Feeds

UK prosecutions for hacking appear to be be dropping

But plenty of caveats apply

The Power of One eBook: Top reasons to choose HP BladeSystem

The number of prosecutions under the UK's computer hacking laws may have declined over recent years, according to the latest available government figures.

The number of prosecutions under the Computer Misuse Act came in a written Parliamentary answer by Crispin Blunt, prisons minister at the Ministry of Justice, in response to a question from Labour MP Madeleine Moon. The written answer – available via Hansard here – gives a breakdown by year and seriousness of offence for computer hacking offences dating between 2006 and 2010, the latest year for which figures are available.

There were 25 cases in which computer hacking featured as the main charge brought in 2006, a figure that has dropped more or less steadily to 10 prosecutions in 2010. There were 18 prosecutions in 2007 and 18 in 2008 before a slight spike to 19 in 2009 before the abrupt drop-off in 2010. Both prosecutions under Section One, the least serious category – which includes simple unauthorised access to a computer – and prosecutions under the more serious charges under the Computer Misuse Act declined. Section three offences cover the creation of computer viruses and (more recently) the instigation of denial of service attacks. Section Two offences cover unauthorised modification (computer hacking) as a part of some other crime.

A total of 18 serious offences were prosecuted in 2006 before a swift drop off to a level of between six and eight such prosecutions in the years 2008 to 2010, inclusive.

With such a small sample of less than 100 prosecutions it would be rash to read too much into the figures, especially since the stats only cover prosecutions where computer hacking offences were the principal offence under consideration by the courts. So if a suspect was convicted of banking fraud or phishing as well as computer misuse, and received a harsher sentence for the fraud, then the computer hacking prosecution would go unrecorded.

In addition the figures supplied provide no breakdown on the number of UK computer hacking prosecutions that actually resulted in a conviction. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.