Risk

2/25/2011
03:41 PM
50%
50%

Identify Theft, Financial Scams Top Internet Crimes List

The FBI's Internet Crime Complaint Center received more than 300,000 reports of Internet crime in 2010, according to its annual report.

Failure to pay or deliver merchandise, scams in which someone impersonates the FBI, and identity theft were the top three Internet crime complaints last year, according to the FBI/National White Collar Crime Center's Internet Crime Complaint Center (IC3). Victims of these crimes reported losing hundreds of millions of dollars, the center said.

The IC3, which has logged Web-based crime complaints for 10 years, released its 2010 Internet Crime Report (PDF) this week. Last year, the center received 303,809 complaints -- or an average of about 25,000 per month -- mainly reported by men between the ages of 40 and 59 years old living in the U.S. states of California, Florida, Texas, or New York.

Computer crimes, and various forms of fraud -- including advance-fee, spam, auction, credit card, overpayment, and miscellaneous types -- rounded out the top 10 complaints lodged to the IC3 in 2010, according to the report.

The center has recorded more than 2 million complaints about attempts to defraud people via the Internet since its inception.

While men still predominantly report Internet crimes to the center, the previous ratio of men reporting crimes 2.5 to 1 over women has dramatically narrowed, according to IC3. Now women are reporting crimes nearly equally, according to the report.

Though middle-aged people file the biggest number of complaints, those in the 60-and-over age group account for the demographic with the biggest rise in complaints in the IC3's 10-year history, according to the report.

The FBI does not investigate all of the claims it receives, but 121,710 of the ones reported in 2010 did meet the criteria -- some of which is based on the financial nature of the crime. In those cases, the agency refers the crime to the appropriate law-enforcement agency at the federal, state, or local level.

The FBI has used technology to improve investigations based on IC3 complaints in recent years. The search process is now automated, so law-enforcement analysts investigating the crimes can more easily find patterns on which to build cases. Law enforcement agencies in different jurisdictions, but investigating the same or similar cases, also have better information-sharing tools, according to the FBI.

In addition to complaints from the U.S., the IC3 also fielded complaints from people overseas in 2010, mainly from residents in Canada, the United Kingdom, Australia, and India.

When the center had information about the people committing the crimes, it found that nearly 75% were men living in California, the District of Columbia, Florida, New York, Texas, and Washington. When perpetrators lived outside of the country, they were mainly from the United Kingdom, Nigeria, and Canada, according to the report.

The report also includes information about alerts the IC3 put on in 2010 around specific Internet scams people reported.

One concerned online apartment- and house-rental scams, while another used denial-of-service attacks on cell phones and landlines as a ruse to access victims' bank accounts. Yet another Internet scam involved people sending fake e-mails looking for donations to disaster-relief efforts after last year's massive earthquake in Haiti.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.