2016 Internet Crime Report - Internet Crime Complaint Center

as Business Email Compromise (BEC), ransomware, tech support fraud, and ... The IC3 staff analyzes the data, striving to identify trends relating to Internet-.
2MB Sizes 0 Downloads 46 Views
Internet Crime Complaint Center

2016 Internet Crime Report

CONTENTS

2016 Internet Crime Report

2016 INTERNET CRIME REPORT Table of Contents Introduction................................................................................................................................ 3

About the Internet Crime Complaint Center ............................................................................. 2

IC3 History............................................................................................................................... 2

The IC3 Role in Combating Cyber Crime................................................................................. 3

Collection ................................................................................................................................ 3

Analysis ................................................................................................................................... 4

Public Awareness.................................................................................................................... 4

Referrals.................................................................................................................................. 4

Supporting Law Enforcement..................................................................................................... 5

IC3 Database Remote Access.................................................................................................. 5

Testimonials from Law Enforcement Database Users ........................................................ 5

Successes ................................................................................................................................ 7

Prosecutions........................................................................................................................ 7

Operation Wellspring (OWS) Initiative ............................................................................... 8

Hot Topics for 2016 .................................................................................................................... 9

Business Email Compromise (BEC) ......................................................................................... 9

Ransomware ......................................................................................................................... 10

Tech Support Fraud .............................................................................................................. 11

Extortion ............................................................................................................................... 13

2016 Overall Statistics .............................................................................................................. 14

2016 Victims by Age Group ...................................................................................................... 14

Top 20 Foreign Countries by Victim ......................................................................................... 15

Top 10 States by Number of Reported Victims ....................................................................... 16

Top 10 States by Reported Victim Loss ................................................................................... 16

2016 Crime Types ..................................................................................................................... 17

2016 Overall State Statistics..................................................................................................... 19

Appendix A: Crime Type Definitions......................................................................................... 23