She has written what she labels a “how-to” book for investigators, criminal justice teachers, and victims who wish to investigate their own identity thefts. According to Collins, “Even novice investigators can become professionals at online investigations” (p. 14). Investigating Identity Theft provides readers with instructions on conducting investigations and includes exercises using the techniques shared in the book. Additionally, the book contains many case examples which assist the reader in understanding how the methods work in real investigations. In chapters five and six, Collins advises readers of two important steps: The first includes preparing for the investigation. Victims must take some steps immediately subsequent to discovering the identity theft. Chapter six is primarily for investigators because it touches on the second important step of any investigation, the authentication process. According to Collins, “authenticating simply means verifying the identity theft claims before launching full-scale into the investigation” (p. 89). All investigators should take this step in order to ensure that they are not wasting valuable resources on a criminal rat \