Monday 2 January 2012

ICT Civil Rights

There are certain acts and laws that protect computer users from hackers and fraud.  These acts are called the Data Protection Act of 1998 and the Computer Misuse Act of 1990.  They are specific laws for computers and data stored on computers. 

The Data Protection Act

The data protection act was made to protect personal information.
It only covers personal information about living individuals, not about businesses.
It covers data stored on computer or in a paper-based filing system.
It lets people check what data is being held about them.
It is run by the Information Commissioner’s Office.
Data Subjects are the individuals that the information is about and the Data Users are the big companies that collect, store and use the information. 

The companies that store the information have to follow these 8 points.  The information has to be:
  1. Fairly and lawfully processed
  2. Used for limited purposes
  3. Adequate and relevant. Only what is needed may be used
  4. Accurate
  5. Not kept for longer than is necessary
  6. Accessible to the individual and able to be corrected or removed where necessary
  7. Secure
  8. Not transferred to countries without adequate protection

If these points are not being followed then the company storing the information can get in trouble with the Information Commissioners Office.

Companies need to keep their customer information secure otherwise it could get into the wrong hands and the customers could be victims of fraud or hacking.


Computer Misuse Act

The Computer Misuse Act was passed to stop unauthorized access to computers, often called hacking. There are three offences in the act.

Unauthorized access to computer material is an offence.
Accessing with intent to commit or facilitate committing another offence.
Unauthorized modification to computer material.

The punishments for these are:

Unauthorised access (hacking)
£2k and/or 6 months

Unauthorised access with intent (fraud)
5 years + £50k
Unauthorised Changing of files (viruses)
5 years + £50k per computer affected

Computer software is now covered by the Copyright Designs and Patents Act of 1988, which covers a wide range of intellectual property such as music, literature and software. Provisions of the Act make it illegal to, copy software and run pirated software.  
The punishment for these crimes are:

Illegal Copying, not for Profit
£2k and/or 6 months
Mass Copying, not for profit
Same penalty and confiscation and compensation

Any of the above for profit
10 years + £50k + damages

Crime and Crime Prevention

Crime and crime prevention have both advanced over the last few years.  An example of crime advancing is hacking.  Before new laws, hacking was legal and computers were very basic.  When the hacking law was enforced it made it illegal to change the software on computers.  As technology has advanced, there are more things that hackers can use and manipulate on computers, such as peoples accounts, password protected information and documents, fake websites, viruses and phishing.  Technology can also help to prevent crimes, solve crimes and catch criminals. 

Hackers
A hacker is a person that breaks codes and passwords to gain unauthorised entry to computer systems.  Many hackers do not intent to damage data, but enjoy the challenges of breaking into computer systems.  However, in some instances the hackers purpose could be to commit fraud, to steal commercially valuable data and sell it to another company or to damage or delete the data in order to harm the company.

Phishing
Phishing is the act of sending an e-mail to someone, pretending to be an established legitimate company in an attempt to scam the user into giving up private information that will be used for identity theft. The e-mail directs the user to visit a fake web site where they are asked to update personal information, such as passwords and credit card, social security and bank account numbers. The Web site is set up only to steal the person’s personal information so the fraudsters can steal your money and pretend to be you.

Spyware
Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge.  Spyware is typically hidden from the user, and can be difficult to detect.

While the term spyware suggests software that secretly monitors the user's computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet connection or functionality of other programs.

CCTV and Number Plate Recognition

CCTV stands for closed circuit television and is a crucial element of police work.  If someone commits a crime such as a burglary, and there is CCTV in the local area of the burglary, then the police would be able to use the footage to figure out what had happened.  They might be able to capture the criminals face, what they were wearing and where they went if they escaped.  The police can use the footage in court as evidence to show what happened.  The cameras can be found in police cars, on the sides of buildings and sometimes on the body of a police officer.

Number plate recognition is key for the enforcement of vehicle crimes on the roads.  This includes cases of stolen cars  with flagged number plates.  The police put the number plate on a special list and when the cameras detect the specific number plate, it will notify the police so they can apprehend the criminal and save the picture for future reference and evidence.

Traffic Enforcement Cameras
These cameras are used for many different laws on the road, such as bus lane enforcement, red light enforcement and speed limit enforcement.

Bus lane camera
If someone drives their vehicle down a bus lane illegally, then a camera could use its number plate recognition technology to take a picture of the car and send a ticket to the owner of the car, fining them a specific amount of money. 

Red light camera
If someone drives their vehicle past a traffic light that is red, then a camera will take a picture of the number plate and send a fine to the owner of the recognised car.

Speed limit enforcement

This is an effective way used by the government to stop people speeding in certain areas.  The cameras are placed at the side of the road and if someone drives past it at a speed that is over the legal limit, then it will take a picture of the number plate and send a fine in the post to the owner of the car.

Police National Computer

As the police collect vast amounts of data as evidence with the CCTV, photographs, and DNA, they need to store it all securely.  That is why the Police National Computer was developed.  This computer allows the police to share information throughout the country making it easier for them to work together and put evidence together to catch criminals.  It is available 24 hours a day, and when a police officer makes an enquiry on someone or something, they get the information in a matter of seconds.  It is housed at police headquarters at Hendon.  The mainframe computer is connected to about 10,000 terminals that are located at every police station in the country.  Many patrol cars are also equipped with a terminal.  The computer deals with an average of 65 million transactions a year.

Advantages of technology in crime and crime prevention
It is easier to store information so you can use it later as evidence
You can store many different kinds of evidence
Technology is fast, effective and most of the time, reliable

Disadvantages of technology in crime and crime prevention
Technology is also used for wrong doing such as hacking into personal and classified information
Some technology can break and lose the important data

Overall, technology is extremely useful in crime prevention and crime solving, but it can be used for bad things if it is in the wrong hands.