The Victims Of Cybercrime In Britain

The first major British study into victims of computer crime has exposed the serious harm some victim’s experience, as well as barriers to reporting such offences, receiving support, achieving justice and the precarious resources dedicated by the police to cybercrime. 

Changes throughout the entire system are being recommended to better serve the needs of victims, and help protect others in the future. 

These include changing the name of Action Fraud, reforming websites offering support, better training for police staff working with victims and dedicating more permanent resources in the police to fighting this crime, among many others.

Computer misuse crime is a legal term relating to unauthorised access to computers, data or networks which can involve hacking, intentional virus infections, Denial of Service attacks and ransomware. In the year ending 2018, it accounted for 9% of all reported crime in the Crime Survey for England and Wales.

Researchers at the University of Portsmouth were commissioned by the Home Office and Her Majesty’s Inspectorate of Constabulary, Fire and Rescue Services to assess the nature and impact of crime related to misuse of computers, and the support provided to those affected by it. They interviewed 52 victims of computer misuse and conducted a survey of 252 victims.

Computer misuse crime is a legal term relating to unauthorised access to computers, data or networks, which can involve; hacking, intentional virus infections, denial of service attacks and ransomware. In the year ending 2018 it accounted for 9 per cent of all reported crime in the Crime Survey for England and Wales (CSEW).

Professor Mark Button , Director of the Centre for Counter Fraud Studies at the Institute of Criminal Justice Studies, University of Portsmouth led the team of academics who have interviewed victims and compiled the report and recommendations. He said: “There has been a perception that cyber-crimes don’t have as bad an impact as some physical crimes, but this report shows that computer misuse crime has similar, and in some cases a worse impact, than comparable traditional crimes such as burglary. We found victims who compared the cyber-attacks to physical assaults, some rape and some contemplating suicide as a consequence.” 

Researchers found poor classification of computer misuse crime by authorities and recommends new systems for reporting. They suggest regular monitoring and evaluation of the classifying procedures at Action Fraud and the National Fraud Intelligence Bureau to make sure they are accurate.

  • The report finds that the “Action Fraud” brand has been a barrier to some reporting of crime, and recommends the organisation is renamed the National Fraud and Cybercrime Reporting Centre. It also finds that greater prominence needs to be made of Computer misuse crime on the current Action Fraud website.
  • A review of information on all police force websites about computer misuse crime is also being advised, to ensure a consistency of reporting of such crimes across the country. Researchers found that all police officers and staff should be better trained in understanding what constitutes a Computer misuse crime offence.
  • It is also recommended the National Cyber Security Centre works with key organisations who receive complaints from customers, including banks and social media providers, to encourage victims to report crime through common web links.

Professor Button is hoping the report will serve as a wake-up call to officials in Government and law enforcement. As the number of computer misuse crimes in 2018 was nearly a million yet less than 24k were actually recorded by Action Fraud in the UK.

Computer Weekly:      University of Portsmouth:       Fire Safety Matters:         Image: Nick Youngson

You Might Also Read: 

Cyber Crime Is Over 50% Of All Reported Crime:

 

 

 

 

« Cyber Attacks Knock 7.2% Off The Average Company Share Price
New Analytics Product For Cyber Insurance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

CANVAS Consortium

CANVAS Consortium

The CANVAS Consortium aims to unify technology developers with legal and ethical scholar and social scientists to approach the challenges of cybersecurity.

Zivver

Zivver

Zivver is the effortless, secure email platform, powering the next generation of secure communications.

Vitrociset

Vitrociset

Vitrociset design complex systems for defence, homeland security, space and transport. Activities include secure communications and cybersecurity.

Ubiq Security

Ubiq Security

Ubiq has developed a software solution that secures any type of data, on any device, anywhere, with nearly no impact to system performance or user experience.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

Cynerio

Cynerio

Cynerio develops cybersecurity protections for medical devices, comparing network behavior with a database of medical workflows.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

Secmation

Secmation

Secmation are an agile engineering services firm providing advanced DoD level security design and consultation services for both commercial and defense hardware and software applications.

Fortified Health Security

Fortified Health Security

Fortified’s team of cybersecurity specialists is dedicated to helping healthcare providers, payers and business associates protect their patient data across the Fortified Healthcare Ecosystem.

Xperience

Xperience

Xperience solves our clients’ toughest challenges by delivering business efficiency through digital transformation solutions across cloud, managed IT, CRM and ERP.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

Hakai Security

Hakai Security

Hakai is a consulting firm specializing in information security that offers customized services and products to meet the needs and goals of each business.