The Computer Fraud and Abuse Act of 1986 (CFAA) is a
United States
The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., federal district, five ma ...
cybersecurity
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, th ...
bill that was enacted in 1986 as an amendment to existing
computer fraud law (), which had been included in the
Comprehensive Crime Control Act of 1984. The law prohibits accessing a computer without
authorization
Authorization or authorisation (see spelling differences) is the function of specifying access rights/privileges to resources, which is related to general information security and computer security, and to access control in particular. More f ...
, or in excess of authorization.
Prior to computer-specific criminal laws, computer crimes were prosecuted as
mail and wire fraud
Mail fraud and wire fraud are terms used in the United States to describe the use of a physical or electronic mail system to defraud another, and are federal crimes there. Jurisdiction is claimed by the federal government if the illegal activit ...
, but the applying law was often insufficient.
The original 1984 bill was enacted in response to concern that computer-related crimes might go unpunished. The House Committee Report to the original computer crime bill characterized the 1983 techno-thriller film ''
WarGames''—in which a young teenager (played by
Matthew Broderick) from
Seattle
Seattle ( ) is a port, seaport city on the West Coast of the United States. It is the county seat, seat of King County, Washington, King County, Washington (state), Washington. With a 2020 population of 737,015, it is the largest city in bo ...
breaks into a U.S. military
supercomputer programmed to predict possible outcomes of
nuclear war
Nuclear warfare, also known as atomic warfare, is a theoretical military conflict or prepared political strategy that deploys nuclear weaponry. Nuclear weapons are weapons of mass destruction; in contrast to conventional warfare, nuclear wa ...
and unwittingly almost starts
World War III
World War III or the Third World War, often abbreviated as WWIII or WW3, are names given to a hypothetical worldwide large-scale military conflict subsequent to World War I and World War II. The term has been in use since at ...
—as "a realistic representation of the automatic dialing and access capabilities of the
personal computer
A personal computer (PC) is a multi-purpose microcomputer whose size, capabilities, and price make it feasible for individual use. Personal computers are intended to be operated directly by an end user, rather than by a computer expert or tech ...
."
The CFAA was written to extend existing
tort law
A tort is a civil wrong that causes a claimant to suffer loss or harm, resulting in legal liability for the person who commits the tortious act. Tort law can be contrasted with criminal law, which deals with criminal wrongs that are punishabl ...
to
intangible property
Intangible property, also known as incorporeal property, is something that a person or corporation can have ownership of and can transfer ownership to another person or corporation, but has no physical substance, for example brand identity or kn ...
, while, in theory, limiting
federal jurisdiction
Federal jurisdiction is the jurisdiction of the federal government in any country that uses federalism. Such a country is known as a Federation.
Federal jurisdiction by country
All federations, by definition, must have some form of federal juri ...
to cases "with a compelling federal interest—i.e., where computers of the
federal government
A federation (also known as a federal state) is a political entity characterized by a union of partially self-governing provinces, states, or other regions under a central federal government (federalism). In a federation, the self-govern ...
or certain
financial institution
Financial institutions, sometimes called banking institutions, are business entities that provide services as intermediaries for different types of financial monetary transactions. Broadly speaking, there are three major types of financial inst ...
s are involved or where the crime itself is interstate in nature.", but its broad definitions have spilled over into
contract law
A contract is a legally enforceable agreement between two or more parties that creates, defines, and governs mutual rights and obligations between them. A contract typically involves the transfer of goods, services, money, or a promise to ...
. (see "Protected Computer", below). In addition to amending a number of the provisions in the original ''section 1030'', the CFAA also criminalized additional computer-related acts. Provisions addressed the distribution of
malicious code
Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depr ...
and
denial-of-service attack
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host conn ...
s. Congress also included in the CFAA a provision criminalizing trafficking in
passwords
A password, sometimes called a passcode (for example in Apple Inc., Apple devices), is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the lar ...
and similar items.
Since then, the Act has been amended a number of times—in 1989, 1994, 1996, in 2001 by the
USA PATRIOT Act
The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of the United States Congress, signed into law by President George W. Bush. The formal name of the statute is the Uniting and Strengthening America by Providing Appro ...
, 2002, and in 2008 by the Identity Theft Enforcement and Restitution Act. With each amendment of the law, the types of conduct that fell within its reach were extended.
In January 2015, then-President
Barack Obama
Barack Hussein Obama II ( ; born August 4, 1961) is an American politician who served as the 44th president of the United States from 2009 to 2017. A member of the Democratic Party (United States), Democratic Party, Obama was the first Af ...
proposed expanding the CFAA and the
RICO Act in his ''Modernizing Law Enforcement Authorities to Combat Cyber Crime'' proposal.
DEF CON
DEF CON (also written as DEFCON, Defcon or DC) is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyer ...
organizer and
Cloudflare
Cloudflare, Inc. is an American content delivery network and DDoS mitigation company, founded in 2009. It primarily acts as a reverse proxy between a website's visitor and the Cloudflare customer's hosting provider. Its headquarters are in San ...
researcher Marc Rogers, Senator
Ron Wyden
Ronald Lee Wyden (; born May 3, 1949) is an American politician and retired educator serving as the senior United States senator from Oregon, a seat he has held since 1996. A member of the Democratic Party, he served in the United States House ...
, and Representative
Zoe Lofgren
Susan Ellen "Zoe" Lofgren ( ; born December 21, 1947) is an American lawyer and politician serving as a U.S. representative from California. A member of the Democratic Party, Lofgren is in her 13th term in Congress, having been first elected in 1 ...
have stated opposition to this on the grounds it will make many regular Internet activities illegal, and moves further away from what they were trying to accomplish with
Aaron's Law
The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law (), which had been included in the Comprehensive Crime Control Act of 1984. The law pro ...
.
Protected computers
The only computers, in theory, covered by the CFAA are defined as "
protected computers". They are defined under section to mean a computer:
* exclusively for the use of a
financial institution
Financial institutions, sometimes called banking institutions, are business entities that provide services as intermediaries for different types of financial monetary transactions. Broadly speaking, there are three major types of financial inst ...
or the United States Government, or any computer, when the conduct constituting the offense affects the computer's use by or for the financial institution or the government; or
* which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States ...
In practice, any ordinary computer has come under the jurisdiction of the law, including cellphones, due to the interstate nature of most Internet communication.
Criminal offenses under the Act
(a) Whoever—
:(1) having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such conduct having obtained information that has been determined by the United States Government pursuant to an Executive order or statute to require protection against unauthorized disclosure for reasons of national defense or foreign relations, or any restricted data, as defined in paragraph y. of section 11 of the Atomic Energy Act of 1954, with reason to believe that such information so obtained could be used to the injury of the United States, or to the advantage of any foreign nation willfully communicates, delivers, transmits, or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it;
:(2) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains—
::(A) information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602 (n)
of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.);
::(B) information from any department or agency of the United States; or
::(C) information from any protected computer;
:(3) intentionally, without authorization to access any nonpublic computer of a department or agency of the United States, accesses such a computer of that department or agency that is exclusively for the use of the Government of the United States or, in the case of a computer not exclusively for such use, is used by or for the Government of the United States and such conduct affects that use by or for the Government of the United States;
:(4) knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period;
:(5)
::(A) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer;
::(B) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or
::(C) intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage and loss.
:(6) knowingly and with intent to defraud traffics (as defined in section 1029) in any password or similar information through which a computer may be accessed without authorization, if—
::(A) such trafficking affects interstate or foreign commerce; or
::(B) such computer is used by or for the Government of the United States;
:(7) with intent to extort from any person any money or other thing of value, transmits in interstate or foreign commerce any communication containing any—
::(A) threat to cause damage to a protected computer;
::(B) threat to obtain information from a protected computer without authorization or in excess of authorization or to impair the confidentiality of information obtained from a protected computer without authorization or by exceeding authorized access; or
::(C) demand or request for money or other thing of value in relation to damage to a protected computer, where such damage was caused to facilitate the extortion
Specific sections
* : Computer espionage. This section takes much of its language from the
Espionage Act of 1917
The Espionage Act of 1917 is a United States federal law enacted on June 15, 1917, shortly after the United States entered World War I. It has been amended numerous times over the years. It was originally found in Title 50 of the U.S. Code (War ...
, with the notable addition being that it also covers information related to "Foreign Relations", not simply "National Defense" like the Espionage Act.
* : Computer trespassing, and taking government, financial, or commerce info
* : Computer trespassing in a government computer
* : Committing fraud with computer
* : Damaging a protected computer (including viruses, worms)
* : Trafficking in passwords of a government or commerce computer
* : Threatening to damage a protected computer
* : Conspiracy to violate (a)
* : Penalties
Notable cases and decisions referring to the Act
The Computer Fraud and Abuse Act is both a criminal law and a statute that creates a
private right of action, allowing
compensation and
injunctive or other
equitable relief to anyone harmed by a violation of this law. These provisions have allowed private companies to sue disloyal employees for damages for the misappropriation of confidential information (
trade secret
Trade secrets are a type of intellectual property that includes formulas, practices, processes, designs, instruments, patterns, or compilations of information that have inherent economic value because they are not generally known or readily a ...
s).
Criminal cases
* ''
United States v. Morris (1991)'', 928 F.2d 504 (2d Cir. 1991), decided March 7, 1991. After the release of the
Morris worm, an early
computer worm
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It wi ...
, its creator was convicted under the Act for causing damage and gaining unauthorized access to "federal interest" computers. The Act was amended in 1996, in part, to clarify language whose meaning was disputed in the case.
* ''
United States v. Lori Drew'', 2009. The
cyberbullying
Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyberharassment are also known as online bullying. It has become increasingly common, especially among teenagers, as the digital ...
case involving the suicide of a girl harassed on
MySpace. Charges were under 18 USC 1030(a)(2)(c) and (b)(2)(c). Judge Wu decided that using against someone violating a
terms of service agreement would make the law overly broad. 259 F.R.D. 449
*''United States v. Rodriguez'', 2010. The
Eleventh Circuit Court of Appeals ruled that a
Social Security Administration
The United States Social Security Administration (SSA) is an independent agency of the U.S. federal government that administers Social Security, a social insurance program consisting of retirement, disability and survivor benefits. To qualify fo ...
employee had violated the CFAA when he used an SSA database to look up information about people he knew personally.
* ''
United States v. Collins et al'', 2011. A group of men and women connected to the collective
Anonymous
Anonymous may refer to:
* Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown
** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author
* Anonym ...
signed a plea deal to charges of conspiring to disrupt access to the payment website PayPal in response to the payment shutdown to
WikiLeaks
WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...
over the
Wau Holland Foundation which was part of a wider Anonymous campaign,
Operation Payback
Operation or Operations may refer to:
Arts, entertainment and media
* ''Operation'' (game), a battery-operated board game that challenges dexterity
* Operation (music), a term used in musical set theory
* ''Operations'' (magazine), Multi-Man ...
. They later became known under the name PayPal 14.
* ''
United States v. Aaron Swartz
In ''United States of America v. Aaron Swartz'', Aaron Swartz, an American computer programmer, writer, political organizer and Internet activist, was prosecuted for multiple violations of the Computer Fraud and Abuse Act of 1986 (CFAA), after ...
'', 2011.
Aaron Swartz
Aaron Hillel Swartz (November 8, 1986 – January 11, 2013) was an American computer programmer, entrepreneur, writer, political organizer, and Internet hacktivist. A prolific programmer, Swartz helped develop the web feed format RSS, the tech ...
allegedly entered an MIT wiring closet and set up a laptop to mass-download articles from
JSTOR
JSTOR (; short for ''Journal Storage'') is a digital library founded in 1995 in New York City. Originally containing digitized back issues of academic journals, it now encompasses books and other primary sources as well as current issues of j ...
. He allegedly avoided various attempts by JSTOR and MIT to stop this, such as
MAC address spoofing
MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. The MAC address that is hard-coded on a network interface controller (NIC) cannot be changed. However ...
. He was indicted for violating CFAA provisions (a)(2), (a)(4), (c)(2)(B)(iii), (a)(5)(B), and (c)(4)(A)(i)(I),(VI). The case was dismissed after Swartz committed
suicide
Suicide is the act of intentionally causing one's own death. Mental disorders (including depression, bipolar disorder, schizophrenia, personality disorders, anxiety disorders), physical disorders (such as chronic fatigue syndrome), and ...
in January 2013.
* ''
United States v. Nosal
''United States v. Nosal'', 676 F.3d 854 (9th Cir. 2012) was a United States Court of Appeals for the Ninth Circuit decision dealing with the scope of criminal prosecutions of former employees under the Computer Fraud and Abuse Act (CFAA). The ...
'', 2011. Nosal and others allegedly accessed a
protected computer to take a database of contacts from his previous employer for use in his own business, violating 1030(a)(4). This was a complex case with multiple trips to the Ninth Circuit, which ruled that violating a website's terms of use isn't a violation of the CFAA. He was convicted in 2013. In 2016, the Ninth Circuit ruled that he had acted "without authorization" when he used the username and password of a current employee with their consent and affirmed his conviction. The Supreme Court declined to hear the case.
* ''
United States v. Peter Alfred-Adekeye'' 2011. Adekeye allegedly violated (a)(2), when he allegedly downloaded
CISCO IOS
The Internetworking Operating System (IOS) is a family of proprietary network operating systems used on several router and network switch models manufactured by Cisco Systems. The system is a package of routing, switching, internetworking, an ...
, allegedly something that the CISCO employee who gave him an access password did not permit. Adekeye was CEO of
Multiven and had accused CISCO of
anti-competitive practices.
* ''United States v
Sergey Aleynikov'', 2011. Aleynikov was a programmer at
Goldman Sachs accused of copying code, like
high-frequency trading code, allegedly in violation of 1030(a)(2)(c) and 1030(c)(2)(B)i–iii and 2. This charge was later dropped, and he was instead charged with theft of
trade secret
Trade secrets are a type of intellectual property that includes formulas, practices, processes, designs, instruments, patterns, or compilations of information that have inherent economic value because they are not generally known or readily a ...
s and transporting stolen property.
* ''
United States v Nada Nadim Prouty'', . Prouty was an FBI and CIA agent who was prosecuted for having a fraudulent marriage to get US residency. She claims she was persecuted by a U.S. attorney who was trying to gain media coverage by calling her a terrorist agent and get himself promoted to a federal judgeship.
[Sibel Edmond's Boiling Frogs podcast 61]
Thursday, 13. October 2011. Interview with Prouty by Peter B. Collins and Sibel Edmonds
* ''
United States v. Neil Scott Kramer'', 2011. Kramer was a court case where a cellphone was used to coerce a minor into engaging sex with an adult. Central to the case was whether a cellphone constituted a computer device. Ultimately, the United States Court of Appeals for the Eighth Circuit found that a cell phone can be considered a computer if "the phone perform
arithmetic, logical, and storage functions", paving the way for harsher consequences for criminals engaging with minors over cellphones.
* ''
United States v. Kane
''United States v. Kane'', No 11-mj-00001 (D. Nev. filed Jan. 19, 2011), is a court case where a software bug in a video poker machine was exploited to win several hundred thousand dollars. Central to the case was whether a video poker machine c ...
'', 2011. Exploiting a
software bug in a
poker machine does not constitute hacking because the
poker machine in question failed to constitute a "
protected computer" under the statute (as the
poker machine in question did not demonstrate a tangential relationship to
interstate commerce) and because the sequence of button presses that triggered the bug were considered held to have "not exceed
dtheir authorized access." the defendant still faces a regular
wire fraud
Mail fraud and wire fraud are terms used in the United States to describe the use of a physical or electronic mail system to defraud another, and are federal crimes there. Jurisdiction is claimed by the federal government if the illegal activit ...
charge.
*''
United States v. Valle
''United States v. Valle'' was a criminal case in the Southern District of New York concerning Gilberto Valle, a New York City Police Department officer who had discussed on online fetish chatrooms his fantasies about kidnapping, torturing, rap ...
'', 2015. The
Second Circuit Court of Appeals overturned a conviction against a police officer who had used a police database to look up information about women he knew personally.
*''
Van Buren v. United States
''Van Buren v. United States'', 593 U.S. ___ (2021), was a United States Supreme Court case dealing with the Computer Fraud and Abuse Act (CFAA) and its definition of "exceeds authorized access" in relation to one intentionally accessing a compu ...
'', 2020. A police officer in Georgia was caught in an FBI sting operation using his authorized access to a license plate database to check the identity of a person for cash payment, an "improper purpose". The officer was convicted and sentenced to 18 months under CFAA §1030(a)(2). Though he appealed his conviction on the basis that the "improper purpose" was not "exceeding authorized access", the Eleventh Circuit upheld the conviction based on precedent. The Supreme Court ruled in June 2021 that under CFAA, that a person "exceeds authorized access" of a computer system they otherwise have access to when they access files and other content that are off-limits to the portions of the computer system they were authorized to access. Their opinion restricted CFAA from applying to cases where a person obtains information from areas they do have authorized access to, but uses that information for improper reasons.
Civil cases
* ''Theofel v. Farey Jones'', 2003 U.S. App. Lexis 17963, decided August 28, 2003 (U.S. Court of Appeals for the Ninth Circuit), holding that the use of a civil subpoena which is "patently unlawful," "in bad faith," or "at least gross negligence" to gain access to stored email is a breach of both the CFAA and the
Stored Communications Act.
* ''
International Airport Centers, L.L.C. v. Citrin
In ''International Airport Centers, L.L.C. v. Citrin'', the Seventh Circuit Court of Appeals evaluated the dismissal of the plaintiffs' lawsuit for failure to state a claim based upon the interpretation of the word "transmission" in the Computer ...
'', 2006, , in which the
Seventh Circuit Court of Appeals ruled that Jacob Citrin had violated the CFAA when he
deleted files from his company computer before he quit, in order to conceal alleged bad behavior while he was an employee.
* ''
LVRC Holdings v. Brekka'', 2009 1030(a)(2), 1030(a)(4), in which LVRC sued Brekka for allegedly taking information about clients and using it to start his own competing business. The Ninth Circuit ruled that an employee accesses a company computer to gather information for his own purposes does not violate the CFAA merely because that personal use was adverse to the interests of the employer.
* ''
Craigslist v. 3Taps
''Craigslist Inc. v. 3Taps Inc.'', 942 F.Supp.2d 962 (N.D. Cal. 2013) was a Northern District of California Court case in which the court held that sending a cease-and-desist letter and enacting an IP address block is sufficient notice of onlin ...
'', 2012. 3Taps was accused by
Craigslist
Craigslist (stylized as craigslist) is an American classified advertisements website with sections devoted to jobs, housing, for sale, items wanted, services, community service, gigs, résumés, and discussion forums.
Craig Newmark began the ...
of breaching CFAA by circumventing an
IP block in order to access Craigslist's website and
scrape its classified ads without consent. In August 2013, US federal judge found 3Taps's actions violated CFAA and that it faces civil damages for "unauthorized access". Judge
Breyer wrote in his decision that "the average person does not use "
anonymous proxies" to bypass an IP block set up to enforce a banning communicated via personally-addressed
cease-and-desist letter
A cease and desist letter is a document sent to an individual or business to stop alleged illegal activity. The phrase "cease and desist" is a legal doublet, made up of two near-synonyms. The letter may warn that, if the recipient does not dis ...
". He also noted "Congress apparently knew how to restrict the reach of the CFAA to only certain kinds of information, and it appreciated the public v. nonpublic distinction—but
he relevant section
He or HE may refer to:
Language
* He (pronoun), an English pronoun
* He (kana), the romanization of the Japanese kana へ
* He (letter), the fifth letter of many Semitic alphabets
* He (Cyrillic), a letter of the Cyrillic script called ''He'' in ...
contains no such restrictions or modifiers."
* ''
Lee v. PMSI, Inc.'', 2011. PMSI, Inc. sued former employee Lee for violating the CFAA by browsing Facebook and checking personal email in violation of the company's
acceptable use policy. The court found that breaching an employer's acceptable use policy was not "unauthorized access" under the act and, therefore, did not violate the CFAA.
* ''
Sony Computer Entertainment America v. George Hotz'' and ''Hotz v. SCEA'', 2011. SCEA sued "Geohot" and others for
jailbreaking the PlayStation 3 system. The lawsuit alleged, among other things, that Hotz violated (
ytaking info from any
protected computer). Hotz denied liability and contested the Court's exercise of personal jurisdiction over him. The parties settled out of court. The settlement caused Geohot to be unable to legally
hack the
PlayStation 3
The PlayStation 3 (PS3) is a home video game console developed by Sony Interactive Entertainment, Sony Computer Entertainment. The successor to the PlayStation 2, it is part of the PlayStation brand of consoles. It was first released on Novemb ...
system furthermore.
* ''
Pulte Homes, Inc. v. Laborers' International Union'' 2011.
Pulte Homes brought a CFAA suit against the
Laborers' International Union of North America
The Laborers' International Union of North America (LIUNA, stylized as LiUNA!), often shortened to just the Laborers' Union, is an American and Canadian labor union formed in 1903. As of 2017, they had about 500,000 members, about 80,000 of who ...
(LIUNA). After Pulte fired an employee represented by the
union, LIUNA urged members to
call and send
email
Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" mean ...
to the company, expressing their opinions. As a result of the increased traffic, the company's
email system crashed
"Crashed" is the third U.S. rock single, (the fifth overall), from the band Daughtry's debut album. It was released only to U.S. rock stations on September 5, 2007. Upon its release the song got adds at those stations, along with some Alternativ ...
.
*''Facebook v. Power Ventures and Vachani'', 2016. The Ninth Circuit Court of Appeals ruled that the CFAA was violated when Facebook's servers were accessed despite an IP block and
cease and desist
A cease and desist letter is a document sent to an individual or business to stop alleged illegal activity. The phrase "cease and desist" is a legal doublet, made up of two near-synonyms. The letter may warn that, if the recipient does not dis ...
order.
*''HiQ Labs v. LinkedIn'', 2019. The Ninth Circuit Court of Appeals ruled that
scraping a public website without the approval of the website's owner isn't a violation of the CFAA. A Supreme Court appeal is pending.
*''Sandvig v. Barr'', 2020. The
Federal District Court of D.C. ruled that the CFAA does not criminalize the violation of a website's terms of service.
Criticism
There have been criminal convictions for CFAA violations in the context of civil law, for
breach of contract
Breach of contract is a legal cause of action and a type of civil wrong, in which a binding agreement or bargained-for exchange is not honored by one or more of the parties to the contract by non-performance or interference with the other par ...
or
terms of service violations. Many common and insignificant online acts, such as password-sharing and copyright infringement, can transform a CFAA
misdemeanor
A misdemeanor (American English, spelled misdemeanour elsewhere) is any "lesser" criminal act in some common law legal systems. Misdemeanors are generally punished less severely than more serious felonies, but theoretically more so than ad ...
into a
felony
A felony is traditionally considered a crime of high seriousness, whereas a misdemeanor is regarded as less serious. The term "felony" originated from English common law (from the French medieval word "félonie") to describe an offense that res ...
. The punishments are severe, similar to sentences for selling or importing drugs, and may be
disproportionate
In chemistry, disproportionation, sometimes called dismutation, is a redox reaction in which one compound of intermediate oxidation state converts to two compounds, one of higher and one of lower oxidation states. More generally, the term can ...
. Prosecutors have used the CFAA to protect private business interests and to intimidate
free-culture activists, deterring undesirable, yet legal, conduct.
One such example regarding the harshness of the law was shown in United States vs. Tyler King, where King refused initial offers by the government for involvement in a conspiracy to "gain unauthorized access" to a computer system for a small company that an ex-girlfriend of King worked for. His role, even while not directly involved, resulted in 6.5 years imprisonment. No financial motivate was established. A non-profit was started to advocate against further harshness against others targeted under the broad law.
Tim Wu called the CFAA "the worst law in technology".
Professor of Law Ric Simmons notes that many provisions of the CFAA merely combine identical language to pre-existing federal laws with "the element of “access
nga protected computer without authorization, or
yexceed
ngauthorized access," meaning that "the CFAA merely provides an additional charge for prosecutors to bring if the defendant used a computer while committing the crime." Professor Joseph Olivenbaum has similarly criticized the CFAA's "computer-specific approach," noting both the risk of redundancy and resultant definitional problems.
The CFAA increasingly presents real obstacles to journalists reporting stories important to the public’s interest.
As data journalism increasingly becomes “a good way of getting to the truth of things . . . in this post-truth era,” as one data journalist told Google, the need for further clarity around the CFAA increases.
[
]
Aaron Swartz
In the wake of the prosecution and subsequent suicide of Aaron Swartz
Aaron Hillel Swartz (November 8, 1986 – January 11, 2013) was an American computer programmer, entrepreneur, writer, political organizer, and Internet hacktivist. A prolific programmer, Swartz helped develop the web feed format RSS, the tech ...
(who used a script to download scholarly research articles in excess of what JSTOR
JSTOR (; short for ''Journal Storage'') is a digital library founded in 1995 in New York City. Originally containing digitized back issues of academic journals, it now encompasses books and other primary sources as well as current issues of j ...
terms of service allowed), lawmakers proposed amending the Computer Fraud and Abuse Act. Representative Zoe Lofgren
Susan Ellen "Zoe" Lofgren ( ; born December 21, 1947) is an American lawyer and politician serving as a U.S. representative from California. A member of the Democratic Party, Lofgren is in her 13th term in Congress, having been first elected in 1 ...
drafted a bill that would help "prevent what happened to Aaron from happening to other Internet users". Aaron's Law (, ) would exclude terms of service violations from the 1984 Computer Fraud and Abuse Act and from the wire fraud statute.
In addition to Lofgren's efforts, Representatives Darrell Issa
Darrell Edward Issa ( ; born November 1, 1953) is an American businessman and politician who has served as the U.S. representative for California's 50th congressional district since 2021. A member of the Republican Party, he previously served ...
and Jared Polis
Jared Schutz Polis (; born May 12, 1975) is an American politician, entrepreneur, businessman, and philanthropist, serving as the 43rd governor of Colorado since January 2019. He served one term on the Colorado State Board of Education from 2 ...
(also on the House Judiciary Committee
The U.S. House Committee on the Judiciary, also called the House Judiciary Committee, is a standing committee of the United States House of Representatives. It is charged with overseeing the administration of justice within the federal courts, ...
) raised questions in the immediate aftermath of Swartz's death regarding the government's handling of the case. Polis called the charges "ridiculous and trumped up," referring to Swartz as a "martyr."[ Issa, chair of the ]House Oversight Committee
The Committee on Oversight and Reform is the main investigative committee of the United States House of Representatives.
The committee's broad jurisdiction and legislative authority make it one of the most influential and powerful panels in ...
, announced an investigation of the Justice Department's prosecution.
By May 2014, Aaron's Law had stalled in committee. Filmmaker Brian Knappenberger
Brian Knappenberger is an American documentary filmmaker, known for ''The Internet's Own Boy: The Story of Aaron Swartz'', ''We Are Legion: The Story of the Hacktivists'', and Turning Point: 9/11 and the War on Terror and his work on Bloomber ...
alleges this occurred due to Oracle Corporation
Oracle Corporation is an American multinational computer technology corporation headquartered in Austin, Texas. In 2020, Oracle was the third-largest software company in the world by revenue and market capitalization. The company sells da ...
's financial interest in maintaining the status quo.
Aaron's Law was reintroduced in May 2015 (, ) and again stalled. There has been no further introduction of related bills at this time.
Amendments history
2008
* Eliminated the requirement that information must have been stolen through an interstate or foreign communication, thereby expanding jurisdiction for cases involving theft of information from computers;
* Eliminated the requirement that the defendant's action must result in a loss exceeding $5,000 and created a felony offense where the damage affects ten or more computers, closing a gap in the law;
* Expanded to criminalize not only explicit threats to cause damage to a computer, but also threats to (1) steal data on a victim's computer, (2) publicly disclose stolen data, or (3) not repair damage the offender already caused to the computer;
* Created a criminal offense for conspiring to commit a computer hacking offense under section 1030;
* Broadened the definition of "protected computer" in to the full extent of Congress's commerce power by including those computers used in or affecting interstate or foreign commerce or communication; and
* Provided a mechanism for civil and criminal forfeiture of property used in or derived from section 1030 violations.
Popular Culture
The CFAA is mentioned in Episode 8, Season 3 of the AMC series Halt and Catch Fire.
The CFAA is mentioned in Act II of the video game Inscryption (2021)
See also
* Cybercrime
A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing t ...
* Defense Secrets Act of 1911 / Espionage Act of 1917
The Espionage Act of 1917 is a United States federal law enacted on June 15, 1917, shortly after the United States entered World War I. It has been amended numerous times over the years. It was originally found in Title 50 of the U.S. Code (War ...
/ McCarran Internal Security Act 1950
* California Comprehensive Computer Data Access and Fraud Act
* Electronic Communications Privacy Act
* ''LVRC Holdings LLC v. Brekka
''LVRC Holdings v. Brekka'' 581 F.3d 1127, 1135 (9th Cir. 2009) is a Ninth Circuit Court of Appeals Decision that deals with the scope of the concept of "authorization" in the Computer Fraud and Abuse Act. The major finding of this case is that ...
''
* ''In re DoubleClick
''In re DoubleClick Inc. Privacy Litigation'', 154 F. Supp. 2d 497 (S.D.N.Y. 2001)''In re DoubleClick Inc. Privacy Litigation'', 154 F. Supp. 2d 497 (S.D.N.Y. 2001). (''"DoubleClick"''), had Internet users initiate proceedings against DoubleClick ...
''
* ''Massachusetts Bay Transportation Authority v. Anderson
''Massachusetts Bay Transportation Authority v. Anderson, et al.'', Civil Action No. 08-11364, was a challenge brought by the Massachusetts Bay Transportation Authority (MBTA) to prevent three Massachusetts Institute of Technology (MIT) student ...
''
* Information technology audit
* Information technology security audit
* Computer fraud
* '' The Hacker Crackdown'' (mentions the law, & the eponymous Chicago task force)
* Protected computer
* Telecommunications Policy
* WikiLeaks
WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...
* Weev
References
External links
* , text of the law
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
by Charles Doyle, CRS, 12 27 2010, (FAS.org)
{{Patriot Act
1986 in American law
98th United States Congress
Computing legislation
Hacking (computer security)
Information technology audit
United States federal commerce legislation
Fraud legislation
Fraud in the United States
United States federal computing legislation
United States federal legislation articles without infoboxes
Title 18 of the United States Code