TESTIMONIALS

โ€œReceived the latest edition of Professional Security Magazine, once again a very enjoyable magazine to read, interesting content keeps me reading from front to back. Keep up the good work on such an informative magazine.โ€

Graham Penn
ALL TESTIMONIALS
FIND A BUSINESS

Would you like your business to be added to this list?

ADD LISTING
FEATURED COMPANY

The New Technology of Financial Crime

by Mark Rowe

Author: Edited ByDonald Rebovich, James M Byrne

ISBN No: 9781003258100 (ebook)

Review date: 04/03/2026

No of pages: 252

Publisher: Taylor and Francis

Publisher URL:
https://www.routledge.com/The-New-Technology-of-Financial-Crime-New-Crime-Commission/Rebovich-Byrne/p/book/9781032192024

Year of publication: 20/01/2023

Brief:

The New Technology of Financial Crime

price

£39.19 ebook, hardback ยฃ104

Business and everywhere else has gone digital; but so too have the criminals, who have commonly gone into business e-mail compromise and e-mail account compromise, non-payment and non-delivery fraud, and investment scams.

A first chapter looks at the UK official Cybersecurity Breaches Survey, to tease out which cyber measures are effective in preventing breaches and viruses, spam, hacking, and denial of service attacks.

Ironically, for saying that cyber is all about data, and oceans of it, the chapter authors note that private sector cyber victims have been mostly neglected in criminological research, for lack of data.

Naturally, copying what works will save money โ€“ although complicated by the fact that what works for a charity may not work for a business, and what works for a large firm might not for a small one. The authors find that those that invest more financial resources in cyber security are generally more likely to report suffering cyber-attacks and their negative effects. Surely if you spend more on cyber, you should prevent attacks? As the authors say, maybe businesses that are investing in cyber more are doing so because they know they are at risk and seek to mitigate it. In other words, something as basic as the connection between cyber spend and being a victim needs confirming.

Among the suggestions is that โ€˜organisations with institutional e-mail addresses increase the number of attacks they face by almost four times in comparison to companies without organisational e-mail accountsโ€™, and likewise companies with website and social media accounts increase their number of cyber incidents.

Those that prevent their employees from using their personal devices for doing business are doing right, right? The authors find those firms tend to report a larger number of cyber-attacks; but is that because all the fraudulent e-mails are simply going to company devices instead? In sum, โ€˜what worksโ€™ appears far from straightforward. The authors do sum up by pointing to the โ€˜in-house guardianโ€™, of your own cyber security teams, that seem โ€˜to generate the best results for preventing cyber-attacks and their negative impactsโ€™. Your human resources and employeesโ€™ online self-protection by providing training, are the most promising ways to minimise attacks, the authors conclude, rather than โ€˜just basic software protection and guidance about strong passwordsโ€™.

A sign of how cyber is not simply a technical affair but has emotional effects on victims is most explicit in the chapter by the Australian criminologist Cassandra Cross of Queensland University of Technology, whoโ€™s the co-author of a book on cyber frauds with the British criminologist in this field, Prof Mark Button; and indeed the two were speakers at Portmouthโ€™s winter economic crime webinar earlier this week. Dr Cross suggested that investment schemes and cryptocurrencies are driving romance fraud. To return to the chapter in this book, some argue that romance fraud โ€˜can be viewed as a form of advance fee fraudโ€™. Based on data given by victims to the authorities in Australia, via their Scamwatch online reporting, researchers found a โ€˜military narrativeโ€™ used by the fraudster in 375 of 2478 cases; in other words, a fair fraction. Why a military identity? In the first place, to make a connection with a potential victim. In other words, the military ID builds trust with the victim, and the fraudster then asks for money, for help with gaining an inheritances, or because of a medical emergency, after a car crash (which makes the victim feel sympathetic); or some other assistance for family members; or to pay for fees in a criminal justice case, or (to get a bit more specific) gold bars have got stuck in customs and the military veteran needs money to have them released. Or some mix of these stories. The military cover story can help the fraudster by letting them spin a story of a โ€˜need for secrecyโ€™, โ€˜usually framed in terms of security for themselvesโ€™ and perhaps covert โ€˜special missionsโ€™, while โ€˜on dutyโ€™. As with any study, the aim is to understand, in this case to seek reasons why someone becomes a victim of such a fraud. The researchers admit that the reason for victimisation here โ€˜may be more diffuse and less subject to nuanced risk factorsโ€™ than weโ€™d wish. If such fraudsters are getting through because they happen to (brutally) dupe the victim, to โ€˜manipulate and exploit the feelings of love and compassionโ€™, what works to cut that link? The researchers suggest โ€˜continuous messaging to reduce victimsโ€™ likelihood of responding in the first placeโ€™. In other words, itโ€™s for the social media platforms hosting these fraudsters to โ€˜automatically detect, quarantine, filter, or delete social media profiles and private messaging by profilesโ€™. That is, when using dating websites you need to keep โ€˜a healthy amount of skepticism and critical thinkingโ€™.

As ever, singling out these two chapters is unfair because the other chapters have value too, such as the study of Baidu Tieba (a Chinese version of Craigslist) that suggests โ€˜different types of fraud are perpetrated online and that victimisation methods are associated with particular types of mediaโ€™. A later chapter looks at United States identity theft cases, in terms of โ€˜the potential utility of the use of machine learning approachesโ€™ to analysing and tackling such crime. In chapter two, โ€˜phishing evolvesโ€™, thanks to approaches to information technology security people, โ€œhackers,โ€ and academic researchers, we learn that it โ€˜has never been easier to conduct a simple attack, but a good attack requires more effort than ever beforeโ€™. As this shows, the book is creditably international in its net cast (just as, alas, the fraudsters are).

As ever, the value (and value for money) in such a book of essays each of roughly 8000 words, is that you potentially can dip into far more learning – and carry on your study from there – than if you buy one or two books by a single author.