Printer Friendly

Hackers top list of cybercriminals.

A review of cybercrime incidents reported around the world between January 2002 and March 2003 shows that general hacking--where the perpetrators had "no connection to the company" and "acted not for financial gain but for political reasons, sheer vandalism, or as a show of their hacking skills"--was by Far the most common type of cybercrime reported, followed by hacking for financial gain and crimes committed against organizations by disgruntled former employees.

The report, by the International Chamber of Commerce's Commercial Crime Services (CCS), also details the types of Web-based fraud reported to law enforcement. Fraud types were divided into social engineering scams (which accounted for almost half of the incidents), get-rich-quick schemes, identity theft, and fake documents.

Also noted in the report is the percentage of arrests for each hacking category. A third of arrests/convictions were for those in the "general hacking" category, with 18 percent in the "hacking for financial gain" category; however, only 3 percent of current employees who hacked for financial gain were arrested or convicted.

The report looks in detail at more than 80 cases, giving the date, type of attack, the country (when known) where the perpetrator was arrested, and a brief narration of the crime. More than 60 percent of the crimes detailed in the report occurred in the United States.

Steven Matz, a senior analyst with the cybercrime unit of the CCS, says that this finding does not necessarily mean that most cybercrimes target American companies or that most cybercriminals are American, but rather that cybercrimes likely go unreported in other countries. "One of the aims of the review and our organization is, therefore, to gather more information on cybercrime occurring outside of" the U.S. in other countries and regions," he says.

The methodology of the review was for researchers to rely primarily on sources in the public domain, according to Matz. Thus, at the end of the process, researchers also had a better idea of which regions lack good data.

@ Find the full "Cybercrime Review" by pointing your browser to www.sccuritymanagement.com.
COPYRIGHT 2003 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2003 Gale, Cengage Learning. All rights reserved.

 Reader Opinion

Title:

Comment:



 

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:International Chamber of Commerce's Commercial Crime Services report
Author:Piazza, Peter
Publication:Security Management
Geographic Code:00WOR
Date:Aug 1, 2003
Words:344
Previous Article:Technology against terrorism.
Next Article:Financial companies focus on InfoSec.
Topics:


Related Articles
Cyberswindle!
Send the Cypercops.
International Chamber of Commerce.
Brits Invest in Beating Cybercrime.
Punishing computer criminals. (Tech Talk).
US Consulate in Russia attacked by hackers.
Securing online transactions: crime prevention is the key.
A compelling argument for automated code testing.
Cybercriminals Reinvent Methods of Malicious Attacks, According to Trend Micro Threat Roundup Report.

Terms of use | Copyright © 2014 Farlex, Inc. | Feedback | For webmasters