Expert answer:- The presentation will be about the case number 13 ” Never Pass Your Password “- Each presentation should be approximately 15 minutes long. You should do a “dress rehearsal” at home to make sure you don’t go over the 15 minutes allocated.- You should use about 12-14 PowerPoint slides. A general rule of thumb is one minute per slide. You also need to submit a report, maximum 2 pages.1” margins on all sides.1.5 line spacing.Times roman, 11 point font.- Also, I want to create ten questions to ask the students.
computer_fraud_casebook_by_joseph_wells.pdf
Unformatted Attachment Preview
Free ebooks ==> www.ebook777.com
(contiued from front flap)
From their rise to success through
their cunning and diabolical schemes
to their eventual capture and downfall, Computer Fraud Casebook is full
of amazing stories of the investigators’
dedication, skill, and intelligence to
uncover fraudsters and put an end to
corruption. From these stories, auditors,
controllers, IT managers, investigators,
law enforcement professionals, fraud
examiners, clients, employers, managers, consumers, students—virtually
anyone with a computer—will discover
a wealth of resources available to snare
criminals and, even more importantly,
prevent fraud from happening in the
first place.
JOSEPH T. WELLS, CFE, CPA, is the
founder and Chairman of the Association
of Certified Fraud Examiners (ACFE).
Mr. Wells writes, researches, and
lectures to business and professional
groups on fraud-related issues and is
frequently quoted in the media. He
was the 2002 winner of the Innovation
in Accounting Education Award presented by the American Accounting
Association (AAA), and he was named
to Accounting Today magazine’s annual
list of the “Top 100 Most Influential
People” in accounting for nine years in
a row.
Praise for
COMPUTER FRAUD CASEBOOK
The Bytes that Bite
“This is an excellent resource for practitioners and academics alike who want
to learn from an inside look at real-world computer fraud investigations.”
-—James Bierstaker, Villanova School of Business
“Wells’ collection of case studies is an easy read and appropriate for both anti-fraud professionals and
business executives charged with the responsibility of fraud prevention within their organizations.”
—Bruce A. Dean, JD, CFE, CPP, Regent Emeritus and former chairman, Board of Regents, ACFE
“Mr. Wells has done it again! Like a computer program, he consistently uses his inherent abilities
to filter complex fraud schemes, as written by those who found them, into simple truths complete with prevention and detection techniques. As the world becomes more digital by the day,
anyone seriously interested in fighting fraud will need to equip themselves with the appropriate
tools, and the Computer Fraud Casebook provides a perfect road map for this journey.”
—Richard B. Lanza, CFE, CPA, PMP, President, Cash Recovery Partners, LLC
“Mr. Wells’ latest is a must for anyone who wants to learn how to fight crime in the digital age. Fraud
examiners and investigators who don’t develop their skills in this field will soon be left behind!”
—Walt W. Manning, Director, AlixPartners, LLP
42 REAL-LIFE CASE STUDIES REVEAL THE UNDERBELLY OF COMPUTER FRAUD
TODAY’S BUSINESSES ARE COMPLETELY RELIANT ON TECHNOLOGY.
The bad part about computers is that they enhance fraudsters’ abilities to carry
out their costly and nefarious schemes. The good part is the very computers used
to carry out these crimes can also help solve them. Spanning e-mail fraud, online
auction fraud, security breaches, counterfeiting, and much more, Joseph Wells’
Computer Fraud Casebook is packed with forty-two real case studies, written by
the ACFE members who investigated them. Outlining how each fraud was engineered, how it was investigated, and how the perpetrators were brought to justice, Computer Fraud Casebook empowers readers with the knowledge and skills
to detect and prevent cyber fraud.
WELLS
COMPUTER FRAUD CASEBOOK
breaches, and counterfeiting—and how
they were investigated across industries
and throughout the world. Once fraud
occurs, recovering the victim’s money
is difficult, if not impossible. The fortytwo case studies in Computer Fraud
Casebook reveal how and why prevention is the number-one goal of the
anti-fraud specialist.
The Bytes
that Bite
COMPUTER FRAUD CASEBOOK
COMPUTER
FRAUD
CASEBOOK
The Bytes
that Bite
edited by
JOSEPH T. WELLS
IN 1995, COMPUTER FRAUD took
down England’s oldest bank. In 1996,
Omega Engineering Company lost over
$10 million to one disgruntled employee’s computer fraud. In 2001, two Cisco
Systems employees stole $8 million in
computer stock option refunds through
computer fraud. And technology experts
and professional crime fighters predict
that computer crime will continue to
explode in the coming years. Brimming
with these and other astonishing real-life
case studies written by the ACFE members who investigated them, Computer
Fraud Casebook reveals how vulnerable
all businesses are to fraud and offers
investigation and prevention guidance to
stop cyber-thieves in their virtual tracks.
Gone are the days when a small business
might lose only a few thousand dollars to
fraud. Today, computer fraud costs companies and consumers billions of dollars.
In cyberspace, the fraudster has morphed
from a hapless rip-off artist into a clever,
diabolical techno-thief with the ability to
steal and destroy on a grand scale around
the world. High-tech criminals can obliterate records, bankrupt companies, steal
money, cheat consumers, rob identities,
and cause unprecedented havoc, often
with a single click of the mouse.
Author Joseph Wells, founder and
Chairman of the Association of Certified
Fraud Examiners—the world’s leading
anti-fraud organization—provides readers with an understanding of the scope
and complexity of computer crime.
Focusing on cases committed in the
workplace, Wells introduces the scam
methods and techniques that were
unheard of just a few years ago. His
comprehensive compilation forms a
clear picture of the many types of computer fraud out there—including e-mail
fraud, online auction fraud, security
(contiued on back flap)
www.ebook777.com
colors=PMS 3135, Black
FM_1
12/03/2008
2
Free ebooks ==> www.ebook777.com
FM_1
12/03/2008
1
Free ebooks ==> www.ebook777.com
Computer Fraud Casebook
www.ebook777.com
FM_1
12/03/2008
2
Free ebooks ==> www.ebook777.com
FM_1
12/03/2008
3
Free ebooks ==> www.ebook777.com
Computer Fraud Casebook
THE BYTES THAT BITE
Edited by
Joseph T. Wells
John Wiley & Sons, Inc.
www.ebook777.com
FM_1
12/03/2008
4
Free ebooks ==> www.ebook777.com
1
This book is printed on acid-free paper.
Copyright # 2009 by Association of Certified Fraud Examiners. All rights reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in
any form or by any means, electronic, mechanical, photocopying, recording, scanning, or
otherwise, except as permitted under Section 107 or 108 of the 1976 United States
Copyright Act, without either the prior written permission of the Publisher, or authorization
through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc.,
222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600, or on the web at
www.copyright.com. Requests to the Publisher for permission should be addressed to the
Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030,
201-748-6011, fax 201-748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their
best efforts in preparing this book, they make no representations or warranties with respect
to the accuracy or completeness of the contents of this book and specifically disclaim any
implied warranties of merchantability or fitness for a particular purpose. No warranty may
be created or extended by sales representatives or written sales materials. The advice and
strategies contained herein may not be suitable for your situation. You should consult with a
professional where appropriate. Neither the publisher nor author shall be liable for any loss
of profit or any other commercial damages, including but not limited to special, incidental,
consequential, or other damages.
For general information on our other products and services, or technical support, please
contact our Customer Care Department within the United States at 800-762-2974, outside
the United States at 317-572-3993 or fax 317-572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears
in print may not be available in electronic books.
For more information about Wiley products, visit our Web site at http://www.wiley.com.
The case studies presented in this book are based on actual cases. Names, dates, locations,
and some facts have been changed to protect the privacy of the organizations and
individuals involved.
Library of Congress Cataloging-in-Publication Data:
Computer fraud casebook: the bytes that bite/[edited by] Joseph T. Wells.
p. cm.
Includes index.
ISBN 978-0-470-27814-7 (cloth)
1. Computer crimes. 2. Computer crimes–Investigation. 3. Fraud. 4.
Fraud investigation. I. Wells, Joseph T.
HV6773.C657 2009
363.25 09680973–dc22
2008032267
Printed in the United States of America
10 9 8 7 6 5 4 3 2 1
FM_1
12/03/2008
5
Free ebooks ==> www.ebook777.com
Contents
Foreword
ix
Preface
xi
Chapter
1
Just What the Doctor Ordered
1
George Kyrilis
Chapter
2
Of Botnets and Bagels: Vaccinating the Hospital
against Cybercrime
13
Frank Riccardi and Jennifer Campbell
Chapter
3
Pandora’s Box
21
Dr. Vishnu Kanhere
Chapter
4
Mail-Order Fraud
35
Robin Conrad
Chapter
5
Lancelot Gone Missing
45
Carolyn Conn, Paul Price, and Karon Murff
Chapter
6
Double Trouble
57
Stephen P. Weber
Chapter
7
Unimaginable Wealth
67
Sandra Burris
Chapter
8
Hacked
75
Jon Lambiras
v
www.ebook777.com
FM_1
12/03/2008
6
Free ebooks ==> www.ebook777.com
vi
Contents
Chapter
9
Bad Education
85
Russ Allen
Chapter 10
If Only His Nose Could Grow
97
Barry Davidow
Chapter 11
Keeping Up with the Jamesons
105
Mike Andrews
Chapter 12
Imaginary Satellites
115
George Kyriakodis
Chapter 13
Never Pass Your Password
125
James Martin and Harry Cendrowski
Chapter 14
Why Computers and Meth Don’t Mix
135
Stephen R. Menge
Chapter 15
Fishing in Dangerous Waters
143
Joe Dervaes
Chapter 16
The Man Who Told on Himself
155
Alan Greggo and Mike Jessee
Chapter 17
Triple Threat
163
Jean-FranHois Legault
Chapter 18
Swiped
173
Peter Belloli
Chapter 19
Have Computer, Will Video
181
Dominic A. D’Orazio
Chapter 20
Server, We Have a Problem
Marty Musters
191
FM_1
12/03/2008
7
Free ebooks ==> www.ebook777.com
Contents
Chapter 21
Do It for the Kids
vii
199
Michael Ammermon
Chapter 22
Moving Money
209
Neil Harrison
Chapter 23
Operation: Overnight Identity Theft
219
Bruno Pavlicek
Chapter 24
The Karma of Fraud
231
David Clements and Michael Cerny
Chapter 25
Secret Shopper
241
Jay Dawdy
Chapter 26
Would You Like a Receipt?
251
Shirley Quintana
Chapter 27
The Coupon Code Crooks
261
Danny Miller, Michael P. Rose, and Conor Donnelly
Chapter 28
He Fought the Law
269
Clifford Hunter
Chapter 29
Eyes on the Company Secrets
281
Tyson Johnson
Chapter 30
French Connections
289
Michael Nott
Chapter 31
Irreconcilable Differences
299
Jennifer Birtz
Chapter 32
Keeping It In the Family
Eric Sumners
www.ebook777.com
309
FM_1
12/03/2008
8
Free ebooks ==> www.ebook777.com
viii
Contents
Chapter 33
I Due
319
Rebecca Busch
Chapter 34
What Lies Inside the Trojan Horse
329
Johnathan Tal
Chapter 35
Lost in Transition
339
Amy Cron
Chapter 36
Superhero Syndrome
351
Hatitye Zhakata
Chapter 37
Stealing for the Sale
363
William J. Pederson and Timothy M. Strickler
Chapter 38
Do as I Say, Not as I Do
371
Richard Woodford
Chapter 39
Cinderella: One Glass Slipper Just Wasn’t Enough
383
Antonio Ivan S. Aguirre
Chapter 40
Bloggers: Separating the Wheat from the Chaff
389
Steven Solieri, Joan Hodowanitz, and Andrew Felo
Chapter 41
The Campus Con
401
Kevin Sisemore
Chapter 42
One for You, One for Me: A Tale of Crooked Insurance 413
Steve Martin
Index
421
Free ebooks ==> www.ebook777.com
Foreword
I
t was almost a decade ago that a colleague introduced me to Joseph Wells.
At the time he was chairman of the Association of Certified Fraud Examiners
(ACFE), a membership group he had founded only 10 years earlier but
which was already recognized as a major player in the fight against business
fraud and corruption. At the meeting he proposed writing a monthly
column for the Journal of Accountancy; I, being its editor-in-chief, reacted
with a journalist’s natural skepticism about working with a new writer and
agreed to try it on the condition that JofA readers proved they valued his
articles. We assigned Joe the task of targeting his articles to small-business
fraud, and he chose the format of presenting real case studies to make his
points. What a fortuitous meeting that was. Not only did the Journal’s readers
praise his work from day one, they went on to vote his articles as the best in
the JofA for three years running and catapulted him into the Journal of
Accountancy’s Hall of Fame, a very rare honor that only four writers have
attained. Our partnership lasted for eight fruitful years.
Based on that highly successful working relationship, I am very pleased to
write this introduction to the ACFE’s fourteenth book and the first one
devoted entirely to computer fraud. As Joe’s editor at the magazine all those
years, I had gotten an eye-opening education on small-business fraud and a
great respect for the ACFE’s mission when I saw the pressing need in the
marketplace for the information and education the ACFE delivered. From
today’s vantage point those crimes seem relatively simple: Each case consisted of three elements: a perpetrator (an employee), a victim (the smallbusiness owner), and a fraud investigator who was continuously honing his
or her skills as a Certified Fraud Examiner. The average small business lost
$127,500 to fraud (ACFE 2002 Report to the Nation). In the vast majority of
the stories, the opportunity to defraud presented itself in the form of an
administrator who had not set internal controls in place, had placed trust in
the wrong person, or who believed that a fail-safe system was not necessary.
How easy it was for a thief to filch money from a cash drawer or forge a check
or cook the books or doctor a bank reconciliation. We even managed to find
humor in the ineptitude of some of the would-be crooks. How could you not
chuckle over the bank robber who wrote the holdup note on the back of his
utility bill? Or the Wal-Mart shopper who tried to pay for her $1,672 bill with
ix
www.ebook777.com
Free ebooks ==> www.ebook777.com
x
Foreword
a $1 million bill? Or the genius check writer who used disappearing ink to
pawn off bad checks, but didn’t notice they had his name and address in
permanent ink?
But the fraud landscape has changed dramatically by adding one more
element—the computer. Computer fraud is sophisticated, global, annihilating, and unimaginably expensive. High-tech criminals can obliterate
records, bankrupt companies, steal money, cheat consumers, rob identities,
and cause unprecedented havoc, sometimes with a single mouse click. In
cyberspace, the fraudster has morphed from a hapless rip-off artist into a
clever, diabolical techno-thief who deliberately sets out to steal, manipulate,
deceive, or in some other way destroy on a grand scale—just count the
current frauds that cost companies and consumers in the billions of dollars.
Sounds alarming? You bet it does. It is not an exaggeration to say this book is
appearing at the right moment. Technology experts and professional crime
fighters alike predict that computer crime will explode in the coming years.
As you read this book, many of the case studies will astonish you, but at
the same time you will gain an understanding of the scope and complexity of
computer crime. You will be introduced to scam methods and techniques
that were unheard of just a few years ago and to some as old as the pyramids.
For example, you will read about a fraudster who began as a 15-year-old
spammer making thousands of dollars a day while still in high school, who
then moved on to peddling illegal drugs on the Net and laundering money
through a computer network that spread far beyond the United States. His
every action preyed on the unsuspecting. He amassed untold illicit millions
by age 25, but ended up being sentenced to 30 years to life before he was 30.
Yet, in my opinion, the true value of this book lies not in knowing the
criminals, as cunning as they are; rather it is in the telling of their downfall.
For each and every schemer in this volume, there was a fraud investigator or
team of them whose dedication, skill, and intelligence uncovered the
fraudster and put an end to the corruption. As I read the case studies, I
marveled at how smart the investigators were, their dogged determination,
and the number of resources they used—and which you can use—to snare
the criminal. The detailed plan of action outlined in each case should prove
invaluable to fraud fighters everywhere. I heartily recommend this book to
anyone who has an interest in fraud detection and prevention, or, for that
matter, to anyone who uses a computer—for everyone is at risk. Fraud
examiner, client, employer, manager, consumer, student—read and absorb,
for you will never treat your computer casually again.
Colleen Katz, Editor-in-Chief, Journal of Accountancy (Ret.)
Free ebooks ==> www.ebook777.com
Preface
Barings Bank, England’s oldest, failed in 1995 due to the actions of
one employee, Nick Leeson, who was in charge of arbitrage at
Barings’s Singapore branch. Through a computerized shell game,
he was able to conceal $1.4 billion in trading losses from his superiors.
When this computer fraud was uncovered, the bank collapsed.
In 1996, Timothy Allen Lloyd, former disgruntled employee of
Omega Engineering Co., hacked into their computer system to
permanently delete all manufacturing software programs, causing
losses of more than $10 million.
In 2001, Geoffrey Osowski and Wilson Tang, former accountants for
Cisco Systems, pled guilty to stealing about $8 million in company
stock option refunds. They did so by computerizing certain aspects of
their responsibilities to direct payments away from the rightful payees
and into bank accounts the two had set up for their own benefit.
Daniel Jeremy Baas pleaded guilty in 2003 to illegally accessing
customer databases at Acxiom, a company that maintains information
for various vendors. He was able to extract sensitive data on over 300
accounts maintained by Acxiom, which cost the company an estimated $5.8 million.
What all the case examples above have in common is that the means to
carry them out did not exist 30 years ago. But that was then and this is now.
We stand on the precipice of a whole new era that is forever changing our
lives because of advancements in technology. Computer fraud is just one
aspect of these changes, but a very important one.
In a worst-case scenario, hackers and cyber thieves could cripple the
global economy. That hasn’t happened—at least not yet. The U.S. Cyber
Consequences Unit estimates such attacks could average $700 billion per
incident. The Computer Security Institute believes annual losses by U.S.
companies more than doubled from 2006 to 2007.
No one really knows the cost of computer fraud. Estimates range from
well-researched opinions to wild guesses. There is no government agency or
private sector organization that gathers comprehensive data on these crimes.
Indeed, there is not even agreement on a definition of computer fraud.
xi
www.ebook777.com
Free ebooks ==> www.ebook777.com
xii
Preface
Because there are so many variations, we decided to concentrate on cases
committed in the workplace by employees to enrich themselves or their
companies. So if you are looking for detailed information on malware,
phishing, computer viruses, or hacking, this book might not be your best
choice. One question that I am frequently asked is, ‘‘Why …
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more