BAILII is celebrating 24 years of free online access to the law! Would you consider making a contribution?
No donation is too small. If every visitor before 31 December gives just £1, it will have a significant impact on BAILII's ability to continue providing free access to the law.
Thank you very much for your support!
[Home] [Databases] [World Law] [Multidatabase Search] [Help] [Feedback] | ||
England and Wales High Court (Administrative Court) Decisions |
||
You are here: BAILII >> Databases >> England and Wales High Court (Administrative Court) Decisions >> Ahzaz v The United States of America [2013] EWHC 216 (Admin) (21 February 2013) URL: http://www.bailii.org/ew/cases/EWHC/Admin/2013/216.html Cite as: [2013] EWHC 216 (Admin) |
[New search] [Printable RTF version] [Help]
QUEEN'S BENCH DIVISION
ADMINISTRATIVE COURT
Strand, London, WC2A 2LL |
||
B e f o r e :
And
MRS JUSTICE GLOSTER
____________________
Usman Ahzaz |
Appellant |
|
- and - |
||
The United States of America |
Respondent |
____________________
WordWave International Limited
A Merrill Communications Company
165 Fleet Street, London EC4A 2DY
Tel No: 020 7404 1400, Fax No: 020 7831 8838
Official Shorthand Writers to the Court)
Mr Daniel Sternberg (instructed by the Crown Prosecution Service) for the Respondent
Hearing dates: 1st February 2013
____________________
Crown Copyright ©
LORD JUSTICE GROSS:
INTRODUCTION
"INTRODUCTION
…….
1. A 'protected computer' includes a computer which is used in or affecting interstate or foreign commerce or communication…. A personal computer connected to the Internet is a 'protected computer'.
…..
3. Defendant….used malicious software to take command and control of a network of compromised protected computers (a 'botnet') without the authorisation of the owners of those computers, and offered for sale the use of said botnet to others for unauthorized purposes.
COUNT ONE
(Damaging a computer or information)
…..
5. On or before June 28, 2010, and continuing until at least July 5, 2010, within the District of Columbia and elsewhere, defendant….did knowingly cause and attempt to cause the transmission of a program, information, code, or command, that is, a malicious computer software program, and an additional program, information, code, or command, that is, a secondary program, and, as a result of such conduct, intentionally caused and attempted to cause damage without authorization to ten or more protected computers during any one-year period.
All in violation of Title 18, United States Code, Sections 1030(a)(5)(A), (b), and (c)(4)(A)(i)(VI) and Section 2."
" The government's evidence will establish that AHZAZ transmitted and installed what he believed to be malicious code provided to him by an undercover FBI agent onto more than 100,000 compromised computers that AHZAZ surreptitiously controlled. …. "
As already explained, "only" about 800 of the 100,000 computers are relevant to these proceedings.
" 1. Unauthorised access to computer material.
(1) A person is guilty of an offence if –
(a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer …..
(b) the access he intends to secure….is unauthorised; and
(c) he knows at the time when he causes the computer to perform the function that that is the case.
(2) The intent a person has to have to commit an offence under this section need not be directed at –
(a) any particular program or data;
(b) a program or data of any particular kind; or
(c) a program or data held in any particular computer.
….
3. Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of computer, etc.
(1) A person is guilty of an offence if –
(a) he does any unauthorised act in relation to a computer;
(b) at the time when does the act he knows that it is unauthorised; and
(c) either subsection (2) or subsection (3) below applies.
(2) This subsection applies if the person intends by doing the act –
(a) to impair the operation of any computer;
(b) to prevent or hinder access to any program or data held in any computer;
(c) to impair the operation of any such program or the reliability of any such data; …..
…..
17. Interpretation.
(2) A person secures access to any program or data held in a computer if by causing a computer to perform any function he –
(a) alters or erases the program or data; …."
" The key factor as far as this court is concerned is that these computers were under the control of the defendant as a result of them being infected with a program and that when the 'installs' occurred this must have been an unauthorised act …intended to impair the operation of a program or reliability of data, Section 3(2)(c) must apply. I accept this submission. The 1990 Act does not need any particular program or data to be identified to satisfy the need of the defendant's intention.
Furthermore, the use of the defendant's own computer in the installation of the code supplied to him by the FBI onto computers that he controlled and which he intended to access would in my opinion constitute causing a computer to perform a function with intent to secure access to a program held in those other computers. To that extent this request is Section 17(2)(c) compliant."
Very fairly, Mr. Cooper who appeared for the Appellant in this Court (but not below) accepted that although the District Judge referred (apparently erroneously) to s.17(2)(c), he would not object to us considering the matter under s.17(2)(a) (set out above).
THE RIVAL CASES
" …the appellant …secured access to the data in the computers controlled in his botnet by altering the data on those computers. He used his computer to perform a function, the transmission of the malicious code, thus altering the data held on the computers in the botnet on which the code was installed….
Notably the intent to commit an offence under section 1(2) …[of the 1990 Act]…does not need to be directed at any particular program or data, a program or data of any particular kind or a program or data held in any particular computer. Thus causing a computer to transmit code intending to alter the data of another computer in an unauthorised manner and knowing it to be so, makes out the offence under section 1…."
DISCUSSION
" This does not mean that the requesting state must prove the guilt of the person in English law. That would be absurd and would be a higher test than the prima facie case which had to be established under earlier legislation. The words 'would constitute an offence' simply mean 'would, if proved, constitute' the English offence…."
MRS JUSTICE GLOSTER: