Teenagers And Cybercrime

More and more teenagers and young people are getting involved in cybercrime. Many do it for fun without realising the consequences of their actions, but the penalties can be severe.

Cyber-crime isn’t a victimless crime and is taken extremely seriously by law enforcement.

 

Cyber-crime can be split into two broad categories:

1.    Cyber-dependent crimes (or ‘pure’ cyber-crimes) are offences that can only be committed using a computer, computer networks or other forms of information communications technology (ICT). An example of a cyber-dependent crime is gaining unauthorised access into someone’s computer network, this can also be called ‘hacking’. 

2.    Cyber-enabled crimes (such as fraud, the purchasing of illegal drugs and child sexual exploitation) can be conducted on or offline, but online may take place at unprecedented scale and speed.

Examples of cyber-crime include:

•    Unauthorised access – this involves gaining access into someone’s computer network without their permission, and then taking control and/or taking information from other people’s computers. Examples may include accessing the secure area on the school’s computer network and looking for test paper answers or trying to change test scores.
•    Making, supplying or obtaining malware (malicious software), viruses, spyware, botnets and Remote Access Trojans is illegal. These programmes allow criminals to get into other people’s computers to carry out illegal activities. ‘Pranking’, by remotely accessing a friends computer when they don't know you are doing it and messing around is still illegal.
•    Carrying out a DDoS (Distributed Denial of Service) attack or 'booting'. A DDoS attack is an attempt to make an online service unavailable by overwhelming it with internet traffic from multiple sources. ‘Online service’ could be a large website or an individual internet user. Booting someone offline whilst playing online games may seem like a harmless joke, but is still illegal.

Consequences

Cyber-crime is a serious criminal offence under the Computer Misuse Act. The National Crime Agency and police take cyber-crime extremely seriously and will make every effort to arrest and prosecute offenders.

Young people getting involved with cyber-crime could face:
•    A visit and warning from police or NCA officers
•    Computers being seized and being prevented from accessing the internet
•    A penalty or fine
•    Being arrested
•    Up to 10 years in prison for serious offences
A permanent criminal record could affect education and future career prospects, as well as potential future overseas travel.
Ways to use cyber skills positively

Skills in coding, gaming, computer programming, cyber security or anything IT-related are in high demand and there are many careers and opportunities available to anyone with an interest in these areas.

Top reasons to look for a career in cyber security include:

•    Whatever your skills or interests there is something for everyone – a number of organisations offer internships, insight days and apprenticeships
•    A good salary from the start and attractive benefit packages 
•    These career choices are in high demand not just in the UK but also abroad-which means young people have an opportunity to travel to new places whilst learning new cyber skills
•    Being part of a dynamic industry – never a dull day with the opportunity to keep refreshing skills and expanding their knowledge of the cyber-world
•    Highly transferable skills that can be applied to any industry
•    Becoming a ‘ pdf digital defender (1.26 MB)’ by helping companies and people to stay safe and fight cyber-crime.

There are also a number of organisations to help young people develop cyber skills:

•    Cyber Security Challenge - a series of national competitions, learning programmes and networking in coding and programming.
•    GCHQ Careers – Here you can find out about what jobs with the tech industry your skills match, there are job profile too where GCHQ staff talk about what they get up to in their role. You can also find out more about GCHQ’s Cyber First programme for University Students, Apprenticeships and Summer Schools for teenagers. 
•    Video Game Ambassadors – Part of UKIE (UK Interactive Entertainment), learn what it is like to become a game developer or how to get a job in the gaming industry. 
Also keep an eye out on what is going on in our local libraries, clubs, colleagues or universities for activities or opportunities for young people of all ages.

There are opportunities are school and university for young people to learn cyber skills such as penetration testing in safe and legal environments.

Deterrents and alternative opportunities:

It’s important for us to understand why more young people are becoming involved in cyber-crime in order to ensure proper deterrents and alternative opportunities are available for people to enhance their skills and allow them to use positively. .
Working alongside CREST, NCCU Prevent have produced a pdf discussion paper (601 KB) around young people’s pathway into cyber-crime and how to promote positive alternatives.

Advice for teachers:

If you’re worried about one of your students speak to them about what is illegal, the consequences of cyber-crime and show them positive ways to use their skills (see above). You should also make the student’s parents aware of your concerns.
Cyber Security Challenge UK has developed a lesson plan and an interactive game to teach people about the Computer Misuse Act.

If you would like further advice on the information held here then please contact the NCCU Prevent team.

If you believe that your school is the victim of a cyber-crime attack or a student is committing cyber-crime then you can report to the Police by calling 101.

If you believe you have been a victim of cyber-crime then please report to Action Fraud.

National Crime Agency:

You Might Also Read:

Emergency Connection-Teachers and Police:

UK Schools & Teaching Computer Science:

GCHQ’s Cyber Insiders Summer School:

 

 

« Get Ready: Robots Will Destroy Jobs
EU / US Privacy Shield Affects Your Organisation »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Nethemba

Nethemba

Nethemba provide pentesting and security audits for networks and web applications. Other services include digital forensics, training and consultancy.

Minerva Labs

Minerva Labs

Minerva’s patent pending solution keeps malware in a constant sleep state before it can infiltrate your network and cause any damage.

Swedish Civil Contingencies Agency (MSB)

Swedish Civil Contingencies Agency (MSB)

MSB's Information Assurance Department is responsible for supporting and coordinating work relating to Sweden's national societal information security.

Intrasoft International

Intrasoft International

Intrasoft International is a leading European IT Solutions and Services Group offering a full range of IT services including Information Security.

Nameshield Group

Nameshield Group

Nameshield is one of most experienced domain name registrars, trademark protection specialists and managers of online reputational risk in the world today.

BAI Security

BAI Security

BAI Security is a Nationally Recognized Leader in IT Security. Keeping your data safe and your business compliant is our singular focus.

Wiz

Wiz

Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

LGMS - LE Global Services

LGMS - LE Global Services

LGMS is a leading cyber security penetration testing and assessment firm in the Asia Pacific region.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

Ever Nimble

Ever Nimble

Ever Nimble are award-winning experts in IT support, cybersecurity, and cloud technology. Our proactive approach will enhance your security and protect you from cyber security threats.

Arsen Cybersecurity

Arsen Cybersecurity

Arsen is a French cybersecurity startup, dedicated to enhancing human behaviors in cybersecurity.

DOT Europe

DOT Europe

DOT Europe is a consensus based organisation which brings a diverse membership together to agree on their collective stance on EU tech policy.

SecAI

SecAI

SecAI is an innovative threat intelligence-driven, and AI-powered vendor aiming at cyber threat detection and response.

Armilla AI

Armilla AI

Armilla is the world’s only MGA focused solely on AI insurance and offers third-party testing, compliance, risk mitigation, and warranty coverage for enterprises and AI vendors alike.