Professional Documents
Culture Documents
Hacking Offences PDF
Hacking Offences PDF
0101010010101101010101010101010101101100000000000000110101101011011111111101101000000000000010010
0001110110101010111111111111110010100110101010001010010111111111111110111111111111010100101001001010010100111100001
0001110110101010111111111111110010100110101010001010010111111111111110111111111111010100101001001010010100111100001
1111110010011111111111110101011111111111111111011110010110101101011010110101010110101101010110101011
11000000110001010101010010101101010101010101010101101100000000000000110101101011011111111101101000000000000010010
11000000110001010101010010101101010101010101010101101100000000000000110101101011011111111101101000000000000010010
001011010000010101101011010100101001010100000010010100101001010010100100100101001010010100101001
11111111110011111111110010011111111111110101011111111111111111011110010110101101011010110101010110101101010110101011
11111111110011111111110010011111111111110101011111111111111111011110010110101101011010110101010110101101010110101011
0100100101010010100101001010010100101001010000000000101010000000000111111111100000000000101001010
0101101111110101001011010000010101101011010100101001010100000010010100101001010010100100100101001010010100101001
0101101111110101001011010000010101101011010100101001010100000010010100101001010010100100100101001010010100101001
0100101010001101011000110100110011001100000000000000101111111110101110101101010101010110101010110
0010100101001010100100101010010100101001010010100101001010000000000101010000000000111111111100000000000101001010
0010100101001010100100101010010100101001010010100101001010000000000101010000000000111111111100000000000101001010
01010110101010101010010010101010000111011010101011111111111111001010011010101000101001011111111111
11010100101010010100101010001101011000110100110011001100000000000000101111111110101110101101010101010110101010110
11010100101010010100101010001101011000110100110011001100000000000000101111111110101110101101010101010110101010110
0101001010010010100101001111000011100000011000101010101001010110101010101010101010110110000000000
101010110101010101010110101010101010010010101010000111011010101011111111111111001010011010101000101001011111111111
101010110101010101010110101010101010010010101010000111011010101011111111111111001010011010101000101001011111111111
0111111111011010000000000000100101111111111001111111111001001111111111111010101111111111111111101111
11101111111111110101001010010010100101001111000011100000011000101010101001010110101010101010101010110110000000000
11101111111111110101001010010010100101001111000011100000011000101010101001010110101010101010101010110110000000000
0101101010101101011010101101010110101101111110101001011010000010101101011010100101001010100000010
00001101011010110111111111011010000000000000100101111111111001111111111001001111111111111010101111111111111111101111
00001101011010110111111111011010000000000000100101111111111001111111111001001111111111111010101111111111111111101111
0101001001001010010100101001010010010100101001010100100101010010100101001010010100101001010000000
00101101011010110101101010101101011010101101010110101101111110101001011010000010101101011010100101001010100000010
00101101011010110101101010101101011010101101010110101101111110101001011010000010101101011010100101001010100000010
00011111111110000000000010100101011010100101010010100101010001101011000110100110011001100000000000
0101001010010100101001001001010010100101001010010010100101001010100100101010010100101001010010100101001010000000
0101001010010100101001001001010010100101001010010010100101001010100100101010010100101001010010100101001010000000
0111010110101010101011010101011010101011010101010101011010101010101001001010101000011101101010101
00010101000000000011111111110000000000010100101011010100101010010100101010001101011000110100110011001100000000000
00010101000000000011111111110000000000010100101011010100101010010100101010001101011000110100110011001100000000000
010011010101000101001011111111111111011111111111101010010100100101001010011110000111000000110001010
00010111111111010111010110101010101011010101011010101011010101010101011010101010101001001010101000011101101010101
00010111111111010111010110101010101011010101011010101011010101010101011010101010101001001010101000011101101010101
10101010101010101101100000000000000110101101011011111111101101000000000000010010111111111100111111
1111111111111001010011010101000101001011111111111111011111111111101010010100100101001010011110000111000000110001010
1111111111111001010011010101000101001011111111111111011111111111101010010100100101001010011110000111000000110001010
111111010101111111111111111101111001011010110101101011010101011010110101011010101101011011111101010
101010010101101010101010101010101101100000000000000110101101011011111111101101000000000000010010111111111100111111
101010010101101010101010101010101101100000000000000110101101011011111111101101000000000000010010111111111100111111
110101101010010100101010000001001010010100101001010010010010100101001010010100100101001010010101
1111001001111111111111010101111111111111111101111001011010110101101011010101011010110101011010101101011011111101010
1111001001111111111111010101111111111111111101111001011010110101101011010101011010110101011010101101011011111101010
0010100101001010010100101000000000010101000000000011111111110000000000010100101011010100101010010
0101101000001010110101101010010100101010000001001010010100101001010010010010100101001010010100100101001010010101
0101101000001010110101101010010100101010000001001010010100101001010010010010100101001010010100100101001010010101
1100011010011001100110000000000000010111111111010111010110101010101011010101011010101011010101010
0010010101001010010100101001010010100101000000000010101000000000011111111110000000000010100101011010100101010010
0010010101001010010100101001010010100101000000000010101000000000011111111110000000000010100101011010100101010010
01001001010101011100011100001110000110000111011010101011111111111111001010011010101000101001011111
10010101000110101100011010011001100110000000000000010111111111010111010110101010101011010101011010101011010101010
10010101000110101100011010011001100110000000000000010111111111010111010110101010101011010101011010101011010101010
1111101010010100100101001010011110000111000000110001010101010010101101010101010101010101101100000
101011010101010101001001010101011100011100001110000110000111011010101011111111111111001010011010101000101001011111
101011010101010101001001010101011100011100001110000110000111011010101011111111111111001010011010101000101001011111
0101101111111110110100000000000001001011111111110011111111110010011111111111110101011111111111111111
111111111011111111111101010010100100101001010011110000111000000110001010101010010101101010101010101010101101100000
111111111011111111111101010010100100101001010011110000111000000110001010101010010101101010101010101010101101100000
0101101011010101011010110101011010101101011011111101010010110100000101011010110101001010010101000
00000000011010110101101111111110110100000000000001001011111111110011111111110010011111111111110101011111111111111111
00000000011010110101101111111110110100000000000001001011111111110011111111110010011111111111110101011111111111111111
0101001010010010010100101001010010100100101001010010101001001010100101001010010100101001010010100
01111001011010110101101011010101011010110101011010101101011011111101010010110100000101011010110101001010010101000
01111001011010110101101011010101011010110101011010101101011011111101010010110100000101011010110101001010010101000
00000000111111111100000000000101001010110101001010100101001010100011010110001101001100110011000000
0001001010010100101001010010010010100101001010010100100101001010010101001001010100101001010010100101001010010100
0001001010010100101001010010010010100101001010010100100101001010010101001001010100101001010010100101001010010100
1110101110101101010101010110101010110101010110101010101010110101010101010010010101010000111011010
00000000101010000000000111111111100000000000101001010110101001010100101001010100011010110001101001100110011000000
00000000101010000000000111111111100000000000101001010110101001010100101001010100011010110001101001100110011000000
110010100110101010001010010111111111111110111111111111010100101001001010010100111100001110000001100
00000000101111111110101110101101010101010110101010110101010110101010101010110101010101010010010101010000111011010
00000000101111111110101110101101010101010110101010110101010110101010101010110101010101010010010101010000111011010
01101010101010101010101101100000000000000110101101011011111111101101000000000000010010111111111100
1010111111111111110010100110101010001010010111111111111110111111111111010100101001001010010100111100001110000001100
1010111111111111110010100110101010001010010111111111111110111111111111010100101001001010010100111100001110000001100
111111111111010101111111111111111101111001011010110101101011010101011010110101011010101101011011111
01010101010010101101010101010101010101101100000000000000110101101011011111111101101000000000000010010111111111100
01010101010010101101010101010101010101101100000000000000110101101011011111111101101000000000000010010111111111100
001010110101101010010100101010000001001010010100101001010010010010100101001010010100100101001010
1111111111001001111111111111010101111111111111111101111001011010110101101011010101011010110101011010101101011011111
1111111111001001111111111111010101111111111111111101111001011010110101101011010101011010110101011010101101011011111
1001010010100101001010010100101000000000010101000000000011111111110000000000010100101011010100101
1010100101101000001010110101101010010100101010000001001010010100101001010010010010100101001010010100100101001010
1010100101101000001010110101101010010100101010000001001010010100101001010010010010100101001010010100100101001010
0101010010010101001010010100101001010010100101000000000010101000000000011111111110000000000010100101011010100101
0101010010010101001010010100101001010010100101000000000010101000000000011111111110000000000010100101011010100101
High
Tech
Crime
Brief
Hacking offences
application (MCCOC 2001). Since then,
greater uniformity has been achieved as
New South Wales, Victoria, the Australian
Capital Territory and South Australia have
implemented laws in terms similar to the
Commonwealth Criminal Code provisions
inserted by the Cybercrime Act 2001
(Cwlth). The Northern Territory law is also
loosely based on this model.
Importantly, access in itself is not prohibited.
and an intention to obtain a benefit or
advantage is not sufficient to constitute
an offence, except for section 276B in
the Northern Territory. In this scheme
there has been a deliberate choice to peg
criminal liability at four levels based on the
defendants intent or the way access to data
is secured on a computer. It should be noted
that the standard of criminal responsibility for
the creators of viruses and worms under the
Cybercrime Act model is set quite high and
that this in itself reflects the tension inherent
in seeking to adequately deal with malicious
applications while allowing for the lawful use
of the internet. The four levels are:
Level 1
Accessing data or impairing an electronic
communication if this is done with the
intention to commit a serious offence (defined
as an offence with a maximum penalty of at
least five years). In the Northern Territory the
intention required is to cause loss or damage
or to gain a benefit or advantage.
Level 2
Impairing or modifying data, or impairing
electronic communications, if done with the
intent to cause (or with recklessness to)
harm or inconvenience.
Level 3
Possession, control, production or supply
of data with the intent to commit any of the
2005
05
Unauthorised
Determining whether a hack is authorised or
not is not straightforward and may involve
detailed consideration of whether a computer
owner has any data access policy, whether
and how that policy is communicated to
others, how accessible a computer is, and
how accessible are the files, directories and
other information on that computer. There
may be questions of contractual or moral
rights, or of implied consent, or the limits of a
consent once given. A dominant characteristic
of modern computing is the interconnection
of devices via local area networks (LANs)
and global connectivity via the world wide
web. Sorting out legitimate from illegitimate
use of encryption, trademarks in metatags,
bulk spam, anonymity and disguised identity
has been seen as particularly problematic
(MCCOC 2001). The use of cookies is an
example of how the internet is itself based
on the free exchange of data between
computers and where the vagueness of
standards for internet behaviour can be
exploited. A cookie is a piece of data inserted
by one computer on another so that the first
computer can recognise that other computer
on a subsequent occasion. However, cookies
can also be used to track, monitor and
report on other internet activity conducted
on the second computer. A cookie with this
capacity is sometimes referred to as spyware.
Spyware is relatively common and someone
surfing the net may not realise, in agreeing
to the terms of a download, that they are
agreeing to such a cookie being placed on
their computer (Barrett 2002). In the US and
Australia it has been proposed to require
consent for the insertion of such software
(BBC 2004).
Privacy
In the Northern Territory there is an
offence of unlawfully obtaining confidential
Contact
Further reading
Australian Institute of Criminology
Barrett R 2002. Free software is the lure, online surveillance is the reality. Consumer web watch news. http://www.
consumerwebwatch.org/news/articles/spyware.htm
GPO Box 2944 Canberra ACT 2601
0001110110101010111111111111110010100110101010001010010111111111111110111111111111010100101001001010010100111100001
BBC 2004. US moves to rein in spyware. BBC news 18 June. http://news.bbc.co.uk/1/hi/technology/3818057.stm
Phone: 02 6260 9200
Fax: 02 6260
9201
11000000110001010101010010101101010101010101010101101100000000000000110101101011011111111101101000000000000010010
0001110110101010111111111111110010100110101010001010010111111111111110111111111111010100101001001010010100111100001
0001110110101010111111111111110010100110101010001010010111111111111110111111111111010100101001001010010100111100001
11111111110011111111110010011111111111110101011111111111111111011110010110101101011010110101010110101101010110101011
11000000110001010101010010101101010101010101010101101100000000000000110101101011011111111101101000000000000010010
11000000110001010101010010101101010101010101010101101100000000000000110101101011011111111101101000000000000010010
Gibbs H 1988. The review of Commonwealth criminal law: interim report on computer crime. Canberra: AttorneyWeb: www.aic.gov.au
0101101111110101001011010000010101101011010100101001010100000010010100101001010010100100100101001010010100101001
11111111110011111111110010011111111111110101011111111111111111011110010110101101011010110101010110101101010110101011
11111111110011111111110010011111111111110101011111111111111111011110010110101101011010110101010110101101010110101011
Project no. 0074
Generals Department
0010100101001010100100101010010100101001010010100101001010000000000101010000000000111111111100000000000101001010
0101101111110101001011010000010101101011010100101001010100000010010100101001010010100100100101001010010100101001
0101101111110101001011010000010101101011010100101001010100000010010100101001010010100100100101001010010100101001
Kerr O 2003. Cybercrimes scope: interpreting access and authorisation in computer misuse statutes. New York
11010100101010010100101010001101011000110100110011001100000000000000101111111110101110101101010101010110101010110
0010100101001010100100101010010100101001010010100101001010000000000101010000000000111111111100000000000101001010
0010100101001010100100101010010100101001010010100101001010000000000101010000000000111111111100000000000101001010
101010110101010101010110101010101010010010101010000111011010101011111111111111001010011010101000101001011111111111
11010100101010010100101010001101011000110100110011001100000000000000101111111110101110101101010101010110101010110
11010100101010010100101010001101011000110100110011001100000000000000101111111110101110101101010101010110101010110
University law review 78(5): 1596
11101111111111110101001010010010100101001111000011100000011000101010101001010110101010101010101010110110000000000
101010110101010101010110101010101010010010101010000111011010101011111111111111001010011010101000101001011111111111
101010110101010101010110101010101010010010101010000111011010101011111111111111001010011010101000101001011111111111
Levy S 1984. Hackers: heroes of the computer revolution. New York: Bantam Doubleday Bell
00001101011010110111111111011010000000000000100101111111111001111111111001001111111111111010101111111111111111101111
11101111111111110101001010010010100101001111000011100000011000101010101001010110101010101010101010110110000000000
11101111111111110101001010010010100101001111000011100000011000101010101001010110101010101010101010110110000000000
00101101011010110101101010101101011010101101010110101101111110101001011010000010101101011010100101001010100000010
00001101011010110111111111011010000000000000100101111111111001111111111001001111111111111010101111111111111111101111
00001101011010110111111111011010000000000000100101111111111001111111111001001111111111111010101111111111111111101111
Ling P 2000. Is Australian criminal law up to the threat of computer viruses? Journal of the society for computers and
0101001010010100101001001001010010100101001010010010100101001010100100101010010100101001010010100101001010000000
00101101011010110101101010101101011010101101010110101101111110101001011010000010101101011010100101001010100000010
00101101011010110101101010101101011010101101010110101101111110101001011010000010101101011010100101001010100000010
the law 41. http://www.nswscl.org.au/journal/41/Crime.html
00010101000000000011111111110000000000010100101011010100101010010100101010001101011000110100110011001100000000000
0101001010010100101001001001010010100101001010010010100101001010100100101010010100101001010010100101001010000000
0101001010010100101001001001010010100101001010010010100101001010100100101010010100101001010010100101001010000000
00010111111111010111010110101010101011010101011010101011010101010101011010101010101001001010101000011101101010101
00010101000000000011111111110000000000010100101011010100101010010100101010001101011000110100110011001100000000000
00010101000000000011111111110000000000010100101011010100101010010100101010001101011000110100110011001100000000000
Model Criminal Code Officers Committee (MCCOC) 2001. Damage and computer offences. MCCOC report. Canberra:
1111111111111001010011010101000101001011111111111111011111111111101010010100100101001010011110000111000000110001010
00010111111111010111010110101010101011010101011010101011010101010101011010101010101001001010101000011101101010101
00010111111111010111010110101010101011010101011010101011010101010101011010101010101001001010101000011101101010101
Attorney-Generals Department
101010010101101010101010101010101101100000000000000110101101011011111111101101000000000000010010111111111100111111
1111111111111001010011010101000101001011111111111111011111111111101010010100100101001010011110000111000000110001010
1111111111111001010011010101000101001011111111111111011111111111101010010100100101001010011110000111000000110001010
1111001001111111111111010101111111111111111101111001011010110101101011010101011010110101011010101101011011111101010
101010010101101010101010101010101101100000000000000110101101011011111111101101000000000000010010111111111100111111
101010010101101010101010101010101101100000000000000110101101011011111111101101000000000000010010111111111100111111
Parliamentary Joint Committee on the Australian Crime Commission (PJC) 2004. Cybercrime. Canberra: Parliament of
0101101000001010110101101010010100101010000001001010010100101001010010010010100101001010010100100101001010010101
1111001001111111111111010101111111111111111101111001011010110101101011010101011010110101011010101101011011111101010
1111001001111111111111010101111111111111111101111001011010110101101011010101011010110101011010101101011011111101010
the Commonwealth of Australia
0010010101001010010100101001010010100101000000000010101000000000011111111110000000000010100101011010100101010010
0101101000001010110101101010010100101010000001001010010100101001010010010010100101001010010100100101001010010101
0101101000001010110101101010010100101010000001001010010100101001010010010010100101001010010100100101001010010101
10010101000110101100011010011001100110000000000000010111111111010111010110101010101011010101011010101011010101010
0010010101001010010100101001010010100101000000000010101000000000011111111110000000000010100101011010100101010010
Reymond E 1996. The new hackers dictionary (third edition). Cambridge MA: MIT Press
0010010101001010010100101001010010100101000000000010101000000000011111111110000000000010100101011010100101010010
101011010101010101001001010101011100011100001110000110000111011010101011111111111111001010011010101000101001011111
10010101000110101100011010011001100110000000000000010111111111010111010110101010101011010101011010101011010101010
10010101000110101100011010011001100110000000000000010111111111010111010110101010101011010101011010101011010101010
Taylor P 2000. Hackers cyberpunks or microserfs? In D Thomas & B Loader. Cybercrime: 3655. London: Routledge
111111111011111111111101010010100100101001010011110000111000000110001010101010010101101010101010101010101101100000
101011010101010101001001010101011100011100001110000110000111011010101011111111111111001010011010101000101001011111
101011010101010101001001010101011100011100001110000110000111011010101011111111111111001010011010101000101001011111
00000000011010110101101111111110110100000000000001001011111111110011111111110010011111111111110101011111111111111111
111111111011111111111101010010100100101001010011110000111000000110001010101010010101101010101010101010101101100000
111111111011111111111101010010100100101001010011110000111000000110001010101010010101101010101010101010101101100000
01111001011010110101101011010101011010110101011010101101011011111101010010110100000101011010110101001010010101000
00000000011010110101101111111110110100000000000001001011111111110011111111110010011111111111110101011111111111111111
00000000011010110101101111111110110100000000000001001011111111110011111111110010011111111111110101011111111111111111
0001001010010100101001010010010010100101001010010100100101001010010101001001010100101001010010100101001010010100
01111001011010110101101011010101011010110101011010101101011011111101010010110100000101011010110101001010010101000
01111001011010110101101011010101011010110101011010101101011011111101010010110100000101011010110101001010010101000
00000000101010000000000111111111100000000000101001010110101001010100101001010100011010110001101001100110011000000
0001001010010100101001010010010010100101001010010100100101001010010101001001010100101001010010100101001010010100
0001001010010100101001010010010010100101001010010100100101001010010101001001010100101001010010100101001010010100
00000000101111111110101110101101010101010110101010110101010110101010101010110101010101010010010101010000111011010
00000000101010000000000111111111100000000000101001010110101001010100101001010100011010110001101001100110011000000
00000000101010000000000111111111100000000000101001010110101001010100101001010100011010110001101001100110011000000
1010111111111111110010100110101010001010010111111111111110111111111111010100101001001010010100111100001110000001100
00000000101111111110101110101101010101010110101010110101010110101010101010110101010101010010010101010000111011010
00000000101111111110101110101101010101010110101010110101010110101010101010110101010101010010010101010000111011010
01010101010010101101010101010101010101101100000000000000110101101011011111111101101000000000000010010111111111100
1010111111111111110010100110101010001010010111111111111110111111111111010100101001001010010100111100001110000001100
1010111111111111110010100110101010001010010111111111111110111111111111010100101001001010010100111100001110000001100
1111111111001001111111111111010101111111111111111101111001011010110101101011010101011010110101011010101101011011111
01010101010010101101010101010101010101101100000000000000110101101011011111111101101000000000000010010111111111100
01010101010010101101010101010101010101101100000000000000110101101011011111111101101000000000000010010111111111100
1010100101101000001010110101101010010100101010000001001010010100101001010010010010100101001010010100100101001010
1111111111001001111111111111010101111111111111111101111001011010110101101011010101011010110101011010101101011011111
1111111111001001111111111111010101111111111111111101111001011010110101101011010101011010110101011010101101011011111
ISSN 1832-3413
Disclaimer: This research paper does not necessarily reflect the policy position of the
Australian Government, the AIC or the AHTCC