Project Trawler: Crime On The Information Highways
Contents
Key Judgements
Introduction
Computer Hacking
Viruses And Other Malicious Programs
Intellectual Property Offences
Fraud
Gambling, Pornography And Other Commerce
Electronic Payment Systems
Harassment, Threats And Hate Sites
Paedophilia
Criminal Communications
Assessing Risk And Impact
Responses To Crime
Annex A: Glossary Of Terms And Abbreviations
Key Judgements
|
Crime on the ‘information
highways’ is multi-faceted. It includes targeting of computers
themselves by hackers, crimes across the new medium and the
facilitation of crimes in the physical world by more anonymous or
secure communications. |
|
Authoritative statistics are
not available to gauge the present scale of ‘computer crimes’.
However, Internet paedophilia, computer misuse (hacking and
viruses), telecommunications fraud, software piracy, and the
availability of illicit or unlicensed products and services are
offences already making themselves felt. Emerging problems include
fraud, audio piracy, and criminals’ use of secure Internet
communications. The UK has yet to prosecute a case of
cyber-stalking. |
|
Computer misuse offences
encompass a range of offences, with a number of hacking methods and
malicious programs available, requiring varying degrees of technical
prowess and causing different levels of damage. A variety of motives
lie behind the attacks and not all hackers and virus writers pose
the same threat. The vast majority of incidents are nuisance attacks
rather than serious, malicious assaults, but victims of the former
may still suffer financially (e.g. through computer downtime). |
|
In future, NCIS anticipates
more computer misuse offences inspired by political motives, hacking
for information with financial value (e.g. credit card details,
insider trading information, commercial espionage), and continued
‘work rage’ assaults and acts of mischief. The turn of the
millennium is likely to spur some program writers to create viruses
which will be triggered by the 1/1/2000 date. |
|
NCIS assesses that Internet
fraud is an emerging threat that will increase significantly in the
coming years, albeit from a low base. The huge growth in the
Internet population and in e-commerce will provide opportunities for
fraud, with share-pushing being a particularly simple and effective
means of defrauding innocent investors and making large sums of
money. Compared with the totality of fraud, however, the
significance of Internet fraud should not be over-stated. |
|
Poorly designed and controlled
electronic payment systems would pose a serious risk to law
enforcement efforts to counter money laundering operations. However,
well-designed and effectively controlled systems might well be
positively unattractive to money launderers, and might even divorce
their cash flows from the legitimate marketplace, thus offering
opportunities for identification. |
|
Software piracy is a boom
business. The experience of the software industry is likely to be a
harbinger of the troubles ahead for the phonographic and video
industries. |
|
E-mail harassment will
increase as Internet usage grows. |
|
Paedophiles are using the
Internet to disseminate child pornography, to market videos and
magazines for commercial sale, to promote opinions seeking to
rationalise and legitimate sexual fantasies about children and
sexual encounters with them, and to solicit children. International
law enforcement operations have had some notable successes in
catching offenders. |
|
NCIS does not assess the risks
or scale of criminal activity on the Internet to be as extensive as
sometimes portrayed. However, certain threats are emerging and there
is merit in taking suitable preventative steps now to avoid having
to deal with a greater problem at a later date. Government, law
enforcement, industry and users all have a role to play in ensuring
that the ‘information highways’ do not become a seductive
environment for
criminals. |
|
Users heeding the warning of
‘buyer beware’, and organisations implementing and observing
appropriate information security policies, will help to minimise the
threats faced. Law enforcement must have suitable capabilities to
detect and prosecute offenders, and there must be fitting penalties
to punish those guilty of offences. Industry’s development of
digital signatures and ‘watermarks’ has considerable potential as a
tool to prevent crime. |
|
Widespread use of secure
encryption will curtail opportunities for certain kinds of ‘computer
crime’ - it can be used for secure storage of information
(anti-hacking), to protect intellectual property (anti-piracy), and
to prevent defrauding of firms and individuals. Unfortunately,
secure encryption will also help Organised Crime, paedophile rings
and other criminals to communicate without risk of detection. |
|
Criminals will make ever more
use of Internet communications to organise their illegal activities.
Consequently, existing law enforcement capabilities, in prescribed
circumstances, to lawfully intercept communications and
interrogate seized computers, will be eroded. Potentially, this
would seriously damage law enforcement’s ability to fight serious
and organised crime. |
|
In the information age,
significant opportunities for gain exist for those who are best able
to utilise both technology and information - who will do the
better job, the criminal or those seeking to prevent or detect
crime? |
Introduction
Project Trawler
- The National Criminal Intelligence Service (NCIS) launched Project
Trawler, its study of ‘computer crime’, in July 1996. It was recognised
that the development of ‘information highways’, whilst revolutionising
global communications and commerce, and offering a plethora of benefits
to society, also opened up opportunities for criminal activity. Based on
the project’s detailed findings to date, this paper seeks to raise
awareness and understanding of the different criminal threats that exist
and stimulate debate about the ways in which they may be eliminated or
contained.
- Project Trawler defines ‘computer crime’ as an offence in which a
computer network is directly and significantly instrumental in
the commission of the crime. Computer interconnectivity is the essential
characteristic. The terms ‘computer crime’, ‘information technology
(IT) crime’ and ‘cybercrime’ are used inter-changeably.
- ‘Computer crime’ defies simple categorisation into crime types.
There is consensus that attacks on network confidentiality, integrity
and/or availability - i.e. unauthorised access to and illicit
tampering with systems, programs or data - constitute one body of
offences. The numerous remaining ‘cybercrimes’ comprise a mixed bag of
mostly traditional offences which have found a new medium for their
commission across IT networks.
- The use of terms such as ‘IT crime’ should not be construed as
meaning that NCIS believes that there is anything essentially corrupting
about IT, nor that these offences constitute a distinct crime category
(in the same way as, say, burglary or theft from a motor vehicle). It is
simply a convenient catch-all phrase, which serves a useful purpose at
the present time. It is true that many of these offences are merely
extensions of more conventional crimes. However, the Internet and other
networks, together with the possibilities that they create, are
sufficiently new and unfamiliar to warrant examination of the subject as
a whole.
Quantitative And Qualitative Approaches
- Unfortunately, authoritative statistics are not available to provide
a full picture of the levels of ‘computer crime’. Surveys provide a
partial snapshot and, generally, all indicators point upwards. Then
again, more incidents would be expected because, with each passing year,
there are more computers and users. For a wider (but still far from
complete) picture, the Internet site www.web-police.org
allows users worldwide to file complaints. Obviously, not all crimes are
reported to this site, since it is not an official body and its
existence may not be well known. Moreover, only 37% of the complaints it
receives are found to be valid on further investigation. Nonetheless,
its figures show an increase in the number of filed complaints from 640
in 1993, to 12,775 in 1997, to over 47,000 in 1998. The difficulty is in
determining how much of this represents a growth in reporting of crime
rather than in levels of crime.
- Lack of authoritative quantitative data is
undoubtedly a limitation, but not as problematic as one would first
think. Quantitative approaches would struggle to throw much light on
covert elements of the Internet; under-reporting may diminish the
accuracy and reliability of data collected in security surveys; findings
may be distorted by a small sample size or open to different
interpretations; and a mass of figures gives no indication of the
seriousness of each event. Moreover, quantitative data is of limited
value when the objectives are to identify a possible emerging
threat and propose the best means to deal with it and prevent it from
escalating.
- NCIS thus considers a qualitative approach (combined, where
possible, with quantitative analysis) to be desirable. Consideration has
been given to society’s exposure to potential criminal activity (i.e.
the vulnerabilities of IT systems and the criminal opportunities which
may arise from them), the capabilities and motivation of known
offenders, and the impact of offences. Factors inhibiting crime have
been borne in mind as well as the facilitators, and thought given to
criminals’ own vulnerabilities and law enforcement’s opportunities
too.
Computer
Hacking
Someone has gained unauthorised access to your computer
systems, programs or data. What damage might they do? A snooper might read
your personal information, while a vandal might alter the design of your
webpage. A saboteur might erase R&D data or paralyse your network, and
an industrial spy might copy trade secrets. A thief might steal credit
card details or alter records to make a financial gain. A blackmailer
might plant a digital bomb and threaten to trash your systems unless
payment is made. A terrorist might seek to disrupt critical national
infrastructure.
- In the UK, unauthorised access to computer systems, programs or data
is an offence under the 1990 Computer Misuse Act (CMA), punishable with
a fine of up to £2,000 or imprisonment of up to six months or both.
Stiffer penalties are available, under the same Act, for unauthorised
access with intent to commit or facilitate an arrestable offence or to
cause unauthorised modification of the computer’s contents: these carry
maximum sentences of five years’ imprisonment and/or an unlimited fine.
Scale Of The Problem
- The integrity and confidentiality of data held on computers and the
availability of IT systems are central to the functioning of many, if
not most, companies and organisations. Attacks on the computer and its
contents are potentially serious blows.
- Quantifying incidents of unauthorised access is especially
problematic due to under-reporting and, sometimes, a lack of awareness
that intrusions have occurred. The private sector is reticent about
reporting incidents to law enforcement. In a 1999 US survey by the
CSI/FBI, only 32% of respondents who had suffered a computer intrusion
in the previous year reported it to law enforcement. And this was an
improvement on previous years when only 17% had reported. Numerous
reasons have been given or suggested for non-reporting: fear of negative
publicity; concern that competitors would exploit the case; ignorance
that the incident could be reported; preference for a civil remedy; fear
that publicity will attract other hackers; lack of confidence in law
enforcement’s ability to assist; concern about excessive downtime; and,
for insider hacking, a wish to deal with the matter in-house.
- In the 1999 CSI/FBI survey, 55% of respondents reported that they
had experienced cases of unauthorised access by employees (up from 44%
in 1998), and 30% had suffered system penetration from outsiders (up
from 24%). UK surveys do not suggest as many businesses and
organisations here are victims, but hacking incidents are increasing.
The number of assaults reported by UK academic institutions to
JANET-CERT grew from 174 in 1994 to 1594 in 1998 - a more than ninefold
increase.
The Hackers
Recreational Hackers
- The goal of many hackers is merely to gain unauthorised access to
systems and goes no further. Such recreational hackers are primarily
motivated by a desire to beat the challenge offered by secure code or a
wish to show up shortcomings in security. Some might claim to have
helped to bring about improvements in computer protection by
highlighting inadequacies. However, although their motive is relatively
benign, the less adept recreational hackers may still cause damage to
systems inadvertently or give rise to a financial cost for the victim.
Moreover, some recreational hackers often do more than just access; the
temptation to copy information or leave a calling card (to demonstrate
prowess) or enjoy service without paying is sometimes evident. And the
activities of some are arguably irresponsible (by compromising or
jeopardising sensitive information), vandalism (e.g. defacing websites),
or private pranks (e.g. switching connections to sex sites).
Criminal-Minded Hackers
- While most hacking incidents are mischievous or trivial in nature
and design, a few attacks are undertaken for nefarious purposes, to
achieve certain goals such as financial gain, sabotage or revenge.
- To date, there has been a tiny number of known cases of unauthorised
money transfers. The most notorious occurred in 1994, when the US
Citibank was targeted by Russian cyber-criminals. Losses of US$400,000
were sustained and never recovered. One Russian (apparently on his way
to withdraw some of the money) was apprehended in the UK, extradited to
the US, and eventually sentenced to three years in prison.
- The financial sector’s acute security consciousness may minimise the
success rate of hacker-bank robbers. Efforts may turn instead,
therefore, to targets perceived as having less secure networks. With IT
systems increasingly home to information with high monetary value,
either inherently (as in the case of credit card details) or in the
perception of certain parties (such as the owners or their rivals), such
targets may be lucrative. UK law enforcement has come across a number of
cases in which company computers have been accessed for customer account
details, either by a competitor to recruit the customers or else for
credit card fraud purposes.
- Information may be of such a confidential nature or monetary value
to the owners that the hacker can use it for blackmail purposes. In
January 1998, in reportedly Europe’s first case of electronic bank
blackmail, the German Verbraucherbank offered a DM10,000 (US$5,300)
reward for information leading to the arrest of a hacker who was
blackmailing the bank. The hacker had claimed to have raided several
customer accounts and retrieved customer data from the computers of two
of the bank’s branches. He was demanding DM1 million (US$530,000) or
else he would release the information on the Internet. Sabotage attacks
can also be used for extortion: malicious programs will be unleashed
unless the victim pays up, or a program already released will only be
removed once the victim has paid up.
- Commercial espionage is the acquisition of corporate plans, research
and development results or other secrets by illicit or questionable
means. Commercial sabotage is an act which aims to damage a rival
business by undermining its standing (with the public, customers, etc.),
or preventing it from functioning properly, or otherwise causing it
unnecessary financial losses. The Internet has opened up a new
battlefield for such actions. The Metropolitan Police Service’s Computer
Crime Unit has encountered instances of employees copying customer
databases and setting themselves up in competition. A difficulty here is
that copying proprietary trade information does not count as
theft under UK law. In December 1997, the Law Commission produced a
consultative document (No. 150) which favoured criminalisation of the
"misuse of trade secrets".
- Pranksters have altered the websites of numerous prominent
organisations. For example, in 1996, a hacker broke into the UK Labour
Party’s website, reworded a link to another site to read "Labour Party
Sex Shop" and transferred visitors to pages carrying pornography; in
1996, a hacker changed the CIA’s website to read "Criminal Stupidity
Agency"; and in 1998, in Australia, the ruling Liberal Party’s website
was accessed and its leader’s title changed to "The Dishonourable John
Howard, Prime Minister, Minister for Pain, Suffering and Inequity". Such
pranks are infantile, mindless, sometimes humorous, but they do entail a
cost to put right the damage and, where the replacement page is not an
obvious spoof, can mar the victim’s public image.
- Vandalism can be more maliciously-inspired. Disgruntled employees,
ex-employees or customers may be harbouring a grievance and may launch a
digital attack with the purpose of causing harm. Workplace sabotage, of
course, may be accomplished without using or targeting a computer, but
digital tools offer the saboteur the means to attack valuable company
resources while potentially remaining anonymous. Anecdotal evidence of
such spite attacks exists. In a US court case in 1998, a sacked computer
programmer was alleged to have detonated a digital bomb against his
former employer in 1996. This act permanently deleted the company’s
design and production programmes, causing an estimated US$10 million in
damages. In the UK, a CMA conviction in 1998 - for altering an estate
agency’s website to show pornographic images - was apparently a revenge
attack. The estate agent had rejected a tender from one of the hackers
to install and maintain the website.
- Vigilantism is another mischief which may be perpetrated, although
to date this has been a mainly US phenomenon. Targets are invariably
alleged paedophiles or fraudsters. Hacking and denial of service attacks
have been employed, as well as simple ‘naming-and-shaming’ of
individuals.
Political Hackers
- A further blurring of distinctions amongst hackers has occurred with
the emergence of political hackers or ‘hactivists’. Like the
criminal-minded, they too have ulterior designs, whether furthering
‘ethical’ causes or pursuing political-ideological acts. Attacks on IT
systems may be an effective tactic to promote a cause or highlight a
grievance.
- An widely-reported example of a campaign waged partly in cyberspace
occurred in Norway in 1998: thousands of students launched a protest
against rises in student loans by inundating the government with over
200,000 e-mail messages. This tactic was successful in attracting
publicity, but does not appear to have caused any serious disruption.
Politically-motivated protests by more adept hacking groups in 1998
included: the altering of websites around the world to include an
anti-nuclear statement (by the MilWorm and Ashtray Lumberjacks groups);
insertion of messages calling for full autonomy for East Timor into
Indonesian Government websites (by Kaotik); and the ‘break-in’ to the
"New York Times" website to call for the release of a jailed hacker (by
Hacking For Girlies). Earlier this year, the Animal Liberation Tactical
Internet Response Network staged ‘virtual sit-ins’ against Finnish Fur
Sales, the Seattle Fur Exchange and a Swedish vivisection laboratory.
Protesters from around the world were encouraged by the group to use an
automated program which effectively shut down connections to the
victims’ websites.
Insiders versus Outsiders
- A key question in determining the hacking threat is the ratio of
external to internal hacking. External hackers tend to grab more media
attention, but known instances of major financial damage are not that
common. Studies invariably show that most hacking incidents against
companies and organisations are committed by insiders (whether dishonest
or disgruntled employees, contractors or consultants). According to the
Department of Trade and Industry (DTI), internal hacking cost UK
organisations £1.5 billion in the six years from 1992, with 70%
of all hacking incidents being of this type. Thus, whatever protection
is erected against external hackers, a well-placed insider may be the
simplest and most effective means of accessing information and could
render nearly all security safeguards useless. The insider is likely to
be more knowledgeable about both the victim’s vulnerabilities and the
‘valuables’ worth raiding.
- The growth of the Internet, though, introduces a new vulnerability
which may favour external hackers. The 1999 US CSI/FBI survey suggested
that increasing connections to the Internet were raising the threat from
external attack; 57% of respondents reported their Internet connections
as a frequent point of assault in 1999, up from 37% in 1996.
Established Criminals
- There is scant evidence of the use of hacking by established
criminals or of any connections between CMA offenders and the criminal
world. However, media interest, increased IT literacy in society as a
whole, and the imprisonment of CMA offenders (which brings them into
contact with criminals who they might otherwise never meet) may well
invite the attention and curiosity of established criminals, spread
knowledge of computer hacking and its possibilities for financial gain,
and promote the take-up or recruitment of skills. On the other hand,
there may be little change if criminals remain content with the
continuing opportunities and profitability of traditional forms of
crime. Additionally, it should not be ruled out that the CMA offenders
themselves may turn to more serious criminal pursuits as they realise
the uses to which their skills may be put.
Methods And Capabilities
- Due to vulnerabilities in networking protocols, it is possible to
access a computer through the manipulation of data traffic exchanged
across a network; telnet hijacking and IP spoofing are examples of such
attacks. Alternatively, the hacker can subvert the computer’s
access-control measures to obtain the user identification (user-ID) name
and password. Digital means of doing this include: running a ‘trojan
horse’ program, by which the hacker displays a false log-on screen and
so deceives the user into revealing their user-ID and password; laying a
‘sniffer’ program that sits on the network and harvests data as it
passes between computers; and a ‘brute force attack’, a software program
which will generate every possible combination of letters, numbers and
symbols on a standard QWERTY keyboard. Non-digital methods include:
‘shoulder surfing’, by which the hacker watches the user type in the
details; and confidence tricks, by which the hacker persuades or
deceives the user to reveal them.
- Some hackers demonstrate considerable technical capabilities.
However, hacking need not be highly-skilled and most hackers probably
secure access by low-tech means or by merely following instructions and
using tools available on websites - dismissively termed ‘point-and-click
hacking’ or ‘kiddie script hacking’. The types of attacks identified by
the CERT teams around the world reveal that the majority of detected
attackers are not familiar with the operating systems that they
encounter (e.g. DOS commands are used against UNIX systems).
- The capabilities of the hackers, however, do not necessarily equate
with the threat posed by them. Lesser skilled hackers may be more likely
to cause damage to the computer data on the system, leading to financial
loss or degradation/denial of service. Even if the majority of hackers
are not highly skilled, they are not unskilled either, and may still be
able to manipulate accessed systems to achieve desired results. A
further consideration is the degree of organisation which may be
present. Capabilities may be enhanced by calling on the advice and
cooperation of other hackers from around the world. The existence of
hacking forums, exchanging information on the Internet, has been
well-publicised. Investigations over the years by the Metropolitan
Police’s Computer Crime Unit suggest that hackers sometimes operate
within loose confederations and small groups, which set common
objectives and targets for attack. Some of these groupings cross
national boundaries.
- Some hackers lack the necessary know-how and skills to commit more
serious crimes and while the more adept ones could use their talents to
profit financially or cause serious damage to victim’s systems, whether
they are inclined to do so is an entirely different matter. Many hackers
are simply not motivated to exploit profit-making opportunities or trash
other people’s computers. Distinguishing between the differently
motivated hackers, however, is not always straightforward. When a victim
detects an intrusion, it may be impossible to ascertain the hacker’s
intention. The method of attack may be similar whether the attacker is
an inquisitive teenager or a commercial spy. The same automated tools
may be used and the same vulnerabilities in program and system design
exploited. Moreover, it is not always clear whether a secondary offence,
beyond intrusion, has occurred - it may be difficult to determine
whether any information has been copied. The threat from an individual
offender is also difficult to establish, since while a single hacking
incident will prompt an investigation, it is only as the case progresses
that the true level of offending becomes apparent. Each hacker is often
responsible for countless offences both within and outside the UK’s
jurisdiction.
A malicious program has entered your computer system.
What damage might it do? A nuisance virus may leave a silly message or
slow down the performance of the computer. A calamitous one may delete
files or crash systems. A trojan horse, masquerading as a utility (e.g.
anti-virus software) or animation, may copy user-IDs and passwords, erase
files, or release viruses. The program may be used for blackmail, with
activation of a virus or ‘detonation’ of a digital bomb threatened unless
demands are met.
- In the UK, the deliberate planting or dissemination of a computer
virus or other nefarious software program - others include the ‘worm’,
‘digital bomb’, ‘trojan horse’ and ‘hostile applet’ - are covered by the
1990 Computer Misuse Act (see paragraph 8).
Scale Of The Problem
- The table below presents one series of estimates showing the
prolific rise in the number of computer viruses; others have put forward
even higher figures. CERT is reportedly identifying as many as 200 new
viruses each month. The number ‘on the loose’ at any one time, however,
will be much lower, and the vast majority of incidents may be classed as
nuisances rather than malicious.
Year |
Number of
Viruses |
Increase on previous
year |
1992 |
1100 |
|
1993 |
2100 |
91% |
1994 |
3800 |
81% |
1995 |
6000 |
58% |
1996 |
7400 |
23% |
1997/98 |
11000 |
49% |
Source: US Dr Solomons anti-virus software
company.
- Studies show that viruses are typically the most common type of
assault on computer security. In recent surveys, the proportion of
respondents who admitted suffering infections ranged from 20% to 90%.
Some surveys have reported a fall in the frequency of viruses compared
with previous years, possibly due to increased use of anti-virus
software and greater awareness of the threat. However, a report by ICSA
had virus incidents up 48% on 1997, despite the fact that more
organisations had anti-virus software in place. The continued rise in
incidents was attributed to the greater number of computers in use;
better monitoring for viruses; increasing use of laptops, coupled with
casual security; and the failure to update security procedures and
products. Several surveys have reported a fall in the average financial
cost of viral incidents.
- The ICSA survey suggests that macro viruses account for the lion’s
share of infections. The US Dr Solomons anti-virus software company
claims that macro viruses, although representing only 2.3% of all
viruses, account for 50% of all viral incidents. The prominence of macro
viruses reflects the fact that they can affect the widely-used Microsoft
Word software.
Viruses, The Internet And E-Mail
- The computer virus has been given a new lease of life with the
growth of the Internet and e-mail, since these provide new paths for
transmission. Viruses can be hidden now within a file which is
downloaded from the Internet or attached to an e-mail message, and will
then infect the system when that file is run or the attachment opened.
Thus, viruses may be spread from system to system without need of
physical media such as a floppy disk. The Internet and e-mail are ideal
environments for the spread of macro viruses, since Word documents are
frequently exchanged over these media. Additionally, the Internet
provides an ideal platform to launch new viruses. Within a few days in
late March 1999, the Melissa virus (carried by e-mail) was reported to
have infected tens of thousands of computers around the world. ICSA’s
survey suggests that disks are still the most common path for infection,
although infections via e-mail were growing.
You have copyright material, trade marks, and the
reputation of your organisation to safeguard. How might these intellectual
property rights be violated? Someone may copy work (e.g. software, audio
recordings, videos) without your approval. Businesses, institutions and
other organisations may make unauthorised extra copies of software for
office use. Unscrupulous computer dealers, in an effort to sell
particular hardware, may offer unauthorised copies of popular software to
the customer as an added inducement. Pirates may copy work onto
floppy disks or CDs and offer them for sale, and counterfeiters may fool
the unwary into buying such products believing them to be genuine
articles. Work may be downloaded direct from the Internet onto
computer. A registered trade name or mark may be used without permission
or deceitfully imitated.
Although most categories of intellectual property offences fall
under the civil law, some infringements do give rise to criminal
penalties. The 1988 Copyright, Designs and Patents Act makes the
manufacture and distribution of unauthorised copies criminal offences,
with a maximum sentence of two years’ imprisonment on indictment. The
1968 Trade Descriptions Act includes provisions designed to protect
consumers against being deceived by false or misleading trade
descriptions, while the 1981 Forgery and Counterfeiting Act could be
used where the pirated goods are sold as if the genuine article. If the
offender uses without consent a mark which is identical or likely to be
mistaken for the registered mark, then they would be guilty of an
offence under the 1994 Trade Marks Act.
Scale Of The Problem
- The Business Software Alliance (BSA) and Software Publishers’
Association (SPA) have estimated that 31% of business software in
the UK in 1997 was used illegally; lost revenue to piracy totalled
US$334.5 million. However, this did represent an improvement on the
previous two years: in 1995, the rate was 38% and losses totalled
US$444.6 million. Both the BSA and the UK Federation Against Software
Theft (FAST) assess corporate end-user piracy to be the principal
problem, with companies using software without a user licence or making
unlicensed copies. Malicious intent, however, need not be present: bad
systems management may merely overlook the requirement to secure
adequate licences. The European Leisure Software Publishers’ Association
(ELSPA) estimates that losses of revenue to the UK leisure
gamesware industry were £1 billion in 1997 and £3 billion in 1998.
The latter figure represents three times the industry’s legitimate UK
retail sales.
- Estimates of losses by the software industry tend to assume that
customers would purchase legitimate goods if the pirated ones were not
available - which is highly improbable in all cases. Moreover, by
selling goods cheaply to those who would otherwise be unable or
unwilling to buy them, the pirates may be expanding the future market
for such products - ‘hooked’ customers may switch to authentic goods as
they become more affordable. However, while this argument may be valid
for some markets (e.g. games for teenagers, or developing national
markets), it does not apply to others (e.g. applications programs for
the corporate sector) and, as digital copies become indistinguishable
from the genuine products and as widely available, it falls apart
altogether. More importantly, it is undeniable that pirates are making
money (and users saving money) at the expense of copyright owners and,
where sales are being lost, depriving legitimate businesses of income.
These losses reduce returns on investment, thereby diminishing the
incentive to develop new products and expand, thus hindering growth and
costing jobs. Lost sales also cut tax revenues to the government and
probably result in inflated prices being charged to customers of
legitimate software. Moreover, if the goods are inferior or faulty or
contaminated with a virus, the copyright owner’s reputation may be
harmed and the consumer has no redress.
Software Piracy
Software Piracy And The Internet
- Software piracy is the illegal copying and resale of software
programs, be they operating systems, applications, or leisureware.
Floppy disks, CD-ROMs and the Internet are all means of delivering
pirated goods. The Internet has added a new dimension to the
pirating/counterfeiting business, since the pirates can now download the
software from the Internet or bulletin boards and copy on to blank
CD-ROMs, known as Gold CDs. This practice requires a CD-writer costing
about £250 from high-street outlets and blank CDs at £3 each. The copied
CDs are usually sold through markets and car-boot sales or by
mail-order. The Internet and bulletin boards are also used for direct
distribution of illegal software and for exchanging information
concerning the cracking of copy-protection. On the Internet, pirates
sometimes release their goods for free, competing with other groups for
"0-day release" - that is, the goal of providing a cracked version of
the software on the same day as its release. There have been moves to
make such ventures profitable, one method of doing this being the use of
premium rate bulletin boards - a BT 0898 number or similar is leased for
a bulletin board which holds the pirate software. A twist in the tale,
however, is that profit-making pirates have themselves suffered from
piracy.
Software Piracy: An Organised Crime?
- The software pirate groups - called Warez groups -
demonstrate a high degree of organisation. Some of these have a board of
directors; global, national and regional headquarters; and staff with
specific roles (suppliers of legitimate software; crackers who will
remove the copyright protection systems built into the software; and a
large distribution network of couriers, runners, and holders who provide
the storage space for the customers to obtain the illegal software).
These groups can be extremely well-equipped too. In some cases, UK law
enforcement operations have seized large amounts of computer equipment.
- In the case of the Gold CD-ROM trade, there is an international
dimension. Exports of pirated software have occurred from the Far East
and East Europe to West Europe. In March 1998, the FBI claimed to a US
Congressional hearing that piracy is "an international crime problem
that involves organised groups that conduct their counterfeiting
enterprises multinationally". In the UK, ELSPA has reported that in 80%
of its raids on software pirates, offenders are found to be engaged in
other crimes (including illegal drugs, fraud and theft). The experience
of UK law enforcement indicates that those involved in the
counterfeiting and pirating of software are often involved in
other more conventional criminal activities, such as drugs, forgery,
handling stolen property, firearms possession. However, NCIS has yet to
identify significant involvement of top UK criminals.
Audio, Video And Other
Piracies
- Any material which may be held in digital form is open to
unauthorised copying and distribution. Hence, audio, digital video,
graphical images and textual material can be pirated as well as
software.
- A boost to audio piracy is coming from the exchange of digital music
files. These files are compressed using software into the MP3 format,
which occupies a fraction of the size of the original file, and then
distributed over the Internet, usually by being downloaded from webpages
and stored on the individual’s computer. According to FBI testimony to a
US Congressional hearing in March 1998, hundreds of digital jukeboxes
are appearing on the Internet, most run for free by young people, often
students. In February 1999, a press release by the European Parliament
claimed that there were some 2,000 sites available on the Internet from
which 80,000 illegal music files could be downloaded. The arrival on the
marketplace of portable devices (such as Diamond Multimedia’s ‘Rio’),
which can store and play MP3 files, is likely to help boost demand for
music downloaded from the Internet.
- Digital recordings could cause a potentially significant loss of
revenue to the phonographic industry. As with software, pirates are able
to supply their product direct from the Internet to their customers or
download files themselves for transfer to CDs (or digital tape or other
digital media), thus providing them with a low-cost method of producing
counterfeits or pirated compilations. As of March 1999, the MP3 devices
were retailing in the UK for around £200, with a blank CD (called a
CD-R) costing just £1.
- The Motion Picture industry is less threatened by the Internet at
present than the phonographic industry: video compression is not
sufficient to reduce the large volume of data required for even small
video clips into files which are easily transferred; the capabilities of
most computers do not allow for accurate smooth replay; and video
material is not widely available on a digital medium which is easily
ported onto home computers. Again, technological developments and the
growth of multimedia requirements for home computers may make the
widespread copying and distribution of video feasible.
Fraud
You are buying, selling or investing on the Internet, but
is the person you are dealing with trustworthy? The vendor may be
describing the products or services in a false or misleading manner, or
may take orders and money, but fail to deliver the goods. A crook may
‘pass off’ as a legitimate respectable business. Counterfeit goods may be
supplied, rather than legitimate ones. The payment mechanism may be abused
by either side to a transaction. An impostor claiming to be a
representative of a bank or ISP may ask for verification of personal
information in order to obtain credit card details or passwords. Advanced
fee frauds, untruthful share tips, risk-free
investments and pyramid schemes may dupe the unsuspecting
investor.
- In the UK, the 1968 Theft Act provides for maximum penalties of
seven years’ imprisonment for dishonestly appropriating property
belonging to another (with the intention of permanently depriving them
of it), and 10 years’ for dishonestly obtaining property by deception
(by words or conduct, with the intention of permanently depriving the
other of it). The 1978 Theft Act covers dishonestly obtaining services
from another by deception (where the service is one which has to be paid
for). Common law could be used for conspiracy to defraud where two or
more people commit the crime; this carries a prison sentence of up to
ten years.
Scale Of The Problem
Trade Fraud
- In the US, the National Consumers’ League (NCL) acts as a clearing
house for consumer complaints. Its Internet Fraud Watch (IFW) project,
established in 1996, allows consumers throughout the world to report
instances of Internet fraud. The number of complaints to the NCL about
alleged fraud on the Internet grew twentyfold between 1996 and
1998, albeit from a very low base. In this period, the number of scams
associated with on-line auctions grew substantially, and these have now
become the principal ‘Internet frauds’, accounting for 68% of all
reported cases in 1998. Non-supply of purchased goods or services,
delivery of products or services inferior to those advertised, and
suspected use of ‘shills’ (false customers) by sellers to inflate prices
were typical complaints. The NCL figures, extraordinarily, show that
most victims part with their money by insecure means: 93% of all
reported fraudulent transactions involved the victim sending cheques or
money orders, and even cash was sometimes posted. Credit cards made up
very few of these cases, despite the non-liability protections that they
offer to their holders.
Credit Card Fraud
- Credit card abuse, in relation to the Internet, may be perpetrated
by the customer or trader, or by a computer hacker. It occurs in a
number of different forms, some of which are unique to the new medium.
The Internet provides a new arena for fraudulent purchases to be made
using a forged, stolen or lost credit card. A dishonest trader may
retain credit card details for later abuse or sale or, alternatively,
may bill the credit card company, but fail to deliver the goods. Hackers
may intercept information or ‘steal’ from databases and thereby obtain
the valid credit card numbers of others. Lists of credit card numbers or
programs which generate valid new numbers (through mathematical
algorithms) can be accessed on the Internet.
- The relationship between the Internet and credit card fraud is
usually highlighted as the danger of having details compromised during
transmission. Interestingly, NCL’s Internet Fraud Watch has not received
a single complaint of someone having their credit card number stolen
while being transmitted to a reputable merchant (although there have
been cases in which details have been passed unwittingly to crooks).
- Visa, the international payments cards group, claimed in April 1999
that 47% of disputes and frauds arising from use of its cards in the
European Union (EU) were Internet-related. Some 22% involved people
denying that they had carried out the transaction, and 25% involved
miscellaneous complaints such as wrong or late delivery. The 47% figure
is extraordinarily high given that only 1% of Visa’s EU turnover is
Internet-related.
Financial Fraud
- Old-style financial scams - advanced fee frauds, pyramid schemes,
‘pump-and-dump’ share pushing, and get-rich-quick schemes - have been
given a new lease of life on the Internet. Most of the horror stories
emanate from the US and, to date, the UK has not suffered a proportional
level of fraudulent activity. However, this probably reflects the UK’s
lower Internet usage and so the situation may change as more people
connect to the Net. It is usually with these financial frauds that the
biggest money losses from ‘IT crime’ are seen: for example, in the US in
1996, a fraudster agreed in court to repay the US$12 million that he had
collected in a stock manipulation scam.
- The influence of share pushers can be
dramatic. For example, in a US case of April 1999, a company’s share
price jumped 30% following the release of false take-over information on
the Internet. In another US case of 1998, a newsletter author allegedly
made profits of US$172,000 from sales of shares in one company and
US$573,500 from another; both companies failed to perform as hyped and
their new shareholders lost much of their investment.
- Deceptive investment opportunities do not even have to concern real
companies. One cybervigilante claims to have uncovered a "biotechnology
company" which in fact sold kitty litter, and "the largest corporation
in Nevada" which was nothing more than a two-man air-conditioning repair
shop. In the US, there have been reported cases of bogus investment
banks appearing on the Internet, which offer high interest rates and
disappear as soon as funds have been attracted. Copycat sites look
genuine: in the April 1999 case cited above, the share pusher had posted
the information on an Internet site dressed up to look like a news
report from a reputable financial information provider.
Internet Features Which Aid Fraudsters
- The Internet has certain inherent features which make it ideal for
fraudulent purposes: cost-effectiveness, breadth of reach, difficulties
authenticating identity, anonymity, ease of personalising appeals, and
novelty. A fraudulent investment scheme may be advertised relatively
cheaply on a credible-looking website or by mass e-mailing, and reach
millions of people across the world, making it much easier to locate
those gullible enough to part with their cash. In 1997, a phoney US
investment scam (making false claims about a high-tech start-up company)
attracted nearly 100,000 people to its website, 3,000 of whom e-mailed
for further details, with 150 sending in money. In three months, the
conman netted US$190,000.
- The inability to readily determine the authenticity or location of a
claimed identity prevents even the most cursory assessment of the
validity of a communication. This works both ways: neither the seller
nor the buyer can be truly certain of the authenticity of the other. In
such circumstances, opportunities for fraudulent activity emerge. The
fraudster can pose as a reputable entity or ‘quote’ one in order to give
themselves credibility. Thus, sites which are assumed to be owned by a
legitimate company can be established to take orders and credit card
details and either process the transactions to receive payment, or use
the credit card details fraudulently. To inspire false confidence,
fraudulent sites have even been known to warn viewers of scams. A
hacker-fraudster, ‘hijacking’ the webpage of a reputable investment
advisor and using it to advertise a fraudulent scheme, might well fool
even the most wary.
- Personalised approaches can be computer-generated and can use
registration details or website histories to target individuals more
effectively. Finally, the Internet is new and unfamiliar to many users;
novice Internet users may be unaware that software is available to block
junk e-mail and conceal one’s movements on the Web. Many of the possible
frauds which may be perpetrated rely on the novelty and trust of the
Internet users.
Gambling, Pornography
And Other Commerce
Fraud aside, what other perils may lie await for the
Internet consumer or supplier? Vices may be within easier reach. Products,
services and adverts which one would not find in the high street may be
readily available from the Internet. Whereas in the ‘physical world’, an
illegal sales outlet might be closed down relatively easily, in the
‘virtual world’, ease of relocation and jurisdictional problems intrude.
Users will be exposed to the standards and legislative requirements of
other countries, which may differ greatly from their own.
- The UK Gaming Act 1968 defines all gaming other than at licensed
premises as illegal. With respect to adult pornography, the key question
for UK law enforcement is whether the material is in breach of the 1959
Obscene Publications Act (OPA). As amended by the 1994 Criminal Justice
and Public Order Act, this Act applies to Internet images as it does to
those available in other media, making it an offence to publish obscene
material which is liable "to deprave and corrupt".
On-Line Gambling
- There were an estimated 1000 gambling sites on the Internet in late
1998. While the main forms of gambling at present are derivations of
lotteries and sports betting, developments in technology and
improvements in bandwidth will allow the development of live betting,
and real-time interactive casinos, card games and slot-machines. The
more important issue, however, is the development of offshore gaming
sites - the on-line gambling business can base itself in the country
with the lowest barriers to entry and weakest controls. These will be
just as accessible for any UK Internet user, but will lie outside UK
jurisdiction and may make it difficult for customers to gain legal
recompense in the event of the site using unfair or fraudulent
practices. In August 1998, there were reported to be around 160 virtual
casinos on the Internet, with almost 70% of them based in the Caribbean.
- There are a number of concerns: the fact that extant regulatory
controls are rendered useless; the possible anonymity of the operators;
social effects of unrestricted gambling (i.e. the dangers of addiction,
exposure of children or access by them); threat of fraud (e.g. theft of
credit card details by casinos or bookmakers, and fly-by-night operators
who rig the games or fail to pay out); and possible money laundering
opportunities. While illegal activities cannot be ruled out, operators
can probably expect to make plenty of money while remaining legitimate.
Adult Pornography And Other Sex Commerce
- As with Internet gambling, there is an undoubted consumer demand for
‘Internet sex’. Commercial activities include peep shows, in some of
which the strippers respond to the requests of the viewer; distribution
and sales of pornographic images; and adverts and sales of sexual aids
(particularly those related to sexual fetishes). The Internet is also
being used as a virtual phone-box for the placement of prostitutes’
calling cards, and is host to mail-order bride services (the women are
invariably east Asian or east European) and advertisements for
sex-tours.
- Effective regulation of the Internet is very difficult to achieve.
Consequently, there is a risk that services may be offered and standards
observed which would not be allowed in a properly licensed regime in the
‘physical world’. In the case of sex commerce sites, this may result in
the provision of obscene hardcore pornography and, indeed, many of the
Internet sex sites do offer, upon their front pages, categories which
would appear to be in possible contravention of the OPA.
Other Products, Services And Adverts
- Prohibited or regulated goods, reported being marketed on the
Internet at one time or another, include: illegal drugs (e.g. ecstasy),
prescription-only medicines (e.g. viagra), quack cures, body parts (e.g.
kidneys), skins and by-products of endangered species, armaments,
counterfeit products and stolen goods. As well as on-line gambling and
prostitution, other illicit or unregulated services identified on the
Internet have included provision of investment advice, child adoption
and, in Japan, a suicide ‘service’ (offering advice on lethal dosages
and sale of potassium cyanide capsules - at least one death was
attributed to the ‘service’).
Electronic Payment Systems
In pursuit of a drugs importer, law enforcement discovers
that smartcards have been used to launder the illicit funds. It is
suspected that on-line banks feature in the audit trail. Information has
been received that electronic cash was used to create intricate patterns
of transactions in order to thwart law enforcement. Is this a true threat
or science fiction?
- A full list of money-laundering legislation in the UK is as follows:
the Criminal Justice Act 1988; Prevention of Terrorism (Temporary
Provisions) Act 1989; Criminal Justice Act 1993; Criminal Law
(Consolidation)(Scotland) Act 1995; Drug Trafficking Act 1994; Proceeds
of Crime (Northern Ireland) Order 1996; and Proceeds of Crime Act 1995.
- The combined legislation makes it an offence for any individual to
either attempt to hide or conceal the source of funds known or suspected
to be from criminal activity, or to assist another to do the same.
Moreover, special obligations are placed upon certain categories of
financial institutions under the Money Laundering Regulations; duties
include adequate record keeping, training of staff, and identification
of an appropriate individual to examine and disclose suspicious
transactions to NCIS.
Scale Of The Problem
- Smartcards, On-line Banking, and Ecash are all new forms of payment
system which, at time of writing, are fairly limited in tests globally
(including the UK) have not been in existence long enough for ‘live’
problems to have been observed. However, in overall terms, the potential
for anonymity, speed of use, removal of human checks at institutions,
lack of physical volume, ability to ignore national boundaries,
jurisdictional inapplicability - all these factors present the criminal
with additional opportunities to launder funds. Law enforcement and
business must seek to minimise such risks by introducing systemic checks
and balances within the new technologies.
- It is conceivable that criminal organisations will take time to
recognise and exploit new technology. Yet, historical precedent provides
a contrary view. Following the introduction of the various anti-money
laundering obligations in the UK during 1993-1995, criminal use of less
regulated sectors (where risk of disclosure was less) accelerated
sharply. It is reasonable to expect that new payment systems will be
similarly exploited if the opportunities are sufficient.
- On the positive side, a number of factors may constrain criminal
exploitation of new payment systems. It is possible to design out some
of the risks. Also, placement of illicit funds will be necessary before
EPS can be exploited. In the longer term, a general move away from the
use of cash in day to day transactions could make criminals with a high
illicit cash turnover more easily identified.
Harassment, Threats
And ‘Hate Sites’
Innocent users may find some unpleasant material coming
their way. Junk mail may be received, containing pornography or other
distasteful or obscene material. The user may find themselves repeatedly
receiving unwanted and distressing communications, such as threatening,
obscene or hateful e-mail. Vicious rumours may be spread on-line, or
blackmail demands received. You may be disturbed to find extremists airing
their prejudices on the Internet.
- Under the 1994 Criminal Justice And Public
Order Act, the use of threatening, abusive or insulting words or
behaviour, which thereby causes the victim harassment, alarm or
distress, carries a maximum penalty of six months’ imprisonment and/or a
fine. The 1997 Protection From Harassment Act could be used where the
victim is persistently pestered by the accused. Pursuing a course of
conduct which amounts to harassment of another is punishable by up to
six months’ imprisonment, while putting people in fear that violence
will be used against them has a maximum sentence of five years. Under
the 1984 Telecommunications Act, it a crime to transmit messages using
the public telecommunications system which are grossly offensive,
indecent, obscene or menacing; or to persistently use the system for the
purpose of causing annoyance, inconvenience or needless anxiety. The
offence may be punished with a fine or maximum term of six months’
imprisonment. Blackmail is covered by the 1968 Theft Act, and conviction
carries a maximum penalty of 14 years’ imprisonment. The 1959 OPA may be
applicable in some cases too, while the 1986 Public Order Act prohibits
the dissemination of racially-inflammatory material, outlawing material
which is threatening, abusive or insulting and which is either intended
to stir up racial hatred or likely to do so. It could also be used in
cases of racial harassment.
Cyber-Stalking, Harassment And Threats
- A Novell survey in 1998 (of 810 people using e-mail at work) found
that half the sample had received unwanted e-mail from a persistent
sender. 35% of the offensive messages comprised unsolicited pornography.
To date, however, there have been no known criminal cases in the UK
concerning cyber-stalking. However, as Net usage grows, NCIS assesses
that occurrences of harassment will escalate.
Cyber-stalking has attracted much
concern in the US, and 17 states have reportedly passed laws against
on-line stalking or harassment. The first temporary restraining order on
an on-line stalker was issued by a court in Texas in October 1996; the
individual had been harassing the employees of a Dallas-based ISP. And
the first prison sentence for an e-mail hate crime was handed out in May
1998. A student in California was convicted of violating the civil
rights of 59 students by sending racially-targeted threats to them in
1996; he was sentenced to one year’s imprisonment.
Vicious on-line statements and rumours may be used against the
victim. Two especially nasty cases have reportedly occurred in the US.
In 1997, someone allegedly posted a child’s name, age and phone number
on 14 paedophile chatrooms, giving false sexual messages which led
paedophiles to call on the girl’s home. In January 1999, a Californian
man was arrested after allegedly impersonating a woman (who had spurned
his advances) on the Net. He, posing as she, is believed to have placed
an advert on a bulletin board, seeking male partners to live out a gang
rape fantasy and giving (the woman’s) name, address and telephone
number, and even instructions on how to bypass her house’s burglar
alarm. Several men responded to the advert with phone calls and visits
to the woman’s home.
E-mail harassment shares similarities with the posting of hate mail
and the making of obscene telephone calls. Notably, the stalker does not
have to terrorise the victim face-to-face. However, compared with those
traditional forms of pestering, the Internet offers advantages to the
stalker. No forensic evidence is left on the message (which may occur
with letters); there is no need to confront the victim in real time (as
on the phone); there is no danger of voice or handwriting recognition;
and there are various ways in which it is possible to attain relative
anonymity (so there is less risk of the connection being traced, as with
phone calls).
In the period 1996-98, the NCIS Kidnap And Extortion Desk was
notified of two cases of blackmail by e-mail. This figure is small in
comparison with the total number of notified blackmails in this time (96
cases). As with cyber-stalking, the Internet offers a number of
advantages to the electronic extortionist. There is no danger of
fingerprints and steps can be taken to hide identity. However, the
blackmailer will need a physical interface in order to access their
ill-gotten gains.
‘Hate Sites’
- Examples of intimidation, such as extremist websites listing the
names and addresses of those they wished killed, have also been noted.
While it may be difficult to prove to a court that these constitute
death threats, the language and imagery used does suggest an intention
to at least put people in fear of their lives. In the US, an
anti-abortion website, called the Nuremberg Files, was sued after
issuing a ‘hit list’ of more than 200 names and addresses of abortion
doctors and pro-choice judges, lawyers and politicians. Those murdered
in recent years had lines drawn through their names. In February 1999, a
civil court in Oregon fined the people behind the website (and two
organisations held to be championing them) US$107 million in punitive
damages for waging the Internet campaign. With generalised threats made
on the Net, in which names and addresses are listed, the spread of
information may increase the chances that an unstable extremist will
become aware of a target living or working in their locality.
Annual studies by the Simon Wiesenthal
Centre have shown a steep rise in the number of identified ‘hate sites’
on the Internet. Most of these websites operate from the USA and espouse
racism, neo-Nazism, terrorism and so on; their number has grown
sixteen-fold in the past three years. The use of the Internet has
specific advantages: it has a global reach; is low-cost; content can be
easily targeted to particular audiences at particular times; propaganda
can be disseminated without censorship; and it may reach people who
would not otherwise come into contact with such groups.
Paedophilia
Out of sight from most users, the Internet harbours some
particularly disturbing activities. Child erotica and child pornographic
images are disseminated over the Internet. Opinions seeking to rationalise
and legitimise sexual fantasies about children and sexual encounters with
them are promoted on newsgroups and chatrooms. Paedophilic images in hard
format (e.g. videos, magazines, prints) are marketed for commercial sale.
And paedophiles use chatrooms to lure minors into meetings. Possibly, the
Internet is also being used by paedophiles to make arrangements for "sex
tourism", and to organise and orchestrate the sexual abuse of
children.
- UK legislation for dealing with paedophile activity is among the
most stringent globally. The 1959 OPA prohibits the publishing of any
article deemed to be liable to "deprave and corrupt"; the maximum
penalty is three years’ imprisonment, an unlimited fine or both. The
1978 Protection Of Children Act outlaws the taking, permitting to be
taken, distribution or showing of an indecent photograph of a child
under 16, or the possession of such a photograph with the view to
distributing or showing it. The maximum penalty is three years’
imprisonment, an unlimited fine or both. Under the 1988 Criminal Justice
Act, it is an offence to have any indecent photograph of a child in
one’s possession, with a maximum penalty of six months’ imprisonment, a
£5,000 fine or both. The 1994 Criminal Justice And Public Order Act
clarifies the position with regards photographs manipulated by
computer-graphics, so that the 1978 and 1988 statutes apply equally to
these types of images. The making of such photographs is made an offence
too. This Act also extends the OPA to cover transmission of material
between computers. Finally, the 1996 Sexual Offences (Conspiracy and
Incitement) Act makes it an offence to incite another person to commit
sexual acts against children abroad.
Scale Of The Problem
- Images available for download from the
paedophile newsgroups range from innocent photographs of young children
to the most graphic documentation of rape
or abuse of children and babies. For example, in 1996, a file on the
Internet contained live video shots of a
five-year old being physically abused. More recently, a law enforcement
operation in 1998 discovered images of children
as young as two being sexually abused.
- In the UK, since December 1996, the Internet
Watch Foundation (IWF) has operated a telephone and e-mail hotline
for members of the public to report material encountered on the Internet
which they consider to be illegal. The vast majority of complaints
concern child pornography - actionable reports concerning such material
doubled last year, rising from 215 reports in 1997 to 430 in 1998. While
it would be presumptuous to interpret the figures as indicating an
increase in paedophile activity on the Internet, they do at least
represent a growing awareness of the presence of obscene material on
this medium. It is also important to note that the vast majority of
these complaints (about 95%) relate to material originating outside of
the UK (mostly from the US and Japan). Supplementing the hotline, the
IWF also routinely monitors certain newsgroups which have a track record
of carrying potentially illegal material - in January 1998, about 40
such newsgroups were being watched.
In a two-week period in January 1998, research by the COPINE
project of University College Cork identified 6033 child erotica and
child pornography pictures posted in 23 child sex related newsgroups. In
a repeated exercise in April 1998, 7303 such pictures were found,
although the number of newsgroups had fallen to 16. Two-thirds of the
images were deemed to be arguably erotic rather than pornographic, with
the latter comprising largely either old European photos or more recent
ones featuring Asian children.
- In the US, in 1996, child protection services reported at least 23
cases of ‘cyber-solicitation’. US law enforcement, though, has had some
success with a proactive approach to this threat. Teams will pose as
children upon chat channels and gather evidence through online
conversations. Thus, the anonymity of the Internet - the inability to
determine gender or age or trustworthiness - can work both for and
against the offender.
During 1998, Her Majesty’s Customs and
Excise (HMCE) intercepted a succession of materials (videos, magazines,
computer disks, and other formats) found to have been ordered off the
Internet and imported via Post Office mail or courier service. Some
Internet paedophiles raided during UK law enforcement operations in
recent years have been found to be in possession of magazines, videos
and CDs (as well as computer images), and to be downloading images from
the Internet onto CDs for distribution by post.
Operation Starburst was the first operation in
the UK to target paedophiles who were using the Internet for
communications. Information provided by US Customs led to the
identification of a researcher at Birmingham University who was using
the university computer to store 11,850 images, of which 1,875 were
paedophilic pictures. Investigations by the West Midlands Police
Commercial Vice Unit enabled other individuals, who had copied some of
these images, to be identified and located. Police forces in Australia,
Germany, South Africa, Singapore, the UK and the USA then cooperated and
coordinated arrests to prevent the targets from using the Internet to
tip each other off. Evidence seized in the original operation led to
follow up investigations and, to date, there have been over 20
prosecutions in the UK and over 100 worldwide.
Operation Cathedral, a law enforcement operation across 15
different countries against the "Wonderland" paedophile ring, resulted
in autumn 1998 in the largest ever worldwide seizure of paedophile
material. In the 12 European countries alone, over a quarter of a
million paedophilic images were uncovered from computers, plus hundreds
of CDs and thousands of videos and floppy disks containing such
material. In the UK, eight suspects have been charged with conspiracy to
distribute indecent images of children, one suspect with possession of
such images and another (in Scotland) with possession and distribution
of obscene material. Another suspect is not being proceeded against, but
is already serving a 12 year sentence following conviction of child
abuse offences. In other countries, law enforcement agencies have sought
to identify over 110 targets and, where identified, have either charged
suspects or are continuing their investigations.
- An unanswered question is the proportion of users of child
pornography who are also child abusers. West Midlands Police estimated
that 35% of those targeted by Operation Starburst in 1995 had physically
abused children. More recent research of child pornographers in 1998, by
the FBI in the US, suggested that less than 50% of collectors of
material had, as far as investigations could tell, committed physical
offences. Whether there is a tendency for collectors, in time, to move
on to actual child abuse, however, is also a pertinent question.
IT Features Which May Aid Paedophile Activity
- Assumptions that those who disseminate and/or collect child
pornography are not particularly computer-literate are probably
inaccurate and certainly complacent. More likely, there are a range of
abilities. Some will have long experience using the new media and there
are known cases where child pornographers have used digital tools to
conceal material (e.g. strong encryption). Moreover, the success of law
enforcement operations may raise awareness among the paedophile
community of the risks that they run when acting overtly on the
Internet.
- As a medium, the Internet provides distinct advantages for those
trading or distributing paedophilic material. Images can be scanned in
and stored as computer files, and the Internet then allows these to be
transmitted through a number of mechanisms. Traditionally, much child
pornography has come into the UK from abroad, available as physical
objects such as magazines or videos, which could be intercepted as they
entered the country and which constitute evidence of unlawful
possession. With the Internet there is no border control and (often) no
tangible goods, complicating law enforcement’s task of detecting the
crime and obtaining the evidence.
In pursuit of a serious criminal, law enforcement obtains
a warrant from the Home Secretary and lawfully intercepts a communication,
only to find that the message is encrypted and unintelligible. A criminal
is arrested and law enforcement exercises its legal powers to seize and
interrogate the individual’s computer for evidence, only to find that the
contents are encrypted and unavailable in a legible form. An offender
takes advantage of the various ways of ensuring anonymity on the Internet
and evades detection while pursuing criminal activities - law enforcement
efforts to trace originators of hacking attacks, paedophile material,
personal threats and extortion demands are frustrated.
- The 1985 Interception of Communications Act allows for the lawful
interception of a communication sent over a public telecommunications
system if undertaken for national security reasons, the economic
well-being of the UK or the prevention or detection of serious crime.
The interception must be sanctioned by a Secretary of State. The 1984
Police and Criminal Evidence Act (PACE) contains provisions relating to
powers of search and seizure, which includes the power to seize
computers. PACE and the 1998 Data Protection Act contain provisions
allowing law enforcement to seek access to subscriber and data traffic
information held by ISPs. This information is often essential to locate
suspects and further investigations, helping to determine the origin of
obscene material, hacking or denial of service attacks, e-mail
fraudsters, extortionists, etc. Certain methods of achieving anonymity
on the Internet are illegal and covered by appropriate legislation -
e.g. Internet Protocol (IP) spoofing is a computer misuse offence,
submitting false subscriber details constitutes fraud. There is no
legislation prohibiting use of anonymous remailers, other methods to
protect identity on the Internet or cryptography, nor a need for any,
since these have legitimate and extremely beneficial uses (see
paragraphs 89 and 90).
Scale Of The Problem
- A number of criminal groups, active in the UK or continental Europe,
are known or believed to be using Internet communications in order to
organise their activities; these include drugs importers, software
counterfeiters, football hooligans and far-right activists. UK Police
forces have evidence of the widespread use of e-mail and encryption by
groups involved in ‘computer crime’. The use of such facilities within
paedophile groups appears to be increasing.
- If figures are unavailable to demonstrate this take-up, there remain
compelling reasons to believe that use of these methods will increase in
the coming years. As Internet communications and their security
facilities become more widely used by the public and business, it is
very likely that they will be adopted by more criminals too. The
criminal community has been keeping abreast of new communications
technologies for years and is aware of law enforcement interception
capabilities. It has been responding accordingly - e.g. it was
understanding of the vulnerability of landlines to simple wire taps that
encouraged use of cellular phones and phone cloning. Greater use of
cryptography will erode law enforcement’s present powers to intercept
communications and interrogate seized computers.
- Secure encryption is paradoxically both a blessing and a bane for
law enforcement and crime prevention. On the positive side, its
widespread use will curtail opportunities for certain kinds of ‘IT
crime’; for example, it can be used for secure storage of sensitive data
(anti-hacking) and to protect intellectual property (anti-piracy) and
prevent the defrauding of firms and individuals (anti-fraud).
Critically, the combination of encryption and digital signatures will
help to authenticate both identity and message. The downside, however,
is that secure encryption will help Organised Crime, paedophile rings
and other criminals to communicate with less risk of detection. NCIS
assesses that widespread effective use of robust non-recovery encryption
by criminals will seriously damage law enforcement’s ability to fight
serious and organised crime.
- Anonymous remailers and other methods which protect identity on the
Internet may similarly be used for good or ill. They are useful for
political dissidents in countries with repressive regimes, victims of
abuse (who wish to participate in discussions on the subject, but not
expose their identities), and those who are concerned about privacy on
the Net. Unfortunately, they may also appeal to those who want their
criminal affairs to remain private.
The Challenge To Law Enforcement
- Criminals who make effective use of the
methods available to protect content and identity are going to be much
harder to catch. Law enforcement agencies are thus keen that, in
specified circumstances only (i.e. where lawful access is presently
permitted), they should be able to formally request the decryption key,
whether from the user or anyone else to whom the key has been entrusted.
Failure to comply with the request would constitute an offence. There
are some limitations to this proposed measure’s overall effectiveness
and these would undoubtedly be exploited by the most astute criminals.
However, the measure does offer the prospect of preserving some
of law enforcement’s present data recovery capability.
The combination of Internet
communications, their convergence with telephony and other media, and
the various methods of ensuring anonymity and content protection (of
which encryption is just one element) poses a formidable challenge to
law enforcement. Moreover, in the coming years, new technologies and
procedures are likely to be developed to protect the innocent from
hackers, and these will be used by criminals too. Lawful access to
decryption keys can only be a very partial solution to the problems
which will be faced and a range of other measures and tools will need to
be developed - NCIS is exploring the possibilities.
Assessing Risk And
Impact
- The novelty of ‘cybercrimes’, and the daring or drama of individual
cases, makes such offences extremely newsworthy, but there is a danger
of allowing hype and ‘a good story’ to distort the true picture. How
concerned should the public really be about ‘IT crime’?
IT Vulnerabilities And Criminal Opportunities
- To a large extent, vulnerabilities stem from the difficulties of
adapting to the new technologies, environment and realities of the
‘virtual world’, and of keeping up with the rapid pace of innovation.
Technologies (e.g. computers, telephones, televisions) are converging
and media (e.g. personal communications, publishing, broadcasting)
blurring. Digital technology is making it easy to manipulate
information, enabling multiple copies to be made without loss of quality
and data to be transferred between different hardware (computers,
telephones, digital TV, pagers, etc.). Bandwidth is widening, increasing
the speed of transmission of ever-larger volumes of data. Internet
facilities and software are providing greater anonymity on the Net and
protection of content. Further radical changes are promised with the
introduction of new low-cost devices enabling Internet access (e.g.
mobile phones, TV set-top boxes).
- The Internet is no respecter of national or international
boundaries, presenting acute difficulties for traditional regulators.
Even when action is possible, the regulatory power can be circumvented
by the site relocating elsewhere in the world. The transnational nature
of the Internet raises some legal uncertainties: Which country will have
jurisdiction to hear the case? Which country’s laws will govern the
action? How can a court decision be enforced if the defendant resides
abroad? Which protocols will govern cross-border investigations?
- Inevitably, the widespread adoption of new technology raises
problems concerning usage, behaviour and attitudes. People have to
become attuned to new responsibilities and requirements. Effective
security procedures must be put in place and observed (e.g. concerning
exchange of disks, back-up procedures, isolating internal systems from
the open Net). Organisations and law enforcement must overcome their
lack of familiarity with the technologies and inexperience in dealing
with ‘IT crimes’. All the while, the Internet grows at a phenomenal rate
and society’s dependence on IT systems increases and becomes, in some
cases, critical.
- From all the above developments arise numerous opportunities for
commerce, communications, learning, etc. However, those with the
capability and motivation to commit crime may profit too. These
vulnerabilities become criminal opportunities when the criminal has the
knowledge, means and motivation to exploit the new situations and
attempt to carry out the crime - e.g. the necessary resources, skills,
information, access, organisation, viable targets and prospects of
rewards.
- Until relatively recently, ‘IT crimes’ have been limited by the user
profile. Military and governmental establishments were attractive to
recreational hackers, who could win kudos by penetrating certain key
sites. Software copyright owners (piracy), and telecommunications
companies and Internet Service Providers (service theft) were also
visible and attainable targets. The growing use and commercialisation of
the Internet since the mid-1990s has broadened the target profile
significantly: commercial entities (industrial espionage), credit card
companies (fraud) and everyday users (fraud, harassment) have become
victims too. In future, likely targets are audio and video copyright
owners, corporate rivals, home shoppers and new Internet infrastructure
firms. Moreover, in cyberspace, offenders are not limited to targets in
their home country.
Capabilities, Motivation And Impact
- The spread of computer culture and ‘IT-literacy’ in society can be
expected to raise the IT skills and capability of particularly younger
generation criminals, and the awareness of all criminals to the
possibilities for committing ‘cybercrime’. Expertise can be recruited or
even requisitioned by coercion.
- The Internet’s use as a communications medium helps to spread
knowledge about criminal acts (e.g. credit card fraud, synthetic drugs
manufacture), while geographical location is no longer a barrier to
people meeting and cooperating with each other. Notably, information has
been shared identifying vulnerabilities and solutions in order to
facilitate hacking, telecommunications fraud and software cracking.
Tools as well as know-how are made available on the Internet. The
communal nature of the Net also assists the spread of knowledge to avoid
detection - e.g. paedophiles with computer know-how have been known to
educate others in their rings. Many ‘IT crimes’ do not require any
special IT skills, only a rudimentary understanding, while the key
‘skills’ for traditional crimes are already in the criminals’ possession
(e.g. confidence tricks).
- Motives vary amongst ‘IT criminals’ and more than one underlying
motive may be present. In fraud and extortion cases, direct financial
gain (prompted, perhaps, by greed or a pressing need for cash) is the
impetus. With service theft and industrial espionage/sabotage, it is
indirect financial gain, to avoid payment, secure a competitive
advantage, or acquire the means (e.g. credit card details) to gain in
future. In cases of cyberstalking and some commercial sabotage, the
motive may be malice, mischief, or revenge (the desire being to hurt or
embarrass the target of the crime). For some recreational hackers, the
activity is regarded as a game or challenge. The wish to make a
statement or seek attention is demonstrated by hackers with a political
agenda and extremists disseminating their opinions, while an ‘ethical’
attitude prevails among those hackers seeking to highlight
vulnerabilities in computer security systems. Finally, the motive of
child pornographers is presumably sexual or violent gratification.
- IT crime’ is not violent in a direct sense, although violence
against the person may precede or be present during the act (in the case
of paedophilia) or there may be repercussions where public safety is
endangered (e.g. interfering with emergency services or air traffic
control) or health records altered. Emotional distress or anxiety might
result from the viewing of obscene material, e-mail harassment, or being
cheated out of money. More quantifiable is economic injury, which can be
measured by adding up direct monetary losses, the loss of proprietary
information of financial value, lost business and profits, downtime,
costs of repairing damage and protecting oneself against future damage,
etc. Obviously, the impact will vary widely depending on the nature of
the crime, from the grave to the mildly annoying.
Keeping A Perspective
- Few, if indeed any, individuals should be considered criminal
masterminds, with perfect grasp of society’s vulnerabilities to crime,
understanding of their opportunities for criminal action, and control of
resources and events. Criminals have their own vulnerabilities, which
may deter them from pursuing a venture, lead to failure in accomplishing
the job, or result in them being caught. Among the factors which may
deter ‘IT crime’ are: lack of computer know-how among the established
criminal fraternity; risks associated with recruiting outsiders with the
necessary expertise; continuing profitability of traditional forms of
crime or new prospects in those areas; publicity surrounding successful
law enforcement operations; and the need in some cases for a ‘physical
world’ interface - money or fraudulently purchased goods must still be
collected somewhere, while prohibited material goods sold over the
Internet must still be shipped. The openness of the Net is a
double-edged sword: it allows the criminal to reach a wide audience, but
it also allows their activities to be monitored by law enforcement,
businesses and users. Likewise, the anonymity of the Net works both
ways: the criminal may conceal their identity, but so too may law
enforcement (for detection) and law-abiding users (for protection).
Responses To
Crime
- In turning to the responses to the various threats described in the
pages of this report, particular caution is needed with the use of the
umbrella term ‘IT crime’ - it covers a multitude of offences and
different responses will be needed to tackle different crimes.
Additionally, combating crime is not simply a matter for Government and
law enforcement. The IT industry, Internet infrastructure firms,
corporate and private users, and the media have responsibilities and a
role to play too. Indeed, such are the dynamics and pace of change of
the ‘IT world’ that some users and businesses will be far ahead of law
enforcement in identifying measures to prevent and detect crime.
Users
- There is much that users can do to prevent themselves becoming
victims of ‘IT crime’. Most viruses are nuisances rather than criminally
pernicious and are best dealt with by users employing sensible
precautions (e.g. isolating Internet connections from internal networks
and properly configuring and regularly updating anti-virus software).
The implementation and observation of appropriate security measures
(e.g. firewalls and password protection) will guard against the hacking
threat. Firms and organisations which hold personal data have a legal
obligation to safeguard it from unauthorised access or alteration,
disclosure or destruction - lax security could leave them in breach of
the 1998 Data Protection Act.
- NCIS encourages users to report incidents to the Police,
the IWF or appropriate hotlines - non-reporting allows offenders to hone
their skills and prey on others. Self-help groups (e.g. anti-virus
forums) are useful, while the Internet is an ideal medium for issuing
alerts to fellow users (e.g. about scams) and spreading advice. Keeping
audit logs (which monitor logins and user activities) often enables
offenders to be traced back to their point of origin. Industry’s
development of filtering and ratings systems will provide the
information and tools needed so that users may restrict or avoid access
to certain sites.
- In particular, the principle of ‘buyer beware’ applies on
the Internet as on the high street. The customer is the first bastion
against Internet fraud; common sense and a degree of scepticism about
enticing offers is a useful guard.
Industry
- Industry has a key role to play: conducting their own investigations
and pursuing law suits against offenders, providing for self-regulation,
developing technical solutions, establishing new services for users, and
cooperating with law enforcement.
- Companies are responsible for protecting their own names and trade
marks, and will consequently have a role in fraud prevention (by
spotting companies using false credentials in order to win business).
Industry-wide organisations will be at the forefront of efforts to
ensure that fraudsters and pirates are not abusing the reputation of
their industries, stealing trade from legitimate businesses, and
cheating customers. NCIS encourages industry to monitor the Internet for
criminal developments which may rebound on it and to share findings with
law enforcement. Such observation will reveal the security weaknesses
and opportunities identified by potential criminals, and give advanced
warning of likely new methods of attack.
- Organisations representing the software and audio industries - e.g.
the BSA, FAST, ELSPA, and British Phonographic Industry (BPI) - have
teams investigating and prosecuting piracy (including Internet-related
piracy). Other methods used by such organisations include publicity,
education of end-users, ‘naming-and-shaming’ of guilty corporations, and
hotlines for disclosures by members of the public. The BSA offers
rewards to employees who ‘whistle-blow’ on their companies. In the case
of end-user piracy, industry-led investigations and education of
intellectual property rights are probably the best means of addressing
the problem. Similarly, industry’s own efforts (e.g. in-store
inspections) can be effective against distributors who engage in hard
disk loading.
- Market forces can be expected to provide some self-regulation in
areas such as gambling and adult pornography. Reputable businesses will
look to attract trade and it will be in their interest to deal fairly
and evenly with their customers; only the tried and trusted will claim a
market share. In each sector, operators might band together to fund an
international body, which would endorse those sites which fulfilled
certain criteria (thus helping customers to identify the ‘approved’
operators). Such a body might monitor the Internet for misappropriations
of its mark of approval and other evident abuses against the public,
check out its members’ sites to ensure compliance with its requirements
for membership, establish a hotline for customer complaints, issue
warnings to the public about crooked sites, and cooperate with law
enforcement when illegalities were uncovered. Governments might
encourage ISPs, advertisers and credit card companies to only accept
business from and for these approved sites.
- Technical solutions available or in development include: biometrics
(which use physiological measurements, such as fingerprints, voice or
facial recognition, or scanning of retina or iris, to grant computer
access); fraud screening software (which checks numerous variables that
might identify a fraudster), e-mail filtering systems (which either
block mail from certain addresses, or only permit mail from specified
addresses), and digital ‘watermarks’ (which encode ownership
information, cannot be deleted and are invisible to the eye). The
software and audio industry is attempting to develop technologies to
limit the distribution or susceptibility to copying of digital media.
The adoption of cryptography and digital signatures will help to
authenticate identities.
- Opportunities for new services arise; for example, to take on the IT
security burden (e.g. scanning incoming e-mail for viruses). In the case
of audio piracy, the big record companies have been slow (much slower
than the pirates) to provide a better web presence to cater for
potential Internet customers.
Law Enforcement
- At the local level, Police forces will need the capability to react
to computer misuse incidents which cause more than just a nuisance
(serious denial of service attacks, extortion demands, commercial
espionage, exposure of secrets, etc.). Training and resource issues
arise, while Police forces will need to increase their awareness of
‘computer crime’ and computer evidence. A national register of technical
experts might aid local investigations.
- ‘IT crimes’ open up new opportunities for law enforcement.
On the Internet, an advert for a bogus product or service or investment
can find the gullible who will part with their money. However, the act
of advertising means that the scam may itself be found by watching
regulators. Similarly, with prohibited goods and services, the peddlers
necessarily advertise their wares for sale and this too is open to
detection. Search engines may be used to look for suspect words or
phrases. Monitoring of illicit goods being marketed on the Internet may
provide leads on deliveries, since shipment of tangible goods still has
to be effected in the ‘physical world’. Continued trading of hard
formats (e.g. CD-ROMs with pirated software, CD-Rs with pirated
recordings, and pornographic videos) means that there will still be
opportunities for law enforcement interception and seizure.
- Monitoring of overt information on websites, newsgroups
and so on, may also garner useful information on: digital piracy,
extremist propaganda, and developments in the ‘sub-cultures’ of hacking,
phreaking and software cracking. Users, industry and law enforcement
might then be forewarned of changes in criminal behaviour (skill levels,
new techniques, and so on) and so respond appropriately (e.g. by issuing
fraud alerts, patching up loopholes in computer security, advising
operational units of possible new criminal practices).
- At a national level, intelligence analysis will help to
determine priorities. Which offenders should society be most worried
about and where and how should law enforcement’s efforts be
concentrated? This is particularly important with respect to computer
misuse offenders. Scarce law enforcement resources need be concentrated
on those offenders and incidents which pose the more serious threat -
that is, generally, those who use hacking tools and malicious programs
as the means to defraud banks, extort money, plunder information of
financial value, cause economic harm, etc. To this end, NCIS is
recommending that the most successful method of policing serious
computer misuse is via a single dedicated national unit.
- The proposed national unit would have three broad roles:
to investigate the most serious ‘IT crimes’; to act as a centre of
excellence for ‘cybercrime’ issues; and to support local forces which
encounter offenders using sophisticated IT skills. Benefits of such a
unit might include: inspiring public confidence in law enforcement’s
ability to tackle such crimes; overcoming the geographical factors which
complicate local forces’ ability to pursue and apprehend certain
offenders; acting as an ‘IT crime’ reference point for operational
enquiries by foreign law enforcement agencies; improving coordination;
and facilitating economies (e.g. by avoiding duplication of expensive
leading-edge anti-crime technologies).
- Law enforcement will have to accept that criminal know-how
will be more widely disseminated and easily accessed than in the past,
and that its existing interception capabilities will gradually erode as
use of Internet communications and cryptography grows. Given the
difficulty of preventing extremist views getting on the Net in the first
place (and of effectively removing them even when they are identified)
and the impossibility of anticipating the actions of unstable
individuals, law enforcement responses in these areas must necessarily
be reactive.
- Publicity given to successful law enforcement operations
and firm court sentencing against offenders may cause some to be less
confident of their chances of getting away with criminal acts. Areas in
which legislation might be considered are: criminal law protection for
trade secrets; strengthening of Section 1 of the 1990 Computer Misuse
Act; and lawful access to decryption keys (in prescribed circumstances).
Partnerships
- Given the transnational nature of the Internet, international
cooperation is vital. It covers a number of areas: harmonisation of
legislation and policy, combined law enforcement operations,
standardisation of investigative and forensic techniques,
extra-territorial jurisdiction, consistent extradition of criminals,
cooperation in retention of witnesses and evidence, and exchange of
information. Operations Starburst and Cathedral have shown the value of
coordinated international action by law enforcement against paedophile
rings, both in exchanging information at the preliminary stage and in
preventing paedophiles tipping off other ring members when arrests and
seizures are made. The creation and maintenance of a central library of
known paedophilic images at an international level would both aid the
search for victims and help to determine the nature of offences.
- The forging of close links between law enforcement and industry
would be welcome. Together, business and law enforcement can raise
public awareness about the risks posed by criminals on the Internet
(e.g. advance fee frauds, passing personal financial details over
insecure communications channels, etc.), promote best practices for IT
security, and develop effective counter-crime tools and procedures. The
ACPO/ISP/Government Forum is a useful initiative to foster a working
relationship and help the parties to gain improved understanding of each
other’s concerns. The cooperation of organisations such as the ISPs is
crucial to the investigation of ‘computer crimes’ in order to benefit
from in-house expertise and lawful access to subscriber and tracing
information.
- Opportunities exist now, while problems are emerging, for the
law-abiding to take the steps to improve security. Mutual advice on
crime prevention and detection, exchange of information and ideas,
appropriate actions and measured responses taken to combat the genuine
threats that exist, will help to curb ‘cybercrime’ and ensure that the
information highways do not become a seductive environment for
criminals.
Annex A: GLOSSARY OF
TERMS AND ABBREVIATIONS
ACPO
ATM
BSA
CERT
CMA
CSI
DOS
DTI
ELSPA
FAST
FBI
Firewall
HMCE
ICSA
Information Security
Integrity
ISP
IT
IWF
JANET
Java
NCC
NCIS
NCL
Newsgroup
OPA |
Association Of Chief Police Officers
Automated Telling Machine
Business Software Alliance
Computer Emergency Response Team
The UK’s Computer Misuse Act of 1990
Computer Security Institute
Domain Operating System
Department Of Trade And Industry
European Leisure Software Publishers’
Association
Federation Against Software Theft
US Federal Bureau Of Investigation
Defensive software that protects a computer system
from unauthorised intruders
Her Majesty’s Customs And Excise
International Computer Security Association
Characterised as the preservation of the
confidentiality and integrity of the contents of an IT system and
the availability of IT resources
Safeguarding the accuracy and completeness of
information and processing methods
Internet Service Provider, a commercial
organisation which provides its subscribers with a direct connection
to the Internet. Many offer additional services, such as website
design and hosting.
Information Technology
Internet Watch Foundation, created in September
1996; acts as a hotline for users to report items of offensive
material encountered on the Net
UK Joint Academic Network
A computer language
National Computer Centre
National Criminal Intelligence Service
US National Consumers’ League
A computer network discussion group or mailing
list, on which members may post messages and receive any messages
posted by others.
UK’s Obscene Publications Act 1959 |
PACE
Phreaking
SPA
UNIX
Warez |
UK’s Police And Criminal Evidence Act 1984
Hacking the telephone system, usually to obtain
free calls, by generating illicit administrative commands to the
network computer
Software Publishers’ Alliance
An operating system
Pirated
software |
|