| Contents |
3. Extent of Crime & losses involved - worldwide
5. Vulnerability of Computer Systems to Crime
6. Computer Crime Legislation - International Development
6.2 Computer Crime Legislation Worldwide
7. Computer related crime in India
7.2 Strategy for prevention of Computer Crime
7.3 Issues concerning classification of computer Crime
12. Summary of Computer Crime Laws in various countries
The rapid development of computer telecommunication and other technology
has led to the growth of new forms of transnational crime, especially computer
related crime. Computer-related crime has virtually no boundaries and does
or may affect every country in this world.
The report seeks to be a working document, discusses the phenomenon
of computer-related crime, nature and classification of computer related
crime. The report summarises the work done in the area of computer-related
crime internationally, the acts/amendments enacted by several countries
and discusses the need for promotional programme to create the awareness
and enactment of necessary legislation in the country for the prevention
of computer related crime. The report also identifies other source of information
to which any one interested may refer to obtain detailed information.
Given the complex and volatile world of computers and telecom, even
though this report presents a grim and ominous view of the field, the reality
of being better safe than sorry has to be realised.
Back to Index
1.
Introduction
Information technology today is encompassing all walks of life all over the world. The technological developments in the concept of computing, network and software engineering have helped in transition from paper to paperless transactions and Bi-media (text and data) to multimedia . Today, speed, efficiency, and accuracy in information exchange have become key tools for boosting innovations, creativity and increasing productivity. Activities as diverse as banking, healthcare, education, manufacturing, retailing, entertainment and mass media have come to depend on the ability to generate, access, store and transmit information. Computers are not only used extensively to perform the industrial and economic functions of society but are also used to perform many functions upon which human life is dependent. Medical treatment, air traffic control, industrial contolled and national security are few examples. Even a small glitch in the operation of the systems can put human lives in danger. Computers are also used to store confidential data of a political, social, economic or personal nature. Society’s dependence on computer systems, therefore, has a profound human dependence.
a) Computer-related fraud
The input, alteration, erasure or suppression of computer data or computer programs, or other interference with the course of data processing that influences the result of data processing, thereby causing economic or possessory loss of property of another person with the intent of procuring an unlawful economic gain for himself or for another person (alternative draft : with the intent to unlawfully deprive that person of his property).
b) Computer forgery
The input, alteration, erasure or suppression of computer data or computer programs, or other interference with the course of data processing in a manner or under such conditions which would, according to national law, constitute an offence of forgery if it had been committed with respect to traditional object of such an offence.
c) Damage to computer data or computer programs
The erasure, damaging, deterioration or suppression of computer data or computer programs without right.
d) Computer sabotage
The input, alteration, erasure or suppression of computer data or computer programs, or interference with computer systems, with the intent to hinder the functioning of a computer or a telecommunications system.
e) Unauthorised access
The access without right to a computer system or network by infringing security measures.
f) Unauthorised interception
The interception, made without right and by technical means, of communications to, from and within a computer system or network.
g) Unauthorised reproduction of a protected computer program
The reproduction, distribution or communication to the public without
right of a computer program which is protected by law.
h) Unauthorised reproduction of a topography
The reproduction without right of a topography, protected by law, of a semiconductor product, or the commercial exploitation or the importation for that purpose, without right, of a topography or of a semiconductor product manufactured by using the topography.
2.2.1 Optional list
a) Alteration of computer data or computer programs
The alteration of computer data or computer programs without right.
b) Computer espionage
The acquisition by improper means or the disclosure, transfer or use of a trade or commercial secret without right or any other legal justification, with intent either to cause economic loss to the person entitled to the secret or to obtain an unlawful economic advantage for oneself or a third person.
c) Unauthorised use of a computer
The use of a computer system or network without right, that either :
i) is made with the acceptance of a significant risk of loss being caused to the person entitled to use the system or harm to the system or its functioning; or
ii) is made with the intent to cause loss to the person entitled to use the system or harm to the system or its functioning; or
iii) causes loss to the person entitled to use the system or harm to the system or its functioning.
d) Unauthorised use of a protected computer program
The use without right of a computer program which is protected by law and which has been reproduced without right, with the intent, either to procure an unlawful economic gain for oneself or for another person, or to cause harm to the holder of the right.
4. Perpetrators of Computer Crime
5. Vulnerability of Computer Systems to Crime
i) Density of information and processes
Today the storage technology allows a storage of data to the extent of few giga bytes on a desktop computer and large amount of data (terra byte) on such system facilitating billions of characters on-line. Memory management technique allows independent process to be supported con-currently within a single operating system. The memory capacity on a personal computer which was in the range of few mega bytes few years ago is in the range of more than 100 MB on a desktop computer and can be expanded to as high as 512 MB. The large disk capacity and the memory capacity facilitates centralisation of large information and its processing. This provides an attractive target for infiltrator for attacking functions or information assets of an organisation as data files can be combined to produce new information.
ii) Open Connectivity
Today systems which are available in the market have an open operating environment and open interfaces facilitating support for local, remote, interactive and in real time user mode. Any system anywhere in the globe can be connected both in terminal emulation mode or file transfer mode to any other system in the globe. Internet is one of the classic example. When information systems are implemented on such open systems, it is quite possible that there are errors in software implementation which is fully exploited by connecting the system and taking advantage of the system complexity.
iii) Electronic Technology
Computer data can be incidentally changed or erased with minimum chances of detection, e.g., virus or logic bomb. Anybody can easily modify the files and then cover the evidence of the offence. Data can be duplicated on floppies/tapes without any audit trails. By wire tapping, the computer can be intercepted or false commands may be generated to change the data and the files. Cases have been reported where electromagnetic radiations emitted by the computer have been intercepted to capture the data, delete or manipulate and program files without physically logging on to the system. Moreover, all hardware is susceptible to failure through aging, physical diameter and environmental change. These factors result in a problem of reliability, environmental dependency and vulnerability to interference and interception.
iv) Human factors
Employees represent the greatest threat in terms of computer crime. It is not uncommon in many EDP centres for computer programmers, computer operator, hardware technicians and other staff members to have extraordinary privilege in relation to access of key data and system resources in their organisations. A consequence of this situation is the probability that such individuals are frequently exposed to temptation.
v) System accessibility
Most of the time it is a goal to provide the maximum computer accessibility
to large number of users. Two kind of computer crime that exploit remote
access are use of fraudulent identification and access codes to access
the system resources and the unauthorised use of an unattended terminal,
logged on by an authorised person. Unrestricted access privileges are often
granted rather than allowing only the privileges necessary to perform an
intended function. For example, a transaction oriented system permitting
read only or inquiry only access offers a greater degree of protection
than a system offering full programming capability. The exposure provided
through increasingly easy access to electronic data and system resources
is an important contributor to the vulnerability of modern computer systems.
Back to Index
i) Ensure that existing offences and laws concerning investigative powers and admissibility of evidence in judicial proceedings adequately apply and, if necessary, make appropriate changes;
ii) In the absence of laws that adequately apply, create offences and investigative and evidentiary procedures, where necessary, to deal with this novel and sophisticated form of criminal activity;
iii) Provide for the forfeiture or restriction of illegally acquired assets resulting from the commission of computer - related crimes;
b) Improvement of computer security and prevention measures, taking into account the problems related to the protection of privacy, the respect for human rights and fundamental freedoms and any regulatory mechanisms pertaining to computer usage;
c) Adoption of measures to sensitize the public, the judiciary and law enforcement agencies to the problem and the importance of preventing computer-related crimes;
d) Adoption of adequate training measures for judges, officials and agencies responsible for the prevention, investigation, prosecution and adjudication of economic and computer-related crimes;
e) Elaboration, in collaboration with interested organisations, of rules of ethics in the use of computers and the teaching of these rules as part of the curriculum and training in informatics;
f) Adoption of policies for the victims of computer-related crimes which are consistent with the United Nations Declaration of Basic Principles of Justice for Victims of Crime and Abuse of Power, including the restitution of illegally obtained assets, and measures to encourage victims to report such crimes to the appropriate authorities."
6.5 The salient features of the Act as enacted by different countries are discussed below.
- damaging data in computer etc.
- unauthorised access to computer and
- committing mischief with data.
The imprisonment varies from upto 2 years to upto 10 years depending upon the crime.
- computer fraud,
- forgery of prohibitive data,
- alteration of data,
- computer sabotage.
The punishment ranges from upto 2 years to upto 5 years depending upon the nature of crime.
- False entry in permit licence or passport
- Electronic record made wrongfully
- Electronic record made wrongfully by public servant
- Interferences with business by destruction or damage of computer
- Interferences with computer
- Destruction of public document
- Destruction of private document
- Unauthorised access with intent to commit or facilitate commission of further offences
- Unauthorised modification of computer material
- Unauthorised use and interception of computer services
The punishment ranges from imprisonment upto 2-5 years with fine upto Singapore $ 2000-20000.
-unauthorised access with intent to commit or facilitate commission of
further
offences as the computer crimes.
The punishment is imprisonment upto 6 months to upto 5 years with fine.
- Intentional access of computer without authorisation to obtain financial information
- Unauthorised access of computer of a Govt. Deptt. or agency
- Unauthorised access of computer of federal interest with intent to defraud
- Knowingly causing transmission of data/program to damage a computer network,
data
or program or withhold or deny use of computer, network etc.
- Knowingly causing transmission of data/program with risk that transmission
will damage a computer
network, data or program or withhold or deny use of computer, network etc,
an unauthorised access
of computer with intent to defraud.
6.6 One of the reasons for not covering all the computer related crimes as classified by OECD in the Acts by the various countries is that the investigation of computer crime as well as general investigations in a computerised environment create new computer specific problems such as evidence, testifying witnesses, legality of gathering, storing and linking personal data. In most of the computer crime cases it is still unclear as to what is an effective investigation to verify the different computer related crimes/offences. It is also unclear as to what extent civil liberties of citizens must be protected against the storage of personal data in police files by law. In addition, there are specific legal problems related to admissibility of computer data in a trial process. The laws so far enacted also do not clarify the jurisdiction. Such issues, it is hoped, will serve as a basis for future work on computer related crime and once resolved will help establish an adequate criminal system in the data processing area.
- Stipulating the offences which constitute computer crime.
-Identify the domestic criminal law for possible amendments and supplementation to meet the requirement of prevention of computer related crime.
- Effective prosecution, inter alia, by possible adopting the existing criminal procedure law and related provisions.
- Improving international collaboration.
The new enactment of laws should bear the imprint of close link and direct reference to existing penal provisions.
Considering the transformational nature of computer-related crime; it
is desireable to adapt the guidelines and classification suggested by OECD
with nessecary ammendment.
|
|
|
|
|
|
|
|
|
|
|
|
| Unlawful transfer of funds/concealment of assets/trading with enemy/minor in sex act |
|
|||||||||
| Computer Related Fraud |
|
|
||||||||
| Computer Forgery |
|
|
|
Counterfieted cards |
||||||
| Damage to computer data /
program / network |
|
|
|
|
|
|
|
|
||
| Computer Sabotage |
|
|
|
|||||||
| Unauthorised access |
|
|
|
|
|
|
|
|
||
| Unauthorised Interception |
|
|
|
|
|
|||||
| Piracy Of Software |
|
|
|
|||||||
| Unauthorised Reproduction of a
Topography
(Microelectronics) |
|
|
||||||||
| Alteration of Computer Data or Computer Programs |
|
|
|
|
||||||
| Computer Espionage |
|
|
|
|||||||
| Unauthorised Use of Computers |
|
|||||||||
| Attempt/cause untrue entries in computer data |
|
|||||||||
| Official tapping/decryption etc by Government |
|
|||||||||
| Distribution of damaging data |
|
Country Name of the Act Enacted on Salient features
| U.K | Computer Misuse Act | 29-06-1990 | Offences and punishments 1. Unauthorised access to computer material Imprisonment upto 6 months and/or fine upto UKP 5,000 2. Unauthorised access with intent to commit or facilitate commission of further offences Imprisonment upto 6 months and/or fine on summary conviction Imprisonment upto 5 years and/or fine on conviction on indictment 3. Juridiction : England, Wales, Scotland and N. Ireland 4. Interpretation of the act |
| Singapore | Computer Misuse Act | 30-08-1993 | 1. Unauthorised access to computer material a). Imprisonment upto 2 years and/or fine upto $2,000 b) Imprisonment upto 5 years and/or fine upto $20,000 if the damage exceeds $10,000 2. Unauthorised access with intent to commit or facilitate commission of further offences Imprisonment upto 10 years and/or fine upto $50,000 3. Unauthorised modification of computer material a). Imprisonment upto 2 years and/or fine upto $2,000 b) Imprisonment upto 5 years and/or fine upto $20,000 if the damage exceeds $10,000 2. Unauthorised access with intent to commit or facilitate commission of further offences Imprisonment upto 10 years and/or fine upto $50,000 3. Unauthorised modification of computer material a). Imprisonment upto 2 years and/or fine upto $2,000 b) Imprisonment upto 5 years and/or fine upto $20,000 if the damage exceeds $10,000 4. Unauthorised use or interception of computer services a). Imprisonment upto 2 years and/or fine upto $2,000 b) Imprisonment upto 5 years and/or fine upto $20,000 if the damage exceeds $10,000 5. Computer output shall be admissible as evidence |
| Japan | Computer Crime (in the penal code of Japan) | 1. False entry in an authenticated deed Imprisonment upto 5 years or fine upto 500,000 Yen 2. False entry in permit, licence or passport Imprisonment upto 1 years or fine upto 200,000 Yen 3. Electronic record made wrongfully Imprisonment upto 5 years or fine upto 500,000 Yen 4. Electronic record made wrongfully by public servant Imprisonment upto 10 years or fine upto 1 millionYen 5. Interference with business by destruction or damage of computer Imprisonment upto 5 years or fine upto 1 millionYen 6. Interference with computerImprisonment upto 10 years 7. Destruction of public document Imprisonment upto 7 years but not less than 3 months 8. Destruction of private document Imprisonment upto 5 years | |
| Australia | Offences related to Computers (Australian Crimes Act 1914, Sec 76A-76F) | 1. Unlawful access to data in commonwealth and other computers Imprisonment between 6 months to 3 years 2. Damaging data in computer Imprisonment for 10 years | |
| Hong Kong | Computer Crimes Ordinance 1993 | 03-04-1993 | 1.Unauthorised access to computer by telecommunication Fine of $20,000 2. Access to computer with criminal or dishonest intent Imprisonment for 5 years 3. False entry in contract for sale of share Imprisonment for 3 years and fine of $5,000 4. False entry in bankbook Life Imprisonment 5. Making false dividend warrant Imprisonment for 7years 6. Book includes disc, card, tape, microchip etc. |
| Netherland | Computer Related Crime | 1. Intentional counterfeits or falsifies a cheque/credit card Imprisonment upto 6 years or fine of 100,000 guilders 2. Compels to make available data by deception Imprisonment upto 3 years or fine of 100,000 guilders 3. Intentional change/delete data Imprisonment upto 2 years or fine of 25,000 guilders 4. Intentional change/dele data using telecom infrastructure Imprisonment upto 4 years or fine of 25,000 guilders 5. Intentional distribution of data to damage automated system Imprisonment upto 4 years or fine of 100,000 guilders 6. Computer sabotage Imprisonment ranging from 6 months to 15 years or fine of 100,000 guilders 7. Unauthorised access Imprisonment ranging from 6 months to 4 years or fine upto 25,000 guilders 8. Unauthorised interception Imprisonment ranging from 3 months to 12 months or fine upto 25,000 guilders 9. Computer espionage Imprisonment ranging from 6 years to 15 years or fine of 100,000 guilders | |
| Germany | 1. Data spying Imprisonment upto 3 years or fine 2. Computer fraud Imprisonment upto 5 years or fine 3. Forgery of probative data Imprisonment upto 5 years or fine. Alteration of data Imprisonment upto 2 years or fine 5. Computer sabotage Imprisonment upto 5 years or fine | ||
| Canada | 1. Possession of device to obtain telecom facility Imprisonment upto 2 years 2. Unauthorised use of computer Imprisonment upto 10 years 3. Commiting mischief with data Imprisonment upto 10 years | ||
| USA | 1. Knowingly access of computer without authorisation related to national defence or foreign relations (Atomic Energy Act 1954) i) Imprisonment upto 10 years and/or a fine ii) Imprisonment upto 20 years and/or a fine if the offence occurs after a conviction under another offence 2. Intentional access of computer without authorisation to obtain financial information (Fair Credit Reporting Act 1681) i) Imprisonment upto 1 year and/or a fine ii) Imprisonment upto 10 years and/or a fine if the offence occurs after a conviction under another offence 3. Unauthorised access of computer of a govt. dept. or agency i) Imprisonment upto 1 year and/or a fine ii) Imprisonment upto 10 years and/or a fine if the offence occurs after a conviction under another offence 4. Unauthorised access of computer of federal interset with intent to defraud i) Imprisonment upto 5 year and/or a fine ii) Imprisonment upto 10 years and/or a fine if the offence occurs after a conviction under another offence 5. Knowingly causes transmission of data/program to i) Damage a computer, network, data or program, or ii) Withhold or deny use of a computer, network etc. i) Imprisonment upto 5 year and/or a fine ii) Imprisonment upto 10 years and/or a fine if the offence occurs after a conviction under another offence 6. Knowingly causes transmission of data/program with risk that the transmission will i) Damage a computer, network, data or program, or ii) Withhold or deny use of a computer, network etc., Imprisonment upto 1 year and/or a fine 7. Unauthorised access of computer with an intent to defraud i) Imprisonment upto 1 year and/or a fine ii) Imprisonment upto 10 years and/or a fine if the offence occurs after a conviction under another offence |