The Victims Of Cybercrime In Britain

The first major British study into victims of computer crime has exposed the serious harm some victim’s experience, as well as barriers to reporting such offences, receiving support, achieving justice and the precarious resources dedicated by the police to cybercrime. 

Changes throughout the entire system are being recommended to better serve the needs of victims, and help protect others in the future. 

These include changing the name of Action Fraud, reforming websites offering support, better training for police staff working with victims and dedicating more permanent resources in the police to fighting this crime, among many others.

Computer misuse crime is a legal term relating to unauthorised access to computers, data or networks which can involve hacking, intentional virus infections, Denial of Service attacks and ransomware. In the year ending 2018, it accounted for 9% of all reported crime in the Crime Survey for England and Wales.

Researchers at the University of Portsmouth were commissioned by the Home Office and Her Majesty’s Inspectorate of Constabulary, Fire and Rescue Services to assess the nature and impact of crime related to misuse of computers, and the support provided to those affected by it. They interviewed 52 victims of computer misuse and conducted a survey of 252 victims.

Computer misuse crime is a legal term relating to unauthorised access to computers, data or networks, which can involve; hacking, intentional virus infections, denial of service attacks and ransomware. In the year ending 2018 it accounted for 9 per cent of all reported crime in the Crime Survey for England and Wales (CSEW).

Professor Mark Button , Director of the Centre for Counter Fraud Studies at the Institute of Criminal Justice Studies, University of Portsmouth led the team of academics who have interviewed victims and compiled the report and recommendations. He said: “There has been a perception that cyber-crimes don’t have as bad an impact as some physical crimes, but this report shows that computer misuse crime has similar, and in some cases a worse impact, than comparable traditional crimes such as burglary. We found victims who compared the cyber-attacks to physical assaults, some rape and some contemplating suicide as a consequence.” 

Researchers found poor classification of computer misuse crime by authorities and recommends new systems for reporting. They suggest regular monitoring and evaluation of the classifying procedures at Action Fraud and the National Fraud Intelligence Bureau to make sure they are accurate.

  • The report finds that the “Action Fraud” brand has been a barrier to some reporting of crime, and recommends the organisation is renamed the National Fraud and Cybercrime Reporting Centre. It also finds that greater prominence needs to be made of Computer misuse crime on the current Action Fraud website.
  • A review of information on all police force websites about computer misuse crime is also being advised, to ensure a consistency of reporting of such crimes across the country. Researchers found that all police officers and staff should be better trained in understanding what constitutes a Computer misuse crime offence.
  • It is also recommended the National Cyber Security Centre works with key organisations who receive complaints from customers, including banks and social media providers, to encourage victims to report crime through common web links.

Professor Button is hoping the report will serve as a wake-up call to officials in Government and law enforcement. As the number of computer misuse crimes in 2018 was nearly a million yet less than 24k were actually recorded by Action Fraud in the UK.

Computer Weekly:      University of Portsmouth:       Fire Safety Matters:         Image: Nick Youngson

You Might Also Read: 

Cyber Crime Is Over 50% Of All Reported Crime:

 

 

 

 

« Cyber Attacks Knock 7.2% Off The Average Company Share Price
New Analytics Product For Cyber Insurance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

CQS (Certified Quality Systems)

CQS (Certified Quality Systems)

CQS is an organisation specialising in ISO assessment and certification, including ISO 27001, along with other management system standards.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

CS Group

CS Group

CS Group offers a complete range of security solutions from consultancy to security maintenance and from secure infrastructure design to security governance.

Arm

Arm

Arm delivers a complete IoT solution, from providing the IP for the chip to delivering the cloud services to securely manage the deployment of products throughout their lifecycle.

Salviol Global Analytics

Salviol Global Analytics

Salviol Global Analytics is a leading provider of Fraud, Risk and Operational Performance Solutions to a number of vertical markets including Insurance, Banking, Utilities, Telco’s and Government.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

Cytenna

Cytenna

Cytenna Signal is a suite of SaaS (Software-as-a-Service) products that use AI and machine learning to automatically aggregate the latest information about software vulnerabilities.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

CICRA Consultancies

CICRA Consultancies

Cicra Consultancies is a company that specializes in cyber security. Our major activities are guided by three main principles: Prevent, Investigate, Prosecute.

Execweb

Execweb

Execweb are a cybersecurity executive network, comprised of 400+ security practitioners who work at Fortune 500 and SME companies.

RealDefense

RealDefense

RealDefense develops and markets various privacy, security and optimization technologies and services for consumers and small businesses.

ThreatDown

ThreatDown

ThreatDown, powered by Malwarebytes, is on a mission to overpower threats and empower IT by removing the complexity of detecting and stopping today’s most advanced threats.

Dispel

Dispel

Dispel makes the fastest secure remote access for industrial networks. Built by operators for operators: a zero trust engine for your entire OT, IoT, and xIoT stack.

XONA Systems

XONA Systems

XONA is The Zero Trust user access platform for the OT enterprise. Secure operational access to critical systems - from anywhere.

Neo Auth

Neo Auth

Neo Auth is an identity and access management solution to help organizations optimize their cybersecurity processes.