In a bland, anonymous tower at an undisclosed address in the British capital's Docklands area, Len Hynds, head of the UK's National High Tech Crime Unit (NHTCU) surveys the East End of London and reflects that nothing much has changed in the murky world of organized crime.
Criminals still pursue easy cash through fraud, extortion and theft; it's just that these days they have much better technology at their disposal. For example, online gangsters looking to extort money use "distributed denial of service" (DDoS) attacks instead of threats of violence.
Using thousands of computers around the world that have been infected with malicious programs, criminals can marshal "botnet armies" to bombard a Web site's servers with requests, thereby using up most or all of the available bandwidth. The site slows to a crawl or grinds completely to a halt. And an online business can't earn any money if its Web site is not working.
ILLUSTRATION MOUNTAIN PEOPLE
"It's a classic protection racket," Hynds said. "It's what East End gangsters have been doing in this part of town for a while -- knocking on businesses' doors and asking them if they can afford a fire."
The main difference is that, thanks to the Internet's borderless nature, organized crime groups have been able to go global in one easy bound.
"We've seen a massive increase in extortion demands," Hynds says. "At the moment they're focused on the online betting and gaming industry in particular."
These sites are especially vulnerable because punters can easily go elsewhere if a bookie's site is down. Peter Pedersen, chief technology officer of online betting company Blue Square, says: "We were attacked early on in the year. We received extortion demands by e-mail half an hour before the attacks began."
The extortionists demanded up to US$40,000 a time. But Pedersen says Blue Square didn't -- and won't ever -- pay up, although he admits the attacks cost them business.
"It's like 1,000 people barricading a supermarket so you can't do your shopping," he says.
The attacks can last for half an hour or several days, with the "botnet armies" making thousands of network protocol requests, or issuing requests for false pages that force the Web site's servers to display error messages. Either way, the site can't function properly and revenue is lost.
The NHTCU warns companies never to pay up.
"It's the type of organized crime that doesn't go away even if you do pay," Hynds said. "It comes back after a little while."
William Hill's online activities include casinos, poker, arcade games and fixed-odds betting, accounting for around 20 percent of the group's ?6 billion (US$11 billion) turnover. It, too, has been targeted by Internet extortionists. The company was hit by a DDoS attack the weekend before the Cheltenham Festival.
Spokesman David Hood says: "The attack lasted about 24 hours. We were as prepared as you can be. We managed to control it to a degree, but we didn't eradicate it completely. We were working at 60 percent capacity."
What surprised Hood and several other companies within the industry is the apparently random nature of the attacks. For example, not many criminals staged attacks to coincide with the Grand National steeplechase race in April.
Instead, Hood says: "We had another attack after the Grand National. This made us think that it wasn't necessarily organized crime behind it. The language in the e-mails was very bad."
The extortionists were demanding sums between US$10,000 and US$50,000. Despite the apparent amateurishness of the extortion attempts, Hood is in no doubt about their technical prowess.
"Their ability to coordinate a DDoS attack is quite impressive," he says.
Talk within the industry has these attacks coming from the US, the far east and eastern Europe.
"Our evidential trail often leads us to eastern Europe," Hynds said.
Although many other online betting companies have been targeted this way, most are reluctant to talk openly about their experiences for fear of attracting more unwanted attention. They are also keen to play down the problem for fear of undermining confidence in the industry.
A spokesman for one leading online bookie said: "We don't want publicity because it acts as a red rag to a bull. We suffered one or two minor outrages in the springtime. An attack closed down the homepage of the site. Our customers suffered a delayed service. We put in a few preventative measures, but we know they can't guarantee us protection. The problem certainly hasn't gone away."
So how much money have online bookies lost as a result of attacks by extortionists? Even talking anonymously, the companies are reluctant to reveal how much the crime costs.
Hynds says: "Accurate figures are hard to come by. You can assess the cost of rebuilding a network that has been attacked by a virus, or how much money a business lost if it was forced offline. But what you can't measure is the loss of customer confidence, the damage to a business's reputation. What formula do you use?"
But a survey commissioned by the NHTCU suggests that annual losses incurred by UK business through high-tech crime in general amounts to billions rather than millions. Some 167 companies revealed that they had lost ?195 million over 12 months. Extrapolating that figure across the whole of UK business leads to a figure in the billions.
Last August, CryptoLogic, a Canadian software company that develops online casino games, admitted a hacker had cracked one of its gaming servers and changed the software to make every craps and slot machine player a winner. It's the kind of scam punters dream of.
For a few hours, 140 gamblers managed to rake in $1.9m -- and keep it because the fraud wasn't their fault.
And it isn't just the online betting and gaming industry that is vulnerable to online crime. Any business whose model is primarily Internet-based is a potential target.
The NHTCU reports a marked increase in the number of "phishing" scams, whereby criminals using spoof e-mails and Web sites attempt to trick banking customers into revealing their security details.
And consumers are also at risk from "advance fee" scams. There can't be an Internet user who hasn't received an e-mail purporting to come from some high-ranking African official seeking help smuggling millions out of the country. All you have to do is pay an administration fee before you get your cut of the loot. Amazingly, the UK's National Criminal Intelligence Service says people are still falling for it.
We, the public, are partly to blame for the increase in Internet crime. Hynds says: "There are hundreds of thousands of compromised computers around the world, and it's going to become more of a problem as more people move to always-on broadband. Home users aren't using anti-virus software and firewalls correctly."
In other words, if you don't protect your computer, criminals can surreptitiously upload "malware" onto your system and then use it to take control of your computer. You may be an unwitting foot soldier in a botnet army -- a sleeping partner in crime.
So how is business protecting itself against Internet crime? The online betting and gaming industry is understandably reluctant to go into detail, but Internet experts have developed software that can detect DDoS attacks as they begin to happen. Companies can then switch operations to back-up servers.
But Blue Square's Peter Pedersen doesn't believe the industry should be left to fend for itself.
"One of the biggest problems is that ISPs don't seem to be working together to crack down on this, nor do governments. In many countries a DDoS attack isn't even illegal. It's a global phenomenon -- the attackers can be as distributed as the attack," he said.
And one thing the government could do is give the NHTCU more money. Its annual budget is just ?9.3 million, yet it has to combat online fraud, extortion, hacking and virus-writing, Class A drug trafficking and child pornography.
While clearly proud of what his multi-agency unit of 57 staff from customs, intelligence, army and police backgrounds has achieved, Hynds admits: "I could probably deploy 100 percent of my resources against child pornography and keep them gainfully employed. But we have finite resources and we have to prioritize our activities."
Despite its small budget, the NHTCU exceeded its performance targets last year by dismantling 13 organized crime groups and disrupting another 12. And there are many more to catch.
Looking out over the Manhattanesque landscape of London's Docklands, Hynds knows that while their methods may have changed, the criminals certainly have not.
As strategic tensions escalate across the vast Indo-Pacific region, Taiwan has emerged as more than a potential flashpoint. It is the fulcrum upon which the credibility of the evolving American-led strategy of integrated deterrence now rests. How the US and regional powers like Japan respond to Taiwan’s defense, and how credible the deterrent against Chinese aggression proves to be, will profoundly shape the Indo-Pacific security architecture for years to come. A successful defense of Taiwan through strengthened deterrence in the Indo-Pacific would enhance the credibility of the US-led alliance system and underpin America’s global preeminence, while a failure of integrated deterrence would
It is being said every second day: The ongoing recall campaign in Taiwan — where citizens are trying to collect enough signatures to trigger re-elections for a number of Chinese Nationalist Party (KMT) legislators — is orchestrated by the Democratic Progressive Party (DPP), or even President William Lai (賴清德) himself. The KMT makes the claim, and foreign media and analysts repeat it. However, they never show any proof — because there is not any. It is alarming how easily academics, journalists and experts toss around claims that amount to accusing a democratic government of conspiracy — without a shred of evidence. These
Taiwan is confronting escalating threats from its behemoth neighbor. Last month, the Chinese People’s Liberation Army conducted live-fire drills in the East China Sea, practicing blockades and precision strikes on simulated targets, while its escalating cyberattacks targeting government, financial and telecommunication systems threaten to disrupt Taiwan’s digital infrastructure. The mounting geopolitical pressure underscores Taiwan’s need to strengthen its defense capabilities to deter possible aggression and improve civilian preparedness. The consequences of inadequate preparation have been made all too clear by the tragic situation in Ukraine. Taiwan can build on its successful COVID-19 response, marked by effective planning and execution, to enhance
Since taking office, US President Donald Trump has upheld the core goals of “making America safer, stronger, and more prosperous,” fully implementing an “America first” policy. Countries have responded cautiously to the fresh style and rapid pace of the new Trump administration. The US has prioritized reindustrialization, building a stronger US role in the Indo-Pacific, and countering China’s malicious influence. This has created a high degree of alignment between the interests of Taiwan and the US in security, economics, technology and other spheres. Taiwan must properly understand the Trump administration’s intentions and coordinate, connect and correspond with US strategic goals.