The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint submissions for 2004, an increase of 66.6% from 2003. The total dollar loss from all referred cases exceeded 68 million dollars, an average loss of $894 per complaint. There are many types of internet frauds that exist including auction, email, foreign investment letters and online dating. Here are some ways to identify a possible scam or fraud that you may have encountered while surfing the internet.
Auctions
Auction sites are one of the best places to purchase and sell items. They are also one of the easiest places to become an internet fraud victim. Auction fraud represented 71% of the total referred fraud complaints. How the scam works is that you win the auction, but never receive the item. Most of the time the auction site cannot assist you in recovering the money stolen. They will remove the member's account and disqualify the member's email address from their site but are not able to do much else. It is in your best interest to research each seller before making any purchases. Auction sites have a rating system for their members and I would advise you to check this and their profile for certain clues. The first is to check how many sales have been completed and the response from the buyers. I would suggest no less than a hundred transactions for moderately priced items (less than a hundred dollars). A scammer will become a member and sell fifty items for a dollar or less usually in a week or two to build up his member rating. Then they will post twenty auctions ending within a day of each other for items that retail for over a hundred dollars but they are selling them for an unprofitable amount. Again, research a seller's auction history before placing your bid. Also, if Western Union or similar is stated to be the only form of payment, move right on to the next auction.
Fraudulent Email
Email is a great form of communication and also an easy target for schemers. Electronic mail is the primary mechanism by which a perpetrator makes contact representing 63% compared to just 7% by phone. Fraud victims will receive an email with a link stating that their account information needs to be updated. Upon clicking on the link you are taken to a page that looks almost identical to the member page and asks you to enter in your name, address, social security number, checking account routing number and/or credit card number. When you hit the submit button, your information is instantly shuttled to someone waiting to separate you from your money. Before submitting your information, verify that you are truly on the site that the link states it is taking you.
Foreign Investment Letter
Another popular email scheme is an email from a foreign country stating that they have millions that need to be transferred to the United States but need a bank account to finalize the transaction. The sender of the email is willing to give you a percentage of the amount transferred in exchange for using your bank account. Never submit your social security number and checking account or credit card number via an email or an unfamiliar website. This is also known as Nigerian letter fraud and among one of the highest dollar loss frauds with an average of $3000.
Online Dating
You would also be surprised how easily people give their hard earned money away to people they meet over the internet but not in person. The victim meets someone in a chat room or message board and builds a friendship with the perpetrator who usually sends the victim a picture of an attractive person. When the time comes to meet, the schemer admits to not having the money for airfare and expenses, so the victim sends the money via Western Union or similar money transfer service, never to hear back from the person again.
Avoiding Scams
Here are a few ways to avoid becoming a victim of a scam:
Please visit the IFCC or view the annual report at http://www1.ifccfbi.gov/strategy/statistics.asp for more information about internet fraud.
James Junior is a freelance writer and web programmer for http://www.jccorner.com
Yes, I'm wearing my encryption hat again. Why you may... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
A friend called me one day and asked if I... Read More
First, let's do a little recap'. As I stated in... Read More
Identity Theft and Your Personal Information -------------------------------------------- Identity theft is... Read More
A little bit of time invested into learning about internet... Read More
In a word, no - an email message has always... Read More
With the Internet entering our lives in such an explosive... Read More
Have you ever bought a product or service from the... Read More
Paypal is a great site and is used by many... Read More
Nobody wants to pay to remove spyware. At the very... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Before you enter your name, address or any other data... Read More
Since its birth, the Internet has grown and expanded to... Read More
Identity theft rates one of the fastest growing crimes in... Read More
If you know what is the 'Fishing' then it's very... Read More
Nowadays more and more people are using a computer. A... Read More
The Threat10 years ago you could probably have run no... Read More
Credit card fraud is a growing problem for online businesses... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
When it comes to a secure website and passwords it... Read More
Some months ago, before there was much publicity regarding phishing... Read More
During the release of a new software product specialized to... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
To blog or not to blog? Well, why not? Lots... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
There are ways to insure security though. You can get... Read More
This is the second in a series of articles highlighting... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
It has been said that with the wealth of information,... Read More
Well, this is an article I never thought I would... Read More
A week or so ago, I received an inquiry from... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
You can detect spyware online using free spyware cleaners and... Read More
Well, if that would have been said to me by... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Phishing is the act of some individual sending an email... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
In 1997, I decided after 15 years as a practicing... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Long gone are the days that we could feel secure... Read More
When the Internet first came about, it was realized it... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Business on the internet is getting down right shameless. This... Read More
|