Prison terms for phishing fraudsters

England and Wales pass new Fraud Act


A new anti-fraud bill has been passed into law for England and Wales. The Fraud Act 2006 received Royal Assent last week and will come into force in early 2007.

The new law aims to close a number of loopholes in preceding anti-fraud legislation, which the government said was unsuited to modern fraud.

Until now there has been no single, general fraud law in English law, but an untidy mess of eight specific statutory crimes, such as "obtaining property by deception", and a vague common law offence of "conspiracy to defraud". Scotland does have a common law crime of fraud, committed when someone achieves a practical result by a false pretence.

The Fraud Act introduces a general offence of fraud which can be committed by false representation, by failing to disclose information, or by abuse of position. The offence carries a maximum sentence of 10 years' imprisonment.

"The Act replaces the existing complicated array of over-specific and overlapping deception offences," said a Home Office statement. "These offences have proved inadequate to tackle the wide range of possible fraudulent activity today or keep pace with rapidly developing technology."

Struan Robertson, a technology lawyer with Pinsent Masons and editor of OUT-LAW.COM, said: "One perceived loophole in the old regime was the possession of computer files in preparation for launching a phishing attack."

This is where emails are sent in bulk, purporting to represent a well-known brand in the hope of sending victims to a bogus website that tricks them into disclosing bank account details. Such 'phishing kits' have been available on the internet but difficult to prosecute. "That loophole is closed by the new Act," said Robertson. "When it comes into force, possession of such any software or data for use in a fraud could result in a prison term of up to five years."

The Act also provides that writing software "knowing that it is designed or adapted for use in...connection with fraud" can result in a sentence of up to 10 years.

"The new Fraud Act will make an important contribution to the fight against fraud," said Home Office minister Gerry Sutcliffe. "It will remove the deficiencies in the existing provisions and establish an effective criminal law that is flexible enough to capture the true breadth of fraud today."

KPMG Forensic's Fraud Barometer reports that fraud levels in the UK are increasing dramatically. Fraud levels rose to their highest level in 10 years in 2005, to £900m that year. Already 2006 is proving worse, with £650m worth of fraud recorded in the first six months of the year, compared to £249m in the same period in 2005.

KPMG's barometer measures the fraud levels involved in court cases in the UK where the fraud under consideration is greater than £100,000.

Figures published this week by the UK payment card association APACS said that credit card fraud fell in the latest measured period, the first six months of 2005, from £219m to £209m. Online banking fraud increased from £14m to £22m in the same period, it said.

See: Fraud Act 2006 (17 page/112KB PDF)

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.


Other stories you might like

  • Prisons transcribe private phone calls with inmates using speech-to-text AI

    Plus: A drug designed by machine learning algorithms to treat liver disease reaches human clinical trials and more

    In brief Prisons around the US are installing AI speech-to-text models to automatically transcribe conversations with inmates during their phone calls.

    A series of contracts and emails from eight different states revealed how Verus, an AI application developed by LEO Technologies and based on a speech-to-text system offered by Amazon, was used to eavesdrop on prisoners’ phone calls.

    In a sales pitch, LEO’s CEO James Sexton told officials working for a jail in Cook County, Illinois, that one of its customers in Calhoun County, Alabama, uses the software to protect prisons from getting sued, according to an investigation by the Thomson Reuters Foundation.

    Continue reading
  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading

Biting the hand that feeds IT © 1998–2021