Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

Police warning on alarming rise of cybercrime in Tayside

Detective Superintendent Willie Cravens, of the Scottish Crime Campus.
Detective Superintendent Willie Cravens, of the Scottish Crime Campus.

Police have warned Tayside residents to be on their guard to an alarming rise in cybercrime after an Aberfeldy householder was duped into paying £1,000 to devious criminals.

Officers say criminal gangs – some from outwith the UK – are using ingenious methods to hack into householders’ emails and take money from their bank accounts.

As a result, police have invested £1.5 million to set up a dedicated cybercrime unit in Edinburgh, where specially trained digital forensic scientists are trying to stem the rising tide.

Perthshire sergeant Karen Harrison said cybercrime is “prevalent” throughout Tayside.

“It is becoming widespread in Tayside,” she said.

“It tends to be mainly elderly people these criminals target but we’ve also had younger professional folk fall victim to them – and these are cases that are reported to us.

“Many cases go unreported because some residents are too embarrassed to contact the police.”

“The recent incident in Aberfeldy involved criminals stating they were from a Telecoms company and they managed to get away with the person paying them £1,000.

“The criminals claimed to be from a legitimate telecom company who had recently completed work on the victim’s broadband, and phoned this person to claim they required to install some software on their computer.

“This software then allowed the caller remote access to the victim’s computer and access to their personal details.

“This case is still under investigation and we have been liaising with our colleagues at the cybercrime hub in Edinburgh on this, as it is part of the bigger picture.

“We also work with banks’ fraud teams regarding cybercrime.”

Sergeant Harrison said tracing the perpetrators is a difficult task.

“The schemes can be elaborate and often involve using very technical equipment, such as criminals’ finding out a person has had work carried out in a kitchen and managing to then send them an emailed bill,” she said.

“The email is only altered slightly so most residents wouldn’t notice the difference.

“It’s even more difficult to trace the criminals if they come from outwith the UK.

“This is why we urge victims to contact the police.”

Detective Superintendent Willie Cravens, who is based at the Scottish Crime Campus in Gartcosh, confirmed that a “significant” investment has been made to create the state-of-the art digital forensics capability in Edinburgh.

“This forms part of Police Scotland’s wider capability which exists at a number of locations throughout Scotland,” he commented.

“We have other units located throughout Scotland who work together to support the investigation of all cyber-related criminality affecting Scottish communities and business.”

The Edinburgh facility houses specialist investigators who carry out forensic digital examinations of hardware in support of police investigations ranging from child sexual exploitation to serious organised crime.

The cybercrime hub brings together units that previously existed in Glenrothes, Falkirk and the Scottish capital itself. It was introduced in a bid to respond to a huge rise in the demand for digital forensic services to support cyber investigations and also help to protect the country’s computer infrastructure from cyber-attacks.

Police Scotland established that the amount of memory in devices submitted for examination doubles approximately every two years and, as a result, this has placed a significant demand on police resources.