Cybercrime Flashcards
Offences under the Computer Misuse Act 1990
The Computer Misuse Act 1990 Act ensures the United Kingdom’s compliance with the European Union Framework Decision on Attacks Against Information Systems. This compliance requires that penalties relating to ‘hacking’ into computer systems, unauthorised access to computer material, the intentional serious hindering of a computer system and importing tools for cyber crime, reflect the seriousness of the criminal activities that can be involved in committing these offences.
Unauthorised Access to Computer Material (‘Hacking’)—Computer Misuse Act 1990, s. 1
- Triable either way
- Two years’ imprisonment and/or a fine on indictment
- Six months’ imprisonment and/or a fine summarily
The Computer Misuse Act 1990, s. 1 states:
(1) A person is guilty of an offence if—
(a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer or to enable any such access to be secured;
(b) the access he intends to secure, or enable to be secured, is unauthorised; and
(c) he knows at the time when he causes the computer to perform the function that that is the case.
(2)
The intent a person has to have to commit an offence under this section need not be directed at—
(a) any particular program or data;
(b) a program or data of any particular kind; or
(c) a program or data held in any particular computer.
Unauthorised Access to Computer Materials
‘Computer’ is not defined and therefore must be given its ordinary meaning. Given the multiple functions of many electronic devices such as mobile phones, this could arguably bring them within the ambit of the Act.
This offence involves ‘causing a computer to perform any function’, which means more than simply looking at material on a screen or having any physical contact with computer hardware. In the latter case an offence of criminal damage may be appropriate. Any attempt to log on would involve getting the computer to perform a function (even if the function is to deny you access!).
Any access must be ‘unauthorised’. If the defendant is authorised to access a computer, albeit for restricted purposes, then it was originally held that he/she did not commit this offence if he/she then used any information for some other unauthorised purpose (e.g. police officers using data from the Police National Computer (PNC) for private gain (DPP v Bignell [1998] 1 Cr App R 1)). However, in R v Bow Street Metropolitan Stipendiary Magistrate, ex parte Government of the USA [2000] 2 AC 216 it was held that where an employee accessed accounts that fell outside his normal scope of work and passed on the information, in this instance to credit card forgers, he was not authorised to access the specific data involved.
Essentially, the purpose of this section is to address unauthorised access as opposed to unauthorised use of data, and behaviour such as looking over a computer operator’s shoulder to read what is on the screen would not be covered.
In order to prove the offence under s. 1 you must show that the defendant intended to secure access to the program or data. This is therefore an offence of ‘specific intent’ and lesser forms of mens rea such as recklessness will not do.
You must also show that the defendant knew the access was unauthorised.
The Privacy and Electronic Communications (EC Directive) Regulations 2003 (SI 2003/2426) regulate the use of cookies and internet tracking devices, along with the use of unsolicited email and text messages. Guidance in their extent and practical effect is prepared by the Office of the Information Commissioner.
The powers of entry, search and seizure under the Police and Criminal Evidence Act 1984 apply to this offence.
The 1990 Act defines a number of its terms at s. 17 which states:
(2) A person secures access to any program or data held in a computer if by causing a computer to perform any function he—
(a) alters or erases the program or data;
(b) copies or moves it to any storage medium other than that in which it is held or to a different location in the storage medium in which it is held;
(c) uses it; or
(d) has it output from the computer in which it is held (whether by having it displayed or in any other manner);
and references to access to a program or data (and to an intent to secure such access) shall be read accordingly.
(3) For the purposes of subsection (2)(c) above a person uses a program if the function he causes the computer to perform—
(a) causes the program to be executed; or
(b) is itself a function of the program.
(4) For the purposes of subsection (2)(d) above—
(a) a program is output if the instructions of which it consists are output; and
(b) the form in which any such instructions or any other data is output (and in particular whether or not it represents a form in which, in the case of instructions, they are capable of being executed or, in the case of data, it is capable of being processed by a computer) is immaterial.
(5) Access of any kind by any person to any program or data held in a computer is unauthorised if—
(a) he is not himself entitled to control access of the kind in question to the program or data; and
(b) he does not have consent to access by him of the kind in question to the program or data from any person who is so entitled,
but this subsection is subject to section 10.
(6) References to any program or data held in a computer include references to any program or data held in any removable storage medium which is for the time being in the computer; and a computer is to be regarded as containing any program or data held in any such medium.
. . .
(8) An act done in relation to a computer is unauthorised if the person doing the act (or causing it to be done)—
(a) is not himself a person who has responsibility for the computer and is entitled to determine whether the act may be done; and
(b) does not have consent to the act from any such person.
In this subsection ‘act’ includes a series of acts.
Definition of Terms
Securing access will therefore include:
- altering or erasing a program or data;
- copying or moving a program or data to a new storage medium;
- using data or having it displayed or ‘output’ in any form from the computer in which it is held.
Under s. 17(5) access is ‘unauthorised’ if the person is neither entitled to control that type of access to a program or data, nor does he/she have the consent of any person who is so entitled. The provision under s. 17(5)(a) was the basis for the decision in Bow Street (see para. 2.5.2.1). This definition does not affect the powers available to any ‘enforcement officers’, i.e. police officers or other people charged with a duty of investigating offences (s. 10).
Unauthorised Access with Intent to Commit Further Offences—Computer Misuse Act 1990, s. 2
- Triable either way
- Five years’ imprisonment and/or a fine on indictment
- Six months’ imprisonment and/or a fine summarily
The Computer Misuse Act 1990, s. 2 states:
(1) A person is guilty of an offence under this section if he commits an offence under section 1 above (‘the unauthorised access offence’) with intent—
(a) to commit an offence to which this section applies; or
(b) to facilitate the commission of such an offence (whether by himself or by any other person);
and the offence he intends to commit or facilitate is referred to below in this section as the further offence.
(2) This section applies to offences—
(a) for which the sentence is fixed by law; or
(b) for which a person of twenty-one years of age or over (not previously convicted) may be sentenced to imprisonment for a term of five years (or, in England and Wales, might be so sentenced but for the restrictions imposed by section 33 of the Magistrates’ Courts Act 1980).
(3) It is immaterial for the purposes of this section whether the further offence is to be committed on the same occasion as the unauthorised access offence or on any future occasion.
(4) A person may be guilty of an offence under this section even though the facts are such that the commission of the further offence is impossible.
Unauthorised Access to Computers with Intent
The defendant must be shown to have had the required intent at the time of the access or other actus reus.
The intended further offence does not have to be committed at the same time, but may be committed in future (e.g. where the data is used to commit an offence of blackmail or to secure the transfer of funds from a bank account).
The provision as to impossibility (s. 2(4)) means that a person would still commit the offence if he/she tried, say, to access the bank account of a person who did not in fact exist.
Unauthorised Acts with Intent to Impair, or with Recklessness as to Impairing, Operation of Computer, etc.—Computer Misuse Act 1990, s. 3
- Triable either way
- 10 years’ imprisonment and/or a fine on indictment
- Six months’ imprisonment and/or a fine summarily
The Computer Misuse Act 1990, s. 3 states:
(1) A person is guilty of an offence if—
(a) he does any unauthorised act in relation to a computer;
(b) at the time when he does the act he knows that it is unauthorised; and
(c) either subsection (2) or subsection (3) below applies.
(2) This subsection applies if the person intends by doing the act—
(a) to impair the operation of any computer;
(b) to prevent or hinder access to any program or data held in any computer; or
(c) to impair the operation of any such program or the reliability of any such data.
(3) This subsection applies if the person is reckless as to whether the act will do any of the things mentioned in paragraphs (a) to (c) of subsection (2) above.
Unauthorised Acts with Intent to Impair Operation of Computer, etc.
This section is designed to ensure that adequate provision is made to criminalise all forms of denial of service attacks in which the attacker denies the victim(s) access to a particular resource, typically by preventing legitimate users of a service accessing that service. An example of this is where a former employee, acting on a grudge, impaired the operation of a company’s computer by using a program to generate and send 5 million emails to the company (DPP v Lennon [2006] EWHC 1201 (Admin)).
The intention referred to in s. 3(2), or the recklessness referred to in s. 3(3), need not relate to any particular computer, any particular program or data, or a program or data of any particular kind (s. 3(4)). An ‘unauthorised act’ can include a series of acts, and a reference to impairing, preventing or hindering something includes a reference to doing so temporarily (s. 3(5)).
The ‘hindering’ provided by this section is intended to cover programs that generate denial of service attacks, or malicious code such as viruses.
Causing a computer to record that information came from one source when it in fact came from another clearly affects the reliability of that information for the purposes of s. 3(2)(c) (Zezev v USA; Yarimaka v Governor of HM Prison Brixton [2002] EWHC 589 (Admin)).
Unauthorised Acts Causing, or Creating Risk of, Serious Damage— Computer Misuse Act 1990, s. 3ZA
- Triable on indictment
- 14 years’ imprisonment and/or a fine
The Computer Misuse Act 1990, s. 3ZA states:
(1) A person is guilty of an offence if—
(a) the person does any unauthorised act in relation to a computer;
(b) at the time of doing the act the person knows that it is unauthorised;
(c) the act causes, or creates a significant risk of, serious damage of a material kind; and
(d) the person intends by doing the act to cause serious damage of a material kind or is reckless as to whether such damage is caused.
(2) Damage is of a ‘material kind’ for the purposes of this section if it is—
(a) damage to human welfare in any place;
(b) damage to the environment of any place;
(c) damage to the economy of any country; or
(d) damage to the national security of any country.
(3) For the purposes of subsection (2)(a) an act causes damage to human welfare only if it causes—
(a) loss to human life;
(b) human illness or injury;
(c) disruption of a supply of money, food, water, energy or fuel;
(d) disruption of a system of communication;
(e) disruption of facilities for transport; or
(f) disruption of services relating to health.
(4) It is immaterial for the purposes of subsection (2) whether or not an act causing damage—
(a) does so directly;
(b) is the only or main cause of the damage.
Unauthorised Acts Causing, or Creating Risk of, Serious Damage
Reference to doing an act includes a reference to causing an act to be done, and ‘act’ includes a series of acts. In reference to a country, this includes a reference to a territory, and to any place in, or part or region of, a country or territory (s. 3ZA(5)).
Where an offence under this section is committed as a result of an act causing or creating a significant risk of serious damage to human welfare of the kind mentioned in s. 3ZA(3)(a) or (b), or serious damage to national security, a person guilty of the offence is liable, on conviction on indictment, to imprisonment for life, or to a fine, or to both (s. 3ZA(7)).
Section 3ZA(1) sets out the elements of the offence. The actus reus (or conduct element) is that the accused undertakes an unauthorised act in relation to a computer (as in s. 3(1)(a) of the 1990 Act) and that act causes, or creates a significant risk of causing, serious damage of a material kind. The mens rea (namely the mental elements of the offence) is that the accused, at the time of committing the act, knows that it is unauthorised (as in s. 3(1)(b) of the 1990 Act) and intends the act to cause serious damage of a material kind or is reckless as to whether such damage is caused. An unauthorised act is defined in s. 17(8) of the 1990 Act as an act where the person doing the act does not have responsibility for the computer in question, which would thereby entitle him or her to determine whether the act is undertaken, and does not have the consent of the person responsible for the computer to commit the act.
Making, Supplying or Obtaining Articles for Use in Offences under s. 1, 3 or 3ZA—Computer Misuse Act 1990, s. 3A
- Triable either way
- Two years’ imprisonment and/or a fine on indictment
- Six months’ imprisonment and/or a fine summarily
The Computer Misuse Act 1990, s. 3A states:
(1) A person is guilty of an offence if he makes, adapts, supplies or offers to supply any article intending it to be used to commit, or to assist in the commission of, an offence under section 1, 3 or 3ZA.
(2) A person is guilty of an offence if he supplies or offers to supply any article believing that it is likely to be used to commit, or to assist in the commission of, an offence under section 1, 3 or 3ZA.
(3) A person is guilty of an offence if he obtains any article—
(a) intending to use it to commit, or to assist in the commission of, an offence under section 1, 3 or 3ZA, or
(b) with a view to
its being supplied for use to commit, or to assist in the commission, of, an offence under section 1, 3 or 3ZA.
(4) In this section ‘article’ includes any program or data held in electronic form.
Making, Supplying or Obtaining Articles for Use in Offences under s. 1, 3 or 3ZA
This section creates three offences designed to combat the market in electronic tools, such as ‘hacker tools’ which can be used for hacking into computer systems, and the increase in the use of such tools in connection with organised crime.
The Serious Crime Act 2015 amended s. 3A(3) of the 1990 Act to ensure that the offence provided for in s. 3A also applies to the making etc. of hacker tools intended to be used to commit the new s. 3ZA offence. Under the existing offence, the prosecution was required to show that the individual obtained the tool with a view to its being supplied for use to commit, or assist in the commission of an offence under s. 1 or 3 of the Act. Subsection (3) has been extended to include an offence of obtaining a tool for use to commit a Computer Misuse Act offence (including one under the new s. 3ZA) regardless of an intention to supply that tool.
The Data Protection Act 2018
The Data Protection Act 2018 is intended to provide a comprehensive legal framework for data protection in the UK. It sets standards for protecting personal data, in accordance with the General Data Protection Regulation (EU) 2016/679 (‘GDPR’). The GDPR forms part of the data protection regime alongside the 2018 Act.
The four main matters provided for are general data processing, law enforcement data processing, data processing by the intelligence services, and regulatory oversight and enforcement.
The responsibility for compliance with the principles relating to processing of personal data rests on the shoulders of the ‘controller’, meaning an employer, public authority, agency or any other body which alone or jointly with others determines the purposes and means of the processing of personal data (Article 2(d) of the GDPR). The controller is required to notify the supervisory authority before starting to process data.
The supervisory authority with regulatory oversight of the GDPR in the UK is undertaken by the Information Commissioner who monitors the data protection level, gives advice to the government about administrative measures and regulations, and starts legal proceedings when the data protection regulation has been violated (Article 28).
Individuals may lodge complaints about violations to the Information Commissioner.
The Data Protection Act 2018, s. 2 states:
(1) The GDPR, the applied GDPR and this Act protect individuals with regard to the processing of personal data, in particular by —
(a) requiring personal data to be processed lawfully and fairly, on the basis of the data subject’s consent or another specified basis,
(b) conferring rights on the data subject to obtain information about the processing of personal data and to require inaccurate personal data to be rectified, and
(c) conferring functions on the Commissioner, giving the holder of that office responsibility for monitoring and enforcing their provisions.