Internet fraud
{{Short description|Fraud or deception using the Internet}}
Internet fraud is a type of cybercrime fraud or deception which makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance. Internet fraud is not considered a single, distinctive crime but covers a range of illegal and illicit actions that are committed in cyberspace.{{Cite book|url=https://books.google.com/books?id=ED9XDwAAQBAJ&q=internet+fraud+definition&pg=PT1125|title=The SAGE Encyclopedia of the Internet|last=Warf|first=Barney|date=2018-05-16|publisher=SAGE|isbn=9781526450432|language=en}} It is differentiated from theft since, in this case, the victim voluntarily and knowingly provides the information, money or property to the perpetrator.{{Cite book|url=https://books.google.com/books?id=p31MCAAAQBAJ&q=internet+fraud+different+theft+voluntary&pg=PT33|title=Cyberthreats: The Emerging Fault Lines of the Nation State|last=Brenner|first=Susan W.|date=2009-01-16|publisher= Oxford University Press (OUP) |isbn=9780190452568|language=en}} It is also distinguished by the way it involves temporally and spatially separated offenders.{{Cite book|title=Encyclopedia of Victimology and Crime Prevention|last1=Fisher|first1=Bonnie S.|last2=Lab|first2=Steven|publisher=SAGE Publications|year=2010|isbn=9781412960472|location=Thousand Oaks, CA|pages=493}} The most common cybercrimes involving the internet fraud increasingly entail the social engineering, phishing, cryptocurrency frauds, romance scams including the pig butchering scam, etc
In the FBI's 2017 Internet Crime Report, the Internet Crime Complaint Center (IC3) received about 300,000 complaints. Victims lost over $1.4 billion in online fraud in 2017.{{cite web |title=FBI 2017 Internet Crime Report |url=https://pdf.ic3.gov/2017_IC3Report.pdf |website=FBI.gov |publisher=Federal Bureau of Investigation |access-date=28 August 2018 |date=May 7, 2018}} In a 2018 study by the Center for Strategic and International Studies (CSIS) and McAfee, cybercrime costs the global economy as much as $600 billion, which translates into 0.8% of global GDP.{{Cite web|url=https://www.mcafee.com/enterprise/en-us/assets/executive-summaries/es-economic-impact-cybercrime.pdf|title=The Economic Impact of Cybercrime— No Slowing Down|date=2018|website=McAfee|access-date=October 24, 2018}} Online fraud appears in many forms. It ranges from email spam to online scams. Internet fraud can occur even if partly based on the use of Internet services and is mostly or completely based on the use of the Internet.
Charity fraud
{{main|Charity fraud}}
The scammer poses as a charitable organization soliciting donations to help the victims of a natural disaster, terrorist attack (such as the 9/11 attacks), regional conflict, or epidemic. Hurricane Katrina and the 2004 tsunami were popular targets of scammers perpetrating charity scams; other more timeless scam charities purport to be raising money for cancer, AIDS or Ebola virus research, children's orphanages (the scammer pretends to work for the orphanage or a non-profit associated with it), or impersonates charities such as the Red Cross or United Way. In recent years, there have been cases of scams being done by the people who started the charity.{{Cite journal|last=Goel|first=Rajeev K.|date=2020|title=Uncharitable Acts in Charity: Socioeconomic Drivers of Charity-Related Fraud|journal=Social Science Quarterly|language=en|volume=101|issue=4|pages=1397–1412|doi=10.1111/ssqu.12794|issn=1540-6237|doi-access=free}}
A 2019 example of this was the head of the Long Island Charity, Wafa Abbound. Abbound was found guilty of stealing close to a million dollars. She was charged with bank fraud, money laundering, and embezzling.{{Cite web|last=Burke|first=Cathy|title=L.I. charity chief convicted of embezzling nearly $1 million meant for disabled|url=https://www.nydailynews.com/new-york/ny-long-island-charity-embezzle-scheme-convicted-20190710-bu6y4kvlpzbabgus55aqgbm3j4-story.html|access-date=2021-04-22|website=nydailynews.com|date=9 July 2019 }} There are many methods scammers will use. First, they will ask for donations, often linking to online news articles to strengthen their story of a funds drive. The scammer's victims are charitable people who believe they are helping a worthy cause and expect nothing in return. Once sent, the money is gone and the scammer often disappears, though many attempts to keep the scam going by asking for a series of payments. The victim may sometimes find themselves in legal trouble after deducting their supposed donations from their income taxes. United States tax law states that charitable donations are only deductible if made to a qualified non-profit organization.{{cite web| title=Charitable Contributions: For use in preparing 2022 Returns| url=https://www.irs.gov/pub/irs-pdf/p526.pdf| publisher=Department of the Treasury| date=13 February 2024| access-date=19 January 2024}}
The scammer may tell the victim their donation is deductible and provide all necessary proof of donation, but the information provided by the scammer is fictional, and if audited, the victim faces stiff penalties as a result of the fraud. Though these scams have some of the highest success rates especially following a major disaster and are employed by scammers all over the world, the average loss per victim is less than other fraud schemes. This is because, unlike scams involving a largely expected payoff, the victim is far less likely to borrow money to donate or donate more than they can spare.{{Cite web|url=https://www.scamwatch.gov.au/types-of-scams/unexpected-money/nigerian-scams|title=Scam Watch - Nigerian Scams|publisher=Scam Watch - Australian Government|date=12 May 2016}}
Internet ticket fraud
A variation of Internet marketing fraud offers tickets to sought-after events such as concerts, shows, and sports events. The tickets are fake or are never delivered. The proliferation of online ticket agencies and the existence of experienced and dishonest ticket resellers has fueled this kind of fraud. Many such scams are run by British ticket touts, though they may base their operations in other countries.{{cite news|url=https://www.theguardian.com/world/2008/mar/09/olympicgames2008.internet|author=Jamie Doward|title=How boom in rogue ticket websites fleeces Britons|work=The Observer|access-date=9 March 2008 | location=London | date=2008-03-09}}
A prime example was the global 2008 Beijing Olympic Games ticket fraud run by US-registered "Xclusive Leisure and Hospitality", sold through a professionally designed website with the name "Beijing 2008 Ticketing".{{cite web|url=http://www.sports-city.org/news_details.php?news_id=5066&idCategory=1|title=USOC and IOC file lawsuit against fraudulent ticket seller|work=Sports City|access-date=1 August 2008|archive-date=4 February 2014|archive-url=https://web.archive.org/web/20140204090216/http://www.sports-city.org/news_details.php/?news_id=5066&idCategory=1|url-status=dead}} On 4 August it was reported that more than A$50 million worth of fake tickets had been sold through the website.{{cite news|url=https://www.smh.com.au/news/latest-news/ticket-swindle-leaves-trail-of-losers/2008/08/03/1217701854125.html|title=Ticket swindle leaves trail of losers|author=Jacquelin Magnay|work=The Sydney Morning Herald|date=4 August 2008}} On 6 August it was reported that the person behind the scam, which was wholly based outside China, was a British ticket tout, Terance Shepherd.{{cite news|url=https://www.smh.com.au/news/off-the-field/olympic-ticket-scammer-unmasked/2008/08/05/1217702042881.html|author=Kelly Burke|title=British fraud ran Beijing ticket scam|work=The Sydney Morning Herald|date=6 August 2008}}
Online gift card fraud
{{Further|Gift card#Use in fraud}}
As retailers and other businesses have growing concerns about what they can do about preventing the use of gift cards purchased with stolen credit card numbers, cybercriminals have more recently been focusing on taking advantage of fraudulent gift cards.{{Cite web|url=http://www.csoonline.com/article/3196035/fraud/what-not-to-get-mom-for-mother-s-day.html|title=What not to get Mom for Mother's Day|last=Francis|first=Ryan|date=2017-05-11|website=CSO from IDG|access-date=2017-11-28|archive-date=2017-12-01|archive-url=https://web.archive.org/web/20171201082210/https://www.csoonline.com/article/3196035/fraud/what-not-to-get-mom-for-mother-s-day.html|url-status=dead}} More specifically, malicious hackers have been trying to get their hands on information pertinent to gift cards that have been issued but not spent. Some of the methods for stealing gift card data include automated bots that launch brute force attacks on retailer systems which store them.
First, hackers will steal gift card data, check the existing balance through a retailer's online service, and then attempt to use those funds to purchase goods or to resell on a third party website. In cases where gift cards are resold, the attackers will take the remaining balance in cash, which can also be used as a method of money laundering. This harms the customer gift card experience, the retailer's brand perception, and can cost the retailer thousands in revenue. Another way gift card fraud is committed is by stealing a person's credit card information to purchase brand new gift cards.
Social media and fraud
People tend to disclose more personal information about themselves (e.g. birthday, e-mail, address, hometown and relationship status) in their social networking profiles.{{cite journal |last1=Hew |first1=Khe Foon |title=Students' and teachers' use of Facebook |journal=Computers in Human Behavior |date=March 2011 |volume=27 |issue=2 |pages=662–676 |doi=10.1016/j.chb.2010.11.020 }} This personally identifiable information could be used by fraudsters to steal users' identities, and posting this information on social media makes it a lot easier for fraudsters to take control of it.
The problem of authenticity in online reviews is a long-standing and stubborn one. In one famous incident back in 2004, Amazon's Canadian site accidentally revealed the true identities of thousands of its previously anonymous U.S. book reviewers. One insight the mistake revealed was that many authors were using fake names in order to give their own books favorable reviews.{{cite journal |last1=Kugler |first1=Logan |title=Keeping online reviews honest |journal=Communications of the ACM |date=27 October 2014 |volume=57 |issue=11 |pages=20–23 |doi=10.1145/2667111 |s2cid=11898299 }} Also, 72% say positive reviews lead them to trust a business more, while 88% say that in "the right circumstances", they trust online reviews as much as personal recommendations.
While scammers are increasingly taking advantage of the power of social media to conduct criminal activity, astute risk managers and their insurance companies are also finding ways to leverage social media information as a tool to combat insurance fraud.{{cite journal |id={{ProQuest|1881388527}} |last1=Wilson |first1=Brian |title=Using Social Media to Fight Fraud |journal=Risk Management |location=New York |volume=64 |issue=2 |date=Mar 2017 |pages=10–11 }} For example, an injured worker was out of work on a worker's compensation claim but could not resist playing a contact sport on a local semi-professional sports team. Through social media and internet searches, investigators discovered that the worker was listed on the team roster and was playing very well.
A UK woman was scammed in a "romance fraud" online as per the local police. The woman in her 50s reportedly lost her inheritance worth £320,000 taken over from her parents who later disowned her following the loss. The perpetrator who impersonated as Tim, met the victim on a dating website in 2019 after she lost her husband. He first took £68,000 in the name of customs fees and then asked her to directly pay £200,000 to his translator to secure his contractors and store his equipment, totalling the money lost to £320,000.{{cite news|url=https://www.bbc.com/news/uk-england-somerset-54613937|title=Woman loses £320,000 in 'romance fraud' scam|work=BBC News |date=20 October 2020 |access-date=20 October 2020}}
Counterfeit postal money orders
According to the FBI, on April 26, 2005 Tom Zeller Jr. wrote an article in The New York Times{{cite news|url=https://query.nytimes.com/gst/fullpage.html?res=9907EED81231F935A15757C0A9639C8B63&n=...&smid=pl-share|title=A Common Currency for Online Fraud: Forgers of U.S. Postal Money Orders Grow|author=Tom Zeller Jr|work=New York Times|date=April 26, 2005}} regarding a surge in the quantity and quality of the forging of U.S. postal money orders, and its use to commit online fraud. Counterfeiters will conduct these scams through emails or chat rooms. If a person is trying to sell or give away an item of theirs, counterfeiters will make them believe that they are related to auction sites such as eBay. As of right now, there is no way to figure out how much money is being taken through these fake orders, the United States Postal Service believes that it is in the millions. The people who are targeted the most are those who are smaller retailers who operate through the internet or everyday people who sell or pay for items on the web. Owing to the lack of rules or warning signs about counterfeiters, more and more people will be affected.
Many companies like UPS and Federal Express have started to collaborate with the United States Postal Service to begin surveilling money postal orders. This way they can spot the real from the fake, however this is easier said then done, so they advocate users to be cautious when making a money postal orders. Arrests have taken place, between 2004 and 2005, 160 counterfeiters were arrested. Many of these arrested were caught in the process of cashing in the money they have stolen.{{Cite web|date=2017-09-07|title=Counterfeit Money Orders: The Ultimate Guide|url=https://www.fraudguides.com/internet/counterfeit-money-orders/|access-date=2021-04-22|website=Fraud Guides|language=en-US}} In the United States of America, the penalty for making or using counterfeit postal money orders is up to ten years in jail and/or a $25,000 fine.{{cite web|url=http://www.cybercops.com/counterfeit_postal_money_orders.php|title=CyberCops.com - Counterfeit Postal Money Orders|website=www.cybercops.com|access-date=23 May 2017|archive-date=9 August 2020|archive-url=https://web.archive.org/web/20200809173217/https://cybercops.com/counterfeit_postal_money_orders.php|url-status=dead}}
Call Forwarding Fraud
Call Forwarding Scam involves a fraudster tricking the victim into dialing a specific phone number, which then reroutes all incoming calls and text messages the victim receives to the scammer's device.{{Cite web |date=2024-01-11 |title=Malicious calls: Govt warns users against dialling ‘*401#’ followed by unknown mobile number |url=https://indianexpress.com/article/india/malicious-calls-govt-warns-users-against-dialling-401-9105777/ |access-date=2024-09-21 |website=The Indian Express |language=en}} Scammers in-turn intercept bank messages and OTPs, while the victim remains unaware.
To combat such fraud, websites like [https://scambait.com Scambait.com] are using AI-powered bots to engage with scammers. These bots occupy scammers’ phone lines, keeping them tied up and preventing them from contacting potential victims, reducing the overall impact of the scam.{{Cite web |date=2024-04-18 |title=What is Scambaiting? |url=https://scambait.com/what-is-scambaiting |access-date=2024-04-18 |website=Scambait.com |language=en}}
Purchase fraud
File:Nina Kollars - Confessions of an Nespresso Money Mule - DEF CON 27 Conference.webm explains an Internet fraud scheme that she stumbled upon while shopping on eBay.]]
A fraudster uses the internet to advertise non-existent goods or services. Payment is sent remotely but the goods or services never arrive. The methods these scammers use are they will give these fake products very low prices, they will want to make payments through electronic funds transfers, and they will want to do it right away. Payments will not be conducted through PayPal or credit cards. These services are too secure and will cause issues for the scammers. All of these methods are also ways to figure out on whether or not these are actually scams. Another way to spot the scam is privacy and contact details, information about delivery, terms and conditions, etc, will not be presented.{{Cite web|title=Online Shopping Scams / Scams and Fraud / Consumer Resources / Home - Florida Department of Agriculture & Consumer Services|url=https://www.fdacs.gov/Consumer-Resources/Scams-and-Fraud/Online-Shopping-Scams|access-date=2021-04-22|website=www.fdacs.gov}}
Scammers will operate from fake stores. They will broadcast the presence of these fake stores through social media. This is done primarily because there are a lot of people who use social media and the number keeps growing every day. These stores will not be up for a long period. The will only stay up for a couple of sales, then they will move on and close the site. Usually, a way to spot these fake stores is to look for online reviews, if they do not have any reviews, they are fake.
= Subscription traps =
A form of internet fraud in which users, while providing personal and payment details to access a service (such as credit matching), are unknowingly enrolled into a recurring paid subscription.
In Kazakhstan, this model has been used by a number of online platforms presenting themselves as credit brokers. After a bank card is linked, regular charges are made for "informational services," although no actual financial assistance is provided.
According to data from [https://zanimaem.kz/business-type/brokery/ zanimaem.kz], as of 2025, at least 28 websites operated under this model. These practices have led to widespread consumer complaints and criticism from financial experts.
See also
References
{{Reflist|30em}}
Sources
- {{cite journal |id={{Gale|A524380313}} |last1=Legend |first1=Therza |title=CYBER FRAUD: How to be aware, to protect yourself and your business |journal=Podiatry Review |date=1 January 2018 |volume=75 |issue=1 |pages=32–34 }}
- {{cite journal |last1=Lin |first1=Kan-Min |title=Understanding undergraduates' problems from determinants of Facebook continuance intention |journal=Behaviour & Information Technology |date=September 2016 |volume=35 |issue=9 |pages=693–705 |doi=10.1080/0144929X.2016.1177114 |s2cid=5975706 }}
External links
{{Fraud}}
{{spamming}}
{{Scams and confidence tricks}}
{{Authority control}}
{{DEFAULTSORT:Internet Fraud}}