Feeds

UK 'full of fraudsters' - survey

Dishonesty rampant in bogus Britain

Providing a secure and efficient Helpdesk

Dishonesty and fraud are widespread in the UK, with nearly half of people quizzed in a survey admitting to forgery and one in ten to low level identity fraud. A quarter of 1,000 Britons polled in a survey by document and identity verification firm TSSI confessed to exaggerating their educational qualifications to gain employment.

TSSI has a vested interest here, of course, in talking up the scope of the very dishonesty among the general public its technology is designed to addresses. Nonetheless we can't help but be impressed by the ability of its researchers to elicit admissions from random punters in train stations that might (were they not anonymous) result in an extended stay at Her Majesty's pleasure.

One in ten of those quizzed by TSSI admitted they had misused ID or access control systems by impersonating someone else or had assisted someone else to do so, while a third (32 per cent) admitted conning their way past security personnel. One in five (21 per cent) owned up to having used fake identity cards.

"Identity fraud is now a major risk to consumers, yet our study shows that low level identity abuse and fraud is commonplace to the extent that it is almost becoming socially acceptable," said Danny Chapchal, TSSI's executive chairman.

Nearly half (45 per cent) of Brits polled in the survey admitted to some kind of forgery. ID cards were by far the most popular item, with 18 per cent admitting to forging these. Other items included doctors notes (five per cent); fake letters on company letterhead (four per cent); reference letters (four per cent); travel tickets (two per cent); concert tickets (one per cent); and tickets for sporting events (one per cent).

Just over one in ten people (12 per cent) owned up to impersonating someone else over email. Seven per cent confessed to assuming another person’s identity through forging their signature on letters or cheques. Meanwhile one in seven (14 per cent) confessed to spying on people entering PINs, pass codes and passwords.

Swindon-based TSSI surveyed 1,000 people between the ages of 18 and 60 at mainland stations in the UK in November in compiling its Dishonest Britain study. The report can be downloaded from TSSI's website here (registration required). ®

New hybrid storage solutions

More from The Register

next story
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
TorrentLocker unpicked: Crypto coding shocker defeats extortionists
Lousy XOR opens door into which victims can shove a foot
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.