Hacking And Computer Misuse Prosecutions
Hacking refers to unauthorized access to computer systems, networks, or data. It often involves bypassing security measures to steal information, disrupt services, or cause damage.
Computer Misuse broadly covers illegal activities involving computers, including hacking, spreading malware, denial-of-service attacks, identity theft, and unauthorized data modification.
Many countries have specific legislation addressing these crimes, like the Computer Fraud and Abuse Act (CFAA) in the U.S. or the Computer Misuse Act 1990 in the UK.
Key Elements of Computer Misuse Offenses
Unauthorized access to computer systems or data.
Intent to commit or facilitate further illegal acts.
Causing damage or loss to computer systems or data.
Fraudulent use of data or credentials.
Important Case Laws on Hacking and Computer Misuse
1. United States v. Lori Drew, 259 F.R.D. 449 (C.D. Cal. 2009)
Facts: Lori Drew was charged with violating the CFAA for creating a fake MySpace account, which led to harassment and the victim’s suicide.
Issue: Whether violating website terms of service constitutes unauthorized access under the CFAA.
Decision: The court ruled that violating terms of service alone does not constitute unauthorized access, limiting the CFAA’s reach.
Significance: This case clarified the limits of prosecuting hacking under the CFAA and the importance of defining “unauthorized access.”
2. R v. Gold & Schifreen (1988) (UK)
Facts: Two hackers accessed British Telecom's system to highlight security flaws.
Issue: Whether unauthorized access with no malicious intent constitutes a criminal offense.
Decision: Initially acquitted, the case led to the enactment of the Computer Misuse Act 1990, criminalizing unauthorized access.
Impact: Landmark case prompting comprehensive computer crime legislation in the UK.
3. United States v. Mitra, 405 F.3d 492 (6th Cir. 2005)
Facts: Mitra hacked into a university's computer system to change grades.
Issue: Unauthorized access and intent to defraud.
Decision: The court upheld the conviction under the CFAA, emphasizing the seriousness of unauthorized access for fraudulent purposes.
Significance: Reinforced prosecution of hacking when it causes tangible harm or fraud.
4. R v. Bowers, 2015 EWCA Crim 224 (UK)
Facts: Defendant accessed private emails without permission.
Issue: Whether accessing private communications without consent falls under the Computer Misuse Act.
Decision: The court held that unauthorized access to private communications constitutes a criminal offense under the Act.
Impact: Strengthened protections for privacy and electronic communications.
5. United States v. Morris, 928 F.2d 504 (2d Cir. 1991)
Facts: Robert Tappan Morris released one of the first worms on the internet, causing significant disruption.
Issue: Liability for unauthorized access and damage caused by the worm.
Decision: Morris was convicted under the CFAA; the court ruled that causing damage through unauthorized access is criminal.
Significance: Set precedent for prosecuting computer-related damage even if unintentional.
Summary of Case Law Implications
Unauthorized access is central to hacking charges but must be clearly defined (Drew).
Intent and harm factor heavily in determining criminal liability (Mitra, Morris).
Legal frameworks like the Computer Misuse Act were developed to address gaps in earlier laws (Gold & Schifreen).
Privacy protections are extended to electronic communications under misuse laws (Bowers).

0 comments