10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

measure all other statistical outputs still remains a major issue in understanding<br />

cybercrime. 9<br />

Here are some <strong>of</strong> the conclusions provided by the main existing sources:<br />

Trends on information security threats are published regularly by security firms in<br />

what are generally named ‘white papers’ and technical reports, although they might be<br />

better described as commercial intelligence bulletins. 10 These reports provide useful<br />

updates on the latest threats and trends and are mainly oriented to their potential<br />

clients – businesses and the public. Their statistics need to be read cautiously since they<br />

will inevitably be shaped by different methodologies and may be linked to the marketing<br />

<strong>of</strong> protection packages <strong>of</strong>fered by the different security companies. This is also why<br />

these reports <strong>of</strong>ten contradict each other. 11 Additionally, the accuracy <strong>of</strong> their statistics<br />

has been questioned, not least as research that indicates exponential and dramatic<br />

growth trends can do much to aid sales <strong>of</strong> security s<strong>of</strong>tware. 12<br />

Figures on victimisation are collected by the Internet <strong>Crime</strong> Complaint Center (IC3), 13<br />

a joint operation between the FBI and the US's National White Collar <strong>Crime</strong> Center. 14 IC3<br />

records international complaints about cybercrime, though most come from within the<br />

US. In the UK, the National Fraud Reporting Centre (NFRC) is expected to become<br />

operative during 2009, as part <strong>of</strong> the recently established Police Central e-<strong>Crime</strong> Unit<br />

(PCeU). The NFRC will, in due course, <strong>of</strong>fer a single contact centre for the public to<br />

report all frauds, including those online.<br />

include a classification scheme for recording the incidence <strong>of</strong> all forms <strong>of</strong> e-crime”. House <strong>of</strong> the Lords Science<br />

and Technology Committee, ‘Personal Internet Security’, 5th Report <strong>of</strong> Session 2006–07.<br />

9 Wall, D. (2007), Cybercrime: The Transformation <strong>of</strong> <strong>Crime</strong> in the Information Age, Polity Press, UK.<br />

10 Some <strong>of</strong> the most widely quoted in the news and research papers include those from Symantec, Sophos,<br />

MacAfee, Kaspersky, MessageLabs, Websense and Finjan. The term ‘white paper’ does not refer to a<br />

government policy document.<br />

11 For instance, Kaspersky report (2005) predicted the gradual change in type <strong>of</strong> attacks moving away from<br />

targeting end users to direct attacks on sites and site owners with valuable information for cybercriminals.<br />

Meanwhile, Finjan (2007) reported that the nature <strong>of</strong> cybercrime has changed dramatically in the last 10 years<br />

and criminals have started targeting the user and not the system. Kaspersky (2005), ‘The Changing Threat:<br />

from pranksters to pr<strong>of</strong>essionals’; Finjan (2007), Web Security Trends Report - Q3/2007.<br />

12 John Leyden, “Lies, damned lies and anti-virus statistics”, The Register, 16 th January 2002.<br />

13 See www.ic3.gov.<br />

14 See www.nw3c.org.<br />

Page 13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!