Teenagers And Cybercrime

More and more teenagers and young people are getting involved in cybercrime. Many do it for fun without realising the consequences of their actions, but the penalties can be severe.

Cyber-crime isn’t a victimless crime and is taken extremely seriously by law enforcement.

 

Cyber-crime can be split into two broad categories:

1.    Cyber-dependent crimes (or ‘pure’ cyber-crimes) are offences that can only be committed using a computer, computer networks or other forms of information communications technology (ICT). An example of a cyber-dependent crime is gaining unauthorised access into someone’s computer network, this can also be called ‘hacking’. 

2.    Cyber-enabled crimes (such as fraud, the purchasing of illegal drugs and child sexual exploitation) can be conducted on or offline, but online may take place at unprecedented scale and speed.

Examples of cyber-crime include:

•    Unauthorised access – this involves gaining access into someone’s computer network without their permission, and then taking control and/or taking information from other people’s computers. Examples may include accessing the secure area on the school’s computer network and looking for test paper answers or trying to change test scores.
•    Making, supplying or obtaining malware (malicious software), viruses, spyware, botnets and Remote Access Trojans is illegal. These programmes allow criminals to get into other people’s computers to carry out illegal activities. ‘Pranking’, by remotely accessing a friends computer when they don't know you are doing it and messing around is still illegal.
•    Carrying out a DDoS (Distributed Denial of Service) attack or 'booting'. A DDoS attack is an attempt to make an online service unavailable by overwhelming it with internet traffic from multiple sources. ‘Online service’ could be a large website or an individual internet user. Booting someone offline whilst playing online games may seem like a harmless joke, but is still illegal.

Consequences

Cyber-crime is a serious criminal offence under the Computer Misuse Act. The National Crime Agency and police take cyber-crime extremely seriously and will make every effort to arrest and prosecute offenders.

Young people getting involved with cyber-crime could face:
•    A visit and warning from police or NCA officers
•    Computers being seized and being prevented from accessing the internet
•    A penalty or fine
•    Being arrested
•    Up to 10 years in prison for serious offences
A permanent criminal record could affect education and future career prospects, as well as potential future overseas travel.
Ways to use cyber skills positively

Skills in coding, gaming, computer programming, cyber security or anything IT-related are in high demand and there are many careers and opportunities available to anyone with an interest in these areas.

Top reasons to look for a career in cyber security include:

•    Whatever your skills or interests there is something for everyone – a number of organisations offer internships, insight days and apprenticeships
•    A good salary from the start and attractive benefit packages 
•    These career choices are in high demand not just in the UK but also abroad-which means young people have an opportunity to travel to new places whilst learning new cyber skills
•    Being part of a dynamic industry – never a dull day with the opportunity to keep refreshing skills and expanding their knowledge of the cyber-world
•    Highly transferable skills that can be applied to any industry
•    Becoming a ‘ pdf digital defender (1.26 MB)’ by helping companies and people to stay safe and fight cyber-crime.

There are also a number of organisations to help young people develop cyber skills:

•    Cyber Security Challenge - a series of national competitions, learning programmes and networking in coding and programming.
•    GCHQ Careers – Here you can find out about what jobs with the tech industry your skills match, there are job profile too where GCHQ staff talk about what they get up to in their role. You can also find out more about GCHQ’s Cyber First programme for University Students, Apprenticeships and Summer Schools for teenagers. 
•    Video Game Ambassadors – Part of UKIE (UK Interactive Entertainment), learn what it is like to become a game developer or how to get a job in the gaming industry. 
Also keep an eye out on what is going on in our local libraries, clubs, colleagues or universities for activities or opportunities for young people of all ages.

There are opportunities are school and university for young people to learn cyber skills such as penetration testing in safe and legal environments.

Deterrents and alternative opportunities:

It’s important for us to understand why more young people are becoming involved in cyber-crime in order to ensure proper deterrents and alternative opportunities are available for people to enhance their skills and allow them to use positively. .
Working alongside CREST, NCCU Prevent have produced a pdf discussion paper (601 KB) around young people’s pathway into cyber-crime and how to promote positive alternatives.

Advice for teachers:

If you’re worried about one of your students speak to them about what is illegal, the consequences of cyber-crime and show them positive ways to use their skills (see above). You should also make the student’s parents aware of your concerns.
Cyber Security Challenge UK has developed a lesson plan and an interactive game to teach people about the Computer Misuse Act.

If you would like further advice on the information held here then please contact the NCCU Prevent team.

If you believe that your school is the victim of a cyber-crime attack or a student is committing cyber-crime then you can report to the Police by calling 101.

If you believe you have been a victim of cyber-crime then please report to Action Fraud.

National Crime Agency:

You Might Also Read:

Emergency Connection-Teachers and Police:

UK Schools & Teaching Computer Science:

GCHQ’s Cyber Insiders Summer School:

 

 

« Get Ready: Robots Will Destroy Jobs
EU / US Privacy Shield Affects Your Organisation »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

Efecte

Efecte

Efecte is a Nordic SaaS company specialized in IT Service Management, Self-Service, Identity Management and Access Governance solutions.

XCure Solutions

XCure Solutions

XCure Solutions are a Finnish company specializing in data security, data protection and data recovery.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

Ethoca

Ethoca

Ethoca is a secure network for card issuers and merchants to connect and work cooperatively outside the payment network in a unique and powerful way.

Monegasque Digital Security Agency (AMSN)

Monegasque Digital Security Agency (AMSN)

AMSN is the national authority in charge of the security of information systems in Monaco.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

Littlefish

Littlefish

Littlefish provide world-class, award-winning Managed IT and Cyber Security Services, delivered from our 24/7 UK service centres.

VikingCloud

VikingCloud

VikingCloud (formerly Sysnet Global Solutions) offers organizations an integrated cybersecurity and compliance solution to make informed, predictive, and cost-effective risk mitigation and prevention

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

CovertSwarm

CovertSwarm

Since 2020 CovertSwarm have been radically redefining how enterprise security risks are discovered. We outpace the cyber threats faced by our clients using a constant cyber attack methodology.

LevelBlue

LevelBlue

LevelBlue simplify cybersecurity through award-winning managed security services, experienced strategic consulting, threat intelligence and renowned research.

Qryptonic

Qryptonic

Qryptonic pioneers next-generation cybersecurity by leveraging the unparalleled capabilities of quantum computing to defend against evolving threats.

Net Essence

Net Essence

Net Essence is a Managed IT Services Provider. We deliver effective, reliable and fit-for-purpose IT solutions for SMEs based in the UK.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.