Zain Qaider And The Sixty Year Rule

The UK Obscene Publications Act was pushed through Parliament in 1959. To this day, the act bans any material containing what is considered to be harmful to the public, or as the act itself states “to provide for the protection of literature.” To that end, Zain Qaiser might have felt he was doing a public service.

The former computer science student operated out of his parent’s house in Barking, East London. Under the pen name K!NG, Qaiser made himself seem like a legitimate businessman buying up large swathes of advertising space on adult websites. 

From there, he was able to extract a purported $4million from unsuspecting victims.

The idea itself was simple. Users would click on one of the advert spaces Qaiser paid for and would then be redirected to a fake webpage from local law enforcement demanding money by way of a fine for trading in obscene material. 

The execution, however, involved a highly sophisticated computer virus known as an Angler. It is at this point that Qaiser’s links to organized crime began to take shape.

With the help of contacts in Russia, Qaiser was able to spread his virus across at least 20 countries and, to date, generated a multi-million pound cottage industry.

Across the globe people would see the bogus penalty notice and pay, the standard fee was $1,000. Many thought thata price worth paying rather than have everyone know the seedier depths of their browsing history.

The scheme even turned on the advertisers themselves, any company that didn’t turn a blind eye to his activities was threatened with cyber-attacks that included having indecent images of children posted on their website. Qaiser was a teenager when his onslaught started. He is now 24 and faces six and a half years in prison. But the duration of his crime spree demonstrates a key  blind spot in how users understand their rights. No-one came forward to report the bogus malware that Qaiser used. The project relied on the fear that a victim would feel if their search history would become public.

It was this fear that allowed Qaiser and the organized crime network he associated with that allowed him to operate unabated.

Most people are unaware of the Obscene Publications Act, it pre-dates the internet and so now is rendered uneforcable in an age where content, no matter how despicable, can be disseminated easily. But Qaiser has shown that the social auspices under which it was created remain.

That his and his affiliates were able to make millions from an industry that legitimately makes billions demonstrates that, despite the ever-evolving online world which society inhabits, social mores are still to catch up.

Sentencing Qaiser, Judge Timothy Lamb stated “The harm caused by your offending was extensive, so extensive that there does not appear to be a reported case involving anything comparable.”

It has been sixty years since pornography has been officially taboo but it seems that it is only now that cyber criminals like Zain Qaiser are brought to justice for exploiting it.

By: Jackdon Mardon-Heath

You Might Also Read:

WhatsApp Implements Encryption:

Facebook Is Hosting Multiple Cybercrime Marketplaces:

 

« The Maritime Shipping Industry Should Be On Red Alert
The Quantum Computer Threat To Encryption Should Be Taken Seriously »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Quotium

Quotium

Quotium provides automated testing technologies to make business software applications secure and robust.

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity provide solutions for Secure Networks, Secure Communications, Network Analysis, and Endpoint Security.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

JPCERT/CC

JPCERT/CC

JPCERT/CC is the first Computer Security Incident Response Team (CSIRT) established in Japan.

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

Post-Quantum

Post-Quantum

Post-Quantum offer a unique, patented quantum-resistant encryption algorithm that can be applied to existing products and networks.

Sensible Vision

Sensible Vision

SensibleVision helps organizations transparently protect data and prevent costly security breaches by constantly verifying the identities of people who use computers or mobile devices.

GV (Google Ventures)

GV (Google Ventures)

GV provides venture capital funding to bold new companies in the fields of life science, healthcare, artificial intelligence, robotics, transportation, cyber security and agriculture.

Keyavi Data

Keyavi Data

With Keyavi’s evolutionary data protection technology, your data stays within the bounds of your control in perpetuity.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

Adversa AI

Adversa AI

Adversa's mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents.

Unisys

Unisys

Unisys is a global information technology company providing industry-focused solutions integrated with leading-edge security to clients in the government, financial services and commercial markets.

GISEC Global

GISEC Global

GISEC Global provides vendors and companies from around the world with access to lucrative opportunity to capitalize on what's set to become one of the world's booming markets.

RADICL

RADICL

RADICL's mission is to give SMBs that serve America's Defense Industrial Base (DIB) access to strong, enterprise-grade cyber security protection.

Mother Technologies

Mother Technologies

From Datacentre to Desktop, Mother Technologies has been delivering IT Support, Telecoms, Cybersecurity and Connectivity services to businesses across Scotland and beyond since 2002.

Edera

Edera

Edera is changing the way containers are run and secured, making isolation a reality and fundamentally transforming computing in the process.