Visitors Now: | |
Total Visits: | |
Total Stories: |
Story Views | |
Now: | |
Last Hour: | |
Last 24 Hours: | |
Total: |
On 04/15/2013, two explosions occurred near the finish line of the Boston Marathon causing death and injury to spectators, as well as participants of the marathon. While Americans feel the need to assist or contribute to those affected by this tragedy; criminals see it as way to exploit contributor’s kindness. History has shown criminals utilize disasters to take advantage of those wanting to assist.
Individuals need to be aware of emerging fraud online associated with the explosions and how to take necessary precautions when using e-mail and social networking Web sites. As of 17 April 2013, the FBI has received indications that individuals may be using social media and e-mail to facilitate fraudulent activities online.
Social Media is another avenue criminals use to solicit donations. According to various reports, a Twitter account was created soon after the explosions that resembled a legitimate Boston Marathon account. Allegedly, for every tweet received to the account a dollar would be donated to the Boston Marathon victims. Though the account was suspended by Twitter, it is likely others may use this same method to commit fraud. The FBI was made aware of at least 125 questionable domains registered within hours of the Boston Marathon Explosions. Though the intentions of the registrants are unknown, domains have emerged following other disasters for fraudulent purposes.
Individuals should be vigilant when using email and social networking Web sites following the Boston Marathon explosions. Based on previous disasters, cyber criminals may use this event as a means to further illegal activity to gain personally identifiable information (PII).
Individuals can limit exposure to cyber criminals by taking the following preventative actions when using email and social networking Web sites.
Individuals can also limit exposure to cyber criminals by taking the following preventative actions when receiving solicitations from, or donating to, charitable organizations online.
Verify the existence and legitimacy of organizations by conducting research and visiting official Web sites. Be skeptical of charity names similar to but not exactly the same as reputable charities.
Do not allow others to make the donation on your behalf. Donation-themed messages may also contain links to Web sites designed to solicit personal information, which is routed to a cyber criminal.