Open Access Publisher and Free Library
01-crime.jpg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts tagged cybercrime reporting
Trends in and Characteristics of Cybercrime in NSW.

By Ilya Klauzner, Amy Pisani

  AIM To examine the trends in, major characteristics of, and the police response to cybercrime in NSW. METHOD We extracted data from the ReportCyber Application Platform (RCAP), a national cybercrime reporting system operated by the Australian Cyber Security Centre. Data was analysed over a three-year period from 1 July 2019 to 30 June 2022 and was restricted to incidents where the victim resided in NSW. We separate cybercrime into five offence categories: cyber-enabled fraud, identity theft, cyber-enabled abuse, online image abuse (OIA), and device. We conducted a descriptive analysis on the victim, suspected perpetrator, and report characteristics to report on trends and characteristics of reported cybercrime. We estimated an ordinary least squares regression model to identify factors correlated with a referral to police of reported cybercrime. RESULTS Over the three years to June 2022, there were 39,494 reports of cybercrime where the victim resided in NSW, and more than $404 million reported lost. Cybercrime reports increased by 42%, with all cyber offence categories increasing except cyber abuse. Increases in cyber enabled fraud and identity crime, spurred a corresponding increase in reported cyber crime related financial losses by individuals. Most victims were individuals (89%), male (53%) and over 25 years of age (87%); however, differences in victim type were observed within offence categories. While a high proportion of victims have evidence about the incident (94%), the majority did not know their perpetrator and therefore few reports included suspect details (28%). The majority (71%) of reports were closed by police in RCAP with no further investigation undertaken. Reports were however more likely to be referred to police when the incident involved a victim aged 17 years or younger, the suspect was known to the victim, money was lost, or an OIA offence was indicated. CONCLUSION Our results show that cybercrime in NSW largely follows the same increasing trend that has been observed in national cybercrime studies. However, the statistics we report here only offer a partial view of reported cybercrime in NSW as we do not capture data reported directly to police or other national reporting systems. There are clear benefits in ongoing public reporting of cybercrime trends both at the national level and separately for individual states and territories, which could be enabled by integrating reporting systems and enhancing police data

Bureau Brief no. 165. 

Sydney:  NSW Bureau of Crime Statistics and Research. , 2023. 18p.

Internet Organised Crime Threat Assessment (IOCTA) 2023

By EUROPOL

Cybercrime, in its various forms, represents an increasing threat to the EU. Cyber-attacks, online child sexual exploitation, and online frauds are highly complex crimes and manifest in diverse typologies. Meanwhile the perpetrators behind these crimes are becoming increasingly agile, exploiting new situations created by geopolitical and technological changes. The Internet Organised Crime Assessment (IOCTA) is Europol’s assessment of the cybercrime landscape and how it has changed over the last 24 months. Accompanying this report will be a series of spotlight reports released later this year, each of which examines a specific crime area relating to cybercrime.

Luxembourg: Publications Office of the European Union, 2023 14p.

Improving Cybercrime Reporting in Scotland: A Systematic Literature Review

By Juraj Sikra

I have explored how to improve cybercrime reporting in Scotland by conducting a systematic literature review. Due to the lack of data on Scotland, I have frequently extrapolated from both the UK and the West. The research questions were: 1. What is known about cybercrime in the UK to date? 2. What is known about cybercrime victims in the UK to date? 3. What is known about cybercrime reporting to date? The answers were retrieved by combining Boolean variables with keywords into Scopus, Web of Science and ProQuest. This resulted in the analysis of 100 peer-reviewed articles. This analysis revealed a common trend, a novel taxonomy, and an original conclusion. The common trend is that of responsibilisation, which is the shifting of responsibility for policing cybercrime from the government onto the citizens and private sector, which will inevitably responsibilise consumers. The novel taxonomy is for classifying cybercrime reporting systems according to three pillars, which I referred to as Human-ToHuman (H2H), Human-To-Machine (H2M) and Machine-To-Machine (M2M). The original conclusion is that to improve cybercrime reporting in Scotland, the process needs to be treated also as a social one rather than a purely mathematical one.

Glasgow: University of Strathclyde, 2022. 60p.

Cybercrime: Reporting Mechanisms Vary, and Agencies Face Challenges in Developing Metrics

By Marisol Cruz Cain, Gretta L. Goodwin

Cybercrime, such as hacking and ransomware attacks, is increasing in the United States—leading to billions of dollars in losses and threatening public safety. Several federal agencies work to detect, investigate, and prosecute cybercrimes. Agencies vary in how they collect data on these crimes, and there is no official definition of cybercrime. As a result, this data may not be consistent or complete. In 2022, Congress required the Department of Justice to develop definitions and categories for cybercrimes in its national crime reporting system—which should help law enforcement agencies comprehensively track and monitor these crimes.

Washington DC: U.S. Government Accountability Office, 2023. 40p.

Digest of Cyber Organized Crime

By United Nations Office on Drugs and Crime (UNODC)

The present case digest contains an analysis of cases of cyber organized crime. The digest is global in scope and attempts, to the extent possible, to ensure an equitable representation of cases from different geographical regions and legal systems. On the basis of more than 100 cases from more than 20 jurisdictions, observations are made about the ways in which cyber organized crime is identified in case law and how this illicit activity is investigated, prosecuted and adjudicated across jurisdictions. The case digest examines the structure and organization of cyber organized criminal groups, tools used by perpetrators of cyber organized crime, types of cyber organized crime and procedural issues relating to the investigation, prosecution and adjudication of cyber organized crime cases. The case digest contains summaries of relevant judicial proceedings concerning cyber organized crime, organized according to theme. The ultimate goals of the digest are to identify cases involving cyber organized crime and the manner in which such crime has been investigated, prosecuted and adjudicated in different areas of the world. The digest concludes by identifying challenges to investigating, prosecuting and adjudicating cases involving cyber organized crime, as well as the lessons learned for criminal justice professionals, including some of the challenging aspects of criminal justice responses to such crime.

Vienna: UNODC, 2021.144p.