Home Page Icon
Home Page
Table of Contents for
Internet Fraud Tree
Close
Internet Fraud Tree
by Joseph T. Wells
Internet Fraud Casebook
Copyright
Preface
Internet Fraud Tree
1. Phantom Figurines
1.1. A House Divided
1.2. Internet Auction Figures
1.3. Vanishing Act
1.4. Mounting Complaints
1.5. Modeling a Case
1.6. Bid Winner
1.7. Proving a Negative
1.8. The Witnesses
1.9. Restitution and Bankruptcy
1.10. About the Author
2. From Russia With Love?
2.1. More Than a Name Change
2.2. The Captain
2.3. Hook, Line and Sinker
2.4. The Honeymoon Is Over
2.5. Two Is Better Than One
2.6. A Revealing History
2.7. Annulment and Deportation
2.8. About the Author
3. Behind a Smoke Screen
3.1. Shin Tao
3.2. The Gathering Storm
3.3. New Challenges
3.4. Redemption and Raids
3.5. About the Author
4. Cars, Cards, Chemicals And Crayons
4.1. The Benefits of Early Morning Banking
4.2. Following an Online Trail
4.3. The Credit Card Lifter
4.4. Insanity and Bulls**t
4.5. The Jig Is Up
4.6. Felonies, Felonies and Felonies
4.7. Sentencing
4.8. About the Author
5. Small-Town Boys
5.1. Thrown Together by Fate
5.2. A Ruined Cup of Coffee
5.3. Making the Right Connections
5.4. Gone Phishing
5.5. Coming out of Their Shell
5.6. About the Author
6. Dangerous Diet
6.1. Local Market
6.2. The Beauty Queen
6.3. The Same Defense Twice?
6.4. About the Author
7. The Suburban Spoofer
7.1. The Survivor
7.2. An Unexpected Move
7.3. A Checkered Past
7.4. Repeat Victim
7.5. Special Delivery
7.6. The Flood Gates Opened
7.7. About the Author
8. Don'T Mess With Texas
8.1. Abuse of Power
8.2. The Handover
8.3. Mysterious Payments
8.4. Security Breaches
8.5. Deceptively Simple
8.6. God's Plan?
8.7. The Bank Records
8.8. The Final Tally
8.9. Lack of Remorse
8.10. About the Author
9. Hot Wire
9.1. Onward and Upward
9.2. Night Watch
9.3. Information Deployment
9.4. Trip Wire
9.5. Mission Accomplished
9.6. About the Author
10. A Business Within A Business
10.1. Surfing on the Job
10.2. Failed Controls
10.3. Covering the Bases
10.4. Across the Table
10.5. Good Behavior
10.6. About the Author
11. Double Play
11.1. Free Lunch for Fraudsters?
11.2. The Investigator Became the Victim
11.3. The Tables Were Turned
11.4. Double Agent
11.5. Sweet Relief
11.6. About the Author
12. The eBay-Fraud Brothers
12.1. Entrepreneurial Spirit
12.2. FBI Tip
12.3. Caught on Tape
12.4. Two for One
12.5. About the Author
13. Not-So-Precious Metals
13.1. The Deal
13.2. Welcome to the Family
13.3. Compliance Check?
13.4. Deepening Relationship
13.5. All That Glitters Is Not Gold
13.6. The Investigation
13.7. The Jig Is Up
13.8. Falling through the Cracks
13.9. About the Author
14. The Cool-Cash Syndicate
14.1. Phishing
14.2. Card Cloning
14.3. Extrapolation
14.4. Saving for a Home
14.5. Can I Get Your Number?
14.6. Falling Like Dominoes
14.7. The Syndicate Dissolves
14.8. About the Author
15. Dastardly Design
15.1. Perfect Fit?
15.2. Lunchtime Alarm
15.3. Calling in the Big Guns
15.4. You Can't Hide
15.5. Gee, Look at This Gmail!
15.6. About the Author
16. The Reckless Clerk
16.1. WestBank Conflict
16.2. Roots of the Problem
16.3. Sounding the Alarm
16.4. If at First You Don't Succeed . . .
16.5. A Lazy Caller
16.6. Catching the Rat
16.7. About the Author
17. Close Quarters
17.1. Polar Opposites
17.2. A Disturbing Claim
17.3. Long-Distance Sleuthing
17.4. Role Reversal?
17.5. A Fruitful Harvest
17.6. Photo Finish
17.7. About the Author
18. Playing With Fire
18.1. Community-Based Fraudsters
18.2. High-Profile Victims
18.3. Getting Our Hands Dirty
18.4. The Ultimate Betrayal
18.5. About the Author
19. Hack, Pump And Dump
19.1. The Perfect Storm
19.2. China Gold
19.3. Empty Nest Egg
19.4. A Fad or a Ring?
19.5. Timing Is Everything
19.6. The Monster Strikes Back
19.7. A Multi-Headed Hydra
19.8. Where Is the Head?
19.9. About the Author
20. Dangerous Learning Curve
20.1. Introducing Internet Banking
20.2. Control Lapse
20.3. Follow the Money
20.4. A Slap on the Wrist Gone Awry
20.5. About the Author
21. The Sherwood Boys
21.1. An International Assembly
21.2. The Tentacles Start to Spread
21.3. On the Case
21.4. Shell Companies
21.5. High-Tech Organization
21.6. Offshore Banking
21.7. The Search Continues
21.8. About the Author
22. The Broken Nest Egg
22.1. International Cast of Characters
22.2. A Victim's Shame
22.3. Escalating Transfers
22.4. Reinforced Partnership
22.5. Mounting Fees
22.6. An Unsatisfactory End
22.7. About the Author
23. One More Lap To Go
23.1. Meneo Bank
23.2. Billy Lo Needs a Loan?
23.3. The Investigation
23.4. Under New Management
23.5. Phishing for PINs
23.6. Prepaid Cards, Politics and Arson
23.7. The Outcome of the Investigation
23.8. About the Author
24. Death And Taxes
24.1. The Tax Man Cometh
24.2. The Name Game
24.3. Code Violations
24.4. What's in a Name?
24.5. Family Bond
24.6. Have a Cookie
24.7. A Rose by Any Other Name . . .
24.8. Paying the Piper
24.9. About the Author
25. Keeping It All In The Family
25.1. The Rise of Condor
25.2. Double Trouble
25.3. Skirting Controls
25.4. A Discrete Tip
25.5. The Call for Help
25.6. Snooping Around
25.7. The Confrontation
25.8. Enter the CFEs
25.9. Like Mother, Like Son
25.10. About the Author
26. No Security In Online Advance Fees
26.1. Formal Introductions
26.2. Wide Reach
26.3. The Art of Delaying
26.4. About the Author
27. The G.I. Hacker
27.1. A New Beginning
27.2. The Mathises
27.3. Sabotage
27.4. Following the IP Trail
27.5. Surveillance and Searches
27.6. Angry Intent
27.7. About the Author
28. The Wrong Suspect
28.1. A Call from an Old Friend
28.2. The Big Picture
28.3. Focusing on the Details
28.4. Collaborative Investigation
28.5. About the Author
29. Dribbling On The Internet
29.1. The Disgruntled Investor
29.2. Suspicious Web Site
29.3. An Australian Diversion
29.4. Mounting Pressure
29.5. Home Visit
29.6. Man-to-Man Chat
29.7. Cease and Desist
29.8. About the Author
30. Behind The Mask
30.1. Picture-Perfect Compliance
30.2. Occupational Curiosity
30.3. Passing of the Torch
30.4. Details Emerge
30.5. About the Author
31. Online Pharmacy
31.1. Supply and Demand
31.2. TPG's Clientele
31.3. Online Marketplace
31.4. Deflecting Blame
31.5. The Tip of the Iceberg
31.6. Defining the Crime
31.7. Sentencing
31.8. About the Author
32. The Porn Procurement Process
32.1. The Air Force Procurement Process
32.2. Small Transactions Pack a Big Punch
32.3. Refund Request
32.4. Establishing Contact
32.5. Just Deserts — and Ketchup
32.6. About the Author
33. Gambling On A Profit
33.1. The Wrong Bet
33.2. The Tip-Off
33.3. Unchecked Manipulation
33.4. Bouncing the Accounting Ball
33.5. Calling the Bluff
33.6. Chasing the Crooks
33.7. About the Author
34. The Solitaire Trader
34.1. Unauthorized Transfer
34.2. Not for the First Time
34.3. The Enemy Within
34.4. Tea for Two
34.5. A New Direction
34.6. About the Author
35. The Big Brother He Never Had
35.1. The American Dream
35.2. A Window of Opportunity
35.3. The Perfect Storm
35.4. A Picture Is Worth a Thousand Words
35.5. Remittances to the Motherland
35.6. Mixed Results
35.7. About the Author
36. Wanted: Your Money
36.1. United Online
36.2. The Reports Were Piling Up
36.3. A Long-Term Plan
36.4. Time Is Running Out
36.5. About the Author
37. The Business Of Making Money
37.1. Online Money from Money Online
37.2. Not-So-Excellent Technology
37.3. The Master Impersonator
37.4. Missing Checks and Double-Checks
37.5. Boring, Boring, Boring
37.6. About the Author
38. Failure To Deliver
38.1. Sentimental Value
38.2. Collecting Complaints
38.3. Still No Response
38.4. Accepting Responsibility
38.5. About the Author
39. Cyber Psycho
39.1. Flying into Danger
39.2. Intimidation and Bullying
39.3. Home Invasion
39.4. Who's Crazy Here?
39.5. Piecing It Together
39.6. Overdue Answers
39.7. Where's the Justice?
39.8. About the Author
40. Drag Queens And Drugs
40.1. High-School Reunion
40.2. Equal-Opportunity Fraud
40.3. The Investigation
40.4. The Low-Tech Side
40.5. Closing in on the Suspects
40.6. Searching for Clues
40.7. The Junkyard Dogs
40.8. A Treasure Trove of Evidence
40.9. Prosecution
40.10. About the Author
41. Wire Transfers From Nowhere
41.1. The Mathematics of Profit
41.2. A Pattern Emerges
41.3. A Fortuitous Error
41.4. Combining Forces
41.5. Early Morning Surprises
41.6. The Outcome
41.7. About the Authors
Glossary
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Preface
Next
Next Chapter
1. Phantom Figurines
Internet Fraud Tree
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset