_____________________________
IJoFCS (2017) 1, 36-41
The International Journal of
FORENSIC COMPUTER SCIENCE
_____________________________
www.IJoFCS.org
DOI: 10.5769/J201701004 or http://dx.doi.org/10.5769/J201701004
Criminal law aspects of computer crime
Siniša Franjić1, Semyon Silaev2
(1) University of Croatia, Email: sinisa.franjic@gmail.com
(2) Department for Criminal law and Criminology, Faculty of law, Kemerovo State University, Kemerovo, Russian
Federation, Email: usiacki@mail.ru
Abstract: Parallel to the enormous technological advances of the late 20th century in terms of the
strong development of modern information technology, there is also the problem of the use of
computers in various fields of human activity. This issue includes a lot of important issues and it
should be noted that the general impression that the legislation is lagging behind technological
development. This paper discusses the most common forms of computer crime from which it is clear
from the kind of issues encountered legal systems into their national legislation must provide penal
provisions relating to offenses of computer crime.
Keywords: computer crime, computer technology, law
1. Introduction
Concurrently with the great technological
advances of the late 20th century in terms of the
strong development of modern information
technology, there was a problem and the use of
computers in various fields of human activity.
According Krapac (Krapac, 1992., pp. 39), this
issue includes a number of important issues,
namely: the ratio of legislation towards the
development of technology and science, the
issue of human rights which may jeopardize the
application of computers in the collection and
processing of personal data and the protection of
certain issues of legal values in a society from
criminal attacks using the computer. When
considering the use of new technological
solutions in the context of national legislation, the
general impression is that the legislation always
delayed behind technological development. It was
many times in history, so it is still with computer
crime legislation. And when considering why this
is so, it should be remembered that lawyer only a
man who is capable to register observer
delinquent behavior within the new technological
developments and a number of issues that same
technological development opens (Krapac, 1992.,
pp. 41). This means that new technological
developments only after a certain lapse of time
can be regularized.
2. National criminal legislation and
the use of computers
Modern information technology have brought a
number of socially unacceptable behavior that
need to be adequately sanctioned. But to make
any rational attempt criminalization of certain
behavior to be successful, it is necessary to
proceed from several assumptions ((Šimundić
and Franjić, 2009., pp. 37-40):
• tСe notion tСat a certain Рood is a
fundamental social value that requires legal
protection and that the attack on him is the
___________________________________
th
Paper submitted on: June 26 , 2017
__________________________________________________________ Si iša Fra jić, a d Se yo Silae
behavior with the appropriate amount of
criminal lawlessness
• tСe fact that a crime may provide some
behavior only if it is from the standpoint of
social utility that is necessary. If the protection
of fundamental values can not be achieved by
some other means
• tСat tСe incrimination can acСieve successful
protection of society and man. That the
construction of such a legal protection that
can be achieved in practice
3. The most common forms of
computer crime
They are characterized by the fact that the
unauthorized access can be reached by persons
who he physically can access these by the
persons to be accessed by unauthorized remote
access. The most common forms of computer
abuse are:
3. 1. Unauthorized access to a computer
system (hacking)
Unauthorized access to a computer system are
actions aimed at circumventing checks access to
the system and allow the perpetrator to be
authorized under the guise of serving the services
and resources of the system. Access check is
carried out in two ways, and to identification and
authentication, where the identification means
establishing the identity of the applicant, under
the authorization of the means establishing the
authority of the applicant, and all what he can do
when he approaches to the system. The
consequence of the attack was a violation of the
confidentiality,
availability
of
data
and
applications, and service availability.
The perpetrators were people who were given
access to the system which uses the terminals of
other employees or to people via modem to
access the system. They are divided into internal
and external perpetrators.
Internal perpetrators approach achieved mainly
by negligence of other employees while external
perpetrators use various methods to come up
with passwords to access the system.
37
The perpetrators take care that acts committed by
other people's computer systems or the use of
cloned cell phones remain undiscovered to hide
their mark and disable the others in search of
them.
3. 2. Computer Espionage
Computer espionage is form of manipulation
where the objective is the unauthorized obtaining
of secret data and information stored in the
systems
or
transmission
through
telecommunications channels. The sale of such
acquired information seeks to acquire unlawful
material gain.
As the perpetrators appear to people in a way
they want to eliminate competition and to get
information that will be able to use in their work.
These are people with a high level of education in
information and telecommunication technology.
Sometimes working alone, sometimes working to
order. When you accidentally get the information,
they offer themselves in the market.
External entities attempt to access the system
unnoticed, bypassing the existing measures of
physical protection. Professionals who have at
their disposal various means, using all the
weaknesses of the system in order to reach the
goal.
3. 3. Computer Sabotage
Computer sabotage activities are aimed at
preventing the normal operation of the system or
prevent its use or the use of its resources. This
includes deleting, modifying, damaging data,
damaging programs with the intent to prevent its
further use and operation. Computer sabotage is
particularly dangerous when it happens decline in
economic systems, military and all other
infrastructural facilities.
The perpetrators are people with higher technical
knowledge using sophisticated means and
methods. The most common culprits are hackers,
terrorists, criminals are motivated by greed who
do it for revenge, political and other beliefs.
It is a physical activity that leads to a further
disabling or obstructing the use of a computer.
38
Criminal law aspects of computer crime ____________________________________________________
3. 4. Computer Fraud
It refers to the various types of data manipulation
due to the acquisition of the illegal gain. By
manipulating comes during input, processing,
storage, and exchange of information within the
individual information system or in the exchange
of information on the Internet. Easy to do, and
difficult to detect because the perpetrators use
someone else's personal information.
The perpetrators are mostly employees of legal
persons authorized to access the computer
system.
Internal perpetrators in the absence of their
colleague careless use of their terminals, and
often it is about former employees who in
revenge (mainly due to the loss of a job) so act.
3. 5. Computer Forgery
There are two types of manipulation. In the first
computer used for counterfeiting other people's
existing documents in digital form, and the other
is a computer used to create such documents
and committed forgery.
The perpetrators have greater knowledge and
use of more sophisticated legal and illegal
equipment that is no longer a critical element
because the technology is becoming cheaper.
With a relatively small expenditure, realized true
results.
Authorized or unauthorized access to the system
in which there are such documents to modify the
existing data, or copy the new document. Use the
scanners to transfer to a computer, programs
which change their content and form, and printers
that print on paper.
3. 6. Software Piracy
Software piracy make unauthorized reproduction
and use of protected software and it is one of the
most widespread forms of computer crime. Digital
format allows easy playback and sharing program
which is a contribution given the lack of legal
regulations.
The perpetrator has a lot because of this form of
computer crime is not necessary to know any
special equipment. It should be noted that the
perpetrators of software piracy divided into two
groups: the first includes those who work that in
the entertainment reasons, and on the other
those who work for the acquisition of the illegal
material benefits. In other words, in the second
group are the perpetrators who knowingly copy
and distribute protected programs without the
permission of copyright holders and make money
from it.
It takes a little technical knowledge, and it also
contributed the development of modem, but also
the development of the Internet.
3. 7. Harmful and illegal content
This is illegal acts which, with the help of modern
information technologies reproduce, produce and
distribute, and contain various immoral and illegal
content in digital form. Usually there is child
pornography, sadistic, neo-Nazi, chauvinistic,
racist and other similar facilities. The spread is
particularly contributed to the development of
modems,
the
Internet
and
other
telecommunications facilities.
The perpetrators are mostly people who do not
do anything other than criminal activity. Simple
and accessible modern information equipment
and technology used to streamline managing
their illegal activities.
For committing this crime is not necessary to
have any special technical knowledge.
3. 8. Other Abuse
Under other abuses include all those "traditional"
crimes that can be committed with the help of
modern computer technology. It is its wide use
led to a series of new offenses which is easier to
carry out if it is used in the commission of these
modern information technology. For example, it
may be compulsion, threats, theft, international
terrorism, blackmail, extortion, unauthorized
rendering of medical, trafficking etc.
4. Extended criminal offense
Given the fact that sometimes there computerrelated criminal offenses have the character of a
permanent criminal occupations, ie. Serve their
perpetrators as a very important (and sometimes
even the main) source of maintenance, are often
faced with situations where the same person
__________________________________________________________ Si iša Fra jić, a d Se yo Silae
several times repeated the same thing criminal
offenses against computer systems, programs
and data or created a number of those same.
This leads to the field of prolonged criminal act as
a type of apparent real concurrence, a
fundamental question in the context of this rather
wide issues could be formulated as follows: under
what circumstances each of the taken illegal
actions, but realizes all the essential elements of
a criminal offense, does not require an
independent legal assessment, but a whole
series of these actions can be legally labeled as a
single extended criminal offense. Or, in other
words, what is the scope of application of the
real-homogenous concurrence?
During more than two centuries, extended
criminal offense remains one of the most
complicated and the most controversial criminal
institutions in civil law countries. Leaving aside
the many discussions on the principled criminalpolitical justification and legal constructs and the
content of its individual elements, we can say that
the European criminal legal doctrine, there are
two basic approaches to defining this term.
According to objective concepts, crucial for the
construction of extended criminal offense (except,
of course, the identity of the perpetrators) are the
identity or similarity of crime and their temporal
and spatial correlation; often draws attention to
some additional (variable, variable) conditions for
the existence of extended criminal offense, which
are also largely objective character: the identity of
the injured rights, the identity of the victim,
sameness object works, using the same situation
or the same permanent relationship, and so on. In
contrast, supporters of the subjective concept of
extended criminal offense argue that the most
important cohesive element that justifies the
merging of a number of the same or the same
(and sometimes even variety) offenses into one
of the subjective side, and this is a unique intent
(unique intention), or a single negligence, while
all the objective features of extended criminal
offense only externals events and unique guilt
based on unique motivation of criminal behavior,
and this last one stems from a need, that the
perpetrator tends to settle, which is the goal of its
activities (see Silaev 2013). Deeper analysis of
these two approaches reveals their fundamental
difference in the understanding of the nature of
39
extended criminal offense: the point of view of
objective theory, it is a single criminal act only in
law, but not in the natural sense, ie. It is one legal
fiction whose purpose is to avoiding application of
the concourse works processual economy; As for
the subjective theory, their core consists in saying
that the real concurrence of the extended criminal
offense
are
two
absolutely
different
phenomenons, not only in terms of their legal
form, but essentially, or by its socialpsychological
characteristics (see Silaev 2014).
It should be noted that in the penal systems of
different countries in Central and Eastern Europe
the question of extended criminal offense is
handled in a different way. For example, in
Russia and other former Soviet republics
jurisprudence mostly opted for a mixed theory in
which the unique intent is considered mandatory
and very important element of the extended
criminal offense, although it requires certain
objective connection between actions that are
included in its composition. In Poland, the
legislator is firmly confined the extended criminal
offense (prгestępstаo ciąРła) as a form of a
single criminal offense and the extension of
criminal offenses (ciąР prгestępstаo) as a form of
merger of the real: the two legal figures have
almost identical objective characteristics, but
generally vary according to the subjective
content; namely, the existence of extended
criminal offense requires a unique intent (z góry
poагiętв гamiar), аСile its absence turns into a
series of unlawful conduct in the extension of
criminal offenses (Art. 12 and 91 of the Polish
Criminal Code) (see Budyn-Kulik et al 2012; see
Kardas 1999). In contrast, as a result of the last
reform of Croatian criminal law, there was no
legal definition of extended criminal offense,
which found reflection only objective elements of
the institution, while the unique intention is not
used (Art. 52 of the Croatian Criminal Code) (see
Turković and Maršavelski (ur/eds) 2013). As for
Germany, the construction of extended criminal
offense, there was almost deserted since the
early 1990s (see Joecks 2012).
Of course, these differences in determining the
overall idea of extended criminal offense directly
affecting the legal assessment of criminal
activities related to computer technology.
40
Criminal law aspects of computer crime ____________________________________________________
Take, as an example, software piracy. Leaving
aside a number of issues concerning the
relationship between criminal offenses of
unauthorized use of copyright work (which belong
to, among other things, computer programs), and
changes or damage to computer data, to draw
your attention only on doubts about the
application of the provisions on realhomogenous
concurrence. Suppose someone X engaged in
illegal installation of software on other computers,
thereby
removing
copy
protection,
and
consumers pay for such services (of course, such
a price is significantly lower than the licensed
programs). If we accept the objective
understanding of extended criminal offense, then,
to all such activities were carried out on a limited
territory for several days or even weeks could
legally be marked as one extended criminal
offense. It would be another solution, if we are
committed to understanding and legal figures
from a subjective point of view, it would have to
establish that perpetrator, before you performed
the first illegal installation, decided to carry out a
full range of these identical actions (in the
Russian judicial practice as a uniting factor in
such cases often serves the identity of the
consumer of such equipment and the unity of its
agreement with the perpetrator, as well as a
certain unity preparatory actions).
The same situation is with computer fraud.
According to the objective theory, the existence of
extended criminal offense may be enough, for
example, that the perpetrator was purchased for
illegal gain performs a series of time-related
actions, and thereby leverages the same
computer equipment and the same program that
he provide unauthorized access to computer data
and their modification. It will be a different
solution based on a subjective theory: then we
have to establish that the perpetrator is taking a
series of fraudulent acts, having a more or less
detail on the overall objective that must be
objectified in a unique result of all these
undertakings, otherwise there would be a
concurrence of several independent crimes of
computer fraud. Also note that in the post Soviet
jurisprudence, when it comes to the offense in
question "pillage" (ie, theft, robbery, robbery,
fraud, embezzlement and all forms of fraud),
great importance always be accorded, in addition,
union sources criminal enrichment.
All of the above shows once again, how utopian
aspirations for the creation of some universal
mechanisms of criminal justice confronting
computer-related crime: the unification of criminal
anti-social reactions to the appearance of not
enough introducing identical legal descriptions of
relevant offenses in national penal codes, and
even prescribing the same penalties as many
provisions of the general part of criminal law are
also of great importance for the qualification of
socially dangerous acts, including those in the
sphere of computer information. In addition, there
are a lot of question marks human criminal
behaviors that are only partially regulated by the
legislature, and developed case law. It is
therefore not realistic to expect that cyber crime
will receive from the authorized body the same
answer in all parts of the world.
5. Conclusion
Computer crime is a kind of inevitable active
participant in the exponential development of
information or computer technology especially in
the digitized electronic networks in all areas of
life. It differs from the known forms of crime
because of his common facility incorporeal
digitized data, computer main tool of unlawful
activity or purpose of his execution, and the
invisible computer to do a specific area of action
at a distance that in earlier periods was virtually
unthinkable. With the development of information
society, computer crime takes on more complex
forms and expands to the other, "traditional"
areas of crime. Computer crime today is not a
unique phenomenon with clearly visible
manifestations through which it manifests itself, a
specific profile of the perpetrator and the ways in
which it is executed. This gives it a new
dimension, makes it much more dangerous, and
its consequences more harmful and farreaching.
Therefore, it is modern society must oppose with
all available methods and means, including legal
protection is certainly one of the most important.
__________________________________________________________ Si iša Fra jić, a d Se yo Silae
References
[1]
Krapac, Davor: „Kompjuterski kriminalitet“
(Computer criminality), Pravni fakultet
Sveučilišta u ZaРrebu, Zagreb, 1992.
[2]
Šimundić, Slavko; Franjić, Siniša: „Računalni
kriminalitet“
(Computer
criminalitв),
Sveučilište u Splitu – Pravni fakultet, Split,
Hrvatska, 2009.
[3]
[4]
,
. .:
„О
[5]
Budyn-Kulik, MaРdalena; KoгłoаskaKalisг,
Patrycja; Kulik, Marek; Mozgawa, Marek:
Kodeks karny – Komentarz, 4. izd., Wolters
Kluwer Polska, Warszawa 2012.; Kardas,
Piotr: Prгestępstаo ciąРłe а praаie karnвm
materialnym
(analiza
konstrukcji
modeloавcС na tle pojęcia cгвnu, гbieРu
prгepisяа i гbieРu prгestępstа), Kantor
Авdaаnicгв „Zakamвcгe“, Krakяа,
[6]
Turković, Ksenija; Maršavelski, Aleksandar
(ur.): „Komentar KaгnenoР гakona i druРi
izvori
novoga
hrvatskog
kaznenog
гakonodavstva“ (Comment of tСe Criminal
Code and other sources of new Croatian
penal legislation), Narodne novine, Zagreb,
2013.
[7]
Joecks, АolfРanР: „StrafРesetгbucС –
Studienkommentar“, 10. Aufl., VerlaР C.H.
Beck, München, 2012.
“ (Objective
signs of delictum continuatum), in:
К
(Bulletin of Kemerovo State
Universitв), № 3/2013 ( . 1)
і
ў,
. .: „
ў
“ (On tСe most
important
conceptions
of
delictum
continuatum), in:
:
, М
ё
М Д
,
М
ё , 2014.
41