The Victims Of Cybercrime In Britain

The first major British study into victims of computer crime has exposed the serious harm some victim’s experience, as well as barriers to reporting such offences, receiving support, achieving justice and the precarious resources dedicated by the police to cybercrime. 

Changes throughout the entire system are being recommended to better serve the needs of victims, and help protect others in the future. 

These include changing the name of Action Fraud, reforming websites offering support, better training for police staff working with victims and dedicating more permanent resources in the police to fighting this crime, among many others.

Computer misuse crime is a legal term relating to unauthorised access to computers, data or networks which can involve hacking, intentional virus infections, Denial of Service attacks and ransomware. In the year ending 2018, it accounted for 9% of all reported crime in the Crime Survey for England and Wales.

Researchers at the University of Portsmouth were commissioned by the Home Office and Her Majesty’s Inspectorate of Constabulary, Fire and Rescue Services to assess the nature and impact of crime related to misuse of computers, and the support provided to those affected by it. They interviewed 52 victims of computer misuse and conducted a survey of 252 victims.

Computer misuse crime is a legal term relating to unauthorised access to computers, data or networks, which can involve; hacking, intentional virus infections, denial of service attacks and ransomware. In the year ending 2018 it accounted for 9 per cent of all reported crime in the Crime Survey for England and Wales (CSEW).

Professor Mark Button , Director of the Centre for Counter Fraud Studies at the Institute of Criminal Justice Studies, University of Portsmouth led the team of academics who have interviewed victims and compiled the report and recommendations. He said: “There has been a perception that cyber-crimes don’t have as bad an impact as some physical crimes, but this report shows that computer misuse crime has similar, and in some cases a worse impact, than comparable traditional crimes such as burglary. We found victims who compared the cyber-attacks to physical assaults, some rape and some contemplating suicide as a consequence.” 

Researchers found poor classification of computer misuse crime by authorities and recommends new systems for reporting. They suggest regular monitoring and evaluation of the classifying procedures at Action Fraud and the National Fraud Intelligence Bureau to make sure they are accurate.

  • The report finds that the “Action Fraud” brand has been a barrier to some reporting of crime, and recommends the organisation is renamed the National Fraud and Cybercrime Reporting Centre. It also finds that greater prominence needs to be made of Computer misuse crime on the current Action Fraud website.
  • A review of information on all police force websites about computer misuse crime is also being advised, to ensure a consistency of reporting of such crimes across the country. Researchers found that all police officers and staff should be better trained in understanding what constitutes a Computer misuse crime offence.
  • It is also recommended the National Cyber Security Centre works with key organisations who receive complaints from customers, including banks and social media providers, to encourage victims to report crime through common web links.

Professor Button is hoping the report will serve as a wake-up call to officials in Government and law enforcement. As the number of computer misuse crimes in 2018 was nearly a million yet less than 24k were actually recorded by Action Fraud in the UK.

Computer Weekly:      University of Portsmouth:       Fire Safety Matters:         Image: Nick Youngson

You Might Also Read: 

Cyber Crime Is Over 50% Of All Reported Crime:

 

 

 

 

« Cyber Attacks Knock 7.2% Off The Average Company Share Price
New Analytics Product For Cyber Insurance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Via Resource

Via Resource

Via Resource specialise in Information and Cyber Security recruitment in the UK, Europe and USA.

Organization for Security and Co-operation in Europe (OSCE)

Organization for Security and Co-operation in Europe (OSCE)

OSCE is the world's largest security-oriented intergovernmental organization. Areas of activity include Cyber/ICT security.

Nexcom International

Nexcom International

Nexcom operates six global businesses - IoT Automation, Intelligent Digital Security, Internet of Things, Intelligent Platform & Services, Mobile Computing Solutions, Network & Communications.

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

Hellenic Accreditation System (ESYD)

Hellenic Accreditation System (ESYD)

ESYD is the national accreditation body for Greece. The directory of members provides details of organisations offering certification services for ISO 27001.

Outsource UK

Outsource UK

Outsource UK is an independent recruitment company supplying highly-skilled technology, change and engineering talent to clients within a range of specialist sectors including Cyber Security.

TROOPERS

TROOPERS

TROOPERS InfoSec event consists of two days of high-end training, followed by a two-day, three-track conference, culminating in Roundtables on the final day.

Cloud GRC

Cloud GRC

Cloud GRC is an innovative cybersecurity company with solutions and expertise in Cybersecurity Strategies & Frameworks, Threat & Risk Assessment, Cloud Security, and Regulatory Compliance Requirements

ZEBOX

ZEBOX

ZEBOX is an international incubator & accelerator of innovative startups. Focus is on Transport/Logistics and Industry X.0 including technologies such as AI, Blockchain and Cybersecurity.

Rizikon Assurance

Rizikon Assurance

Rizikon Assurance is an Online System that improves Third-Party Assurance and Risk Management, through efficiency, automation and better visibility.

PNGCERT

PNGCERT

PNGCERT is the national Computer Emergency Response Team (CERT) for Papua New Guinea.

Cyber Command - Romania

Cyber Command - Romania

Cyber Command represents the military authority responsible for the development, protection and resilience of military IT networks and services that support the Romanian Force Structure.

Periculus

Periculus

Periculus makes managing digital risk simple. Its integrated platform offers access to purchase cyber insurance and cyber security solutions uniquely tailored to fit the needs of every business.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

Arista Middle East

Arista Middle East

Arista Middle East is part of Global Arista Technologies specializing in OT Cybersecurity.

Data Computer Services

Data Computer Services

Data Computer Services provides professional tailored IT Support and IT Services for businesses throughout Edinburgh and the Lothians.