Since the dawn of the first programmable computer, computers have been have been one of the most helpful inventions in the world. The Offence that is being investigated is computer hacking in both home and government environments. Hacking is a global problem which affects normal citizens, businesses and the government. Hacking can take many forms from hacking a social media account to hacking a government facility. The social construct of hacking is that all around us on the internet we are in the same network as hackers. Hackers can be a person that hacks someone's account or computer to steal files which compared to hacking the government, it is a minor offence. The term ‘hacker’ has ...view middle of the document...
There are no weaknesses with the primary sources. The strengths associated with the secondary sources were that they were news articles reporting on hacking events and people that have been victims of this crime. The survey was a strong source as it gets people’s views on a wide range of questions. Some weaknesses associated with the secondary sources are that reporters can sometimes over exaggerate the news, giving false information. The weaknesses associated with the survey if that people cannot answer it accurately because they can be lazy or not understand the question.
3.0 Statement of Findings
In the process of the investigation trends were uncovered and found in computer hacker’s motives and reasons to hack. Computer hackers will generally only hack if the computer is vulnerable and is already infected with malware or spyware. This makes it very easy for a hacker to access a computer. This is because at the time the computer will be so busy fighting the viruses that the CPU will be so high that the computer will go in to a sleep state, making it able to be accessed by an authorised user. Hacker’s motives tend to be mostly to hack and steal bank details and credit card details if you have bought things online. Hackers also hack to steal certain files that they want or need. These files usually include pictures, videos, company files, and computer code and bank details.
3.2 Current Legislation
The current legislation dealing with the offence of computer hacking was introduced in 1997 and uses the heading 'computer hacking and misuse' but the offence is defined as the use of a restricted computer without the consent of the computer's controller. A restricted computer is defined as one that requires a 'device, code or sequence of electronic impulses' to gain access. There is a penalty scale of two, five or 10 years maximum term of imprisonment depending on whether (1) an offender simply uses a computer, (2) causes detriment or damage,...