Wednesday, June 5, 2019
Computer Crime Legislation in the UK
computing device Crime Legislation in the UK data processor disgust is on the incr embossment as there atomic number 18 m either personars of the mesh and social-net take oning sites. Evaluate the extent to which relevant legislation has intended to serve as a deterrent to such law-breakings.Since the launch of the information processing systems in the mid 1970s, they expect play a major role in todays society as it is impossible to live without a computing machine as most of us are so dependent on them. Computers is design in a number ways such as booking a flight, buying insurance, reading the news, communicating with different batch. a nonher(prenominal) reason lot use a computer is to cave in abominations.Computer crime has risen at an alarming rate as flock think they female genitals be undetected and be anonymous. This is because it is easier to assign a crime in the cyber world than in the real world. When a crime is morsel in the real world, sensual evid ence is always left behind such as blood and fingerprints. In the cyber world there isnt any somatogenetic evidence. The thought of their tracks would not be traced, however they are mistaken as tracking down an IP address has become easy to track making it hard for criminals to stay invisible while they are online. An IP address is short for internet protocol address and this identifies a computer on network. The IP addresses are based on the networks that use the TCP/IP protocol. Various mapivities are committed by not just by criminals but usual people as well. These manageivities would consist of crimes linked to child pornography such as downloading images, stealing identities, hacking to other account to gain information for the third party, creating a computer virus and money frauds are known to become easier by the use of computers. Credit card numbers, personal id information can likewise be targeted by programmed automated software. People commit these crimes as they have a thrill of taking advantage of a computer system.Distributed Denial of Service (DDoS) is a green form of attack on computers. This process involves criminals can have controlled plan of attack to multiple computers and use them to attack a number of targets or one target. Another form of attack is malicious software (malware). This consists of software that allows criminal to have full control of a system and allowing the malware creator to do whatever they want. The malware can be a number of things such as a virus, worm, Trojan, adware, spyware and a root kit. A virus is the most serious form of attack. This consists the virus touching the computer or other electronic devices that are passed by other user answerivity e.g. an email attachment being opened. http//www.seas.ucla.edu/2011, http//www.webopedia.com/2013As computer crime has risen, the cost of cyber crime is also a threat to the goernment and the nation. According to the Cabinet office, cyber crime in the UK cost s 27bn a year. These costs are make up of 21bn to businesses which is more than than the offices annual budget, 2.2bn to the government and 3.1bn to public. Baroness Neville-Jones the Security minister stated in a briefing the government was determined to work with industry to encounter cyber crime. At the moment, cyber criminals are fearless because they do not think they pull up stakes be caughtThe Police and Justice impress 2006 is an fleck of parliament in the UK. fork 5 of the wager the miscellaneous section under chapter 48 introduced the Computer upon spot 1990 (CMA). The Computer Misuse Act 1990 (CMA) was passed in 1990 and is part of the UK Parliament. The belief of the act to is frame legislation and controls any activity linked to computer crime and internet fraud. The act was introduced to deal with issues that have occurred by the misuse of computers. The act are based on deuce-ace offences that cover Unauthorized access to computer material unauthorised acc ess to a computer with intent to commit or facilitate the commission or a further offence and unauthorised modification of computer materialThe get-go act Unauthorised access to computer material even though there isnt any physical damage, its an offence when a person is imbed guilty of using any computer material without permission which makes it bootleg. An example of this would be the field of R v Astrid Curzon. Curzon 49 was found guilty of gaining access to a schools email system. She gained access from her crime syndicate and therefore found private emails from the head teacher to staff members. The email contained discussions about employment of other staff members.Another example of this would be the contingency of DPP v Bignell 1998. Two police officers already had access to the police national computer (PNC) that is only apply for police personas. The pair asked the computer operator who used to the computer to obtain information from the DVLA through with(predica te) the police national computer without knowing it was for their own pleasure purposes. The divisional court had stated that the two polices officers didnt commit a crime under section 1 Unauthorized access to computer material. the divisional court believe that the two police officers didnt commit a crime and their conclusions were right, as the decision wasnt over ruled by the House of Lords in Bignell.It was a possible view of the facts that the role of the officers in Bignell had merely been to beg another to obtain information by using the computer. The computer operator did not exceed his authority. His authority permitted him to access the data on the computer for the purpose of responding to requests made to him in proper form by police officers. No offence had been committed under section 1 of the CMA.In a more recent article in the Daily Mail online(PUBLISHED 0500, 17 celestial latitude 2012) Hollywood stars Scarlett Johansson, Mila Kunis and Christina Aguilera computer was hacked by Christopher Chaney 36, was arrested for wiretapping and unauthorised access when he hacked into their email accounts. He managed to gain access by using Google and then using the i got forgot my password button. He tried a number of combinations of names and then he reset account passwords by finding pet names, where they were born, and the name of their schools. The most serious incident when Chaney posted nude statue photographs of Johansson and her then husband all over the internet.The second act unauthorised access to a computer with intent to commit or facilitate the commission or a further offence as stated in the first act no actual physical damage to the computer material. Using the system without permission would make it illegal and committing a on the system would be illegal too. This act mainly covers actions such as using email contents for blackmail. An example of these would be the fountain of R v Delamare 2003 the defendant was working in depose and w as offered 100 to use the banks computer systems to gain information of other bank details.The third act unauthorised modification of computer material an example of this act would be the faux pas of R v Pavel Cyganok and Ilja Zakrevski 2012.( published 2 July 2012 Last updated at 1123 2 July) Cyganok and Zakrevski were arrested and convicted of masterminding hi-tech crimes. The pair used a SpyEye Trojan to obtain login details for online accounts. The stolen data was then uploaded to servers which the pair had access to. 100,000 of the stolen money was stolen and laundered through online accounts allowing criminals to access.The acts are associated with penalties for both individualistics and groups of people that are part of a gang. The penalties can be severe for breaching the third offences. The penalties are varied based on what act have been breached. Each of the offences are divided into summary penalties a trail without a jury and an indictment penalties a trail with a jury.In the first act if the individual was found guilty the summary conviction in England and Wales the prison sentence would be a term of 12 months or a pretty up to the statutory maximum (5000) or both. On a conviction, the prison sentence would be of two years that shouldnt be exceeded or a bewitching or both. In the second act, the summary conviction is a prison sentence of 6 months or a fine that is not allowed to be exceeded the statutory maximum or both. On a conviction, the prison sentence would be term of five years or a fine or both. In the third act, if the individual was found guilty the summary conviction would be prison sentence of one year or a fine that is not allowed to be exceeded the statutory maximum or both. On a conviction, the prison sentence would be 10 years or a fine or both.Section 35 of the Police and Justice 2006 had amended the Computer misuse act 1990. The amended act looks at new offences which offences 1 and 2 are now combined together into a new offence. A new offence was added into the act 3a offence. This affect took place on 1st October 2008. The three new offences are as follows Unauthorised access to computer materials (hacking), Carrying out unauthorised acts in relation to a computer and Making, supplying or obtaining articles for use in computer misuse offences. The penalties were also added to the new offences. The police and justice act increased the penalties for the first offence unauthorised access to computer material.The computer misuse act can be compared to other laws and legislations. The Computer Crime Act (CCA) was passed in 1997 is an act of the Malaysian government introduced the legal framework to ease the growth of ICT systems called Cyber laws of Malaysia. The act was given a Royal Assent on June 18, 1997 but didnt come into force on June 1, 2000. This act was introduced purpose of protecting consumers and people that provide a emolument. The act also protects online businesses and owners of intell ectual property. The act was designed to stop offences as computers are misused in a number of ways, as this was added to other existing criminal legislation. The Computer Crime Act and the Computer Misuse Act do have a number of similarities in the case of the three offences however it differs in more ways. As the Computer Misuse Act as the three offences, the computer crime act looks at a wider range of offences. The CCA looks at the understanding of computers, the computer network, output, computer data and the functions it uses. The act looks at computer programs and premises. The definition of a computer in CCA is summarised as any electronic devices that are programmable and has the ability to store data.The CCA looks at more severe penalties compared to the CMA. For the first offence, unauthorised access to computer material the Malaysian law states that if the individual were found guilty the prison sentence would be a maximum sentence that shouldnt be exceeded five years an d or a fine of not transcendent RM 50,000 (10,273,45) for the 2nd offence, the Malaysian law states for the offence of unauthorised access with intent to commit or facilitate commission of further offences if the individual were found guilty the prison sentence would be a maximum sentence ten years that shouldnt be exceeded and or a fine not exceeding RM 150,000(30,820,35). For the 3rd offence unauthorized modification of the contents of any computer the Malaysian law states that if the individual was found guilty the prison sentence would be not exceeding seven years and or a fine not exceeding RM 100,000(20, 546, 90) On a liable prison sentence not exceeding ten years if the act was intentionally broken and or a fine not exceeding RM 150,000, which is the equivalent to (30, 820, 35)The computer misuse act can also compared to the American law the Computer fraud and abuse act 1986. The act was passed by the united congress. The act is a federal legislation that is aimed to restric t computer crimes that come under the federal jurisdiction.the whole purpose of the act was to strengthen, widen, and clarify to protect computer systems from vandalism. The act also includes the usage of virus and programs that have been intended to destroy a computer system. The law prevents the unauthorized access of any computer system and the obtainment of classified government information. http//ecommerce.hostip.info.2013 study to The Computer Misuse Act and The Computer Crime Act (CCA) 1997, the Computer fraud and abuse act 1986 has more severe penalties. If the individual were guilty of physical damage to a computer system, the prison sentence would be a term of 20 years that shouldnt be exceeded and the fine reaching $250000 (155,870.00). Under this law, Prosecutors are challenged to prove that the defendant intentionally caused damages to a computer. The other acts are not so severe than this act.Even though the computer misuse act is in place, the act still does not stop criminals from committing an offence. In the BBc news online (4 July 2011 Last updated at 1924 ) The crimes are committed as people want to gain information and sell to a third party. In 2011 it was reported back in 2002 the News of the World newspaper had hacked in to Milly Dowler liquid phone and had listened to the voicemails and then deleted the messages. Later the news of the world was forced to shut down the paper after the hacking scandal as they had admitted interfering with teenagers phone. The victims family and friends said it gave them spurious hope that she was still alive and Milly had deleted the messages herself. By the time the messages were deleted. By this time, the teenager was already murdered. The hacking was classed as an unlawful interception of communications. This comes under Section 1 of the Regulation of investigative Powers Act 2000.In an article in the Daily Mail online, (PUBLISHED 0208, 9 June 2012 ) 11,000 people are believed to hunted by the polic e for using a service of a cyber-crime gangs website that offered false identification and tips on how to commit a crime. The gang had cloned a number the identities of people who a high credit rating. Pay slips bank statements, passports and driving licenses was also sold to the gangs members. The website also offered other run such as different tiers of access as the users where trusted to use the website. One of the services included a platinum profile that cost 5,500 that came with instructions on how to commit identity fraud. For 2,000, Confidential Access (CA) offered a 100% Creditmaster profile, which was exclusive to very important person members of the website. The website was claimed to worth be 200million and had a turnover of 11m between 2004 and 2008. The paying customers paid from around 50 for a utility bill to 800 for a set of three years professionally sealed.Detective Inspector Tim Dowdeswell saidThis was a sophisticated operation which has netted millions of pou nds over the years. These cyber criminals not only provided the tools to commit fraud, they instructed their clients in how to use them to make the maximum amount of money, whilst ruining real peoples credit histories into the bargain. We have already brought many of their students in crime to court and will continue to work with other police forces and partners to bring those people who bought and used these identities in their own frauds to justice.Concluding this essay, computer crime will still be on the increase. Crimes will be committed depending what the motivation is such as greed and pleasurable need. The Computer misuse act 1990 has a number of flaws as it failed in the case of DPP v Bignell 1998 as the prosecutor felt that no crime was committed under section 1 of authorised access. The police national computer (PNC) was used when a police officer obtained information for their own pleasurable needs, even though police officers had access to the PNC. The Computer misuse a ct 1990 should not have failed, as the police national computer should be used for policing only. Another way it can fail is the source of the crime such as the IP address and hackers would find ways and use another IP address to avoid them getting caught.I do believe that the computer misuse act can work as a deterrent, as it has a high knowledge that projects any computer system that involves criminating activities. The act helps to keep people unhazardous and their personal information safe too.My views on the Computer misuse act 1990 that their punishment should be severe as the Computer fraud and abuse act 1986. I say this because i feel with a harsher punishment people will learn their lesson on not to commit a crime. If an individual served a 12 month prison sentence with a small fine, they would be tempted to commit another crime as they would feel that their punishment was not harsh enough.My recommendations would be that the Computer misuse act 1990 should have harsher p unishments matching up to the penalties of the Computer Misuse Act and the Computer Crime Act (CCA) 1997. I also believe that the government should have more power over the individuals who commit crime as 27bn was wasted on computer crimes. I also i believe that the act should at other aspects and not focusing on three sections. If prosecutors are dealing with computer crime cases, they themselves should have an understanding of the act and not allow anymore cases to be dismissed.ReferencesBBC News News of the World hacked Milly Dowler phone. 2013. BBC News News of the World hacked Milly Dowler phone. ONLINE forthcoming at http//www.bbc.co.uk/news/uk-14017661. Accessed 29 December 2012.Cyber-criminal fraud gang who lived lavish lifestyles fall backed for multi-million pound ID scam Mail Online. 2013. Cyber-criminal fraud gang who lived lavish lifestyles jailed for multi-million pound ID scam Mail Online. ONLINE Available at http//www.dailymail.co.uk/news/article-2156724/Cyber- criminal-fraud-gang-lived-lavish-lifestyles-jailed-multi-million-pound-ID-scam.html. Accessed 19 December 2012Christopher Chaney Computer hacker who leaked nude photos of Scarlett Johansson is sentenced to 10 years in prison Mail Online. 2013. Christopher Chaney Computer hacker who leaked nude photos of Scarlett Johansson is sentenced to 10 years in prison Mail Online. ONLINE Available at http//www.dailymail.co.uk/news/article-2249693/Christopher-Chaney-Computer-hacker-leaked-nude-photos-Scarlett-Johansson-sentenced-10-years-prison.html. Accessed 20 December 2012The cost of cyber crime Cabinet Office. 2011. The cost of cyber crime Cabinet Office. ONLINE Available at http//www.cabinetoffice.gov.uk/resource-library/cost-of-cyber-crime. Accessed 19 December 2012Bobby Stocks 2013. Why Do People Commit Computer Crimes? eHow.com. ONLINE Available at http//www.ehow.com/about_4709031_do-people-commit-computer-crimes.html. Accessed 19 December 2012What is IP address? An IT Definition Fr om Webopedia.com. 2013. What is IP address? An IT Definition From Webopedia.com. ONLINE Available at http//www.webopedia.com/TERM/I/IP_address.html. Accessed 20 December 2012Malicious Software. 2011 Malicious Software. ONLINE Available at http//www.seas.ucla.edu/security/malware.html. Accessed 20 December 2012What is DDoS (Distributed Denial of Service) attack? A Word Definition From the Webopedia Computer Dictionary. 2013. What is DDoS (Distributed Denial of Service) attack? A Word Definition From the Webopedia Computer Dictionary. ONLINE Available at http//www.webopedia.com/TERM/D/DDoS_attack.html. Accessed 20 December 2012Computer Fraud and Abuse Act of (1986) Information, Law, System, and Damage . 2013. Computer Fraud and Abuse Act of (1986) Information, Law, System, and Damage . ONLINE Available at http//ecommerce.hostip.info/pages/248/Computer-Fraud-Abuse-Act-1986.html. Accessed 21 December 2012CyberCrimes Computer Crime Act 1997. 2009. CyberCrimes Computer Crime Act 1997. ONLINE Available at http//cybercrimes09.blogspot.co.uk/2009/10/computer-crime-act-1997.html. Accessed 10 January 2013.Computer Misuse Act 1990 not yet in force Legal Guidance The Crown Prosecution Service. 2013. Computer Misuse Act 1990 not yet in force Legal Guidance The Crown Prosecution Service. ONLINE Available at http//www.cps.gov.uk/legal/a_to_c/computer_misuse_act_1990/an07. Accessed 10 January 2013.IMPACTThe amended Computer Misuse Act IMPACT guide to the essentials. 2006 IMPACT The amended Computer Misuse Act IMPACT guide to the essentials. ONLINE Available at http//impact.freethcartwright.com/2006/11/a_while_ago_we_.html. Accessed 10 January 2013.cause beauty queen spied on headteachers email (From Swindon Advertiser). 2012. Former beauty queen spied on headteachers email (From Swindon Advertiser). ONLINE Available at http//www.swindonadvertiser.co.uk/news/local/9881311.Former_beauty_queen_spied_on_headteacher_s_email/. Accessed 10 January 2013.Computer Frauds Unauthoris ed Access + Intent + Modification. 2012. Computer Frauds Unauthorised Access + Intent + Modification. ONLINE Available at http//legal.practitioner.com/regulation/standards_9_3_22.htm. Accessed 10 January 2013.BBC News Online bank robbers face jail time for e-crimes. 2012. BBC News Online bank robbers face jail time for e-crimes. ONLINE Available at http//www.bbc.co.uk/news/technology-18672068. Accessed 10 January 2013.INTERNET COMPUTER CRIME. 2013.. ONLINE Available at http//www.stjohnsbuildings.com/resources/s/n/4/ComputerCrimeNotes.pdf. Accessed 10 January 2013.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.