Property Crime Down

The U.S. crime rate continues to fall, according to the latest FBI’s release based on Uniform Crime Reporting from police departments, but researchers say those numbers, which have been on a downward slide since the 1990s, don’t tell the whole story.

That’s because the federal report does not track online property crime, credit card fraud or identity theft, all of which are increasing, according to researchers at the University of New Haven and the State University of New York at Albany.

The researchers, Maria Tcherni, an assistant professor of criminal justice at the Henry C. Lee College of Criminal Justice and Forensic Sciences at UNH, the lead researcher, and Andrew Davies, Giza Lopes and Alan Lizotte, all of University at Albany School of Criminal Justice, contend that it is extremely difficult to estimate the cost of online theft and that in some cases, for example, when intellectual property is stolen, the direct cost may not even be in dollars.

Yet, although counting cybercrime can be complex, it is clearly a growing problem and “whether it is incorporated into the crime index or not, criminologists would be wise to be circumspect before declaring that crime has dropped as radically as traditional measures appear to reflect,” the researchers said.

The researchers suggest counting online property crimes not only because they seem to be increasing, but also because they have great potential for harm.

“Internet usage has increased dramatically in the U.S. in recent decades with 81 percent of American adults and 95 percent of American teens accessing the Internet,” they said in their paper, “The Dark Figure of Online Property Crime: Is Cyberspace Hiding a Crime Wave?” that was recently published in Justice Quarterly. “The potential harm from this type of crime is unknown but it clearly affects millions.”

In fact, each of the 12 largest domestic incidents of security breaches against major corporations included hacking into the records of tens of millions of users. Sadly, the paper says, more than half of the victims of these crimes don’t even know that their data has been compromised.

Losses from cyber crime are not recorded by the FBI and, in fact, may not even be reported to police, the paper says. Often, the crime is handled by private corporations rather than police, and so it does not make its way into official crime statistics. Moreover, a lot of the organizations affected by cyber attacks and online theft (financial institutions and other corporations) are reluctant to report their losses for fear of compromising their reputations and losing customers.

“But the financial losses attributable to identity theft appear far in excess of the damage inflicted by traditional property crime,” the researchers say.

“There is a glaring gap in crime reporting,” Tcherni said.  “Yet even though we were able to demonstrate that online and identity theft is costing thousands of dollars, we are not able to obtain reliable data to quantify the size of the losses.”

Crime reporting has to be updated for the cyber-era, said Lizotta, dean of the UAlbany School of Criminal Justice. "Property crime that remains underreported because it's online crime shapes our response to it, particularly the response of law enforcement -- what's hidden stays hidden, yet continues to be a real, growing threat."

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3