Feeds

Fraud cost UK at least £13bn in 2005

Identity fraud a hash

Protecting against web application threats using SSL

About £13bn of fraud was committed in the UK in 2005, but the figure could be on the conservative side, a report commissioned by the Association of Chief Police Officers said today.

The report, which examined existing primary data sources about fraud of all types, noted how unreliable much of the data is and how difficult it is to aggregate because of inconsistency in reporting standards.

This has left the police with a dilemma - fraud might be so bad that if we knew the true extent of the crime we would be daunted by the impossibility of finding resources to do anything about it.

"In the light of the very low level of current fraud reporting and the potential enormity of what might follow if victims were encouraged to report all fraud there is a very real danger of raising expectations for official action that might not be able to be met, whether by the police or by any other body," the report said.

The best estimate the ACPO report could make had it that there was £1bn of fraud committed against the financial services industry, £0.93 billion against other businesses, £2.75bn against private individuals.

A whopping £6.43bn was "conservatively estimated" to have been defrauded from the public sector at a national level, while just £0.04bn was defrauded from local bodies.

One of the problems noted in the report is the temptation to report all sources of fraud as identity fraud, rather than treating it as a separate category.

Someone stealing and using a credit card is not committing identity fraud in the same way as someone stealing an identity to apply for a new credit card.

Michael Levi, professor of social sciences at Cardiff University and one of the report authors, said that reports describing levels of identity fraud might be more accurate if they excluded data about stolen credit cards.

He said while stolen credit cards were still important, chip and pin card security was squeezing such theft out of the crime figures. "Criminals might have to make more effort to impersonate someone." ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.