Contrary to popular belief, the law is reasonably well equipped to deal with computer crime and has been substantially strengthened by recent legislation. Discuss

Authors Avatar

“Contrary to popular belief, the law is reasonably well equipped to deal with computer crime and has been substantially strengthened by recent legislation.”  Discuss

This statement, made by Bainbridge, requires the examination and evaluation of both statute and common law used to address the phenomenon of computer crime and to access whether it/they is/are reasonably able to, in the light of recent legislation, deter, deprive, enforce and punish those that commit certain acts in this ever developing information technology age.

Forty years ago computer usage was unusual; however people now consistently use computers and the internet. A recent report found “the internet to be rife with crime, current legislation to control it seriously lacking and public mistrust and fear extremely high.” One of the main reasons for the popular belief that the law is not reasonably equipped is because criminal law tends to be reactive and whatever amendments to existing legislation are made, or new legislation enacted, to combat e-crimes the law, as rarely being forward thinking nor speedy enough, due to the processes it has to go through, will struggle to keep up with the speed of changes in information technology and that computers can be tools to commit crimes or can be targeted by criminals. It is the regulation of individuals and not necessarily the activity itself which is of concern e.g. hacking was originally something which was carried out by those with advanced technological skills but which developed into cracking.

Paul Wright, who counts himself among those who feel computer crime cannot be sufficiently dealt with under current legislation, stated recently that computer crime is “…perceived to suffer from an increased tendency to 'legislative dependence… digital crime develops and changes very rapidly and it takes years for legislation to be enacted, by which time the crime and criminal will have developed a different form of modus operandi.”  

A computer is not defined in statute. However, Lord Hoffman defined it as “a device for storing, processing  and retrieving information.” Additionally the term embodies not only the machine, or hardware, but also the software or programs, including the ROM. 

The Internet is an electronic communication system which uses a network of computers that communicate with each other, under a person(s) control, via the telecommunication system and was recently described as “the playground of criminals’. 

Terminology can be somewhat clouded as computer crimes can be distinguished from computer-enabled cybercrimes although both come under the umbrella term e-crimes. Sharon Lemon divided these e-crimes into two categories depending on whether computer technology has facilitated traditional criminal activities such as theft, fraud and pornographic material, or has brought about new criminal activities such as hacking, phishing, the installation and/or transmission of viruses and denial of service  and distributed denial of service (hereinafter DoS & DDoS) attacks.

However other authorities have subdivided computer assisted traditional criminal activity into computer-related, such as fraud, theft and information seeking, or content-related such as some types of pornography. Some content-related activity, whilst being offensive, may not be illegal unless the content incites terrorism, violence, racial hatred or other discrimination. An additional “hybrid” category of cybercrime which commits global fraud and pornography trading has been suggested. 

Computer crimes can be defined as crimes committed against the actual machine itself such as theft; criminal damage to the hardware, software or data contained in the programs by hacking, installing viruses or modification; or the network may be damaged by DoS and DDos attacks; using computers or networks without authorisation to access information or data. Loss or modification, however, need not occur; or by physical or psychological offences against the person committed either directly or indirectly. 

Cybercrimes can only be committed by using the internet. They have a massive destructive potential and can be identified in four categories of criminal activity. They can be initiated from anywhere in the world and include on-line harassment, trading and distributing  pornographic material, child grooming, phishing, pharming and spamming to dishonestly acquire money, goods or services ; distributing hate or racially aggravating material; abusing online surveillance technology and cyber-terrorism. 

These categories are; Computer-related offences, Content-related offences, Offences against the confidentiality, integrity and availability of computer data and systems and Offences related to infringements of copyright and related rights. 

Criminal law requires certainty and is used to deter, deprive, enforce and punish nationally, although the UK is subject to European law and takes into account other international legislation and agreements. It also usually applies to illegal acts no matter what method is used to commit it and computer law is no different. Its aims are similarly concerned with deterring, depriving and punishing anyone of the approximately 1,582,000,000 world-wide internet users from using this technology to commit crimes. However, e-crimes are uncertain in definition and nature, generally seen as a private wrong, not confined to any particular jurisdiction and can cause both a serious single financial loss or de minimis losses to many and even threaten national or global security. E Wilding stated “Cybercrime has become more prevalent; professional and aggressive, and the tools and methods deployed have attracted the attention of organised crime to such an extent that serious economic damage is being inflicted.”

However, the UK does not have a single legislative instrument to combat e-crimes, ie both computer and cyber crimes, unlike some other countries, but relies on applying different criminal laws depending on the type of computer crime committed.  

The recent Police and Justice Act (hereinafter PJA) was enacted to keep in line with European cyber legislation and to update and remedy some of the failings of the Computer Misuse Act (hereinafter CMA) as this primary specific computer crime legislative instrument, was “no longer a viable tool for prosecution” and “to give the police and judiciary greater legal clarity when tackling cybercrime.” The PJA enlarges two CMA provisions, those on cyber-trespass, increasing not only the penalties to two years, therefore making them extraditable from foreign countries, but also removes any limitation period and is extended to employees who have knowingly accessed parts of computers systems, eg programs and data, which is officially denied to them and cyber-violence and malware as there now is no need for any modification to have taken place and any impairment need only be temporary. Additionally, crimes need not be directed at any particular computer or its contents but could be directed at any part of a network to become a criminal offence.  The CMA provision on cyber-theft has not been changed. The PJA amended the Criminal Damage Act (hereinafter CDA) and any modification must now cause physical damage.

Join now!

Computer-enabled crimes, ie those crimes which involved the use of a computer to commit such crimes as forgery, fraud, obscenity, criminal damage and hate crimes, had been governed by a variety of legislative instruments, though sometimes amended to close loopholes and lacunas and will be identified and addressed more fully below.

The CMA was enacted to redress the clear inability of criminal law to combat computer fraud and misuse crimes due to advances in technology or the courts interpretation of the law and made hacking, unless performed under statutory powers, and the introduction of viruses into computer systems, criminal offences. However, existing legislation and ...

This is a preview of the whole essay