Cyber Crime - Potential threat to Online Sports betting industry

Introduction
Internet, once just an idea is now one of the fastest-growing areas of technical infrastructure development globally. Growing at the rate of more than 11 users per second, or 1 million new users each day, internet users now constitute 57% of the world population. Today, information and communication technologies (ICTs) are omnipresent and the trend towards digitization is growing with the wave of commercialization of the Internet. Originally, vendors provided basic networking products, and service providers offered the connectivity along with basic internet services, but now with advancement in technology it has become almost a "commodity" service where goods and services can be sold and purchased online.  This has been tremendously accelerated by the widespread and rapid adoption of browsers and the World Wide Web technology, allowing users easy access to information and data linked throughout the globe making people more and more dependent on technology. However, such dependence leads to people being more vulnerable to cyber threats and the biggest hope in overcoming these issues seems to lie in sophisticated security techniques, and most of all, educating the general public as well as employees about dangers lurking within social engineering and the various types of fraud. 
Many companies lose millions of dollars on lawsuits caused by cyberattacks. Cybercrime has become a well thought-out, complex, and expensive form of organized crime. This is why the growing industry of online sports betting is also vulnerable to the threat of cybercrime. This paper tries to educate the users and sports betting operators by recognising the potential threat posed by cyber-attacks on the online gambling market across the globe and the need for a multi-dimensional regulatory legislation to fight Cybercrime.     

Growth of Online Gambling
The advancement of technology and easy access to internet has made individuals dependent on internet for all their needs while sitting at one place. Social networking, online shopping, storing data, gaming, online studying, online jobs, every possible thing that a person can think of can be done through the medium of internet, which now includes gambling and sports betting as well. Increase in the number of internet users is clearly driving the online gambling & betting market. In 2016, about 46% of the global population had access to the internet as compared to 43.5% in 2015. The number is anticipated to rise due to digitalization in the Asia Pacific region. Thus, the growth of the online gambling & betting market is evident in the near future. Some reports project, estimated growth in online gambling revenues from USD 3.1 billion in 2001 to USD 24 billion in 2010. It’s important to recognize that the overall size of the sports betting market is difficult to estimate because regulations and record-keeping are inconsistent. There is no definitive resource, from nation to nation, that researchers can solidly rely on.  Records are too disparate to paint an entirely accurate picture. That said, it doesn’t mean that there aren’t reliable estimates. international sports betting is estimated to have a market capitalization of $250 billion. According to Statista, a highly-reputable data firm, licensed online sportsbooks account for upwards of $39.7 billion of this revenue. In 2009, the sports betting market was valued at $20 billion. By 2016, it was valued at $40 billion. With a present market capitalization of (conservatively) between $60-73 billion, the market has conservatively grown at a rate of $10 billion per year. If this pace continues, worldwide, sports betting will occupy an increasingly significant share of the world market.
Growth in the internet gambling or online gambling is because internet allows people to circumvent gambling restrictions. Online casinos are widely available, most of them hosted in countries with liberal laws or no regulations on internet gambling. Users can open accounts online, transfer money and play games of chance from remote locations using local currencies with the help payment services such as Neteller, Skrill, etc. The majority of legal sportsbooks found online are operated over the internet from jurisdictions separate from the clients they serve, usually to get around various gambling laws in select markets. They take bets “up-front”, meaning the bettor must pay the sportsbook before placing the bet. Illegal bookies, due to the nature of their business, can operate literally anywhere but only require money from losing bettors, creating the possibility of debt to the bookie from the bettor. Thus, with the development of internet along with the growth of online gambling, it is evident that a lot of money and / or information is involved and is being transferred every day from one location to another, attracting cyber criminals to take advantage from this profit-making industry.
Cybercrime – Potential threat to online Gambling.
Cyber criminals often use illegal methods directed by means of electronic operations that target the security of computer systems and the data processed by them, which in a narrow sense is termed as “Cybercrime”. Cybercrime in a broader sense (computer-related crimes) covers any illegal behaviour committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession and offering or distributing information by means of a computer system or network. Consequently, growth of the information society owing to the growth of internet along with recent growth of online gambling is accompanied by new and serious threats. Attacks against information infrastructure and internet services now have the potential to harm society in new and critical ways. Online fraud and hacking attacks are just some examples of computer-related crimes that are committed on a large scale every day. The financial damage caused by cybercrime is reported to be enormous. In 2003 alone, malicious software caused damages of up to USD 17 billion. Today, these numbers have increased tremendously so much so that cybercriminals generate revenue of USD 1.5 trillion annually and are more organised and professional. It appears that the damage and thus security demands on a global scale are only going to continue to grow as the annual revenue generated by cybercriminals is expected to go up to USD 6 trillion by 2021. Given these statistics, rapid growth in online gambling industry is expected to aid cybercriminals as they get more opportunities to follow the money and in sports gaming—legalized or not—there’s plenty of it.
Illegal Access to Information
Sports betting operators store massive amount of information and data pertaining to the users placing bets on their respective websites and every day new users are sharing more and more sensitive information such as credit/ debit card details, passwords, personal details, and such other confidential information that has made users and operators both vulnerable to cybercrimes. As the offenders can hack into the operators’ servers or a users’ computer system to access this information via the internet from almost any place in the world. Information pertaining to trade secrets of the operators, customer data base, client personal details, credit card/ debit card/ account details, business projections and intellectual property can be easily accessed by alleged cybercriminals. Moreover, hackers nowadays can also access information pertaining to players, games, game analysis, strategies and such other information that is useful for the hackers to manipulate a bet in his/ her favour and can place bets within the guidelines of a completely legitimate and government-sanctioned gambling structure. The value of sensitive information and the ability to access it remotely makes data espionage highly interesting. Offenders use various techniques to access victims’ computers including software to scan for unprotected ports or circumvent protection measures, as well as “social engineering”. Recently, there have been incidents where a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people into breaking normal security procedures and disclose sensitive information with the intention of gaining access to computer systems and/ or online gambling account(s). Moreover, social engineering is usually used to entice online gamblers to gain information and is very successful, because the weakest link in computer security is often the users operating the gambling website. One example is “phishing”, which has recently become a key crime committed in cyberspace and describes attempts to fraudulently acquire sensitive information (such as passwords) by masquerading as a trustworthy gambling website or business (e.g. financial institution) in a seemingly official electronic communication. Further, offenders usually target business secrets, data stored on private computers and information pertaining to players and future games. They can use this information for their own purposes (e.g. bank-account details to make money transfers) or sell it to a third party or place bets on gambling websites or commit money laundering or use data/information for match fixing. Offenders can even intercept communications between users (such as e-mails) or other forms of data transfers (when users upload data onto webservers or access web-based external storage media in order to record the information exchanged. In this context, offenders can in general target any communication infrastructure (e.g. fixed lines or wireless) and any Internet service (e.g. e-mail, chat or VoIP communications). To gain access to sensitive information, some offenders set up access points close to locations where there is a high demand for wireless access (e.g. near bars and hotels). The station location is often named in such a way that users searching for an Internet access point are more likely to choose the fraudulent access point. If users rely on the access provider to ensure the security of their communication without implementing their own security measures, offenders can easily intercept communications. The use of fixed lines does not prevent offenders from intercepting communications. Data transmissions passing along a wire emit electromagnetic energy. If offenders use the right equipment, they can detect and record these emissions and may be able to record data transfers between users’ computers and the connected system, and also within the computer system.
Use of Encryption Technology

Data and information that is stored by online gambling operators is mostly encrypted to safeguard the interest of all the relevant stakeholders. Encryption is the use of secret codes that can be translated into meaningful communications only by authorized persons who have knowledge of the code. In other words, it is a technique of turning a plain text into an obscured format by using an algorithm. Like anonymity, encryption is not new, but computer technology has transformed the field. For a long-time it was subject to secrecy. In an interconnected environment, such secrecy is difficult to maintain, thus, making data and information stored by operators vulnerable to cyber-attacks. There are different technical strategies to cover encrypted data and several software tools are available to automate these processes. Strategies range from analysing weakness in the software tools used to encrypt files, searching for encryption passphrases and trying typical passwords, to complex and lengthy brute-force attacks. The term “brute-force attack” is used to describe the process of identifying a code by testing every possible combination. Depending on encryption technique and key size, this process could take decades. For example, if an offender uses encryption software with a 20-bit encryption, the size of the keyspace is around one million. Using a current computer processing one million operations per second, the encryption could be broken in less than one second. However, if offenders use a 40-bit encryption, it could take up to two weeks to break the encryption. In 2002, the
Wall Street Journal was for example able to successfully decrypt files found on an Al Qaeda computer that were encrypted with 40-bit encryption. Using a 56-bit encryption, a single computer would take up to 2 years to break the encryption. If offenders use a 128-bit encryption, a billion computer systems operating solely on the encryption could take thousands of billions years to break it. The latest version of the popular encryption software PGP permits 1024-bit encryption.

That said, online sports betting operators add encryption into important files like trade secrets, details of odd, game history and analysis and other sensitive information. If an offender gets into their network, the files will be meaningless to him but could be sold in the black market or to the competitors as sports betting is a very competitive market. Operators can encrypt important data such as credit card/ debit card/bank account numbers to protect their customers. However, with simple and basic software’s cyber criminals can decrypt these files and gain access to them. Thus, the availability and use of encryption technologies by criminals is a challenge for law-enforcement agencies.

Potential Financial Loss
More and more casinos and sports betting operators are incorporating internet services into their casinos and betting models, with benefits of 24-hour availability and worldwide accessibility. If offenders gain access and succeed in preventing computer systems used by the stakeholder from operating smoothly, this can result in great financial losses for all the stakeholders involved. If offenders are able to access the computer system, they can destroy hardware. However, for highly profitable sports betting businesses, the financial damages caused by attacks on the computer system are often far greater than the mere cost of computer hardware. Web-based scams pose a much higher and challenging threat on the businesses. Examples of these remote attacks against computer systems include computer worms and denial-of-service (DoS) attacks. Computer worms are a subgroup of malware (like computer viruses). They are self-replicating computer programs that harm the network by initiating multiple data-transfer processes. They can influence computer systems by hindering the smooth running of the computer system, using system resources to replicate themselves over the Internet or generating network traffic that can close down availability of certain services (such as websites). While computer worms generally influence the whole network without targeting specific computer systems, DoS attacks target specific computer systems. A DoS attack makes computer resources unavailable to their intended users. By targeting a computer system with more requests than the computer system can handle, offenders can prevent users from accessing the computer system, checking e-mails, reading the news, booking a flight or downloading files. In 2000, within a short time, several DoS attacks were launched against well-known companies such as CNN, eBay and Amazon. Similar attacks were reported in 2009 on government and commercial websites in the US and South Korea. As a result, some of the services were not available for several hours and even days. Thus, with over 400,000 DDOS attacks reported every month and 6.5 million DDOS attacks per year there is a serious threat that online gambling websites might encounter causing huge financial loss to all the stakeholders.
Impact of Virtual payment and currencies
Further, with the rise of cryptocurrencies in the past few years it is projected to fuel the growth of online gambling & betting market. Cryptocurrencies have started to gain popularity due to benefits over other traditional funding methods and the demand for anonymous payments which led to the development of virtual payment systems and virtual currencies enabling anonymous payments. Gambling with cryptocurrencies does not require legalization as real money is not used. Bitcoin was the first cryptocurrency used for payments by various online gambling platforms. At the beginning of 2017, the total value of cryptocurrencies was about USD 17.7 billion and is projected to rise over the next 5 years. Growth of cryptocurrencies and virtual payment services along with the growth of online gambling has attracted cyber criminals to launder money generated illegally and pipe it through various cryptocurrencies and digital payment services. Thus, online casinos and betting websites can also be used in money laundering and activities financing terrorism. If offenders use online casinos within the laying phase that do not keep records or are located in countries without money-laundering legislation, it is difficult for law-enforcement agencies to determine the origin of funds. It is difficult for countries with gambling restrictions to control the use or activities of online casinos and betting websites.
Aid to Terrorism
Further, terrorist organizations can make use of such illegal techniques to access gambling websites to transfer money or collect funds.  They can use websites to publish information on how to transfer money/ deposit fund, e.g. which bank account should be used for transactions. Another approach is the implementation of online credit-card donations. Both approaches carry the risk that the published information will be discovered and used to trace back financial transactions. It is therefore likely that anonymous electronic payment systems will become more popular. To avoid discovery, terrorist organizations are trying to hide their activities by involving non-suspicious players such as online gambling websites. Another (Internet-related) approach is the operation of fake websites. It is relatively simple to set up an online sports betting website on the Internet. One of the biggest advantages of the network is the fact that businesses can be operated worldwide. Proving that financial transactions that took place on those sites are not regular bets but terror funds is not at all easy. One strategy used by offenders is to ensure that each victim’s financial loss is below a certain limit. With a “small” loss, victims are less likely to invest time and energy in reporting and investigating such crimes as it would be necessary to investigate every transaction – which can be difficult if the online sports betting website is operated in a different jurisdiction or anonymous payment systems are used.
Challenges Involved
It is pertinent to note that current legal regulation of Internet-based financial services is not as stringent as traditional financial regulation. Apart from gaps in legislation, difficulties in regulation arise from challenges in customer / user verification, since accurate verification may be compromised, if the sports betting operator and customer never meet. In addition, the lack of personal contact makes it difficult to apply traditional know-your-customer procedures. Furthermore, the Internet transfers often involve the cross-border participation of providers in various countries. Finally monitoring transactions is particularly difficult if sports betting operators allow customers to transfer value in a peer-to-peer model. E-mails with illegal content often pass through a number of countries during the transfer from sender to recipient, or illegal content is stored outside the country. Within cybercrime investigations, close cooperation between the countries involved is very important. The existing mutual legal assistance agreements are based on formal, complex and often time-consuming procedures, and in addition often do not cover computer-specific investigations. The computer technology currently in use is basically the same around the world. Due to standardization, the network protocols used in countries on the African continent are the same as those used in the United States. Standardization enables users around the world to access the same services over the Internet and one of the reasons why incidents of cyber-attacks remains challenging is the constant technical development, as well as the changing methods and ways in which the offences are committed. Thus, the legal, technical and institutional challenges posed by the issue of cybersecurity of gambling websites are global and far reaching, and can only be addressed through a coherent strategy taking into account the role of different stakeholders and existing initiatives, within a framework of international cooperation.
However, it is difficult to base cooperation in cybercrime on principles of traditional mutual legal assistance. The formal requirements and time needed to collaborate with foreign law-enforcement agencies often hinder investigations. Data vital for tracing offences are often deleted after only a short time. This short investigation period is problematic, because traditional mutual legal assistance regime often takes time to organize. The principle of dual criminality also poses difficulties, if the offence is not criminalized in one of the countries involved in the investigation. Offenders may be deliberately including third countries in their attacks in order to make investigation more difficult.  The harmonization of cybercrime-related laws and international cooperation would help. Two approaches to improve the speed of international cooperation in cybercrime investigations are the G8 24/7 Network and the provisions related to international cooperation in the Council of Europe Convention on Cybercrime.

Conclusion

It is evident that the investigation and prosecution of cybercrime presents a number of challenges for law-enforcement agencies. It is vital not only to educate the people involved in the fight against cybercrime, but also to draft adequate and effective legislation considering rapid growth in internet technology along with increase in likeliness towards legalising online gambling across the globe and monitor the effectiveness of existing provisions. The implementation of existing strategies could enable developing countries to benefit from existing insights and experience.

Thus, to successfully draft a legislation and/ or policy, legislative body shall consider the regional as well as international difference with regards to cybersecurity and identity the relevant issues related to cybercrime by addressing the multi-dimensional challenges and adopt comprehensive approach that should include overall policies, legislation, education and awareness raising, capacity building, research as well as technical approaches. Furthermore, such approach needs to involve various stakeholders such as government, ministries and government agencies, private sector, schools and universities, customary leaders, community, international and regional bodies, law enforcement, judges, customs, prosecutors, lawyers, civil society and NGOs.

Strategies and especially legislation that is developed to address the challenges of Cybercrime should on the one hand side be in line with international standards and on the other hand side reflect the uniqueness of the region. There should be a provision criminalizing the intentional and illegally accessing sensitive information from users and sports betting operators and such related acts. Especially in this respect international standards should be taken into consideration. The legislation should in addition cover the criminalization of fraudulent financial transactions and development of fake and misleading gambling websites. An exemption that enables law enforcement agencies to carry out investigations should be included and shall allow international law enforcement agencies to work together harmoniously.

Further, in the fight against cybercrime and related attacks to their websites and user data, sports betting operators shall also play a key role in it. They shall adopt well-protected computer systems/ servers and encrypted files that are difficult to attack. Improving technical protection by implementing proper security standards is an important first step. For example, changes in the online banking system (e.g. the switch from TAN to ITAN) have eliminated much of the danger posed by current “phishing” attacks, demonstrating the vital importance of technical solutions. Technical protection measures should include all elements of the technical infrastructure – the core network infrastructure, as well as the many individually connected computers worldwide. Two potential target groups can be identified for protecting website users and betting operators: end users and betting websites (direct approach) and service providers and software companies. User protection can be achieved indirectly, by securing the services consumers use, such as online banking and virtual currency. This indirect approach to protecting bettors and operators can reduce the number of people and institutions that need to be included in steps to promote technical protection. On the other hand, as sports betting operators can directly contact users, they can operate as a guarantor of security activities (e.g. the distribution of protection tools and information on the current status of most recent scams) and educating their users of latest cybercrime threats.  

Thus, as we spend more time and money online and on sports betting websites, opportunities for criminals to attack users in their cyber scams will only continue to grow. In addition to pursuing profits, the sports betting operators and relevant stakeholders need to be educators and to a certain respect, enforcers of appropriate behaviour in the playing of the users on their gambling websites. It is hoped that the online gambling websites related issues identified here would be noticed by the stakeholders and the society so that these problems may be solved through education, laws and appropriate technologies. It is clear that implementing measures to mitigate cybercrime is necessary..


References

1.      Regarding the threat of attacks against computer systems integrated in cars, see: BBC News, Cars safe from computer viruses, 11.05.2005, available at:
2.      Regarding the possibilities and technology available to access the Internet in developing countries, see: Esteve/Machin,
Devices to access Internet in Developing countries, available at:  www2007.org/workshops/paper_106.pdf
3.      Current reports highlight that around 11 per cent of the African population has access to the Internet. See
4.      Regarding the attack against online service in Estonia, see: Toth, Estonia under cyberattack, available at:
www.cert.hu/dmdocuments/Estonia_attack2.pdf. Regarding the attacks against major online companies in the United States in 2000, see: Sofaer/Goodman, Cyber Crime and Security – The Transnational Dimension, in Sofaer/Goodman, The Transnational Dimension of Cyber Crime and Terrorism, 2001, page 14, available at: http://media.hoover.org/documents/0817999825_1.pdf.
The attacks took place between 07.02.2000 and 09.02.2000. For a full list of attacked companies and the dates of the attacks, see: Yurcik, Information Warfare Survivability: Is the Best Defense a Good Offence?, page 4, available at: www.projects.ncassr.org/hackback/ethics00.pdf.
5.      See Hayden, Cybercrime’s impact on Information security, Cybercrime and Security, IA-3, page 3.
6.      Cyber Security Communique, American Gas Association, 2010, available at:
7.      For an overview of cybercrime-related legislation and its compliance with the best practices defined by the Convention on Cybercrime, see the country profiles provided on the Council of Europe website, available at:
www.coe.int/cybercrime/. See, for example, the following surveys on national cybercrime legislation: ITU Survey on Anti-Spam Legislation Worldwide 2005, page 5, available at:
8.      Regarding the transnational dimension of cybercrime, see: Sofaer/Goodman, Cyber Crime and Security – The Transnational Dimension in Sofaer/Goodman, The Transnational Dimension of Cyber Crime and Terrorism, 2001, page 7, available at: http://media.hoover.org/documents/0817999825_1.pdf.
9.      Regarding network protocols, see: Tanebaum, Computer Networks; Comer, Internetworking with TCP/IP – Principles,
Protocols and Architecture.
10.  Regarding cybersecurity in developing countries, see: World Information Society Report 2007, page 95, available at:
11.  The Phishing Guide Understanding & Preventing Phishing Attacks, available at: www.nextgenss.com/papers/NISR-WP-Phishing.pdf
12.  Crime and Abuse in e-Business, IPTS Report, available at:
13.  Collier/Spaul, Problems in Policing Computer Crime, Policing and Society, 1992, Vol.2, page, 308, available at:
14.  Zittrain/Edelman, Documentation of Internet Filtering Worldwide, available at:
15.  Sifferd, The Peer-to-Peer Revolution: A Post-Napster Analysis of the Rapidly Developing File-Sharing Technology, Vanderbilt Journal of Entertainment Law & Practice, 2002, 4, 93.
16.  Emigh, Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures, 2005;
17.  McCusker, Transnational organized cybercrime: distinguishing threat from reality, Crime Law Soc Change, Vol. 46, page 270
18.  Conway, Terrorist Use of the Internet and Fighting Back, Information and Security, 2006
19.  Gercke, Cyberterrorism, How Terrorists Use the Internet, Computer und Recht, 2007, page 62 et seq.; Lewis, The Internet and Terrorism, available at:
20.  See: Kabay, A Brief History of Computer Crime: An Introduction for Students, 2008, page 5, available at:


Comments

  1. Thanks for posting this info. I just want to let you know that I just check out your site and I find it very interesting and informative. I can't wait to read lots of your posts. เซ็กซี่บาคาร่า

    ReplyDelete

Post a Comment

Popular Posts