What We Do For Our Clients

eFraud Reporting Center:

    We receive real-time electronic reports from clients, the general public and third-party private sources regarding fraudulent websites. Our reporting sources include ISPs and ESPs, honey pot and honey net email, as well as public and private reporting systems.

Automated eFraud Investigator:

    Our eFraud Reporting Center deploys automated "investigators" in real-time to collect critical, short-lived information regarding fraudulent websites reported to the Center. These systems capture the vital evidence we need to identify the fraudster and those providing enabling services to the fraudster. This data capture is the first wave in our broad offensive against fraudsters.

eFraud Analysis & Cluster Reporting:

    Using the evidence collected by our eFraud Investigators, we analyze fraudulent websites and those enabling them and periodically report to our clients on patterns and trends. We also identify hot spot clusters that are enabling more than their fair share of fraud. These hot spot clusters are often compromised networks or negligent providers who are being abused by their failure or inability to adopt best practices. Increasingly, however, the clusters represent co-conspirators who provide "cover" to fraudsters in exchange for a portion of the illicit gains. We can also make available to our clients and their anti-fraud teams the information we acquire through our Reporting Center and eFraud Investigators.

"PIER" Legal Notices:

    Based on our trend analysis, our law firm issues formal legal notices to hot spot cluster owners and others enabling the fraud. These legal notices serve two key purposes. First, they leverage our clients' own anti-fraud resources by putting white hat enablers on notice of their role in the fraud, and providing them with concrete information and advice on how to take action to correct their problem and share information with us about the fraudster, through Preservation of information, Investigation, Enforcement of their own policies, and Reporting to us on the result of their own investigation and the identity of the fraudster. Second, PIER Legal Notices identify and ultimately black hat enablers who fail to respond appropriately to our legal notices.

Formal Information Collection:

    Hot spot clusters that fail to respond to our legal notices are targeted for increasingly substantial and sophisticated means of collecting information. For example, we file "John Doe" civil lawsuits against unidentified, but real, fraudsters to obtain subpoena power over enablers who are unable or unwilling to cooperate informally. We also deploy private investigators throughout the world to collect critical information that may not be subject to subpoena.

Enforcement Actions:

    Armed with all that we can know about a fraudster, we strategize with our clients to develop an enforcement action plan. The options extend far beyond simply filing a civil complaint against the fraudster. For example, a fraudsterís assets can sometimes be frozen under trademark law. Alternatively, enablers can be subject to civil liability for conspiring with fraudsters. We also work closely with private sector Internet security firms and domestic and international criminal law enforcement and other government agencies to formulate solutions to acts of Internet fraud, including those that threaten national security and critical infrastructure.

© Copyright Internet Law Group.  All Rights Reserved.
Terms of Use