FTC: ID theft again tops consumer concerns
- 29 February, 2012 06:37
Identity theft was the top complaint filed by U.S. residents to the Federal Trade Commission in 2011, with Internet-related fraud also a top concern, the agency said Tuesday.
Fifteen percent of the 1.8 million complaints the FTC received through its online Consumer Sentinel Network involved ID theft, the agency said.
Fifty-five percent of the complaints involved some type of other fraud, and of the people who reported where that fraud originated, 43 percent said email and 13 percent said a website. Twenty-nine percent of the fraud complaints started with a phone call, the FTC said.
Under identity theft, government benefits or documents fraud made up 27 percent of the complaints, credit card fraud made up 14 percent and telephone or utilities fraud made up 13 percent, the FTC said.
Identity theft made up 17 percent of the complaints to the FTC in 2010 and 20 percent of the complaints in 2009. The FTC received 1.5 million complaints through the online database in 2010, and 1.4 million in 2009. Since 2001, the number of complaints has risen every year except for one.
The online database is an "incredibly powerful tool for law enforcers who are working to protect consumers and go after the bad guys," David Vladeck, director of the FTC's Bureau of Consumer Protection, said in a statement. "It's used by agencies across the country and around the world to enhance their enforcement efforts."
Other federal and state law enforcement agencies contribute complaints to the Consumer Sentinel Network, including the U. S. Postal Inspection Service, the U.S. Department of Justice's Internet Crime Complaint Center and the offices of eight state attorneys general. Other organizations that contribute complaints include all U.S. and Canadian members of the Better Business Bureau, Western Union and Moneygram.
Debt collection complaints were 10 percent of the total complaints in 2011, the agency said. Prizes, sweepstakes and lottery complaints made up 6 percent. Complaints about Internet services were the sixth largest category, at about 5 percent, and complaints about telephone and mobile services ranked ninth, with 4 percent.
The median loss for all the fraud complaints -- not including ID theft -- was US$537, the FTC said.
Florida was the state with the highest per capita rate of reported ID theft complaints, followed by Georgia and California. Colorado was the state with the highest per capita rate of reported fraud and other complaints, followed by Delaware and Maryland.
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's e-mail address is firstname.lastname@example.org.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
How the Cloud Changes the Game for Line of Business Managers in Midsize Companies
It can be argued that what distinguishes midsize businesses most from large and small companies is not size, but attitude. While attitude alone cannot mitigate the challenges faced by midsize businesses, technology can help. And no technology offers more promise than the cloud. This paper, explores midsize business challenges from the perspective, not of the IT department, but of the line of business managers they support. Read on.
Real-Time Protection Against Malware Infection
Malware is at such high levels (more than 60 million unique samples per year) that protecting an endpoint with traditional antivirus software, has become futile. More than 100,000 new types of malware are now released every day, and antivirus vendors are racing to add new protection features to try to keep their protection levels up. Read more.
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.