Forensics Journal - Stevenson University 2010 | Page 41
FORENSICS JOURNAL
makes them susceptible to identity theft. The lack of security for these
databases, Collins feels, is another reason why identity theft crimes
will increase. While there are many federal and state laws aimed at
protecting consumers from identity theft, such as the Identity Theft
and Assumption Deterrence Act of 1998 and the Health Insurance
Portability and Accountability Act (HIPPA), Collins believes that IT
security alone cannot prevent identity theft (p.180).
From victims with no experience in identity theft investigations to
law enforcement officers with little knowledge of performing investigations on the Internet, this book provides useful information for
a wide audience. Containing a wealth of information on the topic of
identity theft, it includes excellent case examples to assist the reader
in understanding how the crime works, and helpful instructions on
using the resources available to all individuals who wish to perform
an identity theft investigation. These resources include the Internet,
lists of credit agency contacts and check verification contacts included
in chapter five. The exercises illustrate information Collins provides
throughout the book and they can easily be followed by readers to
assist in their own identity theft investigations. Any reader who is
interested in learning about identity theft and investigations would
benefit from this book.
Collins’ experience with identity theft investigations is apparent
throughout the book. She shares many case examples and offers
numerous hands-on exercises throughout. Collins dedicates part of
each chapter to providing explanations for information technology
concepts, from firewalls and anti-virus software to Universal Resource
Locators (URLs). With this information, an individual with very little
computer experience can understand and perform an identity theft
investigation.
REFERENCE
The only weakness of this book lies within the order of chapters. Collins begins the introduction to computers in chapters three and four
where she explains how to properly configure a computer to secure it
during online investigations and to document key details (i.e., time
and date stamps) in order to preserve the chain of evidence. After
these chapters, Collins shifts from the technology aspect to the first
two steps of an identity theft investigation, preparation and investigation. Chapter eight resumes discussing technology and continues
through chapter ten. It would be beneficial to readers to keep the
technology topics together in order to grasp the full concept of online
investigations.
Collins, J. M. (2006). Investigating Identity Theft: A Guide