The Victims Of Cybercrime In Britain

The first major British study into victims of computer crime has exposed the serious harm some victim’s experience, as well as barriers to reporting such offences, receiving support, achieving justice and the precarious resources dedicated by the police to cybercrime. 

Changes throughout the entire system are being recommended to better serve the needs of victims, and help protect others in the future. 

These include changing the name of Action Fraud, reforming websites offering support, better training for police staff working with victims and dedicating more permanent resources in the police to fighting this crime, among many others.

Computer misuse crime is a legal term relating to unauthorised access to computers, data or networks which can involve hacking, intentional virus infections, Denial of Service attacks and ransomware. In the year ending 2018, it accounted for 9% of all reported crime in the Crime Survey for England and Wales.

Researchers at the University of Portsmouth were commissioned by the Home Office and Her Majesty’s Inspectorate of Constabulary, Fire and Rescue Services to assess the nature and impact of crime related to misuse of computers, and the support provided to those affected by it. They interviewed 52 victims of computer misuse and conducted a survey of 252 victims.

Computer misuse crime is a legal term relating to unauthorised access to computers, data or networks, which can involve; hacking, intentional virus infections, denial of service attacks and ransomware. In the year ending 2018 it accounted for 9 per cent of all reported crime in the Crime Survey for England and Wales (CSEW).

Professor Mark Button , Director of the Centre for Counter Fraud Studies at the Institute of Criminal Justice Studies, University of Portsmouth led the team of academics who have interviewed victims and compiled the report and recommendations. He said: “There has been a perception that cyber-crimes don’t have as bad an impact as some physical crimes, but this report shows that computer misuse crime has similar, and in some cases a worse impact, than comparable traditional crimes such as burglary. We found victims who compared the cyber-attacks to physical assaults, some rape and some contemplating suicide as a consequence.” 

Researchers found poor classification of computer misuse crime by authorities and recommends new systems for reporting. They suggest regular monitoring and evaluation of the classifying procedures at Action Fraud and the National Fraud Intelligence Bureau to make sure they are accurate.

  • The report finds that the “Action Fraud” brand has been a barrier to some reporting of crime, and recommends the organisation is renamed the National Fraud and Cybercrime Reporting Centre. It also finds that greater prominence needs to be made of Computer misuse crime on the current Action Fraud website.
  • A review of information on all police force websites about computer misuse crime is also being advised, to ensure a consistency of reporting of such crimes across the country. Researchers found that all police officers and staff should be better trained in understanding what constitutes a Computer misuse crime offence.
  • It is also recommended the National Cyber Security Centre works with key organisations who receive complaints from customers, including banks and social media providers, to encourage victims to report crime through common web links.

Professor Button is hoping the report will serve as a wake-up call to officials in Government and law enforcement. As the number of computer misuse crimes in 2018 was nearly a million yet less than 24k were actually recorded by Action Fraud in the UK.

Computer Weekly:      University of Portsmouth:       Fire Safety Matters:         Image: Nick Youngson

You Might Also Read: 

Cyber Crime Is Over 50% Of All Reported Crime:

 

 

 

 

« Cyber Attacks Knock 7.2% Off The Average Company Share Price
New Analytics Product For Cyber Insurance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

Veridify Security

Veridify Security

Veridify Security (formerly SecureRF), develops and licenses quantum-resistant, public-key security tools for the low-resource processors powering the Internet of Things.

Thomas Miller Specialty

Thomas Miller Specialty

Thomas Miller Specialty is a commercial Managing General Agency providing specialty risks insurance including Cyber & e-crime insurance.

Sixgill

Sixgill

Sixgill, an IoT sensor platform company, builds the universal data service and smart process automation software allowing any organization to effectively govern its IoE assets.

CryptoSec.info

CryptoSec.info

CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers.

Granted Consultancy

Granted Consultancy

Granted Consultancy is a business consultancy that specialises in securing funding to support companies with the development and commercialisation of new and innovative products and technologies.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

White Hawk Software

White Hawk Software

White Hawk provides code tamper-proofing solutions to protect mission critical software applications from malicious and Zero day attacks and reverse engineering at run time.

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

Truly Secure

Truly Secure

Truly Secure is an IT Service Provider that ensures greater efficiency and security within a company's technological environment.

Arakyta

Arakyta

Arakÿta specializes in business strategy, work flow process and IT systems for organizations.

Nokod Security

Nokod Security

Nokod Security delivers an application security platform for low-code / no-code custom applications and Robotic Process Automation (RPA).

Sunnic

Sunnic

Sunnic is a leading provider of comprehensive digital data security technology.

WaveLink

WaveLink

WaveLink offers low risk, results-oriented Engineering Services and best-of-class Technical Support Services. Areas of expertise include cyber and security engineering.