Comprehensive Study on Cybercrime

Total Page:16

File Type:pdf, Size:1020Kb

Comprehensive Study on Cybercrime Comprehensive Study on Cybercrime Draft—February 2013 Front cover photo credits (left to right): ©iStockphoto.com/TommL ©iStockphoto.com/mikewesson ©iStockphoto.com/polygraphus UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Comprehensive Study on Cybercrime Draft February 2013 UNITED NATIONS New York, 2013 ©Copyright United ©Nations, 2013, UnitedFebruary Nations 2013. Office All rights on Drugs reserved and worldwide.Crime ACKNOWLEDGEMENTS This report was prepared for the open-ended intergovernmental expert group on cybercrime by Conference Support Section, Organized Crime Branch, Division for Treaty Affairs, UNODC, under the supervision of John Sandage (Director, Division for Treaty Affairs), Sara Greenblatt (Chief, Organized Crime Branch), and Gillian Murray (UNODC Senior Focal Point for Cybercrime and Chief, Conference Support Section). Study team: Steven Malby, Robyn Mace, Anika Holterhof, Cameron Brown, Stefan Kascherus, Eva Ignatuschtschenko (UNODC) Consultants: Ulrich Sieber, Tatiana Tropina, Nicolas von zur Mühlen (Max Planck Institute for Foreign and International Criminal Law) Ian Brown, Joss Wright (Oxford Internet Institute and Cyber Security Centre, University of Oxford) Roderic Broadhurst (Australian National University) Kristin Krüger (Brandenburg Institute for Society and Security) DISCLAIMERS This report is a draft prepared for the second meeting of the open-ended intergovernmental expert group on cybercrime and should not be cited without permission of UNODC. This report has not been formally edited and remains subject to editorial changes. The contents of this report do not necessarily reflect the views or policies of UNODC or contributory organizations and neither do they imply any endorsement. The designations employed and the presentation of material in this report do not imply the expression of any opinion whatsoever on the part of UNODC concerning the legal status of any county, territory or city or its authorities, or concerning the delimitation of its frontiers and boundaries. CONTENTS ABBREVIATIONS .................................................................................................................................... v INTRODUCTION ................................................................................................................................... ix KEY FINDINGS AND OPTIONS ...................................................................................................... xi EXECUTIVE SUMMARY .................................................................................................................. xvii CHAPTER ONE: CONNECTIVITY AND CYBERCRIME ................................ 1 1.1. The global connectivity revolution............................................................................................... 1 1.2. Contemporary cybercrime ............................................................................................................. 4 1.3. Cybercrime as a growing challenge .............................................................................................. 6 1.4. Describing cybercrime.................................................................................................................. 11 CHAPTER TWO: THE GLOBAL PICTURE .............................................................. 23 2.1. Measuring cybercrime ....................................................................................................................... 23 2.2. The global cybercrime picture ......................................................................................................... 25 2.3. Cybercrime perpetrators ................................................................................................................... 39 CHAPTER THREE: LEGISLATION AND FRAMEWORKS .......................... 51 3.1. Introduction – The role of law ........................................................................................................ 51 3.2. Divergence and harmonization of laws ......................................................................................... 56 3.3. Overview of international and regional instruments ................................................................... 63 3.4. Implementing multilateral instruments at the national level ...................................................... 72 CHAPTER FOUR: CRIMINALIZATION ........................................................................ 77 4.1. Criminalization overview .................................................................................................................. 77 4.2. Analysis of specific offenses ............................................................................................................ 81 4.3. International human rights law and criminalization .................................................................. 107 iii CHAPTER FIVE: LAW ENFORCEMENT AND INVESTIGATIONS .. 117 5.1. Law enforcement and cybercrime ................................................................................................. 117 5.2. Investigative powers overview ....................................................................................................... 122 5.3. Privacy and investigative measures ............................................................................................... 134 5.4. Use of investigative measures in practice ..................................................................................... 142 5.5. Investigations and the private sector ............................................................................................ 144 5.6. Law enforcement capacity .............................................................................................................. 152 CHAPTER SIX: ELECTRONIC EVIDENCE AND CRIMINAL JUSTICE ................................................................................................................................................... 157 6.1. Introduction to electronic evidence and digital forensics ......................................................... 157 6.2. Capacity for digital forensics and electronic evidence handling ............................................... 162 6.3. Cybercrime and the criminal justice system ................................................................................. 168 6.4. Criminal justice capacity .................................................................................................................. 172 6.5. Capacity building and technical assistance ................................................................................... 178 CHAPTER SEVEN: INTERNATIONAL COOPERATION ............................ 183 7.1. Sovereignty, jurisdiction and international cooperation ............................................................ 183 7.2. Jurisdiction ........................................................................................................................................ 189 7.3. International cooperation I – formal cooperation ...................................................................... 197 7.4. International cooperation II – informal cooperation ................................................................. 208 7.5. Extra-territorial evidence from clouds and service providers ................................................... 216 CHAPTER EIGHT: PREVENTION .................................................................................. 225 8.1. Cybercrime prevention and national strategies ........................................................................... 225 8.2. Cybercrime awareness ..................................................................................................................... 234 8.3. Cybercrime prevention, the private sector and academia .......................................................... 239 ANNEX ONE: ACT DESCRIPTIONS .................................................................................... 257 ANNEX TWO: MEASURING CYBERCRIME ...................................................................... 259 ANNEX THREE: PROVISIONS OF INTERNATIONAL AND REGIONAL INSTRUMENTS ............................................................................................... 267 ANNEX FOUR: THE INTERNET ............................................................................................. 277 ANNEX FIVE: METHODOLOGY .......................................................................................... 283 iv LIST OF ABBREVIATIONS LIST OF ABBREVIATIONS Abbreviations CERT Computer Emergency Response Team CSIRT Computer Security Incident Response Team ECHR European Convention for the Protection of Human Rights and Fundamental Freedoms ECtHR European Court of Human Rights EU European Union EUROPOL European Police Office G8 Group of Eight GDP Gross domestic product HDI Human Development Index ICCPR International Covenant on Civil and Political Rights ICCPR-OP2 Second Optional Protocol to the International Covenant on Civil and Political Rights, aiming at the abolition of the death penalty ICERD International Convention on the Elimination of All Forms of Racial Discrimination ICESCR International Covenant on Economic, Social and Cultural Rights ICRMW United Nations International Convention on the Protection of the Rights of All Migrant Workers and Members of Their Families ICT Information and communications technology INTERPOL International Criminal Police Organization IP Internet protocol ISP Internet service provider
Recommended publications
  • Convention on Cybercrime
    Convention on Cybercrime Nilupul Gunawardena* November 2018 *Nilupul Gunawardena is a Research Fellow at the Lakshman Kadirgamar Institute of International Relations and Strategic Studies (LKI). The opinions expressed in this article are the author’s own views. They are not the institutional views of LKI, and do not necessarily represent or reflect the position of any other institution or individual with which the author is affiliated. Copyright © 2018 Lakshman Kadirgamar Institute of International Relations and Strategic Studies (LKI) About the LKI Explainers LKI Explainers examine an agreement or another aspect of Sri Lanka’s international relations. They summarise key points and developments, with up-to-date information, facts, and figures. Terms of use LKI is not responsible for errors or any consequences arising from the use of information contained herein. The views expressed in a LKI Explainer are those of the author(s). They are not the institutional views of LKI and do not necessarily reflect the position of any other institution or individual with which an author is affiliated. Lakshman Kadirgamar Institute of International Relations and Strategic Studies (LKI) 24 Horton Place, Colombo 7, Sri Lanka Email: [email protected] Website: www.lki.lk Contents 1. What are Cybercrimes?.............................................................................................1 2. What is Cybersecurity and why is it important……………………………………………………..1 3. What is the Budapest Convention on Cybercrime?……………………………………………….1 4. What are the key features of the Convention?...........................................................2 5. What are the objectives and priorities of this Convention?.......................................3 6. What are the responsibilities & obligations incumbent upon the State Parties to this Convention?...................................................................................................................4 7. Benefits and drawbacks of the Convention ……………………………………......4 8.
    [Show full text]
  • Secondary Memory
    Secondary Memory This type of memory is also known as external memory or non-volatile. It is slower than main memory. These are used for storing data/Information permanently. CPU directly does not access these memories instead they are accessed via input-output routines. Contents of secondary memories are first transferred to main memory, and then CPU can access it. For example : Hard disk, CD-ROM, DVD etc. Electronic data is a sequence of bits. This data can either reside in : • Primary storage - main memory (RAM), relatively small, fast access, expensive (cost per MB), volatile (go away when power goes off) • Secondary storage - disks, tape, large amounts of data, slower access, cheap (cost per MB), persistent (remain even when power is off) Data storage has expanded from text and numeric files to include digital music files, photographic files, video files, and much more. These new types of files require secondary storage devices with much greater capacity than floppy disks. 1 Primary storage ( or main memory or internal memory) , often referred to simply as memory , is the only directly accessible to the CPU. Primary memory can be divided into volatile and nonvolatile memories. Primary storage (Main Memory ) has three main functions: 1-It stored all or part of the program that being executed. 2-It also holds data that are being used by the program. 3-It also stored the operating system programs that manage the operation of the computer. Limitation of Primary storage 1. Limited capacity- because the cost per bit of storage is high. 2. Volatile – data stored in it is lost when the electric power is turned off Or interrupted.
    [Show full text]
  • Internet Governance Forum – Nairobi, Kenya, 27-30 September 2011
    Global Project on Cybercrime The cybercrime legislation of Commonwealth States: Use of the Budapest Convention and Commonwealth Model Law Council of Europe contribution to the Commonwealth Working Group on Cybercrime Data Protection and Cybercrime Division Strasbourg, 27 February 2013 www.coe.int/cybercrime Global Project Commonwealth Cybercrime Legislation Page 2 Project funded by Estonia, Japan, Monaco, Romania, United Kingdom, Microsoft and the Council of Europe Contact Disclaimer For further information please contact: This technical report does not necessarily reflect official positions of the Council of Europe or of Data Protection and Cybercrime Division the donors funding this project or of the parties Directorate General of Human Rights and Rule of Law to treaties referred to. Council of Europe Strasbourg, France Tel +33-3-8841-2103 Fax +33-3-9021-5650 Email: [email protected] Global Project Commonwealth Cybercrime Legislation Page 3 Contents 1 Background ______________________________________________________________ 9 1.1 Commonwealth Secretariat Mandate on Cybercrime __________________________________ 9 1.2 Purpose of the report _________________________________________________________ 10 1.3 Sources of information ________________________________________________________ 12 1.3.1 Documents submitted to the Cybercrime Working Group ___________________________ 12 1.3.2 Council of Europe activities carried out under different projects (www.coe.int/cybercrime) _ 12 2 Budapest Convention/Commonwealth Model Law: Overview
    [Show full text]
  • Computer Organization and Architecture Designing for Performance Ninth Edition
    COMPUTER ORGANIZATION AND ARCHITECTURE DESIGNING FOR PERFORMANCE NINTH EDITION William Stallings Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editorial Director: Marcia Horton Designer: Bruce Kenselaar Executive Editor: Tracy Dunkelberger Manager, Visual Research: Karen Sanatar Associate Editor: Carole Snyder Manager, Rights and Permissions: Mike Joyce Director of Marketing: Patrice Jones Text Permission Coordinator: Jen Roach Marketing Manager: Yez Alayan Cover Art: Charles Bowman/Robert Harding Marketing Coordinator: Kathryn Ferranti Lead Media Project Manager: Daniel Sandin Marketing Assistant: Emma Snider Full-Service Project Management: Shiny Rajesh/ Director of Production: Vince O’Brien Integra Software Services Pvt. Ltd. Managing Editor: Jeff Holcomb Composition: Integra Software Services Pvt. Ltd. Production Project Manager: Kayla Smith-Tarbox Printer/Binder: Edward Brothers Production Editor: Pat Brown Cover Printer: Lehigh-Phoenix Color/Hagerstown Manufacturing Buyer: Pat Brown Text Font: Times Ten-Roman Creative Director: Jayne Conte Credits: Figure 2.14: reprinted with permission from The Computer Language Company, Inc. Figure 17.10: Buyya, Rajkumar, High-Performance Cluster Computing: Architectures and Systems, Vol I, 1st edition, ©1999. Reprinted and Electronically reproduced by permission of Pearson Education, Inc. Upper Saddle River, New Jersey, Figure 17.11: Reprinted with permission from Ethernet Alliance. Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on the appropriate page within text. Copyright © 2013, 2010, 2006 by Pearson Education, Inc., publishing as Prentice Hall. All rights reserved. Manufactured in the United States of America.
    [Show full text]
  • The Council of Europe's Convention on Cybercrime Was Opened For
    The Budapest’s Convention as a guarantee limit against cybercrime By Eleni D. Chrysopoulou J.D., Department of Law, Democritus University of Thrace, Greece, B.Sc., M.Sc., Department of Applied Informatics, University of Macedonia, Greece. 1. Introduction The vertiginous growth of the Internet has dramatically changed the way entities interact. Cyberspace enables people to share ideas over great distances and engage in the creation of an entirely new, diverse and chaotic democracy, free from geographic and physical constraints [Aldesco I.A., 2002]. The rapid progress of information technology has achieved significant advances in processing and transmitting data through use of computers and computer networks resulting in substantial benefits to society, including the ability to communicate with others real-time, access a library of information and transmit data instantly [Hopkins L.S., 2003]. The dark side of the above phenomenon is the fostering of new kinds of crimes, additional means to commit existing crimes and increased complexities of prosecuting crimes, since historical obstacles to international crime, such as distance, time and space, have now been eliminated. This international element in the commission of crime, whether it be traditional or new technological computer crime, creates new problems for both legal policy and law enforcement. The above described challenge resulted in the Budapest‟s Convention, which with respect to human rights, aims at the adoption of appropriate and adequate international legal measures by the contracting
    [Show full text]
  • An Algorithm to Measure Daily Bus Passenger Miles Using Electronic Farebox Data
    An Algorithm to Measure Daily Bus Passenger Miles Using Electronic Farebox Data Alex Lu, Alla Reddy Operations Planning New York City Transit Authority Presented at the 90th Annual Meeting of the Transportation Research Board Washington D.C. (2011) T R A N S I T New York City Transit Notice: Opinions expressed in this presentation are those of the authors and do not necessarily reflect the official New York City Transit policy or position of Metropolitan Transportation Authority or MTA New YorkTRB City Transit. Paper #11-0368 Slide 1 Purpose and Need • Implement 100% electronic data reporting – Monthly “safety module” – Eliminates surveying, data entry, manual checking – More consistent & accurate • Algorithm requirements – Zero manual intervention – Fast: running time of a few minutes per day of data – Rely on schedules and AFC data (no GPS/AVL/APC) Photo: Adam E. Moreira New York City Transit TRB Paper #11-0368 Slide 2 NYCT’s MetroCard AFC Data • “Trip” file 73 bytes per record × about 8,000,000 bus and subway records per weekday = approximately 550 MB per weekday (3am to 2.59am next day) – partial trip records Hypothetical card with bus-only records shown: ....x....1....x....2....x....3....x....4....x....5....x....6....x....7. – no timestamps for 2653058017 20080416 55400 157 027 F02569 1 R482 0 362 2653058017 20080416 63000 157 027 F0027F 1 R480 0 494 cash transactions 2653058017 20080416 73600 157 027 F01E70 2 R494 0 153 2653058017 20080416 160000 157 027 F01E72 2 R494 0 152 2653058017 20080416 161800 157 027 F00214 1 R480 0 494 –
    [Show full text]
  • Andre Malraux's Devotion to Caesarism Erik Meddles Regis University
    Regis University ePublications at Regis University All Regis University Theses Spring 2010 Partisan of Greatness: Andre Malraux's Devotion to Caesarism Erik Meddles Regis University Follow this and additional works at: https://epublications.regis.edu/theses Part of the Arts and Humanities Commons Recommended Citation Meddles, Erik, "Partisan of Greatness: Andre Malraux's Devotion to Caesarism" (2010). All Regis University Theses. 544. https://epublications.regis.edu/theses/544 This Thesis - Open Access is brought to you for free and open access by ePublications at Regis University. It has been accepted for inclusion in All Regis University Theses by an authorized administrator of ePublications at Regis University. For more information, please contact [email protected]. Regis University Regis College Honors Theses Disclaimer Use of the materials available in the Regis University Thesis Collection (“Collection”) is limited and restricted to those users who agree to comply with the following terms of use. Regis University reserves the right to deny access to the Collection to any person who violates these terms of use or who seeks to or does alter, avoid or supersede the functional conditions, restrictions and limitations of the Collection. The site may be used only for lawful purposes. The user is solely responsible for knowing and adhering to any and all applicable laws, rules, and regulations relating or pertaining to use of the Collection. All content in this Collection is owned by and subject to the exclusive control of Regis University and the authors of the materials. It is available only for research purposes and may not be used in violation of copyright laws or for unlawful purposes.
    [Show full text]
  • CSCI 120 Introduction to Computation Bits... and Pieces (Draft)
    CSCI 120 Introduction to Computation Bits... and pieces (draft) Saad Mneimneh Visiting Professor Hunter College of CUNY 1 Yes No Yes No... I am a Bit You may recall from the previous lecture that the use of electro mechanical relays, and in subsequent years, diodes and transistor, made it possible to con- struct more advanced computers, e.g. ENIAC. This is accredited to the fact that these devices could function as on/off switches. On one hand, they create the ability to encode logic into the circuits of the computer. This means that the computer can perform different tasks under different conditions, i.e. the notion of a program. For instance, one could encode the logic if A OR B then C. On the other hand, these devices allow the engineers to worry less about the values that could possibly arise in the system: the switch is either on or off. It cannot be anything in between. Therefore, this means that any errors due to fluctuation in voltage levels are greatly reduced. It would be enough to simply distinguish between high voltage and low voltage. This brings us to the question of Analog versus Digital. In simple terms, a digital system encodes information using a number of de- vices that have discrete states (e.g. on/off switches). An analog system encodes information using a device that have continuous states (e.g. measurement in an electric circuit). To build an intuition for digital versus analog, consider the problem of en- coding a number using buckets of water. One possibility is to use two kinds of buckets, full and empty.
    [Show full text]
  • The International Labour Organization and the Quest for Social Justice, 1919–2009
    The International Labour Organization and the quest for social justice, 1919–2009 The International Labour Organization and the quest for social justice, 1919–2009 Gerry Rodgers, Eddy Lee, Lee Swepston and Jasmien Van Daele INTERNATIONAL LABOUR OFFICE GENEVA Copyright © International Labour Organization 2009 First published in paperback in 2009 by the International Labour Office, CH-1211, Geneva 22, Switzerland First published in hardback in 2009 by Cornell University Press, 512 East State Street, Ithaca, NY 14850, United States (available for sale in North America only) Publications of the International Labour Office enjoy copyright under Protocol 2 of the Universal Copy- right Convention. Nevertheless, short excerpts from them may be reproduced without authorization, on condition that the source is indicated. For rights of reproduction or translation, application should be made to ILO Publications (Rights and Permissions), International Labour Office, CH-1211 Geneva 22, Switzerland, or by email: [email protected]. The International Labour Office welcomes such applications. Libraries, institutions and other users registered with reproduction rights organizations may make copies in accordance with the licences issued to them for this purpose. Visit www.ifrro.org to find the reproduction rights organization in your country. The International Labour Organization and the quest for social justice, 1919–2009 Gerry Rodgers, Eddy Lee, Lee Swepston and Jasmien Van Daele International Labour Office. – Geneva: ILO, 2009 ISBN 978-92-2-121955-2 (paperback) ILO / role of ILO / ILO standard setting / tripartism / workers rights / quality of working life / social security / promotion of employment / poverty alleviation / decent work / history / trend 01.03.7 Also available in hardback: The International Labour Organization and the quest for social justice, 1919–2009 (ISBN 978-0-8014-4849-2), Cornell University Press, Ithaca, NY, 2009.
    [Show full text]
  • The Geopolitics of Laïcité in a Multicultural Age: French Secularism, Educational Policy and the Spatial Management of Difference
    The Geopolitics of Laïcité in a Multicultural Age: French Secularism, Educational Policy and the Spatial Management of Difference Christopher A. Lizotte A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Washington 2017 Reading Committee: Katharyne Mitchell, Chair Victoria Lawson Michael Brown Program Authorized to Offer Degree: Geography ©Copyright 2017 Christopher A. Lizotte University of Washington Abstract The Geopolitics of Laïcité in a Multicultural Age: French Secularism, Educational Policy and the Spatial Management of Difference Christopher A. Lizotte Chair of the Supervisory Committee: Professor Katharyne Mitchell Geography I examine a package of educational reforms enacted following the January 2015 attacks in and around Paris, most notably directed at the offices of the satirical publication Charlie Hebdo. These interventions, known collectively as the “Great Mobilization for the Republic’s Values”, represent the latest in a string of educational attempts meant to reinvigorate a sense of national pride among immigrant-descended youth – especially Muslim – in France’s unique form of state secularism, laïcité. While ostensibly meant to apply equally across the nationalized French school system, in practice La Grande Mobilisation has been largely enacted in schools located in urban spaces of racialized difference thought to be “at risk” of anti-republican behavior. Through my work, I show that practitioners exercise their own power by subverting and adapting geopolitical discourses running through educational laïcité – notably global security, women’s rights, and communalism – are nuanced by school-based practitioners, who interpret state directives in the light of their institutional knowledge and responsiveness to the social and economic profiles of their student populations.
    [Show full text]
  • “Politics, Ballyhoo, and Controversy”: the Allied Clandestine Services, Resistance, and the Rivalries in Occupied France
    “Politics, Ballyhoo, and Controversy”: The Allied Clandestine Services, Resistance, and the Rivalries in Occupied France By Ronald J. Lienhardt History Departmental Undergraduate Honors Thesis University of Colorado at Boulder April 8, 2014 Thesis Advisor: Dr. Martha Hanna Department of History Defense Committee: Dr. John Willis Department of History Dr. Michael Radelet Department of Sociology 1 Song of the Partisans By Maurice Druon Friend, can you hear The Flight of the ravens Over our plains? Friend, can you hear The muffled cry of our country In chains? Ah! Partisans, Workers and peasants, The alert has sounded. This evening the enemy Will learn the price of blood And of tears.1 1 Claude Chambard, The Maquis: A History of the French Resistance Movement (New York: The Bobbs-Merrill Company, Inc. , 1976), vii. 2 Table of Contents Abstract---------------------------------------------------------------------------------------------------------------------------------4 Introduction--------------------------------------------------------------------------------------------------------------------------5 Chapter 1: Impending War, the fall of France, and the Foundations of Resistance---------------------8 France’s Initiative becomes outdated: The Maginot Line-------------------------------------------------------11 Failures to Adapt to the Progress of War: The Invasion and the fall of France----------------------------14 Collaboration and Life Under Occupation-------------------------------------------------------------------------20 Organization
    [Show full text]
  • ATU Local 1056 Reminds Community on Restored Queens Bus Service
    For Immediate Release: Wednesday, January 2, 2013 Contact: Corey Bearak (ATU 1056 Policy & Political Director) (718) 343-6779/ (516) 343-6207 ATU Local 1056 Reminds Community on Restored Queens Bus Service Amalgamated Transit Union (ATU) Local 1056 Queens reminds the public that bus service restorations announced by the MTA last summer get fully implemented next week. ATU 1056 President and Business Agent I. Daneek Miller said the union local wants to make sure Queens residents know they can take advantage of restored service Sunday on the Q24, Q27 and Q36 (extension of route to restore the former Q79) bus routes and Monday on the Q30 and Q42. Miller noted restored service started on the Q76 this past October. ATU 1056 members – bus operators and mechanics – work for MTA New York City Transit's Queens bus division and serve the riding public. “ATU Local 1056 wants the public to know about the return of service once the subject of the misguided and hurtful cuts that affected many communities outside Manhattan,” stated ATU President Miller who noted ATU Local 1056 had organized news conferences, rallies and other events with electeds and community leaders, and testified at hearings to get the MTA to reverse harmful cuts. “We made clear that the dollars existed to restore service in Queens and the facts today make that clear. ATU 1056 will work together with the community, our electeds and our sister transit unions to make sure the MTA delivers what the riding public in Queens needs.” President Miller, who also chairs the MTA Labor Coalition, also thanked the community and their electeds for their advocacy and support throughout this difficult period preceding the service restoration.
    [Show full text]