SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
This accessible and readable book will appeal both to
students and general readers, giving a fascinating
intoruduction to cyber crime and warfare – and what
matters most about them.

I S B N 978-1-4441-8998-8

£8.99

9

USD
$14.00

781444 189988

£8.99

Al
l
att Th
er at
s

All That Matters books are written
by the world’s leading experts, to
introduce the most exciting and
relevant areas of an important topic
to students and general readers.

er
yb ime
C
Cr & re
fa
ar
W

M

All That
Matters

Peter Warren & M ic hael Streeter

189988_ATM_CyberCrime_CV_v4.indd 1

After analysing the origins of computer crime among
early hackers the authors describe how criminal gangs
and rogue states have since moved into the online arena
with devastating effect, at a time when the modern world
– including all the communication services and utilities we
have come to take for granted – has become utterly
dependent on computers and the internet.

Cyber Cr im e & War fare

Cover design: nathanburtondesign.com

In Cyber Crime: All That Matters, Peter Warren and
Michael Streeter outline the history, scale and importance
of cyber crime. In particular they show how cyber crime,
cyber espionage and cyber warfare now pose a major
threat to society.

All Th at
M atters

Michael Streeter is an author and
former Fleet Street executive who worked
for The Independent, the Daily Express, the
Mirror and the Daily Mail. He was also
editor of the Scottish Daily Express and
launch editor of the Daily Express
website. Michael’s books include the
co-authorship with Peter Warren of Cyber
Alert: How the world is under attack from a
new form of crime.

Is this decade the
most dangerous yet?

All Th at
M atters

Peter Warren is an award-winning
newspaper and TV journalist
acknowledged as an expert on technology
and computer and internet crime. He
wrote the first articles highlighting the
potential for the internet to be abused by
paedophiles in1989 and as a result was
asked to brief the first UK police force to
respond to the danger, the Greater
Manchester Police Obscene Publications
Squad, on the issues the technology has
produced. He has also set up the Cyber
Security Research Institute, an
organization pulling together the UK’s top
academic and business experts in the
field of computer security with leading
journalists in a bid to raise awareness of
cyber crime.

From Bioethics to Muhammad and
Philosophy to Sustainability, the All
That Matters series covers the most
controversial and engaging topics
from science, philosophy, history,
religion and other fields. The authors
are world-class academics or top
public intellectuals, on a mission
to bring the most interesting and
challenging areas of their subject
to new readers.
Each book contains a unique ‘100
Ideas’ section, giving inspiration
to readers whose interest has been
piqued and who want to explore
the subject further. Find out more at:
www.allthatmattersbooks.com

Peter Warren &
Michael Streeter

Facebook allthatmattersbooks
Twitter @All_That_Matters

03/07/2013 16:31
1
The nature of
cyber crime

at
Th s
ll er
A tt
Ma

189988_cyber_crime_war_Book.indb 1

25/06/13 3:00 PM
Contents
1	 The nature of cyber crime	

1

2	 The history of hacking	

11

3	 The rise of the Internet and
the virus threat	

23

4	 Industrial cyber espionage	

37

5	 Identity theft and the curse of spam	

51

6	 The rise of the botnets – the
greatest threat to the online world?	

65

7	 Cyber criminal profiles	

75

8	 Policing cyber space	

89

9	 Targeting children	

99

10	 Cyber warfare and the
information war	

111

11	 Future technology: how the world is
getting more mobile, cloudier and
more dangerous	

125

189988_cyber_crime_war_Book.indb 5

25/06/13 3:00 PM
100 Ideas	

133

Index	

145

Acknowledgements	

149

189988_cyber_crime_war_Book.indb 6

25/06/13 3:00 PM
The nature of cyber crime

2

Cyber crime (or cybercrime as it is also often written) is
an inelegant term used to cover a whole range of different
offences and activities carried out by individuals, gangs,
businesses and, in some cases, governments, with the
aid of new technology. For many, the phrase is simply
an alternative to ‘computer crime’ – that is, any crime
involving the use of computers, either as a tool of the
crime or the intended target. But that usage is becoming
increasingly outdated as cyber crime also covers any
illegal activities involving the Internet. Mobile phones
and other handheld devices make use of the Internet
without any involvement from computers – though, of
course, one could argue that modern mobile phones
or smartphones are simply mini-computers, even if we
don’t call them that.
So cyber crime refers to any offence committed using
a computing device, personal computers, computer
networks, the Internet in general, telecommunications
systems, message boards, internal communications
systems such as intranets and mobile devices, including
smartphones. An important element of cyber crime is
that – generally, though not always – the criminal acts
are carried out remotely, with a distance between the
criminal and the victim. So, for example, someone
disseminating a computer virus – a classic cyber crime –
could do so from the palm-fringed beach of a tiny remote
island, many hundreds of miles away from their nearest
potential victim. This, evidently, can make the criminal
harder to catch. Cyber crime is, in that sense, a natural
development in crime for a world that has become more
globalized. Whereas once government, the military and

189988_cyber_crime_war_Book.indb 2

25/06/13 3:00 PM
the financial community were the only ones who were
able to make decisions remotely that affected people a
long way away, now criminals have that power, too.

◗◗ New crimes or old?

On the other hand, one could argue that hacking – the use
of computers and the Internet to gain access to someone
else’s electronically stored data – does not have any realworld parallels. Yet, as we shall see in the next chapter,

189988_cyber_crime_war_Book.indb 3

a ll th at ma tters: Cyber Crime

Another example is stalking, another familiar crime
that has now found online form in what is called ‘cyber
stalking’. It’s the same as ‘real world’ stalking except
that it’s easier to carry out, as the stalker doesn’t have
to leave the comfort of their living room.

3

Are cyber crimes simply more high-tech versions of old
‘real world’ ones, or new offences? This is a good question
and the answer is – in most cases – the former. Identity
theft is cyber crime. It lies squarely at the heart of it. You
use someone else’s details to gain access to places that
you should not be – assuming another person’s identity to
gain access to their money and other valuables. This is not
new, as criminals have been using such techniques since
the dawn of time. However, the modern practice of putting
so much personal and financial information on computers,
data storage devices and online has made identity theft a
much easier and thus more lucrative crime. It is much
safer for the criminal, too, as often they can assume
the identity of someone on the other side of the world,
reducing their chances of getting caught to almost zero.

25/06/13 3:00 PM
The nature of cyber crime

4

computer hacking originally evolved from the ‘hacking’ of
telephones, known as ‘phone phreaking’, which was not
itself at the time illegal. Perhaps a better example of a
‘new’ form of crime would be computer viruses. If you used
a time machine and travelled back even just to the 1960s,
you would have a hard job explaining to someone what
a computer virus was. Nonetheless, that person would
understand the notion of sabotage – which is effectively
what viruses help commit.
In general, then, we can say that cyber crimes are
largely traditional forms of crimes using modern
tools. After all, at some point in the past highwaymen
graduated from using knives to guns, so it should come
as little surprise if, in the 21st century, some of them
are now upgrading to computers. The essence of the
crimes remains the same: bad people wanting your
money, individuals wanting to victimize others – as in
stalking – or societies and companies wanting to steal
their competitors’ secrets.

The major cyber offences
Identity theft

Computer fraud

Hacking

Cyber espionage

Computer viruses

Software piracy

Denial-of-Service (DoS)
attacks

Cyber stalking and bullying
Child pornography

Phishing

189988_cyber_crime_war_Book.indb 4

25/06/13 3:00 PM
As in the so-called real world, some cyber ‘crimes’ are
in the eyes of the beholder. So, for example, protest
movements in repressed countries have turned to the
Internet and, in particular, social media to communicate
with each other and the outside world. The ‘Arab Spring’
of 2011 was a good example, with protesters against the
regimes in countries such as Egypt and Tunisia making
extensive use of social media; the uprising in Tunisia
even became known as the ‘Facebook Revolution’. For
the states in question, however, these communications
were considered subversive and thus cyber crimes. On
the other side of the coin, there are some civil liberties
groups who consider that any state surveillance of the
Internet, emails, websites and so on is a cyber crime (in
the moral if not the legal sense), whether carried out by
dictatorships or Western democracies.

189988_cyber_crime_war_Book.indb 5

a ll th at ma tters: Cyber Crime

Another example of what some consider moral cyber
crime is unauthorized file-sharing, the practice of
downloading music, films and other data from the
Internet and sharing it with friends or ‘peers’ without
permission from the copyright holders. For some this

5

Western governments and businesses have also been
targeted by politically motivated activists or ‘hactivists’ who
seek to embarrass the authorities or companies through
targeting and taking down official websites or releasing
confidential information. Anonymous is perhaps the
best-known of these hactivist groups. For the authorities,
such activities are a ‘crime’; for the activists, they are a
simple manifestation of their liberty of expression and
protest, and there have been (fruitless) attempts to
enshrine it as such in the US Constitution.

25/06/13 3:00 PM
The nature of cyber crime

6

is natural sharing of material, akin to giving a friend
your newspaper or magazine to read. But for the music
or film industries this is a breach of their copyright. In
the United States the 1998 Digital Media Copyright Act
(DMCA) made the exchanging of files of copyrighted
material illegal. Four years later the US Department of
Justice said it would prosecute cases of so-called ‘peerto-peer piracy’. Thus, for the American authorities, such
activity is indeed a cyber crime.
One important factor to consider in relation to cyber
crime is the fundamental nature of the Internet and the
World Wide Web. The Internet – the telecommunications
infrastructure – and the Web – the system that displays
pages via HTML, or Hyper Text Markup Language –
enables any user to go where they want online and even
remain anonymous. This is in line with the philosophy
of the early adopters of the Internet (and later the Web):
that it should remain free, open to all, egalitarian and
non-commercial. It may be hard to imagine now, but
early on commercial use of the Internet was frowned
on by many users. This philosophical approach to
the Internet has many laudable aspects to it. It has
encouraged, for example, the use of the Internet as a
tool against oppression, as discussed earlier. There
is also the idea that the pursuit of knowledge should
be a private endeavour. There are also civil liberties
groups who consider that any collection of our personal
information online by firms for commercial purposes –
so-called data mining – is itself a cyber crime.
But the anonymous and chaotic nature of the Internet –
who runs it? who controls it? who polices it? – is also
of great benefit to criminals. The ability to commit

189988_cyber_crime_war_Book.indb 6

25/06/13 3:00 PM
crimes at distance without one’s identity being known –
or at least requiring considerable effort to get it – is a
technological windfall for them. In Dickensian London,
pickpockets were able to commit crimes, then vanish
into the rat-run of tiny streets to escape pursuers. Using
the Internet, criminals do not even have to leave those
rat-runs. For some law enforcement agents, the World
Wide Web is synonymous with the ‘Wild Wild West’.

◗◗ A big problem – but
how big?

a ll th at ma tters: Cyber Crime

This furtive interest in pornography makes Internet users
more vulnerable to criminals, either through blackmail –
criminals find porn searches when they hack a computer,
then threaten the owner that they will reveal it – or, more
often, through users visiting websites that then download
malicious software that surreptitiously sifts through private
and financial information on that person’s computer.

7

The anonymous nature of the Internet and the Web has
also encouraged individuals to behave in ways they
would be reluctant to do – for fear of being caught – in
the real world. So, for example, free, anonymous and
virtually unlimited access to pornography on the Web
has led to a truly colossal number of hits on porn sites. It
has been said that the porn industry worldwide is worth
more than the combined revenues of Microsoft, Google,
Amazon, eBay, Yahoo! and Apple.

The true scale of the problem of cyber crime is hard to
quantify. In July 2012 General Keith Alexander, the director

189988_cyber_crime_war_Book.indb 7

25/06/13 3:00 PM
The nature of cyber crime

8

of the National Security Agency, which oversees United
States Cyber Command, America’s military organization
fighting cyber attacks, suggested that the total cost of
loss of intellectual property to American companies
alone was around $250 billion a year. Internationally, the
figure was said to be $1 trillion dollars, though the figure
is highly controversial. However, these figures – mostly
based on computer security company reports – have
been widely contested as being far too high. The British
government has itself estimated the annual cost of cyber
crime to the United Kingdom’s economy at £27 billion,
but again some experts have disputed this figure and say
it is an exaggeration.
The truth is that it is virtually impossible to put a true
and accurate figure on the cost of cyber crime to society.
For one thing, individuals and especially companies do
not always know whether they have been targeted and
lost out, financially or commercially. Even when homeowners and firms do know they have been hit, they may
not report the loss, perhaps through embarrassment or
for reasons of commercial confidentiality. However, even
just using conservative reported figures, the numbers
are huge. The United States’ Internet Crime Complaint
Center (IC3) has put the annual cost of Internet crime
based on complaints made to it at just over $485
million. Another way of assessing the financial scale of
the problem is that the value of the computer security
industry worldwide is put at around $300 billion annually.
Despite the uncertainty over figures, what we can say
unequivocally, however, is that cyber crime now poses

189988_cyber_crime_war_Book.indb 8

25/06/13 3:00 PM
USA 23%
Others 34%
China 9%

India 3%

Turkey 3%

Poland 3%

Italy 3%

France 3%

Spain 4%

Brazil 4%

Germany 6%
UK 5%

▲▲Pie chart showing the countries suffering the most cyber crime
(Source: http://www.enigmasoftware.com, 18 April 2013)

9

189988_cyber_crime_war_Book.indb 9

a ll th at ma tters: Cyber Crime

the greatest potential threat to our society that we have
even known. Why? It is because of the massive global
uptake of technology at the end of the 20th century
by businesses desperate to save costs and boost
productivity. In embracing the world of, first, computers
and then the Internet the world adopted technology
that lacked the empirical certainty of the cogs of metal
and drive shafts of the Industrial Revolution. It was
a completely new idea. In the Industrial Age we had
grown used to a spade being a spade – now we were in
an age where a good spade could be a bad spade at the
press of a button. Computer code is a language and it
can be adapted and rewritten by others, and for dubious
purposes.

25/06/13 3:00 PM
10

The nature of cyber crime

◗◗ The Internet’s original sin
The fact that we were working with an imperfect technology
was not at first realized; the possibility that we might
be doing bad things with computer code was simply not
considered. Thus, from the very beginning, the world of
computing and the Internet was based on imperfections,
flaws and sometimes poorly understood processes. You
might even call this the Internet’s ‘original sin’. Eventually,
not just ‘intellectual’ hackers and computer philosophers
were exploiting these faults, but criminals, too.
By then it was too late. By the early 21st century the
modern world has become utterly – one might say
frighteningly – dependent on computer code and the
Internet. From cars to public utilities, from nuclear power
plants to the buildings we live and work in, all rely on the
digital world to function. Unfortunately, by allowing the
imperfection into the system from the start, the creators
of this world also let in the criminals, terrorists and
rogue states. These groups have learned how to exploit
the technological weaknesses that underpin our daily
lives, in ways of which we are largely ignorant. Cyber
crime is today a threat to our very way of life.
This last point has not been lost on military strategists.
Taking out a country’s water supply system could be even
more effective – and cheaper – than dropping plane-loads
of bombs or firing endless quantities of hugely expensive
rockets. The Prussian general Carl von Clausewitz
famously said: ‘War is the continuation of politics by other
means.’ As we shall see in a later chapter, cyber attack is
now the continuation of war by other means.

189988_cyber_crime_war_Book.indb 10

25/06/13 3:00 PM
To order your copy of ‘Cyber Crime and Warfare’
by Peter Warren & Michael Streeter at the
special price of £6.74 (RRP £8.99) inc postage
and packing, please send a cheque payable to
Sparkle Direct and send to Hodder Headline
Offers, PO Box 60, Helston, TR13 0TP.
Alternatively you can order on line at
www.sparklediredt.com
or call 08430 600 037
and quote order ref ‘BKP17’.

Más contenido relacionado

La actualidad más candente

Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésGim Andrade Vidal
 
2600 v22 n2 (summer 2005)
2600 v22 n2 (summer 2005)2600 v22 n2 (summer 2005)
2600 v22 n2 (summer 2005)Felipe Prado
 
2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)Felipe Prado
 
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post PandemicCyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post PandemicUmang Singh
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Dan Lohrmann
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet GovernanceDominic A Ienco
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)Felipe Prado
 
2600 v12 n4 (winter 1995)
2600 v12 n4 (winter 1995)2600 v12 n4 (winter 1995)
2600 v12 n4 (winter 1995)Felipe Prado
 
The great chinese firewall
The great chinese firewallThe great chinese firewall
The great chinese firewallAnca Dinculescu
 
2600 v18 n1 (spring 2001)
2600 v18 n1 (spring 2001)2600 v18 n1 (spring 2001)
2600 v18 n1 (spring 2001)Felipe Prado
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 

La actualidad más candente (20)

Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- Inglés
 
2600 v22 n2 (summer 2005)
2600 v22 n2 (summer 2005)2600 v22 n2 (summer 2005)
2600 v22 n2 (summer 2005)
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post PandemicCyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)
 
nghe thuat lua dao
nghe thuat lua daonghe thuat lua dao
nghe thuat lua dao
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
 
2600 v12 n4 (winter 1995)
2600 v12 n4 (winter 1995)2600 v12 n4 (winter 1995)
2600 v12 n4 (winter 1995)
 
The great chinese firewall
The great chinese firewallThe great chinese firewall
The great chinese firewall
 
Facebook
FacebookFacebook
Facebook
 
2600 v18 n1 (spring 2001)
2600 v18 n1 (spring 2001)2600 v18 n1 (spring 2001)
2600 v18 n1 (spring 2001)
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 

Similar a Cybercrime and Warfare: All that matters (15)

Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 

Más de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Más de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Último

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Último (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Cybercrime and Warfare: All that matters

  • 1. This accessible and readable book will appeal both to students and general readers, giving a fascinating intoruduction to cyber crime and warfare – and what matters most about them. I S B N 978-1-4441-8998-8 £8.99 9 USD $14.00 781444 189988 £8.99 Al l att Th er at s All That Matters books are written by the world’s leading experts, to introduce the most exciting and relevant areas of an important topic to students and general readers. er yb ime C Cr & re fa ar W M All That Matters Peter Warren & M ic hael Streeter 189988_ATM_CyberCrime_CV_v4.indd 1 After analysing the origins of computer crime among early hackers the authors describe how criminal gangs and rogue states have since moved into the online arena with devastating effect, at a time when the modern world – including all the communication services and utilities we have come to take for granted – has become utterly dependent on computers and the internet. Cyber Cr im e & War fare Cover design: nathanburtondesign.com In Cyber Crime: All That Matters, Peter Warren and Michael Streeter outline the history, scale and importance of cyber crime. In particular they show how cyber crime, cyber espionage and cyber warfare now pose a major threat to society. All Th at M atters Michael Streeter is an author and former Fleet Street executive who worked for The Independent, the Daily Express, the Mirror and the Daily Mail. He was also editor of the Scottish Daily Express and launch editor of the Daily Express website. Michael’s books include the co-authorship with Peter Warren of Cyber Alert: How the world is under attack from a new form of crime. Is this decade the most dangerous yet? All Th at M atters Peter Warren is an award-winning newspaper and TV journalist acknowledged as an expert on technology and computer and internet crime. He wrote the first articles highlighting the potential for the internet to be abused by paedophiles in1989 and as a result was asked to brief the first UK police force to respond to the danger, the Greater Manchester Police Obscene Publications Squad, on the issues the technology has produced. He has also set up the Cyber Security Research Institute, an organization pulling together the UK’s top academic and business experts in the field of computer security with leading journalists in a bid to raise awareness of cyber crime. From Bioethics to Muhammad and Philosophy to Sustainability, the All That Matters series covers the most controversial and engaging topics from science, philosophy, history, religion and other fields. The authors are world-class academics or top public intellectuals, on a mission to bring the most interesting and challenging areas of their subject to new readers. Each book contains a unique ‘100 Ideas’ section, giving inspiration to readers whose interest has been piqued and who want to explore the subject further. Find out more at: www.allthatmattersbooks.com Peter Warren & Michael Streeter Facebook allthatmattersbooks Twitter @All_That_Matters 03/07/2013 16:31
  • 2. 1 The nature of cyber crime at Th s ll er A tt Ma 189988_cyber_crime_war_Book.indb 1 25/06/13 3:00 PM
  • 3. Contents 1 The nature of cyber crime 1 2 The history of hacking 11 3 The rise of the Internet and the virus threat 23 4 Industrial cyber espionage 37 5 Identity theft and the curse of spam 51 6 The rise of the botnets – the greatest threat to the online world? 65 7 Cyber criminal profiles 75 8 Policing cyber space 89 9 Targeting children 99 10 Cyber warfare and the information war 111 11 Future technology: how the world is getting more mobile, cloudier and more dangerous 125 189988_cyber_crime_war_Book.indb 5 25/06/13 3:00 PM
  • 5. The nature of cyber crime 2 Cyber crime (or cybercrime as it is also often written) is an inelegant term used to cover a whole range of different offences and activities carried out by individuals, gangs, businesses and, in some cases, governments, with the aid of new technology. For many, the phrase is simply an alternative to ‘computer crime’ – that is, any crime involving the use of computers, either as a tool of the crime or the intended target. But that usage is becoming increasingly outdated as cyber crime also covers any illegal activities involving the Internet. Mobile phones and other handheld devices make use of the Internet without any involvement from computers – though, of course, one could argue that modern mobile phones or smartphones are simply mini-computers, even if we don’t call them that. So cyber crime refers to any offence committed using a computing device, personal computers, computer networks, the Internet in general, telecommunications systems, message boards, internal communications systems such as intranets and mobile devices, including smartphones. An important element of cyber crime is that – generally, though not always – the criminal acts are carried out remotely, with a distance between the criminal and the victim. So, for example, someone disseminating a computer virus – a classic cyber crime – could do so from the palm-fringed beach of a tiny remote island, many hundreds of miles away from their nearest potential victim. This, evidently, can make the criminal harder to catch. Cyber crime is, in that sense, a natural development in crime for a world that has become more globalized. Whereas once government, the military and 189988_cyber_crime_war_Book.indb 2 25/06/13 3:00 PM
  • 6. the financial community were the only ones who were able to make decisions remotely that affected people a long way away, now criminals have that power, too. ◗◗ New crimes or old? On the other hand, one could argue that hacking – the use of computers and the Internet to gain access to someone else’s electronically stored data – does not have any realworld parallels. Yet, as we shall see in the next chapter, 189988_cyber_crime_war_Book.indb 3 a ll th at ma tters: Cyber Crime Another example is stalking, another familiar crime that has now found online form in what is called ‘cyber stalking’. It’s the same as ‘real world’ stalking except that it’s easier to carry out, as the stalker doesn’t have to leave the comfort of their living room. 3 Are cyber crimes simply more high-tech versions of old ‘real world’ ones, or new offences? This is a good question and the answer is – in most cases – the former. Identity theft is cyber crime. It lies squarely at the heart of it. You use someone else’s details to gain access to places that you should not be – assuming another person’s identity to gain access to their money and other valuables. This is not new, as criminals have been using such techniques since the dawn of time. However, the modern practice of putting so much personal and financial information on computers, data storage devices and online has made identity theft a much easier and thus more lucrative crime. It is much safer for the criminal, too, as often they can assume the identity of someone on the other side of the world, reducing their chances of getting caught to almost zero. 25/06/13 3:00 PM
  • 7. The nature of cyber crime 4 computer hacking originally evolved from the ‘hacking’ of telephones, known as ‘phone phreaking’, which was not itself at the time illegal. Perhaps a better example of a ‘new’ form of crime would be computer viruses. If you used a time machine and travelled back even just to the 1960s, you would have a hard job explaining to someone what a computer virus was. Nonetheless, that person would understand the notion of sabotage – which is effectively what viruses help commit. In general, then, we can say that cyber crimes are largely traditional forms of crimes using modern tools. After all, at some point in the past highwaymen graduated from using knives to guns, so it should come as little surprise if, in the 21st century, some of them are now upgrading to computers. The essence of the crimes remains the same: bad people wanting your money, individuals wanting to victimize others – as in stalking – or societies and companies wanting to steal their competitors’ secrets. The major cyber offences Identity theft Computer fraud Hacking Cyber espionage Computer viruses Software piracy Denial-of-Service (DoS) attacks Cyber stalking and bullying Child pornography Phishing 189988_cyber_crime_war_Book.indb 4 25/06/13 3:00 PM
  • 8. As in the so-called real world, some cyber ‘crimes’ are in the eyes of the beholder. So, for example, protest movements in repressed countries have turned to the Internet and, in particular, social media to communicate with each other and the outside world. The ‘Arab Spring’ of 2011 was a good example, with protesters against the regimes in countries such as Egypt and Tunisia making extensive use of social media; the uprising in Tunisia even became known as the ‘Facebook Revolution’. For the states in question, however, these communications were considered subversive and thus cyber crimes. On the other side of the coin, there are some civil liberties groups who consider that any state surveillance of the Internet, emails, websites and so on is a cyber crime (in the moral if not the legal sense), whether carried out by dictatorships or Western democracies. 189988_cyber_crime_war_Book.indb 5 a ll th at ma tters: Cyber Crime Another example of what some consider moral cyber crime is unauthorized file-sharing, the practice of downloading music, films and other data from the Internet and sharing it with friends or ‘peers’ without permission from the copyright holders. For some this 5 Western governments and businesses have also been targeted by politically motivated activists or ‘hactivists’ who seek to embarrass the authorities or companies through targeting and taking down official websites or releasing confidential information. Anonymous is perhaps the best-known of these hactivist groups. For the authorities, such activities are a ‘crime’; for the activists, they are a simple manifestation of their liberty of expression and protest, and there have been (fruitless) attempts to enshrine it as such in the US Constitution. 25/06/13 3:00 PM
  • 9. The nature of cyber crime 6 is natural sharing of material, akin to giving a friend your newspaper or magazine to read. But for the music or film industries this is a breach of their copyright. In the United States the 1998 Digital Media Copyright Act (DMCA) made the exchanging of files of copyrighted material illegal. Four years later the US Department of Justice said it would prosecute cases of so-called ‘peerto-peer piracy’. Thus, for the American authorities, such activity is indeed a cyber crime. One important factor to consider in relation to cyber crime is the fundamental nature of the Internet and the World Wide Web. The Internet – the telecommunications infrastructure – and the Web – the system that displays pages via HTML, or Hyper Text Markup Language – enables any user to go where they want online and even remain anonymous. This is in line with the philosophy of the early adopters of the Internet (and later the Web): that it should remain free, open to all, egalitarian and non-commercial. It may be hard to imagine now, but early on commercial use of the Internet was frowned on by many users. This philosophical approach to the Internet has many laudable aspects to it. It has encouraged, for example, the use of the Internet as a tool against oppression, as discussed earlier. There is also the idea that the pursuit of knowledge should be a private endeavour. There are also civil liberties groups who consider that any collection of our personal information online by firms for commercial purposes – so-called data mining – is itself a cyber crime. But the anonymous and chaotic nature of the Internet – who runs it? who controls it? who polices it? – is also of great benefit to criminals. The ability to commit 189988_cyber_crime_war_Book.indb 6 25/06/13 3:00 PM
  • 10. crimes at distance without one’s identity being known – or at least requiring considerable effort to get it – is a technological windfall for them. In Dickensian London, pickpockets were able to commit crimes, then vanish into the rat-run of tiny streets to escape pursuers. Using the Internet, criminals do not even have to leave those rat-runs. For some law enforcement agents, the World Wide Web is synonymous with the ‘Wild Wild West’. ◗◗ A big problem – but how big? a ll th at ma tters: Cyber Crime This furtive interest in pornography makes Internet users more vulnerable to criminals, either through blackmail – criminals find porn searches when they hack a computer, then threaten the owner that they will reveal it – or, more often, through users visiting websites that then download malicious software that surreptitiously sifts through private and financial information on that person’s computer. 7 The anonymous nature of the Internet and the Web has also encouraged individuals to behave in ways they would be reluctant to do – for fear of being caught – in the real world. So, for example, free, anonymous and virtually unlimited access to pornography on the Web has led to a truly colossal number of hits on porn sites. It has been said that the porn industry worldwide is worth more than the combined revenues of Microsoft, Google, Amazon, eBay, Yahoo! and Apple. The true scale of the problem of cyber crime is hard to quantify. In July 2012 General Keith Alexander, the director 189988_cyber_crime_war_Book.indb 7 25/06/13 3:00 PM
  • 11. The nature of cyber crime 8 of the National Security Agency, which oversees United States Cyber Command, America’s military organization fighting cyber attacks, suggested that the total cost of loss of intellectual property to American companies alone was around $250 billion a year. Internationally, the figure was said to be $1 trillion dollars, though the figure is highly controversial. However, these figures – mostly based on computer security company reports – have been widely contested as being far too high. The British government has itself estimated the annual cost of cyber crime to the United Kingdom’s economy at £27 billion, but again some experts have disputed this figure and say it is an exaggeration. The truth is that it is virtually impossible to put a true and accurate figure on the cost of cyber crime to society. For one thing, individuals and especially companies do not always know whether they have been targeted and lost out, financially or commercially. Even when homeowners and firms do know they have been hit, they may not report the loss, perhaps through embarrassment or for reasons of commercial confidentiality. However, even just using conservative reported figures, the numbers are huge. The United States’ Internet Crime Complaint Center (IC3) has put the annual cost of Internet crime based on complaints made to it at just over $485 million. Another way of assessing the financial scale of the problem is that the value of the computer security industry worldwide is put at around $300 billion annually. Despite the uncertainty over figures, what we can say unequivocally, however, is that cyber crime now poses 189988_cyber_crime_war_Book.indb 8 25/06/13 3:00 PM
  • 12. USA 23% Others 34% China 9% India 3% Turkey 3% Poland 3% Italy 3% France 3% Spain 4% Brazil 4% Germany 6% UK 5% ▲▲Pie chart showing the countries suffering the most cyber crime (Source: http://www.enigmasoftware.com, 18 April 2013) 9 189988_cyber_crime_war_Book.indb 9 a ll th at ma tters: Cyber Crime the greatest potential threat to our society that we have even known. Why? It is because of the massive global uptake of technology at the end of the 20th century by businesses desperate to save costs and boost productivity. In embracing the world of, first, computers and then the Internet the world adopted technology that lacked the empirical certainty of the cogs of metal and drive shafts of the Industrial Revolution. It was a completely new idea. In the Industrial Age we had grown used to a spade being a spade – now we were in an age where a good spade could be a bad spade at the press of a button. Computer code is a language and it can be adapted and rewritten by others, and for dubious purposes. 25/06/13 3:00 PM
  • 13. 10 The nature of cyber crime ◗◗ The Internet’s original sin The fact that we were working with an imperfect technology was not at first realized; the possibility that we might be doing bad things with computer code was simply not considered. Thus, from the very beginning, the world of computing and the Internet was based on imperfections, flaws and sometimes poorly understood processes. You might even call this the Internet’s ‘original sin’. Eventually, not just ‘intellectual’ hackers and computer philosophers were exploiting these faults, but criminals, too. By then it was too late. By the early 21st century the modern world has become utterly – one might say frighteningly – dependent on computer code and the Internet. From cars to public utilities, from nuclear power plants to the buildings we live and work in, all rely on the digital world to function. Unfortunately, by allowing the imperfection into the system from the start, the creators of this world also let in the criminals, terrorists and rogue states. These groups have learned how to exploit the technological weaknesses that underpin our daily lives, in ways of which we are largely ignorant. Cyber crime is today a threat to our very way of life. This last point has not been lost on military strategists. Taking out a country’s water supply system could be even more effective – and cheaper – than dropping plane-loads of bombs or firing endless quantities of hugely expensive rockets. The Prussian general Carl von Clausewitz famously said: ‘War is the continuation of politics by other means.’ As we shall see in a later chapter, cyber attack is now the continuation of war by other means. 189988_cyber_crime_war_Book.indb 10 25/06/13 3:00 PM
  • 14. To order your copy of ‘Cyber Crime and Warfare’ by Peter Warren & Michael Streeter at the special price of £6.74 (RRP £8.99) inc postage and packing, please send a cheque payable to Sparkle Direct and send to Hodder Headline Offers, PO Box 60, Helston, TR13 0TP. Alternatively you can order on line at www.sparklediredt.com or call 08430 600 037 and quote order ref ‘BKP17’.