Government must update cybercrime laws, say experts

Government must update cybercrime laws, say experts

Summary: The government has been accused of sitting on its hands rather than making the Computer Misuse Act relevant

SHARE:
TOPICS: Security
3

The government "no longer has an excuse" to delay updating the Computer Misuse Act to include denial of service attacks in the light of this week's email bomber trial, according to legal experts.

A judge at Wimbledon Magistrates Court dismissed a charge brought a teenager who allegedly sent five million emails to his ex-employer, crashing its server. The judge ruled that denial-of-service (DoS) attacks are not illegal under the CMA.

The Home Office has repeatedly indicated in the past that the government is aware that the Computer Misuse Act needs to be strengthened, but nothing has yet been done.

Derek Wyatt, MP and chairman of the All Party Parliamentary Internet Group, chastised the government for failing to strengthen the CMA.

Wyatt called for the government to bring in legislation criminalising DoS attacks as soon as possible.

"It's time they found a way of including the small changes necessary in a Home Office bill or helped with a Private Members bill," said Wyatt.

The Home Office indicated it was aware the CMA was inadequate at present.

"The government is aware of the issue," a Home Office spokesperson told ZDNet UK on Thursday.

The government is looking at "strengthening the CMA, including increasing the maximum penalties [for cybercrime] and clarifying that all means of interference with a computer system are criminalised," the Home Office spokesperson added.

The Home Office made a similar statement to ZDNET UK back in 2002.

"It is no longer an excuse just to say they are aware of the issue," Wyatt said.

The law has not yet been updated because there has not been a suitable legislative vehicle, the Home Office said.

Government must "close the loophole"
Experts agree that the outcome of this trial highlights inadequacies in CMA.

"The ruling confirms what many people have long suspected: that DoS attacks are not caught by the CMA," said Struan Robertson, senior associate at solicitors firm Pinsent Masons and editor of Out-Law.com.

"It's necessary to amend the existing CMA to make it an offence to deliberately impair the function of another computer. Although the act is robust and has withstood the test of time, DoS is one problem that has been identified as falling through the cracks," said Robertson.

Robertson called for government action to close...

For more, click here... 

Topic: Security

Tom Espiner

About Tom Espiner

Tom is a technology reporter for ZDNet.com. He covers the security beat, writing about everything from hacking and cybercrime to threats and mitigation. He also focuses on open source and emerging technologies, all the while trying to cut through greenwash.

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

3 comments
Log in or register to join the discussion
  • Oh goodie. Let's fight symptoms rather then causes.
    anonymous
  • Yes, I agree to the experts who says governments must update cybercrime laws. Unless the government is foolproof itself there will always be loopholes through which criminals will escape.
    anonymous
  • With technology, there's always going to be new forms of crime and abuse. Relying on a 15 year old law for crimes now is as pointless as trying to treat HIV with leeches. As new ailments appear, new or modified medicines are created to treat them. As new crimes appear, new or modified laws must be introduced to do likewise.
    anonymous