Trade commission runs Web dragnet

 

Connecting state and local government leaders

'Surf's up' is not a phrase most people would associate with scam investigators at the Federal Trade Commission. But surfing is one of the chief pastimes at the FTC Internet Laboratory'surfing the Web, that is. Commission attorneys and investigators use the lab to track down online-savvy violators of the 87-year-old Federal Trade Commission Act and related laws.

'Surf's up' is not a phrase most people would associate with scam investigators at the Federal Trade Commission.But surfing is one of the chief pastimes at the FTC Internet Laboratory'surfing the Web, that is.Commission attorneys and investigators use the lab to track down online-savvy violators of the 87-year-old Federal Trade Commission Act and related laws.'FTC has a very broad mandate,' lab coordinator Don M. Blumenthal said. 'Section 5 of the FTC Act lets us look at any unfair act or practice affecting commerce.'One of the techniques that FTC investigative teams use to ferret out cyberscammers is what they call a surf. During a surf, several investigators choose a topic and roam the Web looking for related online scams.For example, in November, a surfing team announced the results of a review of 110 Internet retailers' sites. The commission's goal was to bolster consumer confidence during the holiday season.The surf, among other things, checked to see that vendors were abiding by rules on the use of shipping and warranty claims. As a result of the surf, FTC sent warning letters to 72 retailers. To conduct surfs, commission teams use conventional browsers such as Netscape Navigator and Microsoft Internet Explorer and search engines such as google.com, altavista.com and hotbot.lycos.com.It's Blumenthal's job to provide the technical tools to gather evidence.'I came down from the central IT department in April of 1999 to set [the lab] up,' he said. 'At that time, it used a 1.5-Mbps digital subscriber line' and a few older desktop systems.Today, the lab has a T1 line and nine Dell Computer Corp. Pentium 4 PCs with 512M of RAM and 20G hard drives at headquarters and an additional pair in other commission offices.'All these systems are on a network completely apart from the FTC's main systems,' Blumenthal said. The lab PCs run off a Compaq ProLiant ML570 server under Microsoft Windows 2000. To stow its 1T of records, the lab has a Netfiler 820 RAID 4 device from Network Appliance Inc. of Sunnyvale, Calif.The lab supports investigations into three main types of Internet abuse, including old scams carried out in new ways, such as bogus business opportunities and exaggerated advertising claims.'We also look at cases that are new because of our authority under the Children's Online Privacy Protection Act, that sets out guidelines for vendors' ability to gather information from children,' Blumenthal said.The third type of case is classified as technical, and Blumenthal gave two examples.The first is a dial-up violation. In such a case, a scam artist disconnects a user's computer and dials a 900 number in a distant country for an expensive call while the user is attempting to download software. Victims of this type of scam 'get a very ugly surprise with their phone bill,' Blumenthal said.In one such case, the commission in August reached a $10,000 settlement agreement with Hillary Sheinkin after filing suit in the U.S. District Court in South Carolina.Sheinkin operated sites that advertised themselves as free. But the sites disconnected consumers from their Internet service providers and reconnected them via long-distance links to Madagascar.In these cases, consumers 'have to battle with the phone company,' Blumenthal said.To investigate the Madagascar scam, FTC investigators used CleanSweep software from Symantec Corp. of Cupertino, Calif. 'The system logs installations of software on PCs'we could document what was happening and what files were being installed,' he said.FTC investigators also use modem logs in the lab to track the phone traffic. They use Camtasia from TechSmith Corp. of East Lansing, Mich., to capture screen recordings and Visual Trace from McAfee.com Corp. of Sunnyvale, Calif., to trace traffic and figure out the owners of Web sites.Another type of technical case is mousetrapping: A computer user is diverted from an intended destination and pelted with a barrage of advertisements.One of FTC's more renowned mousetrap investigations is known as the Cupcake Case. The commission filed suit against John Zuccarini and more than 20 of his companies'many of which had the word 'cupcake' in their names'for using mousetraps to illegally earn between $800,000 and $1 million annually from advertisers on his sites.In its complaint, FTC said Zuccarini used more than 5,500 misspelled versions of legitimate addresses to lure visitors to his mousetrap sites, which featured ads for Internet gambling and pornography. The U.S. District Court for the Eastern District of Pennsylvania has issued an injunction against Zuccarini, pending resolution of the case.In the Cupcake Case, FTC investigators used Camtasia and Internet Explorer to track and capture HTML code from the Zuccarini sites.After a lab team finds something questionable, the focus becomes capturing and preserving data for potential use as evidence, Blumenthal said.FTC investigators use Teleport Pro from Tennyson Maxwell Information Systems Inc. of New York. The offline browser and Web spider lets the lab download and document files from sites and analyze them.'It also brings down raw pages,' Blumenthal said, including tags in which misleading advertising can be embedded.For example, a metatag that used the phrase 'cancer cure' on a Web site that advertised shark cartilage was a subtle way for the site to make a claim that the substance was a cancer cure even though the visible portion of the site didn't mention cancer. 'We prosecuted that one successfully,' Blumenthal said.But one chief effort of the commission is curtailing spam. The lab obtains much of its abusive spam from Joe Citizen. It encourages the general public to submit examples by sending them to .The team also uses SamSpade.org, which is a set of network diagnostic and spam-tracking tools from Word to the Wise LLC of San Carlos, Calif.Amber Ramege, a legal assistant in the Consumer Protection Bureau, used the lab for spam research during the Eileen Harrington Case.'A lot of people send suspicious spam. In that case, it was a progressive chain letter that we were able to document and went after in court,' Ramege said.The Harrington case gained its sobriquet because the fraudsters claimed in their letters that Harrington, FTC's associate director of marketing practices, had approved the scheme.'We used IP addresses to trace the sources of the spam,' Ramege said. 'We can go into a site and prove we were using it.'To unravel the Harrington case, investigators used RetrievalWare, a full-text index application from Convera Corp. of Vienna, Va., that scans files looking for terms or phrases.'We have all of the spam in a full-text database, and we were able to search it for specific terms such as 'associate director for marketing practices,' ' Blumenthal said. Ultimately, the perpetrators of the Harrington letters settled with FTC, which obtained permanent injunctions against them.Ramege said the beauty of the lab is that its work is surreptitious and suspects rarely are tipped to who is traipsing around their sites. 'This is an undercover lab, but they can't tell that it's a government lab,' she says.

GCN photos by Henrik G. DeGyor

Commission investigators have broad authority to review business' practices'even online, FTC's Don M. Blumenthal says.

Blumenthal, the lab's coordinator, says software tools let FTC investigators zoom in on unethical online practices.

Using stealth IT, FTC investigators snare cybervillains

























Shell games



































uce@ftc.gov

A beautiful friendship



















NEXT STORY: OMB advocates J2EE, .Net for e-gov

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.