Aaron's Law
   HOME

TheInfoList



OR:

The Computer Fraud and Abuse Act of 1986 (CFAA) is a
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
cybersecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
bill that was enacted in 1986 as an amendment to existing
computer fraud Computer fraud is the use of computers, the Internet, Internet devices, and Internet services to defraud people or organizations of resources. In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act (CFAA ...
law (), which had been included in the
Comprehensive Crime Control Act of 1984 The Comprehensive Crime Control Act of 1984 () was the first comprehensive revision of the U.S. criminal code since the early 1900s. It was sponsored by Strom Thurmond (R-SC) in the Senate and by Hamilton Fish IV (R-NY) in the House, and was ...
. Prior to computer-specific criminal laws, computer crimes were prosecuted as
mail and wire fraud Mail fraud and wire fraud are terms used in the United States to describe the use of a physical (e.g., the U.S. Postal Service) or electronic (e.g., a phone, a telegram, a fax, or the Internet) mail system to defraud another, and are U.S. feder ...
, but the applying law was often insufficient. The original 1984 bill was enacted in response to concern that computer-related crimes might go unpunished. The House Committee Report to the original computer crime bill included a statement by a representative of
GTE GTE Corporation, formerly General Telephone & Electronics Corporation (1955–1982), was the largest independent telephone company in the United States during the days of the Bell System. The company operated from 1926, with roots tracing furth ...
-owned
Telenet Telenet was an American commercial packet-switched network which went into service in 1975. It was the first FCC-licensed public data network in the United States. Various commercial and government interests paid monthly fees for dedicated lin ...
that characterized the 1983 techno-thriller film ''
WarGames ''WarGames'' is a 1983 American techno-thriller film directed by John Badham, written by Lawrence Lasker and Walter F. Parkes, and starring Matthew Broderick, Dabney Coleman, John Wood and Ally Sheedy. Broderick plays David Lightman, a ...
''—in which a young teenager (played by
Matthew Broderick Matthew Broderick (born March 21, 1962) is an American actor. He starred in ''WarGames'' (1983) as a teen government hacker, and ''Ladyhawke (film), Ladyhawke'' (1985), a medieval fantasy alongside Rutger Hauer and Michelle Pfeiffer. He play ...
) from
Seattle Seattle ( ) is the most populous city in the U.S. state of Washington and in the Pacific Northwest region of North America. With a population of 780,995 in 2024, it is the 18th-most populous city in the United States. The city is the cou ...
breaks into a U.S. military
supercomputer A supercomputer is a type of computer with a high level of performance as compared to a general-purpose computer. The performance of a supercomputer is commonly measured in floating-point operations per second (FLOPS) instead of million instruc ...
programmed to predict possible outcomes of
nuclear war Nuclear warfare, also known as atomic warfare, is a War, military conflict or prepared Policy, political strategy that deploys nuclear weaponry. Nuclear weapons are Weapon of mass destruction, weapons of mass destruction; in contrast to conven ...
and unwittingly almost starts
World War III World War III, also known as the Third World War, is a hypothetical future global conflict subsequent to World War I (1914–1918) and World War II (1939–1945). It is widely predicted that such a war would involve all of the great powers, ...
—as "a realistic representation of the automatic dialing and access capabilities of the
personal computer A personal computer, commonly referred to as PC or computer, is a computer designed for individual use. It is typically used for tasks such as Word processor, word processing, web browser, internet browsing, email, multimedia playback, and PC ...
." The CFAA was written to extend existing
tort law A tort is a civil wrong, other than breach of contract, that causes a claimant to suffer loss or harm, resulting in legal liability for the person who commits the tortious act. Tort law can be contrasted with criminal law, which deals with crime ...
to
intangible property Intangible property, also known as incorporeal property, is something that a person or corporation can have ownership of and can transfer ownership to another person or corporation, but has no physical substance, for example brand identity or ...
, while, in theory, limiting
federal jurisdiction Federal jurisdiction is the jurisdiction of the federal government in any country that uses federalism. Such a country is known as a Federation. Federal jurisdiction by country All federations, by definition, must have some form of federal juris ...
to cases "with a compelling federal interest—i.e., where computers of the
federal government A federation (also called a federal state) is an entity characterized by a political union, union of partially federated state, self-governing provinces, states, or other regions under a #Federal governments, federal government (federalism) ...
or certain
financial institution A financial institution, sometimes called a banking institution, is a business entity that provides service as an intermediary for different types of financial monetary transactions. Broadly speaking, there are three major types of financial ins ...
s are involved or where the crime itself is interstate in nature", but its broad definitions have spilled over into
contract law A contract is an agreement that specifies certain legally enforceable rights and obligations pertaining to two or more Party (law), parties. A contract typically involves consent to transfer of goods, Service (economics), services, money, or pr ...
(see "Protected Computer", below). In addition to amending a number of the provisions in the original ''section 1030'', the CFAA also criminalized additional computer-related acts. Provisions addressed the distribution of
malicious code Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
and
denial-of-service attack In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
s. Congress also included in the CFAA a provision criminalizing trafficking in
passwords A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services ...
and similar items. Since then, the Act has been amended a number of times—in 1989, 1994, 1996, in 2001 by the USA PATRIOT Act, 2002, and in 2008 by the Identity Theft Enforcement and Restitution Act. With each amendment of the law, the types of conduct that fell within its reach were extended. In 2015, President
Barack Obama Barack Hussein Obama II (born August 4, 1961) is an American politician who was the 44th president of the United States from 2009 to 2017. A member of the Democratic Party, he was the first African American president in American history. O ...
proposed expanding the CFAA and the
RICO Act The Racketeer Influenced and Corrupt Organizations (RICO) Act is a United States federal law that provides for extended criminal penalties and a civil cause of action for acts performed as part of an ongoing criminal organization. RICO was e ...
.
DEF CON DEF CON (also written as DEFCON, Defcon, or DC) is a Computer security conference, hacker convention held annually in Las Vegas Valley, Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include comp ...
organizer and
Cloudflare Cloudflare, Inc., is an American company that provides content delivery network services, cybersecurity, DDoS mitigation, wide area network services, reverse proxies, Domain Name Service, ICANN-accredited domain registration, and other se ...
researcher
Marc Rogers Marc Rogers is a Canadian acoustic and electric bassist. Career Rogers studied at the University of North Texas College of Music, where he was a member of the One O'Clock Lab Band directed by Neil Slater. He is a member of the band The Philosop ...
, Senator
Ron Wyden Ronald Lee Wyden ( ; born May 3, 1949) is an American politician serving as the Seniority in the United States Senate, senior United States Senate, United States senator from Oregon, a seat he has held since 1996 United States Senate special el ...
, and Representative
Zoe Lofgren Susan Ellen "Zoe" Lofgren ( ; born December 21, 1947) is an American politician and lawyer serving as a United States House of Representatives, U.S. representative from California. A member of the Democratic Party (United States), Democratic Part ...
stated opposition to this on the grounds it would make many regular internet activities illegal. In 2021, the Supreme Court ruled in Van Buren v. United States to provide a narrow interpretation of the meaning of "exceeds authorized access".


Protected computers

The only computers, in theory, covered by the CFAA are defined as "
protected computer __NOTOC__ Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to th ...
s". They are defined under section to mean a computer: * exclusively for the use of a
financial institution A financial institution, sometimes called a banking institution, is a business entity that provides service as an intermediary for different types of financial monetary transactions. Broadly speaking, there are three major types of financial ins ...
or the United States Government, or any computer, when the conduct constituting the offense affects the computer's use by or for the financial institution or the government; or * which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States ... In practice, any ordinary computer has come under the jurisdiction of the law, including cellphones, due to the interstate nature of most Internet communication.


Criminal offenses under the Act

(a) Whoever— :(1) having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such conduct having obtained information that has been determined by the United States Government pursuant to an Executive order or statute to require protection against unauthorized disclosure for reasons of national defense or foreign relations, or any restricted data, as defined in paragraph y. of section 11 of the Atomic Energy Act of 1954, with reason to believe that such information so obtained could be used to the injury of the United States, or to the advantage of any foreign nation willfully communicates, delivers, transmits, or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; :(2) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains— ::(A) information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602 (n) of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.); ::(B) information from any department or agency of the United States; or ::(C) information from any protected computer; :(3) intentionally, without authorization to access any nonpublic computer of a department or agency of the United States, accesses such a computer of that department or agency that is exclusively for the use of the Government of the United States or, in the case of a computer not exclusively for such use, is used by or for the Government of the United States and such conduct affects that use by or for the Government of the United States; :(4) knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period; :(5) ::(A) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer; ::(B) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or ::(C) intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage and loss. :(6) knowingly and with intent to defraud traffics (as defined in section 1029) in any password or similar information through which a computer may be accessed without authorization, if— ::(A) such trafficking affects interstate or foreign commerce; or ::(B) such computer is used by or for the Government of the United States; :(7) with intent to extort from any person any money or other thing of value, transmits in interstate or foreign commerce any communication containing any— ::(A) threat to cause damage to a protected computer; ::(B) threat to obtain information from a protected computer without authorization or in excess of authorization or to impair the confidentiality of information obtained from a protected computer without authorization or by exceeding authorized access; or ::(C) demand or request for money or other thing of value in relation to damage to a protected computer, where such damage was caused to facilitate the extortion


Specific sections

* : Computer espionage. This section takes much of its language from the
Espionage Act of 1917 The Espionage Act of 1917 is a United States federal law enacted on June 15, 1917, shortly after the United States entered World War I. It has been amended numerous times over the years. It was originally found in Title 50 of the U.S. Code ( ...
, with the notable addition being that it also covers information related to "Foreign Relations", not simply "National Defense" like the Espionage Act. * : Computer trespassing, and taking government, financial, or commerce info * : Computer trespassing in a government computer * : Committing fraud with computer * : Damaging a protected computer (including viruses, worms) * : Trafficking in passwords of a government or commerce computer * : Threatening to damage a protected computer * : Conspiracy to violate (a) * : Penalties * : Investigative, protective, and
intelligence Intelligence has been defined in many ways: the capacity for abstraction, logic, understanding, self-awareness, learning, emotional knowledge, reasoning, planning, creativity, critical thinking, and problem-solving. It can be described as t ...
activities


Notable cases and decisions referring to the Act

The Computer Fraud and Abuse Act is both a criminal law and a statute that creates a
private right of action A cause of action or right of action, in law, is a set of facts sufficient to justify suing to obtain money or property, or to justify the enforcement of a legal right against another party. The term also refers to the legal theory upon which a p ...
, allowing
compensation Compensation may refer to: *Financial compensation *Compensation (chess), various advantages a player has in exchange for a disadvantage *Compensation (essay), ''Compensation'' (essay), by Ralph Waldo Emerson *Compensation (film), ''Compensation'' ...
and injunctive or other
equitable relief Equitable remedies are judicial remedies developed by courts of equity from about the time of Henry VIII to provide more flexible responses to changing social conditions than was possible in precedent-based common law. Equitable remedies were gr ...
to anyone harmed by a violation of this law. These provisions have allowed private companies to sue disloyal employees for damages for the misappropriation of confidential information (
trade secret A trade secret is a form of intellectual property (IP) comprising confidential information that is not generally known or readily ascertainable, derives economic value from its secrecy, and is protected by reasonable efforts to maintain its conf ...
s).


Criminal cases

* '' United States v. Morris (1991)'', 928 F.2d 504 (2d Cir. 1991), decided March 7, 1991. After the release of the
Morris worm The Morris worm or Internet worm of November 2, 1988, is one of the oldest computer worms distributed via the Internet, and the first to gain significant mainstream media attention. It resulted in the first felony conviction in the US under the ...
, an early
computer worm A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will ...
, its creator was convicted under the Act for causing damage and gaining unauthorized access to "federal interest" computers. The Act was amended in 1996, in part, to clarify language whose meaning was disputed in the case. * '' United States v. Lori Drew'', 2009. The
cyberbullying Cyberbullying (cyberharassment or online bullying) is a form of bullying or harassment using electronic means. Since the 2000s, it has become increasingly common, especially among teenagers and adolescents, due to young people's increased u ...
case involving the suicide of a girl harassed on
MySpace Myspace (formerly stylized as MySpace, currently myspace; and sometimes my␣, with an elongated Whitespace character#Substitute images, open box symbol) is a social networking service based in the United States. Launched on August 1, 2003, it w ...
. Charges were under 18 USC 1030(a)(2)(c) and (b)(2)(c). Judge Wu decided that using against someone violating a terms of service agreement would make the law overly broad. 259 F.R.D. 449 *''United States v. Rodriguez'', 2010. The
Eleventh Circuit Court of Appeals The United States Court of Appeals for the Eleventh Circuit (in case citations, 11th Cir.) is a federal appellate court over the following U.S. district courts: * Middle District of Alabama * Northern District of Alabama * Southern District o ...
ruled that a
Social Security Administration The United States Social Security Administration (SSA) is an Independent agencies of the United States government, independent agency of the Federal government of the United States, U.S. federal government that administers Social Security (United ...
employee had violated the CFAA when he used an SSA database to look up information about people he knew personally. * '' United States v. Collins et al'', 2011. A group of men and women connected to the collective
Anonymous Anonymous may refer to: * Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown ** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author * Anonym ...
signed a plea deal to charges of conspiring to disrupt access to the payment website PayPal in response to the payment shutdown to
WikiLeaks WikiLeaks () is a non-profit media organisation and publisher of leaked documents. It is funded by donations and media partnerships. It has published classified documents and other media provided by anonymous sources. It was founded in 2006 by ...
over the Wau Holland Foundation which was part of a wider Anonymous campaign,
Operation Payback Operation Payback was a coordinated, decentralized group of attacks on high-profile opponents of Internet piracy by Internet activists using the "Anonymous" moniker. Operation Payback started as retaliation to distributed denial of service (DDoS) ...
. They later became known under the name PayPal 14. * '' United States v. Aaron Swartz'', 2011.
Aaron Swartz Aaron Hillel Swartz (; November 8, 1986January 11, 2013), also known as AaronSw, was an American computer programmer, entrepreneur, writer, political organizer, and Internet hacktivism, hacktivist. As a programmer, Swartz helped develop the we ...
allegedly entered an MIT wiring closet and set up a laptop to mass-download articles from
JSTOR JSTOR ( ; short for ''Journal Storage'') is a digital library of academic journals, books, and primary sources founded in 1994. Originally containing digitized back issues of academic journals, it now encompasses books and other primary source ...
. He allegedly avoided various attempts by JSTOR and MIT to stop this, such as MAC address spoofing. He was indicted for violating CFAA provisions (a)(2), (a)(4), (c)(2)(B)(iii), (a)(5)(B), and (c)(4)(A)(i)(I),(VI). The case was dismissed after Swartz committed
suicide Suicide is the act of intentionally causing one's own death. Risk factors for suicide include mental disorders, physical disorders, and substance abuse. Some suicides are impulsive acts driven by stress (such as from financial or ac ...
in January 2013. * '' United States v. Nosal'', 2011. Nosal and others allegedly accessed a
protected computer __NOTOC__ Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to th ...
to take a database of contacts from his previous employer for use in his own business, violating 1030(a)(4). This was a complex case with multiple trips to the Ninth Circuit, which ruled that violating a website's terms of use is not a violation of the CFAA. He was convicted in 2013. In 2016, the Ninth Circuit ruled that he had acted "without authorization" when he used the username and password of a current employee with their consent and affirmed his conviction. The Supreme Court declined to hear the case. * '' United States v. Peter Alfred-Adekeye'' 2011. Adekeye allegedly violated (a)(2), when he allegedly downloaded
CISCO IOS The Internetworking Operating System (IOS) is a family of proprietary network operating systems used on several router and network switch models manufactured by Cisco Systems Cisco Systems, Inc. (using the trademark Cisco) is an American ...
, allegedly something that the CISCO employee who gave him an access password did not permit. Adekeye was CEO of
Multiven Multiven Group BV is a Netherlands-based provider of independent and decentralised software integrity maintenance and cyber-defence services for multivendor Internet Protocol network hardware and blockchain nodes. Its customers include large ente ...
and had accused CISCO of
anti-competitive Anti-competitive practices are business or government practices that prevent or reduce competition in a market. Antitrust laws ensure businesses do not engage in competitive practices that harm other, usually smaller, businesses or consumers. ...
practices. * ''United States v
Sergey Aleynikov Sergey Aleynikov (born 1970) is a former Goldman Sachs computer programmer. Between 2009 and 2016, he was prosecuted by NY Federal and State jurisdictions for the same conduct of allegedly copying proprietary computer source code from his employe ...
'', 2011. Aleynikov was a programmer at
Goldman Sachs The Goldman Sachs Group, Inc. ( ) is an American multinational investment bank and financial services company. Founded in 1869, Goldman Sachs is headquartered in Lower Manhattan in New York City, with regional headquarters in many internationa ...
accused of copying code, like
high-frequency trading High-frequency trading (HFT) is a type of algorithmic trading in finance characterized by high speeds, high turnover rates, and high order-to-trade ratios that leverages high-frequency financial data and electronic trading tools.Lin, Tom C. W. " ...
code, allegedly in violation of 1030(a)(2)(c) and 1030(c)(2)(B)i–iii and 2. This charge was later dropped, and he was instead charged with theft of
trade secret A trade secret is a form of intellectual property (IP) comprising confidential information that is not generally known or readily ascertainable, derives economic value from its secrecy, and is protected by reasonable efforts to maintain its conf ...
s and transporting stolen property. * '' United States v Nada Nadim Prouty'', . Prouty was an FBI and CIA agent who was prosecuted for having a fraudulent marriage to get US residency. She claims she was persecuted by a U.S. attorney who was trying to gain media coverage by calling her a terrorist agent and get himself promoted to a federal judgeship.Sibel Edmond's Boiling Frogs podcast 61
Thursday, 13. October 2011. Interview with Prouty by Peter B. Collins and Sibel Edmonds
* '' United States v. Neil Scott Kramer'', 2011. Kramer was a court case where a cellphone was used to coerce a minor into engaging sex with an adult. Central to the case was whether a cellphone constituted a computer device. Ultimately, the United States Court of Appeals for the Eighth Circuit found that a cell phone can be considered a computer if "the phone perform arithmetic, logical, and storage functions", paving the way for harsher consequences for criminals engaging with minors over cellphones. * '' United States v. Kane'', 2011. Exploiting a
software bug A software bug is a design defect ( bug) in computer software. A computer program with many or serious bugs may be described as ''buggy''. The effects of a software bug range from minor (such as a misspelled word in the user interface) to sev ...
in a poker machine does not constitute hacking because the poker machine in question failed to constitute a "
protected computer __NOTOC__ Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to th ...
" under the statute (as the poker machine in question did not demonstrate a tangential relationship to
interstate commerce The Commerce Clause describes an enumerated power listed in the United States Constitution ( Article I, Section 8, Clause 3). The clause states that the United States Congress shall have power "to regulate Commerce with foreign Nations, and amon ...
) and because the sequence of button presses that triggered the bug were considered held to have "not exceed dtheir authorized access." the defendant still faces a regular
wire fraud Mail fraud and wire fraud are terms used in the United States to describe the use of a physical (e.g., the U.S. Postal Service) or electronic (e.g., a phone, a telegram, a fax, or the Internet) mail system to defraud another, and are U.S. fede ...
charge. *'' United States v. Valle'', 2015. The
Second Circuit Court of Appeals The United States Court of Appeals for the Second Circuit (in case citations, 2d Cir.) is one of the thirteen United States Courts of Appeals. Its territory covers the states of Connecticut, New York, and Vermont, and it has appellate jurisdic ...
overturned a conviction against a police officer who had used a police database to look up information about women he knew personally. *'' Van Buren v. United States'', 2020. A police officer in Georgia was caught in an FBI sting operation using his authorized access to a license plate database to check the identity of a person for cash payment, an "improper purpose". The officer was convicted and sentenced to 18 months under CFAA §1030(a)(2). Though he appealed his conviction on the basis that the "improper purpose" was not "exceeding authorized access", the Eleventh Circuit upheld the conviction based on precedent. The Supreme Court ruled in June 2021 that under CFAA, that a person "exceeds authorized access" of a computer system they otherwise have access to when they access files and other content that are off-limits to the portions of the computer system they were authorized to access. Their opinion restricted CFAA from applying to cases where a person obtains information from areas they do have authorized access to, but uses that information for improper reasons.


Civil cases

* ''Theofel v. Farey Jones'', 2003 U.S. App. Lexis 17963, decided August 28, 2003 (U.S. Court of Appeals for the Ninth Circuit), holding that the use of a civil subpoena which is "patently unlawful," "in bad faith," or "at least gross negligence" to gain access to stored email is a breach of both the CFAA and the
Stored Communications Act The Stored Communications Act (SCA, codified at 18 U.S.C. Chapter 121 §§ 2701–2713) is a law that addresses voluntary and compelled disclosure of "stored wire and electronic communications and transactional records" held by third-part ...
. * ''
International Airport Centers, L.L.C. v. Citrin In ''International Airport Centers, L.L.C. v. Citrin'', the Seventh Circuit Court of Appeals evaluated the dismissal of the plaintiffs' lawsuit for failure to state a claim based upon the interpretation of the word "transmission" in the Computer ...
'', 2006, , in which the
Seventh Circuit Court of Appeals The United States Court of Appeals for the Seventh Circuit (in case citations, 7th Cir.) is the U.S. federal court with appellate jurisdiction over the courts in the following districts: * Central District of Illinois * Northern District of Ill ...
ruled that Jacob Citrin had violated the CFAA when he deleted files from his company computer before he quit, in order to conceal alleged bad behavior while he was an employee. * '' LVRC Holdings v. Brekka'', 2009 1030(a)(2), 1030(a)(4), in which LVRC sued Brekka for allegedly taking information about clients and using it to start his own competing business. The Ninth Circuit ruled that an employee accesses a company computer to gather information for his own purposes does not violate the CFAA merely because that personal use was adverse to the interests of the employer. * '' Craigslist v. 3Taps'', 2012. 3Taps was accused by
Craigslist Craigslist (stylized as craigslist) is a privately held American company operating a classified advertisements website with sections devoted to jobs, housing, for sale, items wanted, services, community service, gigs, résumés, and discussi ...
of breaching CFAA by circumventing an IP block in order to access Craigslist's website and scrape its classified ads without consent. In August 2013, US federal judge found 3Taps's actions violated CFAA and that it faces civil damages for "unauthorized access". Judge Breyer wrote in his decision that "the average person does not use "
anonymous proxies An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It acc ...
" to bypass an IP block set up to enforce a banning communicated via personally-addressed
cease-and-desist letter A cease and desist letter is a document sent by one party, often a business, to warn another party that they believe the other party is committing an unlawful act, such as copyright infringement, and that they will take legal action if the other ...
". He also noted "Congress apparently knew how to restrict the reach of the CFAA to only certain kinds of information, and it appreciated the public v. nonpublic distinction—but he relevant sectioncontains no such restrictions or modifiers." * ''
Lee v. PMSI, Inc. ''Lee v. PMSI, Inc.'', No. 10-2094 (M.D. Florida January 13, 2011), was a case in the United States District Court for the Middle District of Florida about whether the Computer Fraud and Abuse Act (CFAA) makes it illegal for an employee to viol ...
'', 2011. PMSI, Inc. sued former employee Lee for violating the CFAA by browsing Facebook and checking personal email in violation of the company's
acceptable use policy An acceptable use policy (AUP)—also referred to as an acceptable usage policy or, in certain commercial contexts, a fair use policy (FUP)—is a formal set of guidelines established by the administrator, proprietor, or operator of a computer ...
. The court found that breaching an employer's acceptable use policy was not "unauthorized access" under the act and, therefore, did not violate the CFAA. * ''
Sony Computer Entertainment America v. George Hotz ''SCEA v. Hotz'' was a lawsuit in the United States by Sony Computer Entertainment of America against George Hotz and associates of the group fail0verflow. It was in regards to jailbreaking and reverse engineering the PlayStation 3. Timeline ...
'' and ''Hotz v. SCEA'', 2011. SCEA sued "Geohot" and others for jailbreaking the PlayStation 3 system. The lawsuit alleged, among other things, that Hotz violated ( ytaking info from any
protected computer __NOTOC__ Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to th ...
). Hotz denied liability and contested the Court's exercise of personal jurisdiction over him. The parties settled out of court. The settlement caused Geohot to be unable to legally
hack Hack may refer to: Arts, entertainment, and media Games * Hack (Unix video game), ''Hack'' (Unix video game), a 1984 roguelike video game * .hack (video game series), ''.hack'' (video game series), a series of video games by the multimedia fran ...
the
PlayStation 3 The PlayStation 3 (PS3) is a home video game console developed and marketed by Sony Computer Entertainment (SCE). It is the successor to the PlayStation 2, and both are part of the PlayStation brand of consoles. The PS3 was first released on ...
system furthermore. * '' Pulte Homes, Inc. v. Laborers' International Union'' 2011.
Pulte Homes PulteGroup, Inc. is an American residential home-construction company based in Atlanta, Georgia, United States. As of 2023, the company is the third-largest home-construction company in the United States based on the number of homes closed. In t ...
brought a CFAA suit against the
Laborers' International Union of North America The Laborers' International Union of North America (LIUNA, stylized as LiUNA!), often shortened to just the Laborers' Union, is an American and Canadian labor union formed in 1903. As of 2017, they had about 500,000 members, about 80,000 of whom ...
(LIUNA). After Pulte fired an employee represented by the union, LIUNA urged members to
call Call or Calls may refer to: Arts, entertainment, and media Games * Call (poker), a bet matching an opponent's * Call, in the game of contract bridge, a bid, pass, double, or redouble in the bidding stage Music and dance * Call (band), from L ...
and send
email Electronic mail (usually shortened to email; alternatively hyphenated e-mail) is a method of transmitting and receiving Digital media, digital messages using electronics, electronic devices over a computer network. It was conceived in the ...
to the company, expressing their opinions. As a result of the increased traffic, the company's
email system Electronic mail (usually shortened to email; alternatively hyphenated e-mail) is a method of transmitting and receiving digital messages using electronic devices over a computer network. It was conceived in the late–20th century as the ...
crashed. The
Sixth Circuit The United States Court of Appeals for the Sixth Circuit (in case citations, 6th Cir.) is a federal court with appellate jurisdiction over the district courts in the following districts: * Eastern District of Kentucky * Western District of K ...
ruled that the LIUNA's instruction to call and email "intentionally caused damage," reversing the lower court's decision. *''Facebook v. Power Ventures and Vachani'', 2016. The Ninth Circuit Court of Appeals ruled that the CFAA was violated when Facebook's servers were accessed despite an IP block and
cease and desist A cease and desist letter is a document sent by one party, often a business, to warn another party that they believe the other party is committing an unlawful act, such as copyright infringement, and that they will take legal action if the oth ...
order. * HiQ Labs v. LinkedIn, 2019. The Ninth Circuit Court of Appeals ruled that
scraping Scrape, scraper or scraping may refer to: Biology and medicine * Abrasion (medical), a type of injury * Scraper (biology), grazer-scraper, a water animal that feeds on stones and other substrates by grazing algae, microorganism and other matter ...
a public website without the approval of the website's owner is not a violation of the CFAA. LinkedIn petitioned for the Supreme Court to review the decision and the court remanded the case based on its Van Buren v. United States decision. The Ninth Circuit ultimately affirmed its original decision. *''Sandvig v. Barr'', 2020. The Federal District Court of D.C. ruled that the CFAA does not criminalize the violation of a website's terms of service.


Criticism

There have been criminal convictions for CFAA violations in the context of civil law, for
breach of contract Breach of contract is a legal cause of action and a type of civil wrong, in which a binding agreement or bargained-for exchange is not honored by one or more of the parties to the contract by non-performance or interference with the other part ...
or terms of service violations. Many common and insignificant online acts, such as password-sharing and copyright infringement, can transform a CFAA
misdemeanor A misdemeanor (American English, spelled misdemeanour elsewhere) is any "lesser" criminal act in some common law legal systems. Misdemeanors are generally punished less severely than more serious felonies, but theoretically more so than admi ...
into a
felony A felony is traditionally considered a crime of high seriousness, whereas a misdemeanor is regarded as less serious. The term "felony" originated from English common law (from the French medieval word "''félonie''") to describe an offense that r ...
. The punishments are severe, similar to sentences for selling or importing drugs, and may be
disproportionate In chemistry, disproportionation, sometimes called dismutation, is a redox reaction in which one compound of intermediate oxidation state converts to two compounds, one of higher and one of lower oxidation state. The reverse of disproportionatio ...
. Prosecutors have used the CFAA to protect private business interests and to intimidate free-culture activists, deterring undesirable, yet legal, conduct. One such example regarding the harshness of the law was shown in United States vs. Tyler King, where King refused initial offers by the government for involvement in a conspiracy to "gain unauthorized access" to a computer system for a small company that an ex-girlfriend of King worked for. His role, even while not directly involved, resulted in 6.5 years imprisonment. No financial motive was established. A non-profit was started to advocate against further harshness against others targeted under the broad law.
Tim Wu Timothy Shiou-Ming Wu (born 1971 or 1972) is a Taiwanese-American legal scholar who served as Special Assistant to the President for Technology and Competition Policy at the United States from 2021 to 2023. He is also a professor of law at Colum ...
called the CFAA "the worst law in technology". Professor of Law Ric Simmons notes that many provisions of the CFAA merely combine identical language to pre-existing federal laws with "the element of “access nga protected computer without authorization, or yexceed ngauthorized access," meaning that "the CFAA merely provides an additional charge for prosecutors to bring if the defendant used a computer while committing the crime." Professor Joseph Olivenbaum has similarly criticized the CFAA's "computer-specific approach," noting both the risk of redundancy and resultant definitional problems. The CFAA increasingly presents real obstacles to journalists reporting stories important to the public’s interest. As data journalism increasingly becomes “a good way of getting to the truth of things . . . in this post-truth era,” as one data journalist told Google, the need for further clarity around the CFAA increases. As per Star Kashman, an expert in cybersecurity law, the CFAA presents some challenges in cases related to Search Engine Hacking (also known as Google Dorking). Although Kashman states that accessing publicly available information is legal under the CFAA, she also notes that in many cases Search Engine Hacking is ultimately prosecuted under the CFAA. Kashman believes prosecuting cases of Google Dorking under the CFAA could render the CFAA void for vagueness by making it illegal to access publicly available information.


Aaron Swartz

In the wake of the prosecution and subsequent suicide of
Aaron Swartz Aaron Hillel Swartz (; November 8, 1986January 11, 2013), also known as AaronSw, was an American computer programmer, entrepreneur, writer, political organizer, and Internet hacktivism, hacktivist. As a programmer, Swartz helped develop the we ...
(who used a script to download scholarly research articles in excess of what
JSTOR JSTOR ( ; short for ''Journal Storage'') is a digital library of academic journals, books, and primary sources founded in 1994. Originally containing digitized back issues of academic journals, it now encompasses books and other primary source ...
terms of service allowed), lawmakers proposed amending the Computer Fraud and Abuse Act. Representative
Zoe Lofgren Susan Ellen "Zoe" Lofgren ( ; born December 21, 1947) is an American politician and lawyer serving as a United States House of Representatives, U.S. representative from California. A member of the Democratic Party (United States), Democratic Part ...
drafted a bill that would help "prevent what happened to Aaron from happening to other Internet users". Aaron's Law (, ) would exclude terms of service violations from the 1984 Computer Fraud and Abuse Act and from the wire fraud statute. In addition to Lofgren's efforts, Representatives
Darrell Issa Darrell Edward Issa ( ; born November 1, 1953) is an American businessman and politician serving as the U.S. representative for California's 48th congressional district. He represented the 50th congressional district from 2021 to 2023. A memb ...
and
Jared Polis Jared Schutz Polis ( ; ; born May 12, 1975) is an American politician and businessman serving as the 43rd governor of Colorado since 2019. He served one term on the Colorado State Board of Education from 2001 to 2007, and five terms as the Unite ...
(also on the
House Judiciary Committee The U.S. House Committee on the Judiciary, also called the House Judiciary Committee, is a standing committee of the United States House of Representatives. It is charged with overseeing the administration of justice within the federal courts, f ...
) raised questions in the immediate aftermath of Swartz's death regarding the government's handling of the case. Polis called the charges "ridiculous and trumped up," referring to Swartz as a "martyr." Issa, chair of the
House Oversight Committee The Committee on Oversight and Government Reform is the main investigative United States congressional committee, committee of the United States House of Representatives. The committee's broad jurisdiction and legislative authority make it one o ...
, announced an investigation of the Justice Department's prosecution. By May 2014, Aaron's Law had stalled in committee. Filmmaker Brian Knappenberger alleges this occurred due to
Oracle Corporation Oracle Corporation is an American Multinational corporation, multinational computer technology company headquartered in Austin, Texas. Co-founded in 1977 in Santa Clara, California, by Larry Ellison, who remains executive chairman, Oracle was ...
's financial interest in maintaining the status quo. Aaron's Law was reintroduced in May 2015 (, ) and again stalled. There has been no further introduction of related bills.


Amendments history


2008

* Eliminated the requirement that information must have been stolen through an interstate or foreign communication, thereby expanding jurisdiction for cases involving theft of information from computers; * Eliminated the requirement that the defendant's action must result in a loss exceeding $5,000 and created a felony offense where the damage affects ten or more computers, closing a gap in the law; * Expanded to criminalize not only explicit threats to cause damage to a computer, but also threats to (1) steal data on a victim's computer, (2) publicly disclose stolen data, or (3) not repair damage the offender already caused to the computer; * Created a criminal offense for conspiring to commit a computer hacking offense under section 1030; * Broadened the definition of "protected computer" in to the full extent of Congress's commerce power by including those computers used in or affecting interstate or foreign commerce or communication; and * Provided a mechanism for civil and criminal forfeiture of property used in or derived from section 1030 violations.


See also

*
Cybercrime Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or Computer network, networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cyberc ...
* Defense Secrets Act of 1911 /
Espionage Act of 1917 The Espionage Act of 1917 is a United States federal law enacted on June 15, 1917, shortly after the United States entered World War I. It has been amended numerous times over the years. It was originally found in Title 50 of the U.S. Code ( ...
/
McCarran Internal Security Act The Internal Security Act of 1950, (Public Law 81-831), also known as the Subversive Activities Control Act of 1950, the McCarran Act after its principal sponsor Sen. Pat McCarran (D-Nevada), or the Concentration Camp Law, is a United States f ...
1950 * California Comprehensive Computer Data Access and Fraud Act *
Electronic Communications Privacy Act The Electronic Communications Privacy Act of 1986 (ECPA) was enacted by the United States Congress to extend restrictions on government wire taps of telephone calls to include transmissions of electronic data by computer ( ''et seq.''), added n ...
* '' LVRC Holdings LLC v. Brekka'' * ''
In re DoubleClick ''In re DoubleClick Inc. Privacy Litigation'', 154 F. Supp. 2d 497 (S.D.N.Y. 2001)''In re DoubleClick Inc. Privacy Litigation'', 154 F. Supp. 2d 497 (S.D.N.Y. 2001). (''"DoubleClick"''), had Internet users initiate proceedings against DoubleClic ...
'' * ''
Massachusetts Bay Transportation Authority v. Anderson ''Massachusetts Bay Transportation Authority v. Anderson, et al.'', Civil Action No. 08-11364, was a challenge brought by the Massachusetts Bay Transportation Authority (MBTA) to prevent three Massachusetts Institute of Technology (MIT) student ...
'' *
Information technology audit An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure and business applications. The evaluation of evidence obtained determines if the inform ...
*
Information technology security audit An information security audit is an audit of the level of information security in an organization. It is an independent review and examination of system records, activities, and related documents. These audits are intended to improve the level of i ...
*
Computer fraud Computer fraud is the use of computers, the Internet, Internet devices, and Internet services to defraud people or organizations of resources. In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act (CFAA ...
* ''
The Hacker Crackdown ''The Hacker Crackdown: Law and Disorder on the Electronic Frontier'' is a work of nonfiction by Bruce Sterling first published in 1992. The book discusses watershed events in the hacker subculture in the early 1990s. The most notable topic cover ...
'' (mentions the law, & the eponymous Chicago task force) *
Protected computer __NOTOC__ Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to th ...
*
Telecommunications Policy Telecommunication, often used in its plural form or abbreviated as telecom, is the transmission of information over a distance using electronic means, typically through cables, radio waves, or other communication technologies. These means of ...
*
WikiLeaks WikiLeaks () is a non-profit media organisation and publisher of leaked documents. It is funded by donations and media partnerships. It has published classified documents and other media provided by anonymous sources. It was founded in 2006 by ...
*
Weev Andrew Alan Escher Auernheimer ( ; born ), best known by his pseudonym weev, is an American computer hacker and professional Internet troll. Affiliated with the alt-right, he has been described as a neo-Nazi, white supremacist, and antisemiti ...


References


External links

* , text of the law
Computer Fraud and Abuse Act of 1986
as enacted
details
in the US Statutes at Large
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
by Charles Doyle, CRS, 12 27 2010, (FAS.org) {{Patriot Act 1986 in American law 98th United States Congress Computing legislation Hacking (computer security) Information technology audit United States federal commerce legislation Fraud legislation Fraud in the United States United States federal computing legislation United States federal legislation articles needing infoboxes Title 18 of the United States Code