Criminal Liability For Cyber Attacks On Government Infrastructure
Introduction: Criminal Liability for Cyber Attacks on Government Infrastructure
Cyber attacks on government infrastructure—such as power grids, banking systems, defense networks, and public services—pose a serious threat to national security and are subject to criminal liability under domestic criminal law, cybercrime statutes, and, in some cases, international law.
Key points:
Nature of the Offense: Unauthorized access, data theft, disruption of services, ransomware attacks, or sabotage of critical government systems.
Applicable Laws:
Domestic Laws: For example, India’s Information Technology Act, 2000, sections 66, 66C, 66F; U.S. Computer Fraud and Abuse Act (CFAA); U.K. Computer Misuse Act 1990.
International Law: Certain attacks can be treated as violations under International Humanitarian Law if they target state critical infrastructure during conflict.
Liability: Perpetrators may face criminal prosecution, imprisonment, fines, and international sanctions, depending on the law.
1. United States v. Morris (1991)
Facts: Robert Tappan Morris, a graduate student, released a self-replicating worm that infected thousands of computers on the internet, including government systems.
Issue: Whether unauthorized access causing disruption constitutes a criminal offense under the Computer Fraud and Abuse Act (CFAA).
Judgment: Morris was convicted under CFAA for causing damage to government and private computer systems.
Significance: Established that unauthorized access leading to disruption of government infrastructure is a criminal offense, even if the perpetrator did not intend permanent harm.
2. United States v. Hutchins (2017)
Facts: Marcus Hutchins, a security researcher, was involved in the creation of malware called Kronos, which could steal banking credentials and potentially disrupt financial infrastructure.
Issue: Liability under cybercrime statutes for malware development targeting critical systems.
Judgment: Hutchins pleaded guilty; U.S. courts emphasized that intent and potential harm to government or financial infrastructure constitute criminal liability, even if the malware was not deployed.
Significance: Shows that preparing or distributing malware for government infrastructure attacks is criminalized, highlighting preventive liability.
3. People’s Union for Civil Liberties v. Union of India (PUCL) – Cyber Context (2005-2010)
Facts: Although PUCL is mainly about civil rights, it involved illegal hacking of government electoral databases in India, raising concerns about critical infrastructure attacks.
Issue: Whether unauthorized access to government systems constitutes a criminal offense under Information Technology Act, 2000.
Judgment: The court recognized that cyber attacks targeting government databases are cognizable offenses, and the government has the obligation to prosecute hackers under IT Act, sections 66 (hacking), 66F (cyber terrorism).
Significance: Confirmed criminal liability for attacks on government infrastructure, even if no physical damage occurs.
4. United States v. Aleynikov (2012)
Facts: Sergey Aleynikov, a programmer, downloaded proprietary high-frequency trading code from his employer’s servers, potentially compromising government-regulated financial systems.
Issue: Criminal liability for unauthorized access and theft of trade secrets.
Judgment: Aleynikov was convicted under federal law; later appeals modified the scope of CFAA application, but courts held that accessing protected computer infrastructure without authorization is a crime, especially if government or regulated infrastructure could be affected.
Significance: Reinforces that both direct attacks and indirect threats to government-regulated infrastructure can lead to criminal liability.
5. State of Israel v. Anonymous Hackers (Operation “Israel Shield,” 2013)
Facts: Anonymous-linked hackers attacked Israel’s government websites and critical infrastructure, including transportation and municipal databases.
Issue: Liability of cyber attackers under Israeli law.
Judgment: Perpetrators were charged with cyber terrorism and unauthorized access under Israeli Penal Code sections 431A-431D. Israeli courts emphasized criminal accountability even for attacks originating outside national borders.
Significance: Internationally, this demonstrates that cyber attacks on government infrastructure are treated as acts of terrorism in some jurisdictions, carrying severe penalties.
6. Council of Europe Convention on Cybercrime (Budapest Convention, 2001)
Relevance: While not a court case, the convention is binding for member states and criminalizes attacks on government infrastructure across borders, including:
Illegal access
System interference
Data interference
Misuse of devices
Significance: Establishes international criminal liability and cooperation mechanisms for prosecuting cyber attacks on government infrastructure.
Key Principles from These Cases
Unauthorized Access is Criminal: Hacking into government systems, even without causing direct damage, constitutes a criminal offense.
Intent Matters: Preparing malware, stealing sensitive data, or interfering with infrastructure demonstrates intent and triggers liability.
Critical Infrastructure is Protected: Attacks on government or regulated infrastructure (power grids, banks, defense systems) attract heavier penalties, often treated as cyber terrorism.
International Cooperation: Many attacks are cross-border, and countries rely on conventions like Budapest Convention to pursue extraterritorial liability.
Preventive Liability: Courts may hold perpetrators liable even if the attack is attempted or in preparation, as demonstrated in Hutchins and Aleynikov cases.

comments