-
1
-
-
58049186541
-
-
May 1, 2002, April 5, 2005 and July 12, 2005.
-
May 1, 2002, April 5, 2005 and July 12, 2005.
-
-
-
-
2
-
-
58049136760
-
-
Via ss.35-38 of the Police and Justice Act 2006. Although the PJA 2006 received Royal Assent on November 8, 2006, ss.35-38 did not come into force until October 1, 2008 (via The Police and Justice Act 2006 (commencement No.9) Order 2008). Note also that the Serious Crime Act (SCA) 2007 has amended PJA 2006 ss.35 and 36 by removing from them the offences of enabling unauthorised access to computer material, and enabling acts with intent to impair the operation of a computer etc.-see SCA 2007s.61(l), (2) and (3), respectively. Also, having abolished the common law offence of incitement (see s.59), the SCA 2007 has removed all references to offences of incitement from the CMA 1990-see SCA 2007 ss.6(3), 7(4), 8(3) and 9(2)(d).
-
Via ss.35-38 of the Police and Justice Act 2006. Although the PJA 2006 received Royal Assent on November 8, 2006, ss.35-38 did not come into force until October 1, 2008 (via The Police and Justice Act 2006 (commencement No.9) Order 2008). Note also that the Serious Crime Act (SCA) 2007 has amended PJA 2006 ss.35 and 36 by removing from them the offences of enabling unauthorised access to computer material, and enabling acts with intent to impair the operation of a computer etc.-see SCA 2007s.61(l), (2) and (3), respectively. Also, having abolished the common law offence of incitement (see s.59), the SCA 2007 has removed all references to offences of incitement from the CMA 1990-see SCA 2007 ss.6(3), 7(4), 8(3) and 9(2)(d).
-
-
-
-
3
-
-
58049158574
-
-
The basic hacking offence in s. 1
-
The basic hacking offence in s. 1.
-
-
-
-
4
-
-
58049151293
-
-
Ins.3
-
Ins.3.
-
-
-
-
5
-
-
58049159768
-
-
Cr. App. R. 25
-
Whiteley (1991) 93 Cr. App. R. 25.
-
(1991)
Whiteley
, pp. 93
-
-
-
6
-
-
58049160695
-
-
See Confederation of British Industry, Submission to the Law Commission on Working Paper No. 110 on Computer Misuse-The CBI Submission Pan II (1990) 6(2) Computer Law and Security Report 23, 24.
-
See Confederation of British Industry, "Submission to the Law Commission on Working Paper No. 110 on Computer Misuse-The CBI Submission Pan II" (1990) 6(2) Computer Law and Security Report 23, 24.
-
-
-
-
7
-
-
58049175850
-
-
See also Law Commission Working Paper No. l10, Computer Misuse (1988), para.3.62.
-
See also Law Commission Working Paper No. l10, Computer Misuse (1988), para.3.62.
-
-
-
-
8
-
-
58049169766
-
Computer-related Crime Under Commonwealth Law, and the Draft Federal Criminal Code
-
See
-
See R. Brown, "Computer-related Crime Under Commonwealth Law, and the Draft Federal Criminal Code" (1986) 10 Criminal Law Journal 377;
-
(1986)
Criminal Law Journal
, vol.10
, pp. 377
-
-
Brown, R.1
-
9
-
-
58049177491
-
-
C. Tapper, 'Computer Crime': Scotch Mist? [1987] Crim. L.R. 4; Law Commission Working Paper No.l 10, Computer Misuse (1988), para. 1.4; H. Cornwall, Hacking away at computer law reform (1988) 138 N.L.J. 702;
-
C. Tapper, '"Computer Crime': Scotch Mist?" [1987] Crim. L.R. 4; Law Commission Working Paper No.l 10, Computer Misuse (1988), para. 1.4; H. Cornwall, "Hacking away at computer law reform" (1988) 138 N.L.J. 702;
-
-
-
-
10
-
-
58049135191
-
-
D. Bainbridge, Computer Misuse: What should the law do? (1989) 133 S.J. 466.
-
D. Bainbridge, "Computer Misuse: What should the law do?" (1989) 133 S.J. 466.
-
-
-
-
11
-
-
58049147331
-
-
In 1994/95
-
In 1994/95.
-
-
-
-
12
-
-
58049136400
-
-
This term has several meanings, but in this context is used to connote activities done in pursuit of unauthorised access to computer programs or data
-
This term has several meanings, but in this context is used to connote activities done in pursuit of unauthorised access to computer programs or data.
-
-
-
-
14
-
-
58049168062
-
-
M. Wasik, Law Reform Proposals on Computer Misuse [1989] Crim. L.R. 257, 260.
-
M. Wasik, "Law Reform Proposals on Computer Misuse" [1989] Crim. L.R. 257, 260.
-
-
-
-
15
-
-
58049141019
-
-
Tapper, 'Computer Crime': Scotch Mist? [1987] Crim. L.R. 4, 19.
-
Tapper, '"Computer Crime': Scotch Mist?" [1987] Crim. L.R. 4, 19.
-
-
-
-
16
-
-
58049184010
-
-
Malone v Commissioner of Police of the Metropolis [1979] Ch. 344 and Oxford v Moss (1978) 68 Cr. App. R. 183, respectively.
-
Malone v Commissioner of Police of the Metropolis [1979] Ch. 344 and Oxford v Moss (1978) 68 Cr. App. R. 183, respectively.
-
-
-
-
17
-
-
58049184631
-
-
O. Bowcott, New hacking law 'too hard to enforce', Guardian, August 29, 1990, p.2; Wasik, Law Reform Proposals on Computer Misuse [1989] Crim. L.R. 257, 260.
-
O. Bowcott, "New hacking law 'too hard to enforce'", Guardian, August 29, 1990, p.2; Wasik, "Law Reform Proposals on Computer Misuse" [1989] Crim. L.R. 257, 260.
-
-
-
-
18
-
-
77950480583
-
Should the Law of Theft extend to Information? (2005) 69
-
A. Christie, "Should the Law of Theft extend to Information?" (2005) 69(4) J. Crim. L. 349;
-
J. Crim
, vol.50
, pp. 349
-
-
Christie, A.1
-
19
-
-
58049144372
-
-
E. Wilding, Hacked Off' (2006) 156 N.L.J. 753.
-
E. Wilding, "Hacked Off' (2006) 156 N.L.J. 753.
-
-
-
-
20
-
-
58049134576
-
-
Cornwall, Hacking away at computer law reform (1988) 138 N.L.J. 702, 703.
-
Cornwall, "Hacking away at computer law reform" (1988) 138 N.L.J. 702, 703.
-
-
-
-
21
-
-
58049141007
-
-
Bowcott, New hacking law 'too hard to enforce', Guardian, August 29, 1990, p.2; B. Napier, An end to hacking? (1989) 133 S.J. 1554.
-
Bowcott, "New hacking law 'too hard to enforce'", Guardian, August 29, 1990, p.2; B. Napier, "An end to hacking?" (1989) 133 S.J. 1554.
-
-
-
-
22
-
-
58049180695
-
-
Law Com. No.186, Computer Misuse. Cm.819 (1989), para.2.13.
-
Law Com. No.186, Computer Misuse. Cm.819 (1989), para.2.13.
-
-
-
-
23
-
-
58049162961
-
-
Law Com. No.186, Computer Misuse. Cm.819 (1989), para.2.28.
-
Law Com. No.186, Computer Misuse. Cm.819 (1989), para.2.28.
-
-
-
-
24
-
-
34447156990
-
-
D. Bainbridge, Hacking-The Unauthorised Access of Computer Systems: The Legal Implications (1989) 52 M.L.R. 236;
-
D. Bainbridge, "Hacking-The Unauthorised Access of Computer Systems: The Legal Implications" (1989) 52 M.L.R. 236;
-
-
-
-
25
-
-
58049172866
-
New hacking law 'too hard to enforce'
-
August
-
Bowcott, "New hacking law 'too hard to enforce'", Guardian, August 29, 1990, p.2.
-
(1990)
Guardian
, vol.29
, pp. 2
-
-
Bowcott1
-
26
-
-
58049176924
-
-
The original CMA s.3 offence of unauthorised modification has now made way for the new s.3 offence of unauthorised impairment, inserted via PJA 2006 s.36.
-
The original CMA s.3 offence of "unauthorised modification" has now made way for the new s.3 offence of "unauthorised impairment", inserted via PJA 2006 s.36.
-
-
-
-
27
-
-
58049141856
-
-
l(l)(b),2(l) and 3(l)a
-
CMAss.l(l)(b),2(l) and 3(l)(a).
-
-
-
CMAss1
-
28
-
-
58049142454
-
-
CMA ss.l7(5)(a) and (b), and 17(8)(a) and (b).
-
CMA ss.l7(5)(a) and (b), and 17(8)(a) and (b).
-
-
-
-
29
-
-
58049158564
-
-
Law Com. No.186, Computer Misuse. Cm.819 (1989), para.3.35.
-
Law Com. No.186, Computer Misuse. Cm.819 (1989), para.3.35.
-
-
-
-
30
-
-
58049163558
-
-
Cr. App. R. 1
-
DPP v Bignell [1998] 1 Cr. App. R. 1.
-
(1998)
DPP v Bignell
, pp. 1
-
-
-
31
-
-
58049155703
-
-
At the very least, because it was stipulated in a manual which had been issued to them
-
At the very least, because it was stipulated in a manual which had been issued to them.
-
-
-
-
32
-
-
58049180075
-
-
Crim. L.R. 54
-
[1998] Crim. L.R. 54.
-
-
-
-
33
-
-
58049178425
-
-
R. v Bow Street Magistrates' Court Ex p. Allison [2000] 2 A.C. 216.
-
R. v Bow Street Magistrates' Court Ex p. Allison [2000] 2 A.C. 216.
-
-
-
-
34
-
-
58049139846
-
Hacking, Viruses and Fraud
-
Y. Akdeniz, C. Walker and D. Wall eds
-
M. Wasik, "Hacking, Viruses and Fraud" in Y. Akdeniz, C. Walker and D. Wall (eds), The Internet, Law and Society (2000), p.277.
-
(2000)
The Internet, Law and Society
, pp. 277
-
-
Wasik, M.1
-
36
-
-
58049141580
-
-
D. Ormerod ed, 11th edn
-
D. Ormerod (ed.), Smith and Hogan: Criminal Law, 11th edn (2005), p. 167.
-
(2005)
Smith and Hogan: Criminal Law
, pp. 167
-
-
-
37
-
-
58049151587
-
-
November 3, Newcastle under Lyme Magistrates' Court
-
Bonnett, unreported, November 3, 1995, Newcastle under Lyme Magistrates' Court.
-
(1995)
Bonnett, unreported
-
-
-
38
-
-
58049152812
-
-
Farquarson, unreported, December 9, 1993, Croydon Magistrates' Court.
-
Farquarson, unreported, December 9, 1993, Croydon Magistrates' Court.
-
-
-
-
39
-
-
58049175252
-
-
Cropp, unreported, case note at (1991) 7 C.L.S.R. 168.
-
Cropp, unreported, case note at (1991) 7 C.L.S.R. 168.
-
-
-
-
40
-
-
58049185104
-
-
Attorney-General's Reference (No. 1 of 1991) [1993] Q.B. 94.
-
Attorney-General's Reference (No. 1 of 1991) [1993] Q.B. 94.
-
-
-
-
41
-
-
58049139359
-
-
unreported, May 21, Southwark Crown Court
-
Bedworth, unreported, May 21, 1993, Southwark Crown Court.
-
(1993)
Bedworth
-
-
-
42
-
-
58049142748
-
-
C. Christian, Down and Out in Cyberspace (1993) 90 L.S. Gaz. 2.
-
C. Christian, "Down and Out in Cyberspace" (1993) 90 L.S. Gaz. 2.
-
-
-
-
43
-
-
58049188197
-
-
Gold, Schifreen [1987] Q.B. 1116.
-
Gold, Schifreen [1987] Q.B. 1116.
-
-
-
-
44
-
-
58049173911
-
-
Y. Akdeniz, Encyclopedia of E-Commerce Law (2005), para.15.007.
-
Y. Akdeniz, Encyclopedia of E-Commerce Law (2005), para.15.007.
-
-
-
-
45
-
-
58049149424
-
-
See, e.g. Canadian Teen Charged in Web site attack released, CNN.com, April 19, 2000, http://edition.cnn.com/2000/TECH/computing/ 04/19/dos.investtgation/index.html [Accessed September 21, 2008].
-
See, e.g. "Canadian Teen Charged in Web site attack released", CNN.com, April 19, 2000, http://edition.cnn.com/2000/TECH/computing/ 04/19/dos.investtgation/index.html [Accessed September 21, 2008].
-
-
-
-
46
-
-
58049187907
-
-
By malware which has been delivered either by spam email or via drive-by downloads
-
By malware which has been delivered either by spam email or via "drive-by downloads".
-
-
-
-
47
-
-
58049162106
-
-
See the biannual Symantec Threat Report 2006, cited in Denial-of-service hacking soars, BBC News, March 9, 2006, http://news.bbc.co.uk/go/pr/fr/-/1/hi/technology/4787474.stm [Accessed September 21, 2008].
-
See the biannual Symantec Threat Report 2006, cited in "Denial-of-service hacking soars", BBC News, March 9, 2006, http://news.bbc.co.uk/go/pr/fr/-/1/hi/technology/4787474.stm [Accessed September 21, 2008].
-
-
-
-
48
-
-
58049160983
-
-
e.g. threatened attacks against online betting websites in the lead-up to the Grand National race (http://www.timesonline.co.uk/tol/news/ articlel027674.ece [Accessed October 13, 2008]) and the Cheltenham Festival (http://www.theregister.co.uk/2004/03/17/online-extortionists-target- cheltenham [Accessed September 21, 2008]) in February and March 2004, respectively.
-
e.g. threatened attacks against online betting websites in the lead-up to the Grand National race (http://www.timesonline.co.uk/tol/news/ articlel027674.ece [Accessed October 13, 2008]) and the Cheltenham Festival (http://www.theregister.co.uk/2004/03/17/online-extortionists-target- cheltenham [Accessed September 21, 2008]) in February and March 2004, respectively.
-
-
-
-
49
-
-
58049175836
-
-
See, e.g. Hacktivists' attempt to disrupt ECHELON (the international electronic communications surveillance network) on Jam Echelon Day October 21
-
See, e.g. Hacktivists' attempt to disrupt ECHELON (the international electronic communications surveillance network) on Jam Echelon Day (October 21, 1999)-
-
(1999)
-
-
-
50
-
-
58049159754
-
-
see, at, Accessed September 21, 2008
-
see C. Oakes, "Monitor This, Echelon", at http://www.wired. com/politics/law/news/1999/10/32039 [Accessed September 21, 2008].
-
Monitor This, Echelon
-
-
Oakes, C.1
-
51
-
-
58049186985
-
-
See, e.g. the recent allegations of the Estonian Government that Russian authorities were responsible for a wave of attacks upon their websites, designed to make the Baltic State's systems crash and paralyse its infrastructure-see http://www.timesonline.co.uk/tol/news/world/article1803847.ece [Accessed September 21, 2008].
-
See, e.g. the recent allegations of the Estonian Government that Russian authorities were responsible for a wave of attacks upon their websites, designed to make the Baltic State's systems crash and paralyse its infrastructure-see http://www.timesonline.co.uk/tol/news/world/article1803847.ece [Accessed September 21, 2008].
-
-
-
-
52
-
-
58049170658
-
-
All Party Internet Group, June
-
All Party Internet Group Report, Revision of the Computer Misuse Act (June 2004), p. 10 (http://www. apcomms. org. uk).
-
(2004)
Report, Revision of the Computer Misuse Act
, pp. 10
-
-
-
53
-
-
58049178092
-
-
Lennon, unreported, November 2, 2005, Wimbledon Magistrates' Court.
-
Lennon, unreported, November 2, 2005, Wimbledon Magistrates' Court.
-
-
-
-
54
-
-
58049165763
-
-
An example of a DoS attack
-
An example of a DoS attack.
-
-
-
-
55
-
-
58049155389
-
-
Using a mail-bombing program named Avalanche, which he had downloaded from the internet
-
Using a mail-bombing program named Avalanche, which he had downloaded from the internet.
-
-
-
-
56
-
-
58049172234
-
-
T. Espinger, Teenager cleared of email attack charge, ZDNet News, November 2, 2005 (http://news.zdnet.co.uk/security/0, 1000000189,39235359,00.htm [Accessed October 13, 2008]).
-
T. Espinger, "Teenager cleared of email attack charge", ZDNet News, November 2, 2005 (http://news.zdnet.co.uk/security/0, 1000000189,39235359,00.htm [Accessed October 13, 2008]).
-
-
-
-
57
-
-
58049173168
-
-
T. Espinger, Denial of Service attacks are a legal 'grey area', ZDNet News, November 2, 2005 (hap://news.zdnet.co.uk/ security/0,1000000189,39235148,00.htm [Accessed October 13, 2008]);
-
T. Espinger, "Denial of Service attacks are a legal 'grey area'", ZDNet News, November 2, 2005 (hap://news.zdnet.co.uk/ security/0,1000000189,39235148,00.htm [Accessed October 13, 2008]);
-
-
-
-
58
-
-
58049179470
-
Computer Misuse Act crumbles as DoS attacker walks free
-
See also, November 3, Accessed September 21, 2008
-
See also M. Whipp, "Computer Misuse Act crumbles as DoS attacker walks free", PC PRO News, November 3, 2005 (http:llwww.pcpro.co. uk/newsl79505/computer-misuse-act-crumbles-as-dos-attacker-walks-free.html [Accessed September 21, 2008].
-
(2005)
PC PRO News
-
-
Whipp, M.1
-
59
-
-
58049187906
-
-
EWHC 1201
-
DPP v Lennon [2006] EWHC 1201.
-
(2006)
DPP v Lennon
-
-
-
62
-
-
58049165470
-
-
National Hi-Tech Crime Unit 2005 Survey at http://www.nhtcu.org; CSI/FBI 2004 Survey at http://i.cmpnet.com/gocsi/dbarea/pdfs/fbi/FBI2004. pdf [Accessed October 13, 2008].
-
National Hi-Tech Crime Unit 2005 Survey at http://www.nhtcu.org; CSI/FBI 2004 Survey at http://i.cmpnet.com/gocsi/dbarea/pdfs/fbi/FBI2004. pdf [Accessed October 13, 2008].
-
-
-
-
64
-
-
58049161268
-
-
See Cornwall, Hacking away at computer law reform (1988) 138 N.L.J. 702;
-
See Cornwall, "Hacking away at computer law reform" (1988) 138 N.L.J. 702;
-
-
-
-
65
-
-
58049156600
-
-
M. May, How Hacking Law Could Weaken Security, The Times, April 20, 1989, p.32; Department of Trade and Industry Report, Dealing with Computer Misuse (2002).
-
M. May, "How Hacking Law Could Weaken Security", The Times, April 20, 1989, p.32; Department of Trade and Industry Report, Dealing with Computer Misuse (2002).
-
-
-
-
66
-
-
58049168638
-
-
Y. Akdeniz, Section 3 of the Computer Misuse Act 1990: An Antidote for Computer Viruses! (1996) 3 Web J.C.L.I. 7, http://webjcli.ncl.ac. uk/1996/issue3/akdeniz3.html [Accessed September 21, 2008].
-
Y. Akdeniz, "Section 3 of the Computer Misuse Act 1990: An Antidote for Computer Viruses!" (1996) 3 Web J.C.L.I. 7, http://webjcli.ncl.ac. uk/1996/issue3/akdeniz3.html [Accessed September 21, 2008].
-
-
-
-
67
-
-
58049172867
-
-
Cornwall, Hacking away at computer law reform (1988) 138 N.L.J. 702.
-
Cornwall, "Hacking away at computer law reform" (1988) 138 N.L.J. 702.
-
-
-
-
68
-
-
58049178703
-
-
Cornwall, Hacking away at computer law reform (1988) 138 N.L.J. 702.
-
Cornwall, "Hacking away at computer law reform" (1988) 138 N.L.J. 702.
-
-
-
-
69
-
-
58049156911
-
-
Akdeniz, Section 3 of the Computer Misuse Act 1990 (1996) 3 Web J.C.L.I. 6.
-
Akdeniz, "Section 3 of the Computer Misuse Act 1990" (1996) 3 Web J.C.L.I. 6.
-
-
-
-
70
-
-
50849147505
-
-
M. Wasik, Conference Review: CBI Conference on Combating Computer Crime-Increasing Computer Security (1989) 4(5) C.L.S.R. 4.
-
M. Wasik, "Conference Review: CBI Conference on Combating Computer Crime-Increasing Computer Security" (1989) 4(5) C.L.S.R. 4.
-
-
-
-
71
-
-
58049177776
-
-
See B. Napier, An end to hacking? (1989) 133 S.J. 1554, 1556;
-
See B. Napier, "An end to hacking?" (1989) 133 S.J. 1554, 1556;
-
-
-
-
73
-
-
85044806333
-
Call to arms against the computer virus
-
See, October 12
-
See M. May, "Call to arms against the computer virus", The Times, October 12, 1989, p.34;
-
(1989)
The Times
, pp. 34
-
-
May, M.1
-
74
-
-
58049168909
-
-
M. Wasik, Law Reform Proposals on Computer Misuse [1989] Crim. L.R. 257; E. Wilding, Hacked Off' (2006) 156 N.L.J. 753.
-
M. Wasik, "Law Reform Proposals on Computer Misuse" [1989] Crim. L.R. 257; E. Wilding, "Hacked Off' (2006) 156 N.L.J. 753.
-
-
-
-
75
-
-
58049145844
-
-
e.g. s.12 of the Regulation of Investigatory Powers Act 2000, and the Regulation of Investigatory Powers (Maintenance of Interception Capability) Order 2002 (SI 2002/1931).
-
e.g. s.12 of the Regulation of Investigatory Powers Act 2000, and the Regulation of Investigatory Powers (Maintenance of Interception Capability) Order 2002 (SI 2002/1931).
-
-
-
-
76
-
-
58049152228
-
-
See, e.g. Cornwall, Hacking away at computer law reform (1988) 138 N.L.J. 702; A. Charlesworth, Addiction and hacking (1993) 143 N.L.J. 540; APIG Report, Revision of the Computer Misuse Act (June 2004), p.10.
-
See, e.g. Cornwall, "Hacking away at computer law reform" (1988) 138 N.L.J. 702; A. Charlesworth, "Addiction and hacking" (1993) 143 N.L.J. 540; APIG Report, Revision of the Computer Misuse Act (June 2004), p.10.
-
-
-
-
77
-
-
58049180397
-
-
Now subsumed within the Serious Organised Crime Agency SOCA
-
Now subsumed within the Serious Organised Crime Agency (SOCA).
-
-
-
-
79
-
-
58049174822
-
-
Note that these data are on the principal offence basis-see, Accessed September 21, 2008
-
Note that these data are on the principal offence basis-see http://www.apcomms.org.uk/apig/archive/activities-2004/computer-misuse- inquiry/computer-misuse-inquiry-written-evidence/Home-Office---CMA-regional- stats.xls [Accessed September 21, 2008];
-
-
-
-
80
-
-
58049137022
-
-
see also, Accessed September 21, 2008
-
see also http://www.mams.salford.ac.uklmamslpl?s=17&pid=69 [Accessed September 21, 2008].
-
-
-
-
81
-
-
58049187293
-
-
In all courts
-
In all courts.
-
-
-
-
84
-
-
58049179322
-
-
Law Com. No.186, Computer Misuse. Cm.819 (1989), para.2.23.
-
Law Com. No.186, Computer Misuse. Cm.819 (1989), para.2.23.
-
-
-
-
85
-
-
58049149719
-
-
Law Com. No.186, Computer Misuse. Cm.819 (1989), paras 2.24-2.25.
-
Law Com. No.186, Computer Misuse. Cm.819 (1989), paras 2.24-2.25.
-
-
-
-
86
-
-
58049155702
-
Update
-
on the, J.B.L
-
B. Napier, "Update on the CMA 1990" [1994] J.B.L. 522, 527.
-
(1990)
CMA
, vol.522
, pp. 527
-
-
Napier, B.1
-
87
-
-
24144457779
-
-
See, e.g. A. Flanagan, The Law and Computer Crime: Reading the Script of Reform (2005) 13 I.J.L. &I.T. 98.
-
See, e.g. A. Flanagan, "The Law and Computer Crime: Reading the Script of Reform" (2005) 13 I.J.L. &I.T. 98.
-
-
-
-
88
-
-
58049190119
-
-
APIG Report, Revision of the Computer Misuse Act (June 2004), para.89.
-
APIG Report, Revision of the Computer Misuse Act (June 2004), para.89.
-
-
-
-
89
-
-
58049133663
-
-
Examples include the Melissa Virus (1999), the Sobig F Virus (2003) and the Sasser Worm (2004).
-
Examples include the Melissa Virus (1999), the Sobig F Virus (2003) and the Sasser Worm (2004).
-
-
-
-
90
-
-
58049148310
-
-
See, e.g. APIG Report, Revision of the Computer Misuse Act (June 2004), para.91.
-
See, e.g. APIG Report, Revision of the Computer Misuse Act (June 2004), para.91.
-
-
-
-
95
-
-
58049139358
-
-
Wilding, Hacked Off (2006) 156 N.L.J. 753.
-
Wilding, "Hacked Off" (2006) 156 N.L.J. 753.
-
-
-
-
96
-
-
58049152227
-
-
Wilding, Hacked Off' (2006) 156 N.L.J. 753.
-
Wilding, "Hacked Off' (2006) 156 N.L.J. 753.
-
-
-
-
99
-
-
58049177775
-
-
Through its Convention on Cybercrime-see, Accessed September 21, 2008
-
Through its Convention on Cybercrime-see http://www.conventions.coe. int/Treaty/en/ Treaties/Html/185.htm [Accessed September 21, 2008].
-
-
-
-
101
-
-
58049135794
-
-
The maximum term of imprisonment on summary conviction has been raised to 12 months, and been set at 2 years on indictment-see the new s.1(3) of the CMA 1990, as amended by s.35 of the PJA 2006. However, at the time of writing (October 2008), s. 154(1) of the Criminal Justice Act 2003 has not yet come into force. This renders later, statutory references to 12 months' maximum sentences in the magistrates' courts (such as this one in the amended CMA) ineffective. Consequently, for now, the maximum term of imprisonment on summary conviction for ss.1, 2, 3 and 3A CMA offences remains at six months-see s.38(6) of the PJA 2006.
-
The maximum term of imprisonment on summary conviction has been raised to 12 months, and been set at 2 years on indictment-see the new s.1(3) of the CMA 1990, as amended by s.35 of the PJA 2006. However, at the time of writing (October 2008), s. 154(1) of the Criminal Justice Act 2003 has not yet come into force. This renders later, statutory references to 12 months' maximum sentences in the magistrates' courts (such as this one in the amended CMA) ineffective. Consequently, for now, the maximum term of imprisonment on summary conviction for ss.1, 2, 3 and 3A CMA offences remains at six months-see s.38(6) of the PJA 2006.
-
-
-
-
102
-
-
58049134263
-
-
Art.6
-
Art.6.
-
-
-
-
103
-
-
58049178424
-
-
See, Accessed September 21, 2008
-
See http://www.conventions.coe.int/Treaty/en/Treaties/Html/185.htm [Accessed September 21, 2008]
-
-
-
-
104
-
-
58049143779
-
-
See, Accessed September 21, 2008
-
See http://eur-lex. europa. eu/LexUriServ/LexUriServ. do?uri=CELEX:32005F0222:EN:HTML [Accessed September 21, 2008].
-
-
-
-
105
-
-
58049144055
-
-
Which can be temporary-s.3(3)c
-
Which can be temporary-s.3(3)(c).
-
-
-
-
107
-
-
58049148309
-
-
See Art.5
-
See Art.5.
-
-
-
-
108
-
-
58049147719
-
-
See Art.3
-
See Art.3.
-
-
-
-
109
-
-
58049149119
-
-
See the new CMA s.3(3), as inserted by PJA 2006 s.36.
-
See the new CMA s.3(3), as inserted by PJA 2006 s.36.
-
-
-
-
110
-
-
58049176336
-
-
As inserted by PJA 2006 s.37.
-
As inserted by PJA 2006 s.37.
-
-
-
-
113
-
-
58049161776
-
-
S. Fafmski, Hacked Off' (2006) 150 S.J. 560, 561.
-
S. Fafmski, "Hacked Off' (2006) 150 S.J. 560, 561.
-
-
-
-
114
-
-
58049142747
-
-
See s.3A
-
See s.3A.
-
-
-
-
115
-
-
58049150992
-
-
See Art.6
-
See Art.6.
-
-
-
-
116
-
-
58049147023
-
-
Including software-s.3A(3).
-
Including software-s.3A(3).
-
-
-
-
118
-
-
58049180395
-
-
Ethical hackers who seek, and then expose, computer and network security weaknesses
-
Ethical hackers who seek, and then expose, computer and network security weaknesses.
-
-
-
-
119
-
-
58049189802
-
-
Walden, Computer Crimes and Digital Investigations (2007), p. 196.
-
Walden, Computer Crimes and Digital Investigations (2007), p. 196.
-
-
-
-
120
-
-
58049170056
-
-
Hansard, HC Standing Committee D, col.262 (March 28, 2006).
-
Hansard, HC Standing Committee D, col.262 (March 28, 2006).
-
-
-
-
121
-
-
58049150991
-
-
Hansard, HC Standing Committee D, col.267 (March 28, 2006).
-
Hansard, HC Standing Committee D, col.267 (March 28, 2006).
-
-
-
-
122
-
-
58049143778
-
Home Office letter by the Earl of Northesk; see Hansard
-
Quoted from a, HL col.612 July 11
-
Quoted from a Home Office letter by the Earl of Northesk; see Hansard, HL Vol.684, col.612 (July 11 2006).
-
(2006)
, vol.684
-
-
-
123
-
-
58049186238
-
-
HL col.213 October 10
-
Hansard, HL Vol.685, col.213 (October 10, 2006).
-
(2006)
Hansard
, vol.685
-
-
-
124
-
-
58049172865
-
-
HL col.611 July 11
-
Hansard, HL Vol.684, col.611 (July 11, 2006).
-
(2006)
Hansard
, vol.684
-
-
-
125
-
-
58049150684
-
-
See, e.g. the recent hack into a US governmental email system-Cyber attack on Pentagon email, BBC News, June 22, 2007-http://news. bbc.co.uk/1/hi/world/americas/6229188.stm [Accessed September 21, 2008].
-
See, e.g. the recent hack into a US governmental email system-"Cyber attack on Pentagon email", BBC News, June 22, 2007-http://news. bbc.co.uk/1/hi/world/americas/6229188.stm [Accessed September 21, 2008].
-
-
-
-
127
-
-
58049179469
-
-
Potent, malicious software in the form of meta-trojans which contain many layers of viral infection
-
Potent, malicious software in the form of meta-trojans which contain many layers of viral infection.
-
-
-
-
128
-
-
58049135181
-
-
The other three being code, markets and norms
-
The other three being "code", markets and norms.
-
-
-
-
130
-
-
77952992831
-
The Law of the Horse: What Cyberlaw Might Teach
-
501
-
L. Lessig, "The Law of the Horse: What Cyberlaw Might Teach" (1999) 113 Harvard Law Review 501, 546.
-
(1999)
Harvard Law Review
, vol.113
, pp. 546
-
-
Lessig, L.1
-
131
-
-
58049136759
-
Thinking Locally, Acting Globally
-
See, e.g, List, January 15
-
See, e.g. J.P. Barlow, "Thinking Locally, Acting Globally" Cyber-Rights Electronic List, January 15, 1996;
-
(1996)
Cyber-Rights Electronic
-
-
Barlow, J.P.1
-
134
-
-
58049149718
-
-
Goldsmith and Wu, Who Controls the Internet? (2006), p. 164.
-
Goldsmith and Wu, Who Controls the Internet? (2006), p. 164.
-
-
-
-
135
-
-
58049181925
-
Maintaining order and law on the Internet
-
See, generally, D.S. Wall ed
-
See, generally, D.S. Wall, "Maintaining order and law on the Internet" in D.S. Wall (ed.), Crime and the Internet (2001).
-
(2001)
Crime and the Internet
-
-
Wall, D.S.1
-
136
-
-
58049179319
-
-
The new ss.3 and 3A of the CMA.
-
The new ss.3 and 3A of the CMA.
-
-
-
|