Skip to main content

Combating Cyber Dependent Crimes: The Legal Framework in the UK

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 630))

Abstract

Computer crimes and digital investigations comprise a substantial part of criminal policy, law and practice as information becomes the cornerstone of global economy. Innovative ways of attacking, exploiting and interfering with computer and communication technologies are regularly emerging, posing increasing threats to the society, economy and security. It is essential that in tackling cybercrime the right legal framework of offences is in place and that there is clarity in how the powers that are used to investigate cybercrime interact with the offences designed to catch cyber criminals. This paper reviews the current legal framework to cyber dependent crimes in the UK, including its recent amendments, and highlights areas that remain problematic and in need of attention from policymakers.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Other classifications include computer integrity offences, computer related offences and content related offences [6].

  2. 2.

    Note that both the Convention on Cybercrime Art 1(a) and Directive 13/40/EU Art 2 (a) provide definitions which are similar to one another.

  3. 3.

    At p.163 (Lord Hoffman).

  4. 4.

    Para 16 (Lord Wolf).

  5. 5.

    During 1990–2006 when amendments were introduced by PJA 2006, only 214 defendants were brought to the magistrates’ courts and 161 were found guilty. In comparison with the high occurrence of computer hacking these numbers are significantly low [7, 16].

  6. 6.

    Symantec reports that in 2015, more and more companies chose not to reveal the full extent of the breaches they experienced. Companies choosing not to report the number of records lost increased by 85 percent [2].

References

  1. Office for National Statistics: Internet Access – Households and Individuals 2015 (Statistical Bulletin). https://www.ons.gov.uk/peoplepopulationandcommunity/householdcharacteristics/homeinternetandsocialmediausage/bulletins/internetaccesshouseholdsandindividuals/2015-08-06#main-points

  2. Symantec: Internet Security Threat Report, April 2016. https://www.symantec.com/en/uk/security-center/threat-report

  3. HMSO: A Strong Britain in an Age of Uncertainty: The National Security Strategy. HMSO, London (2010)

    Google Scholar 

  4. Cabinet Office: The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World. Cabinet Office, London (2011)

    Google Scholar 

  5. Home Office: Cybercrime: a review of the evidence research report 75 (2013)

    Google Scholar 

  6. Walden, I.: Computer Crimes and Digital Investigations. Oxford University Press, Oxford (2016)

    Google Scholar 

  7. Fafinski, S.: The UK legislative position on cybercrime: a 20-year retrospective. J. Internet Law 13, 3–13 (2009)

    Google Scholar 

  8. Fafinski, S.: Cyber crime. New Law J. 157 (2007)

    Google Scholar 

  9. Dumpbill, E.: Computer misuse act 1990 – part 1. NLJ 140, 1117 (1990)

    Google Scholar 

  10. All Party Internet Group: Revision of the Computer Misuse Act: Report of an inquiry by the All Party Internet Group, June 2004. https://www.cl.cam.ac.uk/~rnc1/APIG-report-cma.pdf

  11. Law Commission: ‘Computer Misuse’ Law Com No 186 Cm 819, HMSO (1989)

    Google Scholar 

  12. Explanatory Notes to the Police and Justice Act 2006

    Google Scholar 

  13. Wasik, M.: The emergence of computer law. In: Jewkes, Y., Yar, M. (eds.) Handbook of Internet Crime, p. 395. Routledge, Abingdon (2011)

    Google Scholar 

  14. CPS: Computer Misuse Act 1990 Legal Guidance. http://www.cps.gov.uk/legal/a_to_c/computer_misuse_act_1990/

  15. Walton, R.: The Computer Misuse Act. 11 Information Security. Technical report 39 (2006)

    Google Scholar 

  16. MacEwan, N.: The Computer Misuse Act 1990: lessons from its past and predictions for its future. Crim. Law Rev. 12, 955 (2008)

    Google Scholar 

  17. Fafinski, S.: Access denied: computer misuse in an era of technologic change. JCL 70, 424 (2006)

    Article  Google Scholar 

  18. Fafinski, S.: Computer misuse: the implications of the Police and Justice Act 2006. J. Crim. Law 72(1), 53 (2008)

    Article  Google Scholar 

  19. Worthy, J., Fanning, M.: Denial of service: plugging the legal loopholes? CLSR 23, 194 (2007)

    Google Scholar 

  20. Fafinski, S.: Hacked off. Solicit. J. 150, 560 (2006)

    Google Scholar 

  21. Sommer, P.: Criminalizing hacking tools. Digit. Invest. 3, 68–72 (2006)

    Article  Google Scholar 

  22. Katos, V., Furnell, S.: The security and privacy impact of criminalising the distribution of hacking tools. Comput. Fraud Secur. 2008, 9–16 (2008)

    Article  Google Scholar 

  23. Rahman, R.: The legal measure against DoS attacks adopted by the UK legislature: should Malaysia follow suit? Int. J. Law Inf. Technol. 20, 85–101 (2012)

    Article  Google Scholar 

  24. Council Directive (EC) 2013/40/EU of 12 August on attacks against information systems, replacing Council Framework Decision 2005/222/JHA [2013] OJ L218/8

    Google Scholar 

  25. Explanatory notes to the Serious Crime Act 2015. http://www.legislation.gov.uk/ukpga/2015/9/notes/contents

  26. Home Office: Serious Crime Act 2015 - Fact sheet: Part 2: Computer misuse. https://www.gov.uk/government/publications/serious-crime-bill-computer-misuse. Accessed 04 Aug 2016

  27. Zoest, J.: Computer Misuse Offences. Sweet & Maxwell, Insight, 5 May 2015

    Google Scholar 

  28. Home Office: Serious Crime Bill: Amendments to Computer Misuse Act 1990 Impact assessment (2014). https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/317527/2014-06-03_signed_IA_CMA_EU_Directive.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oriola Sallavaci .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Sallavaci, O. (2016). Combating Cyber Dependent Crimes: The Legal Framework in the UK. In: Jahankhani, H., et al. Global Security, Safety and Sustainability - The Security Challenges of the Connected World. ICGS3 2017. Communications in Computer and Information Science, vol 630. Springer, Cham. https://doi.org/10.1007/978-3-319-51064-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51064-4_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51063-7

  • Online ISBN: 978-3-319-51064-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics