Feeds

Man charged over click fraud scheme

Robot program takes FreeRide for a ride

3 Big data security analytics techniques

A US man has been charged with conspiracy, mail fraud and wire fraud over a 'click fraud' scheme allegedly carried out against an internet firm that rewards subscribers who complete online surveys and view banner ads.

US Attorney Kevin Ryan said Allen Tam, of Daly City, California, was indicted on Tuesday, after an investigation by the Federal Bureau of Investigation.

Click fraud is a general term that describes the practice of skewing pay-per-click data by generating illegitimate 'clicks' or 'hits' on internet ads. It is more often discussed in connection with search engine ad schemes, such as Google's AdSense Service, where unscrupulous website owners sometimes try to increase the fees paid to them by Google by ensuring that third party adverts displayed on their site are clicked as often as possible.

This case, however, concerns internet firm FreeRide, which at the time of the alleged scam offered a rewards program to internet users based on various online activities that subscribers engaged in on the firm's website. These activities included viewing internet advertisements (or banner ads), completing consumer surveys, and purchasing products online.

According to the indictment, Mr Tam, 32, is alleged to have obtained computer source code from his employer and to have used that source code to develop a robot program which could then be used on FreeRide's website.

The indictment alleges that between 2000 and 2002 Tam used the robot program to fraudulently generate and accumulate FreeRide points by emulating activities on FreeRide's website. The indictment alleges that Tam then redeemed those FreeRide points for products offered for sale by other internet retailers, including Amazon.com.

If found guilty, Tam faces a maximum of five years in prison and a fine of $250,000 in respect of the conspiracy charges and all but one of the mail fraud and wire fraud charges. However, because one alleged mail fraud violation and one alleged wire fraud violation occurred after the passage of the Sarbanes-Oxley Act, he faces a maximum of 20 years in prison and a fine of $250,000 in respect of those charges.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

High performance access to file storage

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.