Examine the operation of the law in relation to hacking and computer fraud. What are the advantages and disadvantages of these legal measures?

Authors Avatar

Examine the operation of the law in relation to hacking and computer fraud. What are the advantages and disadvantages of these legal measures?

Computers have made such an impact on society that they are now essential for the smooth running of day-to-day activities. They are a tool, and like any other tool they can be used by people intent on causing damage or carrying out some form of illegal activities. According to August Bequai, the revolution of technology, computer crimes have become more frequent due to the tools provided, and comes along this revolution are many dangers:

‘In the information society, power and wealth are increasingly becoming synonymous with control over our data banks...The computer revolution has provided tools with which to steal with impurity, control and manipulate the thoughts and movements of millions, and hold an entire society hostage.’

The nature of today’s internet and computer networks means that criminal activity can be carried out across national borders. Due to the rapid development, information technology presents challenges for the law; these challenges are not confined to any single one of the traditional legal categories. With this new breed of technology has come a new breed of policing because inevitably with this sophisticated electronic freedom has come a whole new form of crime. Due to the explosion of internet use, al the networks around the world have brought with it a need for greater security consciousness. As a result technology is required to be constantly updated in the war against the ever growing insidious and malicious criminals.

  There are a number of ways in which computers can be used for crime, firstly is to commit “real world” crimes such as fraud, forgery, secondly is to modify or damage other computerised systems and these are the types of activities that are usually prosecuted using computer crime legislation. However the use of a computer to assist in committing an offence doesn’t change the essence of criminal activity. The existence of the Computer Misuse Act 1990 (CMA) and the Criminal Damage Act 1971 are designed to protect individuals of their rights.  

Join now!

Computer crime can be dated back to the first case which arose in the late 1950’s involving a catering firm. The firm had standing orders on the computer and the computer programmer had replaced the names of the contractors with fictitious names and opened bank accounts in those names. Hence two batches of payments went out to the company and the programmer. The programmer was eventually caught once he had started spending a lot of money. This is a prime example of not only hacking but also fraud.

Computer fraud, a common computer related crime, is increasingly growing ...

This is a preview of the whole essay