Skip to content
Permalink
master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
title
The Law

The law surrounding cyber security is made up of a number of different overlapping components. It includes data protection through the Data Protection Act and GDPR; intellectual property, through copyright, patents and so on; and others. In this article, we look at the law specifically around computer misuse or "hacking".

  • Computer Misuse

In the middle of the 1980s Robert Schifreen and Stephen Gold discovered the log-in details of an account on British Telecom's Prestel by watching what an engineer typed in to their terminal. They logged in and explored the system, managing to find details of accounts belonging to other people, including members of the royal family.

British Telecom discovered the unauthorised use and the pair were charged. At the time, there was no UK law that covered their activities exactly, so they were charged with manufacturing a "false instrument" under the Forgery and Counterfeiting act 1981. The argument was that by entering their unauthorised commands into the Pentel system, they had changed its internal state and somehow created something that infringed on the intellectual property of British Telecom.

They were fined less than £1500, but the case highlighted two things: one, that British Telecom had not taken security seriously (the username and password were 2222222222 and 1234 respectively) and the second that the law being applied did not quite fit the situation.

Schifreen and Gold appealed the finding on that second point and it was upheld. Lord Justice Brandon said that "we have accordingly come to the conclusion that the language of the Act was not intended to apply to the situation which was shown to exist in this case. The submissions at the close of the prosecution case should have succeeded. It is a conclusion which we reach without regret. The Procrustean attempt to force these facts into the language of an Act not designed to fit them produced grave difficulties for both judge and jury which we would not wish to see repeated. The appellants' conduct amounted in essence, as already stated, to dishonestly gaining access to the relevant Prestel data bank by a trick. That is not a criminal offence. If it is thought desirable to make it so, that is a matter for the legislature rather than the courts."

This led to the creation of the Computer Misuse Act 1990, which set out three offences:

  1. unauthorised access to computer material
  2. unauthorised access with intent to commit or facilitate commission of further offences
  3. unauthorised modification of computer material

The punishment, in terms of fines and prison sentences, was also laid out. Since then, these three offences remain in subsequent revisions of the act, although the fines and prison terms have changed. Two additional offences have also been added. At the time this article was written (May 2019), the list of offences is:

  1. Unauthorised access to computer material.
  2. Unauthorised access with intent to commit or facilitate commission of further offences.
  3. Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of computer, etc.
  4. Unauthorised acts causing, or creating risk of, serious damage
  5. Making, supplying or obtaining articles for use in offence under

Links