Hacking And Unauthorized Access To Computer Systems
I. Meaning of Hacking and Unauthorized Access
Hacking refers to intentionally accessing a computer system, network, or data without authorization or in excess of authorized access.
Unauthorized access occurs when a person:
Enters a system without permission, or
Uses valid access credentials to perform actions beyond what is permitted.
Most legal systems criminalize hacking because it:
Violates privacy
Threatens data integrity
Endangers public and national security
Causes financial and reputational damage
II. Legal Elements of Unauthorized Access
Courts generally require the following elements:
Access to a computer or network
Lack of authorization or exceeding authorization
Intent or knowledge
Resulting harm or potential risk
III. Important Case Laws
1. United States v. Robert Tappan Morris (1989)
Facts
Morris released a worm onto ARPANET, affecting government and university systems.
The worm exploited vulnerabilities and replicated uncontrollably, crashing systems.
Legal Issue
Whether accessing systems without permission but without malicious intent constitutes a crime.
Judgment
Morris was convicted under the Computer Fraud and Abuse Act (CFAA).
The court ruled intent to access unauthorized systems is sufficient.
Importance
First hacking conviction under the CFAA.
Established that experimentation is not a defense.
2. United States v. Kevin Mitnick (1999)
Facts
Mitnick hacked into:
Government databases
Telecommunications networks
Defense-related systems
Used password sniffers and social engineering.
Legal Issue
Whether non-destructive hacking still poses a serious criminal threat.
Judgment
Convicted of wire fraud and unauthorized access.
Sentenced to imprisonment and post-release computer restrictions.
Importance
Reinforced strict penalties for hacking government systems.
Clarified that data theft is not required for conviction.
3. United States v. Ivanov (2001)
Facts
Russian hacker accessed U.S. government and military contractor systems remotely.
Installed malware and stole credentials.
Legal Issue
Jurisdiction over foreign hackers attacking U.S. systems.
Judgment
Court held that effects within the U.S. establish jurisdiction.
Ivanov was convicted.
Importance
Established extraterritorial application of hacking laws.
4. R v. Gold and Schifreen (1988)
Facts
Defendants accessed British Telecom’s Prestel system by guessing passwords.
No data was altered or destroyed.
Legal Issue
Whether unauthorized access alone was a crime under existing law.
Judgment
Acquitted because existing law did not cover hacking.
Importance
Directly led to the enactment of the UK Computer Misuse Act, 1990.
Demonstrated need for specific cybercrime legislation.
5. R v. Cuthbert (2005)
Facts
Cuthbert hacked into a charity’s website to test security.
Claimed ethical motives.
Legal Issue
Whether ethical hacking without permission is lawful.
Judgment
Convicted under the Computer Misuse Act.
Motive was irrelevant.
Importance
Established that intent to help does not excuse unauthorized access.
6. United States v. Nosal (2016)
Facts
Former employee used valid credentials of colleagues to access employer systems.
Data was taken for competitive purposes.
Legal Issue
Meaning of “exceeding authorized access.”
Judgment
Court ruled misuse of credentials violates authorization limits.
Importance
Clarified boundaries of authorized access.
Prevented misuse of insider privileges.
7. State of Maharashtra v. Mohd. Afzal (India – Parliament Attack Case)
Facts
Unauthorized computer access was used to plan terrorist activities.
Digital evidence showed illegal system use.
Legal Issue
Whether hacking-related evidence is admissible.
Judgment
Court accepted digital evidence under the Information Technology Act.
Importance
Strengthened legal recognition of cyber intrusion as criminal evidence.
IV. Comparative Legal Principles from Case Law
| Principle | Explanation |
|---|---|
| Unauthorized access | Crime even without damage |
| Intent | Knowledge of lack of permission is sufficient |
| Motive | Ethical or curiosity-based motives irrelevant |
| Jurisdiction | Location of harm determines jurisdiction |
| Government systems | Receive enhanced legal protection |
V. Conclusion
Courts worldwide treat hacking and unauthorized access as serious criminal offenses regardless of:
Whether data was altered
Whether harm was intended
Whether access was brief
Case law shows a clear trend:
Early legal gaps (Gold & Schifreen)
Strong statutory frameworks (Morris, Mitnick)
Global reach and strict enforcement (Ivanov, Nosal)
Modern jurisprudence recognizes that unauthorized digital access is a direct threat to privacy, economic stability, and national security.

comments