March 27, 2018 By Shane Schick 2 min read

Law enforcement recently conducted the largest ever coordinated sweep of identity fraud cases targeting the elderly. According to the U.S. Department of Justice, more than 250 defendants have been charged in the sweep, 200 of whom have been charged criminally.

Elders Fall Victim to Social Engineering Schemes

Some of these identity fraud campaigns included grandparent scams in which seniors were contacted and told that their grandchildren had been arrested and needed bail money. Other scams suggested that seniors had won the lottery but needed to pay a large fee to get the winnings, or that they owed back taxes to the Internal Revenue Service (IRS).

In total, the Justice Department reported that more than 1 million people collectively lost “hundreds of millions of dollars” through these scams.

While some identity fraud is conducted through traditional technologies such as the telephone, there are other methods. For example, romance scams involve an attacker befriending a senior online and then asking for money to visit the U.S., among other pretenses.

An expert from the American Association of Retired Persons (AARP) Foundation noted that technology makes life much easier for scammers, as reported by USA Today. While phone-based scams might ensnare one senior at a time, email and other online channels allow fraudsters to reach millions of potential victims at once.

Identity Fraud by the Numbers

According to the Federal Trade Commission (FTC)’s “Consumer Sentinel Network Data Book 2017,” identity fraud made up 14 percent of consumer complaints last year, second only to debt collection.

The FTC also showed that, while scams against the elderly are a concern, younger citizens are equally at risk: 40 percent of millennials in their 20s said they lost money to fraud, compared to 18 percent of those over 70. However, seniors tended to suffer higher median losses than other age groups, the report found.

Although credit card scams involving new or existing accounts were among the major identity fraud issues highlighted in the FTC’s data, it also referred to other modes of attack such as online shopping and payment account schemes, data theft via email and social media, and more.

More from

How governance, risk and compliance (GRC) addresses growing data liability concerns

4 min read - In an era where businesses increasingly rely on artificial intelligence (AI) and advanced data capabilities, the effectiveness of IT services is more critical than ever. Yet despite the advancements in technology, business leaders are increasingly dissatisfied with their IT departments.According to a study by IBM's Institute for Business Value, confidence in the effectiveness of basic IT services among top executives has significantly declined. While AI promises transformational capabilities, particularly generative artificial intelligence (gen AI), the road to realizing these benefits…

Risk, reward and reality: Has enterprise perception of the public cloud changed?

4 min read - Public clouds now form the bulk of enterprise IT environments. According to 2024 Statista data, 73% of enterprises use a hybrid cloud model, 14% use multiple public clouds and 10% use a single public cloud solution. Multiple and single private clouds make up the remaining 3%.With enterprises historically reticent to adopt public clouds, adoption data seems to indicate a shift in perception. Perhaps enterprise efforts have finally moved away from reducing risk to prioritizing the potential rewards of public cloud…

Cybersecurity Awareness Month: Horror stories

4 min read - When it comes to cybersecurity, the question is when, not if, an organization will suffer a cyber incident. Even the most sophisticated security tools can’t withstand the biggest threat: human behavior.October is Cybersecurity Awareness Month, the time of year when we celebrate all things scary. So it seemed appropriate to ask cybersecurity professionals to share some of their most memorable and haunting cyber incidents. (Names and companies are anonymous to avoid any negative impact. Suffering a cyber incident is bad…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today