The Cost of Cyber Crime Full Report - The Cabinet Office
The Cost of Cyber Crime Full Report - The Cabinet Office
The Cost of Cyber Crime Full Report - The Cabinet Office
CYBER CRIME.
A DETICA REPORT IN PARTNERSHIP
WITH THE OFFICE OF CYBER
SECURITY AND INFORMATION
ASSURANCE IN THE CABINET OFFICE.
Executive summary 1
Chapter 1: Introduction 4
Why estimate the cost of cyber crime? 4
Chapter 2: What is cyber crime? 6
What types of cyber crime have we considered? 6
Who are the cyber criminals? 8
What do cyber criminals target? 9
What is the impact of cyber crime? 11
Chapter 3: Study methodology 14
Constraints and assumptions 14
Sources of data on IP theft 14
Our methodology for assessing the impact of IP theft 15
Our methodology for assessing the impact of industrial espionage 16
Chapter 4: Results and analysis 18
Cost to citizens 18
Cost to the Government 19
Cost to businesses 19
Other findings 22
Chapter 5: Conclusions and recommendations 24
The cost of cyber crime is significant and growing 24
The impact of cyber crime is felt most by UK business 24
The UK needs to build a comprehensive picture of cyber crime 24
Annex A: Organisations consulted 25
Annex B: Business sector background 25
About Detica BC
2
2 Detica
Detica Insight™
WHY ESTIMATE THE COST WHAT IS CYBER CRIME?
OF CYBER CRIME? For the purposes of this study, we are using the
Our society has become almost entirely term ’cyber crime’ to mean the illegal activities
dependent on the continued availability, undertaken by criminals for financial gain. Such
accuracy and confidentiality of its Information activities exploit vulnerabilities in the use of the
and Communications Technology (ICT). As well internet and other electronic systems to illicitly
as significant benefits, the technology has access or attack information and services used
enabled old crimes to be committed in new by citizens, business and the Government.
and more subtle ways. In its National Security We have not included crimes that lack an
Strategy, cyber threats are recognised by the over-riding financial motive, or attacks of cyber
Government as one of four ‘Tier One’ risks to ‘terrorism’ or cyber ‘warfare’. In our study, we
the UK’s security. have focused on:
But estimates of the cost of cyber crime have until – identity theft and online scams affecting UK
now failed to address the breadth of the problem citizens;
and have not been able to provide a justifiable – IP theft, espionage and extortion targeted at
estimate of economic impact. Therefore, UK businesses; and
the Office of Cyber Security and Information – fiscal fraud committed against the Government.
Assurance (OCSIA) worked in partnership with
Detica to look more closely at the cost of cyber We recognise that the full economic impact of
crime in the UK and, in particular, to gain a better cyber crime goes beyond the direct costs we
appreciation of the costs to the UK economy have been able to estimate in our study, but
of Intellectual Property (IP) theft and industrial given the lack of available data and what we
espionage. Further developments of cyber crime believe to be a significant under-reporting of
policy, strategies and detailed plans thus benefit cyber crime, we have had to be pragmatic in
from greater insight. our approach.
EXECUTIVE
SUMMARY
£10,000M
£9,000M
£8,000M
£7,000M
£6,000M
£5,000M
£4,000M
£3,000M
£2,000M
£1,000M
£0M
Online Scareware Identity IP theft Espionage Customer Online theft Extortion Fiscal fraud
Fraud theft data loss from business
(reported)
2 Detica
CONCLUSIONS AND Although the existence of cyber crime in the UK
economy appears endemic, efforts to tackle
RECOMMENDATIONS it seem to be more tactical than strategic.
Cyber crime is a national scale issue. The cost to The problem is compounded by the lack of a
the economy, estimated at £27bn, is significant clear reporting mechanism and the perception
and likely to be growing. The ease of access to that, even if crimes were reported, little can be
and relative anonymity provided by ICT lowers done. Additional efforts by the Government and
the risk of being caught while making crimes businesses to build awareness, share insights
straightforward to conduct. and measure cyber crime would allow responses
The impact of cyber crime does not fall equally to be targeted more effectively.
across industry sectors. The results also
challenge the conventional wisdom that
cyber crime is solely a matter of concern for
the Government and the Critical National
Infrastructure (CNI), indicating that much larger
swathes of industry are at risk. The results
of this study suggest that businesses need
£27BN:
to look again at their defences to determine
whether their information is indeed well
protected. Without urgent measures to prevent
the haemorrhaging of valuable intellectual
property, we believe that the cost of cyber crime
is likely to rise even further in the future as
UK businesses increase their reliance on ICT. ESTIMATED
COST OF
However, encouraging companies in all sectors
to make investments in improved cyber security,
based on improved risk assessments, is likely
CYBER CRIME
to considerably reduce the economic impact of
cyber crime on the UK.
IN THE UK.
Cost of different types of cyber crime
to UK industry sectors
£3,000M
£2,500M
£2,000M
£1,500M
£1,000M
£500M
£0M
s& e
r ts
ls
es
tiu s
es
rs
ch
on
ng
t)
se s
es
es
e
en
en
rin
in
al
on
on
it
ce
er
r
ns
nc
di
ur
is
ia
ce
ile
te
ni
c
iti
vic
ic
of
i
pa
in
ic
d
l
m
pm
is
r
i
ra
e
fe
i
i
r ta
v
rv
v
i
at
t
e
til
M
a
a
r & odu
io
r
m
v&
e
qu nica
le
p
rp
er
er
at
et
et
su
de
Su r se
b
l m gin
ic
ui
ui
e
no spo
ria s &
ls
wa r t s
&
m
gr
lr
fo
Ch
nd
un
er
in
pr
eq
eq
Au ce &
ul
&
ile
el
ra
ia
te
&
ru
ot
,s
e
al
n
sa
m
le
m
m
po
e
ts
av
al
&
nc
ac ene
ob
lif
ra
pu
ag
n
N
et
p
m
m
ria
s
c
a
p
io
re
al
Tr
i
lt
na
&
n
m
tri
ru
m
r
co
co
sp
ve
ct
tic
st
te
od ood
to
co
ec
ftw ts, t
Fi
ce
le
le
ro
tro stru
ria
du
be
eu
wa
st
rd
d
te
te
el
Ae
&
an
(in
F
st
In
du
ha
d
c,
c&
n
le
e
e
an
du
Co
lin
ar
fe
rs
In
m
m
tri
gy
ob
ni
In
Li
st
ar
ce
ec
d
lo
M
xe
ve
Ph
du
no
el
Fo
So
ec
in
Fi
s,
ro
ch
te
El
Ga
sp
Te
ta
ga
es
l&
al
Re
Oi
CHAPTER 1
INTRODUCTION
Footnote
1 Email and internet statistics from the Pingdom Blog, January 2011 (http://royal.pingdom.com/2011/01/12/internet-2010-
in-numbers/)
2 Mobile statistics from Wireless Intelligence, July 2010 (http://www.wirelessintelligence.com/analysis/2010/07/global-
mobile-connections-surpass-5-billion-milestone/) and DSLReports.com (http://www.dslreports.com/shownews/Wireless-
Users-Send-5-Billion-SMS-A-Day-107515), 2010
3 “Cyber Security – A new national programme”, Emma Downing, House of Commons Library Standard Note SN/SC/5832, 19
January 2011
4 For example, see “Industrial espionage: Data out of the door” published in the Financial Times, 1 February 2011
5 “A strong Britain in an age of uncertainty”, National Security Strategy, October 2010
6 “Unsecured Economies: Protecting Vital Information”, McAfee, 2009
4 Detica
We have drawn on information in the public Finally, although Detica has an interest in and
domain, supplemented by the tremendous capability to defend organisations against many
knowledge of numerous cyber security, business, forms of cyber attack, our intent in this study has
law enforcement and economics experts from a been solely to examine the cost of cyber crime to
range of public and private-sector organisations. the UK economy; it has not been to investigate
We are indebted to all those individuals and either the attack methods used by cyber
organisations who contributed their time and criminals or the origins of such attacks.
expertise to this study.
Modelling cybercrime is a complex and difficult
exercise. Our assessments are, necessarily,
based on assumptions and informed judgements
rather than specific examples of cyber crime,
or from data of a classified or commercially-
sensitive origin. And the implications of cyber
crime mean that it is likely to be seriously under-
reported. Our results, therefore, should be used
as a credible, illustrative guide to the nature
of the impacts of cyber crime rather than as
accurate and robust estimates of the impacts
of cyber crime.
BOX 1:
FACT NOT FICTION – RECENT EXAMPLES OF CYBER THREATS
Stuxnet worm (July 2010) Operation Aurora’ Large scale fraud (2009/10) Conficker (2008)
The Stuxnet worm (a complex (December 2009) An Essex-based gang, linked to A botnet6 on an unprecedented
computer code) was used in the Google detected a highly Eastern Europe, was prosecuted scale has been operating since
first cyber attack specifically sophisticated and targeted attack for an on-line fraud making November 2008 affecting millions
targeting industrial control on its corporate infrastructure £2 million a month by stealing of computers worldwide using the
systems. This attack seemed originating from China. The attack log-in details from 600 UK bank Windows operating system.7
to be directed at Iran, and its was found to have installed accounts and tricking users into
Distributed Denial of Service
nuclear programme. Stuxnet is malware via email on computers providing additional information.
Attacks (DDoS): Estonia (2007)
unprecedented in its design to in another 30 companies and The Police e-Crime Unit, working
and Myanmar (2010) suffered
allow hackers to manipulate real- Government Agencies. with the banking sector, detected
high profile DDoS attacks thought
world equipment without operators the fraud which targeted weak
to be politically motivated. In both
knowing 1. The worm targeted security on individual’s computers
cases, numerous computers
Siemens’ systems, used in the using Zeus Trojan malware (i.e. a
overwhelmed the same target
energy sector to control nuclear malicious computer programme
simultaneously. Myanmar was cut
and gas infrastructure and also disguised as something else such
off from the Internet after more
in manufacturing and automotive as an email attachment).The fraud
than 10 days of DDoS attacks
industries. 2 Experts estimate that was co-ordinated from a single
which culminated in a massive
it took five to ten people to work on laptop with sophisticated software
data flood that overwhelmed the
the Stuxnet worm for six months. available on the internet.5
country’s infrastructure ahead of
The complexity and access to
the country’s general elections.
systems involved indicated a
(10) Estonia’s financial operations
highly organised and well-funded
were severely compromised and
project.3 The European Network
Government communications
and Information Security Agency
networks were reduced to radio for
(ENISA) has called it a “paradigm
a limited period.8
shift” in threat.4
Footnotes
1 Symantec briefing, The Stuxnet Worm [on 19 January 2011]
2 Stephen Trilling, Senior Vice President, Symantec, Heading off targeted attacks, Symantec CIO Digest, October 2010
3 Symantec briefing, The Stuxnet Worm [on 19 January 2011]
4 ENISA Press Release, European Agency analysis of ‘Stuxnet’ malware – a paradigm shift in threats and Critical Infrastructure Protection, 21 October 2010
5 Metropolitan Police News Bulletin 1527Gang sentenced for ‘trojan’ bank theft scam,16 November 2010 and High tech crime police quiz 19 people over internet bank scam that netted hackers up to £20m
from British accounts, Mail Online, 29 September 2010 (as linked to from Metropolitan Police website).
6 A botnet is a group of computers compromised and co-opted by an ‘intruder’. A single compromised computer is known as a ‘bot’.
7 SEC(2010) 1122 final, Council of the European Union, 14436/10 ADD 1, Commission staff working document Impact Assessment: Accompanying document to the Proposal for a Directive of the European
Parliament and of the Council on attacks against information systems and repealing Council Framework Decision 2005/222/JHA, 4 October 2010
9 DDoS attacks take out Asian nation: Myanmar fades to black, The Register, 3 November 2010 (9) House of Lords European Union Committee (Sub-Committee F Home Affairs), Fifth Report, Protecting
Europe against large scale cyber attacks, Session 2009-10, para 12
Parliamentary material is reproduced with the permission of the Controller of HMSO on behalf of Parliament .
CHAPTER 2
WHAT IS CYBER CRIME?
Footnotes
10 Get Safe Online, ‘Organised gangs deceive web users into downloading malicious anti-virus software’,
15th November 2010
11 ‘Man arrested for £1m online tax fraud’, The Register, 4 September 2009.
12 ‘Google probing possible inside help on attack’, Reuters January 18 2010.
13 ‘Online Casinos Will Experience Cyber-Extortion During SuperBowl Betting’, Internet Business Law
Services Kelly O'Connell, IBLS Editor, Monday, January 28, 2008.
14 For example, US retailer TJX revealed that their customers’ personal and financial data had been stolen
and could be used to conduct fraudulent transactions.
15 For example, see ‘Chinese Whispers’, Marion Wilkinson, Australian Broadcasting Corporation,
April 2010.
16 For example, see ‘Putting a price on Cyberspying’, /Forbes, January 2009.
17 For example, see ‘Money laundering in cyberspace’ BBC, February 2001.
6 Detica
– Scareware – cyber criminals mislead – Customer data loss – cyber criminals steal – Money laundering – cyber criminals use
individuals into downloading software onto sensitive customer data from a company14 online means to launder the proceeds of
their computers10(for example, fake anti-virus (such as customer financial, medical or criminal acts17 (for example, through complex,
software) by using fear tactics or other unethical criminal record details) with the purpose of internet-enabled transfers between global or
marketing practices. The software downloaded selling the data on to other criminal networks offshore bank accounts). This type of activity
is often ineffective or may appear to deal with or using it themselves for blackmail attempts. is usually associated with organised criminal
certain types of virus before infecting the For our study, we have not included accidental networks that have a wide or international reach.
computer with its own viruses. Individuals may data loss but only losses from deliberate and
We have developed a ‘causal model’ – shown
then have to pay the cyber criminals to remove technological means.
below – to illustrate the interactions between
the viruses and their impacts.
– Industrial espionage – this takes many forms, different types of cyber crime, their effect on
– Fiscal fraud – cyber criminals can withhold such as a rival organisation (or associated different stakeholder groups, and the economic
taxes due or make fraudulent claims for third party) illegally accessing confidential impacts they cause.
benefits by attacking official online channels xinformation to gain competitive or strategic
(such as online self assessment forms)11. advantage15 (for example, by finding out a
The loss of tax revenue directly affects public- rival’s bid price) or to gain insider knowledge
sector spending and the Government’s ability for financial gain (for example, by becoming
to invest in UK infrastructure. aware at an early stage of a possible M&A
deal). Cyber criminals could use the ‘insider’
– Theft from business – cyber criminals steal
information they glean to acquire or sell
revenue online directly from businesses, which
shares, or, in rare cases, by betting on
usually involves fraudulently obtaining access
currency fluctuations.
and looting company accounts and monetary
reserves. In some instances, this cyber criminal – IP theft – cyber criminals, often sponsored
activity is greatly assisted by an ‘insider’12. by rival organisations or nation states, steal
ideas, designs, product specifications,
– Extortion – cyber criminals hold a company
trade secrets, process information or
to ransom often through deliberate denial
methodologies16, which can greatly
of service13 (for example, by using malware
erode competitive advantage or even the
to flood a company server with erroneous
operational or technological advantage prized
internet traffic) or by manipulating company
by nation states over potential adversaries.
website links, which can lead to extensive
brand damage (for example, by redirecting
links for a retailer website to an online
pornography website).
Cyber Crimes
IP theft VAT revenue
Business
Loss of
competitive
Industrial advantage Revenue Reduced Exports
espionage
Lower shareholder value
Loss of
business Share price Reduced Level of
employment
Reputational
damage
Customer data loss Disaster recovery costs and compensation Profitability Reduced Foreign
investment
Financial
Preventative
losses
and remedial
Online theft costs Pension value
Regulatory fines
The cyber
criminal triangle
Opportunity
Opportunity
e
im
r cr
be
Cy
me al
cri ntion
nve
Co
Means Motive
Means Motive
Footnotes
18 Cyber ‘Crime has Surpassed Illegal Drug Trafficking as a Criminal Moneymaker’, Symantec 2009
19 Cybercrime's financial and geographic growth shows no slowdown during the global economic crisis’, Marc Fossi, Tech Republic May 2010.
20 For example, see ‘Canada's Cyber Security Strategy’, Vic Toews, Canadian Minister for Public Safety, 2009.
21 For example, see ‘The Cybercrime Arms Race’, Eugene Kaspersky, Securelist, 2008.
22 For example, see ‘How cyber-crime became a multi-billion-pound industry’, The Spectator, June 2007
23 For example, see ‘Hackers Invade iTunes: Cybercriminals are opportunistic’, Peter Chubb, August 2010.
24 For example, see ‘Cyber crime is a lucrative trade and it's growing’, SC Magazine September 3, 2010.
25 ‘The knowledge-based economy: what can the UK do to avoid losing out to the Far East?’ BCS Thought Leadership Debate, 16 January 2006
8 Detica
WHAT DO CYBER – High-value IP – different business sectors
have different approaches to developing,
– Tactical corporate information – frequently
this is communicated using online technology
CRIMINALS TARGET? investing in and exploiting their IP. IP does but is not necessarily stored online, is low
Unlike conventional crimes of theft, in which not necessarily need to be stored online, in volume and contains short-term sensitive
the owner actually loses their physical property, and usually contains information that has information (for example, contract bid
the theft of information by cyber criminals may long-term high value to an organisation. While prices, or share-price sensitive material).
not result in the loss of anything physical at all. much exists in a tangible form, many other Protection for this information typically
Moreover, the ‘theft’ can often leave the original types of IP are intangible – in the form of tacit involves procedural and messaging security
data exactly where it was to begin with. knowledge and the skills of employees, for implemented at an organisation’s senior-
With the exception of the well-understood and example. The types of IP most likely to be management level. It has a high financial
documented copyright theft issue, information stolen by cyber criminals are ideas, designs, impact if it is breached (especially by cyber
stolen by cyber criminals often falls into the methodologies and trade secrets, which exist criminals who operate in the stock market)
following categories: mostly in tangible form and add considerable and is eminently exploitable by cyber criminals
value to a competitor. Examples include R&D if they know how to manipulate or sell this
– Bulk business data – this often needs to outputs; product prototypes; documents information at the right moment. We believe
be online to enable efficient transactions describing unique business process that this information is targeted mainly by
to take place, and is usually customer- methodologies or corporate strategies and well organised and sophisticated cyber
sensitive (for example, customer addresses business decision-making; staff details, criminal networks, but can also be used by
or financial details). Any associated data including personal information, skill sets foreign intelligence services to weaken the UK
breaches can carry large regulatory penalties and remuneration levels; and descriptions economy29.
as well as substantial reputational damage. of company capabilities and weaknesses.
Most organisations employ conventional When it comes to stealing IP from organisations,
Any associated data breaches can result
information assurance methods (such as there are four ways cyber criminals can obtain
in significant damage or compromise to
firewalls) to protect this data, and we believe what they want. They can:
long-term strategy or corporate finances26.
it is targeted mainly by opportunist individual Protection for this type of information is – buy it (in the case of a product), and then
cyber criminals, or small cyber criminal often provided by storage on a standalone reverse-engineer or copy it;
networks. Some types of digital data, once IT system, complemented by additional
they are stolen, tend to have great longevity – – carry out a cyber attack, to obtain the
physical and personnel security. High-value
for instance, data containing names, dates of information electronically while remaining
IP is targeted mainly by foreign intelligence
birth, and National Insurance numbers have outside the organisation’s network;
services27, but can also be of interest to high-
lifetime durations and cannot be 'reset'. This level organised criminal networks, who can sell – carry out an ‘insider’ attack, so that the data
data will potentially be just as valuable to cyber the information on to interested third parties28. is stolen by someone authorised to access it
criminals in the long term as it is now. This from within an organisation;
is quite distinct from transient data (such as
login passwords), which can readily be reset, – steal it, by physically breaking-in to office
and are frequently changed on a regular cycle. premises or by stealing from employees.
For the purposes of this study, we have defined
insider attacks as security breaches associated
with employees while cyber attacks are security
breaches associated with company technology.
Therefore, although we acknowledge that insider
attacks can be performed using cyber means, to
simplify our model, we have focused our study
on external cyber attacks, which tend to go
unnoticed and unreported30.
Footnotes
26 For example, see ‘The Consumer's Report Card on Data Breach Notification’, Ponemon Institue, 2008.
27 GCHQ Press Release, Director GCHQ, Iain Lobban, makes Cyber speech at the IISS, 12 October 2010
28 For example, see ‘Businesses under Cybercrime attack: how to protect your corporate network and data against its impact’,
Yuval Ben-Itzhak CXO
29 For example, see http://www.us-cert.gov/control_systems/csthreats.html
30 ‘E-crime detectives as vital as bobbies on beat’, Sir Paul Stephenson, Metropolitan Police Commissioner, Daily Telegraph,
October 2010.
The degree to which the IP can be exploited is – producing a similar product using the
likely to depend on the original motives for the same concept more quickly, which is highly
theft and a number of other situational factors, dependent on the complexity of the IP;
such as: – incorporating elements of the IP into an
– the importance of time-to-market for the alternative design, which is highly dependent
product, organisation, or industry; on how closely the original IP fits the
alternative design;
– the level of innovation involved and the
subsequent value this adds; – becoming inspired to generate new IP, which
is highly situational, and doesn’t guarantee
– the level of competition and value within an the new IP being successful;
organisation’s industry sector;
– selling the IP to a third party, which is likely
– the ability to ‘sell’ stolen IP to third parties via if the IP can be commercially exploited by an
the underground economy; opportunistic stakeholder;
– the level of interest that the IP has for cyber – blackmailing the IP-owner by threatening its
criminal stakeholders, such as foreign disclosure, which is highly dependent on the
intelligence services. value of the IP to the organisation.
Ultimately, the overall economic impact of
IP theft analysis
the theft will depend on the market size for
the stolen IP and other market forces, which
Exploit will drive the IP price. Given this wide range of
possible mechanisms, the degree to which
stolen IP can be exploited depends on the nature
and inherent complexity of the industry sector.
Acquire IP Assimilate Exploit
Do we need more
information?
10 Detica
WHAT OTHER MEASURES WHAT IS THE IMPACT IMPACT ON CITIZENS
CAN BE USED TO PROTECT IP? OF CYBER CRIME? Citizens can help themselves reduce the impact
As well as measures to improve cyber security, We have adapted the methodology used by the of cyber crime by ensuring that they take a
organisations can also protect their information, Home Office in their 2001 report on the economic number of sensible precautions to stay safe
to some extent, by legal means such as patents, impact of crime in the UK35 to define the following online, such as installing a firewall, regularly
trademarks and non-disclosure agreements. types of cost associated with cyber crime: patching or updating software applications and
While these measures provide some assurance using legitimate anti-virus software. They can
– costs in anticipation of cyber crime, which also take out specialist insurance to protect
for UK organisations that their information will
include individual and organisational security against the impact of identity theft. These costs,
not be unfairly and unlawfully exploited, some
measures (such as installing physical and in anticipation of cyber crime, have not been
of the legal protections may be limited in their
virtual protection such as antiviral software), included in our study.
effectiveness. For example, certain types of IP,
insurance costs and costs associated with
such as computer software or unique business No defences are foolproof, though, and even
gaining compliance to required IT standards
processes, cannot always be patented in the well-prepared citizens are likely to suffer a range
(for example the Payment Card Industry Data
UK yet they remain highly valued and coveted by of costs as a consequence of and in responding
Security Standard, PCI DSS);
organisations worldwide31. Even when the IP can to cyber crime: victims of identity theft can be
patented or registered, the investment required – costs as a consequence of cyber crime, left to pick up the tab for loans taken out under
to maintain the protections may be prohibitive32 which take into account direct losses to their name by cyber criminals; victims of online
and the protections themselves may force individuals and companies (including scams can find their credit card details are
unwanted disclosure. For example, patent business continuity and disaster recovery used by cyber criminals to purchase goods or
applications, which are available in the public- response costs), and indirect losses arising services; victims of phishing scams can be tricked
domain, can reveal not only elements of the IP that from reduced commercial exploitation of IP into revealing passwords, PIN numbers and other
the company would have preferred to keep secret and opportunity costs through weakened sensitive financial information that cyber criminals
but also their market intentions33. Furthermore, competitiveness; can subsequently sell or exploit. Alternatively,
the patent application process can be lengthy, citizens may be compelled into purchasing
– costs in response to cyber crime, such as
particularly where there may be existing defective software as a result of receiving or
compensation payments to victims of identity
applications or patents for similar products34. inadvertently downloading scareware.
theft, regulatory fines from industry bodies
Once a patent has been approved, subsequent and indirect costs associated with legal or The wide-ranging and large-scale nature of
enforcement activities may be ineffectual, forensic issues; many of these individual cyber crimes means
especially in international markets. In some that their aggregate effect can be detrimental
– indirect costs associated with cyber crime,
cases, and usually with considerable investment to the UK economy.
which include such factors as reputational
in marketing, organisations may benefit from
damage to organisations, loss of confidence Furthermore, indirect macroeconomic effects
their IP becoming an industry standard (such
in cyber transactions by individuals and could occur as a result of cyber crimes
as VHS, DVD-Video or BlueRay), but this is by no
businesses, reduced public sector revenues committed on UK citizens, for example, from a
means guaranteed.
and the expansion of the underground economy. loss of confidence in services such as online
The challenges associated with some of these banking (although anecdotal evidence seems to
We have used these definitions to examine more
legal protections have led to many companies suggest this isn’t the case36) , or because they
closely the impact of cyber crime on the principal
resorting to secrecy, with non-disclosure subsequently spend less, which has a knock-on
stakeholder groups – citizens, businesses
agreements or similar provisions in their effect on the retail industry.
and the Government – as well as exploring the
contracts of employment. The danger with
macro-economic impacts.
this approach is that cyber attacks become
particularly threatening, especially when the IP
is accessible from online computer systems.
Footnotes
31 UK Intellectual Property Office
32 For example, see http://www.ip-holdings.com/patent-enforcement
33 For example, see ‘Using Patents in Competitive Intelligence’, Gregory J. Kirsch and Charley F. Brown, SCIP
34 For example, see ‘The Patent Application Process in the UK’, By Waheedan Jariwalla
35 Home Office methodology described in ‘The economic and social costs of crime’, Home Office Research Study 217, 2001
36 Closing In on Bank Customer Churn’, CRM Magazine, May 2007
Footnotes
37 Value Reference Model (VRM) developed by the trade consortia Value Chain Group.
38 ‘Notification of Data Security Breaches to the Information Commissioner’s Office’, ICO
39 The current PCeU budget is £2.3M per year, revealed in a Computing.co.uk interview with the Head of the PCeU on 11 November 2010.
40 Symantec Report on the Underground Economy July 07–June 08.
41 ‘Cybercrime Growth Accelerating’ by Keith Ferrell, Information Week, August 2010
12 Detica
MACROECONOMIC EFFECTS
Our model shows that different stakeholder
groups are affected by different economic
impacts. The impacts of cyber crime are also
interdependent. For example, if citizens have
less money in their pockets, they may spend
less, therefore exacerbating revenue losses
from business. For the UK Government,
widespread cyber crime may lead to stronger
international competition from overseas
businesses, significantly reduced revenues from
taxes and VAT receipts, and limited scope for
spending to improve the UK’s infrastructure.
Perhaps one of the biggest significant long term
threats is the rise of the so-called ‘underground
economy’40 (for example, see below), which
provides a viable economic growth model in
itself, and can lead to talented individuals being
drawn away from the legal economy if they are
unemployed or if it is viewed as a more attractive
alternative. As technology enables individual
criminality to morph into something less
opportunistic, more organised and ultimately
more successful, criminal gangs from further
afield, financed by global networks or by hostile
foreign states, may be attracted to the UK.
As the criminality increases in sophistication
and profitability, it is likely to have an ever higher
cumulative impact41, which may cause the
legitimate mainstream UK economy to decline in
revenue and influence.
Decreased attractuveness
Disposable through “drops” Industrial Revenue
income espionage Loss of Less industry
business spending
Motivated Customer Reputation Financial
Better criminal
data theft losses Less government
opportunities
spending
Skill sets and Online theft Competitive
expertise Reputational erosion Loss of Higher security
damage business costs
Identity theft
Loss of
Utilized, invested competitive Economic impacts
and enhanced advantage
bargaining power
Gain of
Reputation Extortion
competitive
advantage Gain of Lowered
business prosecution rate
Profits Service denial Capabilities
International
criminal activity
Financial gains
Reputational increase Increased
Money Off- legitimacy
laundering shoring Revenue
of crime
Underground economy
Reduced chance of detection
CHAPTER 3
STUDY METHODOLOGY
Footnotes
42 UK National Accounts Blue Book 2010, Office for Government Statistics
43 ‘Law of Electronic Commerce’ by Jane Winn and Benjamin Wright.
44 ‘Three point estimates and quantitative risk analysis’, MOD 2007
45 Department for Business, Innovation and Skills, 2010. R&D Scoreboard and Office of National Statistics, 2008. Expenditure on R&D performed in UK businesses.
46 For example, see ‘The Business of Cybercrime - A Complex Business Model’, A Trend Micro White Paper, January 2010
47 UK National Accounts Blue Book 2010, Office for Government Statistics
14 Detica
Once the economic value of the IP had been IP theft methodology
derived from both methods, estimates were
made of the probability of cyber theft for each
industry sector using three point estimates, Segment the UK into business
with the subsequent IP exploitability and revenue sectors
impact also calculated as a percentage. This
enabled us to assess the economic impact of
IP theft on both the basis of R&D spend and the Determine the economic value of
overall economic value of IP. IP created in the UK per year by
each business sector
In the absence of robust estimates for actual Given the number of variables and lack of
levels of IP theft, our methodology assumes ‘official’ data, our methodology uses a scenario-
that the ‘business model’ cyber criminals based approach, which establishes three-point
adhere to for IP theft follows the same principles estimates to determine the range of uncertainty.
of any other type of business46 : the desire Using this approach, we have identified:
to maximise financial gain and minimise – The best-case scenario: IP thefts by cyber
business risk. attack are not widely reported because,
For IP theft by cyber criminals, our methodology although they may be technically possible,
attempts to determine the means, motive and they are not widespread. Therefore a very
opportunities presented to potential attackers. small amount of IP is actually stolen.
It recognises that the nature of IP generated in – The worst-case scenario: The sophistication
different business sectors is different and has of and resources available to cyber criminals,
different levels of exploitability and economic coupled with the vulnerability many
impact if it is stolen. businesses have to cyber attack, means that
Therefore, the method used by our study to most IP worth stealing is actually stolen. The
calculate the costs to the UK economy of IP theft logic of this position is that if cyber criminals
through cyber crime started with the value added have the means, motive and opportunity they
to the UK economy by each industry sector as will use it for financial gain. In this scenario,
given in the Blue Book47. We then estimated the economic impact is limited by the ability of
the fraction that was attributable to IP within the cyber criminal to exploit the IP effectively
the industry. This calculated the subsequent rather than to acquire it.
economic value. – The most likely scenario: Theft of IP by cyber
Once the economic value of the IP had been criminals can occur but it needs to guarantee
derived, estimates were made of the probability a big return. The level of IP theft within a
of cyber theft for each industry sector using business sector is therefore determined
three point estimates, with the subsequent IP by the level of motivation of the criminal to
exploitability and revenue impact also estimated attack specific targets, which means that
as a percentage. some business sectors are significantly more
attractive than others.
The results give an estimate of the value lost to
the economy due to IP theft across the different
industry sectors.
IN MANY CASES,
methodology has attempted to determine the
means, motive and opportunities presented to
potential attackers. It recognises that the nature
COMPANIES MAY
exploitability and economic impact if it is stolen.
It is our belief that it is more likely that cyber
BE COMPLETELY
criminals will target organisations for espionage
based on size and perceived revenue rather than
the business sector that they operate in,
Footnotes
48 UK National Accounts Blue Book 2010, Office for Government Statistics
49 PKF, 2010. Deal Drivers UK
16 Detica
Industrial espionage
considerations
Business
Pharm
Component manufacturers
High value IP
Multinational manufacturers
Counterfeit
Finanacial services
Utility companies
Retail
Retail
Extortion
Size of company
Industrial espionage
CHAPTER 4
RESULTS AND ANALYSIS
Footnotes
50 CIFAS, 2006. Identity Fraud – What About The Victim?
51 Ibid
52 ‘New Estimate of Cost of Identity Fraud to the UK Economy’, Identity Fraud Steering Group (IFSC), 2008.
53 Source: Get Safe Online.
54 Ibid
55 Ibid
56 Symantec, 2009. Report on Rogue Security Software
57 ‘Growth of 'scareware' is frightening’, by Ced Kurtz, Pittsburgh Post-GazetteJuly 11, 2010.
18 Detica
COST TO THE GOVERNMENT COST TO BUSINESSES Our results for the most-likely scenarios show
that the following business sectors are most
We used two approaches to assess the cost of Our study looked at the cost to business of the likely to be impacted by IP theft 61:
fiscal fraud by cyber criminals to the Government. following types of cyber crime:
– aerospace and defence – £0.4bn per annum
The first approach took information from the NFA – IP theft; – which is likely to be due to the high likelihood
Annual Fraud Indicator58, which estimates the – industrial espionage; of companies in this sector being subject to a
total cost of: – customer data-loss (reported); cyber attack and the relative exploitability of
– online theft; their IP;
– tax fraud;
– extortion.
– benefits fraud; – chemicals – £1.3bn per annum – which is
– local-government fraud; The results for each of these types of cyber likely to be due to the high volumes of IP
– central government-fraud; crime are provided in the following sub-sections. generated in this sector and the relative ease
– NHS fraud; with which it can be exploited;
– pension fraud.
IP THEF T – electronic and electrical equipment – £1.7bn
The total cost was combined with an estimate In Chapter 2 of this report, we describe the issue per annum – which is likely to be due to the
from NFA59 on the proportion of fraud that of IP theft in some detail, including the impact on relative ease with which the IP generated by
is attributable to ‘criminal attacks’. For the different business sectors. Because we believe companies in this sector can be exploited;
purposes of our study, we assumed that all of the level of IP theft will vary by sector, individual
these ‘attacks’ were cyber attacks60. – software and computer services – £1.6bn
assumptions were made for: per annum – which is likely to be due to the
This gave an overall figure for fiscal fraud by – the probability of IP theft in the sector; relative ease with which the IP generated by
cyber criminals of £2.2bn. However, although – the level of exploitability of the IP in the sector; companies in this sector can be exploited;
we have used the most up-to-date information – the revenue impact on the company if a rival is
available, we believe it may be underestimating – healthcare, pharmaceutical and bio-
able to exploit the IP. technology – £1.8bn per annum – which
the total level of cyber crime against government
systems and, therefore, further work in this Our approach produced three-point estimates is likely to be due to the high volumes of IP
specific area may be of value. for the economic value of IP by taking published generated by companies in this sector.
figures for the cash flow per year in each sector We note that, although none of the other
and estimating the fraction attributable to IP. business sectors are likely to be entirely immune
The results are provided below: from IP theft, the impact of cyber attacks here is
likely to be much smaller due to the relatively low
volumes of IP generated in these sectors.
£2,000M
£1,800M
£1,600M
£1,400M
£1,200M
£1,000M
£800M
£600M
£400M
£200M
£0M
s& e
r ts
nt
ns
rs
rs
ng
ce
ia
ns
se s
es
es
es
e
st
en
in
in
al
al
ce
ie
s & ofit
er
ns
ec
tio
ur
ed
ile
ile
e
an
ni
io
tio
ic
vic
vic
di
pa
er
n
ic
lit
c
m
pm
is
r
ot
fe
r ta
v
rv
i
i
at
e
M
ta
a
r & odu
r
em
M
i
&
e
qu nica
le
ip
rp
er
er
er
Ge ltiut
at
et
bi
su
de
l m gin
ic
re
ui
no spo
rv
qu
ria s &
ls
wa r t s
&
m
lr
fo
Ch
nd
un
in
r
eq
Au ce &
ug
se
wa ge p
r
ile
u
u
el
ra
ia
le
te
&
ot
e
l
an
sa
m
le
m
m
o
ta
av
&
dr
c
ne
ob
p,
lif
pu
ca
pp
n
st
m
m
n
ria
r
e
ra
a
io
re
al
Tr
i
lt
na
&
n
m
tri
ru
m
co
co
sp
Su
ve
ct
tic
st
te
od ood
to
co
ec
ftw ts, t
Fi
ce
le
le
ro
tro stru
ria
du
be
eu
st
rd
d
te
te
el
Ae
&
an
(in
F
st
In
du
ha
ac
d
c,
c&
on
ile
e
e
an
du
lin
ar
fe
rs
In
m
m
tri
gy
ob
C
ni
In
Li
st
ar
ce
ec
d
lo
M
xe
ve
Ph
du
no
el
Fo
So
ec
in
Fi
s,
ro
ch
te
El
Ga
sp
Te
ta
ga
es
l&
al
Re
Oi
Footnotes
58 National Fraud Authority, 2010. Annual Fraud Indicator
59 Ibid
60 This assumption was made due to the high volume of financial transactions made using online means.
61 Assumptions are based on anecdotal evidence and information from BIS innovation.gov.uk
£2,500M
£2,000M
£1,500M
£1,000M
£500M
£0M
s& e
r ts
nt
ns
rs
rs
ng
ce
ia
ns
se s
es
es
es
e
st
en
in
in
al
al
ce
ie
s & ofit
er
ns
ec
tio
ur
ed
ile
ile
e
an
ni
io
tio
ic
vic
vic
di
pa
er
n
ic
lit
c
m
pm
is
r
ot
fe
r ta
v
rv
i
i
at
e
M
ta
a
r & odu
r
em
M
i
&
e
qu nica
le
ip
rp
er
er
er
Ge ltiut
at
et
bi
su
de
l m gin
ic
re
ui
no spo
rv
qu
ria s &
ls
wa r t s
&
m
lr
fo
Ch
nd
un
in
r
eq
Au ce &
ug
se
wa ge p
r
ile
u
u
el
ra
ia
le
te
&
ot
e
l
an
sa
m
le
m
m
o
ta
av
&
dr
c
ne
ob
p,
lif
pu
ca
pp
n
st
m
m
n
ria
r
e
ra
a
io
re
al
Tr
i
lt
na
&
n
m
tri
ru
m
co
co
sp
Su
ve
ct
tic
st
te
od ood
to
co
ec
ftw ts, t
Fi
ce
le
le
ro
tro stru
ria
du
be
eu
st
rd
d
te
te
el
Ae
&
an
(in
F
st
In
du
ha
ac
d
c,
c&
on
ile
e
e
an
du
lin
ar
fe
rs
In
m
m
tri
gy
ob
C
ni
In
Li
st
ar
ce
ec
d
lo
M
xe
ve
Ph
du
no
el
Fo
So
ec
in
Fi
s,
ro
ch
te
El
Ga
sp
Te
ta
ga
es
l&
al
Re
Oi
20 Detica
ONLINE THEFT FROM BUSINESS Overall, we estimate the most likely impact is
£1.3bn per annum, with the best and worst case
As there are no reliable published estimates estimates £1.0bn and £2.7bn respectively.
for direct online theft from business, our study Our results show that support services, the
attempted to estimate the likely impact by construction and materials industry and the
looking at the cash-flow per year across the not-for-profits sector are most likely to be
different business sectors and making some targeted.
assumptions about the level of cyber crime.
We acknowledge that our approach to estimate
Our approach estimated a maximum percentage the level of theft is based on a set of broad
of annual cash-flow that a business sector assumptions, but in the absence of data being
could potentially tolerate being lost. This was available on actual levels of online theft, we
multiplied by an estimate we made of the consider them to be reasonable. In particular,
probability that businesses in this sector were the profile of online theft we have estimated
subject to successful cyber attacks. Due to the for the business sector is driven by the amount
sensitivity of the results to this estimate, we of capital potentially at risk, and, one would
calculated three-point estimates of the worst therefore assume, the level of attractiveness the
case, best case and most likely costs. sector holds for cyber criminals.
The figure below, shows the results across the
business sectors for the most likely costs:
£250M
£200M
£150M
£100M
£50M
£0M
s& e
ts
ec & m als
eq ials
es
rs
tiu s
es
rs
l m gin h
ria ls & ng
ng
ce
ng
ns
t)
or
r s es
wa r t s es
eq ces
e
en
en
on
fit
er
s
io
di
ur
is
le
s a aile
ct
ar
n
ri
ni
ni
ob efen
ic
iti
vic
c
No & d
ro
c
m
is
r
pu er vi
i
ot
ra
ee
i
i
ai
r ta
se
p
rv
rv
i
i
at
at
e
til
M
r & odu
em
le
p
p
p
er
at
et
bi
su
co l se
e
ic
qu nic
tic al re
ui
ui
no spo
ic
or
rv
d
&
gr
Ch
nd
un
in
pr
bl
Au ce &
ul
se
tf
s&
ile
el
ia
te
ru
Pu
e
n
m
m
m
o
e
av
al
&
nc
ac ene
,
lif
an tra
ha upp
ag
n
st
et
ip
m
om
du stria
c
a
c & ctio
re
al
Tr
na
an d &
n
m
tri
tru
m
er
sp
l
G
ce elec
S
te
to
co
Fi
ec bev
ce
le
ro
ria
du
s,
eu
wa
st
rd
d
tro str
Fo
te
el
Ae
&
So ent
(in
st
In
t
du
d
c,
n
ile
e
Co
lin
ar
fe
rs
In
m
m
tri
gy
ob
ni
In
ftw
Li
st
ar
od
d
lo
M
xe
ve
Ph
du
no
el
Fo
ec
in
Fi
s,
ro
ch
te
El
Ga
sp
Te
ta
ga
es
l&
al
Re
Oi
Footnotes
62 For example, see the MOD Contracts Bulletin
63 PFK Deal Drivers
64 Department of Trade and Industry, 2004. Information Security Breaches Survey 2004 Technical Report
65 ‘Cost of UK data breaches 2010’, Ponemon Institute, July 2010.
66 The definitions of company sizes are consistent with those used in the BERR 2008 Information Breach Survey.
67 Source: BIS
We believe that these results are because: This is not to say that other types of cyber
attacks are of no concern to the CNI. The CNI is a
– companies within the CNI are established key target for cyber terrorism and cyber warfare,
providers of core services that do not have a where the motive is to cause disruption and fear
high level of IP; rather than to obtain financial revenue.
– companies within the CNI tend to be stable, The Centre for the Protection of National
with limited M&A activity; Infrastructure (CPNI) currently provides advice
– companies within the CNI tend to provide and support to companies in the CNI on how they
services directly to the public, and very little can improve their levels of protection against
of their turnover is generated through a cyber attacks. We recognise that the CNI is
commercial tendering process; exposed to other types of cyber risk, which are
not instigated by financially-motivated criminals,
– companies within the CNI do not rely heavily but nevertheless recommend that at least the
on the use of the Internet to sell their products same emphasis should be given by the CPNI to
or services. the business sectors we have shown to be at the
greatest risk of cyber crime.
Footnotes
68 For example, see Cyber-Extortion: ‘The Elephant in the Server Room’, Adam J. Sulkowski and Timothy Shea, May 2007
69 Ibid
70 For a definition of the CNI see the Centre for the Protection of the National Infrastructure web site, www.cpni.gov.uk
22 Detica
The costs of cyber crime vary considerable – Some types of cyber crime may be
across business sectors much larger or smaller in scale than we
We found that there are large variations in the estimate, especially in areas which are
profile of cyber crime across different business typically undetected, under-reported or not
sectors. We believe that this is due to a number investigated. For example, online extortion is
of factors, which may include: very difficult to estimate as no information on
its scale is publically available.
– The sectors most affected are outside
the CNI, and so have not necessarily had – There are high knock-on indirect economic
the levels of regulation or investment in effects of cyber crime which compound the
infrastructure or, resources to tackle cyber estimates made in this study. Examples
crime in the same way as those sectors that include the growth and increasing influence
do fall under CPNI’s principal remit. The only of highly organised criminal organisations and
exception to this is the financial sector. activity, and the potential re-investment of cyber
criminal proceeds into other criminal activities,
– Each sector has a very different cyber
such as drug dealing and human trafficking.
risk profile, and this can be due to several
variables, such as the online presence of – Some economically-motivated cybercrimes
companies in the sector typically, the amount on businesses and the Government can
of liquidity they hold, the current market cause other harm to individual citizens,
activity they engage in and the investment in which magnifies the impact of the original
IP and security they make. crime. For instance, businesses that are
severely impacted by cyber crime may have
– The scale of IP theft across sectors differs
to reduce staff levels accordingly to maintain
depending on its value, because companies
their profit margins. This can lead to job
in some sectors invest more heavily in IP than
losses and less consumer spending, which in
others, or consider IP generation more critical
turn, reduces the cash flow to organisations
to their strategic growth.
and creates a vicious circle.
– The loss to business is much larger than
the loss to citizens, because, it seems, that
cyber criminals can make more money from
successful attacks on businesses through IP
theft, online theft, espionage and customer
data loss.
– We believe that there are significant under-
reporting issues in some cyber crime areas,
which may arise from lack of awareness or
reputational considerations on the one hand,
but also because of uncertainty of where to
report, whether it will make a difference and
confusion about when a cyber criminal attack
is actually taking place on the other.
CHAPTER 5
CONCLUSIONS AND
RECOMMENDATIONS
Footnote
70 “Business and the cyber threat: unknowingly under siege?”, Detica security monitor, December 2010
24 Detica
ANNEX A: The UK aerospace and defence sectors
continue to represent significant long-term
ORGANISATIONS CONSULTED growth opportunities for the UK economy,
Representatives from the following government with international companies attracted by the
departments were consulted during the study: UK’s open market, competitive supply base
and strong government support for R&D. The
– Serious Organised Crime Agency (SOCA) aerospace and defence sectors spent around
– Intellectual Property Office (IPO) £2bn on R&D in total and were the second
largest contributor to R&D in the UK1000 and
– Police Central E-crime Unit (PCeU) the seventh largest in the G1000 in 2008. In
– Centre for the Protection of the National 2008, the three giants of the UK aerospace
Infrastructure (CPNI) sector – Airbus, BAE Systems and Rolls-Royce –
collectively spent almost £1.2bn on R&D.
– The Department for Business Innovation and
Skills (BIS) Due to the high levels of revenue generated by
this market, combined with fierce international
In addition, several discussions were held with competitiveness and substantial investment in
senior security staff within some of the most R&D, this sector is likely to be affected by cyber
high profile organisations across industry crime through industrial espionage (through
sectors. For the purposes of this report, these international corporations), IP theft and share price
businesses have remained anonymous. manipulation (through state sponsored activity).
Automobiles and parts
ANNEX B: BUSINESS SECTOR The turnover of the UK automotive sector is
£24bn, contributing approximately 1.5 per cent
BACKGROUND of GDP and generating some £10.2bn value
This appendix provides background information added. The industry employs some 715,000
on the key business sectors that are potentially people, both directly in vehicle manufacturing
at greatest threat from cyber crime. The and in the supply and distribution chain. About
information was used to inform the development half of added value comes from manufacturing
of the cyber crime impact model. and assembly, which represents about 15 per
It must be noted that, whilst every effort cent of total UK manufacturing value added.
was made in this study to obtain the most The UK sector’s particular strengths include
authoritative, reliable and up to date information design engineering, especially advanced
on each industry sector, this data has not always technology in motorsport. It is also increasingly
been available. Although changing market becoming a centre for engine production and in
conditions and new research may, therefore, ‘premium’ cars.
alter the assessments below, we hope that the The automobiles and parts sector was the
framework provided in this study will help in fifth largest contributor to R&D in the UK1000
future studies and evaluations of the total cost and the second largest in the G1000 in 2008.
of cyber crime to the UK. Overall the industry is currently investing over
Aerospace and defence £1bn annually in new plant and technology,
The UK aerospace industry is the world’s largest equivalent to 13 per cent of gross value-added.
outside the USA with a 17 per cent share of The UK is also a centre for design engineering
the global market. It has an annual turnover of where around 7,500 people are employed,
around £139bn per annum according to the UK generating a turnover of some £650m, with
National Accounts Blue Book 2010. It directly around 65 per cent exported. Automotive R&D
employs 101,000 workers, and supports a total accounted for six per cent of total UK R&D and
of 230,000 jobs across the UK economy. It also the innovation generated can support other
contains a highly skilled workforce, with 36 per United Kingdom industries.
cent of all employees having a university degree Due to the high levels of revenue generated by
ANNEXES
or equivalent. The UK defence industry provides this market, combined with fierce international
high-value employment, technology, innovation competitiveness and substantial investment in
and exports and is a core element of the UK R&D, this sector is likely to be affected by cyber
manufacturing industry. crime through industrial espionage (through
international corporations), IP theft and share price
manipulation (through state sponsored activity).
26 Detica
Food and beverages Industrial engineering Not-for profits
The UK Food and Beverage manufacturing In 2007 the UK’s total exports in the engineering The UK Not for Profits sector generates a
industry is the single largest manufacturing sector exceeded £109bn, with manufacturing total of £111bn revenue and comprises of
sector in the UK, with a turnover of £72.8bn and accounting for 14 per cent of the UK’s GDP both charities (with £52bn generated and
a gross value added of £21.6bn, accounting and 55 per cent of its exports. There are some 188,000 organizations) and higher educational
for 15 per cent of the total manufacturing 2.9m people employed in UK manufacturing. institutions (with £59bn generated). Some
sector. Employing more than 500,000 people, it Examples of industrial engineering include charities are large in both income and staffing,
makes a huge contribution to the economy and nanotechnology, ceramics, plastics processing, but more than half of registered charities have
positions the UK as the fifth largest exporter of printing and publishing, processing and an annual income of less than £10,000. For
value-added food and drink. All this economic packaging equipment, automation, and solids higher educational institutions, there is a
activity is carried out by just over 7,000 food and materials handling substantial employment effect with around
and drink enterprises – many of which are small 670,000 jobs being created throughout the
The UK is the world’s sixth-largest engineering
companies employing less than 10 people. economy in 2007/08. Of these some 372,000
and manufacturing base and engineering and
people were directly employed by universities
The food and beverage sector accounts for over manufacturing industries spent £10.8bn on
and colleges. There is further evidence of the
four per cent of the total R&D spend reported in R&D in 2006.
importance of international students to the
the UK. Due to the highly competitive nature of
Due to the high levels of revenue generated by sector and the wider economy. One significant
the industry, there are over 1,500 new products
this market, combined with high investment in impact is the volume of personal off-campus
introduced each quarter. The mix of product
R&D and the high levels of medium and smaller expenditure of these students, which amounted
and process innovation is a core strength of
companies, this sector is likely to be affected to £2.3bn in 2008.
the sector. Due to its size, direct links to health
by cyber crime through industrial espionage
outcomes and its impact on emissions from Charitable funding of UK R&D has been rising
(through international corporations) IP theft
production and logistics, the food and drink in real terms since 2004 and reached around
(through state sponsored activity), and service
sector should have a strategic focus in the UK. £950m in 2008-09. Most research charities
denial (as there is a high level of online reliance
do not consider the funding of university
Due to the high levels of revenue generated by this by smaller companies).
infrastructure their responsibility, although many
market, this sector is likely to be affected by cyber
Mobile telecommunications contribute to it. Higher education institutions
crime through online theft and online fraud (as there
The contribution of the mobile telephone income is around £3.7bn through research grants
is a high level of concentrated financial liquidity).
industry to UK GDP was £40.6bn in 2009. This and contracts, through around 2,000 UK public
Healthcare, pharmaceutical and biotech was 2.2 per cent of the UK’s total economic sources and around 1,000 private sources.
The pharmaceuticals and biotechnology output and the industry contributes £15bn
Due to the high levels of revenue generated
industries contributed around 4 per cent of total a year to government finances. The sector
by this market, combined with substantial
UK value added in 2008, while the healthcare is responsible for nearly 200,000 jobs. The
investment in R&D, this sector is likely to be
equipment and services sector contributed UK (mobile) market is considered to be one
affected by cyber crime through IP theft (through
0.5 per cent. The total annual turnover for all of the most competitive in the world with well
state sponsored activities), customer data
UK healthcare, pharmaceuticals and biotech established 2G GSM (Global Systems for Mobile
theft (through large databases containing
industries was around £29bn. Communications) and 3G UMTS (Universal
personal information in charities) and industrial
Mobile Telecommunications Systems)
The UK-based healthcare technology industry espionage (through international corporations).
operators. Since the privatisation of the
plays a significant role in contributing to patient
incumbent operator BT in 1984, competition has Oil and gas
care, public healthcare and the national
developed strongly. There are now approximately The oil and gas industry is one of the largest
economy with values of £5.6bn annual sales in
170 fixed telecommunications providers, five UK economic contributors in terms of added
2007 and £5.4bn in exports in 2008.
mobile providers, 59 mobile service providers value (measured as the value of sales minus
The UK is one of the world's largest exporters of and 700 Internet service providers. production costs), accounting for £22bn in
pharmaceuticals by value. Industry exports in 2006. This amounted to 13 per cent of the
The mobile telecommunications sectors
2005 were £12.2bn and created a trade surplus production and manufacturing industry total
were the sixteenth largest contributor to
of £3.4bn. UK domestic market accounts for in the UK. In 2007, the upstream oil and
R&D in the UK1000 in 2008. Both BT and
four per cent of world consumption. gas industry invested £4.9bn in capital and
Vodafone dominated R&D spending in the UK
£1.3bn in exploration and spent £6.2bn in
The UK's medical biotechnology sector is the most telecommunications sectors, as together they
operations, making a total expenditure for the
mature in Europe and contains approximately 450 spent 93 per cent of the sector total, and five
year of £12.4bn. The industry now provides
biotechnology businesses in the UK employing per cent of the overall UK1000 spend. R&D
employment for 450,000 people and delivers
21,830 with revenues around £2.63bn decreased in the UK telecommunications
around £21bn in taxes every year, both from
sectors in 2008, while sales grew. Of the
The pharmaceutical industry invests around 30 direct taxation of production and the wider
biggest investors, only Vodafone grew its R&D
per cent of its sales in research. This amounts economic activities of the UK supply chain. In
investment (by 20 per cent) more quickly than
to nearly £4bn, or more than £10m a day. The 2009, the UK's balance of trade in goods and
its sales.
pharmaceuticals and biotechnology sector services was boosted by oil and gas production
was the largest contributor to R&D in both the Due to the high levels of revenue generated by up to £27bn.
UK1000 and the G1000 in 2008. by this market, combined with significant
In 2009, the sector was the largest industrial
investment in R&D and the high levels of
Due to the high levels of revenue generated by investor, spending £5.7bn on R&D activities.
customer data, this sector is likely to be affected
this market, combined with high investment in Shell was the largest investor in research
by cyber crime through industrial espionage
R&D and the high levels of medium and smaller and development among the major oil firms
(through international corporations) IP theft
companies, this sector is likely to be affected spending nearly £800m on the research and
(through state sponsored activity), and online
by cyber crime through industrial espionage development of technologies to produce more
theft, customer data theft and online fraud (as
(through international corporations) IP theft energy, and more efficient fuels and products.
there is a high level of customers, transactions
(through state sponsored activity), and service
and profits). Due to the high levels of revenue generated
denial (as there is a high level of online reliance
by this market, combined with significant
by smaller companies).
investment in R&D and the high dependency
level of other sectors on the energy produced
by oil and gas, this sector is likely to be affected
by cyber crime through industrial espionage,
share price manipulation (through international
corporations) and IP theft (through state
sponsored activity).
28 Detica
The Cost of Cyber Crime 29
About Detica
Detica delivers information intelligence solutions to government
and commercial customers. We help them collect, exploit and
manage data so they can deliver critical business services
more effectively and economically. We also develop solutions to
strengthen national security and resilience.
We integrate and deliver world-class solutions to our customers’
most complex operational problems – often applying our own
unique intellectual property. Our services include cyber security,
managing risk and compliance, data analytics, systems integration
and managed services, strategy and business change and the
development of innovative software and hardware technologies.
Detica is part of BAE Systems, a global defence and security
company with over 100,000 employees worldwide. BAE Systems
delivers a full range of products and services for air, land and naval
forces, as well as advanced electronics, security, information
technology solutions and customer support services.