Computer Fraud and Abuse Act explained

Shorttitle:Computer Fraud and Abuse Act
Amendments:USA Patriot Act

The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law, which had been included in the Comprehensive Crime Control Act of 1984. [1] Prior to computer-specific criminal laws, computer crimes were prosecuted as mail and wire fraud, but the applying law was often insufficient.[2]

The original 1984 bill was enacted in response to concern that computer-related crimes might go unpunished.[3] The House Committee Report to the original computer crime bill characterized the 1983 techno-thriller film WarGames—in which a young teenager (played by Matthew Broderick) from Seattle breaks into a U.S. military supercomputer programmed to predict possible outcomes of nuclear war and unwittingly almost starts World War III—as "a realistic representation of the automatic dialing and access capabilities of the personal computer."[4]

The CFAA was written to extend existing tort law to intangible property, while, in theory, limiting federal jurisdiction to cases "with a compelling federal interest—i.e., where computers of the federal government or certain financial institutions are involved or where the crime itself is interstate in nature", but its broad definitions have spilled over into contract law (see "Protected Computer", below). In addition to amending a number of the provisions in the original section 1030, the CFAA also criminalized additional computer-related acts. Provisions addressed the distribution of malicious code and denial-of-service attacks. Congress also included in the CFAA a provision criminalizing trafficking in passwords and similar items.

Since then, the Act has been amended a number of times—in 1989, 1994, 1996, in 2001 by the USA PATRIOT Act, 2002, and in 2008 by the Identity Theft Enforcement and Restitution Act. With each amendment of the law, the types of conduct that fell within its reach were extended.

In January 2015, President Barack Obama proposed expanding the CFAA and the RICO Act in his Modernizing Law Enforcement Authorities to Combat Cyber Crime proposal.[5] DEF CON organizer and Cloudflare researcher Marc Rogers, Senator Ron Wyden, and Representative Zoe Lofgren stated opposition to this on the grounds it would make many regular Internet activities illegal, and moved further away from what they were trying to accomplish with Aaron's Law.[6]

Protected computers

The only computers, in theory, covered by the CFAA are defined as "protected computers". They are defined under section to mean a computer:

In practice, any ordinary computer has come under the jurisdiction of the law, including cellphones, due to the interstate nature of most Internet communication.[7]

Criminal offenses under the Act

(a) Whoever—

(1) having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such conduct having obtained information that has been determined by the United States Government pursuant to an Executive order or statute to require protection against unauthorized disclosure for reasons of national defense or foreign relations, or any restricted data, as defined in paragraph y. of section 11 of the Atomic Energy Act of 1954, with reason to believe that such information so obtained could be used to the injury of the United States, or to the advantage of any foreign nation willfully communicates, delivers, transmits, or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it;

(2) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains—

(A) information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602 (n) [1] of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.);

(B) information from any department or agency of the United States; or

(C) information from any protected computer;

(3) intentionally, without authorization to access any nonpublic computer of a department or agency of the United States, accesses such a computer of that department or agency that is exclusively for the use of the Government of the United States or, in the case of a computer not exclusively for such use, is used by or for the Government of the United States and such conduct affects that use by or for the Government of the United States;

(4) knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period;

(5)

(A) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer;

(B) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or

(C) intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage and loss.

(6) knowingly and with intent to defraud traffics (as defined in section 1029) in any password or similar information through which a computer may be accessed without authorization, if—

(A) such trafficking affects interstate or foreign commerce; or

(B) such computer is used by or for the Government of the United States;

(7) with intent to extort from any person any money or other thing of value, transmits in interstate or foreign commerce any communication containing any—

(A) threat to cause damage to a protected computer;

(B) threat to obtain information from a protected computer without authorization or in excess of authorization or to impair the confidentiality of information obtained from a protected computer without authorization or by exceeding authorized access; or

(C) demand or request for money or other thing of value in relation to damage to a protected computer, where such damage was caused to facilitate the extortion[8]

Specific sections

Notable cases and decisions referring to the Act

The Computer Fraud and Abuse Act is both a criminal law and a statute that creates a private right of action, allowing compensation and injunctive or other equitable relief to anyone harmed by a violation of this law. These provisions have allowed private companies to sue disloyal employees for damages for the misappropriation of confidential information (trade secrets).

Criminal cases

Civil cases

Criticism

There have been criminal convictions for CFAA violations in the context of civil law, for breach of contract or terms of service violations. Many common and insignificant online acts, such as password-sharing and copyright infringement, can transform a CFAA misdemeanor into a felony. The punishments are severe, similar to sentences for selling or importing drugs, and may be disproportionate. Prosecutors have used the CFAA to protect private business interests and to intimidate free-culture activists, deterring undesirable, yet legal, conduct.[49]

One such example regarding the harshness of the law was shown in United States vs. Tyler King,[50] where King refused initial offers by the government for involvement in a conspiracy to "gain unauthorized access" to a computer system for a small company that an ex-girlfriend of King worked for. His role, even while not directly involved, resulted in 6.5 years imprisonment. No financial motive was established. A non-profit was started to advocate against further harshness against others targeted under the broad law.[51]

Tim Wu called the CFAA "the worst law in technology".[52]

Professor of Law Ric Simmons notes that many provisions of the CFAA merely combine identical language to pre-existing federal laws with "the element of “access[ing] a protected computer without authorization, or [by] exceed[ing] authorized access,"[53] meaning that "the CFAA merely provides an additional charge for prosecutors to bring if the defendant used a computer while committing the crime."[54] Professor Joseph Olivenbaum has similarly criticized the CFAA's "computer-specific approach," noting both the risk of redundancy and resultant definitional problems.[55]

The CFAA increasingly presents real obstacles to journalists reporting stories important to the public’s interest.[56] As data journalism increasingly becomes “a good way of getting to the truth of things . . . in this post-truth era,” as one data journalist told Google, the need for further clarity around the CFAA increases.[56]

As per Star Kashman, an expert in cybersecurity law, the CFAA presents some challenges in cases related to Search Engine Hacking (also known as Google Dorking). Although Kashman states that accessing publicly available information is legal under the CFAA, she also notes that in many cases Search Engine Hacking is ultimately prosecuted under the CFAA. Kashman believes prosecuting cases of Google Dorking under the CFAA could render the CFAA void for vagueness by making it illegal to access publicly available information.[57]

Aaron Swartz

In the wake of the prosecution and subsequent suicide of Aaron Swartz (who used a script to download scholarly research articles in excess of what JSTOR terms of service allowed), lawmakers proposed amending the Computer Fraud and Abuse Act. Representative Zoe Lofgren drafted a bill that would help "prevent what happened to Aaron from happening to other Internet users". Aaron's Law ([58]) would exclude terms of service violations from the 1984 Computer Fraud and Abuse Act and from the wire fraud statute.[59]

In addition to Lofgren's efforts, Representatives Darrell Issa and Jared Polis (also on the House Judiciary Committee) raised questions in the immediate aftermath of Swartz's death regarding the government's handling of the case. Polis called the charges "ridiculous and trumped up," referring to Swartz as a "martyr." Issa, chair of the House Oversight Committee, announced an investigation of the Justice Department's prosecution.[60] [61]

By May 2014, Aaron's Law had stalled in committee. Filmmaker Brian Knappenberger alleges this occurred due to Oracle Corporation's financial interest in maintaining the status quo.[62]

Aaron's Law was reintroduced in May 2015 and again stalled. There has been no further introduction of related bills.

Amendments history

2008

See also

External links

Notes and References

  1. Web site: Prosecution of Computer . Jarrett . H. Marshall . Bailie . Michael W. . 2010 . justice.gov . Office of Legal Education Executive Office for United States Attorneys . June 3, 2013.
  2. Web site: Who's Responsible? - Computer Crime Laws Hackers FRONTLINE PBS. 2021-11-13. www.pbs.org.
  3. Schulte . Stephanie . The WarGames Scenario . Television and New Media . November 2008 . 9 . 6 . 487–513 . 10.1177/1527476408323345 . 146669305 .
  4. H.R. Rep. 98-894, 1984 U.S.C.C.A.N. 3689, 3696 (1984).
  5. Web site: Securing Cyberspace – President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts . January 13, 2015 . National Archives. whitehouse.gov. January 30, 2015 .
  6. News: Democrats, Tech Experts Slam Obama's Anti-Hacking Proposal . January 20, 2015 . January 30, 2015 . Huffington Post.
  7. Web site: Varma. Corey. What is the Computer Fraud and Abuse Act. CoreyCarma.com . 10 June 2015. 2015-01-03.
  8. Web site: 18 USC 1030. Legal Information Institute, Cornell University Law School.
  9. United States v. Morris (1991) . 928 . F.2d . 504 . 505 . 2d Cir. . 1991 . https://scholar.google.com/scholar_case?case=551386241451639668.
  10. https://www.scribd.com/doc/23406419/Governments-Trial-Memo U.S. v. Lori Drew
  11. https://wikispaces.psu.edu/display/IST432TEAM24/United+States+v.+Lori+Drew US v Lori Drew, psu.edu
  12. Web site: 'MySpace mom' Lori Drew's conviction thrown out. Staff. Ars. 2009-07-02. Ars Technica. en-us. 2020-03-31.
  13. Web site: FindLaw's United States Eleventh Circuit case and opinions.. Findlaw. en-US. 2020-03-31.
  14. News: PayPal 14 'Freedom Fighters' Plead Guilty to Cyber-Attack . David Gilbert . International Business Times . December 6, 2013.
  15. News: Inside the 'PayPal 14' Trial . Alexa O'Brien . The Daily Beast . December 5, 2013.
  16. See Internet Activist Charged in M.I.T. Data Theft, By NICK BILTON New York Times, July 19, 2011, 12:54 PM, as well as the Indictment
  17. Dave Smith, Aaron Swartz Case: U.S. DOJ Drops All Pending Charges Against The JSTOR Liberator, Days After His Suicide, International Business Times, January 15, 2013.
  18. http://www.ca9.uscourts.gov/datastore/opinions/2011/04/28/10-10038.pdf U.S. v. Nosal
  19. https://www.wired.com/threatlevel/2011/04/no-hacking-required/ Appeals Court: No Hacking Required to Be Prosecuted as a Hacker
  20. Man Convicted of Hacking Despite Not Hacking . Wired . David . Kravets . April 24, 2013.
  21. Web site: Nos. 14-10037, 14-10275.
  22. Web site: Docket for 16-1344. www.supremecourt.gov. 2020-03-31.
  23. https://docs.google.com/viewer?a=v&pid=explorer&chrome=true&srcid=0B-VQYa94fZpfZDY4MGQ1YjItYmEyZS00MGI4LWE0N2EtMmMzZmY0NTE5MTdj&hl=en_US&pli=1 US v Adekeye
  24. https://www.wired.com/images_blogs/threatlevel/2010/11/Aleynikov-Sergey-Motion-to-Seal.pdf US v Sergey Aleynikov
  25. https://www.bloomberg.com/apps/news?pid=newsarchive&sid=a2GvteRoihQE Ex-Goldman Programmer Described Code Downloads to FBI (Update1)
  26. http://www.debbieschlussel.com/archives/hezbospyplea.pdf Plea Agreement
  27. http://www.boilingfrogspost.com/tag/podcast-episode/ Sibel Edmond's Boiling Frogs podcast 61
  28. Web site: United States of America v. Neil Scott Kramer . 2012-03-18 . https://web.archive.org/web/20110816002424/http://www.ca8.uscourts.gov/opndir/11/02/101983P.pdf . 2011-08-16 . dead .
  29. Feds Drop Hacking Charges in Video-Poker Glitching Case . Wired . Kevin . Poulsen . May 7, 2013.
  30. http://newmedialaw.proskauer.com/2013/11/13/no-expansion-of-cfaa-liability-for-monetary-exploit-of-software-bug/ No Expansion of CFAA Liability for Monetary Exploit of Software Bug | New Media and Technology Law Blog
  31. Web site: United States v. Gilberto Valle. 2015-03-06. Electronic Frontier Foundation. en. 2020-03-31.
  32. Web site: Second Circuit Adopts Narrow Construction of Federal Computer Fraud Statute, Joins Circuit Split. 2015-12-10. Jackson Lewis. en. 2020-03-31.
  33. News: The Cybersecurity 202: There's finally a Supreme Court battle coming over the nation's main hacking law . Joseph . Marks . April 24, 2020 . July 15, 2020 . .
  34. Web site: Supreme Court sides with police officer who improperly searched license plate database . Brian . Fung . Ariane . de Vogue . Devan . Cole . June 3, 2021 . June 3, 2021 . .
  35. Web site: Ninth Circuit Court of Appeals: Stored Communications Act and Computer Fraud and Abuse Act Provide Cause of Action for Plaintiff . Center for Internet and Society . Stanford University . September 22, 2003. Lauren . Gelman .
  36. http://openjurist.org/440/f3d/418/international-airport-centers-llc-v-citrin US v Jacob Citrin
  37. https://www.wired.com/images_blogs/threatlevel/2009/09/brekka.pdf U.S. v Brekka
  38. https://www.wired.com/threatlevel/2009/09/disloyalcomputing/ Kravets, David, Court: Disloyal Computing Is Not Illegal
  39. IP Cloaking Violates Computer Fraud and Abuse Act, Judge Rules . Wired . David . Kravets . August 20, 2013.
  40. http://www.dmlp.org/threats/craigslist-v-3taps Craigslist v. 3taps |Digital Media Law Project
  41. http://www.law360.com/articles/465944 3Taps Can't Shake Unauthorized Craigslist Access Claims – Law360
  42. http://www.groklaw.net/staticpages/index.php?page=SonyHotz#c167a_02 See the links to the original lawsuit documents which are indexed here
  43. http://www.techdirt.com/articles/20110809/03492415447/court-says-sending-too-many-emails-to-someone-is-computer-hacking.shtml techdirt.com
  44. http://www.employerlawreport.com/2011/08/articles/labor-relations/sixth-circuit-decision-in-pulte-homes-leaves-employers-with-few-options-in-response-to-union-high-tech-tactics/#axzz2JEeJ24GX Hall, Brian, Sixth Circuit Decision in Pulte Homes Leaves Employers With Few Options In Response To Union High Tech Tactics, Employer Law Report, 3 August 2011.
  45. https://www.employerlawreport.com/files/2013/09/Pulte-Homes.pdf
  46. Web site: Startup that we all forgot gets small win against Facebook on appeal. Farivar. Cyrus. 2016-07-12. Ars Technica. en-us. 2020-03-31.
  47. Web site: Web scraping doesn't violate anti-hacking law, appeals court rules. Lee. Timothy B.. 2019-09-09. Ars Technica. en-us. 2020-03-31.
  48. Web site: Court: Violating a site's terms of service isn't criminal hacking. Lee. Timothy B.. 2020-03-30. Ars Technica. en-us. 2020-03-31.
  49. Web site: A Voice from Prison Blog Criminal Justice Reform & Constitutional Rights . 2022-10-25 . A Voice from Prison . en-US.
  50. Web site: 2020-08-13 . Texas Man Sentenced to 57 Months for Computer Hacking and Aggravated Identity Theft . 2022-10-25 . www.justice.gov . en.
  51. Web site: A Voice from Prison Blog Criminal Justice Reform & Constitutional Rights . 2022-10-25 . A Voice from Prison . en-US.
  52. Web site: Most of what you do online is illegal. Let's end the absurdity . Christian Sandvig. Karrie Karahalios. Karrie Karahalios . 2006-07-01 . .
  53. [Title 18 of the United States Code|18 U.S.C.]
  54. Simmons. Ric. 2016. The Failure of the Computer Fraud and Abuse Act: Time to Take an Administrative Approach to Regulating Computer Crime. The George Washington University Law School.
  55. Book: Olivenbaum, Joseph M.. : Rethinking Federal Computer Legislation. 27 Seton Hall Law Review 574. 1997.
  56. Web site: Baranetsky. Victoria. Data Journalism and the Law. 2020-10-16. Columbia Journalism Review. en.
  57. Kashman . Star . Google Dorking or Legal Hacking: From the CIA Compromise to Your Cameras at Home, We Are Not as Safe as We Think . Wash. J. L. Tech. & Arts . 2023 . 18 . 2.
  58. H.R. 2454 at GovTrack; H.R. 2454 at OpenCongress. ; S. 1196 at GovTrack; S. 1196 at OpenCongress.
  59. News: Musil . Steven . CNET News . 15 January 2013 . 19 Oct 2021. New 'Aaron's Law' aims to alter controversial computer fraud law.
  60. Web site: Sasso . Brendan . Lawmakers slam DOJ prosecution of Swartz as 'ridiculous, absurd' . . 2013-01-16. 2013-01-16.
  61. News: Darrell Issa Probing Prosecution Of Aaron Swartz, Internet Pioneer Who Killed Himself . Huffingtonpost.com . January 15, 2013. 2013-01-16 . Ryan J. . Reilly.
  62. News: Swartz doc director: Oracle and Larry Ellison killed Aaron's Law . Postmedia . Jonathan . Dekel . May 1, 2014 . May 1, 2014 . October 3, 2018 . https://web.archive.org/web/20181003014431/https://o.canada.com/technology/swartz-doc-director-oracle-and-larry-ellison-killed-aarons-law . dead .