NESTA Crime Online - University of Brighton Repository
NESTA Crime Online - University of Brighton Repository
NESTA Crime Online - University of Brighton Repository
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Russian groups have also started to specialise in Denial <strong>of</strong> Service (DoS) attacks,<br />
92 93<br />
particularly on online gambling sites.<br />
The foray into cybercrime has not been designed as a replacement for more traditional<br />
forms <strong>of</strong> organised crime. It remains unclear which brand <strong>of</strong> activity is more important<br />
to the enduring prosperity <strong>of</strong> Russian organised crime and indeed the inter-relationship<br />
between the two strands. Given the low overhead pr<strong>of</strong>its associated with cybercrime<br />
against high overheads associated with traditional organised crime, cybercrime is a<br />
necessary endeavour to maintain the social and political benefits that accrue from the<br />
94, 95<br />
more visible and high pr<strong>of</strong>ile criminal areas.<br />
The amount <strong>of</strong> financial information procured by Russian organised crime groups is<br />
thought to be massive. Much <strong>of</strong> it is stored covertly on unsuspecting servers across the<br />
world. 96 Considerable though the impact has been on individual current account and<br />
credit card holders, these victims are thought to represent only about 1 per cent <strong>of</strong> the<br />
total information that is held globally and illegally. 97 Quite apart from the implications for<br />
the future, as and when this information does enter the financial domain, its very<br />
existence presents the organised crime group decision makers with an interesting choice<br />
regarding use. Effectively, at this juncture, they have opted to sell the information<br />
rather than use it directly, in order to avoid being at the point <strong>of</strong> crime. For example,<br />
91 Carr, J., (18 th December 2007), ‘Finjan: Chinese Cybercrime networks fill void left by Russian Business<br />
Network, SC Magazine, www.scmagazineus.com/Finjan-Chinese-Cybercrime-networks-fill-void-left-by-Russian-<br />
Business-Network/article/100002/, accessed 3 rd December 2008.<br />
92 The actual ransoms are generally not large and usually are less than what the site would lose if service were<br />
denied for any longer than a week. Russian Mafia target online gambling sites, OnLine Casino,<br />
www.onlinecasinonews.com/ocnv2_1/article/Article.asp?id=4460, accessed 3 rd December 2008.<br />
93 Successful Russian attempts to compromise IT networks in Georgia and Estonia point to the potency <strong>of</strong> DoS<br />
as a weapon <strong>of</strong> war. The techniques that were used were neither complex nor, allegedly, overseen by central<br />
government. In the case <strong>of</strong> Georgia, the campaign was initiated by Russian nationalists who posted the<br />
relevant s<strong>of</strong>tware on websites, which could be downloaded by anyone so inclined to contribute to a flood <strong>of</strong><br />
bogus requests to an Internet server that culminated in a ‘Distributed Denial <strong>of</strong> Service’. (6 th -12 th December<br />
2008), Marching <strong>of</strong>f to Cyberwar, The Economist (Technology Quarterly), p.18.<br />
94 Interview with Colin Whittaker, Head <strong>of</strong> Security, APACS, London, 30 th July 2008 and, 14 th October 2008.<br />
95 As Misha Glenny’s recent book consistently reflects, not all crime is about money and wealth; it is also about<br />
relative power, position and social advantage. Glenny, M., (2008), McMafia: <strong>Crime</strong> Without Frontiers, (Random<br />
House, London), p.426.<br />
96 Interview with Colin Whittaker, Head <strong>of</strong> Security, APACS, London, 30 th July 2008.<br />
97 Interview with Tim Warner, Sales director and Country Manager, Finjan, <strong>Brighton</strong>, November 2008.<br />
Page 32