Fraud Report FINAL 23/12/03 3:25 PM Page I

Total Page:16

File Type:pdf, Size:1020Kb

Fraud Report FINAL 23/12/03 3:25 PM Page I Fraud Report FINAL 23/12/03 3:25 PM Page i M E I A N L T R O A F P V I I A C T O R PARLIAMENT OF VICTORIA DRUGS AND CRIME PREVENTION COMMITTEE INQUIRY INTO FRAUD AND ELECTRONIC COMMERCE Final Report January 2004 by Authority Government Printer for the State of Victoria No. 55 Session 2003-2004 Fraud Report FINAL 23/12/03 3:25 PM Page ii The Report was prepared by the Drugs and Crime Prevention Committee. Drugs and Crime Prevention Committee Inquiry into Fraud and Electronic Commerce: – Final Report DCPC, Parliament of Victoria ISBN: 0-646-43091-2 Drugs and Crime Prevention Committee Level 8 35 Spring Street Melbourne Victoria 3000 Telephone: (03) 9651 3541 Facsimile: (03) 9651 3603 Email: [email protected] http://www.parliament.vic.gov.au/dcpc page ii Fraud Report FINAL 23/12/03 3:25 PM Page iii Drugs and Crime Prevention Committee – 55th Parliament Ms Carolyn Hirsh, M.L.C.– Chair The Hon. Robin Cooper, M.L.A. – Deputy Chairman Ms Kirstie Marshall, M.L.A. Mr Ian Maxfield, M.L.A. The Hon. Sang Minh Nguyen, M.L.C. Dr Bill Sykes, M.L.A. Mr Kim Wells, M.L.A. Drugs and Crime Prevention Committee – 54th Parliament The Hon. Cameron Boardman, M.L.C. – Chairman Mr Bruce Mildenhall, M.L.A. – Deputy Chairman The Hon. Robin Cooper, M.L.A. Mr Kenneth Jasper, M.L.A. Mr Hurtle Lupton, M.L.A. The Hon. Sang Minh Nguyen, M.L.C. Mr Richard Wynne, M.L.A. Committee Staff Ms Sandy Cook Executive Officer Mr Pete Johnston Senior Legal Officer (Inquiry into Amphetamine and ‘Party’ Drug Use) Ms Michelle Heane Office Manager Consultants, Inquiry into Fraud and Electronic Commerce Dr Russell G. Smith (Discussion Paper and Final Report) Deputy Director of Research Australian Institute of Criminology Mr Jamie Walvisch (Final Report) Research Analyst Australian Institute of Criminology Mr Stuart Candy (Discussion Paper) Research Assistant Australian Institute of Criminology page iii Fraud Report FINAL 23/12/03 3:25 PM Page iv Functions of the Drugs and Crime Prevention Committee The Victorian Drugs and Crime Prevention Committee is constituted under the Parliamentary Committees Act 2003 (Vic) Section 7. The functions of the Drugs and Crime Prevention Committee are, if so required or permitted under this Act, to inquire into, consider and report to the Parliament on any proposal, matter or thing concerned with – (a) the use of drugs, including the manufacture, supply or distribution of drugs; (b) the level or causes of crime or violent behaviour. Terms of Reference Received from the Legislative Assembly on Wednesday 17 April 2003. To the Drugs and Crime Prevention Committee – for inquiry, consideration and report by 31 December 2003 on: (a) the extent and nature of fraud and white-collar crime in Victoria; (b) the impact of new technology supporting E-commerce on the opportunities for fraud; (c) the current and proposed state, Commonwealth and international strategies and initiatives in relation to dealing with fraud and white- collar crime; and (d) the need for policy and legislative reform to combat fraud and white- collar crime in Victoria. page iv Fraud Report FINAL 23/12/03 3:25 PM Page v Chair’s Foreword The Inquiry into Fraud and Electronic Commerce was commenced in 2002 by the Drugs and Crime Prevention Committee of the 54th Parliament. A great deal of work was undertaken and a Discussion Paper was produced, providing a comprehensive literature review, clarification and expansion of the Terms of Reference, and a great deal of preliminary evidence. Following the 2002 election, a new Drugs and Crime Prevention Committee, established by the 55th Parliament, was asked to continue the work already commenced. The same Terms of Reference were resubmitted to the Committee to enable work to be completed. This Report is the result. Fraud, and the somewhat broader concept, ‘white-collar crime’, have profound effects on the community, both in terms of financial loss to large organisations and government and its life-changing effects (in many cases) on individual victims. It is estimated that fraud cost the Victorian community as much as $641 million last year, although there are no truly accurate data. Because fraud is not limited to any Australian state, or indeed Australia’s national boundaries, the Committee believes that the major responses to fraud should be co-ordinated nationally. The Committee’s recommendations are therefore formulated to reflect national and international best practice. Despite the proliferation of fraud in the corporate sector, the investigation of corporate crime would be far broader than would be possible in this Inquiry. The Committee believes that corporate crime is best dealt with by such organisations as the Australian Securities and Investments Commission, the Australian Crime Commission, and other national organisations specifically established to deal with corporate crime. This Report focuses on fraud committed by individuals, with particular attention given to identity-related fraud and credit card fraud that relate to electronic commerce. The Report focuses particularly on financial crimes committed using electronic technologies. The dramatic and continually increasing use of electronic commerce by individuals, small businesses, large corporations and government, invariably requiring electronic funds transfer, has led to an increase in all three factors which enable fraud to take place – motivated offenders, suitable targets and the absence of adequate constraints or guardians. page v Fraud Report FINAL 23/12/03 3:25 PM Page vi Inquiry into Fraud and Electronic Commerce – FINAL REPORT Evidence to the Committee demonstrated that it is impossible to develop a truly effective response to fraud until a more accurate picture of its nature and extent is available. Many of the Committee’s recommendations concern the collection, analysis and dissemination of data related to all types of fraud in Victoria. A major recommendation concerns the establishment of a Victorian Fraud Information and Reporting Centre within the Victorian Police. The Committee envisages that this centre would be staffed primarily by civilians with an understanding of criminology and expertise in areas such as law, commerce, banking and statistics. The Committee believes that one of the greatest deterrents to fraud within organisations is a commitment by upper-level management to the prevention of fraud, an understanding of how to achieve the goal of fraud prevention, a set of policies to this end, and communication with employees both directly and through modeling of a fraud prevention ethic. An important fraud control measure lies in education of members of the community to decrease their vulnerability to becoming victims of fraud. The more awareness in the community about the types of fraud likely to be perpetrated, the less likely is a potential perpetrator to succeed in a ‘scam’. Many people do not report fraud, as they feel it is somehow their own fault and they do not want others to see them as ‘foolish’. The Committee has recommended that the central collection and analysis agency also take responsibility for dissemination of information about fraud to the public. The Committee hopes that this Report will provide a basis for Victorians to prevent becoming victims of fraud, to be discouraged from attempting to commit fraud, and to establish adequate security measures to make the commission of fraud impossible. I want to express my sincere thanks to Dr. Russell Smith and Mr Jamie Walvisch, consultants for this Inquiry, for their commitment to the project and for drafting this Report, and to Committee staff – Ms Sandy Cook, Executive Officer, for her outstanding efforts and attention to detail in all aspects of the preparation of this Report, and Ms Michelle Summerhill, Ms. Rhonda MacMahon and Ms Sandy Jensen, Office Managers, for their assistance with the Inquiry. I would also like to thank the members of both Committees for their participation and contribution to the Inquiry. In particular the previous Chair, for his committed stewardship of the preliminary research and the production of Discussion Paper which formed the basis of this Report. I hope that all key individuals and organisations concerned about fraud and ‘white-collar crime’ closely consider the contents of this Report, as the Committee believes significant community benefit will flow from the implementation of the recommendations made. Carolyn Hirsh M.L.C. Chair page vi Fraud Report JUST EXEC 23/12/03 3:21 PM Page vii Executive Summary and Recommendations Fraud and white-collar crime have far-reaching effects on the community, not only in terms of the financial impact on business and government, but also because of the effects on individuals who are victimised. It is estimated that these crimes cost Victoria as much as $641 million last year – money which could be better used for essential community works in promoting health, education and security. It is the purpose of this Inquiry to examine the trends in this area, and to look at how Victorian law and policy can best respond. Due to the ease with which fraud transcends domestic and international jurisdictional boundaries, especially in the context of electronic commerce, the Committee believes that the best response should be a national, integrated approach that uses the resources of the many federal, state and territory bodies working in this area in a co-ordinated fashion. No one agency, acting alone, can expect to be able to tackle crimes of dishonesty effectively. The Committee is therefore concerned to ensure that any Victorian response reflects best practice and is in accord with measures implemented in other places in response to these global concerns. The Committee is also concerned to ensure that any safeguards or controls that are put in place to minimise fraud risk, should not be so onerous as to preclude or frustrate any legitimate activities of business and government.
Recommended publications
  • Show Me the Money: Characterizing Spam-Advertised Revenue
    Show Me the Money: Characterizing Spam-advertised Revenue Chris Kanich∗ Nicholas Weavery Damon McCoy∗ Tristan Halvorson∗ Christian Kreibichy Kirill Levchenko∗ Vern Paxsonyz Geoffrey M. Voelker∗ Stefan Savage∗ ∗ y Department of Computer Science and Engineering International Computer Science Institute University of California, San Diego Berkeley, CA z Computer Science Division University of California, Berkeley Abstract money at all [6]. This situation has the potential to distort Modern spam is ultimately driven by product sales: policy and investment decisions that are otherwise driven goods purchased by customers online. However, while by intuition rather than evidence. this model is easy to state in the abstract, our under- In this paper we make two contributions to improving standing of the concrete business environment—how this state of affairs using measurement-based methods to many orders, of what kind, from which customers, for estimate: how much—is poor at best. This situation is unsurpris- ing since such sellers typically operate under question- • Order volume. We describe a general technique— able legal footing, with “ground truth” data rarely avail- purchase pair—for estimating the number of orders able to the public. However, absent quantifiable empiri- received (and hence revenue) via on-line store order cal data, “guesstimates” operate unchecked and can dis- numbering. We use this approach to establish rough, tort both policy making and our choice of appropri- but well-founded, monthly order volume estimates ate interventions. In this paper, we describe two infer- for many of the leading “affiliate programs” selling ence techniques for peering inside the business opera- counterfeit pharmaceuticals and software. tions of spam-advertised enterprises: purchase pair and • Purchasing behavior.
    [Show full text]
  • Zambia and Spam
    ZAMNET COMMUNICATION SYSTEMS LTD (ZAMBIA) Spam – The Zambian Experience Submission to ITU WSIS Thematic meeting on countering Spam By: Annabel S Kangombe – Maseko June 2004 Table of Contents 1.0 Introduction 1 1.1 What is spam? 1 1.2 The nature of Spam 1 1.3 Statistics 2 2.0 Technical view 4 2.1 Main Sources of Spam 4 2.1.1 Harvesting 4 2.1.2 Dictionary Attacks 4 2.1.3 Open Relays 4 2.1.4 Email databases 4 2.1.5 Inadequacies in the SMTP protocol 4 2.2 Effects of Spam 5 2.3 The fight against spam 5 2.3.1 Blacklists 6 2.3.2 White lists 6 2.3.3 Dial‐up Lists (DUL) 6 2.3.4 Spam filtering programs 6 2.4 Challenges of fighting spam 7 3.0 Legal Framework 9 3.1 Laws against spam in Zambia 9 3.2 International Regulations or Laws 9 3.2.1 US State Laws 9 3.2.2 The USA’s CAN‐SPAM Act 10 4.0 The Way forward 11 4.1 A global effort 11 4.2 Collaboration between ISPs 11 4.3 Strengthening Anti‐spam regulation 11 4.4 User education 11 4.5 Source authentication 12 4.6 Rewriting the Internet Mail Exchange protocol 12 1.0 Introduction I get to the office in the morning, walk to my desk and switch on the computer. One of the first things I do after checking the status of the network devices is to check my email.
    [Show full text]
  • Email Phishing for IT Providers How Phishing Emails Have Changed and How to Protect Your IT Clients
    Email Phishing for IT Providers How phishing emails have changed and how to protect your IT clients 1 © 2016 Calyptix Security Corporation. All rights reserved. I [email protected] I (800) 650 – 8930 (800) 650-8930 I [email protected] Contents Introduction ............................................................................................ 2 Phishing overview .................................................................................. 3 Trends in phishing emails ...................................................................... 6 Email phishing tactics .......................................................................... 11 Steps for MSP & VARS .......................................................................... 24 Advice for your clients .......................................................................... 29 Sources .................................................................................................. 35 1 © 2016 Calyptix Security Corporation. All rights reserved. I [email protected] I (800) 650 – 8930 Introduction There are only so many ways to break into a bank. You can march through the door. You can climb through a window. You can tunnel through the floor. There is the service entrance, the employee entrance, and access on the roof. Criminals who want to rob a bank will probably use an open route – such as a side door. It’s easier than breaking down a wall. Criminals who want to break into your network face a similar challenge. They need to enter. They can look for a weakness in your
    [Show full text]
  • 1 BIDDER BEWARE TOWARD a FRAUD-FREE MARKETPLACE – BEST PRACTICES for the ONLINE AUCTION INDUSTRY Paula Selis Anita Ramasastry
    BIDDER BEWARE TOWARD A FRAUD-FREE MARKETPLACE – BEST PRACTICES FOR THE ONLINE AUCTION INDUSTRY Paula Selis* Anita Ramasastry** Charles S. Wright*** Abstract: This report presents to businesses, consumers and government officials (including law enforcement) a “menu of options” for combating fraud in the online auction industry. By directly interviewing several major online auction sites and cataloging the features of other sites, the Washington Attorney General’s Office, in conjunction with the Center for Law Commerce and Technology at the University of Washington Law School, has attempted to identify a series of “best practices” in the online auction industry. The results of these interviews as well as findings from investigation of current practices on the Web are presented here. By identifying the most successful, innovative, and feasible practices, this report seeks to maximize the reach of industry solutions and thereby promote industry-wide self-regulation. Standardization is a powerful tool for eradicating fraud across the industry. However, divergent business models and differing consumer needs mean that there is no one size that fits all models. This report presents a pro-active collaboration between enforcement agencies, industry, and academia. It also suggests a menu of best practices from which users might choose to suit their needs, and invites comment, critique and improvement upon those practices. INTRODUCTION Produced by the Washington State Attorney General’s office and the Center for Law Commerce and Technology at the University of Washington Law School, this report surveys the current range of responses to the problem of online auction fraud. This report presents the results of that survey in the form of a menu of options for businesses and consumers.
    [Show full text]
  • CUB Guide to Fighting Robocalls
    CitizensUtilityBoard.org 1-800-669-5556 Guide to Fighting Robocalls February 2021 The latest news on the robocall fi ght Robocalls are prerecorded messages from computer-generat- ed dialers, and Illinois is one of the nation’s hardest hit states. In early 2021, for example, the state received more than 153 million robocalls (about 57 per second) in the span of just one month. That ranked Illinois eighth in the country for these calls, according to the robocall-blocking fi rm YouMail. While there are helpful robocalls (alerting you to school closings or when a prescription is ready), YouMail estimates about 42 percent of the calls in Illinois were scams and another 22 percent were simply marketing pitches. Unwanted robocalls are annoying, and costly. The Federal Com- munications Commission (FCC) put the price tag at $3 billion a year just from lost time, not even counting any fraud. TechRe- One in 10 Americans public put the total annual loss for consumers at $9.5 billion. are scammed each year, While policymakers are fi nally starting to act against illegal robo- calls, don’t wait for federal law to catch up. Use the simple tips in resulting in an annual loss of this guide to protect yourself from unwanted calls. The law The Telephone Robocall Abuse Criminal Enforcement and $9.5 billion Deterrence (TRACED) Act became federal law in 2019. The act increases penalties and requires phone companies to validate Source: TechRepublic, calls before they reach you. This is to combat “spoofi ng,” October 2019 when a robocaller uses your area code and/or prefi x to ap- pear as if someone locally—maybe a friend or neighbor—is Note: In December 2020, the FCC ordered that organiza- trying to reach you.
    [Show full text]
  • Trade Secrets, Confidential Information, and the Criminal Law John
    Trade Secrets, Confidential Information, and the Criminal Law John T. Cross* The author examines the extent to which prop- L'auteur 6value le potentiel qu'a le droit crimi- erty offences in the criminal law can be used to nel de pr6venir l'appropriation malhonnete de police the misappropriation of trade secrets l'information confidentielle et des secrets and confidential information. After assessing commerciaux en ]a qualifiant d'atteinte au the long-standing debate on whether informa- droit de proprit6. L'auteur expose le long tion can be classified as property, he argues drbat sur la question a savoir si l'information that answering the question one way or the peut etre l'objet d'un droit de proprirtd; il con- other involves circular reasoning. When clut que dans un cas comme dans l'autre la judges label information "property," it is to raponse implique un raisonnement circulaire. enable them to grant the desired remedies. L'attribution du terme <<proprirt6 >>par les Courts should instead ask more directly juges depend du rsultat qu'ils veulent obtenir. whether certain information should be pro- Les tribunaux devraient plutrt centrer leur rai- tected under the circumstances. It follows that sonnement sur l'importance de prot~ger ou precedents holding that certain information is non l'information en question dans les circons- property in one area of the law should not be tances, sans se sentir lids par la jurisprudence authoritative in others. The article then ant~rieure qui aurait caractdris6 autrement ce explores efforts made in Great Britain, Canada meme type d'information dans un autre con- and the United States to apply criminal prop- texte juridique.
    [Show full text]
  • Catholic Education Office GENERAL EMPLOYEE APPLICATION FORM
    15 Johnson Street FORBES NSW 2871 Telephone: 02 6853 9300 www.wf.catholic.edu.au Catholic Education Office Diocese of Wilcannia-Forbes GENERAL EMPLOYEE APPLICATION FORM (PLEASE COMPLETE THIS FORM AND SUBMIT ORIGINAL TO PRINCIPAL/CEO) APPLICATIONS FOR PERMANENT AND TEMPORARY POSITIONS SHOULD BE SUPPORTED BY A LETTER ADDRESSING THE CRITERIA/POSITION REQUIREMENTS FOUND IN THE ADVERTISEMENT SECTION A – PERSONAL DETAILS Surname: Given Name/s: Title: Former Names: (if applicable): Date of Birth: Religion: Current Parish: Permanent Address: Postcode: Address For Correspondence: Postcode: Home phone: Work phone: Mobile: E-mail: Nationality: Australian Yes No If no, are you eligible to work in Australia ? ________________________________ Origin: Are you Aboriginal or Torres Strait Islander? Aboriginal Torres Strait Islander Both I AM INTERESTED IN APPLYING FOR (tick all that apply): Classroom and Learning Support Services Administration Services Operational Services - Maintenance/Grounds Cleaner Permanent Full-time Part-time Casual Temporary COMPLETE BELOW ONLY IF APPLYING FOR PERMANENT/TEMPORARY POSITIONS: Position(s) applying for: Name of School: Address of School: I became aware of this position by: CEO Website Newspaper Other ___________________________ Refer to Employment Collection Notice – Annexure C “Faith Learning and Transformation in Jesus Christ” Version 1 SECTION B – EDUCATION EDUCATION: School(s) Attended Years of Attendance Certificate(s) Awarded OTHER QUALIFICATIONS: (including current incomplete courses): Name and Location of Institution Years of Attendance Award Conferred Date Conferred SECTION C – EMPLOYMENT EMPLOYMENT (in reverse order from most recent employer – no further back than 15 years): Positions Held Reason for Resignation From To Name and Address of Employment or Termination Page 2 Version 1 SECTION D – WORKING WITH CHILDREN CHECK Teaching positions are child-related work, and legislation requires preferred applicants to be subject to a Working with Children Check (WWCC) for paid employees.
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • Identity Crime and Misuse in Australia 2017
    AIC reports 10 National Identity Security Strategy Identity crime and misuse in Australia 2017 Penny Jorna Russell G Smith Australian Institute of Criminology Identity crime and misuse in Australia 2017 © Australian Institute of Criminology 2018 ISSN (Online) 2206-7930 Apart from any fair dealing for the purpose of private study, research, criticism or review, as permitted under the Copyright Act 1968 (Cth), no part of this publication may in any form or by any means (electronic, mechanical, microcopying, photocopying, recording or otherwise) be reproduced, stored in a retrieval system or transmitted without prior written permission. Inquiries should be addressed to the publisher. Published by the Australian Institute of Criminology GPO Box 1936 Canberra ACT 2601 Tel: (02) 6268 7166 Email: [email protected] Website: aic.gov.au Please note: Minor revisions are occasionally made to publications after release. The online versions available on the AIC website will always include any revisions. Disclaimer: This research report does not necessarily reflect the policy position of the Australian Government. General editor: Dr Rick Brown, Deputy Director, Australian Institute of Criminology Edited and typeset by the Australian Institute of Criminology A full list of publications in the AIC Reports series can be found on the Australian Institute of Criminology website at aic.gov.au ii Contents vii Acknowledgements 30 Prosecution of identity crime and related viii Acronyms and abbreviations offences ix Abstract 34 Self-reported victimisation
    [Show full text]
  • DIXON V R – PROPERTY in DIGITAL INFORMATION?
    ANUSHA WIJEWICKRAMA DIXON v R – PROPERTY IN DIGITAL INFORMATION? Submitted for the LLB (Honours) Degree Faculty of Law Victoria University of Wellington 2016 2 In 2015, New Zealand’s Supreme Court ruled in Dixon v R that digital files are property for the limited purposes of a computer misuse provision – s 249(1)(a) of the Crimes Act 1961. The Court said it was distinguishing digital files from pure information, thus it was not challenging the long-standing legal position that information cannot be property. This paper analyses the Court’s purposive, conceptual and factual reasoning, ultimately concluding that a distinction between digital files and information is difficult to justify. It argues that the Court’s decision therefore actually erodes the traditional legal position. It concludes that Parliament, which can more fully explore policy considerations, might be better placed to determine whether digital files should be property. Potential ramifications of the Supreme Court’s decision are also briefly outlined. Key words: property; digital files; information; Crimes Act 1961 s 249(1)(a); computer misuse I Introduction New Zealand's Supreme Court ruled in Dixon v R that digital files are not simply information, but are “property” for the purposes of s 249(1)(a) of the Crimes Act 1961.1 In doing so the Court expressly stated that it was not reconsidering the orthodox legal position that there is no property in pure information.2 Instead it used a purposive approach to determine Parliament's intent regarding computer misuse, and deemed digital files to be property for the limited purpose of s 249(1)(a).
    [Show full text]
  • Criminal Law Review
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Salford Institutional Repository Page1 Criminal Law Review 2008 The Computer Misuse Act 1990: lessons from its past and predictions for its future Neil MacEwan Subject: Criminal law. Other related subjects: Information technology Keywords: Computer crime; Computer security Legislation: Computer Misuse Act 1990 s.1 , s.3 Police and Justice Act 2006 s.35 , s.36 *Crim. L.R. 955 Summary: The age of the internet has thrown down some real challenges to the Computer Misuse Act 1990. Recently, the Government made changes to this piece of legislation, in an attempt to meet two of those challenges--the proliferation of “ Denial of Service” (DoS) attacks, and the creation and dissemination of “ Hackers' tools” --and to fulfil international commitments on cybercrime. Yet some of these new measures invite criticisms of policy, form and content, and bring doubts about how easy to interpret, and how enforceable, they will be. Introduction Finally, after three aborted attempts to make changes to it within the last five years,1 the Computer Misuse Act (CMA) 1990 has been amended; specifically, both added to and altered.2 The offence of unauthorised access to computer material, 3 formerly a summary offence, has now become an offence triable either way, and the offence of unauthorised modification of computer material 4 has been replaced by the offence of unauthorised acts with intent to impair, or recklessness as to impairing, the operation of a computer etc. The time is right for a close re-examination of this piece of legislation.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]