Why Cybercrime Now Exceeds Conventional Crime

cyber-security-laws-5-638.jpg?cb=1426621844

 

Online crime worldwide is increasingly displacing conventional forms of property crime, such as burglary and robbery.

In London, for example, police report that organized crime syndicates have been increasingly embracing cybercrime - in particular, payment card fraud and identity scams - given the potential for a vastly greater return on their investment, as well as much lower risk, UK cybersecurity expert Alan Woodward says in an interview.

"It's no longer the spotty youth in his bedroom, committing some opportunistic crime," says Woodward, a visiting professor at the University of Surrey who is also a cybersecurity adviser to the association of European police agencies known as Europol. "Some of these are very highly orchestrated crimes. They require money and they require some quite sophisticated software to be written. And indeed, 'crime as a service' is actually growing as a genre online."

Earlier this year, London's mayor's office and Metropolitan Police released an online theft and fraud report, noting that 70 percent of all fraud now involves the Internet.

But fraud-related losses may be dramatically underreported. Woodward says that in the UK alone, the City of London Police, which takes the lead on fraud investigations, estimates that £2.2 billion ($3.4 billion) is lost to card fraud every year. But police also suspect that 85 percent of fraud is not being reported by consumers, meaning that annually, actual losses might total £12.1 billion ($18.7 billion).

The good news, however, is that police forces in many countries - not just across Europe, but also in North America - have been conducting joint operations where they have been able to track back crimes, shut down criminal organizations and, in many cases, prosecute suspects. 

However, statements by the UK government that overall crime in the UK is reducing take little account of the substantial increase in cyber crime, which often goes unreported and uninvestigated.

DataBreachToday:

 

 

« Using Threat Intelligence Against Cybercriminals
FBI Urges Firms to Plan For Cyber Attack »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Opengear

Opengear

Opengear ensures network resilience to enterprises by enabling business continuity with the Network Resilience Platform.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

Cyber Security Capital (CS^)

Cyber Security Capital (CS^)

Cyber Security Capital is a consultancy helping to mobilise and empower individuals, corporate leaders and entrepreneurs in cyber security.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

Lynx Technology Partners

Lynx Technology Partners

Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm.

Cycuity

Cycuity

Cycuity (formerly Tortuga Logic) is a cybersecurity company that is transforming the way we secure silicon with comprehensive hardware security assurance.

Guardian Data Destruction

Guardian Data Destruction

Guardian Data Destruction provides a comprehensive suite of onsite e-data destruction services.

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

Quantum Security

Quantum Security

Quantum's game-changing approach to cybersecurity brings you performance and peace-of-mind, with a raft of additional benefits: it's non-proprietary, comprehensive, scalable, and affordable.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

Logically.ai

Logically.ai

Logically combines artificial intelligence with expert analysts to tackle harmful and manipulative content at speed and scale.

AddSecure

AddSecure

AddSecure is a leading European provider of secure IoT connectivity and end-to-end solutions.

SecureClaw

SecureClaw

SecureClaw offers specialized cybersecurity consultation, various products, and a range of services to meet your company's business domain needs.

AccessIT Group

AccessIT Group

AccessIT Group is a specialized cybersecurity solutions provider offering a full range of advanced security services.

eGyanamTech (EGT)

eGyanamTech (EGT)

eGyanamTech provides robust security solutions tailored for Operational Technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems used in critical infrastructure systems.

Cyber Castellum

Cyber Castellum

Cyber Castellum is a cybersecurity consulting firm that specializes in the identification of security vulnerabilities in an organization’s technology landscape.