54
COM6650/6655 Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime Dr. Amanda Sharkey Department of Computer Science University of Sheffield

COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

Embed Size (px)

Citation preview

Page 1: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

COM6650/6655 ProfessionalIssuesinInformationTechnology PartIX:ComputerMisuseandComputerCrime

Dr.AmandaSharkey

DepartmentofComputerScienceUniversityofSheffield

Page 2: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• Takehomeexam:tobereleasedonMoleonTuesday1stDecember

• 3exam-stylequestions• DueMonday14thDecember

2

Page 3: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• 1Introduction• 2WhatisComputerMisuse?• 3ComputerFraud• 4SoftwarePiracy• 5Viruses• 6Hacking• 7TheComputerMisuseAct1990• 8Conclusions• 9Summary

Page 4: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• 1Introduction!

• IThaschangedthewayinwhichcrimesarecommitted:• Valuableassetsarestoredascomputerdata;• Telecommunicationshavebroadenedthegeographyofcrime;

• Computershavegivenrisetoanewrangeofcriminalactivitiessuchascomputerhackingandviruses.

• Muchofthisactivityhascapturedtheimaginationofthepublic,butiscomputercrimereallyabigproblem?

Page 5: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• 1.1Whatisthescaleofcomputercrime?• DataoncomputercrimeiscollectedbytheAuditCommission

(http://www.auditcommission.gov.uk).!

• Theftcoverslosstoemployersthroughtheftofdataorsoftware;seldomdoesthiscauseanydirectloss.

1997updatetothissurveyfound10%increasesince1994innumberoforganisationsreportingcomputermisuse

TypeofMisuse

1994 1990 1987

No. DirectLoss No. DirectLoss No. DirectLoss

Fraud 108 2,904,430 73 1,102,642 61 2,526,751

Theft 121 196,305 27 1,000 22 34,500

Hacking 47 65,500 26 31,500 35 100

Viruses 261 30,485 54 5,000 0 0

Totals 537 3,196,720 180 1,140,142 118 2,561,351

Page 6: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• AuditCommissionUK(2005)figurefortotalvalueoffraudinpublicsectorwas£83million(notrestrictedtocomputerfraud)

• Problemofunder-reporting.• USsurvey(2004)estimatedthatphishingattackscostUSbanks$1.2billionin2003,and57millionAmericanshadreceivedphishinge-mails.

Page 7: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

2012 Cost of Cyber Crime Study: United States

•Ponemonins[tutereport:

•Averageannualcostofcybercrimefor56organisa[onswas$8.9millionperyear

•Mostcostly:denialofservice,maliciousinsidersandweb-baseda]acks.

7

Page 8: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

2WhatisComputerMisuse?• Inthelate1980stherewasgrowingconcernabouthackersandthedamagetheycouldcause.

• Twostudies:ScottishLawCommission(reported1987),EnglishLawCommission(reported1989)!

• ScottishLawCommissionidentifiedeightdifferentcategoriesofcomputermisuseina1987report.

• PromptedtheComputerMisuseAct1990(CMA).• Bearinmindthattheactionsdescribedbelowwillsometimesgiverisetoliabilitiesundercivillaw.

Page 9: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

!EightdifferentcategoriesofcomputermisuseidentifiedbyScottish

Lawreport(1987)!(1)Erasureorfalsificationofdataorprogramstogainafinancialor

otheradvantageThiscategorydealswithfraudortheft!(2)ObtainingunauthorisedaccesstoacomputerThiscovershackingandunauthoriseduseofanemployer'scomputerby

anemployee.Hackersthatdamagecomputersystemsoftenhavenointentionofdoing

so.Withoutintent,thereisnocrime.ThisloopholehasbeenaddressedbytheCMA.

!

Page 10: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

!!Eightdifferentcategoriesofcomputermisuseidentifiedby

ScottishLawreport(1987)continued….!3)EavesdroppingonacomputerThisinvolvestheuseofequipmenttopickupradiation

emissionsfromacomputerscreen.!(4)TakinginformationwithoutphysicalremovalLegalproblemsariseheresince'information'isnota

physicalthing;itcannotbestolen.Dealingwiththisproblemwouldrequirechangestothelaw

oftheft;amajorundertaking.Copyright,patentsandlawofconfidenceoffersome

protection.10

Page 11: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

!EightdifferentcategoriesofcomputermisuseidentifiedbyScottish

Lawreport(1987)continued!(5)Unauthorisedborrowingofcomputermaterial

Borrowingofcomputermediadoesnotconstitutetheft.!(6)Denialofaccesstoauthorisedusers

Auserofacomputersystemcouldprejudiceotherusersbydenyingthemaccesstothecomputer,ordenyingthemaccesstoparticulardatathattheyneed.

!(7)Unauthoriseduseofcomputertime/facilities

Authorisedusersofacomputercouldusethemforunauthoriseduses,suchasprivateresearchanddevelopmentwhichiscompetitivewiththeiremployer.

!(8)Maliciousorrecklesscorruptionorerasureofdataorprograms

Theresultsofthisactivitycouldcausefinancialloss,damagetotheenvironmentorevenlossoflife.

Page 12: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

BasicsofEnglishcriminallaw

• MostcriminaloffencesaresetoutinActsofParliament:e.g.TheftAct1968,FraudAct2006,ComputerMisuseAct1990.

• Somecommonlawoffencesremain,e.g.Murder• Elementsofanoffencecanbeanalysedintermsof

– Mensrea(mentalelement,andintention)– Actusreus(actualbehaviour)

• Someoffencestermed‘strictliabilityoffences’forwhichthereisnomensrea– (e.g.Drivingatnightwithfaultyrearlightisanoffenceevenifthedriverdidnotknowthelightwasfaulty)

Page 13: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• Criminaloffences:– Policeinformed– TheymaychargethepersonandthenpassthecaseovertotheCrownProsecutionService.

– AccusedappearsinMagistratescourt– CasemaybecommittedfortrialinCrownCourt.– Minor(summary)offencesdealtwithinmagistratescourt

– Serious(indictable)offencestriedinCrownCourt.– Intermediateoffences,e.g.Theftandfraud,aretriableeitherway(magistrateorcrowncourt).

Page 14: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

3.ICTFraud

• Computersystemsvulnerabletofraud.– E.g.RvSunderland(unreported)1983,employeeofBarclaysBankusedbank’scomputertofindadormantaccount,andthenforgedtheholder’ssignaturetowithdraw£2,100.

– Sentencedto2yearsimprisonment,butillustratesvulnerabilityofsuchsystems,especiallyfromwithinanorganisation.

Page 15: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

!3.1Typesofcomputerfraud(AuditCommission)!3.1.1Entryofanunauthorisedinstruction(inputfraud)

Unauthorisedalterationofdatapriortoitbeinginputintoacomputer.Probablycommon.

Example:inputdataforms!3.1.2Alterationofinputdata(datafraud)

Dataheldonacomputersystemismodifiedforfraudulentmeans.!3.1.3Suppressionofdata(outputfraud)!Outputfromacomputersystemisdestroyedoraltered.Themotiveisusuallytoconcealcriminalactivity.Example:auditrollsfromcashtill!3.1.4Programfraud!Alterationofacomputerprogram.Sophisticated,andthereforehardtodetectExample:salamifraud

Page 16: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

3.2Fraudoffences• Fraudisacollectionofsimilaroffences,someofwhichwerecoveredbythe

TheftActs1968and1978!

3.2.1Obtainingpropertybydeception!

• Problemswitholddeceptionoffences!

• TheTheftAct1968definestheoffenceoftheftasfollows:• Apersonwhobyanydeceptiondishonestlyobtainspropertybelongingto

another,withtheintentionofpermanentlydeprivingtheotherofit,shallonconvictiononindictmentbeliabletoimprisonmentforatermnotexceedingtenyears.

• Thisdefinitionimpliesthedeceptionofaperson.TheLawLordsconfirmedthisviewin1974:foradeceptiontotakeplacetheremustbesomepersonorpersonswhowillhavebeendeceived

• Apersoncommittingacomputerfrauddeceivesthecomputer,notahumanmind.So,thisoffenceisprobablyinappropriateforcomputerfraud.

Page 17: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• TheTheftAct1968definestheoffenceasfollows:• Apersonwhobyanydeceptiondishonestlyobtainspropertybelongingtoanother,withtheintentionofpermanentlydeprivingtheotherofit,shallonconvictiononindictmentbeliabletoimprisonmentforatermnotexceedingtenyears.!

• Ifapersongainsaccesstoacomputersystemwithoutpermissionandthenmakesaprintoutoftheinformationcontainedtherein,hashecommittedtheft?

Page 18: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• OxfordvMoss(1978)• Student‘borrowed’anexaminationpaperbeforetheexam

• Couldnotbeprosecutedfortheftsincehereturnedtheitem

• Wasprosecutedfortheftofconfidentialinformation– Butacquittedongroundsthatinformationcannotberegardedaspropertyandsocannotbestolen.

Page 19: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• RvLloyd(1985)

• Projec[onistinacinemaand2others,tookfilmsfrom cinema,andcopiedthembutreturnedthem.

Thepiratedcopiesweresoldataconsiderableprofit

• BUTthechargeofthej(conspiracytosteal)washeldtobe inappropriate

• nointen[ontopermanentlydeprive.

• chargeofconspiracytodefraudmighthaveworkedbe]er

19

Page 20: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• 3.2.2Conspiracytodefraud• Commonlawoffence• Aconspiracyisanagreementbetweentwoormorepersonstocarryoutanunlawfulact.

• Conspiracytodefraudmaybeapplicabletocomputerfraud,sincedeceptionneednotbeproven

Page 21: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• TheftAct1968:• Dishonestlyextractingelectricity

– Unauthorisedaccesswillresultinsomeconsumptionofelectricity

– Butwillhavetodemonstratethatthepersonrealisedtheywerebeingdishonest

– RvGhosh(1982)GhoshTest– Needtodeterminewhetherthedefendanthimselfrealisedthatwhathewasdoingwasby[ordinarystandardsofreasonableandhonestpeople]dishonest

Page 22: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• 3.2.3Attempts• Tobechargedwithanattempt,apersonmusthavedonean

actwhichis'morethanmerelypreparatorytothecommissionofanoffence'.

• Acomputerfraudwhichisnotcompletedmaybeanattempttostealmoney.ConfusionoverthisisonereasonwhysectiontwooftheComputerMisuseAct1990wasenacted(seelater).

• SeealsoFraudAct2006• 3.2.4Fraudastheft• Applyingtheoffenceofthefttocomputerfraudnormally

presentsnoproblems,exceptingourreservationsaboutpermanentlydepriving.

Page 23: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

FraudAct2006DealswithsomeofdeficienciesofTheftActs1968and1978,especiallyICTfraud

Apersonisguiltyoffraudifinbreachofanyofthefollowing:

-(i)fraudbyfalserepresentation -(ii)fraudbyfailingtodiscloseinformation -(iii)fraudbyabuseofpositionPenalties:Summaryconviction(Magistratescourt):imprisonmentforupto12monthsand/orfine

Convictiononindictment(Crowncourttrialbyjury):imprisonmentforupto10yearsand/orfine

Page 24: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• (i)Fraudbyfalserepresentation(FraudAct2006,section2)– Occurswhenpersondishonestlymakesafalserepresentation,intendingtomakeagainforhimselforanother,ortocauselosstoanother,ortoexposeanothertoriskofloss.

– E.g.‘phishing’obtaininginformationsuchasbankaccountdetailsbysendingemail(orSMS)purportingtobefromthatperson’sbank

– E.g.‘pharming’(directingtraffictogenuinewebsitetobogusone)

– UnlikeTheftAct1968(permanentlydeprive),noneedforactualgainorloss,orforittobepermanent.

Page 25: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• (ii)Fraudbyfailingtodiscloseinformation(FraudAct2006Section3)

• Thisformofoffenceoffraudapplieswhenapersondishonestlyfailstodisclosetoanotherpersoninformationwhichheisunderalegaldutytodisclose,andintends,byfailingtodisclosetheinformation,tomakeagainforhimselforanother,ortocauselosstoanotherortoexposeanothertoriskofloss.

• Mayberelevantforonlinetransactions–– E.g.Electronicsubmissionoftaxreturns,roadtaxfund,televisionlicenses.

Page 26: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• (iii)Fraudbyabuseofposition(section4ofFraudAct2006)

• Applieswhenapersonoccupiesapositioninwhichheisexpectedtosafeguard,ornottoactagainst,thefinancialinterestsofanotherperson.– Typicalexampleofoffence:personwithenduringpowerofattorneymisusespositiontodrawfundsfromthedonor’sbankaccount.

– Orwhereemployeeofsoftwarecompanyuseshispositiontomakeunauthorisedcopiesofhisemployer’ssoftwaretosellforhisownbenefit.

– Orwhereemployeesellsanemailcontainingconfidentialinformationbelongingtotheemployertoarivalcompany.

Page 27: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• Articlesforuseinfraud– Possessionofarticle,ormakingorsupplyingarticles!

– Section6ofFraudAct2006,makesitanoffenceforapersontohaveinhispossessionorunderhiscontrolanyarticleforuseinthecourseoforinconnectionwithanyfraud.

• Mightincludedecryptionsoftwareifintendedtobeusedforfraud!• Summaryconviction:upto12monthsimprisonmentand/orfine• Onconvictioninindictment:maximumpenalty5yearsimprisonment!

!– Section7ofFraudAct2006:anoffencemadeoutifapersonmakes,adapts,

supplies,orofferstosupplyanyarticle• Knowingthatitisdesignedoradaptedforuseinthecourseoforinconnectionwithfraud;• Intendingittobeusedtocommitorassistinthecommissionoffraud.• E.g.SoftwaretocircumventtechnologicalmSummaryconviction:upto12months

imprisonmentand/orfine• Onconvictioninindictment:maximumpenalty10yearsimprisonmentmeasuresapplied

tocopyrightworkstopreventunauthorisedactsinrelationtothoseworks.• .

Page 28: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• Obtainingservicesdishonestly• FraudAct2006,section11

– Replacessection1ofTheftAct1978,obtainingservicesbydeception.– Mightnothaveappliedwhendeceptiondidnotoperateonahumanbeinge.g.

Serviceobtainedbyenteringpassword,checkedbycomputer.– Offencecommittedbypersonwhoobtainsservicesforhimselforanotherby

dishonestactwhere• A)theservicesaremadeavailableonthebasisthatpaymenthasbeen,isbeingorwillbe

madefororinrespectofthem• B)heobtainsthemwithoutanypaymenthavingbeenmadefororinrespectofthemor

withoutpaymentbeingmadeinfulland• C)whenheobtainsthem,heknows

– Thattheyarebeingmadeonthebasisdescribedin(a)orthattheymightbe,butintendsthatpaymentwillnotbemade,orwillnotbemadeinfull.

– Maximumpenalty• Onsummaryconviction,imprisonmentfortermnotexceeding12months,and/orfine• Onconvictiononindictment,imprisonmentfor5yearsand/orfine.

Page 29: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• 1Introduction• 2WhatisComputerMisuse?• 3ComputerFraud• 4SoftwarePiracy• 5Viruses• 6Hacking• 7TheComputerMisuseAct1990• 8Conclusions• 9Summary

Page 30: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

4SoftwarePiracy• Formany,theconceptofsoftwarepiracyisadifficultonetograsp

because,ineconomicterms,softwareresembleswhatiscalleda'publicgood'.

• Example:apublicgood– Free-to-air-television

• non-rivalrous(consumptionbyonedoesn’treduceavailabilitytoothers)andnon-excludable(no-onecanbeexcluded)

!• Anti-piracyorganisationssuchasFASTmountraidsonsoftware

pirates,usingspecialsearchwarrants.• FASTestimatethat30%ofallsoftwareinuseintheUKisinfringing,

costingthesoftwareindustryseveral100millionpoundsperyear.• Seehttp://www.fast.org.uk

Page 31: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

4.1Fightingsoftwarepiracy• Auditingprogramscanautomatethedetectionofillegallycopiedsoftwareoncomputernetworks.

• Hardwarecopy-protection'keys'canbeused,butareunpopularwithconsumers.

• Analternativeisasoftwarekey.

Page 32: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• 4.2Legislationapplicabletosoftwarepiracy• Copyright,DesignsandPatentsAct1988;definesanumberofcriminaloffences;themostseriousarefordistributingandimporting.

• ForgeryandCounterfeitingAct1981;adisc,tapeorotherrecordingmediummaybea'falseinstrument'.

• TradeDescriptionsAct1968;intendedtoprotectconsumersfrombuyinginferiorgoods,e.g.copiedsoftwarewhichisbeingsoldasthegenuinearticle.

Page 33: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

5VirusesVirusesareprogramsthataredevisedtobecopiedinadvertently.Theyareconcealedinotherprogramsordata,anddamageorslowtheoperationoftheir'host'systems.!TheAuditCommissionfindthatvirusesarethemostcommonformofcomputerabuse.The‘ILoveYou’virusreleasedin2000wasestimatedtohaveaworldwideeconomicimpactof$8.75billion(CSI/FBIComputerCrimeandSecuritySurvey,2002)

Page 34: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• ComputerMisuseAct1990:oneofitspurposeswastocriminalisetheuseofcomputerviruses

Page 35: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

6.Hacking• Computerhackingistheaccessingofacomputersystemwithouttheexpressorimpliedpermissionoftheownerofthatcomputersystem.

• 6.1RvGold(1988)• See:Bainbridge,p.440Sixthedition

Page 36: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

ThecaseofRversusGold:TwojournalistsgainedaccessintoBTPrestelGoldcomputernetworkwithoutpermissionandaltereddata.OnealsogainedaccesstoDukeofEdinburgh’spersonalcomputerfilesandleftmessage“GoodafternoonHRHDukeofEdinburgh”Theyclaimedtheygainedaccesstonetworktohighlightdeficienciesinsecurity.!TheywerechargedunderForgeryandCounterfeitingAct1981onmakingafalseinstrument–theCIN(customeridentificationnumber)andpassword.JournalistsfoundguiltyatCrowncourt,andfined(£750and£600)ConvictionsquashedbyCourtofAppeal,andconfirmedbyHouseofLordsActswereadishonesttrick,notcriminaloffencesIftheconvictionhadbeenupheld,wouldmeandefendantshaddeceivedacomputer

Page 37: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

!AfterRvsGoldcase,whichconcludedthathackingwasnotacriminaloffenceperse,thecomputerindustrybecamedissatisfiedwiththescopeofcriminallaw.!!ThispromptedtheComputerMisuseAct1990.Unusually,thiswasintroducedasaprivatemember'sBill.!!Hackingwiththeintenttocommitafurthercrimesuchastheft,ordamagebyalteringdata,isnowaseriouscriminaloffenceundertheAct.!!HackingwithoutintentiontocommitafurthercrimeisaminorcriminaloffenceundertheAct.

Page 38: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

6.2OtheroffencesassociatedwithhackingTheComputerMisuseAct1990isthemainweaponagainsthacking,althoughotherareasofcriminallawmayberelevant:!ThelawoftheftRegulationofInvestigatoryPowersAct2000(RIPA)DataProtectionAct1998(DPA)!RIPAconcernstheintentionalinterceptionofcommunicationsonpublicandprivatetelecommunicationssystem,includingdatanetworks.TheDPAregulatestheuseandstorageof'personaldata',i.e.informationrelatingtoindividualsthatcanbeidentifiedfromthatinformation.Ifacomputerhackercopiespersonaldataandstoresitonhisowncomputer,heisholdingpersonaldatawithoutbeingregistered.Thisisacriminaloffence.

Page 39: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

7TheComputerMisuseAct1990TheActcreatesthreenewoffences.!CMASection1:Unauthorisedaccesstocomputermaterial

Apersonisguiltyofthisoffenceifhe'...causesacomputertoperformanyfunctionwithintenttosecureaccesstoanyprogramordataheldinanycomputer;theaccessheintendstosecureisunauthorised;andheknowsatthetimewhenhecausesthecomputertoperformthefunctionthatthisisthecase..'Thisoffenceaimstodeterhackerswithoutrequiringanyevidenceofintentiontocommitacrimeoralterdataorprograms.Thepenaltyismoderate-afine,oraprisonsentencenotexceedingsixmonthsduration.

Whatisthesignificanceofthethirdclause?

Page 40: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• CMASection2:Unauthorisedaccesswithintenttocommitorfacilitatefurtheroffences

• (ulteriorintentoffence)• Apersonisguiltyofthisoffenceifhecommitsan'...unauthorisedaccess

offencewithintenttocommitanoffencetowhichthissectionapplies;orfacilitatethecommissionofsuchanoffence(whetherbyhimselforanyotherperson)..'

• The'offencetowhichthissectionapplies'meansanycriminaloffenceforwhichthesentenceisatleastfiveyears,suchasfraud,theftorblackmail.

• Addressesamoreseriousformofhacking,inwhichunauthorisedaccessisgainedwithintenttocommitafurthercrime,whetherornotthatfurtheroffenceinvolvestheuseofacomputer.

• Particularlyusefuliftheoffenceisnotcompleted.E.g.Personattemptstogainaccesstoacomputerwiththeintentionofsendingablackmailmessage,butdoesn’tgetbeyondloginscreen.Couldstillbeconvictedifit’sshownthattheyhad– Intentiontosecureaccess– Knowledgethataccessisunauthorised– Theintentiontocommitblackmail

• Thepenaltyisgreater-alargefine,aprisontermnotexceedingfiveyears,orboth.

Page 41: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• CMASection3:Unauthorisedmodificationofcomputermaterial• Apersonisguiltyofthisoffenceif'hedoesanyactwhichcausesan

unauthorisedmodificationofthecontentsofanycomputer;andatthetimewhenhedoestheacthehastherequisiteintentandtherequisiteknowledge'.

• Theterm'requisiteintent'meansto:– Impairtheoperationofacomputer– Preventorhinderaccesstoaprogramordataheldinanycomputer

• Impairtheoperationofaprogramorreliabilityofdata• Theintentneednotbedirectedspecificallyat:

– Aparticularcomputer– Aparticularprogramordataoraprogramordataofanyparticularkind– Aparticularmodificationoramodificationofanyparticularkind

• Penalty:Likesection2,maximumof5yearsimprisonmentorunlimitedfine

Page 42: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• Thisoffencecoversfourformsofconduct:• 1.Unauthorisederasureofprogramsordatacontainedincomputermemoryoronastoragemedium.

• 2.Thecirculationofavirusinfectedprogram,withtheintentionofcausingamodificationthatwillimpairtheoperationoftherecipient'scomputer.

• 3.Unauthorisedadditionofavirustoacomputer'slibraryofprograms,whichwillimpairtheoperationoftherecipient'scomputerbyusingupitscapacity.

• 4.Unauthorisedadditionofapasswordtoadatafile,therebyrenderingthatdatainaccessibletoanyonewhodoesnotknowthepassword.

Page 43: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

7.4ProblemswiththeComputerMisuseActThefirstcontestedCrownCourttrialundertheCMAcametocourtinApril1993,andhadproblems.FirstmajorcasebroughtunderComputerMisuseAct!7.4.1ThePaulBedworthcase!RvPaulBedworthSouthwarkCrownCourtComputerMisuseAct1990,ss1,3Unauthorisedaccess-Unauthorisedmodification-ConspiracyHackingfromhisbedroominmother’shouse-JANET,BT,FinancialTimes,EuropeanCommissionsites.Allegeddamageof£120,000.Expertpsychiatricevidenceofobsessiveaddictiontohacking.Held-defendantwas"addictedtohacking",andlackedcriminalintent.Defendantacquitted.!Possiblyhisyoungage(18)wasafactor,alsoheavy-handedarrest.!Hackers’charter?

Page 44: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

7.4.2FollowingtheBedworthcaseTherewassomeconsolationforthepolice.TwoofBedworth'sfriends,NeilWoodsandKarlStrickland,pleadedguiltytosimilarchargesundertheCMA.!Theybothgotsixmonthsimprisonment.Inhissummingup,judgeMichaelHarrissaid:!'...ifyourpassionhadbeencarsratherthancomputerswewouldhavecalledyourconductdelinquent,andIdon'tshrinkfromtheanalogyofdescribingwhatyouweredoingasintellectualjoyriding...hackersneedtobegivenaclearsignalbytheCourtsthattheiractionswillnotandcannotbetolerated...'!ItseemsunlikelythattheBedworthcaserepresentsalegalloopholeintheComputerMisuseAct1990.AmemberoftheLawCommissioncommented:!'...Idon'tthinkthere'saloophole.Onlyinlimitedcircumstancesisthisdefencelikelytobeusedagain,andthejury'sdecisioninthiscasestrikesmeasextraordinary...'!Indeed,therehavebeenmanysuccessfulprosecutionssince.

Page 45: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

7.4.3ArethereproblemswiththeAct?• TheComputerMisuseAct1990iscautious,reflectingthegreat

carethatmustbetakenwhendraftingthiskindoflegislation.• TheCMAaddressesmostoftheareasofcomputermisuse

identifiedbytheScottishLawCommissionreport,apartfromelectroniceavesdropping.

• Theterm'computer'isnotdefinedbytheAct.Isthisaproblem?

• Aconcernisthemeaningof'unauthorisedaccess'.Whatisthesituationwhenaccessisauthorisedbutthefunctionperformedisnot?

• Example:DPPvBignell(1998)• SeeBainbridgepp.442-3sixthed.

Page 46: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

!!!

• DPPvBignell(1998)• Twopoliceofficersusedpolicenationalcomputertogainaccesstodetailsofmotorcarstheywantedforprivatepurposesunconnectedwithdutiesaspoliceofficers.

• Chargedwithunauthorisedaccesstocomputermaterialundersection1ofCMA1990

• Appealsallowed–theiraccesswasauthorised• ....worryingdecision!

• ButsoonreversedinHouseofLords:

Page 47: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

!• RvsBowStreetMetropolitanStipendiaryMagistrate(2000)• EmployeeofAmericanExpressinFloridawasauthorisedtoaccess

specificcustomeraccounts–butsheaccessedotheraccountsandpassedonconfidentialinformationallowingcounterfeitcreditcardstobemade.

!• Decision:Authorisationshouldnotextendtoaccesscomputermaterial

forunauthorisedpurpose

!• LordHobhousecriticisedthedecisionmadeinDPPvBignell-should

havebeenconcernedwithauthoritytoaccesstheactualdatainvolved,notjustthekindofdata.

• Employeehadauthoritytoaccessthekindofdatasheaccessed,butnottheparticulardatasheaccessed.

• i.e.Authorisationtoaccesscomputermaterialdoesnotextendtoaccessingcomputermaterialforanunauthorisedpurpose.

Page 48: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• Usingloggedoncomputerifsomeonehasleftthemselvesloggedon.

• EllisvDPP(2001)• Ex-studentofNewcastleUniversity.Usednon-openaccesscomputerstobrowsewebsites,whencomputerleftloggedonbyprevioususers.

• Toldbyadminofficerhedidnothavepermissiontousenonopen-accesscomputers.

• Convictedundersection1ofComputerMisuseAct1990• Theclaimthatwhathehaddonewaslikepickingupadiscardednewspaperandreadingitwasrejected.

Page 49: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• HowmanyprosecutionsunderComputerMisuseAct?

• 1999-2000proceedingsagainst32persons• 26foundguilty• surprisinglylownumber

49

Page 50: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• 8Conclusions• TheComputerMisuseAct1990wasanimportantstepinEnglish

Law,thatgoessomewaytowardsprotectingcomputerprogramsanddataaslegalpropertyunderthecriminallaw.

• Preventionisbetterthanprosecution.TheAuditCommissionrecommendsseveralwaystoimprovecomputersecurity:

Morestaffarebeinggivencomputerstoperformtheirtasks,butfewofthemreceivetrainingintermsofprotectingthedatatheyuse;

• Withthegreateruseofnetworks,moreattentionneedstobegiventorestrictingandcontrollingaccess;

• Simple,basiccontrolscoulddomuchtoreducerisk;• Auditdepartmentshaveavitalroletoplayinadvisingonand

helpingtodesignsecuritymeasures;• Morecomputer-literateauditorsareneeded.• Agoodsignisthatthecourtsappeartobetreatingcomputercrime

seriously,withcustodialsentencesbeingadministeredinmanycases.

Page 51: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

9Summary!Computercrimeisaserious(andgrowing)problem.!Fourimportantareasofcomputercrimearefraud,softwarepiracy,hackingand

viruses.!PriortotheintroductionoftheComputerMisuseAct1990,theabilityofcriminallaw

todealwithcomputercrimewasquestionable.!TheComputerMisuseActwasintroducedin1990.Itintroducesthreenewoffences:

–unauthorisedaccesstocomputermaterial–unauthorisedaccesswithintenttocommitorfacilitatefurtheroffences–unauthorisedmodificationofcomputermaterial

!ApplicationoftheActhasmetwithmixedsuccess.TheBedworthtrialisconsidered

tobealegalanomalythatisunlikelytoberepeated.!Successfulexamples:

–RvBowStreetMetropolitanStipendaryMagistrate–EllisvsDPP(2002)

Page 52: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• FraudAct2006:broughtinanumberofoffencestotackleICTfraud– Mostoffencescanbecommittedwithoutthecompletionoftherelevantgainorlossactuallytakingplace

– Iffraudiscompletedthenachargeoftheftmaybeappropriate!

• Asecurecomputersystemisabetterprotectionagainstcomputercrimethanlegislation.

52

Page 53: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such

• Nextweek:• TheSocialContextofComputing!

• Tomorrow:releaseoftakehome‘exam’• (worth70%ofmodulemark)

Page 54: COM6650/6655 Professional Issues in Information Technology ...staff · Professional Issues in Information Technology Part IX:Computer Misuse and Computer Crime ... activities such