Helena Beasley’s essay is the winner of this year’s SCL Essay prize.
The ‘consensual hallucination’ that William Gibson first termed Cyberspace is a place of information and commerce, opportunity, community and deviance, ‘more ecosystem than machine’. Despite its military origin, the Internet has often been described by reference to its libertarian, democratic philosophy. Defined by the Internet Society as a vehicle for free expression, co-operation and unencumbered, self-regulated content, it is perhaps best defined for non-technical purposes as the space between and beyond the computers themselves.
Cyberspace certainly poses a novel challenge to existing notions of law. Instantaneous, international and lacking in overall ownership, the Internet defies traditional regulation. It is this absence of capable guardianship which has redefined traditional regulatory constructs and contributed to a true legal pluralism. What Foucault aptly describes as a ‘web of constraint’ presents a complex structure of governance in which, as Ehrlich long ago stated, law is but the top stratum of quasi legal controls and norms. Furthermore, while traditionally both soft and formal law has developed within physical time and space, cyberspace has no such constraint and is still a relatively novel and changing environment, creating what Giddens terms the ‘discontinuities’ of late modernity. With this in mind, this essay will examine the legal problems created by cyberspace and the three solutions usually offered to this unique legislative problem of cybercrime. Taking legislation as the top tier of control for reference and enforcement, the problem of the broader regulation of cyberspace will then be briefly examined, especially regarding the role of ISPs, the computer industry and the individual.
Indeed, confusion and reluctance in defining cybercrime has itself contributed to the difficulty in the development of systems of regulation. Internet crime can be defined broadly or narrowly, and any definition must be considered as closely related to the purpose to which it will be put. At its broadest, Internet crime includes ‘offences which take place in a computer or IT environment’ and may extend even to include theft of hardware. A Home Office report of 2004 adopts the more specific term ‘Netcrime’ defining ‘criminal or otherwise malicious activity utilising or directed towards the internet or IT applications’. In this way, the Internet’s contribution to crime can be characterised in three ways. Firstly, it has facilitated existing types of criminal activity, most usually as a tool for communication, for instance in allowing arrangement of drug deals and organised crime. Secondly, the Internet has generated new opportunities for existing crimes, such as obscenity in pseudo-photographs, fraud and ‘paedophile rings’. In these crimes, the Internet often creates a new context, rather than new problems. Many ‘Internet crimes’ are not new, but merely occur in a new location making existing legislation perfectly useful and valid. Delta and Matsuura argue that existing law can be developed to suit the novel circumstance of the Internet without a need for any separate cyberlaw.
There is also a third category comprising entirely new forms of crime, such as intellectual property theft, hacking and viral coding. These activities are largely without precedent and ‘lie outside our existing experience, demanding new forms of understanding and response’. It is this latter category which is of most concern to legislators and which poses the greatest challenge to legal regulation and is often known as hi-tech crime. These distinct and novel crimes are distinguished by David Wall into the categories of cyber-trespass, cyber-theft, cyber-obscenity and cyber-violence. Despite some overlap with existing criminal offences, it is these crimes which most defy regulation and, to use Wall’s colourful phrase, it is a case of ‘new wine, no bottles’.
Such new crimes can be extremely problematic from a legal point of view. Theft is defined as the unlawful taking or conversion of something capable of being physically removed, leading to the unfortunate situation in Low v Blease  Crim LR 513, where electricity was held not to be property under the Theft Act 1968, s 4. Furthermore, the ability to copy an original with no real loss to the owner challenges the concept of property itself and has lead to massive expansion of copyright protection. There can be no theft of data as there is no intention to permanently deprive, and indeed no real deprivation at all. This not only presents a profound challenge to the legal concept of property, but to any attempt at legal regulation thus forcing the massive over-expansion of copyright into new, possibly undesirable, legal territory. Defining property rights in cyberspace has been described as the central issue and priority problem for the development of cyberspace.
New crimes such as hacking also require new legislation and this may create problems. The example of viral criminality indicates two legislative approaches; the broad approach taken in
Indeed, where existing law is applicable to the Internet, special problems surround its application. Law on obscenity exists, for example, but is complicated by problems in jurisdictional differences. Furthermore, the Internet challenges the traditional criminal requirements of coincidence of intent and action as well as geography, and creates new evidential and procedural difficulties. Even where it is legally possible to prosecute offenders internationally, substantial problems may remain in relation to detecting and proving offences; a problem recognised as long ago as 1986 by the OECD with regard to extradition and search and seizure.
The establishment of a new jurisdiction of cyberspace with a separate and distinct legal system has been widely dismissed. Laws are already created at national and international level, as by the OECD and the EU. The problems with this approach however are manifold. The challenge of imposing suitable law for a group as culturally diverse as Internet users might prove insurmountable, while actually excluding undesirable behaviours raises disturbing questions of cyber-prisons and online persona. Governments themselves would also be unlikely to support the loss of local control and tax collection from e-commerce. Furthermore, as the Internet combines with other technologies, including TV and VoIP, separate regulation may not be possible. However, there is no reason to suppose that the Internet cannot, in principle, be regulated. Indeed ‘rules and rule-making do exist…[but] the identities and the rule makers and the instruments…will not conform to classic patterns’. The horizontal, non-hierarchical structure of the Internet has traditionally lent itself to self-regulation in line with normative, cyber-social standards. In the 1970s the Internet was a playground for technological hobbyists; the elite community of programmers known as hackers (before the term was used by the press to describe e-burglars). These hackers subscribed to what was known as the Hacker Code; a belief in the free sharing of information and the requirement not to harm any data or networks. The modern use of the Net as a place of entertainment and e-commerce has widened the Internet society, and it remains to be seen if such a system could continue to function in such circumstances. Mass participation in society alters the structure of rule making, on the Internet as much as in anthropological studies.
Arguably, a combination of methods would be necessary to achieve an effective system of law on the Internet. Ideally comprising formal criminal legislation, industry standards of improved security and awareness and existing notions of cybercommunity-based, normative regulation, this co-operation of users, industry, national and international governance is already in evidence in the current regulation of the Internet. Law of any form is useless and arguably philosophically non-existent without enforcement. Indeed, beyond the top stratum of formal legislation lies a complex system of regulation and control. Three broad groups can be identified, first the state sanctioned police whose jurisdiction covers crimes committed online where criminal legislation exists, secondly the Internet industry itself through the actions of the ISPs, and thirdly Netizens themselves. Grabosky describes this as a three-tiered system, a state structured mechanism for self-regulation by companies and industry associations, and surveillance and lobbying by private individuals and interest groups.
This system of tiered control allows for far wider extent of regulation than government alone could undertake. Providing a neat illustration for Foucault’s ‘web of constraint’, this co-operation allows for a greater degree of policing than the state alone could possibly achieve. The police have often been criticised as under-funded and non-expert in the field of computer crime, especially when private computer security offers a better financial reward. Though the Internet itself is a valuable tool for the reporting and investigation of cyber-crime and aids international communication, the role of the police remains, however crucial, confined to the investigation of existing criminal offences and wider issues surrounding offensive or obscene material are more routinely dealt with by the ISPs themselves and in particular by the Internet Watch Foundation.
The Internet Service Providers Association has largely funded the Internet Watch Foundation, which receives and investigates complaints from Netizens regarding largely child pornography, other obscene pornography and, following pressure from the Home Office, racist and terrorist material. The IWF is familiar with obscenity law and adjudicates on complaints, usually erring on the side of caution, probably to avoid prosecution, government regulation and economic loss to ISPs resulting from loss of reputation. The IWF is the main organisation for such reporting in the
The public themselves, the Netizens, are the last group regulating the web. As responsible Internet users they inform the IWF of any obscene material they find individually, and, arguably, by not putting it into cyberspace in the first place. Others may form user groups such as CyberAngels who seek to promote ‘netiquette’, a ‘collection of common rules of polite conduct that govern our use of the internet’. In this way, the Internet can still be described as self-regulating. At least insofar as sensible and responsible users, similarly to the elite technologists of the past, seek to preserve the Internet because they enjoy and respect it.
Though the existing system seems an effective compromise (although we have few figures to really assess its impact), it seems likely that the power of ISPs to control what is on the net will increase. Tension remains, however, between the appeal of the Internet as a place for freedom of information and expression and as a forum for mass participation in which some control and censorship may be desirable for the public interest. Free speech is a popular subject of Internet discourse, possibly owing to its conception in US democratic, libertarian philosophy. Indeed, many organisations such as the Electronic Frontier Foundation and Cyber-Rights and Cyber Liberties campaign vigorously to preserve Internet freedom, often using the
While, arguably, ISP intervention will preserve social norms through what is and isn’t reported as obscene, it is certainly controversial that corporate business will choose what can be viewed. This allows large corporations fundamental control of the Net, for example the actions of Google in providing the Chinese government with a restrictive search engine has proved highly controversial. Even more strikingly, when
The Internet has tremendous power to benefit humankind, but it also has a potential for corruption. Certainly the regulation of cybercrime raises significant wider questions about policing and social control in the modern world. The formal legislature provides only a framework of law which is then applied by a variety of organisations. In this sense the Internet is truly a site of legal pluralism, where law is partial and interactive - tackling cyberspace crime is certainly a legal issue, but perhaps in ways never before imagined.
Helena Beasley is a student on the MA Course at the
Bainbridge, D. (2004) Introduction to Computer Law,
Boyle, J. (1996) Shamans, Software and Spleens: Law and the Construction of the Information Society,
Edwards, L. and Waelde, C. (2000) Law and the Internet,
Hafner, K. & Markoff, J. Cyberpunk: Outlaws and Hackers on the Computer Frontier,
International Review of Law, Computers and Technology, 1995
Invisible Crimes: Their Victims and their Regulation, edited by Pam Davies, Peter Francis and Victor Jupp,
Information Society Reader Ed Frank Webster Routledge, London 2004
 William Gibson Neuromancer, p 68
 Esther Dyson, George Gilder, George Keyworth and Alvin Toffler, ‘Cyberspace and the American Dream’ in Frank Webster (ed.) The Information Society Reader (Routledge,
 <http://www.isoc.org> consulted
 Yaman Akdeniz, Clive Walker and David Wall ‘The Internet, Law and Society’ in Akdeniz, Walker and Wall (eds) The Internet Law and Society (Longman,
 Foucault, M (1991) Discipline and Punish: The Birth of the Prison
 Ernst Ehrlich, Fundamental Principles of the Sociology of Law (1912) cited in Peter Grabosky, Russell Smith and Gillian Dempsey, Electronic Theft: Unlawful Acquistion in Cyberspace (Cambridge, 2001)
 Martin Wasik (ed) (1995) 9 International Yearbook of Law Computers and Technology ‘Computer Crime Edition’ p. ix
 Home Office Report 62/04 The Future of Netcrime Now Consulted at http://www.homeoffice.gov.uk/rds/pdfs04/rdsolr6204.pdf
 Delta & Matsuura Law of the Internet (New York, 1996) cited in Akdeniz,
 David Wall, ‘Policing the Internet: Maintaining Law and Order on the Cyberbeat’ in Akdeniz, Walker and Wall The Internet, Law and Society (Longman,
 David Wall ‘Cybercrimes: Old Wine, No Bottles?’ in Pamela Davies, Peter Francis and Victor Jupp (eds) Invisible Crimes: Victims and Regulation (Macmillan, London, 1999) p 113
 David Wall ‘Cybercrimes: Old Wine, No Bottles?
 Laddie, J (1996) ‘Copyright: Over-strength, Over-Regulated, Over-rated,’ 18(5) European Intellectual Property Review 253
 Dyson et al, ‘Cyberspace and the American Dream’ an article surprisingly unaware of the global nature of the Internet
 Klaus Brunstein and Simone Fisher-Huebner ‘Regulating Internet Crime’ (1995) 9 International Yearbook of Law and Technology
 Grabosky, Smith and Dempsey, Electronic Theft, p 185
 Although, in some instances forum shopping can provide successful prosecutions such as the transfer to
 See Shevill v Presse alliance SA  2 WLR 1, though also note ‘jurisdiction shopping’ has positive impact in the
 Grabosky, Smith and Dempsey, Electronic Theft: Unlawful Acquisition in Cyberspace, citing OECD1986: 68 (
 House of Commons Select Committee on Trade and Industry Telecommunications Regulation (1997 – 8 HC 254, HMSO,
 Joel Reidenberg ‘Governing Networks and Cyberspace Rule Making’ (1996) 45 Emory Law Journal 911
 Cyber Punk, p 11
 Probably more effective and cheaper than formal law
 Electronic Theft, p 5
 Internet Watch Foundation <http://www.iwf.org.uk/> accessed
 Cyberangels <http://www.cyberangels.org/about.html> consulted
 Zickmund, Susan ‘Approaching the Radical Other: The Discursive Culture of Cyberhate’, David Bell and Barbara M Kennedy (eds) The Cybercultures reader
 Zickmund, p 238
 Lessig, Code and Other Laws of Cyberspace (New York, Basic Books, 1999)
 Sardar, Ziauddin ‘alt.civilisations.faq: Cyberspace as the darker Side of the West’ in Ziauddin Sardar and Jerome Ravetz (eds) Cyberfutures: Culture and Politics on the Information Superhighway (London, Pluto Press, 1996), p 31
 Vivian Sobchack, ‘Democratic Franchise and the Electronic Frontier’ in Cyberfutures Culture and politics on the information superhighway ed Ziauddin Sardar and Jerome Ravetz 1996 Pluto Press London, p 84