Hacking Of Government Websites in UK
Hacking of Government Websites in the UK (Legal Perspective)
In the UK, hacking government websites or systems is primarily prosecuted under the Computer Misuse Act 1990, especially:
- Section 1: Unauthorized access to computer material
- Section 2: Unauthorized access with intent to commit further offences
- Section 3: Unauthorized acts causing or risking serious damage
- Section 3A: Making or supplying tools for hacking
Government systems (police databases, military networks, tax systems, etc.) are treated as critical protected systems, so offences involving them are taken very seriously.
Key Case Laws (At least 6)
1. R v Gold & Schifreen (1988)
This is a pre-Computer Misuse Act landmark case.
Facts:
- The defendants accessed the Prestel computer system (British Telecom’s email service).
- They obtained login credentials of a telecom engineer and used them to view restricted data.
Legal Issue:
- Whether “hacking” could be treated as criminal deception or forgery.
Judgment:
- The House of Lords ruled that existing laws (like forgery) did NOT properly cover hacking.
- This case directly led to the creation of the Computer Misuse Act 1990.
Importance:
- Foundation case for UK cybercrime law.
2. R v Bignell (1998)
Facts:
- Police officers accessed the Police National Computer (PNC).
- They checked vehicle records for personal reasons (not official policing duties).
Legal Issue:
- Whether misuse of authorized access counts as “unauthorized access”.
Judgment:
- Court held that access must be outside authorization entirely, not just improper use.
- Since officers had general authority to access the system, they were not guilty under CMA Section 1.
Importance:
- Narrow interpretation of “unauthorized access”.
- Later influenced legislative clarification.
3. R v Bow Street Magistrates’ Court, ex parte Allison (No. 2) (1999)
Facts:
- Concerned extradition of individuals accused of hacking systems in the UK and abroad.
- Included unauthorized access affecting government and financial systems.
Legal Issue:
- Whether extradition was valid under cybercrime allegations.
Judgment:
- Court upheld extradition proceedings.
- Confirmed that computer misuse offences are extraditable crimes.
Importance:
- Strengthened international cooperation in cybercrime cases involving government systems.
4. R v Lennon (2006)
Facts:
- Defendant sent large volumes of data requests causing disruption to an internet service used by public institutions.
Legal Issue:
- Whether causing system disruption falls under CMA Section 3.
Judgment:
- Court held that causing impairment of operation of a computer system qualifies as an offence.
Importance:
- Expanded understanding of “damage” to systems beyond physical harm.
5. R v Sheppard & Jennings (2010)
Facts:
- Defendants published a book describing methods to access computers (including restricted systems).
- Some material could be used for hacking government systems.
Legal Issue:
- Whether publishing hacking-related content is an offence under CMA.
Judgment:
- Court ruled that prosecution under CMA Section 3A requires consent of the Director of Public Prosecutions (DPP).
- Publication alone is not automatically criminal unless intent is proven.
Importance:
- Clarified limits of liability for “hacking tools” and knowledge sharing.
6. Lauri Love v United States (2018, UK High Court)
Facts:
- Lauri Love was accused of hacking multiple US government agencies:
- NASA
- FBI
- US Army systems
- Conducted from the UK.
Legal Issue:
- Whether he should be extradited to the US.
Judgment:
- UK courts blocked extradition on human rights grounds (risk of severe mental health harm).
- However, he was still accused under CMA offences in the UK.
Importance:
- One of the most famous UK-related cases involving government cyber intrusions internationally.
- Highlighted extradition limits in cybercrime cases.
7. Gary McKinnon Case (2002–2012)
Facts:
- McKinnon accessed US Department of Defense and NASA systems from the UK.
- Claimed he was searching for UFO-related evidence.
Legal Issue:
- Unauthorized access under CMA and extradition to the US.
Outcome:
- UK Home Secretary blocked extradition in 2012 due to:
- Mental health concerns
- Human rights considerations
Importance:
- Became a major political and legal debate on cybercrime extradition.
- Showed how hacking government systems can trigger international legal consequences.
Conclusion
UK law treats hacking government websites as a serious criminal offence under the Computer Misuse Act 1990, with penalties ranging from fines to long imprisonment. The case laws show three key legal themes:
- Strict protection of government systems
- Expansion of cybercrime interpretation over time
- Strong international cooperation in prosecution and extradition

comments