Feeds

UK prosecutions for hacking appear to be be dropping

But plenty of caveats apply

Top 5 reasons to deploy VMware with Tegile

The number of prosecutions under the UK's computer hacking laws may have declined over recent years, according to the latest available government figures.

The number of prosecutions under the Computer Misuse Act came in a written Parliamentary answer by Crispin Blunt, prisons minister at the Ministry of Justice, in response to a question from Labour MP Madeleine Moon. The written answer – available via Hansard here – gives a breakdown by year and seriousness of offence for computer hacking offences dating between 2006 and 2010, the latest year for which figures are available.

There were 25 cases in which computer hacking featured as the main charge brought in 2006, a figure that has dropped more or less steadily to 10 prosecutions in 2010. There were 18 prosecutions in 2007 and 18 in 2008 before a slight spike to 19 in 2009 before the abrupt drop-off in 2010. Both prosecutions under Section One, the least serious category – which includes simple unauthorised access to a computer – and prosecutions under the more serious charges under the Computer Misuse Act declined. Section three offences cover the creation of computer viruses and (more recently) the instigation of denial of service attacks. Section Two offences cover unauthorised modification (computer hacking) as a part of some other crime.

A total of 18 serious offences were prosecuted in 2006 before a swift drop off to a level of between six and eight such prosecutions in the years 2008 to 2010, inclusive.

With such a small sample of less than 100 prosecutions it would be rash to read too much into the figures, especially since the stats only cover prosecutions where computer hacking offences were the principal offence under consideration by the courts. So if a suspect was convicted of banking fraud or phishing as well as computer misuse, and received a harsher sentence for the fraud, then the computer hacking prosecution would go unrecorded.

In addition the figures supplied provide no breakdown on the number of UK computer hacking prosecutions that actually resulted in a conviction. ®

Internet Security Threat Report 2014

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Home Depot ignored staff warnings of security fail laundry list
'Just use cash', former security staffer warns friends
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
BitTorrent's peer-to-peer chat app Bleep goes live as public alpha
A good day for privacy as invisble.im also reveals its approach to untraceable chats
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.