Feeds

US hit for $548m in fraud losses

ID theft tops league

  • alert
  • submit to reddit

HP ProLiant Gen8: Integrated lifecycle automation

Identity theft topped the list of complaints received by the US Federal Trade Commission for the fifth successive year, accounting for 39 per cent of consumer fraud complaints filed with the agency last year. Credit card fraud was the most common form of reported ID theft (28 per cent), followed by phone or utilities fraud (19 per cent), bank fraud (18 per cent), and employment fraud (13 per cent).

Americans reported fraud losses of $548m to the FTC last year. Of these 635,173 complaints, 246,570 concerned ID theft and 388,603 were about other forms of fraud.

Internet-related complaints accounted for 53 per cent of fraud reports (and $265m of reported losses), with problems involving online auctions proving a particular problem. Gripes about net auctions featured in over 102,000 complaints to the FTC last year (16 per cent of total reports). The top 10 of consumer fraud complaints for 2004 also included: catalogue sales - eight per cent of total complaints; internet services and computer complaints - six per cent; foreign money offers - six per cent; prizes/sweepstakes and lotteries - five per cent; advance-fee loans and credit protection - three per cent; business opportunities and work-at-home - two per cent and telephone services - two per cent.

Consumers can file fraud and identity theft complaints on the FTC's website. The agency collates this information with data from other law enforcement and consumer protection agencies to create a comprehensive database. This information helps law enforcers co-ordinate actions, avoid duplication and spot trends in consumer fraud.

Washington DC, Las Vegas and San Jose, California were 'hot spots' for consumer fraud, according to FTC reports. Last Vegas (again); Phoenix, Arizona and San Bernardino, California generated the highest per-capita reports of ID theft. The FTC's report, National and State Trends in Fraud and Identity Theft, can be found here (PDF). ®

Related stories

US jails Brit credit card fraud mastermind for 14 years
Internet fraud is easy, says judge...
'Integrity of eBay markeplace' at risk - sellers' group

The Essential Guide to IT Transformation

More from The Register

next story
Brit celebs' homes VANISH from Google's Street View
Tony Blair's digs now a Tone-y Blur
German government orders local CIA station chief to pack his bags
Sour Krauts arrest second local in domestic spy ring probe
Doctor Who season eight scripts leak online
BBC asks fans to EXTERMINATE copies before they materialise
Snowden leaks latest: NSA, FBI g-men spied on Muslim-American chiefs
US Navy veteran? Lawmaker? Academic? You're all POTENTIAL TERRORISTS
UK's emergency data slurp: IT giants panicked over 'legal uncertainty'
PM says rushed-through DRIP law will 'plug holes' in existing legislation
Russian MP fears US Secret Service cuffed his son for Snowden swap
Seleznev Jnr is 'prolific trafficker in stolen credit card data', it is alleged
Teensy card skimmers found in gullets of ATMs
Hi-tech fraudsters treading more softly, but gas still yielding bang for buck
Adobe Flash: The most INSECURE program on a UK user's PC
XML a weak spot, but nothing's as dire as Adobe player
Weaponised Flash flaw can pinch just about anything from anywhere
This is a 'patch now or regret it sooner-rather-than-later' mess for you and webmasters
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
The Power of One Brief: Top reasons to choose HP BladeSystem
Download this brochure to find five ways HP BladeSystem can optimize your business with the power of one.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.