That's still down on the 1995 peak of 19 million offences - but it's an awful lot higher than statisticians thought a year ago. Crime figures: 'Five million' fraud cases in past year 15 October 2015 Many experts will now be having a "told you so" moment. Crime statistics sceptics say there's just not enough police and policy focus on 21st Century offending. As June Kelly reports, the figures show the scale of cyber crime There were more than five million incidents of fraud in England and Wales in the last year, estimates suggest. Criminality is rapidly changing - and the real question is 'Are the police in a good place to combat it?' The Office for National Statistics has published an estimate of fraud for the first time, based on its Crime Survey. Just over half of the 5.1 million frauds included in the Crime Survey data involved some financial loss, the ONS said. There were also 2.5 million cyber crime offences, such as computer hacking, the ONS estimated. Where losses were reported, 78% got some form of compensation, with 62% reimbursed in full. The Crime Survey indicated an 8% fall in crimes it covers. Separate data, based on reports to police, shows an overall rise in offending of 5%. Frauds included card fraud and frauds committed over the phone and online. The fraud data was based on a sample of 2,000 people. Official figures are drawn from two sources: The two sets of figures have been published together for many years to give a more rounded impression of crime levels. An ONS spokesman said: "Although we estimate that there were more than seven million fraud and computer misuse incidents in the past year, this does not necessarily imply a recent rise in crime as the new measures bring into scope a large volume of offences not previously included in the Crime Survey." The police figures suggest a 25% increase in violence, with murders at their highest level for four years. In the 12 months to the end of June there were 569 homicides, up 44 on the same period the year before. He added: "These new estimates should be seen in the context of a reduction over the past 20 years in the more traditional forms of crime, from 19 million incidents a year in 1995 to under seven million a year today." For years traditional crimes have been falling right across the Western world, irrespective of who's in government and how many police are on the beat. The most common cyber crimes - committed under the Computer Misuse Act - were those where a victim's device was infected by a virus. But today's figures have captured for the first time an awful lot of criminality that, quite simply, looks like it has been missed. The category also includes the hacking of people's emails or social media accounts. If you add the official data for traditional crimes to the provisional figures for cyber and fraud, the number of offences breaches 14 million. 1 Overall, the Crime Survey estimated 6.5 million offences had taken place in England and Wales down 8% from last year. US undercover agent jailed for six years for Silk Road Bitcoin theft That figure does not include the fraud and cyber crime estimates. Virtual currency Bitcoin allowed Silk Road users to remain anonymous If they were added, it would mean a total of 14.1 million crimes, but the ONS cautioned against combining the two sets of figures, saying the fraud and cyber data are "experimental" and based on a much smaller sample. A former undercover policeman has been sentenced to six and half years in prison for stealing $700,000 of the virtual currency bitcoin. Agent, Carl Force was part of the Drug Enforcement Administration (DEA) investigation into the black market website Silk Road. A spokesman said: "One is a proven set of national statistics and the other is not." The most common cyber crimes involved a victim's device being infected by a virus Silk Road allowed its users to buy and sell illicit good including drugs and weapons anonymously using Bitcoin. Crime Minister Mike Penning said crime rates were falling because of police reforms. Force pled guilty to extortion, money laundering and obstruction of justice. And he said the rise in violent and sexual crimes being reported was due to changes in how offences were recorded. Force was posing as a drug dealer with connections to hit men to establish contact with Silk Road's founder, Ross Ulbricht. His code name for the assignment was "Nob". "Crime is falling and it is also changing, and we are committed to tackling fraud and cyber crime," he added. Once he reached Ulbricht, Force sold him information about the investigation. A spokesman for the National Police Chiefs' Council said the fall in crime estimated by the Crime Survey figures was "encouraging". Ulbricht is a serving life sentence for conspiracy to traffic narcotics, money laundering and computer hacking, all associated with his creation of Silk Road. Meanwhile, the increase in crime reported to police, he said, "reflects the efforts being made by forces to improve consistency in crime recording". The judge in the case said Force's "betrayal of public trust is quite simply breathtaking". He added: "There is still a gap in what the public are experiencing and what is being reported to the police. However, it is extremely encouraging that the gap between the CSEW public survey and the recording of crime by the police continues to narrow." A former Secret Service agent who was also charged pleaded guilty and will be sentenced separately in December. Bitcoin is digital currency not controlled by any government. Users can buy and sell goods using a unique code that allows users to remain anonymous, something that has made Bitcoin a popular choice for funding criminal activity. 2 but criminals are adopting patterns that are not flagged up," said Prof Woodward. Online attackers steal £20m from UK bank accounts "With thousands of computers infected, they only need to take a small amount from each bank account and suddenly they've got millions." 14 October 2015 The UK's National Crime Agency is hunting cyber-attackers who stole more than £20m from British bank accounts. The NCA said it was trying to "sinkhole" the Trojan - working with internet service providers to divert the software's attempts to "phone home" with stolen bank account details. Malware called Dridex harvested victims' online banking details so the attackers could siphon off funds. The US Department of Justice said on Tuesday that a Moldovan man, Andrey Ghinkul, had been arrested in Cyprus in August and the United States was seeking his extradition. The NCA said it was working with the FBI and other authorities to limit the malware's usefulness to criminals and one man had already been arrested. The FBI encouraged people to use anti-virus software to help protect their computers. One expert told the BBC the attackers had been particularly cunning to avoid being detected. "All the usual advice applies," said Prof Woodward. "Don't open unexpected email attachments, even if they appear to be from the bank. "This is very sneaky software that relied on people not being vigilant with their online banking," said Prof Alan Woodward, a cybersecurity expert who advises Europol. "And check your bank statement for suspicious transactions. Query anything you don't understand, even if it's a small amount, as criminals may be taking a small amount from millions of other people." "If you imagine thieves making lots of little transactions, rather than one big one, it is more likely to go unnoticed." People were tricked into installing malware The Dridex Trojan infected computers through a malicious Microsoft Office document, typically disguised as an invoice and emailed to victims. US dismantles 'massive' cyber crime syndicate The malware relied on tricking people into installing it on their machines, rather than exploiting a security hole in the operating system. 10 November 2011 The FBI alleges that infected computers would be re-directed to sites that rewarded the gang Cyber criminals who are alleged to have made $14m (£9m) from advertising fraud have been arrested in Estonia. It would then eavesdrop on people entering their bank account details and send the information back to the attackers. The FBI alleged that the gang infected more then four million computers in 100 countries with code that redirected users to online ads. "Banks have software running constantly in the background looking for suspicious transactions, 3 The six arrested are Estonian nationals while the seventh member of the gang, a Russian, remains at large. The FBI has produced a software tool that people can download and run to see if they had been hit by the gang and were being redirected. The gang reportedly tricked people into installing the malicious code that hijacked their PC by disguising it as a codec required to watch adult movies. Security firms hailed the arrests as the "biggest cyber criminal take down in history". About 500,000 of the affected computers were in the US and many of the millions inadvertently enrolled in the fraud scheme were in government offices, schools, and corporates. More than 100 computers were seized in raids conducted at the same time as the arrests. The rogue address books have now been switched for servers that direct people to where they wanted to go. Aiding the investigation into the scale of the scheme was US space agency Nasa which first discovered the malicious software on 130 of its computers. Security firm Trend Micro also provided key intelligence during the long investigation. Domestic ISPs are also being told about the people that were infected to give them a chance to clean up. The defendants have been charged with five counts of wire fraud and computer intrusion crimes. If found guilty they face heavy jail sentences. The FBI claimed that the "massive and sophisticated internet fraud scheme" revolved around servers set up to surreptitiously reroute traffic to websites where the gang would get a cut of the advertising revenue. Victims would start out trying to visit sites such as Amazon, Netflix and ESPN but instead end up on sites displaying adverts put together by the gang, said the FBI in a statement. James Bond cyber crime expectations 'unrealistic' By Sian Grzeszczyk "These defendants gave new meaning to the term, 'false advertising'," said Manhattan US attorney Preet Bharara in a statement detailing the take down which the FBI dubbed "Operation Ghost Click". 8 April 2013 The public may have "unrealistic" expectations, the report found Being "brought up on a diet of James Bond, CSI and Mission Impossible" may have given the public "unrealistic expectations" when it comes to solving cyber crimes, according to police. Describing the gang as "cyber bandits", Mr Bharara alleged they collected "millions in undeserved commissions for all the hijacked computer clicks and internet ads they fraudulently engineered". Public perception is listed as one of five challenges representing the "greatest issues" in tackling cyber crime, and crime in general, in the future, in a Warwickshire Police report. FBI documents detail the scheme the gang is accused of running which employed rogue copies of the net's address books to re-direct people to the fraudulent sites. Other issues highlighted by Det Insp Mark Glazzard include the availability of technology and challenges to police resources. 4 In the report, Mr Glazzard said: "The public have been brought up on a diet of James Bond, CSI and Mission Impossible films and programmes. Their expectations with regard to complex, international crime investigation may be unrealistic." employ techniques such as encryption and steganography to hide their trail. Warwickshire Chief Constable Andy Parker was due to present the report's findings to the county's Police and Crime Commissioner Ron Ball. Other future problems in tackling cyber crime, he said, would include the difficulty of international cyber crime crossing different jurisdictions, and also fewer police resources being dedicated to investigations because of budget cuts. It reveals there were more than 250 reports of cyber "fraud" in Warwickshire in January and February. The most-reported category of fraud in January was connected to online shopping and auctions. He said the increase in use of "cloud storage" could complicate investigations with information, intelligence and evidence contained within the internet itself. The category of cyber crime includes fraudulent online shopping activity, computer software service fraud, computer misuse crime, offences linked to computer viruses and spyware and computer hacking. Mr Glazzard said the sheer number of handheld devices which could be used to access the internet could mean a potential increase in online crime. Action Fraud, the national reporting centre for fraud and internet crimes, said it had received more than 46,000 complaints over the past 12 months from members of the public across the UK about "cyber-enabled crime". Regardless of how good the investigators on CSI look, or how flashy their cars and music are, crimes are not solved by iconic imagery, nor the latest hi-tech see-through monitors. It said that amounted to attempted levels of fraud of £292m. Brian Moore, senior lecturer in ethical hacking and network security at Coventry University, said the general perception of how cyber criminals operated had been "glamourised and completely falsified by the likes of shows like CSI and NCIS". Law enforcement relies on good old fashioned detective work, which is aided by forensic and IT specialists, who provide the technical and procedural skills in recovering data, identifying movements from mobile phones and other digital devices. Criminals are not generally experts in the use of IT, so in many cases, the evidence can be identified, selected and used to prosecute or help corroborate other non-digital evidence or testimony. He added: "The criminals may always be one step ahead, and the biggest barrier may be that, as time passes, more and more knowledge and tools of how to hack, crack and carry out identity crime have been proliferated across the internet. In saying this, many more criminals are becoming aware of the dangers of leaving a digital trail and as such have become much more IT-wise than they had previously, and now "The next wave of hackers may be the first true data terrorists, as we, perhaps, ain't seen nothing yet." 5