Author: Edited ByDonald Rebovich, James M Byrne
ISBN No: 9781003258100 (ebook)
Review date: 04/03/2026
No of pages: 252
Publisher: Taylor and Francis
Publisher URL:
https://www.routledge.com/The-New-Technology-of-Financial-Crime-New-Crime-Commission/Rebovich-Byrne/p/book/9781032192024
Year of publication: 20/01/2023
Brief:
The New Technology of Financial Crime
Business and everywhere else has gone digital; but so too have the criminals, who have commonly gone into business e-mail compromise and e-mail account compromise, non-payment and non-delivery fraud, and investment scams.
A first chapter looks at the UK official Cybersecurity Breaches Survey, to tease out which cyber measures are effective in preventing breaches and viruses, spam, hacking, and denial of service attacks.
Ironically, for saying that cyber is all about data, and oceans of it, the chapter authors note that private sector cyber victims have been mostly neglected in criminological research, for lack of data.
Naturally, copying what works will save money โ although complicated by the fact that what works for a charity may not work for a business, and what works for a large firm might not for a small one. The authors find that those that invest more financial resources in cyber security are generally more likely to report suffering cyber-attacks and their negative effects. Surely if you spend more on cyber, you should prevent attacks? As the authors say, maybe businesses that are investing in cyber more are doing so because they know they are at risk and seek to mitigate it. In other words, something as basic as the connection between cyber spend and being a victim needs confirming.
Among the suggestions is that โorganisations with institutional e-mail addresses increase the number of attacks they face by almost four times in comparison to companies without organisational e-mail accountsโ, and likewise companies with website and social media accounts increase their number of cyber incidents.
Those that prevent their employees from using their personal devices for doing business are doing right, right? The authors find those firms tend to report a larger number of cyber-attacks; but is that because all the fraudulent e-mails are simply going to company devices instead? In sum, โwhat worksโ appears far from straightforward. The authors do sum up by pointing to the โin-house guardianโ, of your own cyber security teams, that seem โto generate the best results for preventing cyber-attacks and their negative impactsโ. Your human resources and employeesโ online self-protection by providing training, are the most promising ways to minimise attacks, the authors conclude, rather than โjust basic software protection and guidance about strong passwordsโ.
A sign of how cyber is not simply a technical affair but has emotional effects on victims is most explicit in the chapter by the Australian criminologist Cassandra Cross of Queensland University of Technology, whoโs the co-author of a book on cyber frauds with the British criminologist in this field, Prof Mark Button; and indeed the two were speakers at Portmouthโs winter economic crime webinar earlier this week. Dr Cross suggested that investment schemes and cryptocurrencies are driving romance fraud. To return to the chapter in this book, some argue that romance fraud โcan be viewed as a form of advance fee fraudโ. Based on data given by victims to the authorities in Australia, via their Scamwatch online reporting, researchers found a โmilitary narrativeโ used by the fraudster in 375 of 2478 cases; in other words, a fair fraction. Why a military identity? In the first place, to make a connection with a potential victim. In other words, the military ID builds trust with the victim, and the fraudster then asks for money, for help with gaining an inheritances, or because of a medical emergency, after a car crash (which makes the victim feel sympathetic); or some other assistance for family members; or to pay for fees in a criminal justice case, or (to get a bit more specific) gold bars have got stuck in customs and the military veteran needs money to have them released. Or some mix of these stories. The military cover story can help the fraudster by letting them spin a story of a โneed for secrecyโ, โusually framed in terms of security for themselvesโ and perhaps covert โspecial missionsโ, while โon dutyโ. As with any study, the aim is to understand, in this case to seek reasons why someone becomes a victim of such a fraud. The researchers admit that the reason for victimisation here โmay be more diffuse and less subject to nuanced risk factorsโ than weโd wish. If such fraudsters are getting through because they happen to (brutally) dupe the victim, to โmanipulate and exploit the feelings of love and compassionโ, what works to cut that link? The researchers suggest โcontinuous messaging to reduce victimsโ likelihood of responding in the first placeโ. In other words, itโs for the social media platforms hosting these fraudsters to โautomatically detect, quarantine, filter, or delete social media profiles and private messaging by profilesโ. That is, when using dating websites you need to keep โa healthy amount of skepticism and critical thinkingโ.
As ever, singling out these two chapters is unfair because the other chapters have value too, such as the study of Baidu Tieba (a Chinese version of Craigslist) that suggests โdifferent types of fraud are perpetrated online and that victimisation methods are associated with particular types of mediaโ. A later chapter looks at United States identity theft cases, in terms of โthe potential utility of the use of machine learning approachesโ to analysing and tackling such crime. In chapter two, โphishing evolvesโ, thanks to approaches to information technology security people, โhackers,โ and academic researchers, we learn that it โhas never been easier to conduct a simple attack, but a good attack requires more effort than ever beforeโ. As this shows, the book is creditably international in its net cast (just as, alas, the fraudsters are).
As ever, the value (and value for money) in such a book of essays each of roughly 8000 words, is that you potentially can dip into far more learning – and carry on your study from there – than if you buy one or two books by a single author.




