techtolink.com.hk

technical document ref# realcase1.html
issue date: 30 Oct 2002
by techtolink technical division
 

Information Security

    The use of computer and the Internet has brought us much convenience in all kinds of our daily pursuits, from learning, leisure, and personal communication to conducting business activities. However, at the same time, the convenience of this virtual space has created a great potential for abuse by criminals. Statistics show that there has been a significant increase in criminal activities that are computer and Internet based. In 1993 the Police handled just 4 cases of computer crime, but by 2000 the figure had risen to 368 cases. The problem has become a major public concern and its nature is complex.

    Real Case (Hacking)

    In early 2000, three young hackers made use of a computer program to capture the log-in names and passwords of 127 other Internet users who were surfing simultaneously with them. With the help of a distributor, the details of these accounts and passwords were sold to avid Internet gamers for HK$350 each. As a result of the abuses of the accounts, 11 local ISPs reported to the Police that they had suffered a loss totaling HK$197,490. Three culprits were successfully prosecuted and convicted in court.

     

    This is the first case of its type and the Court of Appeal upheld the custodial sentences imposed on these three computer hackers. The Court indicated that hacking offences were serious, and that non-custodial sentences would ordinarily be inappropriate for computer hackers.

 

Title of Offence (2002)

Total

Unauthorised Access to Computer by telecommunication

14

Access to Computer with Criminal or Dishonest Intent

63

Criminal Damage

10

Obtaining Property by Deception (On-line Shopping)

25

Obtaining Services by Deception (Computer Related)

12

Theft (E-Banking Related)

3

Other Miscellaneous Theft (Computer related)

6

Others

3

Total

136

    Refer to the recent international investigation; Hong Kong is placed at 2nd of Hackers attacking sequence, just behind the Israel.  In Hong Kong, donít under estimate the hackerís power; they can easily access different hacking tools from Internet.  So, review your company information security as soon as much you can.

 

 

THIS PAPER WHICH CONTAINS MATERIALS, IS PRIVATE AND CONFIDENTIAL, IT IS NOT TO BE USED BY ANY OTHER PARTIES FOR ANY OTHER PURPOSES BY ANY MEANS WITHOUT THE PRIOR WRITTEN CONSENT OF TECH TO LINK COMPANY.