ebook img

Computer Misuse : Response, Regulation and the Law PDF

346 Pages·2013·7.195 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Computer Misuse : Response, Regulation and the Law

W % Fs * fl ft Computer Misuse Response, regulation and the law WILLAN Stefan Fafinski PUBLISHING Computer Misuse Computer Misuse Response, regulation and the law Stefan Fafinski WILLAN PUBLISHING Published by Willan Publishing Culmcott House Mill Street, Uffculme Cullompton, Devon EX15 3AT, UK Tel: +44(0)1884 840337 Fax: +44(0)1884 840251 e-mail: [email protected] Website: www.willanpublishing.co.uk Published simultaneously in the USA and Canada by Willan Publishing c/oISBS, 920 NE 58th Ave, Suite 300 Portland, Oregon 97213-3644, USA Tel: +001(0)503 287 3093 Fax: +001(0)503 280 8832 e-mail: [email protected] Website: www.isbs.com © Stefan Fafinski 2009 The rights of Stefan Fafinski to be identified as the author of this book have been asserted by him in accordance with the Copyright, Designs and Patents Act of 1988. All rights reserved; no part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the Publishers or a licence permitting copying in the UK issued by the Copyright Licensing Agency Ltd, Saffron House 6-10 Kirby Street, London, EC1N 8TS. First published 2009 ISBN 978-1-84392-379-4 paperback 978-1-84392-380-0 hardback British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library FSC Mixed Sources C«na* SOVCOC 2*U wwwfuori Project management by Deer Park Productions, Tavistock, Devon Typeset by GCS, Leighton Buzzard, Beds Printed and bound by T.J. International, Padstow, Cornwall Contents List of abbreviations vii List of figures and tables ix Table of cases xi Table of legislation XV Acknowledgements xxi Preface xxiii 1 Introduction 1 Principal research questions and chapter structure 2 Terminology 4 Part 1 Constructing the problem of computer misuse 2 The emergence of the problem of computer misuse 13 A brief history of computing 13 Manifestations of computer misuse 19 Pre-1990 regulation 22 The genesis of the Computer Misuse Act 1990 28 The Computer Misuse Act 1990 34 Conclusion 43 3 The evolution of the problem of computer misuse 45 The evolution of computing and computer misuse post-1990 46 Prosecutions under the Computer Misuse Act 1990 49 Interpretation of the Computer Misuse Act 1990 52 Limitations and proposals for reform 66 The Police and Justice Act 2006 67 Alternative domestic criminal legislation 84 Conclusion 94 Computer Misuse 4 Computer misuse and the criminal law 96 Theories of criminal law 97 The instrumentalist construction of the criminal law 99 The moralistic construction of the criminal law 106 The structural conflict theory of criminal law 110 The interactionist theory of criminal law 114 Computer misuse as a public or private wrong 119 Computer misuse and jurisdiction 122 Conclusion 124 Part 2 The governance of computer misuse 5 The risk of computer misuse and its governance 131 Risk 132 The realist perspective on risk 134 Constructionist perspectives on risk 145 Cultural and symbolic perspectives on risk 147 The 'risk society' 151 The role of the state and governmentality 161 Governance 165 The precautionary principle 174 Risk, computer misuse and the domestic criminal law 179 6 The legal governance of computer misuse: beyond the domestic criminal law 187 European Union initiatives 187 Council of Europe initiatives 208 Commonwealth initiatives 226 United Nations initiatives 228 Group of Eight initiatives 231 Computer misuse and legal governance 235 7 The extra-legal governance of computer misuse 238 Frameworks for extra-legal governance 239 Warning and response systems 250 Education and public engagement 265 Technical regulation 269 Conclusion 275 Part 3 Examining the solution 8 The constellation of control 281 Principal research findings 281 Conclusion 292 Appendix: Outline research methodology 295 Bibliography 299 Index 319 vi List of abbreviations ACLU American Civil Liberties Union APCERT Asia Pacific Computer Emergency Response Team APIG All Party Internet Group ARPANET Advanced Research Projects Agency Network BCS British Computer Society BITNET Because It's There Network BSE Bovine Spongiform Encephalopathy CEENet Central and Eastern European Networking Association CERN Conseil Européen pour la Recherche Nucléaire (European Council for Nuclear Research) CERT Computer Emergency Response Team CFSP Common Foreign and Security Policy CIRCA Computer Incident Response Co-ordination Austria CJD Creutzfeldt-Jakob disease CMA Computer Misuse Act 1990 CoE Council of Europe CPNI Centre for the Protection of the National Infrastructure CPS Crown Prosecution Service CSIRT Computer Security Incident Response Team D&G Domestic & General DARPA Defence Advanced Research Projects Agency ECSC European Coal and Steel Community EGC European Government CSIRTs group EJN European Judicial Network Computer Misuse ENIAC Electronic Numerical Integrator and Computer ENISA European Network and Information Security Agency EURATOM European Atomic Energy Community EURIM European Information Society Group (formerly European Information Management Group) FCC Federal Communications Commission FIRST Forum of Incident Response and Security Teams FSA Financial Services Authority FSISAC Financial Services Information Sharing and Analysis Centre G8 Group of Eight INTERPOL International Criminal Police Organisation IP Internet Protocol ISP Internet Service Provider ITC Information Technologists' Company JANET Joint Academic Network JHA Justice and Home Affairs NASA National Aeronautics and Space Administration NCFTA National Cyber Forensic Training Alliance OECD Organisation for Economic Cooperation and Development PGP Pretty Good Privacy PJCC Police and Judicial Cooperation in Criminal Matters RAYNET Radio Amateurs' Emergency Network SIRC Social Issues Research Centre SIS Schengen Information System SOCA Serious Organised Crime Agency TERENA Trans-European Research and Education Networking Association TF-CSIRT Task Force of Computer Security and Incident Response Teams TI Trusted Introducer UK-ILGRA United Kingdom Interdepartmental Liaison Group on Risk Assessment UKERNA United Kingdom Education and Research Network Association (now JANET) UNIVAC Universal Automatic Computer US-CERT United States Computer Emergency Readiness Team WANK Worms Against Nuclear Killers WARP Warning, Advice and Reporting Point List of figures and tables Figures 3.1 World Internet usage (millions) 1995-2007 47 3.2 Vulnerabilities catalogued by CERT 1994-2007 48 3.3 Incident reports received by CERT 1988-2003 49 Tables 3.1 Number of persons cautioned by the police for principal offences under the Computer Misuse Act 1990 (England and Wales) 1991-2002 50 3.2 Number of persons proceeded against for principal offences under the Computer Misuse Act 1990 (England and Wales) 1991-2002 50 4.1 Correspondence between features of computer misuse and the domestic criminal law 127 5.1 The grid-group model of risk perception 150 A.l Categorisation of research participants 298 Table of cases Court of Justice of the European Communities and Court of First Instance Casati (Case 203/80) [1981] ECR 2595 (CJEC) 191 Commission v. Council (Case C-176/03) [2005] ECR 1-7879 (CJEC) 190, 191, 192, 193, 194 Commission v. Council (Case C-440/05) [2008] 1 CMLR 22 (CJEC) 193, 194 Commission v. Greece (Case C-68/88) [1989] ECR 2965 (CJEC) 188 Criminal Proceedings against Donatella Caifa (Case C-348/96) [1999] ECR 1-11 (CJEC) 188 Criminal Proceedings against Maria Pupino (Case C-105/03) [2005] ECR 1-5285 (CJEC) 236 Eckhard Kalanke v. Freie Hansestadt Bremen (Case C-450/93) [1995] ECR 1-3051 (CJEC) 191 Foster v. British Gas (Case C-188/89) [1990] ECR 1-3313 (CJEC) 236 Francovich and Others v. Italian Republic (joined Cases C-6/90 and C-9/90) [1991] ECR 1-5357 (CJEC) 236 Lemmens (Case C-226/97) [1998] ECR 1-3711 (CJEC) 191 Marshall v. Southampton and South West Hampshire Area Health Authority (No. 1) (Case 152/84) [1986] ECR 723 (CJEC) 236 Microsoft v. Commission (Case T-201/04) [2004] ECR 11-4463 (CFI) 113 P v. S and Cormvall County Council (Case C-13/94) [1996] ECR 1-2143 (CJEC) 240 Pubblico Ministerio v. Ratti (Case 148/78) [1979] ECR 1629 (CJEC) 236 Rewe-Zentrale AG v. Bundesmonopolverwaltung fiir Branntwein (sub nom. Cassis de Dijon) (Case 120/78) [1979] ECR 649 (CJEC) 191 xi

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.