Forensics Journal - Stevenson University 2010 | Page 41

FORENSICS JOURNAL makes them susceptible to identity theft. The lack of security for these databases, Collins feels, is another reason why identity theft crimes will increase. While there are many federal and state laws aimed at protecting consumers from identity theft, such as the Identity Theft and Assumption Deterrence Act of 1998 and the Health Insurance Portability and Accountability Act (HIPPA), Collins believes that IT security alone cannot prevent identity theft (p.180). From victims with no experience in identity theft investigations to law enforcement officers with little knowledge of performing investigations on the Internet, this book provides useful information for a wide audience. Containing a wealth of information on the topic of identity theft, it includes excellent case examples to assist the reader in understanding how the crime works, and helpful instructions on using the resources available to all individuals who wish to perform an identity theft investigation. These resources include the Internet, lists of credit agency contacts and check verification contacts included in chapter five. The exercises illustrate information Collins provides throughout the book and they can easily be followed by readers to assist in their own identity theft investigations. Any reader who is interested in learning about identity theft and investigations would benefit from this book. Collins’ experience with identity theft investigations is apparent throughout the book. She shares many case examples and offers numerous hands-on exercises throughout. Collins dedicates part of each chapter to providing explanations for information technology concepts, from firewalls and anti-virus software to Universal Resource Locators (URLs). With this information, an individual with very little computer experience can understand and perform an identity theft investigation. REFERENCE The only weakness of this book lies within the order of chapters. Collins begins the introduction to computers in chapters three and four where she explains how to properly configure a computer to secure it during online investigations and to document key details (i.e., time and date stamps) in order to preserve the chain of evidence. After these chapters, Collins shifts from the technology aspect to the first two steps of an identity theft investigation, preparation and investigation. Chapter eight resumes discussing technology and continues through chapter ten. It would be beneficial to readers to keep the technology topics together in order to grasp the full concept of online investigations. Collins, J. M. (2006). Investigating Identity Theft: A Guide