Tyler Moore Southern Methodist University
In this talk I present what we believe to be the first systematic study of the costs of cybercrime. It was prepared in response to a request from the UK Ministry of Defence following skepticism that previous studies had hyped the problem. For each of the main categories of cybercrime we set out what is and is not known of the direct costs, indirect costs and defence costs - both to the UK and to the world as a whole.
We distinguish carefully between traditional crimes that are now 'cyber' because they are conducted online (such as tax and welfare fraud); transitional crimes whose modus operandi has changed substantially as a result of the move online (such as credit card fraud); new crimes that owe their existence to the Internet; and what we might call 'platform crimes', such as the provision of botnets which facilitate other crimes rather than being used to extract money from victims directly.
As far as direct costs are concerned, we find that traditional offences such as tax and welfare fraud cost the typical citizen in the low hundreds of pounds/euros/dollars per year; transitional frauds cost a few pounds/euros/dollars; while the new computer crimes cost in the tens of pence/cents. However, the indirect costs and defence costs are much higher for transitional and new crimes. For the former they may be roughly comparable to what the criminals earn, while for the latter they may be an order of magnitude more. As a striking example, the botnet behind a third of the spam sent in 2010 earned its owners around US$2.7m, while worldwide expenditures on spam prevention probably exceeded a billion dollars. We are extremely inefficient at fighting cybercrime; or to put it another way, cyber-crooks are like terrorists or metal thieves in that their activities impose disproportionate costs on society. Some of the reasons for this are well-known: cybercrimes are global and have strong externalities, while traditional crimes such as burglary and car theft are local, and the associated equilibria have emerged after many years of optimization. As for the more direct question of what should be done, our figures suggest that we should spend less in anticipation of cybercrime (on anti-virus, firewalls, etc.) and more in response - that is, on the prosaic business of hunting down cybercriminals and throwing them in jail.
This paper is based on joint work with Ross Anderson (Cambridge), Chris Barton (Cloudmark), Rainer Boehme (Muenster), Richard Clayton (Cambridge), Michel van Eeten (TU Delft), Michael Levi (Cardiff), and Stefan Savage (UC San Diego)