Feeds

Computer thieves as sophisticated as resellers

PC burglars swot up on latest market research, in-demand brands

  • alert
  • submit to reddit

The essential guide to IT transformation

Computer thieves are stealing to order, selecting their prey by travelling around Britain, according to a new study commissioned by the Home Office. The study, Pulling the Plug on Computer Theft, found that fences selling stolen PCs are so sophisticated they research the market for hot equipment and meet dealers to assess demand prior to the crime. What's more, these techie tea-leaves take up about a third of the phone numbers in the computer sections of free ads newspapers like Loot, says Home office research. One in three were found to be numbers of already convicted dealers. The report said computer theft accounted for 18 per cent of non-domestic burglaries in Britain, costing businesses on average over £2600 per crime, and is as big a problem as credit card fraud. Professional teams are willing to travel to any part of the country, using anti-surveillance techniques to throw police off the scent, and committ repeat thefts. Out of a sample taken of 1048 items of recovered stolen property, there were 477 computers, 372 other items of hardware, 153 printers, 31 word processors, 14 pieces of software and one computer game. Six companies in Salford, Manchester, were investigated for the study, which also pinpointed the robbers' favourite brands of computer. Compaq came out top, accounting for around ten per cent of stolen kit. IBM came a close second with around nine per cent, followed by Hewlett-Packard with seven per cent. Orders for stolen Dells couldn't have been too hot in the North West -– the direct seller lagged behind at under five per cent. ®

Build a business case: developing custom apps

More from The Register

next story
Assange™: Hey world, I'M STILL HERE, ignore that Snowden guy
Press conference: ME ME ME ME ME ME ME (cont'd pg 94)
Premier League wants to PURGE ALL FOOTIE GIFs from social media
Not paying Murdoch? You're gonna get a right LEGALLING - thanks to automated software
Online tat bazaar eBay coughs to YET ANOTHER outage
Web-based flea market struck dumb by size and scale of fail
Amazon takes swipe at PayPal, Square with card reader for mobes
Etailer plans to undercut rivals with low transaction fee offer
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
XBOX One will learn to play media from USB and DLNA sources
Hang on? Aren't those file formats you hardly ever see outside torrents?
Class war! Wikipedia's workers revolt again
Bourgeois paper-shufflers have 'suspended democracy', sniff unpaid proles
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.