Zain Qaider And The Sixty Year Rule

The UK Obscene Publications Act was pushed through Parliament in 1959. To this day, the act bans any material containing what is considered to be harmful to the public, or as the act itself states “to provide for the protection of literature.” To that end, Zain Qaiser might have felt he was doing a public service.

The former computer science student operated out of his parent’s house in Barking, East London. Under the pen name K!NG, Qaiser made himself seem like a legitimate businessman buying up large swathes of advertising space on adult websites. 

From there, he was able to extract a purported $4million from unsuspecting victims.

The idea itself was simple. Users would click on one of the advert spaces Qaiser paid for and would then be redirected to a fake webpage from local law enforcement demanding money by way of a fine for trading in obscene material. 

The execution, however, involved a highly sophisticated computer virus known as an Angler. It is at this point that Qaiser’s links to organized crime began to take shape.

With the help of contacts in Russia, Qaiser was able to spread his virus across at least 20 countries and, to date, generated a multi-million pound cottage industry.

Across the globe people would see the bogus penalty notice and pay, the standard fee was $1,000. Many thought thata price worth paying rather than have everyone know the seedier depths of their browsing history.

The scheme even turned on the advertisers themselves, any company that didn’t turn a blind eye to his activities was threatened with cyber-attacks that included having indecent images of children posted on their website. Qaiser was a teenager when his onslaught started. He is now 24 and faces six and a half years in prison. But the duration of his crime spree demonstrates a key  blind spot in how users understand their rights. No-one came forward to report the bogus malware that Qaiser used. The project relied on the fear that a victim would feel if their search history would become public.

It was this fear that allowed Qaiser and the organized crime network he associated with that allowed him to operate unabated.

Most people are unaware of the Obscene Publications Act, it pre-dates the internet and so now is rendered uneforcable in an age where content, no matter how despicable, can be disseminated easily. But Qaiser has shown that the social auspices under which it was created remain.

That his and his affiliates were able to make millions from an industry that legitimately makes billions demonstrates that, despite the ever-evolving online world which society inhabits, social mores are still to catch up.

Sentencing Qaiser, Judge Timothy Lamb stated “The harm caused by your offending was extensive, so extensive that there does not appear to be a reported case involving anything comparable.”

It has been sixty years since pornography has been officially taboo but it seems that it is only now that cyber criminals like Zain Qaiser are brought to justice for exploiting it.

By: Jackdon Mardon-Heath

You Might Also Read:

WhatsApp Implements Encryption:

Facebook Is Hosting Multiple Cybercrime Marketplaces:

 

« The Maritime Shipping Industry Should Be On Red Alert
The Quantum Computer Threat To Encryption Should Be Taken Seriously »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Asavie

Asavie

Asavie provide solutions for Enterprise Mobility Management and secure IoT Connectivity.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

Inspired eLearning

Inspired eLearning

Inspired eLearning deliver solutions that help clients nurture and enhance workforce skills, protect themselves against cyberattacks and regulatory violations.

DXC Technology

DXC Technology

DXC Technology helps global companies run their mission critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability.

Cybonet

Cybonet

Cybonet provides easy to deploy, flexible and scalable security solutions that empower organizations of all sizes to actively safeguard their networks in the face of today’s evolving threats.

Cimcor

Cimcor

Cimcor’s flagship software product, CimTrak, helps organizations to monitor and protect a wide range of physical, network and virtual IT assets in real-time.

Sikur

Sikur

Sikur have developed a communication platform that sets new boundaries for corporate privacy and security.

Gorodissky IP Security

Gorodissky IP Security

Gorodissky IP Security is a comprehensive approach to protecting your intellectual property on the Internet and beyond.

YouWipe

YouWipe

Scandinavian Data Erasure Leader YouWipe is the number one choice of European Ministries, European Central Banks, Swiss Pharmaceuticals and Major Electronics Retail Chains.

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

Mandiant

Mandiant

Mandiant deliver dynamic cyber defense solutions powered by industry-leading expertise, intelligence and innovative technology.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.

Mirai Security

Mirai Security

Mirai Security are a cyber security company that specializes in Governance, Risk Management and Compliance, Cloud Security and Application Security.

ViewDS Identity Solutions

ViewDS Identity Solutions

ViewDS Identity Solutions develops innovative identity software including cloud identity management solutions, directory services, access and authorization management solutions.