Download - IT LAW ASS..final
-
8/7/2019 IT LAW ASS..final
1/22
CREDIT CARD FRAUD IN THE UK 2010
1
1. INTRODUCTIONInformation technology has done a lot to improve and make our life better, but at the same time
it has brought tears and pains to illiterate and less fortunate people. In terms of technology for
instance; internet, internet has created a lot of millionaires and billionaires within the past years
and more to come, but at the same time it has brought a lot of people tears and discomfort.
Discomfort in such a way that the people loss their property to cybercriminals.
As more aspects of our life move to digital networks, crime comes with them. Our lives
increasingly depend on the Internet and digital networks, but these create new vulnerabilities and
new ways for criminals to exploit the digital environment. Not only can many existing crimes be
replicated in online environments, but novel crimes that exploit specific features of digital
networks have emerged as well. With new crimes come new forms of policing and new forms of
surveillance, and with these come new dangers for civil liberties. These issues are the subject of
the present book. The shift to digital environments alters our understanding of crime in five
different ways. First, it alters the scene or location where crimes occur. Second, it facilitates the
commission of new types of crimes. Third, it produces significant changes in law enforcement
methods, for example, a shift to prevention and to new forms of cooperation between public and
private actors. Fourth, it gives law enforcement new tools of digital surveillance and new
methods of sorting data and managing online risks. Fifth, it presents new challenges to the
existing legal process and spurs the development of new forms of proof and procedure. We have
arranged the essays in this book to correspond to these five key phenomena: the new scenes of
crime, the new forms of crime, the new methods of law enforcement, the new tools of digital
surveillance and crime prevention, and the new procedures that courts and legislatures will have
to adopt to deal with threats to Internet security.
Criminology has been rather slow to recognize the importance of cyberspace in changing the
nature and scope of offending and victimization, and a comprehensive introductory textbook on
cybercrime and its social implications is long overdue. One of the many strengths of cyber law is
that it avoids 'tetchy' jargon and unites criminological and sociological perspectives in
discussions of cybercrime, cyber-deviance and cyber-freedoms.
-
8/7/2019 IT LAW ASS..final
2/22
CREDIT CARD FRAUD IN THE UK 2010
2
Cybercrime and Society provides a clear, systematic, critical introduction to current debates
about cybercrime. It locates the phenomenon in the wider contexts of social, political, cultural
and economic change. It is the first book to draw upon perspectives spanning criminology,
sociology, law, politics and cultural studies to examine the whole range of cybercrime issues,including:
1.1 TYPES OF CYBERCRIMES
y computer hackingy cyber-terrorismy media 'piracy'y financial fraud and identity thefty online stalkingy hate speechy pornographyy surveillance
-
8/7/2019 IT LAW ASS..final
3/22
CREDIT CARD FRAUD IN THE UK 2010
3
2. OBJECTIVEThe main aim and object of this well researched project is to evaluate the misuse of technology
to be prcised information technology for mischievous purposes. So this project is supposed to
achieve a well stated set of laws, crime and its punishment based on international or national law.
Not forgetting the fact that law changes with time or for a course, which is known as
amendment, sometimes the punishment is reduce or increased, sometime added to it. So in this
case one of the objectives of this research is to gather all the information needed to explain why
the law was amended.
Most importantly, the explanation of how the cyber criminology is organized and the processes
involved in it. Processes like digitization, anonymity, decentralization and interdependence.
The first is digitization which is a common standard for data transmission that enable
manipulation and modification. The second is anonymity, the ability to act and spy on others
without disclosing ones identity. The third is interconnectivity, the fact that everyone on the
network is connected to everyone else. The fourth is decentralization, the lack of centralized
control over digital networks. The fifth is interdependence, the shared vulnerabilities that
inevitably exist between and among all the people who use digital networks. Digitization,
anonymity, interconnectivity, decentralization, and interdependence structure the online world as
we currently know it. Hence they structure the opportunities for crime and the ways that people
commit crimes and breach network security. However, the task of cybercrime policy is not
simply to create new laws banning new practices. It also requires us to redesign digital
architectures to reduce the risk of criminal conduct and security breaches in the first place; this
requires policy makers and technologists to decide how we should shape the digital networked
environment.
-
8/7/2019 IT LAW ASS..final
4/22
CREDIT CARD FRAUD IN THE UK 2010
4
3. CYBER CRIMES IN UNITED KINGDOMWe picked UK for this research because UK was recorded to have the highest number of credit
card fraud and the number of credit card users is higher in UK. Below is the graph representing
the usage of credit card and the fraud associated with it based on the internet usage.
People that never use the internet can be the victims of credit fraud too, so basically sometimes it
is not only those that surf that get hooked, even a harmless tender of information via telephone
can put you at risk. Technically the credit card agency can be hacked and in this case whether
you are an internet user or not or you have never used your card online it is still going to affect
you.
-
8/7/2019 IT LAW ASS..final
5/22
CREDIT CARD FRAUD IN THE UK 2010
5
The figure above shows the increment in credit card fraud and the comparison of credit card
fraud with other cybercrimes, as you can see the pick at which credit card fraud grow is far more
elastic than the other cyber crimes.
3.1 REASONS BEHIND CREDIT CARD FRAUD.
Poverty: Living in unfortunate conditions/broke. Many people tends illegally develop ways ofmaking their ends meet, and one of the ways, happened to be credit card fraud. So we can saypoverty can be a motivation for somebody to indulge in cyber crime.
Desperation: They are in need of money, perhaps to pay off debt or in a quest to get rich.Desperate people can go to any length to get whatever. So in this case, many people involve incredit card fraud to get rich and live the life of a king. Desperation can be a motive for couragebut when it is done illegally, then that becomes a crime and when it is done online its cybercrime.
Just for fun (Justification):For absolutely no particular reason, so they do it because they knowthey can. People under this category, do cyber crime to prove a point or display of skills.
Evil: Some people are just born with the spirit of destruction and infliction of pains to other andthis is also known as evil. So evil is one of the things that create indulgence in the participationof cyber crime.
-
8/7/2019 IT LAW ASS..final
6/22
CREDIT CARD FRAUD IN THE UK 2010
6
Revenge: Because it was done to them, so they want pay back and will do it to others.
3.2 CREDIT CARD FRAUD:
The term credit card fraud is generally referred to the theft and fraud committed using a credit
card or any similar payment contrivance as a fraudulent source of funds in a transaction.
It maybe for the purpose of obtaining goods without paying, or to obtain illegal funds from an
account
Credit card fraud involves;
y Stolen cardsy Compromised accountsy Card not Presenty Identity theft
- Application fraud
- Account takeover
y Skimmingy Cardingy BIN attacky Fraudulent charge-back schemes
They are a lot of things that leads to credit card fraud and in this particular section we are going
to be explaining them in a short but explanatory way.
3.2.1 Identity TheftIdentity crime is a generic term for identity theft, creating a false identity orcommitting identity fraud.
Criminals commit identity theft by stealing your personal information and then
pretending to be you. This is often done by taking documents from your rubbish or by
making contact with you and pretending to be from a legitimate organization.
-
8/7/2019 IT LAW ASS..final
7/22
CREDIT CARD FRAUD IN THE UK 2010
7
The difficulty has always been that the money is stolen from the credit card company and
not the consumer. Only if the credit card company fails to respect the chargeback can the
consumer take any action, and in that case, the action is against the credit card company
and not the person who perpetrated the fraud.
Once a criminal has the information he needs he could for example:
apply for a credit card in your name; open a bank or building society account in your name; apply for other financial services in your name; run up debts (e.g. use your credit/debit card details to make purchase) or
obtain a loan in your name; apply for any benefits in your name (e.g. housing benefit, new tax credits,
income support, job seekers allowance, child benefit);
apply for a driving license in your name; register a vehicle in your name; apply for a passport in your name; or Apply for a mobile phone contract in your name.
3.3 Identity fraud
3.3.1 Application fraud
Application fraud happens when a criminal uses stolen or fake documents
to open an account in someone else's name. Criminals may try to steal
documents such as utility bills and bank statements to build up useful
personal information. Or they may create counterfeit documents
3.3.2 Account takeover
Account takeover happens when a criminal tries to take over another
person's account, first by gathering information about the intended victim,
then contacting their card issuer masquerading as the genuine cardholder,
and asking for mail to be redirected to a new address. The criminal then
reports the card lost and asks for a replacement to be sent. Some
merchants added a new practice to protect their consumers and their own
-
8/7/2019 IT LAW ASS..final
8/22
CREDIT CARD FRAUD IN THE UK 2010
8
reputation, where they ask the buyer to send a photocopy of the physical
card and statement to ensure the legitimate usage of a card.
In the UK, credit cards are regulated by the Consumer Credit Act
1974 (amended 2006
3.4 Skimming
Skimming is the theft of credit card information used in an otherwise legitimate
transaction. It is typically an "inside job" by a dishonest employee of a legitimate
merchant. The thief can procure a victims credit card number using basic methods
such as photocopying receipts or more advanced methods such as using a smallelectronic device (skimmer) to swipe and store hundreds of victims credit card
numbers. Common scenarios for skimming are restaurants or bars where the skimmer
has possession of the victim's credit card out of their immediate view. The thief may
also use a small keypad to unobtrusively transcribe the 3 or 4 digit Card Security
Code which is not present on the magnetic strip. Instances of skimming have been
reported where the perpetrator has put a device over the card slot of an ATM
(automated teller machine), which reads the magnetic strip as the user unknowingly
passes their card through it. These devices are often used in conjunction with a
pinhole camera to read the user's PIN at the same time. This method is being used
very frequently in Europe
3.5 How Skimming Work?
Skimming works on the principle that anyone inserting a credit or debit card into
an ATM (Automatic Teller Machine) can have their details scanned from the
magnetic strip on the rear of the card in question.
Built into this false front panel is a magnetic card reader - known as a skimmer -as well as a small webcam or digital camera which is used to take the still imageor moving video of the card owner as they enter in their PIN (PersonalIdentification Number).
It may sound like the stuff of television or movie fiction but it does happen andover the last five years the instances of skimming in the United Kingdom haveincreased quite dramatically.
-
8/7/2019 IT LAW ASS..final
9/22
CREDIT CARD FRAUD IN THE UK 2010
9
Skimming device.
3.6 Carding
Carding is a term used for a process to verify the validity of stolen card data. The thief
presents the card information on a website that has real-time transaction processing. If the
card is processed successfully, the thief knows that the card is still good. The specific
item purchased is immaterial, and the thief does not need to purchase an actual product; a
Web site subscription or charitable donation would be sufficient. The purchase is usually
for a small monetary amount, both to avoid using the card's credit limit, and also to avoidattracting the card issuer's attention. A website known to be susceptible to carding is
known as a card able website.
In the past, carders used computer programs called "generators" to produce a sequence of
credit card numbers, and then test them to see which valid accounts were. Another
variation would be to take false card numbers to a location that does not immediately
-
8/7/2019 IT LAW ASS..final
10/22
CREDIT CARD FRAUD IN THE UK 2010
10
process card numbers, such as a trade show or special event. However, this process is no
longer viable due to widespread requirement by Internet credit card processing systems
for additional data such as the billing address, the 3 to 4 digit Card Security Code and/or
the card's expiration date, as well as the more prevalent use of wireless card scanners that
can process transactions right away Nowadays, carding is more typically used to verify
credit card data obtained directly from the victims by skimming or phishing.
A set of credit card details that has been verified in this way is known in fraud circles as
a phish. A carder will typically sell data files of the phish to other individuals who will
carry out the actual fraud. Market price for a phish ranges from US$1.00 to US$50.00
depending on the type of card, freshness of the data and credit status of the victim.
3.7 BIN attack
Credit cards are produced in BIN ranges. Where an issuer does not use random
generation of the card number, it is possible for an attacker to obtain one good card
number and generate valid card numbers by changing the last four numbers using a
generator. The expiry date of these cards would most likely be the same as the good card
3.8 Fraudulent Charge-Back schemes
There is a class of email spam (usually sent to commercial / corporate email addresses)
where the spammer makes an offer to purchase goods (usually not specifically identified)
from a vendor. In the email, the spammer makes it clear that they intend to pay for the
goods using a credit card. The spammer provides the shipping address for the goods, and
requests a product and price-list from the vendor in the initial email. It has been
speculated that this is some form of charge-back scheme, whereby the spammer is using a
valid credit card but intends to request a charge-back to reverse the charge while at the
same time retaining the goods that were shipped to them.
-
8/7/2019 IT LAW ASS..final
11/22
CREDIT CARD FRAUD IN THE UK 2010
11
4. CASES OF CREDIT CARD FRAUD IN UK4.1UK Defendants Await Sentencing in Carding Scheme
Two U.K. men have pleaded guilty to charges related to an extensive payment card fraud
ring called DarkMarket busted by authorities in October 2008 as reported by Jeremy Kirk
of IDG News Service. Two U.K. men have pleaded guilty to charges related to the
infamous DarkMarket payment-card fraud ring busted by authorities in October 2008,
according to British police.
Renukanth Subramaniam, 33, and John Michael Francis McHugh, 66, both pleaded guilty
to conspiracy to defraud in Blackfriars Crown Court inL
ondon on Thursday.
DarkMarket was a highly organized, password-protected online forum where criminals
worldwide could buy and sell credit card numbers, a practice known as "carding." Since
its shutdown, more than 60 people have been arrested by law enforcement agencies in the
U.K., U.S., Germany, Turkey and other countries.
Subramanian was an "itinerant loner" who was allegedly observed selling lists of credit
cards near the Java Bean Internet Caf #233; in Wembley where he frequently accessed
the DarkMarket site, according to the Serious Organized Crime Agency (SOCA).
He used a memory stick to carry data around and seemed to think using Internet cafes
would help shield his activities, SOCA said.
Subramanian had no fixed address and frequently stayed with friends but had mortgaged
three houses, SOCA said. In the past, Subramanian had worked for Pizza Hut and a
dispatch company.
McHugh was arrested in December 2008 after investigators found he was allegedly
running a counterfeit credit card factory, SOCA said. McHugh, a retiree who lived inDoncaster, England, allegedly had details for more than 2,000 credit cards in his home
along with a "suite of images and logos" needed to produce fake cards.
-
8/7/2019 IT LAW ASS..final
12/22
CREDIT CARD FRAUD IN THE UK 2010
12
1. Case: No love LostA case posted by John
Leyden from Enterprise Security states of a Nottinghamshire man
who attacked the website of London dating agency loveandfriends.com has avoided
imprisonment.
Matthew Byrne, 38, from Kirkby-in-Ashfield, Nottinghamshire, was given a suspended
sentence of eight months imprisonment, suspended for two years, at a sentencing hearing
at London's Southwark Crown Court on Tuesday. He was also sentenced to two years
supervision order after pleading guilty to computer hacking offences (unauthorized
modification of a computer contrary to section three of the Computer Misuse Act 1990)
at an earlier hearing in September.
Byrne was charged in May following a year-long investigation by officers at the
Computer Crime Unit at Scotland Yard over an August 2004 attack on love and
friends.com. He used brute force methods to find easily guessable passwords in order to
gain illicit access to four profiles on loveandfriends' database.
These profiles were subsequently defaced. Byrne then made demands for payment in
exchange for holding off on threats to delete the firm's database. Andy MacCabe,
managing director of love and friends, said at the time that the attacker only had member
level access to four profiles with weak passwords. The hacker did not at any time gainaccess to the loveandfriends financial database or web servers despite threats to the
contrary
-
8/7/2019 IT LAW ASS..final
13/22
CREDIT CARD FRAUD IN THE UK 2010
13
5. LAWS AND REGULATIONS IN UK
5.1 COMPUTER MISUSE ACT
The Computer Misuse Act was introduced in 1990 to secure computer Material against
unauthorized access or modification. Three categories of criminal offences were established tocover the following conduct.
1. Unauthorized access to computer material (basic hacking) including the illicitcopying of software held in any computer. Penalty: Up to six months imprisonment orup to a 5,000 fine.
2. Unauthorized access with intent to commit or facilitate commission of furtheroffences, which covers more serious cases of hacking. Penalty: Up to five years ofimprisonment and an unlimited fine.
3. Unauthorized modification of computer material, which includes:
I. Intentional and unauthorized destruction of software or data;II. The circulation of infected materials on-line.
III. An unauthorized addition of a password to a data file.Penalty: Up to five years of imprisonment and an unlimited fine.
You must not:
-
8/7/2019 IT LAW ASS..final
14/22
CREDIT CARD FRAUD IN THE UK 2010
14
Display any information which enables others to gain unauthorized access to computermaterial (this includes instructions for gaining such access, computer codes or otherdevices which facilitate hacking)
Display any information that may lead to any unauthorized modification of computermaterials (such modifications would include activities such as the circulation ofinfected software or the unauthorized addition of a password)
Display any material, which may incite or encourage others to carry out unauthorizedaccess to or modification of computer materials.
Credit and debit card fraud
The two pieces of legislation relevant to credit and debit card fraud are:
1. The Consumer Protection (Distance Selling) Regulations 2000(Statutory Instrument 2000 No.2334)
2. Financial Service (Distance Marketing) Regulations 2004(Statutory Instrument 2004 No.2095).
The former legislation states:
Payment by card
(2) Subject to paragraph (4), the consumer shall be entitled to be reaccredited, or
to have all sums returned by the card issuer, in the event of fraudulent use of his
payment card in connection with a contract to which this regulation applies by
another person not acting, or to be treated as acting, as the consumer's agent.
(3) Where paragraphs (1) and (2) apply, in any proceedings if the consumer
alleges that any use made of the payment card was not authorized by him it is for
the card issuer to prove that the use was so authorized.
(6) For the purposes of this regulation -
-
8/7/2019 IT LAW ASS..final
15/22
CREDIT CARD FRAUD IN THE UK 2010
15
"card issuer" means the owner of the card; and
"payment card" includes credit cards, charge cards, debit cards and store cards.
Computer misuse Act
This part of the law targets DoS (Denial of Service) attackers with punishments up to 10
years in prison. The law clarifies Britain's Computer Misuse Act, because the old
legislation did not address DoS attacks specifically.
The original act only mentioned penalties for modifying content on a computer without
authorization. Because of the ambiguity in the old law, teenager David Lennon was
cleared of all charges after being accused of sending his former boss 5 million emails.
A DoS attack means flooding a server with huge quantities of data (such as emails or
server requests) until the server collapses. A DDoS attack (Distributed Denial of Service)
is a more advanced DoS attack, where more than one computer is used to send the data or
requests to the server. Both DoS and DDos attacks are prosecuted under the same laws.
According to the new 2006 Act, impairing the operation of any computer, preventing
access to any program or data in a computer, and restricting the operation of any program
on a computer, are all crimes and are punishable with a maximum of 10 years in prison.
Also, causing someone else to do any or all of these crimes can get you into prison for 2
years.
-
8/7/2019 IT LAW ASS..final
16/22
CREDIT CARD FRAUD IN THE UK 2010
16
5.2 The British Police and Justice (2006) billChanges being introduced to the Computer Misuse Act (1990) under Part 5
(Miscellaneous) which could have serious implications for those on the murkier side of
computing. The Computer Misuse Act obviously needed updating, as most of the
threats in existence today were not possible 16 years ago.
An interesting insertion is section 3A Making, supplying or obtaining articles for use
in offence under section 1 or 3.
(1) A person is guilty of an offence if he makes, adapts, supplies or offers to
supply any article
(a) knowing that it is designed or adapted for use in the course of or in
connection with an offence under section 1 or 3; or
(b) Intending it to be used to commit, or to assist in the commission of,
an offence under section 1 or 3.
(2) A person is guilty of an offence if he obtains any article with a view to its
being supplied for use to commit, or to assist in the commission of, an offence
under section 1 or 3.
(3) In this section article includes any program or data held in electronic
form.
Maximum sentencing for unauthorized access to computer material has been raised to 2
years. The really interesting modifications come under section 3 Unauthorized acts with
intent to impair operation of computer,
-
8/7/2019 IT LAW ASS..final
17/22
CREDIT CARD FRAUD IN THE UK 2010
17
5.3 Information Technology Act-2000:Computer source document tampering: The person who changes the source code on
the website or any computer program will get a punishment up to 3 years of
imprisonment or fine.
Computer hacking: The individual who hacks the computer or computer devices will
get an imprisonment up to 3 years or a fine.
-
8/7/2019 IT LAW ASS..final
18/22
CREDIT CARD FRAUD IN THE UK 2010
18
6. CONCLUSION
Cyber crime affects more than the financial integrity of a business. There are many very real and
damaging consequences associated with Internet crime. Understanding the effects of cyber crime
is an important first step in comprehending the necessity of security measures on
a computer network. One of the main effects of cyber crime on a company is the loss of revenue.
Another is time wasted when IT personnel must devote great portions of their day handling such
incidences. Rather than working on productive measures for an organization, many IT staff
members spend a large percentage of their time handling security breaches and other problems
associated with cyber crime.
Although credit card fraud is on the rise, and credit card fraud on the internet is rising even more
dramatically, many savvy internet shoppers know that the reality is that its actually much safer
to enter your number on a secure online order form that it is to give your credit card to a waiter at
a restaurant. After all, whats to stop the waiter later from writing down your credit card number
and placing orders in the phone with it later?
Therefore, precautions need to be taken when giving out any confidential information, including
your credit card number, to avoid or reduce risks of being caught up in a credit card fraud
scheme. For instance:
never provide your credit card information on a website that is not a secure site never leave your credit cards or receipts lying around, never respond to emails that request you provide your credit card info via email keep an eye on your credit card EVERY time you use it and make sure you get it back as
quickly as possible
never give your credit card when you receive a phone call keep a list in a secure place with all of your account numbers and expiration dates Never sign a blank credit card receipt. Carefully draw a line through blank portions of the
receipt where additional charges could be fraudulently added.
If you move, notify your credit card issuers in advance of your change of address.
-
8/7/2019 IT LAW ASS..final
19/22
CREDIT CARD FRAUD IN THE UK 2010
19
Techniques used in online card-not-present fraud are becoming more and more sophisticated.
Traditional fraud screening tools can only determine if a credit card is legitimate or if the user
entered account information matches those on record. Today, fraudsters can obtain personal
credit card information, pose as the legitimate card holder, and bypass standard fraud checks. Formore fraud protection, there are websites, such as maxmind.com, that examine online
transactions from various angles. Their tools are not geared to towards verifying the authenticity
of the credit card details used for the purchase, but rather identifying traits and patterns that are
associated with fraudulent orders.
If you are still uncertain on the security of your credit card, mechanisms such as; intelligent fraud
detection computer systemswhich are used by banks and building societies, and can track
customer accounts for unusual spending patterns that may occur due to fraudulent activity on
lost, stolen or compromised cards. The banking industry continues to increase the effectiveness
and sophistication of customer-profiling neural network systems that identify unusual spending
patterns or high-risk transactions. If irregular spending is detected your bank or building society
will contact you to check if the transactions are genuine and, if not, an immediate block can be
put on your card. These systems are not only used for transactions taking place in the UK but
internationally as well.
For those living in the UK, there is the UKs fraud prevention service (CIFAS), which provides a
range of services to enable its member organizations to exchange information and help identify
and prevent fraud, including that relating to plastic cards. CIFAS main emphasis is on identity,
application and first-party fraud. Following specification by the Home Office under the Serious
Crime Act 2007, public sector organizations are able to join CIFAS and share information
reciprocally to prevent fraud.
All in all, credit card fraud is preventable. It may be challenging with technology forever
changing and getting enhanced; but with proper safety measures and laws to punish the wrong
doers whether it may be in the U.K, the U.S or anywhere else in the world, society will be able to
look forward to reduced risks of fraud.
-
8/7/2019 IT LAW ASS..final
20/22
CREDIT CARD FRAUD IN THE UK 2010
20
7. REFERENCES
y Cybercrime legislationRetrieved September 30, 2010 from;http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/documents/countryprof
iles/567-LEG-country%20profile-Philippines_5feb2008_En.pdf
y The top countries for cybercrimeRetrieved September 30, 2010 from;
http://www.msnbc.msn.com/id/19789995/
y Cybercrime AnalysisRetrieved October 5, 2010 from:
http://www.eurasiareview.com/201007104761/cybercrime-in-nigeria-analysis.html
y Computer cybercrime surveyRetrieved October 2, 2010 from:
http://www.digitalriver.com/v2.0img/operations/naievigi/site/media/pdf/FBIccs2005.pdf
y Credit card fraudRetrieved October 5, 2010 from:
http://en.wikipedia.org/wiki/Credit_card_fraud
y 21 tips to protect yourself from being a victim of credit card fraudRetrieved October 5, 2010 from:
http://www.scambusters.org/CreditCardFraud.html
y Reduce credit card with minFraudRetrieved October 5, 2010 from:
http://www.maxmind.com/app/ccv_overview
-
8/7/2019 IT LAW ASS..final
21/22
CREDIT CARD FRAUD IN THE UK 2010
21
y Steps to prevent credit card fraudRetrieved October 5, 2010 from:
http://sbinfocanada.about.com/od/insurancelegalissues/a/creditcardfraud.htm
y UK Credit cards.comRetrieved October 5, 2010 from:
http://uk.creditcards.com/credit-card-news/credit-card-customers-protection-goldtrail-
1360.php
y Virgin Money changes credit card order of paymentsRetrieved October 5, 2010 from:
http://uk.creditcards.com/credit-card-news/virgin-money-credit-card-payment-order-
1360.php
y Plastic card fraudRetrieved October 5, 2010 from:
http://uk.creditcards.com/credit-card-news/credit-card-fraud-rises-britain-1360.php
y A guide to the Credit Card of 2009Retrieved October 5, 2010 from:
http://www.creditcards.com/credit-card-news/credit-card-law-interactive-1282.php
y Retrial for teenage cyber vandalRetrieved October 5, 2010 from:
http://www.securelist.com/en/weblog?weblogid=186528531
y Cybercrime and the law: a review of UK computer crime legislationRetrieved October 6, 2010 from:
http://www.securelist.com/en/analysis/204792064/Cybercrime_and_the_law_a_review_o
f_UK_computer_crime_legislation
-
8/7/2019 IT LAW ASS..final
22/22
CREDIT CARD FRAUD IN THE UK 2010
22
y Retrieved October 6, 2010 from:http://www.securelist.com/en/weblog?weblogid=173378433
y Retrieved October 7, 2010 from:http://www.cifas.org.uk/