Feeds

UK cybercrime overhaul finally comes into effect

DDoS doubly illegal from 1 October

Securing Web Applications Made Simple and Scalable

Updates to the ageing Computer Misuse Act (CMA) finally come into force in England and Wales on Wednesday (1 October).

Modifications to the CMA - which was enacted in 1990 before the advent of the interweb - were included in the Police and Justice Act 2006. These changes were then themselves amended by the Serious Crime Act 2007. In order to avoid confusion the government decided to apply these changes all at once, through a (delayed) legislative order that comes into effect on 1 October.

Scotland has devolved authority in areas such as computer crime law, so measures such as the clear criminalisation of denial of service attacks entered the statue books north of the border a year ago in October 2007.

The amendments cover three main provisions. Though there was widespread agreement that the UK's existing computing law was outdated, each of the changes has attracted criticism to a greater or lesser degree.

First up, the maximum penalty for unauthorised access to a computer system (the least serious of three hacking offences covered in the original act) has been raised from six months to two years in prison, making the offence serious enough that an extradition request can be filed.

Denial of service attacks, previously something of a legal grey area, are now clearly criminal, with a maximum penalty of up to ten years behind bars. Requests to introduce changes along these lines were made repeatedly by industry representatives during parliamentary hearings on UK computer crime laws, but are nonetheless controversial in some circles.

Spyblog describes the changes as "ill-defined" and duplicated in the Identity Cards Act 2006 as far as attacks on the planned National Identity Register centralised database are concerned. The site suggests that industrial action by computer consultants and the like working on the database would become a criminal offence.

Thirdly the amended act makes it an offence to distribute hacking tools for criminal purposes. Politicians initially suggested an outright ban on so-called hacking tools, which would have made possession of dual-use software package such as Nmap a criminal offence. The technically illiterate measure would have turned white hat penetration testers into cybercrooks. Following industry lobbying the measures were modified but still include provisions that criminalise the distribution or creation of "hacking tools" where criminal intent can be established, modifications that have failed to satisfy security experts.

Spyblog's withering critique of the changes is well worth a read and can be found here. Security researcher Clive Feather has published colour-coded excerpts of the Computer Misuse Act highlighting the amendments here. ®

Bootnote

UK cybercrime laws derive from those covering the tort of trespass whereas equivalent US law laws are based on older legislation covering fraud, hence the need in US law to prove that victims of cybercrime suffered damages.

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.