You are on page 1of 5

Gauging the Effectiveness of Computer Misuse Act in

Dealing with Cybercrimes

Reza Montasari Pekka Peltola Victoria Carpenter


Computing and Mathematics Nottingham Geospatial Institute Academic Development Directorate
University of Derby University of Nottingham York St John University
Derby, UK Nottingham, UK York, UK
r.montasari@derby.ac.uk pekka.peltola@nottingham.ac.uk v.carpenter@yorksj.ac.uk

Abstract— Computer and Internet technology has become a in 1990 due to the difficulties caused by the pre-existing law
vital part of a daily life for many as it has brought many “as it was stretched to encompass previously un-encountered
enhancements to the quality of many individuals’ lives. Although mischief resulting from technological advances” [1]. The CMA
advances in computer and Internet technology are utilised by was enacted to correct the deficiencies in the criminal law
many people for various respectable reasons, at the same time it relating to hackers and viruses. Both society and industry had
has become a tool in the hands of cybercriminals for various expressed their concerns about the potential damage that could
nefarious reasons. Cybercrime has become a fast-growing type be caused by hackers. This discontent followed, in particular,
of crime where more and more criminals exploit the speed, after the hacking of the British Telecom Prestel computer
convenience and anonymity of the Internet to perpetrate various
network when hackers penetrated the systems and altered the
criminal activities that have no border. This paper examines the
phenomenon of cyber crime and the difficulties and challenges
files (R v Gold and Schifreen) [2]. They even accessed Prince
that it presents due to the way that it is being regulated in Philip’s mailbox and left a message [1]. At the time, the
England and Wales. A major focus will be placed on the area of existing criminal law could not deal with such mischief by
hacking. To this end, the effectiveness of the Computer Misuse prosecuting the hackers for criminal damage. As a result, Gold
Act in dealing with cybercrimes both in the past and in the future and Schifreen could not be prosecuted for the forgery of the
will be examined. Prestel password and managed to get away with their
behaviour. The Computer Misuse Act was enacted so as to
Keywords— computer misuse act; cybercrime; hacking; rectify this loophole.
regulation of investigatory powers, IT law, internet technology
Although, the CMA was passed in the hope that it would be
“an Act to make provision for securing computer material
I. INTRODUCTION against unauthorised access or modification; and for connected
This paper examines the phenomenon of cyber crime and purposes,” [3] it lacked wise planning and proved unable to
the difficulties and challenges that it presents due to the way imagine technological advances in the future. Some believe
that it is being regulated in England and Wales. A major focus that the UK Government should have taken more time and care
will be placed on the area of hacking. To this end, the in devising legislation in this area; [4] they believe as a result
effectiveness of the Computer Misuse Act – hereafter referred of this rush “the CMA suffered a premature birth which was
to as CMA – in dealing with cybercrimes both in the past – as left weak and vulnerable when the Internet, as we know it,
originally ratified – and in the future – in its recently emended arrived” and that it did not fully anticipate the Internet’s
form – will be examined. It will be suggested that the CMA “potential application to cause harm” [5]. In 2006 amendments
1990 has failed to deal properly and effectively with this were made to the CMA, by means of paragraphs in the Police
problem due to its lack of keeping pace with the rapid growth and Justice Act, hoping to deal with new cyber crime related
of technological changes. We shall examine three law cases to challenges; in particular the proliferation of Denial of Service
evidence our argument. After each case, appropriate related (DoS) attacks, and the creation and spread of “Hackers' tools”.
recommendations will be offered. An introductory section will Criticism has continued, however, in relation to its
review the original CMA while a further section will discuss interpretation and how enforceable it will be. We will expand
the emended form of the CMA and its weaknesses in on the new Act in section 4 below.
regulating cyber crime. The final part will provide some
concluding recommendations on how to regulate cyber crime III. LAW CASES
effectively.
A. DPP V Lennon
II. COMPUTER MISUSE ACT The judgment given in the case of DPP v Lennon 2006
The first piece of UK legislation which was designed to EWHC 1201 exposed the loopholes in the CMA and how it
specifically address computer misuse was the Computer could be misinterpreted [6]. The case involved a former
Misuse Act 1990. The Computer Misuse Act came into force employee of Domestic and General Group who, out of the
resentment, launched a DoS attack through the Avalanche, number and circumstances that the defendant sent them. The
mail-bomber software. He sent 5 million emails and law could easily be amended by granting the consent only to
overwhelmed the server, taking the company’s website out of bona fide emails with no malicious intent, and indeed this is
service. how the prosecution argued in the Lennon case [5]. Although
the higher judge made a better interpretation, a clear definition
He was charged under S.3 of the Computer Misuse Act of the limits of the consent needs to be established for the
1990 concerning “unauthorised access to computer systems” CMA to be effective in such cases.
[3]. The accused argued that the emails sent were authorised
since an email server was set up for the specific purpose of Another area left untouched by this case and its
receiving emails and therefore his former employer had interpretation concerns the actus reus and the motives of the
consented to receiving the emails. So despite the admitted perpetrator(s). The conviction was made based on the damage
intent to cause a problem and the pretence that they were sent caused to the computer system. But what if the emails had not
from the manager, he was acquitted. The judge interpreted the caused such a massive system failure, even though they had
CMA such as to conclude that there had been no unauthorised been intended to do so? In order to deal with actus reus in this
act [5]. scenario, it would be appropriate to suggest that the law should
make it clear that the perpetrators should be held liable based
The prosecution appealed on the basis of S17 ss (8) (a)&(b)
on their motives and not the methods of their attacks whether it
[3], which upheld by The Lord Justice Keene of the Divisional is an individual attack or attack through software.
Court [1]. He overruled the lower court’s decision by offering a
different interpretation of “unauthorised access”, such that it This has an important application in the area of ‘spam’
included “unauthorised modification to the contents of the emailing. Without a clear threshold which specifies exactly
company's computer with the intent to impair its operation,” what constitutes a DoS attack, it will always be difficult to
contrary to s.3 of the Computer Misuse Act. prosecute effectively.
Relying upon section 17 of the act, he concluded that the
defendant’s action regarding the Avalanche program had B. R V Cuthbert
caused an unauthorised modification to the contents of D&G’s By contrast with Lennon, where the defendant had
computers by adding data to their contents with the requisite malicious intent to cause damage, in R v Cuthbert there seemed
intent as provided by section 3(2) because he had intended to to be no malicious intent [8]. A seemingly non common-sense
hinder the operation of the system. Just as a householder (he interpretation of the CMA was passed by a judge in the case of
said) consents to the public walking up the path to his door a defendant who had gained unauthorised access to the website
when they have a legitimate reason for doing so but that of a charity. The defendant had himself donated £30 but feared
consent does not extend to allowing a burglar coming up his afterwards that it might have been a scam. He thought the
path or to having his letter box choked with rubbish, so he website had been spoofed and so hacked it in order to find out.
argued that as long as the emails are not sent for the purpose of His tests, however, set off alarms in an intrusion detection
communication but for the interruption of the proper operation system and Cuthbert was tracked down and charged under S.1
and use his system, that modification of data is unauthorised of the CMA. “The court took a literal interpretation of the
[5]. section 1 offence, there being no burden on the prosecution to
prove that the defendant had intended to cause any damage
Despite this apparently much more sensible interpretation, [9].”
however, the punishment afforded Lennon of 2 months curfew
still seems very light in view of the £30,000 cost to the In the previous case the defendant admitted intent to cause
company of the damage he inflicted. It also seemed to offer damage but still received very little punishment whereas in this
very little deterrence to future hackers. It has been suggested case, even though the district judge accepted non-intent, she
that the improper misinterpretation of the act in the first place proceeded to convict, saying that it was a matter of “deep
effectively meant that the Act was becoming a wholly regret that she was finding him guilty…there is almost no case
ineffective legal response to cyber crime [7]. law in this area [8].” It would be easy to pass on the blame on
the district judge for issuing such a weak verdict just because
Perhaps the problem was not only in the misinterpretations she could not find a law case, however equally it can be said
of judges, but also in the Act itself which failed to provide a that the underlying problem was the ambiguity of terms in the
clear meaning of the term “implied consent” and failing to Act, in this case that of ‘intent’. In both cases, it seems that
allow for unforeseen changes in technology. Even a world of interpretation was the problem.
emails had hardly been conceived of by the framers of the law.
It may well be considered an unfair criticism of the law to say C. DPP V Bignell
that it did not provide for what it could not foresee, and the
problem perhaps lies with the case-law UK system itself in The word “authority” is an important underlying term in
which judges feel constrained by the wording of the Act even the CMA [4]. The access or modification (now impairment) [3]
when reality has changed since the Act was passed. of data must be unauthorised for the individual to become
liable for cyber crime. If the accused was not entitled to
The judge in the lower court could have interpreted the Act control the process in question and did not have the consent of
such that the ‘implied consent’ only applied to emails from someone who was, the requisite lack of authority is established
those who were intending to communicate in good faith; that [4].
the company had never consented to receiving emails in the
One unforeseen result is that the CMA has dealt with Police & Justice Act 2006 [15]. Some of the new amendments
insiders very lightly [10]. This can be illustrated in DPP v are important and appropriate, e.g. launching a DoS attack
Bignell [11]. The defendants were police officers who becomes a criminal offence. This is now in line with the
instructed computer operators to extract information from the judgment of the divisional court in the case of Lennon.
Police National Computer for private purposes. Although they However, the problems surrounding implied consent to the
were in contravention of police policy, neither the lower nor receipt of email still remain.
the Divisional Court would convict them under the CMA since
their access was deemed a misuse rather than unauthorised. For example, Section 36 substitutes a new section 3
into the CMA which “criminalizes, among other things,
The court believed that the defendants had authority to committing a knowingly-unauthorised act with regards to a
access the data, but this surely would involve having computer with intent to impair its operation (even temporarily)
permission, something they clearly did not have. In his or being reckless as to that impairment.” The previous section
commentary on the Bignell case, J.C. Smith uses an analogy 3 offence focused on the unauthorised modification of
similar to that employed in the Lennon cases: “If I give you computer material. It may prove difficult to define what
permission to enter my study for the purposes of reading my constitutes ‘temporary impairment’ once a system is back up
books, your entering to drink my sherry would surely be
and running. The Prosecution would have to prove sufficient
unauthorised ‘access’ to the room as well as to the sherry
temporary impairment and link it to the unauthorised act.
[12].” Again it seems that judges have struggled to deal
effectively with the concept of “implied consent”. On the other On the other hand, some suggest that the updated
hand, what the judges were effectively deciding in this case CMA criminalises security experts (researchers in information
was that their actions were a breaking of policy and hence security, penetration testers etc.) if their tools fall in the hands
reprehensible, but should not be construed as criminal. It is a of cyber criminals. MacEwan raises the question, “when will
vital role for judges to find the boundary line that defines what a supplier’s general knowledge that password recovery tools
is genuinely ‘criminal’, and it is often too easy for can be used for criminal ends cross the requisite threshold of
commentators on the sidelines to see a decision as being belief in a specific case? [4]” Unless the government deals
counter-intuitive, which was not necessarily so. with this particular matter, this problem may well hamper the
development of security tools. In a report carried out in 2004,
Many have felt as a result that the government has failed to
at the time the government was considering the new
address these key issues, that the law needs to be clearer and
amendments to the section, the APIG asked the government
harsher. The House of Lords Science and Technology
Committee Report on Personal Internet Security made a series not to legislate on this particular matter [16]. Other calls for
of proposals in this direction which seem to have been largely the removal of this clause came from an MP with genuine
rebuffed by the government who remain “unconvinced” by, understanding of IT and cyber crime who stated that this was
e.g., the Committee's recommendation regarding the need for a unnecessarily and dangerously broad [17].
data security breach notification law [13]. Without an immense One further addition to the CMA s.3 involves the use of the
about of detail, it is hard to judge who is right, but there is term ‘reckless state of mind’. We have yet to see whether
certainly much uneasiness both in UK and elsewhere that not prosecutions can realistically be made under this clause, but
enough has been done. one imagines that it will lead to yet more varying and
confusing interpretations.
D. DPP V Bignell
In Regina vs Oliver Baker [14] defendant, an ex-employee V. PHONE HACKING
IT contractor, sacked by Welsh Assembly (for producing fake Mobile devices, in particular those with smart features,
pay and display parking tickets) hacked into the Assembly's have become indispensible parts of modern life. This denotes
computer system on twenty occasions to read sensitive emails. that although the three pieces of legislation including: CMA
Under the CMA, as amended, he was still only given a four 1990, RIPA 2000 and Data Protection Act (DPA) 1998 deal
month custody despite causing a great deal of expensive with unauthorised interception of mobile phone calls and
damage. This case may be briefly mentioned in addition to the messages [18], there exist very few cases upon which judges
others because it shows how the act is still being used very can rely. Ambiguous terms and definitions in the
recently in a similar way to how it was earlier, even after aforementioned pieces of legislation concerning a mobile
amendment. device have created further interpretive challenges for the
judges. For example, under the section 1 of the RIPA 2000, an
In Regina v Vallor (Simon Lee), however, a defendant
individual will commit an offence if he/she “intentionally” and
convicted of causing viruses was awarded a three year custody.
without lawful authority intercepts any communication “in the
So although there are of course problems with the legislation
course of its transmission” by means of a public or private
and the amount of proper reporting of crime that occurs, the
telecommunication systems. The offender might be sentenced
courts are perfectly capable of dealing harshly with the
to a term of imprisonment for up to two years.
problem at times.
The phrase “in the course of transmission” has created
IV. AMENDED CMA 1990 issues associated with its interpretation. In its report on Press
standards, privacy and libel [19] as also cited by the House of
To cover the loopholes within CMA, new amendments
were made to the CMA 1990 under sections 35-38 of the
Commons’ website [18], the Select Committee on Culture, Despite updates, it has not changed radically and is not really
Media and Sport reported, fit for use in 2015. Even recent cases are still being conducted
with the CMA as the principle piece of guiding legislation.
“The police ... told us that under section 1 of the Regulation
of Investigatory Powers Act (RIPA) it is only a criminal 2. The CMA was intended to deter and prosecute computer
offence to access someone else's voicemail message if they misuse external to the victim organisation. However, it has
have not already listened to it themselves. This means that to failed adequately to tackle the most prevalent IT risks of all –
prove a criminal offence has taken place it has to be proved “the misappropriation of data by those who have authorised
that the intended recipient had not already listened to the day-to-day access to it” [20].
message. This means that the hacking of messages that have
already been opened is not a criminal offence and the only 3. The CMA in its current form is equivocal about the
action the victim can take is to pursue a breach of privacy, widespread risks to corporate intellectual property which are
which we find a strange position in law.” economically just as severe as the damage made by hackers
and other cybercriminals.
It appears that evidence provided to the Culture, Media and
Sport Committee by the Metropolitan Police had indicated that 4. The CMA has not been an effective deterrent due to
a message was in the process of being transmitted until it loopholes leading to those convicted rarely receiving custody
based sentences. In 2011, the Security Minister stated,
reached its intended recipient. Once the recipient had listened
to the message, the transmission had stopped. Evidence “criminals are fearless because they do not think they will be
provided to the Home Affairs Committee has cast doubt on this caught [21]." Under the new amendments the terms of
interpretation [18][19]. This is due to the fact that a voicemail imprisonment have increased and certain offences now receive
message is stored on the mobile phone service provider’s twice longer imprisonment terms, but this is only effective if
server, not on the handset. This denotes that it is essential for a prosecution is itself easier.
hacker to communicate with the server so that he/she can listen 5. The CMA does not include compensatory element. The
to the message regardless of whether it has been previously £30,000 damage caused in the Lennon case was not required of
listened to or not. Witnesses attending the Committee had the defendant. Some restitutional element needs to be included.
stated that this denoted that a voicemail message is "in the
course of transmission" each time it is listened to and that the 6. The computer related-provisions in Police Justice Act
section 1 of RIPA therefore applied to the hacking of such a 2006 extended through parliamentary debate so that the
message on each occasion it took place [18]. amended CMA would not suffer from “the contrived
application of its predecessor to technological change” [5].
Another example of the interpretative challenges However, by doing so, it has brought new range of
concerning “smart” mobile devices under the three interpretative challenges that have created problems for the
aforementioned legislation is regarding section 1 of the CMA. courts of law. Amendments made to the CMA may provide
As already discussed in the paper, under section 1 of the CMA better solutions in the short term but technological advances
1990, a person will commit an offense if he/she knowingly are proceeding so fast that the law needs frequent updating [7].
cause a computer to preform any function with intent to secure Even in 2006, for instance, the world of social networking was
unauthorised access to any program or data held on the not yet a major feature of society, and who knows what
computer. Due to its many functions, a smart mobile device opportunities for cyber crime will have developed in the next
should be considered as a computer similar to the servers few years. In all sorts of different cases, the problem of
where voicemail messages can be stored. However, it appears technological change has tied the hands of judges so that they
that the CMA 1990 has not been utilised as the basis to are forced into difficult situations [21].
prosecute the hackers in relation to mobile devices.
7. The CMA has failed to establish a clear meaning of
Therefore, it would be appropriate to update the CMA 1990 “implied consent”. This needs to be clarified in some way to
and RIPA 2000 in order to clarify phrases such as “in the close off loopholes in the CMA.
course of transmission” and define the terms such as “smart”
phones – devices with Internet browsers and other 8. The government’s task in battling cyber crime needs to
connectivity feature. It appears that at the time of writing, focus not just on law but on better security. Crimes frequently
there are ongoing discussions regarding amending the CMA depend upon the ignorance and carelessness of their victims.
1990 in order to define “smart” phones as computers under the This may entail providing assistance and education to the
CMA 1990. These discussions have emanated from the New public and firms concerning their computer systems. It is
International phone hacking scandal in 2011. The likely reported that many firms do not have a proper understanding of
amendment to the CMA, might introduce a new offense of their own systems [21]. Having said this, it must not be
making information available with intent. For example, under permitted for defendants to argue that claimants did not take
the possible future amendments to the CMA 1990, it would be adequate precautions for the security of their own systems. It
an offense to disclose a password for someone’s mobile device would be wrong if the recipient of the spam emails in a DoS
or computer in order for others to be able to access it illegally. attack should be taken to have consented to the receipt of these
emails for example if they have not configured their servers
properly. This is well illustrated by an analogy drawn by
VI. CONCLUDING REFLECTIONS Fafinski “This is logically no different to saying that rapists
1. The CMA is still the principle instrument for the should be acquitted if their victims did not take steps to prevent
conviction of those charged with computer-related offences. it [7].”
9. Because cyber crime is not geographically limited, it [10] Law Com. No.186, Computer Misuse. Cm.819 (1989), para.3.35.
requires global solutions. In 2012, one of the servers of the [11] DPP v Bignell 1998 1 Cr. App. R. 1; 161 J.P. 541.
Intentional Atomic Energy Agency was hacked by an unknown [12] Smith, J (1998) ‘Misuse of computer - unauthorised access to computer
group critical of Israel's undeclared nuclear weapons program program or data - meaning of unauthorised’, Criminal Law Review
1999, Dec, 970-972 [NB: mis-cited in McEwan as 1998].
who posted contact information for more than 100 experts
working for the IAEA [22]. International laws are needed, [13] Hodgkinson, D. and T. Wright, (2008) ‘Government response to House
of Lords Science and Technology Committee Report on Personal
along the lines of the new European framework, which will Internet Security’, Computer and Telecommunications Law Review,
establish standards for international co-operation [23]. How 14(3), pp. 65-69.
this might work in relation to Asia or Africa seems still a rather [14] Regina v Oliver Baker [2011] EWCA Crim 928.
underexplored area [24]. [15] Police and Justice Act 2006, S.35-38 “Computer Misuse”.
10. Finally, there will increasingly be a problem over the [16] APIG (2004) ‘Revision of the Computer Misuse Act: Report of an
inquiry by the All Party Internet Group’, Report, [Online] Available at:
definition of a computer. This seemed simple in 1990 whereas https://www.cl.cam.ac.uk/~rnc1/APIG-report-cma.pdf (Accessed: 4th
today, with smart phones and all sorts of other new devices on November 2015).
the market every year, this certainty is quickly vanishing. This [17] Hansard, HL Vol.684, col.611 (July 11, 2006).
overlaps with the whole, and very topical, issue of phone [18] United Kingdom Parliament (2011) ‘Privilege: Hacking of Members'
hacking, which has not been discussed but which ought also mobile phones - Standards and Privileges Committee Contents’.
perhaps to be included under the sphere of the CMA in the [Online] Available at:
future [24]. http://www.publications.parliament.uk/pa/cm201011/cmselect/cmstnprv
/628/62805.htm#note8 (Accessed: 1st December 2015)
[19] Culture, Media and Sport Committee (2010), Press standards, privacy
REFERENCES and libel. (HC 362-1, 2009-10). London: The Stationary Office.
[1] Fafinski, S (2007) ‘The security ramifications of the Police and Justice [20] Wilding, E (2006) ‘Hacked off’, New Law Journal, 156 (7223), 753.
Act 2006’, The Network Security Journal, 2, p.8-11.
[21] BBC (2011), ‘UK cyber crime costs £27bn a year - government report’.
[2] Regina v Gold and Schifreen 1987 Q.B. 1116; 3 W.L.R. 803.
Available at: http://www.bbc.co.uk/news/uk-politics-12492309
[3] Computer Misuse Act 1990, S.1-3,17 (Accessed: 4th November 2015).
[4] MacEwan, N (2008) ‘The Computer Misuse Act 1990: Lessons from its [22] The Guardian (2012) ‘UN nuclear agency reports being hacked’,
past and predictions for its future’, Criminal Law Review, 12, pp. 955- Available at: http://www.guardian.co.uk/world/feedarticle/10547456
967. (Accessed: 10th November 2015).
[5] Fafinski, S (2007) ‘Cyber Crime’, New Law Journal, 157 (7258), 159. [23] Goldsmith, Jack L., and Tim Wu, Who Controls the Internet? Illusions
[6] DPP v Lennon 2006 EWHC 1201 (Admin), 170 J.P. 532. of a borderless world (OUP: 2006).
[7] Fafinski, S (2006) ‘Service Denied’, New Law Journal, 156(7248), [24] Cybercrime Law (2011) ‘The Group of Eight (G8)’, Available at:
1712-1713. http://www.cybercrimelaw.net/G8.html (Accessed: 12th November
[8] Regina v Cuthbert 2005 Unreported. Horseferry Magistrate’s Court 2015).
2005.
[9] Fafinski, S (2006) ‘Access Denied: Computer Misuse in an Era of
Technological Change’, Journal of Criminal Law, 70 (5) 424.

You might also like