The Victims Of Cybercrime In Britain

The first major British study into victims of computer crime has exposed the serious harm some victim’s experience, as well as barriers to reporting such offences, receiving support, achieving justice and the precarious resources dedicated by the police to cybercrime. 

Changes throughout the entire system are being recommended to better serve the needs of victims, and help protect others in the future. 

These include changing the name of Action Fraud, reforming websites offering support, better training for police staff working with victims and dedicating more permanent resources in the police to fighting this crime, among many others.

Computer misuse crime is a legal term relating to unauthorised access to computers, data or networks which can involve hacking, intentional virus infections, Denial of Service attacks and ransomware. In the year ending 2018, it accounted for 9% of all reported crime in the Crime Survey for England and Wales.

Researchers at the University of Portsmouth were commissioned by the Home Office and Her Majesty’s Inspectorate of Constabulary, Fire and Rescue Services to assess the nature and impact of crime related to misuse of computers, and the support provided to those affected by it. They interviewed 52 victims of computer misuse and conducted a survey of 252 victims.

Computer misuse crime is a legal term relating to unauthorised access to computers, data or networks, which can involve; hacking, intentional virus infections, denial of service attacks and ransomware. In the year ending 2018 it accounted for 9 per cent of all reported crime in the Crime Survey for England and Wales (CSEW).

Professor Mark Button , Director of the Centre for Counter Fraud Studies at the Institute of Criminal Justice Studies, University of Portsmouth led the team of academics who have interviewed victims and compiled the report and recommendations. He said: “There has been a perception that cyber-crimes don’t have as bad an impact as some physical crimes, but this report shows that computer misuse crime has similar, and in some cases a worse impact, than comparable traditional crimes such as burglary. We found victims who compared the cyber-attacks to physical assaults, some rape and some contemplating suicide as a consequence.” 

Researchers found poor classification of computer misuse crime by authorities and recommends new systems for reporting. They suggest regular monitoring and evaluation of the classifying procedures at Action Fraud and the National Fraud Intelligence Bureau to make sure they are accurate.

  • The report finds that the “Action Fraud” brand has been a barrier to some reporting of crime, and recommends the organisation is renamed the National Fraud and Cybercrime Reporting Centre. It also finds that greater prominence needs to be made of Computer misuse crime on the current Action Fraud website.
  • A review of information on all police force websites about computer misuse crime is also being advised, to ensure a consistency of reporting of such crimes across the country. Researchers found that all police officers and staff should be better trained in understanding what constitutes a Computer misuse crime offence.
  • It is also recommended the National Cyber Security Centre works with key organisations who receive complaints from customers, including banks and social media providers, to encourage victims to report crime through common web links.

Professor Button is hoping the report will serve as a wake-up call to officials in Government and law enforcement. As the number of computer misuse crimes in 2018 was nearly a million yet less than 24k were actually recorded by Action Fraud in the UK.

Computer Weekly:      University of Portsmouth:       Fire Safety Matters:         Image: Nick Youngson

You Might Also Read: 

Cyber Crime Is Over 50% Of All Reported Crime:

 

 

 

 

« Cyber Attacks Knock 7.2% Off The Average Company Share Price
New Analytics Product For Cyber Insurance »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Virtustream

Virtustream

The Virtustream Enterprise Class Cloud provides a secure, highly available, Infrastructure as a Service (IaaS) to enterprises and government customers.

Federal Office For Information Security (BSI) - Germany

Federal Office For Information Security (BSI) - Germany

The BSI (Bundesamt fur Sicherheit in der Informationstechnik) is the federal cyber security agency and the chief architect of secure digitalisation in Germany.

CERT.hr

CERT.hr

CERT.hr is the national authority competent for prevention and protection from computer threats to public information systems in the Republic of Croatia.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

Suprema

Suprema

Suprema is a leading global provider of access control and biometrics solutions.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

TeskaLabs

TeskaLabs

TeskaLabs is a software vendor of cybersecurity and data privacy products.

WiJungle

WiJungle

WiJungle is an Indian Cyber Security Company that develops and markets a unified network security gateway solution.

Agio

Agio

Agio provide Managed IT & Cybersecurity for Financial Firms. Our industry-specific expertise and AI-powered service delivery transform reactive support into proactive prevention.

Privacera

Privacera

Privacera enables consistent data governance, security, and compliance across all your data services - on-premises and in the cloud - so you can maximize the value of your data.

Prodera Group

Prodera Group

Prodera Group is a specialist technology consulting partner trusted to help navigate the complex and dynamic lifecycle of change and transformation.

CISO Global

CISO Global

CISO Global (formerly Cerberus Sentinel) are on a mission to demystify and accelerate our clients’ journey to cyber resilience, empowering organizations to securely grow, operate, and innovate.

Deutsche Gesellschaft für Cybersicherheit (DGC)

Deutsche Gesellschaft für Cybersicherheit (DGC)

As a leading provider of cyber security, DGC supports companies in taking advantage of the opportunities offered by the digital transformation – and in minimizing the associated risks.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.

Downdetector

Downdetector

Downdetector helps people all over the world understand disruptions to vital services such as the internet, social media, web hosting platforms, banks, games, entertainment, and more.

CyberproAI

CyberproAI

CyberproAI is a leading provider of Cyber and AI academies, with in-house proprietary Cyber simulators, and national-level capacity-building programs.