Zain Qaider And The Sixty Year Rule

The UK Obscene Publications Act was pushed through Parliament in 1959. To this day, the act bans any material containing what is considered to be harmful to the public, or as the act itself states “to provide for the protection of literature.” To that end, Zain Qaiser might have felt he was doing a public service.

The former computer science student operated out of his parent’s house in Barking, East London. Under the pen name K!NG, Qaiser made himself seem like a legitimate businessman buying up large swathes of advertising space on adult websites. 

From there, he was able to extract a purported $4million from unsuspecting victims.

The idea itself was simple. Users would click on one of the advert spaces Qaiser paid for and would then be redirected to a fake webpage from local law enforcement demanding money by way of a fine for trading in obscene material. 

The execution, however, involved a highly sophisticated computer virus known as an Angler. It is at this point that Qaiser’s links to organized crime began to take shape.

With the help of contacts in Russia, Qaiser was able to spread his virus across at least 20 countries and, to date, generated a multi-million pound cottage industry.

Across the globe people would see the bogus penalty notice and pay, the standard fee was $1,000. Many thought thata price worth paying rather than have everyone know the seedier depths of their browsing history.

The scheme even turned on the advertisers themselves, any company that didn’t turn a blind eye to his activities was threatened with cyber-attacks that included having indecent images of children posted on their website. Qaiser was a teenager when his onslaught started. He is now 24 and faces six and a half years in prison. But the duration of his crime spree demonstrates a key  blind spot in how users understand their rights. No-one came forward to report the bogus malware that Qaiser used. The project relied on the fear that a victim would feel if their search history would become public.

It was this fear that allowed Qaiser and the organized crime network he associated with that allowed him to operate unabated.

Most people are unaware of the Obscene Publications Act, it pre-dates the internet and so now is rendered uneforcable in an age where content, no matter how despicable, can be disseminated easily. But Qaiser has shown that the social auspices under which it was created remain.

That his and his affiliates were able to make millions from an industry that legitimately makes billions demonstrates that, despite the ever-evolving online world which society inhabits, social mores are still to catch up.

Sentencing Qaiser, Judge Timothy Lamb stated “The harm caused by your offending was extensive, so extensive that there does not appear to be a reported case involving anything comparable.”

It has been sixty years since pornography has been officially taboo but it seems that it is only now that cyber criminals like Zain Qaiser are brought to justice for exploiting it.

By: Jackdon Mardon-Heath

You Might Also Read:

WhatsApp Implements Encryption:

Facebook Is Hosting Multiple Cybercrime Marketplaces:

 

« The Maritime Shipping Industry Should Be On Red Alert
The Quantum Computer Threat To Encryption Should Be Taken Seriously »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LRQA

LRQA

LRQA are a leading global assurance provider, bringing together unrivalled expertise in certification, brand assurance, cybersecurity, inspection and training.

International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on Information Systems Security & Privacy (ICISSP)

The ICISSP event is a meeting point for researchers and practitioners to address security and privacy challenges concerning information systems.

Conix

Conix

Conix offerings include Governance and Risk Management, Auditing and Penetration Testing, Digital Forensics, Managed Security Operations Centre (SOC).

Acutec

Acutec

Acutec is an award winning IT support, services and solutions provider including managed IT Security and backup/disaster recovery.

AnubisNetworks

AnubisNetworks

AnubisNetworks is one of Europe’s leading threat intelligence and email security suppliers.

Valtori

Valtori

Government ICT Centre Valtori provides sector-independent ICT services for the central government, while taking into account the special requirements related to security and preparedness.

Altron

Altron

Altron provides locally relevant innovative and integrated ICT solutions to business, government and consumers.

Epati Information Technologies

Epati Information Technologies

ePati Information Technologies is a specialist in information technology and cyber security.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

Qmulos

Qmulos

Qmulos’ real-time continuous monitoring risk management suite, Q-Compliance, provides a massively flexible and scalable solution to optimizing operational security.

DataNumen

DataNumen

The fundamental mission of DataNumen is to recover as much data from inadvertent data disasters as possible.

InsightCyber

InsightCyber

InsightCyber is on a mission to keep the world’s critical infrastructure, supply chains, and manufacturing operations cyber-safe, helping to prevent attacks that can have catastrophic impacts.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.

Apex Systems

Apex Systems

Apex Systems is a world-class technology services business that incorporates industry insights and experience to deliver solutions that fulfill our clients’ digital visions.

ABM Technology Group

ABM Technology Group

ABM Technology Group (formerly True IT) provide business information technology services, solutions, and consulting for small to mid-sized organizations.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.