Summary
Criminals and other malicious actors often seek to capitalize on world events for their gain. Currently, some are leveraging the Coronavirus Disease 2019 (COVID-19) pandemic and relying on heightened public interest in it to take advantage of individuals and organizations. These schemes range from criminals claiming to be from a charitable organization or government agency and tricking individuals into providing money or personally identifiable information (PII) to fraudsters selling bogus or counterfeit treatments for COVID-19 or protective equipment and medical devices, that may or may not be delivered after victims submit payment. Further, scammers have tried to use stolen PII to gain access to and steal unemployment benefits and economic impact payments provided pursuant to the Coronavirus Aid, Relief, and Economic Security Act (CARES Act; P.L. 116-136).
On March 16, 2020, Attorney General William Barr issued a memorandum to U.S. Attorney's Offices regarding the Department of Justice's (DOJ's) COVID-19 related enforcement priorities. The memorandum stated that "[e]very U.S. Attorney's Office is thus hereby directed to prioritize the detection, investigation, and prosecution of all criminal conduct related to the current pandemic." With the proliferation of COVID-19-related scams, federal law enforcement has established several specific mechanisms to coordinate efforts. For instance, the Attorney General requested that each U.S. Attorney's Office establish a Coronavirus Coordinator to serve as a legal counsel for the federal judicial district on COVID-19-related matters, prosecute or aid in the prosecution of COVID-19-related cases, and conduct public awareness and outreach activities regarding COVID-19 issues. Investigative agencies such as the Federal Bureau of Investigation (FBI) also lead and participate in task forces and working groups specifically targeting COVID-19-related scams.
DOJ has also conducted outreach to federal agencies charged with administering funding related to the CARES Act to help prevent and detect scams. In addition, DOJ has directed the public to report potential COVID-19 scams to the National Center for Disaster Fraud (NCDF), and the FBI points potential victims to several reporting systems, including the NCDF and the Internet Crime Complaint Center, and to reporting directly to the FBI through its tip line or local field offices.
In addition to establishing new efforts to counter COVID-19-related fraud, DOJ can leverage its existing tools to target scammers. Officials have noted that this fraud is often cyber enabled. Federal law enforcement has the principal role in investigating and attributing cyber incidents to specific perpetrators, and this responsibility has been established within the broader framework of federal cyber incident response. DOJ leads these efforts through the FBI and the National Cyber Investigative Joint Task Force (NCIJTF). However, federal agencies involved in countering cyber threats and those related to COVID-19 are not limited to agencies within DOJ. Other federal law enforcement, such as the U.S. Secret Service, Immigration and Customs Enforcement's Homeland Security Investigations, and Customs and Border Protection have been working to investigate COVID-19 related scams, and entities such as the Federal Trade Commission, Cybersecurity and Infrastructure Security Agency, and the Department of the Treasury and the Department of Health and Human Services, among others, have been promoting public awareness about prominent scams.
Efforts from DOJ and other entities to counter COVID-19-related fraud involve both prevention (e.g., awareness campaigns) and response (e.g., investigations) activities. As policymakers examine the federal government's efforts to stop these scams, they may question the potential effects of agencies' investments in prevention activities and law enforcement response on reducing the prevalence and impacts of pandemic-related fraud. Relatedly, they may look to how the agencies themselves are evaluating the effects of the resources they have placed toward countering these scams.
Criminals and other malicious actors often seek to capitalize on world events for their gain. Some criminals are leveraging heightened interest in the Coronavirus Disease 2019 (COVID-19) pandemic to take advantage of individuals and organizations.1 Officials have cautioned about a host of scams and other criminal activity relating to the pandemic. These range from criminals claiming to be from a charitable organization or government agency and tricking individuals into providing money or personally identifiable information (PII) to fraudsters selling bogus or counterfeit treatments for COVID-19 or personal protective equipment (PPE) and medical devices that may or may not be delivered after victims submit payment.2 The Federal Bureau of Investigation (FBI) noted that "as of May 28, 2020, the Internet Crime Complaint Center (IC3) received nearly the same amount of complaints in 2020 (about 320,000) as they had for the entirety of 2019 (about 400,000). Approximately 75% of these complaints are frauds and swindles."3 In addition, the Federal Trade Commission (FTC) received more than 134,100 complaints (approximately 69,600 of which were specific to fraud) related to the COVID-19 pandemic, including the loss of over $87 million to fraud, in the first six and a half months of 2020.4
On March 16, 2020, Attorney General William Barr issued a memorandum to U.S. Attorney's Offices regarding the Department of Justice's (DOJ's) COVID-19-related enforcement priorities. The memorandum stated that "[e]very U.S. Attorney's Office is thus hereby directed to prioritize the detection, investigation, and prosecution of all criminal conduct related to the current pandemic."5 Less than one week later, DOJ announced its first enforcement action against COVID-19 fraudsters. In doing so, the department alleged that the website "coronavirusmedicalkit.com" was claiming to provide consumers with access to World Health Organization (WHO) coronavirus vaccine kits if they provided their credit card information to pay for shipping.6
This report provides a brief overview of the types of scams criminals may use to steal money and PII from individuals and businesses. The report also discusses federal law enforcement's role—specifically, DOJ's role—in investigating and prosecuting these scams. Congress, in examining DOJ's priorities going forward, may look to the resources DOJ has placed toward countering fraud more broadly, and toward specific nefarious activity capitalizing on the COVID-19 pandemic.
Generally, fraud is a profit-driven crime. Fraudsters may attempt to scam victims—individuals and organizations, including government programs—out of money directly or steal victims' personal information to profit in other ways. COVID-19-related fraud is no different.7 While this section presents examples of COVID-19-related scams, it is not meant to be representative of the full spectrum of scams and tools criminals are utilizing to take advantage of the pandemic.
Scamming Victims Out of Money Directly
Fraudsters have used a number of scams to prey on public interest in the COVID-19 pandemic. People seek up-to-date information about the disease, attempt to purchase PPE such as masks, want to learn about or purchase preventive treatments or potential cures, and try to support front line workers and charities that deliver much-needed resources. The following are examples of how fraudsters take advantage of the pandemic.
Leveraging Stolen Personal Information
Criminals who steal victims' PII can use it to gain access to victims' existing accounts or establish new accounts that can be used for profit. For instance, scammers have tried to use stolen PII to redirect unemployment benefits and economic impact payments (EIP) provided pursuant to the Coronavirus Aid, Relief, and Economic Security Act (CARES Act; P.L. 116-136). The Identity Theft Resource Center (ITRC) reports an uptick in queries related to COVID-19 fraud and that traffic to the center was 850% higher in March 2020 than in March 2019.13 Fraudsters may use a number of tactics, including phone calls or email phishing14 schemes in which they pretend to be a representative of a legitimate organization, to try and steal PII that they can then leverage to their advantage. The following are examples of how fraudsters have used interest in the pandemic to steal PII.
While the pandemic may have presented new opportunities for criminals to leverage, fraudsters still rely upon a number of tried-and-true tools to scam victims or gain access to information, accounts, and resources. For instance, they continue to make robocalls, phish for information through emails and social media, install malware on unsuspecting users' devices, and exploit technology vulnerabilities. These scams generally seem to have a cyber component in that they are carried out or facilitated by the internet and evolving technology. In addition, criminals leverage both the surface web and dark web to facilitate these schemes.
Fraudsters on the Dark Web23 The layers of the internet go far beyond the surface content that many can easily access in their typical searches. The other content is that of the deep web, content that has not been indexed by traditional search engines such as Google. The furthest corners of the deep web, segments known as the dark web, contain content that has been intentionally concealed. The dark web may be used for legitimate purposes as well as to conceal criminal or otherwise malicious activities. Fraudsters taking advantage of the COVID-19 pandemic have leveraged dark web marketplaces as an additional venue through which to sell legal or illegal, legitimate or counterfeit, and plentiful or scarce products and information. For instance, personal protective equipment such as N95 masks, gowns, and gloves have been found for sale on these marketplaces. In addition, there are reports that unapproved preventive drugs or cures such as the drug chloroquine24 have been listed on these marketplaces. Even blood alleged to have belonged to recovered coronavirus patients was found for sale.25 However, it is unclear the extent to which scammers rely on the dark web instead of the surface web to sell pandemic-related goods and services and to carry out scams. For instance, the sale of some goods on the dark web may be limited by the "availability of similar goods on the surface web and the wider customer base not being traditional dark web users."26 Reduced product supply on the surface web, though, could correlate with customers seeking these goods on the dark web. |
Department of Justice Response
With the proliferation of COVID-19 related scams, DOJ has established several specific mechanisms to coordinate efforts to combat them. For instance, DOJ has directed the public to report COVID-19-related scams to the National Center for Disaster Fraud (NCDF), within DOJ's Criminal Division. The NCDF's mission is to "improve and further the detection, prevention, investigation, and prosecution of fraud related to natural and man-made disasters, and to advocate for the victims of such fraud."27 The FBI points potential victims to several reporting systems, including the NCDF and the Internet Crime Complaint Center (IC3), and to reporting directly to the bureau through its tip line or local FBI field offices.28 Federal law enforcement therefore has a number of pathways to receive information about COVID-19-related scams. As Congress examines federal law enforcement's response to the pandemic, policymakers may look to these different pathways to see if they are sufficient to ensure that the full spectrum of reports are being received and that there are means to establish clear jurisdiction over particular crimes.
Reporting COVID-19 Scams There is no central repository where individuals and organizations report complaints of fraud, COVID-19-related or otherwise. However, there are a number of reporting systems for the public to report suspected incidents of fraud, and those systems may share information to help law enforcement consolidate and deconflict public complaints about such incidents, including those related to COVID-19. Examples of federal entities to which victims may report include the following.
|
In addition to providing mechanisms for the public to report information about COVID-19-related scams, DOJ has established several coordinated efforts to counter criminal activity associated with the pandemic. For example,
In addition to establishing new efforts to counter COVID-19-related fraud, DOJ can leverage its existing tools to target scammers. As officials have noted, fraud related to COVID-19 is often cyber-enabled in some form37; the section below focuses on DOJ's role in countering cybercrime, including fraud.
DOJ's Role in Countering Cybercrime
Federal law enforcement has the principal role in investigating and attributing cyber incidents to specific perpetrators, and this responsibility has been established within the broader framework of federal cyber incident response. In a 2016 Presidential Policy Directive, the Obama Administration outlined how the government responds to significant cyber incidents—those that are "likely to result in demonstrable harm to the national security interests, foreign relations, or economy of the United States or to the public confidence, civil liberties, or public health and safety of the American people."38 Responding to cyber incidents involves (1) threat response, (2) asset response, and (3) intelligence support. DOJ, through the FBI and National Cyber Investigative Joint Task Force (NCIJTF), is the designated lead on threat response.39 Threat response involves
conducting appropriate law enforcement and national security investigative activity at the affected entity's site; collecting evidence and gathering intelligence; providing attribution; linking related incidents; identifying additional affected entities; identifying threat pursuit and disruption opportunities; developing and executing courses of action to mitigate the immediate threat; and facilitating information sharing and operational coordination with asset response.40
Defining a Cyber Incident A principal issue in understanding how the federal government responds to a cyber incident is the definition of a cyber incident. A host of terms are used in discussing malicious activity with a cyber, online, or technological component. These range from cyber attack and cyberwarfare to cybercrime, cyber espionage, and cyber terrorism. A key distinction between these malicious incidents is the actor's motivation. For instance, a criminal may be profit motivated, while a terrorist may be politically motivated. However, "the speed and anonymity of cyber attacks makes distinguishing among the actions of terrorists, criminals, and nation states difficult, a task which often occurs only after the fact, if at all."41 Cyber incident, therefore, is an umbrella term encompassing a range of malicious activity carried out by diverse actors with varying motivations and capabilities—all of whom exploit cyberspace.42 The federal government has defined a cyber incident as "an event occurring on or conducted through a computer network that actually or imminently jeopardizes the integrity, confidentiality, or availability of computers, information or communications systems or networks, physical or virtual infrastructure controlled by computers or information systems, or information resident thereon."43 As such, an incident could capture an array of activities carried out by malicious actors ranging from hacktivists and criminals to nation states and terrorists. Notably, the federal government has not developed official definitions for specific subsets of cyber incidents—such as cybercrime—that distinguish them from other subsets.44 |
The FBI pursues cybercrime cases ranging from computer hacking and intellectual property rights violations to child exploitation, fraud, and identity theft. Its top priorities involve combating computer and network intrusions and investigating ransomware. The FBI's cyber priorities focus on "high-level intrusions by state-sponsored hackers, global organized crime syndicates, and other technically sophisticated and dangerous actors."45 It is unclear which portion of COVID-19 related scams might fall under these priorities.
The FBI leads a variety of law enforcement task forces and partnerships focused on cyber threat response.
Federal agencies involved in countering COVID-19-related scams are not limited to those within DOJ. DOJ investigates and prosecutes fraud and provides consumer awareness, but federal efforts to counter these scams include agencies in other departments as well. For instance, within the Department of Homeland Security (DHS), U.S. Immigration and Customs Enforcement Homeland Security Investigations (ICE HSI) launched Operation Stolen Promise to bring together the agency's "expertise in global trade investigations, financial fraud and cyber investigations with robust private and public partnerships to disrupt and dismantle this criminal activity [COVID-19 related fraud] and strengthen global supply-chain security."52 In addition, ICE HSI works with U.S. Customs and Border Protection (CBP) to prevent smugglers from bringing "fraudulent, mislabeled, and unauthorized COVID-19 related products, such as purported anti-viral products, [PPE], and test kits" into the United States.53 Further, the U.S. Secret Service and its electronic and financial crimes task forces investigate cyber-enabled financial crimes related to the pandemic. The Secret Service, like other federal law enforcement agencies, is also working on task forces specifically designed to counter pandemic-related fraud and conducting outreach with industry partners.54
In addition to investigating and prosecuting fraudsters exploiting the pandemic, federal agencies enhance public awareness of potential scams.55 The Cybersecurity and Infrastructure Security Agency and FTC, for instance, provide tips to organizations and individuals on avoiding a range of pandemic-related scams. Other agencies provide awareness on industry-specific scams. For example, the Department of Health and Human Services provides awareness on testing, treatment, and Medicare-related scams; the Treasury Department's Inspector General warns about tax-related fraud; and the Social Security Administration warns about scams related to Social Security benefits.
Efforts from DOJ and other entities to counter COVID-19-related fraud involve both prevention (e.g., awareness campaigns) and response (e.g., investigations) activities. As policymakers examine the federal government's efforts to stop these scams, they may question the potential effects of agencies' investments in both prevention and response activities on reducing the prevalence and impacts of pandemic-related fraud. Relatedly, they may look to how the agencies themselves are evaluating the effects of the resources they have placed toward countering these scams.
1. |
See, for example, Department of Justice (DOJ), Combatting COVID-19 Fraud, at https://www.justice.gov/coronavirus/combattingfraud. For more information on COVID-19, see the Centers for Disease Control and Prevention, Coronavirus (COVID-19), at https://www.cdc.gov/coronavirus/2019-ncov/index.html. |
2. |
Federal Bureau of Investigation (FBI), Internet Crime Complaint Center, FBI Sees Rise in Fraud Schemes Related to the Coronavirus (COVID-19) Pandemic, Alert Number I-032020-PSA, March 20, 2020. |
3. |
FBI testimony before the U.S. Congress, Senate Committee on the Judiciary, COVID-19 Fraud: Law Enforcement's Response to Those Exploiting the Pandemic, 116th Cong., 2nd sess., June 9, 2020. |
4. |
Federal Trade Commission (FTC), FTC COVID-19 and Stimulus Reports, January 1, 2020 – July 16, 2020, accessed July 19, 2020. |
5. |
Department of Justice (DOJ), Memorandum for All United States Attorneys: COVID-19-Department of Justice Priorities, March 16, 2020. |
6. |
Department of Justice (DOJ), "Federal Court Issues Temporary Restraining Order Against Website Offering Fraudulent Coronavirus Vaccine," press release, March 22, 2020. Notably, there are currently no approved vaccines to protect against COVID-19. |
7. |
The Department of Justice is also countering price gouging and hoarding of goods related to the pandemic, but these are beyond the scope of this report. |
8. |
Department of Justice (DOJ), "Two Individuals Arrested for Conspiring to Defraud Purported Purchasers of Personal Protective Equipment," press release, April 27, 2020. |
9. |
Department of Justice (DOJ), "U.S. Files Civil Forfeiture Complaint in COVID-19 Fraud Case," press release, June 10, 2020. |
10. |
See, for example, Federal Trade Commission (FTC), Make Your Coronavirus Donations Count, May 5, 2020. |
11. |
Department of Justice (DOJ), Coronavirus Response: Combatting COVID-19 Fraud, at https://www.justice.gov/coronavirus/combattingfraud. |
12. |
Department of Justice (DOJ), "Department of Justice Announces Disruption of Hundreds of Online COVID-19 Related Scams," press release, April 22, 2020. |
13. |
Identity Theft Resource Center (ITRC), COVID-19 Resources, at https://www.idtheftcenter.org/covid-19-resources/. The ITRC is a nonprofit resource center focused primarily on supporting identity theft victims in the United States. See also Nathaniel Popper, "'Pure Hell for Victims' as Stimulus Programs Draw a Flood of Scammers," The New York Times, April 24, 2020. |
14. |
Phishing is "an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques." See U.S. Cybersecurity and Infrastructure Security Agency, at https://us-cert.cisa.gov/report-phishing. |
15. |
The term malware refers to "A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim's data, applications, or operating system or of otherwise annoying or disrupting the victim." National Institute of Standards and Technology (NIST), "Malware," Computer Security Resources Center Glossary. |
16. |
"Live Coronavirus Map Used to Spread Malware," Krebs On Security, March 12, 2020. |
17. |
Alexander Eremin, Kaspersky, AZORult++: Rewriting History, March 22, 2019. |
18. |
Nathaniel Popper, "'Pure Hell for Victims' as Stimulus Programs Draw a Flood of Scammers," The New York Times, April 24, 2020. The IRS has issued warnings to taxpayers cautioning about potential fraud. See, for example, Internal Revenue Service (IRS), "IRS Issues Warning about Coronavirus-Related Scams; Watch Out for Schemes Tied to Economic Impact Payments," press release, April 2, 2020. |
19. |
See, for example, Department of Justice (DOJ), "Massachusetts Man Charged with COVID-Relief Fraud," press release, June 22, 2020. |
20. |
"U.S. Secret Service: 'Massive Fraud' Against State Unemployment Insurance Programs," Krebs On Security, May 16, 2020. |
21. |
Ibid. See also Mike Baker, "Feds Suspect Vast Fraud Network Is Targeting U.S. Unemployment Systems," The New York Times, May 17, 2020. |
22. |
Department of Justice (DOJ), Department of Justice Enforcement Actions Related to COVID-19, March 24, 2020. |
23. |
For more information on the dark web, see CRS Report R44101, Dark Web. |
24. |
For more information about chloroquine and related drugs, see CRS Insight IN11347, Treatment of COVID-19: Hydroxychloroquine and Chloroquine. |
25. |
Sooraj Shah, "Dark web scammers exploit Covid-19 fear and doubt," BBC News, May 19, 2020. |
26. |
EUROPOL, Catching the Virus: Cybercrime, Disinformation and the COVID-19 Pandemic, April 3, 2020, p. 10. |
27. |
Ibid. See also Department of Justice (DOJ), Department of Justice Coronavirus Response, at https://www.justice.gov/coronavirus/DOJresponse. The NCDF, when appropriate, shares information with the FTC's Sentinel Database, which contains consumer complaints across a variety of categories (collecting complaints from at least 35 databases across the country) and is available to law enforcement. |
28. | |
29. |
For more information, see https://www.justice.gov/disaster-fraud. |
30. |
For more information, see https://www.ic3.gov/about/default.aspx. |
31. |
For more information, see https://www.ftc.gov/enforcement/consumer-sentinel-network. |
32. |
For more information, see https://www.fbi.gov/tips. |
33. |
For example, U.S. Immigration and Customs Enforcement (ICE) Homeland Security Investigations (HSI) directs the public to report COVID-19 related fraud to a special DHS email tip line, COVID19FRAUD@DHS.gov, established for these types of reports. |
34. |
Department of Justice (DOJ), Coordinated Nationwide Response to Detect, Deter, and Punish Crime Relating to the National Emergency Caused by COVID-19, March 19, 2020. |
35. |
FBI testimony before the U.S. Congress, Senate Committee on the Judiciary, COVID-19 Fraud: Law Enforcement's Response to Those Exploiting the Pandemic, 116th Cong., 2nd sess., June 9, 2020. |
36. |
DOJ testimony before the U.S. Congress, Senate Committee on the Judiciary, COVID-19 Fraud: Law Enforcement's Response to Those Exploiting the Pandemic, 116th Cong., 2nd sess., June 9, 2020. |
37. |
See U.S. Secret Service testimony before the U.S. Congress, Senate Committee on the Judiciary, COVID-19 Fraud: Law Enforcement's Response to Those Exploiting the Pandemic, 116th Cong., 2nd sess., June 9, 2020. |
38. |
The White House, Presidential Policy Directive—United States Cyber Incident Coordination, PPD-41, July 26, 2016. Of note, it is unclear whether any of the cyber incidents discussed in this CRS report may be considered a "significant cyber incident." Further, there have been no official indications that the Trump Administration has changed this approach to cyber incident response. |
39. |
For more information on the FBI's cyber investigations, see https://www.fbi.gov/investigate/cyber/. Information on the NCIJTF is available at https://www.fbi.gov/investigate/cyber/national-cyber-investigative-joint-task-force. See also CRS Report R44926, Justice Department's Role in Cyber Incident Response. The Department of Homeland Security, through the National Cybersecurity and Communications Integration Center, is the lead on asset response. The Office of the Director of National Intelligence, through the Cyber Threat Intelligence Integration Center, is the lead on intelligence support. |
40. |
The White House, Presidential Policy Directive—United States Cyber Incident Coordination, PPD-41, July 26, 2016. |
41. |
Department of Homeland Security (DHS), National Strategy to Secure Cyberspace, February 2003, p. viii. |
42. |
The National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD-23) defines cyberspace as "the interdependent network of information technology infrastructures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries." In other words, cyberspace is the "virtual environment of information and interactions between people." National Security Agency, Statement for the Record, Lieutenant General Keith Alexander, Commander, Joint Functional Component Command for Network Warfare, Before the House Armed Services Committee, Terrorism, Unconventional Threats, and Capabilities Subcommittee, May 5, 2009. |
43. |
The White House, Presidential Policy Directive—United States Cyber Incident Coordination, PPD-41, July 26, 2016. The PPD noted that this definition could include vulnerabilities in information systems, system security procedures, internal controls, or implementation that could ultimately be exploited by a threat actor. |
44. |
For a policy discussion on issues defining different types of cyber incidents (such as a definition of cybercrime), see CRS Report R42547, Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement. |
45. |
Statement of FBI Director Christopher Wray before the U.S. Congress, Senate Homeland Security and Governmental Affairs Committee, Worldwide Threats, 116th Cong., 1st sess., November 5, 2019. |
46. |
The White House, National Security Presidential Directive-54/Homeland Security Presidential Directive-23, January 8, 2008. |
47. |
Federal Bureau of Investigation (FBI), Cyber Task Forces: Building Alliances to Improve the Nation's Cybersecurity. |
48. |
Federal Bureau of Investigation (FBI), The Cyber Action Team: Rapidly Responding to Major Computer Intrusions, March 4, 2015. |
49. |
Federal Bureau of Investigation (FBI), National Cyber Security Awareness Month: FBI Deploys Cyber Experts to Work Directly With Foreign Partners, October 26, 2016. ALATs have been placed in London, England; The Hague, Netherlands; Tallinn, Estonia; Kyiv, Ukraine; and Ottawa, Canada, among other locations. |
50. |
For more information on the NCFTA, see https://www.ncfta.net/. |
51. |
For more information on InfraGard, see https://www.infragard.org. |
52. |
U.S. Immigration and Customs Enforcement (ICE), "ICE HSI launches Operation Stolen Promise," press release, April 15, 2020. |
53. |
U.S. Immigration and Customs Enforcement (ICE), "ICE HSI El Paso investigating COVID-19 related fraud, such as unauthorized test kits, face masks, diluted cleaning solutions, anti-viral products," press release, May 7, 2020. |
54. |
See U.S. Secret Service testimony before the U.S. Congress, Senate Committee on the Judiciary, COVID-19 Fraud: Law Enforcement's Response to Those Exploiting the Pandemic, 116th Cong., 2nd sess., June 9, 2020. |
55. |
For more information on agencies providing information about scams and fraud, see https://www.usa.gov/coronavirus. |