Zain Qaider And The Sixty Year Rule

The UK Obscene Publications Act was pushed through Parliament in 1959. To this day, the act bans any material containing what is considered to be harmful to the public, or as the act itself states “to provide for the protection of literature.” To that end, Zain Qaiser might have felt he was doing a public service.

The former computer science student operated out of his parent’s house in Barking, East London. Under the pen name K!NG, Qaiser made himself seem like a legitimate businessman buying up large swathes of advertising space on adult websites. 

From there, he was able to extract a purported $4million from unsuspecting victims.

The idea itself was simple. Users would click on one of the advert spaces Qaiser paid for and would then be redirected to a fake webpage from local law enforcement demanding money by way of a fine for trading in obscene material. 

The execution, however, involved a highly sophisticated computer virus known as an Angler. It is at this point that Qaiser’s links to organized crime began to take shape.

With the help of contacts in Russia, Qaiser was able to spread his virus across at least 20 countries and, to date, generated a multi-million pound cottage industry.

Across the globe people would see the bogus penalty notice and pay, the standard fee was $1,000. Many thought thata price worth paying rather than have everyone know the seedier depths of their browsing history.

The scheme even turned on the advertisers themselves, any company that didn’t turn a blind eye to his activities was threatened with cyber-attacks that included having indecent images of children posted on their website. Qaiser was a teenager when his onslaught started. He is now 24 and faces six and a half years in prison. But the duration of his crime spree demonstrates a key  blind spot in how users understand their rights. No-one came forward to report the bogus malware that Qaiser used. The project relied on the fear that a victim would feel if their search history would become public.

It was this fear that allowed Qaiser and the organized crime network he associated with that allowed him to operate unabated.

Most people are unaware of the Obscene Publications Act, it pre-dates the internet and so now is rendered uneforcable in an age where content, no matter how despicable, can be disseminated easily. But Qaiser has shown that the social auspices under which it was created remain.

That his and his affiliates were able to make millions from an industry that legitimately makes billions demonstrates that, despite the ever-evolving online world which society inhabits, social mores are still to catch up.

Sentencing Qaiser, Judge Timothy Lamb stated “The harm caused by your offending was extensive, so extensive that there does not appear to be a reported case involving anything comparable.”

It has been sixty years since pornography has been officially taboo but it seems that it is only now that cyber criminals like Zain Qaiser are brought to justice for exploiting it.

By: Jackdon Mardon-Heath

You Might Also Read:

WhatsApp Implements Encryption:

Facebook Is Hosting Multiple Cybercrime Marketplaces:

 

« The Maritime Shipping Industry Should Be On Red Alert
The Quantum Computer Threat To Encryption Should Be Taken Seriously »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

AML Solutions

AML Solutions

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services.

Cisco Talos

Cisco Talos

Talos is an industry-leading threat intelligence solution that protects your organization’s people, data and infrastructure from active adversaries.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

Cybersecurity & Infrastructure Security Agency (CISA)

Cybersecurity & Infrastructure Security Agency (CISA)

CISA leads the national effort to defend critical infrastructure against the threats of today and to secure against the evolving risks of tomorrow.

LightEdge Solutions

LightEdge Solutions

LightEdge’s highly-trained compliance and security experts take the guesswork out of keeping your business protected.

Enigmatos

Enigmatos

Enigmatos is an Israeli based Automotive Cyber Security company. We provide solutions to the ever growing threat of vehicle hacking.

C5 Capital

C5 Capital

C5 Capital is a specialist investment firm that exclusively invests in the secure data ecosystem including cybersecurity, cloud infrastructure, data analytics and space.

AlertSec

AlertSec

AlertSec Ensure is a U.S. patented technology that allows you to educate, verify and enforce encryption compliance of third-party devices.

10dot Cloud Security

10dot Cloud Security

10dot Cloud Security is a security service management company. Our solutions give you contextualised visibility into your network security.

Talon Cyber Security

Talon Cyber Security

Talon delivers the leading enterprise browser designed to bring security to managed and unmanaged devices, regardless of location, device type or operating system.

Sydeco

Sydeco

Sydeco offer a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

Blacksands

Blacksands

Blacksands is a leader in network architecture, identity & services management, threat analysis, industrial IoT architecture, and invisible dynamic networks.

Secora Consulting

Secora Consulting

Secora Consulting is a professional services company specialising in tailored cybersecurity assessments and cyber advisory services.

Xeol

Xeol

Software free of vulnerabilities, built and distributed by trusted entities. Our mission is to help customers secure their software from code to deploy.

Resemble AI

Resemble AI

Resemble AI is an innovator in Generative Voice AI technology and tools to combat AI fraud including audio watermarking and deepfake detection.

Loccus AI

Loccus AI

Loccus are developers of AI solutions in the voice safety space. We build identity verification solutions, deepfake detection systems and fraud protection products for companies and end-users.