On Monday, 02/01/2016, at approximately 18:48 hours, I, Deputy Stacy Stark #1815 was dispatched to handle a telephone report for Identity Theft. I returned a telephone call to the victim, Lisa A. Gross (F/W, DOB: 08/12/1962). Gross lives at 1617 Camp Creek Murphysboro, IL 62966. Gross stated she noticed at approximately 15:00 hours on 02/01/2016, her cell phone stopped operating. Gross was unable to use her cell phone. Since Gross’s cell phone stopped operating, she contacted her cell phone provider, Verizon. Gross contacted Verizon customer service at approximately 16:30 – 17:00 hours. Gross was informed by Verizon that her current iPhone 5c was disconnected. Gross’s account information was used to purchase three iPhone 6’s and a line was added to her account. Verizon removed the charges from her account and changed the current password to her account. Gross did not have any suspect information. She was not aware of how, who, or when the suspect(s) gained access to her account. Gross was informed by …show more content…
Gross brought in a copy of an e-mail sent by Verizon confirming her new device purchases. Gross stated she received that e-mail the same day her cell phone stopped operating. Gross also made contact with Verizon and asked a few questions about the suspect(s) that used her information to purchase iPhone 6’s. Gross was told by Verizon, there were three iPhone 6’s purchased at the Best Buy in Tacoma, WA. The Best Buy store location number was 7070001. Their address was 2214 South 48th Street, Tacoma, WA 98409. Best Buy’s telephone number was 253-476-4871. The total amount charged to her account was $2999.96. The amount charged to her account was set up to be paid as monthly installments. The cell phone numbers for the new iPhone 6’s were 618-521-2944, 618-967-7959, and 618-697-8215. Gross had no further information to
Click here to unlock this and over one million essays
Show MoreThere seems to be some confusion based on Mr. Cohn email, please allow me to clarify.
This caused the officer to seize both of their cell phones. Once seized the officer tried to unlock the phones to search them and asked them to unlock them to be searched. Officer Faultless noticed that Ruhmoan’s phone had a finger print lock and used his thumb while handcuffed to forcefully unlock his phone and searched his phone, finding potentially incriminating evidence. Rahten’s phone was later unlocked back at the police precinct by an IT specialist and was searched finding potentially incriminating
On Tuesday, 08/02/2016, I, Deputy Stacy Stark #1815, received a telephone call from the victim, Cara M. Morrison (F/W, DOB: 09/27/1989). Morrison called to report she went to Midwest Cash located at 1200 W. Main St. Carbondale, Illinois to pawn another television she owned for cash. While at Midwest Cash, she recognized her stolen television advertised for sale. Morrison did not have the serial number of the television she reported stolen on 07/29/2016, so she was unable to verify to the clerk the television was hers. Morrison remembered she used the stolen television for collateral at a local cash loan business in the past. Morrison went to the cash loan business and was able to retrieve the identifiers on her television, including the serial number. The day Morrison was returning to Midwest Cash to verify the television was hers, she brought along her boyfriend, Rodney J. Tully (M/W, DOB: 05/26/1988). Prior to arriving at Midwest Cash, Tully told Morrison they were
After reviewing the sources that I have gathered in my previous weeks’ assignments, I have noticed an underlying factor between them all. Some of the sources take this factor a completely different direction than what I was originally looking for, but they all have similar sections or quotes that attribute to my own personal questions and possible research topic.
On Friday, May 18, 2017, I, Officer B. McMillon, #135, of the Mansfield ISD Police Department was on assignment at Legacy High School located at 1263 N. Main in Mansfield, Texas 76063. At approximately 7:15 am Doerr, Sundee W/F, the mother of LHS student Doerr, Dyllon W/M, d.o.b. 04/08/2000 came to my office in reference to her son stolen cell phone.
Caplan, Hayley. "How to Avoid Cell Phone Identity Theft." What Is Privacy. N.p., 31 July 2012. Web. 21 Apr. 2014. .
Senator Charles Schumer (D-New York) first introduced the Mobile Device Theft Deterrence Act of 2012 (S. 3186). This was the first attempt to address phone crimes on a national scale. Due to the previous failure in 2012, the Mobile Device Theft Deterrence Act was re-introduced by Senator Schumer in 2013. It targeted to criminalize tampering with mobile device identification number as a means to halt the black market for stolen cell phones. There is a unique International Mobile Equipment Identity (IMEI) number in every smartphone. This number enables local carriers to block operating device’s network and puts it on blacklist. This bill also sought to impose a 5-year criminal penalty for the alternation of IMEI number. Other than these, there were joint efforts between cell carriers and FCC to create Stolen Cell Phone Registry by November 30, 2012 . This registry would store a list of stolen phones’ International Mobile Equipment Identity (IMEI) number. However, this database only worked if thieves didn’t tamper cell phone ID number. In fact, there are many loopholes for thieves to get around with such registry. When cellphones are reported stolen, most phone carriers in United States only deactivate the SIM card by prohibiting access to information stored in the SIM card. This blocks the device from using the existing data on the phone. Yet, SIM card can be easily removed and replaced. Stolen cell phones can be sold in black market even if it is blocked. Therefore, there are a lot more to be done to protect public safety and smartphone crimes.
On 09/20/2015 at 08:38 hours, I was dispatched to the area of Branchwood Drive and County house Road, for a report of an Assault. Upon my arrival, I spoke with the caller, Lisa A. Frederick.
the most popular form of phone fraud today. The first step is to gain access to
America is dub the land of opportunities and hope by all that look from the outside of the fence in. The shining image of greatness America portrays gives the sense that you can accomplish anything when within its diverse borders. I’m Māori Johnson, and I’m a naturalized citizen of the United States of America from Jordan. Naturalization is defined by the U.S Citizenship and Immigration Service (2013) as the process by which U.S citizenship is granted to a foreign citizen. It’s a rigorous thing to accomplish which consist of first applying for citizenship, if accepted you then go through a written test and exam, probably most natural born citizens couldn’t pass. After you’re accepted life isn’t the easiest to begin. I’ve had to leave behind my job in my former country to pursue my new life here. I am pursing a master’s degree in communications from Texas State University to better my opportunities here. However, I’m working at a local H-E-B while I attempt to pursue a career in my area of expertise while attending school. I’ve expected to have a hard time adjusting in that aspect but I’m enjoying my time here. (Question 1)
The female later identified at Margaret Thorne, related that she was lost and in need if some directions. Margaret related that she trying to back to Leola, Pennsylvania. On inquiry, Margaret related that she left Lancaster, PA this afternoon after visiting her hospitalized husband, but took a wrong turn, became lost and has been driving ever since . Margaret also related that her phone’s battery was out of charge and not working. While Sgt. Blanchard checked if Margaret was a missing person, I escorted her inside Wawa in an attempt to buy a charger for her phone. However, her phone was the latest phone from LG and neither Wawa nor Sgt Blanchard
The feud between Apple Company and the Federal Bureau of Investigation (FBI) started after the terrorist attack in San Bernardino, California on December 2015. The FBI named the man responsible for the Massacre as Syed Rizwan Farook along with his wife, Tashfeen Malik. The police killed the couple during the shootout and found an iPhone (Apple product) used by Farook which later the FBI learned was given to him by his employer from the government. In order to trace others involved in the killings, the FBI requested Apple to help them crack the phone because they don’t want to risk deleting the possible information they need. “Cracking the phone” is a process of making a backdoor or breaking into the secured computer system with certain software which enables illegal copying of data (techopedia). I thought it was absurd to know that during the House committee hearing on March 3, 2016, Apple dismissed the FBI request to crack the mobile phone used by Farook in the San Bernardino Massacre on December
Fourteen people were killed in this horror attack. Even after two months, investigators don’t have ideas about the terrorists’ information. However, investigators found a new clue, a new iPhone in the car that belongs to terrorists. IPhone is an important point, in this case, it might relate to other planning that terrorists have, and others terrorists. Court order Apple to unlock the iPhone in order to help law enforcement agents. And the phone owner also agrees to examine it. But Apple rejects to comply it. Apple indicates their operating systems only allow the user to get access to the device. Even Apple itself don’t have ways to do it. Apple also indicates, if they do what court order them to do in this case, Apple think, their brand reputation will be damaged. The author believes that Apple is better to comply, to assist law enforcement agents. Author think Apple should consider lawfully issued court order at first, then its business
The FBI and Apple had a difference in opinions when it came to the privacy of criminals.The FBI wanted the device that can decrypt the cell phone and let them check the information they need to check. The federal court even sent a court order for Apple to help the FBI. The FBI wants to examine the iPhone to see if it was involved in the planning of the mass shooting. To see if they could get some physical proof. The user was Syed Farook, who was another suspect involved in the shooting. Apple is
that the phone is programmed so that it is billed and that it also has the identity of both