Computer Use and Misuse: the Constellation of Control

Total Page:16

File Type:pdf, Size:1020Kb

Computer Use and Misuse: the Constellation of Control Computer use and misuse: the constellation of control Stefan Frederick Fafinski Submitted in accordance with the requirements for the degree of Doctor of Philosophy The University of Leeds School of Law September 2008 The candidate confirms that the work submitted is his own and that appropriate credit has been given where reference has been made to the work of others. This copy has been supplied on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. Acknowledgements This study was funded by the Centre for Criminal Justice Studies at the University of Leeds from 2005 – 2008. I will remain indebted for some considerable time to Professor Clive Walker for his meticulous and thorough guidance as well as his thought- provoking and robust comments on a multitude of earlier drafts. I should also like to extend my grateful thanks to Professor David S. Wall for his insight and support. This thesis is for Emily. SF Wokingham September 2008 ii Abstract This study is concerned with the nature of computer misuse and the legal and extra- legal responses to it. It explores what is meant by the term ‘computer misuse’ and charts its emergence as a problem as well as its expansion in parallel with the continued progression in computing power, networking, reach and accessibility. In doing so, it surveys the attempts of the domestic criminal law to deal with some early manifestations of computer misuse and the consequent legislative passage of the Computer Misuse Act 1990. Having outlined the new criminal offences introduced by the 1990 Act, the study examines the extent to which the 1990 Act has been effective in controlling computer misuse, taking both prosecution rates and issues of judicial interpretation into account. It further examines the amendments made to the 1990 Act by the Police and Justice Act 2006 and their potential ramifications when they come into force. Having considered the position at domestic criminal law, the study turns to assess whether the solution to the effective regulation of computer misuse requires more than just the domestic criminal law. It explores the characteristics and purpose of the criminal law in the context of computer misuse and examines whether the domestic criminal law has limitations. The study then introduces theories of risk from realist, cultural and symbolic, ‘risk society’ and governmentality perspectives before considering the idea of a governance network as a means of responding to risk. It examines computer misuse and the role of the domestic criminal law in the light of these theories. Having established the theoretical governance framework, the study then explores the role of the law in general within this framework, examining potential new nodes of governance from the European Union, Council of Europe, Commonwealth, United Nations and Group of Eight. It considers whether there might be advantages in moving beyond the domestic criminal law in the response to computer misuse. The study then broadens the discussion of potential means of governance beyond the law to encompass extra-legal initiatives. It establishes a typology of these extra-legal initiatives and examines the contribution made by each to the governance of computer misuse. Finally, this study concludes with an examination of the complex governance network built up throughout the work and considers whether the regulation of computer misuse is only viable in a global networked society by a networked response combining nodes of both legal and extra-legal governance. iii Table of contents Acknowledgements........................................................................................................ i Abstract ........................................................................................................................ ii Index of tables............................................................................................................viii Index of figures............................................................................................................ ix Table of cases ............................................................................................................... x Court of Justice of the European Communities and Court of First Instance............. x European Court of Human Rights ............................................................................ x United Kingdom ...................................................................................................... xi United States of America ....................................................................................... xiii Hong Kong ............................................................................................................ xiii Table of legislation .....................................................................................................xiv European Union ......................................................................................................xiv Treaties and agreements......................................................................................xiv Regulations.........................................................................................................xiv Directives ............................................................................................................xiv Framework Decisions...........................................................................................xv Council Decisions ................................................................................................xv European Commission documents .......................................................................xv United Kingdom .....................................................................................................xvi Acts of Parliament ..............................................................................................xvi Statutory instruments.........................................................................................xvii Bills ....................................................................................................................xvii United States.........................................................................................................xviii Hong Kong ...........................................................................................................xviii Council of Europe.................................................................................................xviii United Nations .....................................................................................................xviii Table of abbreviations ............................................................................................... xix 1 Introduction................................................................................................................1 1.1 Central thesis and contribution to knowledge ...................................................2 1.2 Principal research questions and chapter structure.............................................2 1.3 Methodology.....................................................................................................4 1.3.1 Documentary research.................................................................................4 1.3.2 Fieldwork approach ....................................................................................4 1.3.3 Form of interview .......................................................................................5 iv 1.3.4 Interview guide ...........................................................................................6 1.3.5 Sampling strategy ........................................................................................8 1.3.6 Analysis..................................................................................................... 11 1.3.7 Research ethics ......................................................................................... 12 1.3.8 Informed consent...................................................................................... 13 1.3.9 Confidentiality and data protection.......................................................... 13 1.4 Terminology.................................................................................................... 14 Part 1 Constructing the problem of computer misuse ............................................... 19 2 The emergence of the problem of computer misuse .................................................. 20 2.1 A brief history of computing ........................................................................... 20 2.1.1 Key advances in computing....................................................................... 20 2.1.2 The growth of networked computing ....................................................... 23 2.1.3 Knowledge gap.......................................................................................... 24 2.2 Manifestations of computer misuse................................................................. 25 2.3 Pre-1990 regulation .......................................................................................... 28 2.4 The genesis of the Computer Misuse Act 1990 ................................................ 34 2.4.1 The Scottish Law Commission.................................................................. 34 2.4.2 The Law Commission of England and Wales............................................. 36 2.4.3
Recommended publications
  • Prison Education in England and Wales. (2Nd Revised Edition)
    DOCUMENT RESUME ED 388 842 CE 070 238 AUTHOR Ripley, Paul TITLE Prison Education in England and Wales. (2nd Revised Edition). Mendip Papers MP 022. INSTITUTION Staff Coll., Bristol (England). PUB DATE 93 NOTE 30p. AVAILABLE FROMStaff College, Coombe Lodge, Blagdon, Bristol BS18 6RG, England, United Kingdom (2.50 British pounds). PUB TYPE Information Analyses (070) EDRS PRICE MF01/PCO2 Plus Postage. DESCRIPTORS Adult Basic Education; *Correctional Education; *Correctional Institutions; Correctional Rehabilitation; Criminals; *Educational History; Foreign Countries; Postsecondary Education; Prisoners; Prison Libraries; Rehabilitation Programs; Secondary Education; Vocational Rehabilitation IDENTIFIERS *England; *Wales ABSTRACT In response to prison disturbances in England and Wales in the late 1980s, the education program for prisoners was improved and more prisoners were given access to educational services. Although education is a relatively new phenomenon in the English and Welsh penal system, by the 20th century, education had become an integral part of prison life. It served partly as a control mechanism and partly for more altruistic needs. Until 1993 the management and delivery of education and training in prisons was carried out by local education authority staff. Since that time, the education responsibility has been contracted out to organizations such as the Staff College, other universities, and private training organizations. Various policy implications were resolved in order to allow these organizations to provide prison education. Today, prison education programs are probably the most comprehensive of any found in the country. They may range from literacy education to postgraduate study, with students ranging in age from 15 to over 65. The curriculum focuses on social and life skills.
    [Show full text]
  • RE-VISITING the FRAUD ACT 2006 – a STEP TOO FAR? Hannah Willcocks
    RE-VISITING THE FRAUD ACT 2006 – A STEP TOO FAR? Hannah Willcocks Brought into force on 15th January 2007,1 the Fraud Act 2006 (‘the Act’) has now been part of the criminal law of England and Wales for over 12 years. Through the introduction of a new general offence of fraud, its aim was to improve the law by making it: a. more comprehensible to juries, especially in serious fraud trials; b. a useful tool in effective prosecutions; c. simpler and therefore fairer; and d. more flexible so able to encompass all forms of fraud 2 and “deal with developing technology”.3 Following the Act’s implementation, it has generally4 been accepted5 that the Act has managed to overcome the vast majority of the difficulties previously encountered with the old offences of deception.6 In 2012, in its Post-Legislative Assessment of the Fraud Act 2006, the Ministry of Justice (‘MoJ’) concluded that the aims and objectives of the 1 The Fraud Act 2006 (Commencement) Order 2006 (SI 2006/3200). 2 Law Commission, Fraud (Law Com No 276, Cm 5560, 2002), para 1.6. 3 Home Office, Fraud Law Reform: Consultation on Proposals for Legislation (2004) p. 5. 4 For a contrary view see Anthony Arlidge QC, Jonathan Fisher QC, Alexander Milne QC and Polly Sprenger, Arlidge and Parry on Fraud (5th edn, Sweet & Maxwell 2016) 44, para 3-005. 5 See e.g. Simester and Sullivan’s Criminal Law, Theory and Doctrine (5th edn, Hart Publishing Ltd 2013) 610; Andrew Ashworth & Jeremy Horder, Principles of Criminal Law (7th edn, Oxford University Press 2013) 405; Carol Withey ‘The Fraud Act 2006 – some early observations and comparisons with the former law’ (2007) 71(3) Journal of Criminal Law, 220 – 237, 228 – 236; Nicholas Yeo, ‘Bull’s-Eye’, 157 NLJ 212 & 418.
    [Show full text]
  • Explanatory Notes
    These notes refer to the Serious Crime Bill [HL] as introduced in the House of Lords on 5th June 2014 [HL Bill 1] SERIOUS CRIME BILL [HL] —————————— EXPLANATORY NOTES INTRODUCTION 1. These Explanatory Notes relate to the Serious Crime Bill [HL] as introduced into the House of Lords on 5th June 2014. They have been prepared by the Home Office in order to assist the reader of the Bill and to help inform debate on it. They do not form part of the Bill and have not been endorsed by Parliament. 2. The Notes need to be read in conjunction with the Bill. They are not, and are not meant to be, a comprehensive description of the Bill. So where a clause or part of a clause does not seem to require any explanation or comment, none is given. 3. A glossary of abbreviations and terms used in these Explanatory Notes is contained in Annex A to these Notes. OVERVIEW 4. Serious and organised crime includes drug trafficking, human trafficking, organised illegal immigration, child sexual exploitation, high value fraud and other financial crime, counterfeiting, organised acquisitive crime and cyber crime. Organised crime costs the United Kingdom at least £24 billion each year. As at December 2013, there are some 36,600 organised criminals in 5,300 groups currently operating in ways that directly affect the UK1. In October 2013, the Government published its Serious and Organised Crime Strategy (Cm 8715)2. The aim of the strategy is to reduce substantially the level of serious and organised crime affecting the UK and its interests.
    [Show full text]
  • Gigabit-Broadband in the UK: Government Targets and Policy
    BRIEFING PAPER Number CBP 8392, 30 April 2021 Gigabit-broadband in the By Georgina Hutton UK: Government targets and policy Contents: 1. Gigabit-capable broadband: what and why? 2. Gigabit-capable broadband in the UK 3. Government targets 4. Government policy: promoting a competitive market 5. Policy reforms to help build gigabit infrastructure Glossary www.parliament.uk/commons-library | intranet.parliament.uk/commons-library | [email protected] | @commonslibrary 2 Gigabit-broadband in the UK: Government targets and policy Contents Summary 3 1. Gigabit-capable broadband: what and why? 5 1.1 Background: superfast broadband 5 1.2 Do we need a digital infrastructure upgrade? 5 1.3 What is gigabit-capable broadband? 7 1.4 Is telecommunications a reserved power? 8 2. Gigabit-capable broadband in the UK 9 International comparisons 11 3. Government targets 12 3.1 May Government target (2018) 12 3.2 Johnson Government 12 4. Government policy: promoting a competitive market 16 4.1 Government policy approach 16 4.2 How much will a nationwide gigabit-capable network cost? 17 4.3 What can a competitive market deliver? 17 4.4 Where are commercial providers building networks? 18 5. Policy reforms to help build gigabit infrastructure 20 5.1 “Barrier Busting Task Force” 20 5.2 Fibre broadband to new builds 22 5.3 Tax relief 24 5.4 Ofcom’s work in promoting gigabit-broadband 25 5.5 Consumer take-up 27 5.6 Retiring the copper network 28 Glossary 31 ` Contributing Authors: Carl Baker, Section 2, Broadband coverage statistics Cover page image copyright: Blue Fiber by Michael Wyszomierski.
    [Show full text]
  • Principles of Criminal Liability
    Criminal Law G153 PPRINCIPLES OF CCRIMINAL LLIABILITY 22:: Mens Rea By the end of this unit, you will be able to: Explain what is meant by the term ‘mens rea’ and illustrate your explanation with cases Understand what is meant by the terms: o Direct intent, o Oblique intent, o Specific & basic intent. Explain the current legal test for recklessness, and understand how the test evolved. Explain the scope of the doctrine of transferred malice and how the courts have developed the concept of coincidence. You will also be able to evaluate: The development of the law on oblique intent and the proposals for reforming it. The limitations of the doctrines of coincidence and transferred malice. Homework During this unit, you will be set the following. In completing homework, you will be expected to do your own research and supplement your own notes. This is essential to show understanding. 1. Complete Homework Sheet (2) 2. Complete Case Cards for Actus Reus and Mens Rea. End of Unit Assessment As with AS, you will sit a DRAG test on elements, but this will be done at the end of this unit. You will also complete the following problem question (from Part B of the exam), which we will plan in lesson time, and you will then write up in timed circumstances as your termly assessment. Wayne belongs to a terrorist organisation. He telephones the police to say that he has placed a bomb in a van on Westminster Bridge and confirms that it is timed to explode in fifteen minutes. The police telephone operator mistakenly thinks that Wayne has said 'fifty minutes' and immediately communicates this information to his superior officer.
    [Show full text]
  • The Principle of Equivalence and the Future of Mental Health Care in Prisons
    BRITISH JOURNAL OF PSYCHIATRY (2004), 184, 5^7 EDITORIAL The principle of equivalence and the future restrictive environment for a mentally ill prisoner charged with shoplifting? Is a wait of mental health care in prisons of months for transfer to hospital ‘timely’ in accordance with Standard 5 of the National Service Framework? SIMON WILSON Prison health care wings are not hos- pitals, being specifically excluded by the National Health Service Act 1977, and consequently prisoners located there can- not receive medication against their wishes under the Mental Health Act 1983, unlike their counterparts in hospitals in In March 1999 the British Government ordinary location – for example, with the NHS and independent sector. Treat- publishedpublished The Future Organisation of regular input from psychiatric nursing, ment can be given only under common Prison Health Care, setting out the arrange- monitoring compliance with medication law, and this has tended to be interpreted ments for a formal partnership between the and beginning to implement the care in very narrow fashion so that medication Prison Service and the National Health programme approach. is held in reserveuntil an emergency (see Service (HM Prison Service & NHS Execu- The National Service Framework for for more detailed discussion Wilson & tive, 1999). On 1 April 2003, the NHS Mental Health (Department of Health, Forrester,Forrester,2002).2002). In addition, owing to formally took over the provision of health 1999) details principles and standards for the lengthy delays in assessment and trans- care within the 138 prisons in England the provision of psychiatric care: fer to hospital, psychiatrists who have and Wales.
    [Show full text]
  • How Specialist ECT Consultants Inform Patients About Memory Loss
    Forrester et al Hospital transfer outcomes and delays from two London prisons 7 Department of Health. National Scheme. A prospective study of the 13 Wilson S, ForresterA.Too little, too 14 Riviere v. France (2006) ECHR. Schedule of Reference Costs transfer of mentally disordered late? The treatment of mentally Application no. 33834/03, 2006-2007 for NHS Trusts. remand prisoners from prison to incapacitated prisoners. J Forensic 11July. original Department of Health, 2007. psychiatric units. BrJ Psychiatry Psychiatry 2002; 13:1-8. 1995; 166:802-5. papers 8 HMInspectorate of Prisons.Patientor *Andrew Forrester Consultant and Honorary Senior Lecturer in Forensic Prisoner? A New Strategy for Health- 11 Isherwood S, Parrott J. Audit of Psychiatry, Healthcare Department, HM Prison Brixton, Jebb Avenue, London SW2 care in Prisons. Home Office,1996. transfers under the Mental Health 5XF, email: andrew.forrester@ slam.nhs.uk, Christopher Henderson Act from prison - the impact of Formerly Research Associate, Bracton Centre Medium Secure Unit, Bexley, 9 Robertson G, Dell S, James K, organisational change. Psychiatr Simon Wilson Consultant and Honorary Senior Lecturer in Forensic Psychiatry, Grounds A. Psychotic menremanded Bull 2002; 26:368-70. Oxleas NHS FoundationTrust and Institute of Psychiatry, London, Ian Cumming in custody to Brixton Prison. BrJ 12 McKenzie N, Sales B. New Consultant in Forensic Psychiatry, HM Prison Belmarsh, London, Miriam Psychiatry1994; 164:55-61. procedures to cut delays in transfer Spyrou Assistant Psychologist, Bracton Centre Medium Secure Unit, 10 Banerjee S, O’Neill-Byrne K, of mentally ill prisoners to hospital. Bexley, Janet Parrott Consultant in Forensic Psychiatry, Bracton Centre ExworthyT, ParrottJ.The Belmarsh Psychiatr Bull 2008; 32:20-2.
    [Show full text]
  • Computer Misuse Act 1990 Is up to Date with All Changes Known to Be in Force on Or Before 03 August 2021
    Changes to legislation: Computer Misuse Act 1990 is up to date with all changes known to be in force on or before 03 August 2021. There are changes that may be brought into force at a future date. Changes that have been made appear in the content and are referenced with annotations. (See end of Document for details) View outstanding changes Computer Misuse Act 1990 1990 CHAPTER 18 An Act to make provision for securing computer material against unauthorised access or modification; and for connected purposes. [29th June 1990] Be it enacted by the Queen’s most Excellent Majesty, by and with the advice and consent of the Lords Spiritual and Temporal, and Commons, in this present Parliament assembled, and by the authority of the same, as follows:— Computer misuse offences 1 Unauthorised access to computer material. (1) A person is guilty of an offence if— (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer [F1, or to enable any such access to be secured] ; (b) the access he intends to secure [F2, or to enable to be secured,] is unauthorised; and (c) he knows at the time when he causes the computer to perform the function that that is the case. (2) The intent a person has to have to commit an offence under this section need not be directed at— (a) any particular program or data; (b) a program or data of any particular kind; or (c) a program or data held in any particular computer.
    [Show full text]
  • Cyber-Crime in Scotland: a Review of the Evidence
    Cyber-crime in Scotland: A Review of the Evidence CRIME AND JUSTICE social research Contents Executive Summary ................................................................................................ 5 Purpose ................................................................................................................. 5 What is cyber-crime? ............................................................................................. 5 Context - Internet use in Scotland ......................................................................... 6 Key findings- Crimes affecting individuals ............................................................. 6 Non-sexual crimes of violence ........................................................................... 6 Sexual crimes .................................................................................................... 6 Fraud ................................................................................................................. 7 Computer misuse ............................................................................................... 8 Other crimes ...................................................................................................... 8 Miscellaneous Offences ..................................................................................... 8 Key findings- crimes affecting businesses ............................................................. 9 Fraud ................................................................................................................
    [Show full text]
  • A Year of Criminal Appellate Decisions
    A Year of Criminal Appellate Decisions The Honourable Justice R A Hulme 14 August 2019 CONTENTS SCOPE OF PAPER .................................................................................................................................................. 6 APPEALS ............................................................................................................................................................... 6 Tendency evidence – determination of whether there is significant probative value is a matter for the appellate court ................................................................................................................................................ 6 The Court of Criminal Appeal does not have jurisdiction under s 5F of the Criminal Appeal Act 1912 to entertain an appeal against a judge’s refusal to disqualify him/herself ......................................................... 6 Overcoming the principle of double jeopardy by overturning an acquittal ................................................... 6 “Conviction” in s 5(1) Criminal Appeal Act 1912 includes where a guilty verdict has been returned but no formal conviction has been entered ............................................................................................................... 7 A principal protected confider has standing to appeal to the Court of Criminal Appeal in relation to the sexual assault communications privilege ........................................................................................................ 8
    [Show full text]
  • Pearson Edexcel International Advanced Level Law YLA1 Paper 2 the Law in Action Question 1 Exemplar Scripts with Examiner Commentaries
    Pearson Edexcel International Advanced Level Law YLA1 Paper 2 The Law in Action Question 1 Exemplar scripts with examiner commentaries Issue 1. June 2017 examination series Introduction This set of exemplar responses with examiner commentaries for IAL Law, Paper 2, The Law in Action, has been produced as additional guide to support teachers delivering and students studying the International Advanced Level Law specification. The scripts selected exemplify performances in this paper in the June 2017 examination series and indicate standards expected to achieve the different levels of award. Paper 2 assesses Law in action in the A Level Law specification and is split into five questions. Questions can cover a diverse range of issues. Except for questions 1 and 5-part (a) and (b) questions test students’ knowledge, understanding and application of the law. All other questions require students to analyses and often evaluate a problem using their knowledge and understanding of appropriate legal principles. The exam duration is 3 hours. The paper is marked out of 100 and is worth 50% of the qualification. The command words used are defined in the Getting Started Guide and the Sample assessment materials. They will remain the same for the lifetime of the specification. Questions will only ever use a single command word and command words are used consistently across question types and mark tariffs. This document should be used alongside other IAL Law teaching and learning materials available on the website here. The IAL Law Mark Scheme for the June 2017 examination series is here on the website for reference. IAL Law Paper 2 - The Law in Action (YLA1/02) Exemplar 1 – Question 1(a) 1(a) Failure to provide a breath sample to the police is a crime.
    [Show full text]
  • Communications Bill (Volume II)
    Communications Bill (Volume II) The Bill is divided into two volumes. Volume I contains Clauses 1 to 355. Volume II contains Clauses 356 to 403 and the Schedules. CONTENTS PART 1 FUNCTIONS OF OFCOM Transferred and assigned functions 1 Functions and general powers of OFCOM 2 Transfer of functions of pre-commencement regulators General duties in carrying out functions 3 General duties of OFCOM 4 Duties for the purpose of fulfilling Community obligations 5 Directions in respect of networks and spectrum functions 6 Duties to review regulatory burdens 7 Duty to carry out impact assessments 8Duty to publish and meet promptness standards 9 Secretary of State’s powers in relation to promptness standards Media literacy 10 Duty to promote media literacy OFCOM’s Content Board 11 Duty to establish and maintain Content Board 12 Functions of the Content Board Functions for the protection of consumers 13 Consumer research 14 Duty to publish and take account of research 15 Consumer consultation 16 Membership etc. of the Consumer Panel 17 Committees and other procedure of the Consumer Panel 18 Power to amend remit of Consumer Panel HL Bill 41 53/2 iv Communications Bill International matters 19 Representation on international and other bodies 20 Directions for international purposes in respect of broadcasting functions General information functions 21 Provision of information to the Secretary of State 22 Community requirement to provide information 23 Publication of information and advice for consumers etc. Employment in broadcasting 24 Training and equality of opportunity Charging 25 General power to charge for services Guarantees 26 Secretary of State guarantees for OFCOM borrowing Provisions supplemental to transfer of functions 27 Transfers of property etc.
    [Show full text]