Why Cybercrime Now Exceeds Conventional Crime

cyber-security-laws-5-638.jpg?cb=1426621844

 

Online crime worldwide is increasingly displacing conventional forms of property crime, such as burglary and robbery.

In London, for example, police report that organized crime syndicates have been increasingly embracing cybercrime - in particular, payment card fraud and identity scams - given the potential for a vastly greater return on their investment, as well as much lower risk, UK cybersecurity expert Alan Woodward says in an interview.

"It's no longer the spotty youth in his bedroom, committing some opportunistic crime," says Woodward, a visiting professor at the University of Surrey who is also a cybersecurity adviser to the association of European police agencies known as Europol. "Some of these are very highly orchestrated crimes. They require money and they require some quite sophisticated software to be written. And indeed, 'crime as a service' is actually growing as a genre online."

Earlier this year, London's mayor's office and Metropolitan Police released an online theft and fraud report, noting that 70 percent of all fraud now involves the Internet.

But fraud-related losses may be dramatically underreported. Woodward says that in the UK alone, the City of London Police, which takes the lead on fraud investigations, estimates that £2.2 billion ($3.4 billion) is lost to card fraud every year. But police also suspect that 85 percent of fraud is not being reported by consumers, meaning that annually, actual losses might total £12.1 billion ($18.7 billion).

The good news, however, is that police forces in many countries - not just across Europe, but also in North America - have been conducting joint operations where they have been able to track back crimes, shut down criminal organizations and, in many cases, prosecute suspects. 

However, statements by the UK government that overall crime in the UK is reducing take little account of the substantial increase in cyber crime, which often goes unreported and uninvestigated.

DataBreachToday:

 

 

« Using Threat Intelligence Against Cybercriminals
FBI Urges Firms to Plan For Cyber Attack »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

BruCERT

BruCERT

BruCERT is the referral agency for dealing with computer-related and internet-related security incidents in Brunei Darussalam.

PhishLine

PhishLine

PhishLine helps Information Security Professionals meet and overcome the increasing challenges associated with social engineering and phishing.

MonsterCloud

MonsterCloud

MonsterCloud is a leader in managed cyber security services. Our cyber security team constantly monitors and protects businesses from cyber threats.

Saudi Federation for Cyber Security and Programming (SAFCSP)

Saudi Federation for Cyber Security and Programming (SAFCSP)

SAFCSP is a national institution under the umbrella of the Saudi Arabian Olympic Committee, which seeks to build national and professional capabilities in the fields of cyber security and programming.

Search Guard

Search Guard

Search Guard® is an Open Source security suite for #Elasticsearch and the entire #ELK stack that offers encryption, authentication, authorization, audit logging and multi tenancy.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

Singular Security

Singular Security

Singular Security help public and private organizations minimize cybersecurity risk and pass their IT compliance audit.

Vention

Vention

Vention (formerly iTechArt) is the partner of forward-thinking tech leaders around the globe.

Diaplous Group

Diaplous Group

Diaplous Group is a leading Maritime Risk Management (MRM) provider, delivering specialized services to an ever-broadening portfolio of shipping, oil & gas, energy and construction industries.

Pyxsoft PowerWAF

Pyxsoft PowerWAF

Pyxsoft PowerWAF responds to the problem of business cybersecurity. We protect our clients' websites and data against attacks and exploitation of all kinds of vulnerabilities.

SecAlliance

SecAlliance

SecAlliance is a cyber threat intelligence product and services company.

Valeo Networks

Valeo Networks

Valeo Networks is a full-service Managed Security Service Provider (MSSP). We partner with organizations to remove the burden of technology so that they can focus on growing their business.

Cyber-Security Council Germany

Cyber-Security Council Germany

The German Cyber Security Council's objective is to consult businesses, government agencies and political decision-makers and to support them against cybercrime.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

Palindrome Technologies

Palindrome Technologies

Palindrome Technologies help clients defend against cyberattacks across all attack surfaces, including hardware, software, network-to-cloud, people, and emerging technologies.