💾 Archived View for gemini.spam.works › mirrors › textfiles › law › compacs.txt captured on 2022-04-28 at 22:11:49.

View Raw

More Information

⬅️ Previous capture (2020-10-31)

-=-=-=-=-=-=-

        Compacs '91/Sommer/Limits of the Law/    1





                                                              Compacs 1991
                                                           March 19th 1991








                LIMITS OF THE LAW IN RESTRICTING COMPUTER MISUSE
                ================================================



                                  Peter Sommer
                                 MA(Oxon), MBCS

                           Virtual City Associates, UK



             This paper is designed to accompany a presentation to be 
             made on March 19th 1991 at Compacs 1991 at the London Hilton 
             Hotel.



        In this paper I want to examine how much we can reasonably expect 
        the legal system to deliver to us by way of safeguarding 
        computers and what goes on within them.  I will be doing so 
        specifically by looking at the process by which the UK Computer 
        Misuse Act of 1990 (CMA) arrived on the statute book and in 
        particular how the pressure for "computer crime" legislation 
        built up, the claims that were made during the lobbying process 
        and what the Act actually delivers by way of remedy to potential 
        victims.   But I will also show what it does not deliver and 
        where all legislation of this type is doomed to disappoint.  

        I hope what I have to say will go beyond the parochial needs of a 
        British audience.  In the end, the framing of laws has to be a 
        specific and practical exercise,  not the enunciation of 
        generalised principles.  "Computer laws" have to interrelate with 
        the rest of the law.  In turn, all substantive law has to 
        interact with the facilities available by way of enforcement; and 
        that means looking at rules of admissibility of evidence,  
        policing, the prosecution service and the reality of the courts.  
        These considerations have have been strikingly absent in most of 
        the recent debates about computer crime legislation wherever 
        they have been held almost anywhere in the world.




                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    2



        Problem of public perceptions about "computer crime"

        The first problem any proposal for a computer crime statute has 
        to cope with is public perception of the nature and extent of 
        computer crime.  It is the perception of the problem rather than 
        the actuality which has such a profound influence on what finally 
        happens in the determining of public policy,  in Parliament, 
        among law enforcers, and in board rooms.  

        While the broad public thinks there is a lot of "computer crime" 
        there turns out to be no agreed definition of what should be 
        included.  Are we talking about anti-social activities in which 
        computer files are directly manipulated (there is surprisingly 
        little of that in the attested material in the computer crime 
        case books) or do we broaden it out to situations in which 
        computers are physically involved (in which case you also include 
        theft of computer hardware)?  Should we be taking a strict 
        literalist approach - that the only computer crimes are 
        transgressions of laws which already mention the word "computer"?  
        This last provides a bit of dilemma for pressure groups - how 
        then do you produce evidence for the need for a new computer 
        crime statute?    None of these definitions is more "correct" than 
        any other - my point is the absence of any agreement as to which 
        to adopt.  Parenthetically one can add that there is even less 
        agreement as to what "hacking" is - usage of the word varies all 
        the way from "computer enthusiast" (and with no under- or over-
        tones) to "computer criminal" and includes "explorer of computer 
        networks" and "recreational system cracker" along the way.

        In the absence of any consensus, the definition of "computer 
        crime" can be made to do almost anything you want.  If you are in 
        the computer security business, your marketing strategy must be 
        to go for as wide a definition as possible.  You cheerfully 
        include all the large electronic funds transfer (EFT) frauds 
        because, although all the known examples rely on abuse of 
        (manually-based) authorities or simple impersonation and the 
        computer systems centrally employed have never been compromised, 
        the sums involved are always in the millions.  On the other hand, 
        if you are the head of a police force faced with ever more 
        insistent demands for greater efficiency in all areas of your 
        remit coupled with complaints about the growth of your annual 
        budget and the poor quality of your manpower, there is a lot to 
        said for claiming that computer crime (on a restricted 
        definition) is only a tiny problem.

        The lack of an agreed definition also means that all computer 
        crime statistics are nonsense - no one knows what is being 
        measured.  Of course the problem with computer crime statistics 
        goes far beyond that - once you have your definition,  how do you 
        reliably collect your data?  The official crime statistics 
        reflect breaches of specific statutes and common law offences, 
        not modus operandi.  How do you assess unreported crime?  We 
        don't have even the beginnings of an idea of how much of white 
        collar crime in general goes unreported;  this is currently one 
        of the great gaps in modern criminological research.   

                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    3




        The difficulty with computer crime statistics gets worse when it 
        comes to estimating the costs of computer crime.  What do you 
        include - sums actually lost, sums the subject of failed 
        attempts,  sums "at risk" (the phrase used by the police fraud 
        squads, though with no agreement as to whatever that means), 
        consequential losses (but then how far down the line of causation 
        do you go?).  Again, there is no "correct" answer.

        None of these obvious problems have prevented otherwise 
        respectable organisations and individuals from associating 
        themselves with quite definite figures.  The Confederation of 
        British Industries, the leading employer's body in the UK,  
        throughout 1989 and 1990 kept on quoting the figure of ?400m 
        though what this represented - "computer crime" or "hacking" 
        tended to vary.    Pushed hard, they acknowledged they 
        themselves had done no research but said what they had came from 
        the London Business School.  Enquiries at the library there 
        showed no LBS-sponsored work; I think I have tracked the 
        "statistic" down to a press release from a corporate security 
        security company called Saladin who took advice from an LBS 
        staff-member but the research, if it exists, remains unpublished.  
        The Department of Trade and Industry,  in figures released just 
        before the Second Reading of the Computer Misuse Bill in February 
        1990, said they had verified 270 computer crime incidents over 
        the previous five years,  of which only six had been brought to 
        court.  Enquiries of the DTI showed that they had conducted a 
        "survey of surveys" - and no, they couldn't offer their working 
        definition of what they were measuring.

        A convenient get out for those who have intellectual doubts about 
        the figures they quote is the use of the impersonal passive 
        tense:.. "it is estimated".  And if pressed, respond not by 
        explaining statistical methods but by producing a lurid anecdote 
        and/or forecast.  

        A very important component in the formation of public perception 
        has been the role of media reporting.  There is an inevitable 
        bias in the newspaper and television coverage of anything 
        towards the unusual - computer crime is no different,  except 
        that, with a few exceptions, the level of verification seems to 
        be lower than for most stories except perhaps those alleging 
        scandals among tv soap stars.   Among the lazier sort of 
        journalist, the premium is to get a story which conforms to 
        stereotypes they have already accepted. I have received the 
        request "Get me a hacker, the younger the better," from more than 
        one mass circulation daily newsdesk.  A related bias is that the 
        "experts" quoted are those who are prepared to make the most 
        outrageous claims and forecasts.  The "expert quote" in fact 
        provides the reporter with an alibi or makeweight for an 
        otherwise dubious story.  It takes courage for an expert in the 
        contacts book of a national newspaper's newsdesk to forswear the 
        opportunity of a free appearance in print by killing off a story 
        which he knows does not make sense.  


                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    4



        Any examination of the actual case material from first-hand or 
        near-first-hand sources as opposed to the clippings libraries of 
        the national media - and there is now over twenty years of it - 
        shows that standards of scholarship in the reporting and 
        analysis of computer crime are absymally low - but that is a 
        subject for another paper.

        Yet again, sensational claims made by prosecutors and police at 
        the beginning of trials is news, the failure eventually to 
        produce evidence for them is usually not.  This is a repeating 
        pattern: we saw it here in the UK in the Prince Philip Prestel 
        case, in Germany with the Chaos Club/KGB hackers affair and we 
        have seen it as recently as the end of 1990 in the USA over 
        Operation Sun Devil and the Legion of Doom.  There are still 
        people who believe that in 1985 New Jersey hackers were able to 
        move satellites in space, all based on prosecutor claims that in 
        court were shown to have been the result of hysteria and 
        ignorance.

        I have spent some time talking about public perceptions because 
        one of the things that new legislation can never do is remedy  
        situations which substantially do not exist, at least in the 
        forms in which the public have come to believe. There is one 
        exception to this to which I will return at the end.



        Perceptions about "computer law"

        The misperceptions about computer crime are accompanied by 
        another one - that you need specific new laws to tackle the 
        generality of computer-related crime.  There is a wealth of 
        obvious rhetoric about the sloth of law reform and the 
        unworldliness of lawyers,  not all of which is justified.  So the 
        "logic" is complete:  we have a radically new area of criminal 
        activity called computer crime, committed by a new class of 
        person - the computer criminal or hacker, and for which, 
        obviously, completely new laws - computer crime laws - are 
        required.  Most of the rest of this paper will show the false 
        directions in which this logic has lead us.

        In fact, the "logic" is easily broken down. In its Working Paper 
        110 published in September 1988, the English Law Commission 
        (ELC), the official body concerned with reviewing and 
        recommending law reform, examined Computer Misuse and listed out 
        the areas where existing English law already delivered remedies.  
        These included: the Theft Acts which cover both routine street 
        crimes and fraud and are the means by which most electronic funds 
        transfer frauds have been prosecuted;  Conspiracy, a complex 
        concept in English Law the essence of which is two or more people 
        working together for an unlawful purpose; Demanding Money with 
        Menaces, the actual charge in most cases of blackmail and 
        extortion;  Criminal Damage, which covers the intentional or 
        reckless damaging of property and which applies in some but 
        perhaps not all computer situations (we will return to this 

                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    5



        matter);  Offences Against the Person, which include physical 
        wounding, manslaughter and murder, which would presumably apply 
        if a computer-run machinery were maliciously directed to attack 
        an individual);   Official Secrets, which covers access to 
        government computers (the only offenders actually charged have 
        been policemen doing favours for friends or, in one case, trying 
        to win a competition at a gasoline station);  Forgery and 
        Counterfeiting, which applies to the forging of mag stripe cards 
        and other authenticators (there are limitations to this which 
        will also be examined later); there are also limited criminal 
        sanctions available in the Copyright Acts.

        The English Law Commission found some loopholes and exceptions 
        which I will examine later,  but what they showed in an 
        authoritative and compact form was what was evident to anyone who 
        had studied the case-books of British computer crime.  That is:  
        that nearly all of the activity that one could include in a 
        definition of "computer crime" was not only punishable within 
        existing English law, but that there had been any number of 
        convictions. 


        The process of law reform

        Working Paper 110 enraged those who wanted tough legislation.  
        The Law Commission had produced a list of technical reforms 
        throughout the penal calendar but, on what many had persuaded 
        themselves was the central issue - a new offence of "unauthorised 
        access to a computer", the Commission was agnostic, asking for 
        evidence that any action was necessary. 

        The English Law Commission had not been the first to comment on 
        computer law reform.  England and Scotland have separate 
        though similar legal systems and the Scottish Law Commission had 
        produced a consultative paper in 1986 (which incidentally 
        contains a useful summary of international legislation) with a 
        final report following in 1987.  The SLC had recommended a new 
        offence of unauthorised access to a computer:

             1 (1) A person commits an offence if, not having authority 
             to access a program or data stored in a computer, or to a 
             part of such program or data, he obtains such unauthorised 
             access in order to inspect or otherwise acquire knowledge of 
             the program or data or to add to, erase or otherwise alter 
             the program with the intention - 
                  (a) of procuring an advantage to himself or another 
                  person; 
                  (b) of damaging another person's interests
               (2) A person commits an offence, if not having authority 
             to obtain access to a program or data stored in a computer, 
             or to part of such program or data, he obtains such 
             unauthorised access and damages another person's interests 
             by recklessly adding to, erasing or otherwise altering the 
             program or data


                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    6




        To many English lawyers the tests for proof seemed to be too 
        vague to be practical and left too much to judicial 
        interpretation.

        But what had really stimulated English demand for legislation was 
        the case of R v Gold & Schifreen, which in 1988 had gone to the 
        highest court in the land, the House of Lords.  Gold and 
        Schifreen were two out of four hackers who had penetrated British 
        Telecom's public access database service Prestel in 1984.  They 
        had not employed any great skill in doing so but had exploited 
        the fact that British Telecom had broken almost every rudimentary 
        rule in the computer security book.  The system manager had an 
        obvious password (it was discovered by accident and not as a 
        result of any clever password-cracking program), the test 
        environment had a password which showed on its log-in page, and 
        the test environment contained live data.  When the hackers 
        contacted BT they were quickly told the problem was under control,  
        though in fact the hackers could soon tell it was not.  
        Eventually the hackers gave the story to the press and BT's 
        reaction was to "get" the perpetrators.  One can only speculate 
        on what might have happened had the hackers gone to an upmarket 
        paper instead of a popular one, the Daily Mail.  Perhaps we would 
        have seen high-level sackings in BT rather than the launching of 
        expensive traps to catch the message-bearers.  

        Gold and Schifreen were caught after their telephone lines had 
        been monitored; they were charged under the Forgery and 
        Counterfeiting Act, 1981.  This was, to say the least, a 
        prosecution experiment as this act had never previously been used 
        in such a case.  No charges were preferred under such easier 
        headings as theft or conspiracy to defraud - many of us still 
        don't understand why.  The legal problem for the courts was that 
        whatever they had done wasn't forgery, which in English law 
        requires that an "instrument" be forged - typing characters into 
        a computer which then immediately accepts them does not create an 
        "instrument".  This was the point that actually pre-occupied the 
        House of Lords.  

        To the lay public,  however, the House of Lords seemed to be 
        saying that anyone can "hack" and get away with it.  The English 
        Law Commission had started work before the Gold and Schifreen 
        judgement but had delayed publication of its working (that is, 
        initial consultative) paper until the result was known.

        The Confederation of British Industries and the member of 
        parliament who was to become the strongest advocate of tough 
        legislation, Emma Nicholson, felt deep disappointment at the 
        double blow to their perceptions of the "computer crime problem".  
        People began to speak of English law as providing a Hacker's 
        Charter. Emma Nicholson introduced an Anti-Hacking Bill in 1989 
        under a "no hoper" procedure which meant that while it had no 
        chance of becoming law it would get some publicity,  perhaps for 
        future legislation which would then have proper backing.  The 
        Bill contained phrases picked up from the Scottish Law 

                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    7



        Commission's proposals but also sought to cover electronic 
        eavesdropping of VDU radiation, a subject which had recently also 
        captured public imagination.  The Anti-Hacking Bill was deeply 
        impractical but served its main purpose of heightening public 
        interest,  not to say hysteria,  in the subject.  

        In the meantime the English Law Commission was preparing its 
        final report, and was subject to very heavy lobbying to change 
        their previously agnostic position.   The final report came out 
        in record time, six months after the ending of the formal 
        consultative process following its Working Paper.  Published in 
        September 1989 the ELC proposed three new offences, all to do 
        with "unauthorised access to a computer".   Unusually for them, 
        and as a result of the short time available for report writing, 
        they included no draft bill, just a set of ideas. We will examine 
        these in detail shortly.

        The conservative government felt unable to make immediate room in 
        its legislative plans for any new bill along these lines.  There 
        is a procedure by which back-bench MPs can enter a lottery for the 
        right to introduce a bill which then has considerable chance of 
        getting on to the statute book.  One such successful MP, Michael 
        Colvin, agreed to take the bill on.  In the absence of official 
        help, he received informal technical support from the Department 
        of Trade and Industry (who do not normally handle criminal 
        legislation) and also from the "tough laws needed"  lobbyists. 

        It became very difficult for those who dissented to appear as 
        anything other than "soft" on computer crime.  Start talking 
        about the existing law in any detail and your audience thought 
        you were using your cleverness to obscure both the truth and your 
        "real" agenda.  Begin querying the validity of the statistics and 
        the veracity of the some of the anecdotes and you were soon told 
        (a) the information came from sources that couldn't possibly be 
        made public and (b) all respectable people "knew" what was 
        happening anyway.  What "computer crime" was, how it related to 
        "hacking" and how how all of this related to what the proposed 
        legislation purported to do became steadily less and less clear.  
        In fact, what we had was all the classic symptoms of popular 
        moral panic on a par with fears about rock n'roll music in the 
        '50s, pschydelia in the '60s, trans-sexual glam-rock in the '70s, 
        acid house parties in the late '80s and youth-rebellion clothing 
        styles anytime in the last forty years.


        The new law

        What had happened was that the English Law Commission had 
        forgotten the general guidelines for law reform that it had 
        originally set itself and which in turn had been handed down from 
        the Home Office back in 1982: 
         
                 that: 
                 the behaviour is so serious that it goes beyond what it
                 is proper to deal with on the basis of compensation as

                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    8



                 between one individual and another and concerns the public
                 interest in general (that is, civil procedures are not 
                 enough)

                 criminal sanctions should be reserved for dealing with
                 undesirable behaviour for which other,  less drastic means
                 of control would be ineffective,  impracticable or
                 insufficient
         
                 a new offence should be enforceable


        The Bill and now the Act has a superficial elegance. There are 
        three computer misuse offences - section 1: "unauthorised access 
        to computers and/or computer material",  section 2: "unauthorised 
        access with intent to commit or facilitate the commission of 
        further offences" and section 3: "unauthorised modification of 
        computer material".  The last of these is intended to catch 
        designers of logic bombs and viruses.     The section 2 offence 
        is concerned with attempts,  involving computers,  to commit 
        further serious offences, such as theft or blackmail. If you have 
        prepared to commit such an offence but have been unable to 
        complete the deed, you can be charged under Computer Misuse.  
        Section 2 and 3 offences attract penalties of up to 5 years in 
        prison.

        Section 1 is the one that aims at "hacking":  for a prosecution 
        to be successful, it must be shown that the person secured access 
        to a program or data, that the access was unauthorised and that 
        the perpetrator knew that the access was unauthorised.  However, 
        there is no need to show that the unauthorised access was 
        directed at any particular bit of data, or program, or even any 
        particular computer. This section attracts a maximum penalty of 
        six months.  Section 1 may also be used where there is 
        insufficient evidence to catch an offence under sections 2 or 3.

        The Act also attempts to address the problem of international 
        computer crimes - where computer connections are made across 
        several national boundaries.  In this it anticipates what needs 
        to be done to cover the growing problem of international fraud of 
        all kinds.

        Closer examination, though, removes much of the initial gloss. To 
        take the three principle offences in reverse order:  Section 3 - 
        unauthorised alteration of programs and data - was introduced to 
        overcome a supposed gap in the Criminal Damage Act of 1971 which 
        was thought by some academic lawyers not to be easily applicable 
        to "data", data not being "property".  In fact there had been 
        successful prosecutions involving altered computer data - by 
        showing that the consequence had been damage to some physical 
        property - Cox v Riley  in 1986.  (In that case it was program 
        instructions for an electric saw which had been deliberately 
        altered). Criminal damage was the charge in two recent logic bomb 
        cases - R v Tallboys in May 1986 where a prank by a former 
        computer employee of Dixons went wrong and R v McMahon, which 

                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    9



        concluded at Isleworth Crown Court in January 1988.  Moreover as 
        the Computer Misuse Act was passing through its final stages in 
        the House of Lords (this time acting as a Second Chamber to the 
        legislature and not as a final Court of Appeal as in the Gold and 
        Schifreen case) a "pure" hacking case - that of Nicholas Whiteley 
        - was successfully concluded with a Criminal Damage conviction in 
        the precise circumstances that the Law Commission had thought 
        might not be possible.   What we are left with now, though,  is 
        not duplicated legislation but weakened legislation.  For the 
        Computer Misuse Act now forbids the use of the Criminal Damage 
        Act in cases involving unauthorised access to data.  In future 
        these cases must be put through the tests required of the 
        Computer Misuse Act, that is, that there must be access to 
        something which is not precisely defined in the legislation, 
        namely a computer, and that such access must be unauthorised.  I 
        will return to this matter in moment.  What this also does is to 
        remove from the prosecutor the opportunity to attack reckless 
        behaviour.  The Criminal Damage Act penalises both those who act 
        deliberately and also those who act with a reckless disregard of 
        the consequences - "I was just typing the words DEL on the screen 
        to see what would happen and had no idea that files would be 
        deleted..."   The end effect of section 3 is to weaken what we 
        had before.


        Section 2 - unauthorised access for the purpose of committing a 
        serious criminal offence looks stern stuff.  But it always has 
        been an offence itself to attempt to commit an offence, even if 
        the substantive offence remains uncommitted.  It is only by a 
        miniscule sliver that section 2 alters any requirement for the 
        standard of proof in establishing when such an attempt has taken 
        place.  Section 2 is a makeweight.

        With section 1, the simple "unauthorised access" offence, the ELC 
        had problems.  First, they recognised that there were serious 
        arguments whether these actions should be criminalised at all, as 
        opposed, say, to making them a civil wrong like trespass to land.  
        (There is still no equivalent of trespass to a computer). In 
        making it a criminal offence it was clear that heavy punishment 
        was not appropriate (though in fact the Act doubles the penalties 
        the ELC proposed).  The ELC spoke of the offence setting 
        society's mark of disapproval on such activity.  The trouble is 
        this clashed directly with the principles for the justification 
        for the introduction of new crimes which they had set themselves.  
        In the UK, as in most countries,  police powers of enforcement 
        tend to be directly related to the penal levels specified for an 
        offence - the more serious the offence the greater the greater 
        the freedom the police have to seize potential evidence and 
        suspects without getting permission first;  for most purposes 
        this is enshrined in the 1984 Police and Criminal Evidence Act.  
        The unauthorised access crime was not a "serious arrestable" 
        offence so, despite lobbying by Emma Nicholson,  police powers 
        were limited, though still exceed the usual PACE criteria. 

        British industry has no idea under what threats it would have 

                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    10



        operated had Ms Nicholson and her colleagues had their way. For 
        powers of seizure of evidence are not limited to those computers 
        belonging to alleged perpetrators.  In fact the domestic and 
        small PCs owned by most "hackers" are unreliable sources of 
        admissible evidence.  Often the really useful material comes from 
        computers owned by the alleged victims and from within any other 
        computers used as part of the network journey from the alleged 
        perpertrator to the alleged victim.  Under Ms Nicholson's 
        proposals, a police constable armed with a warrant from a lay 
        magistrate (respectively the lowest rank of policeman and the 
        lowest rank of judicial life) would have been able to march into 
        any company and seize all data, software and hardware that was 
        deemed necessary for the investigation in hand.  The threat 
        hasn't entirely vanished under the present legislation,  but 
        higher ranks of policemen and a High Court judge must be 
        involved.    Those who think this is a theoretical concern should 
        examine the US Operation Sun Devil in which 44 separate raids 
        took place at the end of which there were three limited 
        convictions and large numbers of quite innocent computer owners 
        carrying heavy losses because federal authorities acted 
        foolishly, even hysterically,  but within their legal powers.

        In any event, section 1 of the Computer Misuse Act is all but 
        unenforceble, a matter to which I will come back a little later 
        on.

        Let me now return to two matters common to all three clauses - 
        that access must be shown to be "unauthorised" and that there 
        must be a "computer" involved.  Does this include the secretary 
        who uses her word-processor in the lunch-hour (she's altering 
        data so this is a section 3 - five years maximum penalty - 
        offence)?  What about the neighbour to whom you loan your house-
        keys and who, because her washing machine has broken down, 
        borrows yours?  The washing machine has a chip and ROM inside it. 
        Another possible section 3 offence.  Or the auto mechanic who 
        offers you a new performance-boosting chip to add to your 
        vehicle's engine management system?  Section 3 again.  Even 
        private use of a company's PABX may be drawn into the Computer 
        Misuse Act.  Of course that was not the intention,  but I can see 
        no reason why the words shouldn't be made to apply.

        So what we have is an act weaker in one important effect than the
        legislation it was supposed to correct, new police powers of 
        seizure which potentially can have many innocent victims and 
        which introduces at least as many uncertainties in interpretation 
        as it claims to have solved.  Matters do not end here, though. 

        

        What the Act left out

        In its 1988 Working Paper the English Law Commission had 
        highlighted a number of defects in the existing law and others 
        had been noted during the public debates.  I can't deal with all 
        of them here,  but there are some matters which should be 

                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    11



        identified.


        Deception
        The first of these is deception which is covered in sections 15, 
        16 and 20(2) of the Theft Act 1968 - obtaining goods or services 
        by deception.  The general view among lawyers is that it is only 
        humans that can be deceived - not machines.  The Law Commission 
        identified the problem in its Working Paper 110 but in their 
        Final report said that they would have to look at the matter 
        again sometime in the future.  Interestingly enough, a extension 
        of the law of deception would "solve" many of the simple 
        unauthorised access cases (including the situation in R v Gold & 
        Schifreen) in that the usual consequence of unauthorised access 
        is that computer and database services are thereby obtained.  


        Admissibility of Evidence
        The second important defect in the existing law relates to the 
        rules of admissibility of evidence of computer-based materials. 
        It is no good having substantive laws if it is difficult to 
        produce evidence in a form which is acceptable to the courts.  A 
        number of lawyers believe that the current rules,  which are set 
        out in section 69 of the Police and Criminal Evidence Act, 1984, 
        can in some circumstances become unworkable.  The problem is 
        this:   before evidence can be introduced the court requires a 
        certificate to say that the computer has at all times been 
        behaving normally.  If the modus operandi of a crime has involved 
        making a computer behave abnormally (for example by writing to 
        files directly outside their usual application of by violating 
        the operating system or access control package) then it looks as 
        though no evidence from that computer can be admitted.  


        Information Theft
        At the heart of the concern many people have about computers is 
        the amount of information they hold and process - and the 
        consequent risks if such information is stolen.  Indeed this was 
        one of the most frequently cited arguments for unauthorised 
        access legislation.  In English law information as such cannot be 
        stolen, though the medium upon which it is held - a piece of 
        paper or a floppy disk - can.  Although there have been a number 
        of attempts to make information "a thing capable of being stolen" 
        so far none of them succeeded.  The difficulties should not be 
        under-estimated - which categories of information should be 
        protected;  how would you test for each category (is it enough 
        for an originator to label a document "secret" or should there be 
        some objective measure?);  should there be a "public interest" 
        defence?  The problems with using an offence of unauthorised 
        access to a computer as a substitute are:  you confuse the means 
        with the substance,  you run the risk of drawing people into the 
        ambit of the crime who are not actually stealing information and 
        who are not causing any readily identifiable social harm,  you 
        are omitting instances of information theft which do not involve 
        computers such as stealing print-based documents.  

                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    12




        A more direct approach to information theft would also provide a 
        route to tackling another of Emma Nicholson's concerns - the use 
        of equipment to eavesdrop on radiation from VDUs.



        Law Enforcement

        There is little point in placing new crimes on the statue book if 
        the means to enforce them does not exist.  "Law enforcement" is 
        much more than looking at the quantity and quality of police 
        officers available in any one specialisation. In the UK, the 
        decision to prosecute is usually made by the Crown Prosecution 
        Service. (Different procedures apply for serious frauds which are 
        then handled by the Serious Fraud Office).  The whole process is 
        as follows:

             *    a victim decides to report a crime

             *    reasonable levels of evidence are believed to exist

             *    the police make enquiries

             *    the police make a report to the Crown Prosecution 
                  Service

             *    the Crown Prosecution Service decide that there is a 
                  case which they have a reasonable chance of winning 
                  (that is, better than 50/50)

             *    the case is presented in court, the skill involved 
                  depending on the lawyers employed

             *    depending on the seriousness of the offence either a 
                  judge alone or a lay jury advised by a judge have to 
                  understand enough to be able to convict

        In most other countries there are a similar set of hurdles.  

        The present position in the UK is that there is only one Computer 
        Crime Unit, which is attached to the Fraud Squad run jointly by 
        the Metropolitan and City Police forces.  Its size varies from 
        four to five officers.  Since these are always drawn from the Met 
        side of the partnership they are on three-year tours of duty,  
        though one officer has managed to hold on longer.  The Met has a 
        philosophy of the "all-round policeman" and eschews the setting 
        up of permanent ?lite squads.  The highest ranking officer is a 
        detective inspector, the third lowest rank in the force.  There 
        is a twenty-day course in computer crime methods run at the 
        Bramshill training college. Fewer than 100 officers out of the 
        total 145,000 policemen and women in England and Wales have ever 
        been through it.   (When I became a MBCS (Member of the British 
        Computer Society) I did so via a route which recognised that I 
        had neither passed any of their examinations nor had a university 

                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    13



        degree in a relevant subject - mine was in law.  The BCS expects 
        people like me to be able to show 10 years of industry experience 
        instead - and this is simply to call yourself a computer 
        professional.)

        The Computer Crime Unit has scant funds to employ external 
        expertise.  In some "hacking" cases it has been able to rely on 
        the goodwill of British Telecom,  but BT will only act where it 
        thinks that its own networks or resources have been violated or 
        threatened and the relationship deteriorated during the 1990 
        Nicholas Whiteley (Mad Hacker) case.

        Since October 1986 the police have ceased to be the prosecutors 
        of crime as well as the investigators.  That reform was 
        introduced to prevent too many fitted up or forced confession 
        cases getting to court.  Prosecution is now handled by the Crown 
        Prosecution Service.  But for the computer crime coppers,  whose 
        training has not equipped them to understand the full range of 
        criminal sanctions that might be available  (and why should it?) 
        they have lost easy access to friendly lawyers who might help 
        them frame charges sensibly.  The CPS is currently,  on its own 
        figures,  23 per cent understaffed,  with a greater problem in 
        London.  They are under great pressure,  morale is low.

        What about the Serious Fraud Office which handles frauds above ?1 
        million in value?  It has 20 lawyers, 17 accountants, a support 
        staff of 25 and 20 City of London police officers on secondment - 
        and who are therefore not immediately available for other City of 
        London policing work.  The current work load is around 70 huge 
        frauds,  many of which will take years to work their way through 
        the courts.   By chance,  rather than design,  it had one senior 
        officer who was extremely interested in computer crime.  But he 
        had other work also,  not the least of which is the use of 
        graphics computers to clarify complex frauds to lay juries.  He 
        is now in the private sector.  

        Here is another aside:  the SFO came into being in the wake of 
        the Roskill Report on trials for complex fraud.  Roskill 
        recommended the use of specialist juries;  this was rejected,  
        for reasons which I accept,  but no additional resource has ever 
        been provided to help the SFO with the additional problems of 
        describing the arcana of, say the insurance world, to men and 
        women democratically plucked from the voting lists.

        These are simply the first hurdles;  we are only just beginning 
        to see a sufficient body of barristers literate in computers.  


        Police role in white collar crime

        Yet it is too easy to blame "the police" for what appears to be a 
        poor response.  The policing of computer crime is simply one item 
        in a very long agenda of what the public expects of the police.  
        What is interesting about computer crime is that it highlights 
        many of the inconsistencies in public attitudes towards the 

                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    14



        police.  We are only willing to spend a limited amount on them;  
        we are only willing to accept a certain density of police 
        officers per hundred thousand of the population.  Here in the UK 
        the police originated under Sir Robert Peel in a desire for safer 
        streets and public order.  It is clearly important to the public 
        at large that the police are seen "walking the beat".  We 
        apparently suspect the idea of ?lite squads and we resist the 
        idea of a national force.  

        Yet this same group of people are expected to cope with the 
        social and technical complexities of white collar crime.  We 
        wouldn't tolerate any "walking the beat" looking for possible 
        infractions of the law in our offices and board rooms, yet in 
        terms of street crime it is this "walking the beat" which is 
        understood to have a powerful preventative effect.  None of us 
        have really thought through our expectations of the role of the 
        police in a world where, for each of the last 15 years or so 
        there has been a 1 per cent transfer from blue collar to white 
        collar activities and presumably some considerable associated 
        increase in the opportunities to commit white collar type crimes.  

        One cannot look at "computer crime", on any definition thereof, in 
        isolation from these factors.



        Making the Case

        We must now examine in more detail how well the new Computer 
        Misuse Act offences will stand up to the rigours of having to 
        make a case in court.   Leaving on one side the particular 
        hazards of the PACE s69 rules of admissibility in evidence and on 
        another side the question marks of the extent of actual police 
        resources,   we have to ask ourselves what typical cases will 
        look like in court. I want to concentrate on the two situations 
        which most excited people during the run up to the passing of the 
        CMA - hacking (in the sense of unauthorised access unaccompanied 
        by any further activity) and viruses.

        The chief practical problem in any investigation of "hacking" is 
        that perpetrators don't use their own names;  further, a mere 
        "confession" unaccompanied by any other evidence is unlikely to 
        be sufficient.  The investigator first has to show that "access" 
        has taken place.  It may not be enough to show that a given 
        suspect has material in his possession that has come from someone 
        else's computer - the files may have been collected by some third 
        party and a copy of them given to the suspect on diskette;  the 
        prosecutor has to prove all the network connections;  in many 
        cases it will be necessary to catch the perpetrator in flagrante 
        delicto.  Now we know this can be done - here in the UK it was 
        done in the case of Gold and Schifreen and again in that of 
        Edward Austin Singh.  Cliff Stoll wrote in The Cuckoo's Egg how 
        he did it to members of the Chaos Computer Club.  There are 
        plenty of other examples.  They all have a common feature - it is 
        very time consuming and expensive.  You require lots of 

                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    15



        monitoring equipment, a number of skilled technicians 
        (individuals like Stoll who did what he did out of intellectual 
        interest and not for a consultancy fee are rare), extensive co-
        operation between police, companies,  institutions, and 
        telecommunications suppliers.  That co-operation must often 
        extend across national borders.  In addition you have to have 
        teams of police standing by to pounce when told by the 
        technicians that the time is right.  Investigation costs can 
        reach ?500,000 ($1 million) quite effortlessly.

        No sensible police force in the world can justify that amount of 
        cost and effort for a crime the normal punishment for which is a 
        fine and for which the maximum penalty is six months.

        Let's now look at viruses.  No one knows where most viruses come 
        from.   There is no knowledge of the originator even at an 
        anecdotal level.  Very occasionally if the virus is unique and 
        distributed on a disc there is the possibility of physical 
        forensics, that is, locating the supplier and hence the purchaser 
        of a particular batch of diskettes.  I have no specific knowledge 
        of that case,  but one possible example is the Panama "Aids" 
        virus which was allegedly partially distributed on diskette via a 
        mailing list supplied unwittingly by a magazine.  But this very 
        much the exception.  There is another route back to a perpetrator 
        - if the virus is accompanied by some blackmail or extortion 
        threat.  Here the criminal can be tracked down by the money 
        collection method - which is the weak point of most attempts 
        at demanding money with menaces.  Again, some reports about the 
        Panama "Aids" virus allege that this is what happened there.

        But for the overwhelming majority of PC and Mac-based viruses 
        these routes do not exist - and there is no law one can envisage 
        that will overcome the fundamental problem of anonymity.   
        Perhaps I should raise one further situation - where the designer 
        of rogue code decides things have gone more wrong than was 
        intended and decides to alert potential victims.  This is what 
        happened with Robert Morris and the Internet worm.  Now - where 
        does the public interest lie?  Do we believe that the existence 
        of an "anti-virus" law deters potential offenders in a useful 
        way, or are we worried that a successor to Morris might say:  "I 
        didn't want things to go this far.  However no one yet knows 
        about me;  anything I do to minimise the effects of my rogue code 
        are likely to lead to my identification and I may then be 
        punished."   

        I have no easy answer to this conundrum but ask you to identify 
        it as yet another limitation of the powers of the legal system to 
        solve problems of computer security.



        The role of law as a deterrent

        At this point some people will say that I am mistaken,  that the 
        very existence of a law on the statute book,  even it cannot be 

                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    16



        readily enforced,  does act as a deterrent to the majority of 
        people.  In fact this was the justification the Law Commission 
        produced for section 1 of the CMA.  At the press conference on 
        the day their final report was published they spoke of setting 
        the mark of society's disapproval on such activity.

        I am not sure that the position is anywhere nearly as clear as 
        that.  People break laws all the time,  particularly if they can 
        convince themselves that they are not "really" doing any harm.  
        This is certainly true of many road traffic offences such as 
        parking on yellow lines and exceeding speed limits.   On the 
        other side, there are a number of instances where people feel 
        constrained from an activity which is not illegal but is 
        considered unethical - eavesdropping on a conversation which the 
        participants regard as private is one example.

        In other words there is no absolute correlation between the fact 
        of illegality and a sense that certain activities should be 
        restrained.  

        It might be helpful to recall what happened here in the UK 14 
        years ago over Citizens Band Radio,  another technological hobby 
        with outlaw connotations.  Brits holidaying in the USA discovered 
        the possibilities of a low-cost general purpose mobile radio 
        service,  imported the equipment and started to use it.  In the 
        UK this was on offence under the 1949 Wireless Telegraphy Act.  
        The craze grew and grew and officials tried,  with scant success, 
        to make arrests.  A campaign for a legal UK CB started;  
        eventually there were almost 500,000 illegal sets in use.  
        After a while, a UK CB license became available - and within six 
        months the craze was effectively dead.  Is it possible that it 
        was, among other things, the illegality of the activity (coupled 
        with the lack of any real danger of getting caught) that was the 
        substantive attraction?

        Again,  I make no final judgement,  other than to say that the 
        existence of a crime on the statute book may not have the 
        intended effect.   






        Conclusions

        Some of what I have said may suggest that, as a result of 
        particular incompetence by the English Law Commission, 
        parliamentarians and police we have a poor computer crime law.  
        If that is the impression which you take away then I have not 
        made myself clear.  

        I think I have shown that for some of the highest profile 
        computer crime activities, no law is going to provide any sort of 
        substantive solution because, at a practical level, investigation 

                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    17



        and evidence-gathering is either too expensive and difficult in 
        relation to the wrongs victims might suffer or is completely 
        impossible.  For such activities as classic hacking and virus-
        writing we should forget about the law and concentrate on 
        preventative measures.

        For the rest of the activities that help to make up the 
        statistics of computer crime, I wonder how far it is useful to 
        talk about computer crime at all.  As I also hope I have shown,  
        most such activity is conventional crime - chiefly fraud, 
        extortion and criminal damage - which happens to involve 
        computers.  Talking about "computer crime" lumps them all 
        together - and with hacking and virus-writing.  But each one of 
        these activities has different risk factors, different modus 
        operandi and different preventative methods associated with them.  
        By the same token,  I am not sure that is useful to talk about 
        "computer criminals" as though they all showed the same features.  
        A computer fraudster is surely best understood within the context 
        of other types of fraud; the extortionist who locks legitimate 
        users out of of a computer and demands a fee to rectify the 
        situation is best comprehended along with other blackmailers.  
        Network adventurers may be technological pranksters and cause 
        harm along the way,  but they have little in common with any 
        other sort of criminal.

        This misunderstanding leads many computer-owning companies who 
        have a wholly distorted view of the risks they face.  If you 
        don't analyse the problem properly you'll never get any sort of 
        viable preventative program.

        But this confusion has now resulted in legislation for which I 
        fear there are doomed expectations.  Just as computers have now 
        infiltrated every facet of commercial life, I would have 
        preferred an approach to law reform which assumed that most 
        computer-related crime would continue to be handled under the 
        framework of existing statute and common law.  I would have liked 
        the Law Commission to have concentrated on strengthening those 
        areas where conventional law looks weak.  As I have tried to 
        show, a reform of the Criminal Damage Act, 1971 would have been 
        more effective than what was actually produced in section 3 of 
        the Computer Misuse Act.  A reform of the law of deception within 
        the Theft Act would have produced some of the results hoped for 
        in section 1 of the Computer Misuse Act without involving many of 
        the uncertainties of coverage and interpretation that the new Act 
        has provided.  

        Although I don't have time to go into it today, it seems to me 
        that many people have ignored the many remedies that the civil 
        law has.   For those many crimes involving employees and sub-
        contractors,  including unauthorised access and information 
        theft, the law of contract provides many potent remedies, 
        including dismissal.  Student hackers may be more effectively 
        dealt with under Disciplinary Codes - where the offence may be set 
        in such vague terms as "conduct likely to bring the university 
        into disrepute", where the standards of proof are lower and 

                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    18



        where the sanction may be loss of the opportunity to take a 
        degree.  In other situations the civil wrong of breach of 
        confidentiality,  though flawed, can be effective in instances of 
        information theft.  What a pity there has been no follow-up to 
        the Law Commission's work in this area, which has lain largely 
        ignored since 1981. 


        The Computer Misuse Act delivered only one thing - and I return 
        here to something I hinted at at the beginning - it gave the 
        illusion that something was being done about a problem which 
        seemed to exist.  Compared with almost anything else that a 
        country might do - rethinking the role of the police in white 
        collar crime, providing different career patterns and training 
        for policemen, keeping your Crown Prosecution Service up to 
        strength - passing legislation is unbelievably cheap.  All it 
        takes is the time of a few civil servants and Members of 
        Parliament and a few printing bills.  Politicians and pressure 
        groups love new legislation because that it how they can be most 
        visibly be seen to getting results.  It is also attractive to the 
        media,  where technical legal reform is not. 

        Finally, the Computer Misuse Act distracts management from 
        examining in rigorous detail what they can be doing to stay in 
        control of their computer resources.  It develops in their mind 
        the notion of unpredictable "compurer criminals" whose activities 
        cannot otherwise be restrained.


        The theme of this conference is the Challenge of the Nineties.  
        Let me tell you what I think it is.  We need to make the 
        discussion of computer security much more sober than it is at the 
        moment.  Legislation born out of panic sets up false expectations 
        and doesn't get the desired results.  Too many in the computer 
        security business have sought to sell their products and services 
        on a simple unsophisticated scare story.  Effective computer 
        security means a multi-disciplinary approach,  where computer 
        security is seen as just one aspect of securing the assets - 
        physical, cash and intellectual - of the business environment 
        that the computer serves. And where "solutions" come from a 
        balance of computer-based and administrative controls and where 
        the law provides remedies only for the most outrageous of 
        activities.  As for the investigation of crime,  it is surely 
        better to talk of experts in computer forensics, who can aid and 
        support with the "ordinary" investigators when a crime goes 
        inside a computer and evidence must be extracted in a form in 
        which it will be useful in legal proceedings.




             A fully foot-noted version of this paper is available on 
             request to the author.



                                                    (c) Peter Sommer, 1991

        Compacs '91/Sommer/Limits of the Law/    19




             Peter Sommer  MA(Oxon),  MBCS
             Peter Sommer runs Virtual City Associates which specialises 
             in computer forensics, expert witness activities and 
             insurance policy development, risk assessment and loss 
             adjustment. It also provides more broad-based computer 
             security consultancy.  Virtual City Associates often works 
             in association with other professional firms.  Peter Sommer 
             read law at Oxford and has been both a publisher of books 
             and of electronic databases.  He is better known by his 
             pseudonym, Hugo Cornwall,  under which he wrote the first 
             three editions of the best-selling Hacker's Handbook as well 
             as DataTheft (Mandarin) and large quantities of journalism.  
             A new book,  on modern industrial espionage,  is due out in 
             1991.  Mr Sommer is frequently asked to appear on tv and 
             radio.












                                                Virtual City Associates
                                                     67 Mount View Road
                                                          London N4 4SR
                                                                    U K
                                                 tel: 44 (0)81-340 4139
                                                 fax: 44 (0)81-341 3472
                                                CompuServe  100012,2610





















                                                    (c) Peter Sommer, 1991