Auction Fraud Detection Using SVM-Based Supervised Learning

Total Page:16

File Type:pdf, Size:1020Kb

Auction Fraud Detection Using SVM-Based Supervised Learning AUCTION SHILL DETECTION FRAMEWORK BASED ON SVM A Thesis Submitted to the Faculty of Graduate Studies and Research In Partial Fulfillment of the Requirements For the Degree of Master of Science in Computer Science University of Regina By Swati Ganguly Regina, Saskatchewan December, 2016 Copyright 2016: Swati Ganguly UNIVERSITY OF REGINA FACULTY OF GRADUATE STUDIES AND RESEARCH SUPERVISORY AND EXAMINING COMMITTEE Swati Ganguly, candidate for the degree of Master of Science in Computer Science, has presented a thesis titled, Auction Shill Detection Framework Based on SWM, in an oral examination held on December 9, 2016. The following committee members have found the thesis acceptable in form and content, and that the candidate demonstrated satisfactory knowledge of the subject material. External Examiner: Dr. Eman Almehdawe, Faculty of Business Administration Supervisor: Dr. Samira Sadaoui, Department of Computer Science Committee Member: Dr. Malek Mouhoub, Department of Computer Science Committee Member: Dr. Lisa Fan, Department of Computer Science Chair of Defense: Dr. Yang Zhao, Department of Mathematcis and Statistics ABSTRACT Online auctioning has attracted serious in-auction fraud, such as shill bidding, given the huge amount of money involved and the anonymity of users. Due to the fact that shill bidding is difficult to detect as well as to prove, very few researchers have been successful in designing online shill detection systems that can be adopted by auction sites. We introduce an efficient SVM-based two-phased In-Auction Fraud Detection (IAFD) model. This supervised model is first trained offline for identifying ‘Normal’ and ‘Suspicious’ bidders. For this process, we identify a collection of the most relevant fraud classification features rather than uncertain or general features, like feedback ratings. The model then can be launched online at the end of the bidding period and before the auction is finalized to detect suspicious bidders and redirect for further investigation. This will be beneficial for other legitimate bidders who otherwise might be victimized if an infected auction is finalized and payment done. We propose a robust process to build the optimal IAFD model, which comprises of data cleaning, scaling, clustering, labeling and sampling, as well as learning via SVM. Since labelled auction data are lacking and unavailable, we apply hierarchical clustering and our own labelling technique to generate a high-quality training dataset. We utilize a hybrid method of over-sampling and under- sampling which proved to be more effective in solving the issue of highly imbalanced fraud datasets. Numerous pre-processing and classification experiments are carried out using different functions in Weka toolkit, firstly to verify their applicability with respect to the training dataset and secondly to determine how these functions are impacting the i model performance. Once the final model is built incorporating the relevant functions, this model is tested with commercial auction data from eBay to detect shill bidders. The classification results exhibit excellent performance in terms of detection and false alarm rates. Also when compared to other SVM-based fraud detection systems, our model outperforms the outcomes of those systems. ii ACKNOWLEDGEMENT I take this opportunity to express my heartfelt gratitude towards my supervisor Dr. Samira Sadaoui for giving me a chance to work as a research assistant under her guidance and complete my thesis successfully. Her profound knowledge and careful supervision have acted as invaluable support factors in motivating me to pursue the best during the two years journey of my graduation. I thank her for the generous financial support which helped me in achieving my goals. I deeply appreciate all the academic support I received from the Faculty of Graduate Sciences and Research and Department of Computer Science. I would like to specially thank Dr. Malek Mouhoub, Dr. Yiyu Yao and Dr. Lisa Fan for teaching me some interesting and relevant courses which helped me in developing a strong hold in the topics of Data Mining, Machine Learning and Artificial Intelligence. I would like to express my deepest regards for all the valuable remarks I received from my fellow graduate students and friends to enhance my knowledge. It’s natural to have supportive parents but it’s a blessing to have an equally supportive husband. I thank Homarghya Homroy for being the most caring and motivating husband. Above all, who I am today is solely because of the constant support and sacrifices made by my parents and my elder brother. I owe all my success and achievements to them and thank God to bestow me with such a loving family. iii TABLE OF CONTENTS ABSTRACT .................................................................................................................. i ACKNOWLEDGEMENT .......................................................................................... iii TABLE OF CONTENTS ............................................................................................ iv LIST OF TABLES ...................................................................................................... vi LIST OF FIGURES .................................................................................................. viii Introduction ................................................................................................................. 1 1.1 Problem Statement and Motivation ................................................................ 1 1.2 Research Contribution ................................................................................... 4 1.3 Thesis Organization ....................................................................................... 5 Overview of Auction Fraud ......................................................................................... 7 2.1 Types of Auction Fraud ................................................................................. 9 2.2 In-Auction Fraud: Shill Bidding .................................................................. 11 2.3 Conclusion .................................................................................................. 13 Review of SVM Methodology .................................................................................... 14 3.1 Foundations of SVM ................................................................................... 14 3.2 Benefits of SVM ......................................................................................... 26 3.3 Performance Evaluation Metrics for Classification ...................................... 28 3.4 Conclusion .................................................................................................. 31 Related Works ........................................................................................................... 32 4.1 Machine Learning for Auction Fraud Detection ........................................... 33 4.2 SVM in Fraud Detection Area ..................................................................... 36 4.3 SVM and Imbalanced Data .......................................................................... 40 4.4 Conclusion .................................................................................................. 41 Overview of In-Auction Fraud Detection Model ...................................................... 43 5.1 Phasing of the Model ................................................................................... 43 5.2 SVM and the Model .................................................................................... 46 5.3 An Integrated SVM Tool for IAFD.............................................................. 48 5.4 Conclusion .................................................................................................. 51 Building Training Dataset for IAFD ......................................................................... 52 6.1 Selection of Classification Features ............................................................. 53 iv 6.2 Construction of Training Dataset ................................................................. 59 6.3 Labeling Data through Clustering ................................................................ 62 6.4 Balancing Data through Sampling ............................................................... 64 6.5 Conclusion .................................................................................................. 68 A Robust Classification Process for In-Auction Fraud Detection............................ 69 7.1 Kernel Selection for IAFD Model................................................................ 69 7.2 Cross-validation in IAFD Model ................................................................. 71 7.3 Parameter Tuning in Weka .......................................................................... 73 7.4 Selection of Performance Metrics for IAFD................................................. 75 7.5 Conclusion .................................................................................................. 77 Experiments and Evaluation ..................................................................................... 78 8.1 Commercial Auction Data ........................................................................... 78 8.2 Pre-processing of the Training Data ............................................................. 80 8.3 Data Clustering ..........................................................................................
Recommended publications
  • 1 BIDDER BEWARE TOWARD a FRAUD-FREE MARKETPLACE – BEST PRACTICES for the ONLINE AUCTION INDUSTRY Paula Selis Anita Ramasastry
    BIDDER BEWARE TOWARD A FRAUD-FREE MARKETPLACE – BEST PRACTICES FOR THE ONLINE AUCTION INDUSTRY Paula Selis* Anita Ramasastry** Charles S. Wright*** Abstract: This report presents to businesses, consumers and government officials (including law enforcement) a “menu of options” for combating fraud in the online auction industry. By directly interviewing several major online auction sites and cataloging the features of other sites, the Washington Attorney General’s Office, in conjunction with the Center for Law Commerce and Technology at the University of Washington Law School, has attempted to identify a series of “best practices” in the online auction industry. The results of these interviews as well as findings from investigation of current practices on the Web are presented here. By identifying the most successful, innovative, and feasible practices, this report seeks to maximize the reach of industry solutions and thereby promote industry-wide self-regulation. Standardization is a powerful tool for eradicating fraud across the industry. However, divergent business models and differing consumer needs mean that there is no one size that fits all models. This report presents a pro-active collaboration between enforcement agencies, industry, and academia. It also suggests a menu of best practices from which users might choose to suit their needs, and invites comment, critique and improvement upon those practices. INTRODUCTION Produced by the Washington State Attorney General’s office and the Center for Law Commerce and Technology at the University of Washington Law School, this report surveys the current range of responses to the problem of online auction fraud. This report presents the results of that survey in the form of a menu of options for businesses and consumers.
    [Show full text]
  • New Initiative Seeks to Boost Traffic Safety
    BUSINESS | Page 1 SPORT | Page 1 Jankovic targets top-10 INDEX DOW JONES QE NYMEX QATAR 2-6, 24 COMMENT 22, 23 REGION 7 BUSINESS 1-12 fi nish Barwa Bank posts 2016 20,419.21 10,670.51 52.88 ARAB WORLD 7, 8 CLASSIFIED 8 +149.84 +7.02 -0.98 INTERNATIONAL 9-21 SPORTS 1 – 12 net profi t of QR738.8mn in 2017 +0.74% +0.07% -1.82% Latest Figures published in QATAR since 1978 TUESDAY Vol. XXXVII No. 10364 February 14, 2017 Jumada I 17, 1438 AH GULF TIMES www. gulf-times.com 2 Riyals PM reviews National Action Plan for Autism Expats must In brief carry ID cards ARAB WORLD | Confl ict at all times, Syria peace talks to resume next week: UN Delayed UN-sponsored peace talks aimed at ending Syria’s civil says ministry war will resume on February 23 in Geneva, a few days later HE the Prime Minister and Interior Minister Sheikh Abdullah bin Nasser bin Khalifa al-Thani yesterday chaired a meeting on QNA He referred to article No15 of the than previously planned, the UN the National Action Plan for Autism. The meeting was attended by ministers concerned with the implementation of the plan, Doha Law which states that “in the event envoy’s off ice said yesterday. The members of the Qatar Autism Families Association, and the working group in charge of preparing the plan. The meeting that his (resident) passport, travel announcement came a day after reviewed the draft plan, the proposed governance structure, in addition to the main recommendations related to the objectives document, or residency permit is lost Syria’s opposition announced its of the plan.
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • False Statements and Perjury: an Overview of Federal Criminal Law
    False Statements and Perjury: An Overview of Federal Criminal Law Charles Doyle Senior Specialist in American Public Law May 11, 2018 Congressional Research Service 7-5700 www.crs.gov 98-808 False Statements and Perjury: An Overview of Federal Criminal Law Summary Federal courts, Congress, and federal agencies rely upon truthful information in order to make informed decisions. Federal law therefore proscribes providing the federal courts, Congress, or federal agencies with false information. The prohibition takes four forms: false statements; perjury in judicial proceedings; perjury in other contexts; and subornation of perjury. Section 1001 of Title 18 of the United States Code, the general false statement statute, outlaws material false statements in matters within the jurisdiction of a federal agency or department. It reaches false statements in federal court and grand jury sessions as well as congressional hearings and administrative matters but not the statements of advocates or parties in court proceedings. Under Section 1001, a statement is a crime if it is false, regardless of whether it is made under oath. In contrast, an oath is the hallmark of the three perjury statutes in Title 18. The oldest, Section 1621, condemns presenting material false statements under oath in federal official proceedings. Section 1623 of the same title prohibits presenting material false statements under oath in federal court proceedings, although it lacks some of Section 1621’s traditional procedural features, such as a two-witness requirement. Subornation of perjury, barred in Section 1622, consists of inducing another to commit perjury. All four sections carry a penalty of imprisonment for not more than five years, although Section 1001 is punishable by imprisonment for not more than eight years when the offense involves terrorism or one of the various federal sex offenses.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Business Ethics
    Business Ethics Business ethics is a form of the art of applied ethics that examines ethical rules and principles within a commercial context, the various moral or ethical problems that can arise in a business setting and any special duties or obligations that apply to persons who are engaged in commerce. Business ethics can be both a normative and a descriptive discipline. As a corporate practice and a career specialization, the field is primarily normative. In academia descriptive approaches are also taken. The range and quantity of business ethical issues reflects the degree to which business is perceived to be at odds with non-economic social values. Historically, interest in business ethics accelerated dramatically during the 1980s and 1990s, both within major corporations and within academia. For example, today most major corporate websites lay emphasis on commitment to promoting non-economic social values under a variety of headings (e.g. ethics codes, social responsibility charters). In some cases, corporations have redefined their core values in the light of business ethical considerations (e.g. BP's "beyond petroleum" environmental tilt). Overview of Issues in Business Ethics General Business Ethics © 2014 All Star Training, Inc. Page 1 This part of business ethics overlaps with the philosophy of business, one of the aims of which is to determine the fundamental purposes of a company. If a company's main purpose is to maximize the returns to its shareholders, then it could be seen as unethical for a company to consider the interests and rights of anyone else. Corporate social responsibility or CSR: an umbrella term under which the ethical rights and duties existing between companies and society is debated.
    [Show full text]
  • Behavioral Pattern Detection Using Compact and Fast Methods
    UNIVERSIDADE TÉCNICA DE LISBOA INSTITUTO SUPERIOR TÉCNICO Behavioral Pattern Detection using Compact and Fast Methods Nuno Filipe Lopes Homem Supervisor: Doctor João Paulo Baptista de Carvalho Thesis approved in public session to obtain the PhD Degree in Electrical and Computer Engineering Jury final classification: Pass with Merit Jury Chairperson: Chairman of the IST Scientific Board Members of the Committee: Doctor THOMAS ALFRED RUNKLER, Honorary Professor, Technical University of Munich, Germany Doctor PEDRO MANUEL URBANO DE ALMEIDA LIMA, Professor Associado (Com Agregação), Insituto Superior Técnico, Universidade Técnica de Lisboa Doctor JOÃO MIGUEL DA COSTA SOUSA, Professor Associado (Com Agregação), Insituto Superior Técnico, Universidade Técnica de Lisboa Doctor PEDRO ALEXANDRE MOGADOURO DO COUTO, Professor Auxiliar, Escola de Ciência e Tecnologia, Universidade de Trás-os-Montes e Alto Douro Doctor NUNO CAVACO GOMES HORTA, Professor Auxiliar, Insituto Superior Técnico, Universidade Técnica de Lisboa Doctor JOÃO PAULO BAPTISTA DE CARVALHO, Professor Auxiliar, Instituto Superior Técnico, Universidade Técnica de Lisboa November 2011 Behavioral Pattern Detection using Compact and Fast Methods Abstract This work proposes algorithms and methods for individual behavior detection within very large populations. One will consider domains where individual behavior presents some stable characteristics over time, and where the individual actions can be observed through events in a data stream. Event patterns will be characterized and used as a proxy to individual behavior and actions. As in many domains, behavior does not remain static but evolves over time; one will therefore consider the sliding window model, making the assumption that behavior is stable during the considered time window. This work will cover the detection of the specific characteristics of the individual and what distinguishes his behavior from that of all other individuals.
    [Show full text]
  • Eric L. Carlson
    CARLSON.DOC 1/5/2007 11:04:55 AM PHISHING FOR ELDERLY VICTIMS: AS THE ELDERLY MIGRATE TO THE INTERNET FRAUDULENT SCHEMES TARGETING THEM FOLLOW Eric L. Carlson Internet usage is no longer limited to a young, tech-savvy subset of the population. As elderly people use the Internet in increasing numbers, the con artists who prey on them adapt their tactics accordingly. In this note, Eric Carlson explains why the elderly are especially susceptible to Internet fraud. He describes three fraudulent schemes regularly perpetrated against the elderly and the devastating effects they have on older Americans. While relevant legislation, prosecution of offenders, and education of the elderly all help to alleviate the occurrence of fraud, the problem persists. Mr. Carlson concludes that legislation and enforcement measures are helpful but insufficient to address the problem, and that society—including neighbors, family, and especially young, tech-savvy friends—has an obligation to help elderly people avoid falling victim to fraudulent Internet schemes. Eric L. Carlson is Notes Editor 2006–2007, Member 2005–2006, The Elder Law Journal; J.D. 2007, University of Illinois, Urbana-Champaign; B.S. 2004, University of Illinois, Urbana-Champaign, College of Engineering. The author would like to thank his parents, Stephen and Joanne Carlson, for their con- tinued support and encouragement. Go Illini! CARLSON.DOC 1/5/2007 11:04:55 AM 424 The Elder Law Journal VOLUME 14 I. Introduction To a large degree, the Internet is synonymous with a hip, tech-savvy, and young demographic. Heavily influenced by pop culture and the mainstream media, the modern-day Internet is typically characterized by young entrepreneurs, teenage hackers, bloggers, social networking Web sites, online gaming, and file- sharing.
    [Show full text]
  • Broker-Dealers As Catalysts for Reform, 16 B.C.L
    Boston College Law Review Volume 16 Article 2 Issue 3 Special Issue The Securities Laws: A Prognosis 3-1-1975 Regulating Discretionary Management: Broker- Dealers as Catalysts for Reform Harvey E. Bines Follow this and additional works at: http://lawdigitalcommons.bc.edu/bclr Part of the Securities Law Commons Recommended Citation Harvey E. Bines, Regulating Discretionary Management: Broker-Dealers as Catalysts for Reform, 16 B.C.L. Rev. 347 (1975), http://lawdigitalcommons.bc.edu/bclr/vol16/iss3/2 This Article is brought to you for free and open access by the Law Journals at Digital Commons @ Boston College Law School. It has been accepted for inclusion in Boston College Law Review by an authorized editor of Digital Commons @ Boston College Law School. For more information, please contact [email protected]. REGULATING DISCRETIONARY MANAGEMENT: BROKER-DEALERS AS CATALYSTS FOR REFORM HARVEY E. BINES * Over the last decade, there has been a remarkable increase in the number of broker-dealers offering or promoting discretionary management services.' In "discretionary" accounts, authority is granted an investment manager to make investment decisions and execute them for the benefit of a client without the obligation of consulting with, or obtaining prior approval from, the client. 2 An increasing number of houses are offering discretionary man- agement services directly or through affiliates, and they are actively soliciting clients to turn their accounts over for expert management. Other broker-dealers, not offering discretionary management ser- vices themselves or through affiliates, are referring customers to investment advisers who in turn pay compensation for the referrals or rely on referring broker-dealers for executions and custody of client accounts.
    [Show full text]
  • Perceptions of Online Fraud and the Impact on the Countermeasures for the Control of Online Fraud in Saudi Arabian Financial Institutions
    Perceptions of online fraud and the impact on the countermeasures for the control of online fraud in Saudi Arabian financial institutions A thesis submitted for the degree of Doctor of Philosophy By FAISAL ALANEZI 2015 College of Engineering Design and Physical Sciences Department of Computer Science Brunel University ABSTRACT This study addresses the impact of countermeasures in the control and prevention of online fraud in Saudi Arabia and the influence of the environmental context. Combatting online fraud is facilitated when the public is fully educated and is aware of its types and of the prevention methods available. People are reliant on the Internet; the possibility of being breached by hackers and fraudsters is growing, especially as socialising, online shopping and banking are carried out through personal computers or mobile devices. Online fraud has been described as an epidemic that has spread to most online activities. Its prevalence has been noted to be in regions where there is high adoption of e-commerce, and, along with it, large online financial transactions. The argument is therefore the measures taken are either are inadequate or have failed to effectively address all the issues because of the organisational and environmental context of the country. This research aims to examine online fraud perceptions and the countermeasures designed and used by financial institutions in Saudi Arabia to control and prevent online fraud in its environmental context, to examine the effectiveness/impact of the countermeasures and to examine the factors that may affect/influence the impact of the countermeasures. The qualitative method approach was chosen to ensure balanced coverage of the subject matter.
    [Show full text]
  • CRIMINAL JUSTICE in AMERICA FIFTH EDITION Cja Unit1a:Layout 1 7/10/2012 2:10 PM Page 1
    CRIMINAL JUSTICE IN AMERICA FIFTH EDITION cja_unit1a:Layout 1 7/10/2012 2:10 PM Page 1 CRIMINAL JUSTICE IN AMERICA FIFTH EDITION Developed by Marshall Croddy Bill Hayes cja_unit1a:Layout 1 7/10/2012 2:10 PM Page 2 601 South Kingsley Drive T. Warren Jackson, Chair Los Angeles, California 90005 Marshall P. Horowitz, Chair, (213) 487- 5590 Publications Committee www.crf-usa.org Jonathan Estrin, President Marshall Croddy, Vice President Developed by Subject Matter Consultants Marshall Croddy and Bill Hayes (Various Editions) Richard Chrystie, Deputy District Attorney, Board Reviewers Los Angeles County Marshall P. Horowitz, Lisa Rockwell, Val Cole, Deputy District Attorney, Patrick Rogan, K. Eugene Shutler, Los Angeles County Douglas Thompson, Lois Thompson Star French, Deputy Probation Officer, Editor Los Angeles County Bill Hayes John Hud, Criminal Defense Attorney, Bozeman, Montana Contributing Writers (Various Editions) Daniel E. Lewis, Attorney, Los Angeles Bill Hayes, Marshall Croddy, Todd Clark, Julia Rider, Luce, Forward, Hill, Jeffer & Teri Engler, Lucy Eisenberg, Damon Huss, Mangels Sandy Kanengiser, Carlton Martz, Betsy Devallis Rutledge, Special Counsel to the Salzman, Eden Kusmiersky, Coral Suter, District Attorney, Los Angeles County Charles Tremper, Michelle Ng, Roy Kim, Richard Simonian, Superintendent, C.K. Shruti Modi, Anjelica Sarmiento, Sophia Khan, Wakefield School, Fresno County Probation Marianna Muratova Department Researchers Captain Robert Taylor, Commanding Officer, (Various Editions) Juvenile Division, Los Angeles Police Rick Bhasin, Luke Delgado, and Michael Sokolson Department Kerry White, Head Deputy District Attorney, Production Juvenile Division, Los Angeles County Andrew Costly, Designer Library of Congress Cataloging-in-Publication Data Criminal justice in America / developed by Marshall Croddy and Bill Hayes ; edited by Bill Hayes ; written by Bill Hayes ..
    [Show full text]
  • AN INTRODUCTION to ART FRAUD by Marc Carrier
    AN INTRODUCTION TO ART FRAUD by Marc Carrier Online auctions: art fraud for the masses… Internet forgeries and flimflams. The work by American abstract painter Richard Diebenkorn attracted lots of attention on eBay. The bids opened at .30 cents and soon started soaring. The price reached four f igures, then six figures, finally selling to a buyer in the Netherlands for $135,805 USD. The painting was a fake. And so were most of the bids. A U.S. court sentenced Kenneth Fetterman to almost four years in jail for this crime. Fetterman and his accomplices posted bogus paintings on eBay—the forged works of Alberto Giacometti, Maurice Utrillo, Edward Hopper, and others—using a swindle called shill bidding to drive up the prices. It’s an easy trick. One or more individuals register to an auction site under a variety of anonymous profiles, and compete with real buyers by posting phony bids. There’s nothing new about this. It is a ploy that has been around since the earliest days of bricks and mortar auction houses. The Internet just makes it easier. Too easy. Auctions now reach far beyond the carpeted salons of Christie’s and Sotheby’s thanks to the Internet, resulting in a widespread democratization of art fraud. Anyone with a computer and a modem is now vulnerable to online deceit. And the problem appears to be growing. According to the Internet Fraud Complaint Center, a partnership between the FBI and the National White Collar Crime Center, almost half of all reported crimes concern online auction sites.
    [Show full text]