Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

March 20, 2026

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

March 20, 2026

Strategic Leadership in Digital Transformation

March 20, 2026
Facebook X (Twitter) Instagram
Friday, March 20
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»NCA Boss Warns That Teens Are Being “Radicalized” Online
News

NCA Boss Warns That Teens Are Being “Radicalized” Online

Team-CWDBy Team-CWDMarch 20, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The head of the UK’s National Crime Agency (NCA) has warned that the country’s teens are being “radicalized” into becoming cybercriminals by online platforms.

The NCA was set up over a decade ago to tackle serious and organized crime.

In a speech to launch the NCA’s National Strategic Assessment this week, Graeme Biggar, NCA director general, argued that “the same toxic online spaces” and algorithms are turning teens into cybercriminals, sex offenders and terrorists.

“Technology is no longer simply a tool that criminals use. It is reshaping crime itself: accelerating it, globalizing it, and making it more harmful,” he said. “Tech companies need to face up to their responsibilities in a way they have simply not done yet.”

Biggar’s wider point was that the boundaries between different types of crime are blurring. Other examples he gave were cyber-attacks coming from both nation states and cybercrime groups, and money laundering networks serving criminals, terrorists and hostile states.

“This matters. Crime has become one ecosystem,” he continued. “We cannot keep treating it as many separate ones. As crime changes, so must we.”

Read more on the NCA: NCA Warns of Sadistic Online “Com” Networks.

This isn’t the first time Biggar has called out the corrupting impact of digital platforms on young people. In September 2025, the NCA took over as chair of the Five Eyes Law Enforcement Group (FELEG) and singled out “The Com” as a target.

This network of loosely affiliated online groups of English speakers is known for sadistic and violent crimes. There’s also a significant crossover with more conventional cybercrime activity, via groups such as Scattered Spider, ShinyHunters and Lapsus$.

Cybercrime and Online Fraud on the Rise

Biggar recounted a year of growing threats online, citing major breaches at TfL, the Legal Aid Agency, M&S, the Co-op, Kido nurseries, and Jaguar Land Rover.

“The majority still originate overseas, but we have seen the emergence of UK-based attackers, combining sophisticated malware with social engineering – exploiting not just technical vulnerabilities, but human ones too,” he said.

“The message for organizations is clear: securing your systems is not enough. You also need to address how your people and processes, and those of your supply chain, can be manipulated.”

He also referenced a surge in online fraud, especially investment scams but also a disturbing increase in “sextortion and sadistic exploitation.”

Biggar added, “AI adds complexity and volume, and algorithms accelerate and normalize harm.”

However, there was also optimism in his speech. Biggar pointed to law enforcement wins like the Lockbit takedown, a 27% increase in fraud convictions, and 1000 arrests a month in child sexual abuse cases.

“The online world can be as happy a hunting ground for law enforcement as for criminals. Cryptocurrency can be traced. Online anonymity can be peeled away,” he continued. “The same technology that criminals exploit can be used to find them. We intend to.”

Biggar claimed the new Online Crime Centre, announced last week as part of the government’s fraud strategy, will increase the speed of data sharing between government and industry, and across sectors.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed
Next Article Strategic Leadership in Digital Transformation
Team-CWD
  • Website

Related Posts

News

Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

March 20, 2026
News

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

March 20, 2026
News

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

March 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

What is it, and how do I get it off my device?

September 11, 2025

Look out for phony verification pages spreading malware

September 14, 2025

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.