Cyberfraud and the implications for effective risk-based responses: themes from UK research
- 1.2k Downloads
The nature of the risk or threat posed by ‘cyberfraud’ - fraud with a cyber dimension – is examined empirically based on data reported by the public and business to Action Fraud. These are used to examine the implications for a more effective risk-based response, both by category of fraud and also responding to cyberfraud generally, not just in the UK. A key characteristics of cyberfraud is that it can be globalised, unless there are major national differences in attractiveness of targets or in the organisation of control. This does not mean that all cyberfraud is international, however: not only do some involve face to face interactions at some stage of the crime cycle, but in online auction selling frauds, it appears to be common for the perpetrators and victims to reside in the same country. After reviewing patterns and costs of victimisation and their implications for control, the paper concludes that any law enforcement response must begin by being strategic: which other public and private sector bodies should be involved to do what; what should be the specific roles and responsibilities of the police and where ‘problem ownership’ should lie; what are we willing to pay for (in money and effort) for greater cybersecurity and how to reduce ‘market failure’ in its supply; and, how that security is going to be organised for and/or by the huge numbers of businesses and people that are (potentially) affected.
KeywordsFinancial Gain Voice Over Internet Protocol Potential Victim Economic Crime Acquisitive Crime
- 4.Levi, M. and Williams, M. L. (2012). eCrime reduction partnership mapping study: final report. Cardiff University. Available at: http://www.cardiff.ac.uk/socsi/resources/Levi%20Williams%20eCrime%20Reduction%20Partnership%20Mapping%20Study.pdf.
- 5.Crawford, A., Lister, S., Blackburn, S., & Burnett, J. (2005). Plural policing: the mixed economy of visible patrols in England and Wales. Bristol: Policy Press.Google Scholar
- 6.Levi, M., & Maguire, M. (2012). Something old, something new; something not entirely blue: Uneven and shifting modes of crime control. In T. Newburn & J. Peay (Eds.), Policing: politics, culture and control. Oxford: Hart Publishing.Google Scholar
- 11.Levi, M., Doig, A., Wall, D., Gundur, R., & Williams, M. (2015a). The implications of economic cybercrime for policing. Report. London: City of London Corporation.Google Scholar
- 12.Levi, M., Doig, A., Wall, D., Gundur, R., & Williams, M. (2015b). The implications of economic cybercrime for policing. Technical Annexe. London: City of London Corporation.Google Scholar
- 13.Attorney General (2006). Fraud review. London: Office of the Attorney General, http://webarchive.nationalarchives.gov.uk/20120816224015/http://www.lslo.gov.uk/pdf/FraudReview.pdf.
- 14.Wall, D.S. (2005). The internet as a conduit for criminals. In A. Pattavina (ed), Information technology and the criminal justice system (pp. 77–98). Thousand Oaks: Sage (revised 2015) Available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=740626.
- 15.ONS (2016). Overview of fraud statistics: year ending Mar 2016. London: Office of National Statistics.Google Scholar
- 16.Wall, D. (2010). Micro-frauds: virtual robberies, stings and scams in the information age’. In T. Holt & B. Schell (Eds.), Corporate hacking and technology driven crime: social dynamics and implications (pp. 68–85). Hershey, PA: IGI Global.Google Scholar
- 17.Home Affairs Committee (2016) Proceeds of crime: Fifth Report of Session 2016–17. London: House of CommonsGoogle Scholar
- 18.Metcalf, L. and Spring, J. (2015). Blacklist ecosystem analysis: Spanning Jan 2012 to Jun 2014, http://www.sigsac.org/ccs/CCS2015/, pp.13–22.
- 19.Spring, J. (2014). Modeling malicious domain name take-down dynamics: why eCrime pays. https://resources.sei.cmu.edu/asset_files/ConferencePaper/2014_021_001_88269.pdf.