What Proportion of Cyber-Crime Is Associated with Malware?

Total Page:16

File Type:pdf, Size:1020Kb

What Proportion of Cyber-Crime Is Associated with Malware? Science & Technology Committee: Written evidence Malware and Cyber-crime This volume contains the written evidence accepted by the Science & Technology Committee for the Malware and Cyber-crime inquiry. No. Author No. Author 00 Home Office 00a Supplementary 01 Professor Peter Sommer 02 Dr Huma Shah 03 David Emm and Professor Steven Furnell 04 Intellect 05 StopBadware 06 Fenmeccanica Cyber Solutions 07 MAAWG 08 McAfee 09 Symantec 10 Dr Richard Clayton 11 BCS (the Chartered Institute for IT), IET (The Institution of Engineering and Technology), and The Royal Academy of Engineering 12 Amit Bhagwat 13 SOCA 14 Police Central e-Crime Unit 15 Raytheon UK 16 Dellsecureworks 17 Microsoft 18 Nominet UK 19 Australian Institute of Criminology 20 PhonepayPlus 21 Research in Motion 22 23 24 25 26 27 28 As at 1 December 2011 Written evidence submitted by the Home Office (Malware 00) Prepared by the Home Office in consultation with other Government departments. Introduction 1. This paper sets out the Government evidence to the Science and Technology Committee inquiry into malicious software (malware) and cyber crime. It has been prepared by the Home Office in consultation with officials from other Government departments including the Office of Cyber Security and Information Assurance at the Cabinet Office, the Cyber Security Operations Centre and the Department for Business, Innovation and Skills. 2. The paper outlines what the Government believes to be the situation regarding malware and cyber crime and makes references to current and future actions which are tackling these issues. Separate evidence will be submitted by the Serious and Organised Crime Agency (SOCA) and by the Metropolitan Police Service’s Police Central e-Crime Unit. The papers from these organisations will provide more information on current operational activity to tackle cyber crime. 3. We define the term ‘malware’ to denote software designed with malicious intent containing features or capabilities that can potentially cause harm directly or indirectly to the user and/or the user's computer system. 4. Malware allows criminals to compromise and control computers. This is achieved through a variety of means, including spam e-mails that encourage a user to click on a link that downloads the malware, or through placing malicious code in an otherwise legitimate website that will cause the user's computer to be infected when the website is viewed. 5. Malware is used for a variety of criminal purposes, in particular data theft. This might include credit card or bank account details, or industrial or government information, to be sold on for profit. Often the criminal and the purchaser of the information will be in different countries, with the victim in a third country. 6. We assess that the threat from malware is growing, with a huge rise in the amount of it being created and used – in 2010 more than 286m unique malware variants were identified1. Some of these are relatively simple but many are highly sophisticated. 7. Of the various types of malware, Trojans have become the most prevalent - making up nearly 70% of attacks according to some anti-virus 1 Symantec Internet Security Threat Report 2010 1 companies - as they are the most flexible in allowing the instigators of an attack access to the target computer. They can be seen as an enabler for all the other types of malware. What proportion of cyber-crime is associated with malware? 8. Cyber crime falls into a number of categories, within the general principle that what is illegal offline is illegal online. Some crimes can only be carried out using the internet, including attacks on computer systems to disrupt IT infrastructure, and the stealing of data over a network using malware, often to enable further crime. 9. Other crimes have been transformed in scale or form by their use of the internet; for example credit card fraud can now take place on an industrial scale. Although crimes such as fraud and theft have always existed, the growth of the internet has opened up a new market, allowed for a degree of anonymity and has created new opportunities for organised criminal groups to finance their activities. 10. A third type of crime, which uses the internet but is not dependent on it, is that which is facilitated by the internet. Networks are used for communication, organisation, or to try to evade law enforcement, in the same way as older technologies such as telephones. The internet may be used to organise more effectively a range of ‘traditional’ crime types such as drug dealing, people smuggling, and child exploitation and to conceal them more easily from law enforcement agencies. Mobile internet technology was used by rioters to co-ordinate looting and disorder in August of this year. 11. Determining the proportion of cyber crime which involves malware would therefore depend on which level of cyber crime was under consideration. Moreover, there is no easy measure of the levels of the different types of cyber crime or of how they operate. It is also difficult to gather and assess information on cyber crime as it occurs. 12. Work is being carried out to address this issue; for example, Action Fraud, which works closely with the National Fraud Intelligence Bureau, is to be expanded to become the single reporting point for financially-motivated cyber crime. 13. However, the threat posed by cyber crime is believed to be significant. The Cost Of Cyber Crime2, published by Detica and the Office of Cyber Security and Information Assurance in February 2011, estimates the cost to the UK of cyber crime to be up to £27bn per year, or around 2% of GDP. Industrialisation of cyber crime to enable high volume activity, such as mass data theft, is largely reliant on malware. 2 http://www.cabinetoffice.gov.uk/resource-library/cost-of-cyber-crime 2 14. It is therefore not possible to determine what percentage of cyber crime is facilitated by malware, but there is no doubt that it is a significant factor. As mentioned in the introduction, production of malware is increasing exponentially and it has transformed the ability of criminals to steal data over networks. Where does the malware come from? Who is creating it and why? 15. The major threat from cyber crime comes from increasingly technically- proficient individuals and organised crime groups. These groups, and the infrastructure used in the attack, are often outside the jurisdiction of the UK. The criminals may be in one country and their means of cyber attack in a second and their victims in a range of other countries, making evidence gathering and identification of the criminals difficult. They may not fit the traditional profile of organised crime groups, and may be more of an affiliation of individuals who never meet except online. 16. Most organised criminal activity is aimed, either directly or indirectly, at making money. Organised crime groups and individuals use cyber technology to support traditional criminal activities or to develop new criminal schemes that exploit emerging vulnerabilities in rapidly evolving cyber technologies and online systems. By focusing their activity on areas which afford the broadest opportunities, criminals increase their potential monetary returns. Criminal finances and profits are central to organised crime and they constantly seek the opportunity to increase their returns whilst reducing their risk exposure. 17. Although most criminal activity is financially motivated, a spate of recent attacks on company websites has been orchestrated by activists protesting against those associated with ideals they disapprove of. This has highlighted the disruption that organised groups can cause, in order to further their aims, through the use of malware and techniques initially developed for other criminal purposes. This type of activity could be used against any public or private sector organisation with a presence online and against which a group may hold a grievance. 18. While the creator of malicious software may not be the end-user criminal, the goals noted above create a market place for malware. As such most of the malware writers will expect to profit from their works and have an increasingly sophisticated business model, including maintenance and support for their software, hiring their expertise out directly and upgrading their products in light of changes in the market, to support this. Malicious software and access to other tools, such as pre-existing botnets, is freely available for purchase at a variety of ‘underground’ internet fora. This ‘underground’ infrastructure also requires protection, leading to secondary layers of required technical expertise. The profit motive is less prevalent amongst the activist community where more ideological goals may drive the malware writers. 19. Many IT security companies report the source of malware as the location where it is hosted as it is often difficult to identify the origin of the 3 software itself. This reporting of attack location rather than the source of the malware can badly skew statistics on where malware creators are based, however, the IT Security company BitDefender suggests in its H1 2011 report (http://www.bitdefender.com/files/Main/file/H1_2011_E- Threats_Landscape_Report.pdf ) that China (31%), Russia (22%) and Brazil (8%) are the largest producers of malware. What level of resources are associated with combating malware? 20. In October 2010 the National Security Strategy identified the cyber threat to the UK, which includes cyber crime, as a Tier 1 threat, on the same level as terrorism. £650m of new money has been allocated to a National Cyber Security Programme which will bolster our cyber capabilities in order to help protect the UK’s national security, its citizens and our growing economy in cyber space. At least £63m of this money will go towards enabling the UK to transform our response to cyber crime, of which countering malware is an important element.
Recommended publications
  • Saints and Sinners: Lessons About Work from Daytime TV
    Saints and sinners: lessons about work from daytime TV First draft article by Ursula Huws for International Journal of Media and Cultural Politics Introduction This article looks at the messages given by factual TV programmes to audiences about work, and, in particular, the models of working behaviour that have been presented to them during the period following the 2007‐8 financial crisis. It focuses particularly, but not exclusively, on daytime TV, which has an audience made up disproportionately of people who have low incomes and are poorly educated: an audience that, it can be argued, is not only more likely than average to be dependent on welfare benefits and vulnerable to their withdrawal but also more likely to be coerced into entering low‐paid insecure and casual employment. It argues that the messages cumulatively given by ‘factual’ TV, including reality TV programmes ostensibly produced for entertainment as well as documentaries, combine to produce a particular neoliberal model of the deserving worker (counterposed to the undeserving ‘scrounger’ or ‘slacker’) highly suited to the atomised and precarious labour markets of a globalised economy. This is, however, a model in which there are considerable tensions between different forms of desired behaviour: on the one hand, a requirement for intense, individualised and ruthless competitiveness and, on the other, a requirement for unquestioning and self‐sacrificing loyalty and commitment to the employer and the customer. These apparently contradictory values are, however, synthesised in a rejection, often amounting to demonisation, of collective values of fairness, entitlement and solidarity. The context Despite the explosive growth of the internet and multiplication of devices for accessing it, television remains the main means by which most people absorb narrative information.
    [Show full text]
  • The Challenges from Social Media for Intellectual Property Rights
    Share and Share Alike The Challenges from Social Media for Intellectual Property Rights Research commissioned by the Intellectual Property Office and carried out by: Dennis Collopy and Dr. Tim Drye with contributions from Florian Koempel, Peter Jenner and Chris Carey Submitted version: 20/07/2017 This is an independent report commissioned by the Intellectual Property Office (IPO). Findings and opinions are those of the researchers, not necessarily the views of the IPO or the Government. © Crown copyright 2017 Intellectual Property Office is an operating name of the Patent Office 2017/05 A study conducted by a unique team of academic and industry based ISBN: 978-1-910790-30-4 researchers Share and Share Alike The Challenges from Social Media for Intellectual Property Rights UNIVERSITY OF HERTFORDSHIRE Published by The Intellectual Property Office August 2017 The University of Hertfordshire (UH), the UK’s leading business-facing University, is among the most successful new universities in the UK, with 1 2 3 4 5 6 7 8 9 10 a flourishing student community of over 27,700, including more than © Crown Copyright 2017 2,900 international students from over 85 different countries. You may re-use this information (excluding logos) free of charge in any format or medium, under the UH’s Music and Entertainment Industry Research Group focuses on UK terms of the Open Government Licence. To view and international creative industries-relevant research. this licence, visit http://www.nationalarchives.gov. uk/doc/open-government-licence/ www.herts.ac.uk/research/ssahri/research-areas/music/meirg or email: [email protected] Where we have identified any third party copyright information you will need to obtain permission from AUDIENCENET the copyright holders concerned.
    [Show full text]
  • Criminality, Consumption and the Counterfeiting of Fashion Goods: a Consumer Perspective
    Criminality, Consumption and the Counterfeiting of Fashion Goods: A Consumer Perspective Joanna Suzanne Large "Submitted in accordance with the requirements for the degree of Doctor of Philosophy" The University of Leeds School of Law August 2011 Intellectual Property and Publication Statements "The candidate confirms that the work submitted is her own and that appropriate credit has been given where reference has been made to the work of others." "This copy has been supplied on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement." "The right of Joanna Large to be identified as Author of this work has been asserted by her in accordance with the Copyright, Designs and Patents Act 1988." © 2011 The University of Leeds and Joanna Large Acknowledgements This PhD was funded by the Centre for Criminal Justice Studies (CCJS) (School of Law, Leeds University) scholarship and my first thanks go to the CCJS for providing this opportunity. Without the funding I simply would have not been able to take on a PhD. I would also like to thank colleagues at the CCJS for their support throughout. I am forever in debt to my supervisors. In particular to Emma Wincup for her constant support, ideas, and patience, tolerance and help with my constant stream of questions as the final deadline drew near, and guidance throughout the whole process. Also, to David Wall for my early opportunities as a researcher on Couture and inspiration and confidence to take on the PhD in the first place. The final year of writing up I spent working at the Centre for Criminology, University of Glamorgan.
    [Show full text]
  • Oecd Dac Handbook on Security System Reform (Ssr) Supporting Security and Justice
    IF-SSR THE OECD DAC HANDBOOK ON SECURITY SYSTEM REFORM (SSR) SUPPORTING SECURITY AND JUSTICE 1 ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of 30 democracies work together to address the eco- nomic, social and environmental challenges of globalisation. The OECD is also at the forefront of efforts to understand and to help governments respond to new developments and concerns, such as corporate governance, the information economy and the challenges of an ageing population. The Organisation provides a setting where governments can compare policy experiences, seek answers to common problems, identify good practice and work to co-ordinate domestic and international policies. The OECD member countries are: Australia, Austria, Belgium, Canada, the Czech Republic, Denmark, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Japan, Korea, Luxembourg, Mexico, the Netherlands, New Zealand, Norway, Poland, Portugal, the Slovak Republic, Spain, Sweden, Switzerland, Turkey, the United Kingdom and the United States. The Commission of the European Communities takes part in the work of the OECD. OECD Publishing disseminates widely the results of the Organisation’s statistics gathering and research on economic, social and environmental issues, as well as the conventions, guidelines and standards agreed by its members. This work is published on the responsibility of the Secretary-General of the OECD. The opinions expressed and arguments employed herein do not necessarily refl ect the offi cial views of the Organisation or of the governments of its member countries. This report is also available in French under the title: “Manuel de l’OCDE/CAD sur la réforme des systèmes de sécurité: soutenir la sécurité et la justice”.
    [Show full text]
  • Mar-Apr 2006 Wkg Copy
    MARCH-APRIL 2006 CYBER CRIME NEWSLETTER Issue 17 Table of Contents News Highlights in This Issue: Features 2 Law Journal on Search and Seizure Available Laws to Stop Illegal Online Gambling Urged by 49 AGs 5 Net Victimization Seminar Held at Ole Miss FRCP Electronic Discovery Amendments Okayed Law Journal on Search and Seizure Available 2 AGs Fighting Cyber Crimes 5 49 AGs Urge Laws Stopping Illegal Online Gambling AG Lockyer and FTC Settle Spam Suit E-Mail Provider Not Liable for User’s Child Pornography 10 Connecticut AG Urges Changes to MySpace.com AG Crist: Judgment Against Katrina Fraud Web Site Illinois AG Sets Up ID Theft Hotline FBI Survey: Computer Crimes Costs $ 67 Billion/Year 16 AG Kline Presents Internet Safety Workshop Louisiana AG Speaks at Cyber Crime Workshop AG Reilly Arrests Online Child Pornographers Virginia Law Requires Schools to Teach Cyber Safety 21 Michigan AG Arrests Online Child Predator AG Hatch Promotes ID Theft Legislation Mississippi AG Announces Plea in Phishing Case AG Nixon Files Felony Charges in ID Theft Case Report Outlines Needs for Forensics Labs 21 Nebraska AG Kicks Off Internet Safety Month AG Chanos: Internet Child Pornography Ring Indicted New Mexico AG’s ICAC Unit Captures Net Predator Supreme Court Approves Electronic Discovery Rules 4 AG Spitzer Sues Seller of E-Mail Addresses North Carolina AG Urges State Classes on Net Crimes AG Petro Holds Town Meeting on Internet Safety E-Mail Service of Elusive Overseas Defendant Allowed 9 Pennsylvania AG’s Unit Charges Internet Predator AG McMaster: Internet Predator Arrested South Dakota AG Says Child Pornographer Sentenced Maryland Spam Law Does Not Violate Commerce Clause 13 AG Abbott: Grand Jury Indicted Child Pornographer Utah AG Unveils ID Theft Reporting System AG McKenna Settles With Deceptive Net Advertiser Internet Coalition Initiates “Stop Badware” Site 17 In the Courts 10 U.S.
    [Show full text]
  • Transcript 061106.Pdf (393.64
    1 1 FEDERAL TRADE COMMISSION 2 3 I N D E X 4 5 6 WELCOMING REMARKS PAGE 7 MS. HARRINGTON 3 8 CHAIRMAN MAJORAS 5 9 10 PANEL/PRESENTATION NUMBER PAGE 11 1 19 12 2 70 13 3 153 14 4 203 15 5 254 16 17 18 19 20 21 22 23 24 25 For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 2 1 FEDERAL TRADE COMMISSION 2 3 4 IN RE: ) 5 PROTECTING CONSUMERS ) 6 IN THE NEXT TECH-ADE ) Matter No. 7 ) P064101 8 ) 9 ---------------------------------) 10 11 MONDAY, NOVEMBER 6, 2006 12 13 14 GEORGE WASHINGTON UNIVERSITY 15 LISNER AUDITORIUM 16 730 21st Street, N.W. 17 Washington, D.C. 18 19 20 The above-entitled workshop commenced, 21 pursuant to notice, at 9:00 a.m., reported by Debra L. 22 Maheux. 23 24 25 For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 3 1 P R O C E E D I N G S 2 - - - - - 3 MS. HARRINGTON: Good morning, and welcome to 4 Protecting Consumers in The Next Tech-Ade. It's my 5 privilege to introduce our Chairman, Deborah Platt 6 Majoras, who is leading the Federal Trade Commission 7 into the next Tech-ade. She has been incredibly 8 supportive of all of the efforts to make these hearings 9 happen, and I'm just very proud that she's our boss, and 10 I'm very happy to introduce her to kick things off. 11 Thank you. 12 CHAIRMAN MAJORAS: Thank you very much, and good 13 morning, everyone.
    [Show full text]
  • Citizens Advice Annual Report 2019/20
    Annual report 2019/20 2 We are Citizens Advice We are Citizens Advice We can all face problems that seem complicated or intimidating. At Citizens Advice, we believe no one should have to face these problems without good quality, independent advice. Our network of charities offers confidential advice With the right evidence, we can show big online, over the phone, and in person, for free. organisations – from companies right up to the government – how they can make things better When we say we’re for everyone, we mean it. for people. People rely on us because we’re independent and totally impartial. That’s why we’re here: to give people the knowledge and the confidence they need to No one else sees so many people with so many find their way forward – whoever they are, and different kinds of problems, and that gives us a unique whatever their problem. insight into the challenges people are facing today. 3 Contents Contents Trustees’ report Strategic report Our year at Citizens Advice Financial statements 4 Introduction Introduction A message from our Chair and Chief Executive As we reflect on the past year, we have much to be proud of. In our long history, we’ve always been there for everyone and this year was no different. We helped 2.8 million people find a way forward, celebrated our 80th anniversary and tackled new and emerging challenges. Our service started the day after the outbreak of World War 2 to help people deal with the impacts of war. Since then, our strength has always been our ability to adapt and keep pace in an ever changing world and to be a trusted and stable source of support.
    [Show full text]
  • Helping People Find a Way Forward
    Helping people find a way forward A snapshot of our impact in 2015/16 Everyone experiences problems Nearly 3 in 4 Almost 5 times of our clients said their as likely to be on a low-income problem affected their lives, when comparing our local Citizens including causing anxiety Advice clients to England and financial difficulty and Wales population Who we help 6.2 million 2.7 million 36 million issues dealt with directly people helped face to visits to our website to get face, by phone, email advice or webchat How we do this 2,900 23,000 locations where we provide volunteers donated an free and independent estimated £114 million worth of support across England volunteering hours and Wales The difference this makes 2 in every 3 4 in 5 90% clients have their clients said advice improved of our clients reported problem solved their lives, including reducing satisfaction with the stress and improving finances overall service All of this benefits individuals and society Gillian Guy, Chief Executive Each year, Citizens Advice helps millions of In this report, we’ve shown this in depth people find a way forward. We do this by about one topic - helping people manage their providing advice, education and support, and money - showcasing what we know about influencing policies and practices that affect our clients’ financial capability, what we do to our clients. address problem debt, and how we ensure people can make effective consumer choices. We have a responsibility and are committed to understanding our value and the difference Part of this is understanding our clients’ we make to communities across England day-to-day challenges.
    [Show full text]
  • PRESS CUTTINGS: April 2012 Five Fake Alcohol Rings Are Smashed Scotland’S Hotspots Have Been Revealed As Edinburgh and Falkirk
    The International Press-Cutting Bureau prepares and supplies these reports to ACG via e-mail on subscription. ACG has received and provided this information in good faith, and is not responsible for any inaccuracies or errors www.ipcb.co.uk PRESS CUTTINGS: April 2012 Five fake alcohol rings are smashed Scotland’s hotspots have been revealed as Edinburgh and Falkirk. Five illegal operations were shut down by trading standards officers in Scotland last year, two in the capital and two in Falkirk. They also made a seizure in Argyll and Bute. The number of successful counterfeit alcohol raids has increased by 500% in the last the three years. SCOTTISH SUNDAY MAIL 01/04/2012 UK STAT OF THE MONTH TOBACCO SMUGGLING The illegal tobacco trade is giving the Government a headache. Cigarette smuggling costs the Exchequer £2.2bn a year in lost revenue. There has been some success in clamping down-more than 20 billion smuggled cigarettes and 2,700 tonnes of rolling tobacco have been seized in the past decade, HMRC claims. MANAGEMENT TODAY 01/04/2012 UK Fake cigs, alcohol are seized A HUGE haul of illegal tobacco has been seized and a loan shark ring smashed following raids by trading standards officers. In a raid carried out on three linked premises in Burnley and Bacup, officers discovered more than 1,300 packs of counterfeit cigarettes and tobacco along with bottles of fake Arctic Vodka. Documents relating to a large-scale loan shark operation in the Rosendale area were also found at one of the locations. BURNLEY EXPRESS (TUESDAY) 03/04/2012 UK Fake goods donated to charity A £120,000 haul of fake designer clothing, footwear and handbags is donated to charity.
    [Show full text]
  • Documentary – Factual
    DANIEL TAYLOR DUBBING MIXER 1 Springvale Terrace, W14 0AE 37-38 Newman Street, W1T 1QA 44-48 Bloomsbury Street, London, WC1B 3QJ Tel: 0207 605 1700 [email protected] Documentary – Factual Great Ormond Street 1 x 60’ Films of Record for BBC Two Grand Designs: House of the Year 3 x 60 Boundless for Channel 4 The Autistic Gardener 2 x 60' Betty TV for Channel 4 Life and Death Row: Love Triangle 8 x 10' BBC Three What a Performance! Pioneers of Popular Entertainment 1 x 60 Liberty Bell for BBC 4 Dr Jeff: Rocky Mountain Vet 4 x 60' Double Act for Discovery Survival in the Skies 1 x 60 Arrow Media for Smithsonian Channel End of the World Night 1 x 90' Oxford Film and Television for Channel 4 Meet the Devotees 1 x 25' BBC Three Metropolis 2 x 60 Nutopia for Travel Channel Science of Stupid 35 x 30' IWC for National Geographic What Britain Bought in 2016 1 x 60' Sundog Pictures for Channel 4 Hidden Histories: Britain’s Oldest Family Businesses 3 x 60’ Raw TV for BBC Four The Fabulous Baker Brothers: A Bite of Britain 6 x 60' Betty TV for Discovery My Phone Sex Secrets 1 x 60’ Back2back Productions for Channel 4 Embarrassing Bodies: The Man with Half a Face 1 x 60’ Maverick TV for Channel 4 Children of the Revolution 1 x 75’ Nayanaya Pictures Good Morning Rocinha 1 x 60' TVE For Al-Jazeera The Crane Gang 2 x 60’ Liberty Bell for BBC Two Black Ops 2 x 60’ World Media Rights for Discovery Katie: The Science of Seeing Again 1 x 60’ Mentorn Media for Channel 4 Food Inspectors 1 x 60' Betty TV for BBC One Shocking Breastfeeding 1 x 60' Betty TV
    [Show full text]
  • Annual Report2016/17
    Citizens Advice. Annual report and accounts 2016/17 Annual report 2016/17 We are Citizens Advice. We’re here for everyone. We provide free, confidential and independent advice to help people overcome their problems. We work to fix the underlying causes of these problems. We are a voice for people on the issues that matter to them. We value diversity, champion equality and challenge discrimination. Introduction The Citizens Advice service has much to funding. We supported our network to celebrate this year, despite a challenging raise £6.4 million in new business income economic climate. – in addition to £21.5 million of core funding. We’re continuing to explore how we can make We’ve helped 2.7 million people with 6.3 our funding more sustainable, our services million problems through high quality advice more resilient and help more people. provided by local Citizens Advice. People accessed this advice face to face, over the The theme of our annual conference was phone and by email and webchat. This was ‘staying ahead in a changing world’. Innovation because of the hard work of staff across the is an important part of this and it’s been service, and the incredible volunteers who exciting to see this brought to life through gave an estimated £114 million worth of time. the Martin Lewis Fund. More than half of the network shared ideas for new ways to help Our consumer helpline helped over half a people in their communities. We’ve been able million people this year and we’re delighted to give several of them the opportunity to test that our network will now deliver this service.
    [Show full text]
  • Download Publication
    THE SCOTTISH ASSOCIATION OF CITIZENS ADVICE BUREAUX Financial Statements For the year ended 31 March 2018 Companies House Registration Number SC089892 THE SCOTIISH ASSOCIATION OF CITIZENS ADVICE BUREAUX A registered Scottish Charity SC016637 and company limited by guarantee SC089892 Financial Statements For the year ended 31 March 2018 Contents Trustees Report 6 Independent Auditors report to the Trustees and Members 14 Statement of Financial Activities 17 Balance Sheet. 18 Cash Flow Statement 19 Notes to the Accounts 20 THE SCOTTISH ASSOCIATION OF CITIZENS ADVICE BUREAUX A registered Scottish Charity SC016637 and company limited by guarantee SC089892 Trustees as at 31 March 2018 Chair: Rory Mair (appointed as Chair 28 March 2017) RMair Rory Mair CBE was appointed as Chair of Citizens Advice Scotland in March 2017. Before that he was Chief Executive of COSLA from 2002-15, and prior to this appointment, Rory had spent five years as Director of Aviemore Projects for Highlands & Islands Enterprise. Previous to this, but following local government re-organisation in 1996, Rory spent a short time as Strategic Director for Social Strategy with Fife Council. Before local government re-organisation, Rory was appointed Chief Executive of Ross & Cromarty District Council and was, at the time, the youngest ever Chief Executive in British local government. In his early career, Rory spent 10 years in a variety of less senior local government posts. 2012 was a year of ups and downs for Rory, as he had a liver transplant in July and received a CBE in New Year's Honours list Vice-Chair: There was no Vice Chair during this year, however Graeme Bissett was appointed at the Board meeting held on 20 April 2018 Trustees: All the Trustees were appointed on 28 March 2017, along with the Chair.
    [Show full text]