On Monday, 02/01/2016, at approximately 18:48 hours, I, Deputy Stacy Stark #1815 was dispatched to handle a telephone report for Identity Theft. I returned a telephone call to the victim, Lisa A. Gross (F/W, DOB: 08/12/1962). Gross lives at 1617 Camp Creek Murphysboro, IL 62966.
Gross stated she noticed at approximately 15:00 hours on 02/01/2016, her cell phone stopped operating. Gross was unable to use her cell phone. Since Gross’s cell phone stopped operating, she contacted her cell phone provider, Verizon. Gross contacted Verizon customer service at approximately 16:30 – 17:00 hours. Gross was informed by Verizon that her current iPhone 5c was disconnected. Gross’s account information was used to purchase three iPhone 6’s and a line was added to her account. Verizon removed the charges from her account and changed the current password to her account. Gross did not have any suspect information. She was not aware of how, who, or when the suspect(s) gained access to her account. Gross was informed by
…show more content…
Gross brought in a copy of an e-mail sent by Verizon confirming her new device purchases. Gross stated she received that e-mail the same day her cell phone stopped operating. Gross also made contact with Verizon and asked a few questions about the suspect(s) that used her information to purchase iPhone 6’s. Gross was told by Verizon, there were three iPhone 6’s purchased at the Best Buy in Tacoma, WA. The Best Buy store location number was 7070001. Their address was 2214 South 48th Street, Tacoma, WA 98409. Best Buy’s telephone number was 253-476-4871. The total amount charged to her account was $2999.96. The amount charged to her account was set up to be paid as monthly installments. The cell phone numbers for the new iPhone 6’s were 618-521-2944, 618-967-7959, and 618-697-8215. Gross had no further information to
This caused the officer to seize both of their cell phones. Once seized the officer tried to unlock the phones to search them and asked them to unlock them to be searched. Officer Faultless noticed that Ruhmoan’s phone had a finger print lock and used his thumb while handcuffed to forcefully unlock his phone and searched his phone, finding potentially incriminating evidence. Rahten’s phone was later unlocked back at the police precinct by an IT specialist and was searched finding potentially incriminating
On Tuesday, 08/02/2016, I, Deputy Stacy Stark #1815, received a telephone call from the victim, Cara M. Morrison (F/W, DOB: 09/27/1989). Morrison called to report she went to Midwest Cash located at 1200 W. Main St. Carbondale, Illinois to pawn another television she owned for cash. While at Midwest Cash, she recognized her stolen television advertised for sale. Morrison did not have the serial number of the television she reported stolen on 07/29/2016, so she was unable to verify to the clerk the television was hers. Morrison remembered she used the stolen television for collateral at a local cash loan business in the past. Morrison went to the cash loan business and was able to retrieve the identifiers on her television, including the serial number. The day Morrison was returning to Midwest Cash to verify the television was hers, she brought along her boyfriend, Rodney J. Tully (M/W, DOB: 05/26/1988). Prior to arriving at Midwest Cash, Tully told Morrison they were
Darrell Issa persuades governors that Apple needs to keep their customer information to themselves. Through using the rhetorical devices of statistics and historical evidence, he addresses the fact that Apple should not be forced to unlock these phones. This could not only keep privacy, but also create a safe environment for people. He points out the privacy act passing before in order to persuade the governors to need to think what they did and what they need to do in the future. They should not force Apple to unlock an iPhone because it provides a backdoor for the lawbreakers.
2. Is there a way to gather proof? Yes, that could be by seen the cell phone historical not just letting go of someone’s words because is a serious matter.
On Friday, May 18, 2017, I, Officer B. McMillon, #135, of the Mansfield ISD Police Department was on assignment at Legacy High School located at 1263 N. Main in Mansfield, Texas 76063. At approximately 7:15 am Doerr, Sundee W/F, the mother of LHS student Doerr, Dyllon W/M, d.o.b. 04/08/2000 came to my office in reference to her son stolen cell phone.
I was wondering why there was an issue onto why there was an issue. The sales rep told us that everything was all set, what was wrong? According the email, “Two orders from your recent Verizon Wireless purchase has been cancelled due to an outstanding balance. Please call 1-800-OHM-YGOD to resolve any issues.” While checking the shipping email, I was curious to see which phone got shipped out. To my surprise it was my phone, so I was honestly excited for this. Walking downstairs I relayed the information to my mother and father who were honestly not happy about this. But was told that they would wait to see if the shipment would come in to see my phone got
Senator Charles Schumer (D-New York) first introduced the Mobile Device Theft Deterrence Act of 2012 (S. 3186). This was the first attempt to address phone crimes on a national scale. Due to the previous failure in 2012, the Mobile Device Theft Deterrence Act was re-introduced by Senator Schumer in 2013. It targeted to criminalize tampering with mobile device identification number as a means to halt the black market for stolen cell phones. There is a unique International Mobile Equipment Identity (IMEI) number in every smartphone. This number enables local carriers to block operating device’s network and puts it on blacklist. This bill also sought to impose a 5-year criminal penalty for the alternation of IMEI number. Other than these, there were joint efforts between cell carriers and FCC to create Stolen Cell Phone Registry by November 30, 2012 . This registry would store a list of stolen phones’ International Mobile Equipment Identity (IMEI) number. However, this database only worked if thieves didn’t tamper cell phone ID number. In fact, there are many loopholes for thieves to get around with such registry. When cellphones are reported stolen, most phone carriers in United States only deactivate the SIM card by prohibiting access to information stored in the SIM card. This blocks the device from using the existing data on the phone. Yet, SIM card can be easily removed and replaced. Stolen cell phones can be sold in black market even if it is blocked. Therefore, there are a lot more to be done to protect public safety and smartphone crimes.
Something else Heather has come to feel strongly about is that there should always be somebody other than you who knows the password for your Apple ID, if you have an iPhone. ‘Ryan had a two way authentication on his phone.’ she says. ‘You couldn’t change his password with just an email address. Because we couldn’t answer his security questions, they would only text his new code to his phone 23 day later. Even RCMP intervention could do nothing. So we will never know, if looking at his find my iPhone app, his last location would have been given.’
In today 's generation many adults and teenagers keep everything from contacts numbers to their social security numbers on their smartphones. When customers, including criminals and terrorists purchase their smartphones, they are buying it with the assurance that not some, but all of their information and privacy will be safeguarded. The issue occurring today deals with the suspected terrorist of the San Bernardino, California on December 2, 2015 shooting involving over 30 injured people. Syed Farook, the suspected terrorist Apple IPhone is locked with a 4 code password and the government wants Apple to create a backdoor operating systems that allows them to computerize as many passcodes they can to unlocks the terrorists IPhone. Apple strongly believes that creating this necessary backdoor system will create a negative chain of effects that will affect everyone from smartphone users to social media companies and their privacy. The FBI recently has taken Apple to court to create the necessary backdoor operating systems to get around the security features created on the Apple IPhones. Apple has the legal right to refuse creating a “backdoor” software to get into suspected terrorists iphone because it invades the privacy of Apple 's customers, it will set a precedent for other companies, and the FBI will mislead Apple.
the most popular form of phone fraud today. The first step is to gain access to
Terrorism is haunting our modern world today. Recently America witnessed the biggest terrorist attack since 9/11. The shooter had the possession of an Apple iphone, and the FBI wants the four digit code. Apple believes that if they were to create a software to crack the code of this phone. It may expose the privacy and security of all Apple customers. The FBI deserves to have this phone because, it is an order of federal court. Additionally, this could possibly lead to ISIS and when they may strike again. FBI Director James Comey testified before the Senate Intelligence Committee and discussed the frustration of not being able to access the locked phone. He explains "It affects our counterterrorism work. San Bernardino, a very important investigation
In this case it’s I think important to understand that Apple would happily open this one phone and give the FBI the info they needed. But this isn’t what the government really wants. The government wants a backdoor key into the operating system itself. This means that government will have total right of entry into your iPhone. This has to be regulated to protect
Attorney Vance Jr. argues in his article “No Smartphone Lies Beyond the Reach of a Judicial Search Warrant” that the “Decisions about who can access key evidence in criminal investigations should be made by courts and legislatures, not by Apple and Google.” Contrary to the attorney’s statement, it leaves out a question of what evidence or leads can the investigation get out of the iPhone. Intelligent criminals, upon hearing the news or after careful planning of a plot, would treat the iPhone as disposable (not for reuse). In his view, surveillance of a felon is more important than the privacy of an
that the phone is programmed so that it is billed and that it also has the identity of both
Apple, which was cooperating with the FBI to help the agency access data on Farook's work phone, refused.” This means that one of the terrorists had an iPhone 5C and the FBI tried to get in but it had a password. So they asked Apple to take the password off. The reason they asked to take it off is that they want to know who Farook was communicating with and which websites he might have visited in the days leading up to the December 2 massacre. On this website it states, “ Access to computers and personal phones owned by Farook and his wife would help, but the couple smashed their personal phones and removed the hard drive from their computer. Farook's iPhone 5C, given to him by his employers in San Bernardino County in southern California, may be one of their last options.” This suggests that the FBI’s only option to get information on the massacre is on this iPhone 5C but it is not reachable since it has a passcode. http://www.cnet.com/news/apple-versus-the-fbi-why-the-lowest-priced-iphone-has-the-us-in-a-tizzy-faq/ suggest that, “Apple was able to give the FBI backups only through October 19, when Farook apparently stopped backing up the phone. That leaves a