{"id":2179,"date":"2007-02-22T00:00:00","date_gmt":"2007-02-22T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/02\/22\/japanese-police-confirms-cybercrime-growth-trend\/"},"modified":"2021-12-30T11:40:50","modified_gmt":"2021-12-30T11:40:50","slug":"japanese-police-confirms-cybercrime-growth-trend","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/02\/22\/japanese-police-confirms-cybercrime-growth-trend\/","title":{"rendered":"Japanese police confirms cybercrime growth trend"},"content":{"rendered":"<p>Japan&#8217;s National Police Agency (NPA) released its annual cybercrime statistics for 2006, showing a massive 40% increase in the number of registered cases.  In total there were 4,425 cybercrime incidents logged and solved by police, up from 3,161 in 2005.  Although these figures are significant, growth levels have actually gone down from last year, when the number of cybercrime incidents was boosted by more than half.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The majority of cybercriminals in Japan were in their teens and twenties, following the trend from recent years.<\/p>\n<p>The NPA is currently trying to promote public awareness of cybercrime and has so far succeeded in that, which has been highlighted by a significant drop in the number of cybercrime complaints for the first six months of 2006.<\/p>\n<p>http:\/\/www.viruslist.com\/en\/news?id=208274044<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2179","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2179"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2179\/revisions"}],"predecessor-version":[{"id":4666,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2179\/revisions\/4666"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}