Extending the crime survey to include fraud and cyber Joseph Traynor.

Slides:



Advertisements
Similar presentations
Offending Crime and Justice Survey Stephen Roe Crime Surveys Programme, Home Office Tel:
Advertisements

THE BRITISH CRIME SURVEY: PRESENTATION TO THE BCS USER GROUP 11 December 2007 Progress with data archiving Last meeting we described our review of current.
Duty Officer Call Response Training A Whole-Task Learning Approach.
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Copyright 2010, The World Bank Group. All Rights Reserved. Police Statistics, Crime, Criminals and Resources Part 1 Crime, Justice & Security Statistics.
Purdue University Calumet Counseling Center Gyte
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
Their Strengths and Limitations. 1. Practically – available for free 2. More detail as there are more categories of crime than with the British Crime.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
The British Crime Survey Face to face interviews with a sample of adults (16+) living in private households in England and Wales Measures crime victimisation.
NATIONAL CRIME AND SAFETY SURVEY: SUMMARY REPORT 2012.
Getting maximum value from the SCJS Scottish Crime Statistics User Event Neil Grant, Justice Analytical Services 6 October SGJusticeAnalys.
Internet Fraud By: Noelle Woodman.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Victim Surveys Part 1 Crime, Justice & Security Statistics
Foundation Degree IT Project Methodologies (for reference)
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
The Crime Picture Chapter 2 Frank Schmalleger Criminal Justice Today 13 th Edition.
Kelvin Doherty Assistant Director Youth Justice Agency Children England Annual Conference 27/2/2013.
Youth Justice Convention 24 November 2010 Kelvin Doherty Assistant Director Youth Justice Agency.
How much do you know about stalking?. How many women in Britain are stalked at some point in their adult life? (between ages of 16 – 59) A) 1 in 3 B)
To know each other 1.Self introduction (name, affiliation, an adjective) 2.Involved in data production and analysis? 3.Do you know about UN-CTS? 4.Do you.
Protecting Society and helping keep people safe THE CHANGING NATURE OF POLICING SIR PETER FAHY Chief Constable.
Devon & Cornwall Police Authority Performance Management Committee Performance Summary November 26th 2008 Agenda Item 4.
Chapter Four Managing Marketing Information. Copyright 2007, Prentice Hall, Inc.4-2 The Importance of Marketing Information  Companies need information.
The Official Statistics Debate Relevant names and issues to mention in your essay work.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
Criminal Statistics The measurement of Crime. Official Statistics Official Statistics comprise those collected by various government agencies, such as:
Copyright 2010, The World Bank Group. All Rights Reserved. International Statistics Part 2 Crime, Justice & Security Statistics Produced in Collaboration.
Copyright 2010, The World Bank Group. All Rights Reserved. Background and governance Part 2 Crime, Justice & Security Statistics Produced in Collaboration.
Bosnia & Herzegovina Statistical Training Prosecution / Courts Session 4, November 22nd Overview of the Criminal Justice System and Statistics – Recording.
Copyright © 2012 Carolina Academic Press Chapter 1: Crime in California Georgia Spiropoulos.
Catherine Millington Scottish Crime and Justice Survey,
Topic 5: Basic Security.
DEVELOPMENTS IN AUSTRALIAN CRIME VICTIMISATION SURVEYS.
Get Safe Online Expert advice for everyone In association with.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
17-18 February 2011 Draft list of the variables to be included in the delegated act. Variables to be reduced.
Measuring Violence Against Women in Australia Horst Posselt Director Family & Community Statistics Australian Bureau of Statistics UNECE Work Session on.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
7 th Grade Civics Miss Smith *pgs  Crime- any act that breaks the law and for which there is a punishment  Criminal- a person who commits.
18-20 October 2004 Work Session on Gender Statistics: Gerry Brady, CSO, Ireland1 Statistics on Violence against Women Review of Module on Crime and Victimisation.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
1 Protecting Communities: Managing Harm 22 nd February 2016 Chief Constable Simon Cole QPM leics.police.uk.
Chief Constables Performance Report April To provide a high quality public service focussed on reducing harm to the most vulnerable.
Crimes By 丘丽香 519. Crimes  Britain Britain  China China   In both countries, crimes against property are the most frequently committed crimes.
Component D: Activity D.3: Surveys Department EU Twinning Project.
Chief Constables Performance Report February 2016 OFFICIAL| FOIA - OPEN.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Chief Constables Performance Report September 2014.
Chief Constables Performance Report December 2015 OFFICIAL| FOIA - OPEN.
POLICING IN YOUR NEIGHBOURHOOD Future changes to policing in Surrey.
Use of handheld electronic devices for data collection in GeoStat
Working Group Meeting: Statistics on Crime and Criminal Justice 15 March 2017, Luxembourg Review of 2016 joint Eurostat-UNODC data collection Solène.
Background to the development of a European Victimisation Survey
Existing sources at international level Doc. ESDTAT/D6/CR/04
Machine Learning and Verbatim Survey Response
How is Crime Measured Uniform Crime Report (UCR)
Conducting surveys on violence against children in the UK
Revised Questionnaire EU Survey Eurostat, June, Prof Jan Van Dijk
Project on translating and testing a victimisation survey module
Monthly Performance Update
Monthly Performance Update
Monthly Performance Update
Monthly Performance Update
Presentation transcript:

Extending the crime survey to include fraud and cyber Joseph Traynor

Introduction Why fraud and cyber The Crime survey The development phases Problems encountered Problems resolved Planned outputs

Why fraud and cyber Main CSEW crime estimate doesn’t capture fraud or new types of crime such as those committed via the internet. The National Statistician's Review of Crime Statistics noted that "Public trust has also been affected by the fact that some crime is missed" and that "known significant gaps include e-crime (or cyber crime) enabled by the internet or new technology."

Why fraud and cyber Fraud – long established crime, internet provides a new vehicle Internet also provides opportunities for new crime Quickly changing crime types

Why fraud and cyber

Time series

The Crime Survey for England and Wales The CSEW is a large nationally representative sample survey Conducted by face-to-face interviews in people’s own homes Using trained interviewers and a structured questionnaire Fieldwork undertaken by external research agency (TNS-BMRB) Contract re-tender every 3 or 4 years

The Crime Survey for England and Wales Adult survey is an average of 49 minutes and includes: Questions on experiences of crime Questions on perceptions of crime/ASB/police/CJS CASI questions on experience of sexual & domestic violence and use of illicit drugs Data collected using specialist survey software and includes automated routing & error checks Children’s survey is an average 20 minutes and includes: Experiences of crime, attitudes to police/ASB

The Crime Survey for England and Wales – recording a crime Screener questions – determine whether a crime has occurred Victimisation module – records details of each incident using both open ended and closed questions to describe the incident and to collect specific details Additional modules

The Crime Survey for England and Wales Once the information is transmitted back to the office, a trained team of coders look at the information gathered in the screener and victimisation modules and code these to a particular crime type. The coding mimics the Home Office Counting Rules (HOCR) which the police use to record crime.

The Crime Survey for England and Wales Each crime currently ends up with just one offence code; if one incident consists of a number of offences the coding needs to sort out which of these offences takes priority: Arson Rape or serious wounding Robbery Burglary Theft Criminal damage Assault Threats

Phase 1 Successfully bid for funding from the Quality Improvement Fund January 2014 Work included: review of what others had done development and testing of new screener questions - cognitive question testing recommendations for implementation/ further testing

Phase1- consultation Experts to provide advice and feedback on work. Representatives from: Home Office National Fraud Intelligence Bureau ACPO lead for cyber crime National Crime Agency Criminologists

Phase 2 Work required to take the project from initial phase of development to integration onto the survey Further cognitive testing of screener questions from phase one followed by integration of screener questions onto the survey (April 2015) Development and cognitive testing of victim form questions followed by integration onto the survey in October 2015 Full pilot of questionnaire initiated May 2015 test

Findings Issue – Where a traditional crime takes place such as a burglary where someone's bank details are stolen and then a fraud is committed, according to existing priority rule only one offence should be recorded. Response – Having two phases to the development allowed us to create a screener question in the second phase which captures fraud following another (traditional)offences and amend the priority ordering rule to allow two offences to be recorded.

Findings Sometimes following a crime, stolen items such as bank cards or computers or internet enabled devices may be used to gain access to a person’s accounts or personal information. In the time [since XXXXXX] did any of these things happen as A DIRECT RESULT of [the incident/any of the incidents] you have just told me about? Your personal information or account details were used or tried to be used to obtain money, or buy goods or services You were tricked or deceived out of money or goods (in person, by telephone or online) Someone TRIED to trick or deceive you out of money or goods (in person by telephone or online) Your personal information or details were accessed or used without your permission An internet-enabled device of yours was infected or interfered with, for example, by a virus

Findings Issue – Phase 1 cognitive testing identified that crimes victims of fraud did not generally know when the crime occurred and only knew when they had identified the incident. Response – The extended development time allowed ONS to test moving to recording against when the victim came to know of the fraud unlike other offences

Findings Issue – Phase 1 identified respondents were confused and could not distinguish between consumer detriment (sharp practice/ inferior goods) and confidence fraud Response – Having expert users from police led us to distinguish between sharp practices by asking the respondent if the perpetrator was still contactable.

Findings As far as you were aware were the people who did it acting on behalf of a company or organisation that is still contactable now? Yes No

Findings Issue – For on-line fraud one scam can be responsible for issuing many s. Response – Having expert users from police led us to use the same distinction as the police used to record an incident.

Findings Did you actually reply or respond to any of the communication you received in any way Yes No

Findings Issue – Existing victim form asks whether the incident took place in England and Wales Response – Phase two piloting identified this question was irrelevant to fraud victims. Decision not to distinguish where incident took place for incidents of fraud

Outputs Following the 2 nd development phase both Screener and victim form questions will go live on the survey in October Consultation will take place on the design of the outputs to follow as time series will be affected. Issues relating to a parallel set of outputs will need to be discussed on both old and new crime series.

Outputs Following the 2 nd development phase both Screener and victim form questions will go live on the survey in October Consultation will take place on the design of the outputs to follow as time series will be affected. Issues relating to a parallel set of outputs will need to be discussed on both old and new crime series.

Outputs First results from the screener questions introduced onto the survey in April 2015 will begin to emerge around October 2015 as experimental statistics Estimates based on both screeners and victim form will begin to emerge in early 2016 although outputs based on a full years worth of data will not emerge until early 2017.

Questions