Abstract
Computer crimes and digital investigations comprise a substantial part of criminal policy, law and practice as information becomes the cornerstone of global economy. Innovative ways of attacking, exploiting and interfering with computer and communication technologies are regularly emerging, posing increasing threats to the society, economy and security. It is essential that in tackling cybercrime the right legal framework of offences is in place and that there is clarity in how the powers that are used to investigate cybercrime interact with the offences designed to catch cyber criminals. This paper reviews the current legal framework to cyber dependent crimes in the UK, including its recent amendments, and highlights areas that remain problematic and in need of attention from policymakers.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Other classifications include computer integrity offences, computer related offences and content related offences [6].
- 2.
Note that both the Convention on Cybercrime Art 1(a) and Directive 13/40/EU Art 2 (a) provide definitions which are similar to one another.
- 3.
At p.163 (Lord Hoffman).
- 4.
Para 16 (Lord Wolf).
- 5.
- 6.
Symantec reports that in 2015, more and more companies chose not to reveal the full extent of the breaches they experienced. Companies choosing not to report the number of records lost increased by 85 percent [2].
References
Office for National Statistics: Internet Access – Households and Individuals 2015 (Statistical Bulletin). https://www.ons.gov.uk/peoplepopulationandcommunity/householdcharacteristics/homeinternetandsocialmediausage/bulletins/internetaccesshouseholdsandindividuals/2015-08-06#main-points
Symantec: Internet Security Threat Report, April 2016. https://www.symantec.com/en/uk/security-center/threat-report
HMSO: A Strong Britain in an Age of Uncertainty: The National Security Strategy. HMSO, London (2010)
Cabinet Office: The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World. Cabinet Office, London (2011)
Home Office: Cybercrime: a review of the evidence research report 75 (2013)
Walden, I.: Computer Crimes and Digital Investigations. Oxford University Press, Oxford (2016)
Fafinski, S.: The UK legislative position on cybercrime: a 20-year retrospective. J. Internet Law 13, 3–13 (2009)
Fafinski, S.: Cyber crime. New Law J. 157 (2007)
Dumpbill, E.: Computer misuse act 1990 – part 1. NLJ 140, 1117 (1990)
All Party Internet Group: Revision of the Computer Misuse Act: Report of an inquiry by the All Party Internet Group, June 2004. https://www.cl.cam.ac.uk/~rnc1/APIG-report-cma.pdf
Law Commission: ‘Computer Misuse’ Law Com No 186 Cm 819, HMSO (1989)
Explanatory Notes to the Police and Justice Act 2006
Wasik, M.: The emergence of computer law. In: Jewkes, Y., Yar, M. (eds.) Handbook of Internet Crime, p. 395. Routledge, Abingdon (2011)
CPS: Computer Misuse Act 1990 Legal Guidance. http://www.cps.gov.uk/legal/a_to_c/computer_misuse_act_1990/
Walton, R.: The Computer Misuse Act. 11 Information Security. Technical report 39 (2006)
MacEwan, N.: The Computer Misuse Act 1990: lessons from its past and predictions for its future. Crim. Law Rev. 12, 955 (2008)
Fafinski, S.: Access denied: computer misuse in an era of technologic change. JCL 70, 424 (2006)
Fafinski, S.: Computer misuse: the implications of the Police and Justice Act 2006. J. Crim. Law 72(1), 53 (2008)
Worthy, J., Fanning, M.: Denial of service: plugging the legal loopholes? CLSR 23, 194 (2007)
Fafinski, S.: Hacked off. Solicit. J. 150, 560 (2006)
Sommer, P.: Criminalizing hacking tools. Digit. Invest. 3, 68–72 (2006)
Katos, V., Furnell, S.: The security and privacy impact of criminalising the distribution of hacking tools. Comput. Fraud Secur. 2008, 9–16 (2008)
Rahman, R.: The legal measure against DoS attacks adopted by the UK legislature: should Malaysia follow suit? Int. J. Law Inf. Technol. 20, 85–101 (2012)
Council Directive (EC) 2013/40/EU of 12 August on attacks against information systems, replacing Council Framework Decision 2005/222/JHA [2013] OJ L218/8
Explanatory notes to the Serious Crime Act 2015. http://www.legislation.gov.uk/ukpga/2015/9/notes/contents
Home Office: Serious Crime Act 2015 - Fact sheet: Part 2: Computer misuse. https://www.gov.uk/government/publications/serious-crime-bill-computer-misuse. Accessed 04 Aug 2016
Zoest, J.: Computer Misuse Offences. Sweet & Maxwell, Insight, 5 May 2015
Home Office: Serious Crime Bill: Amendments to Computer Misuse Act 1990 Impact assessment (2014). https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/317527/2014-06-03_signed_IA_CMA_EU_Directive.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Sallavaci, O. (2016). Combating Cyber Dependent Crimes: The Legal Framework in the UK. In: Jahankhani, H., et al. Global Security, Safety and Sustainability - The Security Challenges of the Connected World. ICGS3 2017. Communications in Computer and Information Science, vol 630. Springer, Cham. https://doi.org/10.1007/978-3-319-51064-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-51064-4_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51063-7
Online ISBN: 978-3-319-51064-4
eBook Packages: Computer ScienceComputer Science (R0)