294:(1) having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such conduct having obtained information that has been determined by the United States Government pursuant to an Executive order or statute to require protection against unauthorized disclosure for reasons of national defense or foreign relations, or any restricted data, as defined in paragraph y. of section 11 of the Atomic Energy Act of 1954, with reason to believe that such information so obtained could be used to the injury of the United States, or to the advantage of any foreign nation willfully communicates, delivers, transmits, or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it;
764:, 2020. A police officer in Georgia was caught in an FBI sting operation using his authorized access to a license plate database to check the identity of a person for cash payment, an "improper purpose". The officer was convicted and sentenced to 18 months under CFAA §1030(a)(2). Though he appealed his conviction on the basis that the "improper purpose" was not "exceeding authorized access", the Eleventh Circuit upheld the conviction based on precedent. The Supreme Court ruled in June 2021 that under CFAA, that a person "exceeds authorized access" of a computer system they otherwise have access to when they access files and other content that are off-limits to the portions of the computer system they were authorized to access. Their opinion restricted CFAA from applying to cases where a person obtains information from areas they do have authorized access to, but uses that information for improper reasons.
29:
708:, 2011. Kramer was a court case where a cellphone was used to coerce a minor into engaging sex with an adult. Central to the case was whether a cellphone constituted a computer device. Ultimately, the United States Court of Appeals for the Eighth Circuit found that a cell phone can be considered a computer if "the phone perform arithmetic, logical, and storage functions", paving the way for harsher consequences for criminals engaging with minors over cellphones.
311:(3) intentionally, without authorization to access any nonpublic computer of a department or agency of the United States, accesses such a computer of that department or agency that is exclusively for the use of the Government of the United States or, in the case of a computer not exclusively for such use, is used by or for the Government of the United States and such conduct affects that use by or for the Government of the United States;
314:(4) knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $ 5,000 in any 1-year period;
815:, 2009 1030(a)(2), 1030(a)(4), in which LVRC sued Brekka for allegedly taking information about clients and using it to start his own competing business. The Ninth Circuit ruled that an employee accesses a company computer to gather information for his own purposes does not violate the CFAA merely because that personal use was adverse to the interests of the employer.
1007:
One such example regarding the harshness of the law was shown in United States vs. Tyler King, where King refused initial offers by the government for involvement in a conspiracy to "gain unauthorized access" to a computer system for a small company that an ex-girlfriend of King worked for. His role,
1042:
The government was able to bring such disproportionate charges against Aaron because of the broad scope of the
Computer Fraud and Abuse Act (CFAA) and the wire fraud statute. It looks like the government used the vague wording of those laws to claim that violating an online service's user agreement
1017:
Professor of Law Ric
Simmons notes that many provisions of the CFAA merely combine identical language to pre-existing federal laws with "the element of “access a protected computer without authorization, or exceed authorized access," meaning that "the CFAA merely provides an additional charge for
643:
to take a database of contacts from his previous employer for use in his own business, violating 1030(a)(4). This was a complex case with multiple trips to the Ninth
Circuit, which ruled that violating a website's terms of use is not a violation of the CFAA. He was convicted in 2013. In 2016, the
1025:
As per Star
Kashman, an expert in cybersecurity law, the CFAA presents some challenges in cases related to Search Engine Hacking (also known as Google Dorking). Although Kashman states that accessing publicly available information is legal under the CFAA, she also notes that in many cases Search
1021:
The CFAA increasingly presents real obstacles to journalists reporting stories important to the public’s interest. As data journalism increasingly becomes “a good way of getting to the truth of things . . . in this post-truth era,” as one data journalist told Google, the need for further clarity
300:(A) information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602 (n) of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.);
777:, 2003 U.S. App. Lexis 17963, decided August 28, 2003 (U.S. Court of Appeals for the Ninth Circuit), holding that the use of a civil subpoena which is "patently unlawful," "in bad faith," or "at least gross negligence" to gain access to stored email is a breach of both the CFAA and the
700:. Prouty was an FBI and CIA agent who was prosecuted for having a fraudulent marriage to get US residency. She claims she was persecuted by a U.S. attorney who was trying to gain media coverage by calling her a terrorist agent and get himself promoted to a federal judgeship.
1049:
When our laws need to be modified, Congress has a responsibility to act. A simple way to correct this dangerous legal interpretation is to change the CFAA and the wire fraud statutes to exclude terms of service violations. I will introduce a bill that does exactly that.
348:(B) threat to obtain information from a protected computer without authorization or in excess of authorization or to impair the confidentiality of information obtained from a protected computer without authorization or by exceeding authorized access; or
1992:
1018:
prosecutors to bring if the defendant used a computer while committing the crime." Professor Joseph
Olivenbaum has similarly criticized the CFAA's "computer-specific approach," noting both the risk of redundancy and resultant definitional problems.
277:
which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States
1026:
Engine
Hacking is ultimately prosecuted under the CFAA. Kashman believes prosecuting cases of Google Dorking under the CFAA could render the CFAA void for vagueness by making it illegal to access publicly available information.
2174:
1155:
to criminalize not only explicit threats to cause damage to a computer, but also threats to (1) steal data on a victim's computer, (2) publicly disclose stolen data, or (3) not repair damage the offender already caused to the
847:". He also noted "Congress apparently knew how to restrict the reach of the CFAA to only certain kinds of information, and it appreciated the public v. nonpublic distinction—but contains no such restrictions or modifiers."
539:, its creator was convicted under the Act for causing damage and gaining unauthorized access to "federal interest" computers. The Act was amended in 1996, in part, to clarify language whose meaning was disputed in the case.
1103:) raised questions in the immediate aftermath of Swartz's death regarding the government's handling of the case. Polis called the charges "ridiculous and trumped up," referring to Swartz as a "martyr." Issa, chair of the
1008:
even while not directly involved, resulted in 6.5 years imprisonment. No financial motive was established. A non-profit was started to advocate against further harshness against others targeted under the broad law.
644:
Ninth
Circuit ruled that he had acted "without authorization" when he used the username and password of a current employee with their consent and affirmed his conviction. The Supreme Court declined to hear the case.
123:
The original 1984 bill was enacted in response to concern that computer-related crimes might go unpunished. The House
Committee Report to the original computer crime bill included a statement by a representative of
1411:. Vol. 4 (98th Congress—Second Session 1984 ed.). St. Paul, Minn.: West Publishing Co. 1984. pp. 3689–3710 (whole report), particularly pp. 3695–3696 (specific pages with statement from hearing).
956:
a public website without the approval of the website's owner is not a violation of the CFAA. LinkedIn petitioned for the
Supreme Court to review the decision and the court remanded the case based on its
1141:
Eliminated the requirement that information must have been stolen through an interstate or foreign communication, thereby expanding jurisdiction for cases involving theft of information from computers;
1812:
1144:
Eliminated the requirement that the defendant's action must result in a loss exceeding $ 5,000 and created a felony offense where the damage affects ten or more computers, closing a gap in the law;
740:) and because the sequence of button presses that triggered the bug were considered held to have "not exceed their authorized access." As of November 2013 the defendant still faces a regular
320:(A) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer;
212:, 2002, and in 2008 by the Identity Theft Enforcement and Restitution Act. With each amendment of the law, the types of conduct that fell within its reach were extended. In 2015, President
331:(6) knowingly and with intent to defraud traffics (as defined in section 1029) in any password or similar information through which a computer may be accessed without authorization, if—
513:
to anyone harmed by a violation of this law. These provisions have allowed private companies to sue disloyal employees for damages for the misappropriation of confidential information (
889:). Hotz denied liability and contested the Court's exercise of personal jurisdiction over him. The parties settled out of court. The settlement caused Geohot to be unable to legally
1104:
274:
or the United States
Government, or any computer, when the conduct constituting the offense affects the computer's use by or for the financial institution or the government; or
3161:
2420:
2688:
2281:
1422:
835:
its classified ads without consent. In August 2013, US federal judge found 3Taps's actions violated CFAA and that it faces civil damages for "unauthorized access". Judge
1202:
1965:
2946:
968:
1406:
627:. He was indicted for violating CFAA provisions (a)(2), (a)(4), (c)(2)(B)(iii), (a)(5)(B), and (c)(4)(A)(i)(I),(VI). The case was dismissed after Swartz committed
282:
In practice, any ordinary computer has come under the jurisdiction of the law, including cellphones, due to the interstate nature of most Internet communication.
2162:
576:
1227:
800:
351:(C) demand or request for money or other thing of value in relation to damage to a protected computer, where such damage was caused to facilitate the extortion
901:
753:
69:
3300:
1705:
342:(7) with intent to extort from any person any money or other thing of value, transmits in interstate or foreign commerce any communication containing any—
859:. The court found that breaching an employer's acceptable use policy was not "unauthorized access" under the act and, therefore, did not violate the CFAA.
3285:
2869:
863:
376:, with the notable addition being that it also covers information related to "Foreign Relations", not simply "National Defense" like the Espionage Act.
1170:
to the full extent of Congress's commerce power by including those computers used in or affecting interstate or foreign commerce or communication; and
910:
2328:
2203:
681:
code, allegedly in violation of 1030(a)(2)(c) and 1030(c)(2)(B)i–iii and 2. This charge was later dropped, and he was instead charged with theft of
1927:
855:, 2011. PMSI, Inc. sued former employee Lee for violating the CFAA by browsing Facebook and checking personal email in violation of the company's
785:
2229:
3181:
2608:
1261:
2637:
2255:
2482:
Kashman, Star (2023). "Google Dorking or Legal Hacking: From the CIA Compromise to Your Cameras at Home, We Are Not as Safe as We Think".
942:, 2016. The Ninth Circuit Court of Appeals ruled that the CFAA was violated when Facebook's servers were accessed despite an IP block and
3305:
653:
1649:
1511:
756:
overturned a conviction against a police officer who had used a police database to look up information about women he knew personally.
2897:
240:
stated opposition to this on the grounds it would make many regular internet activities illegal. In 2021, the Supreme Court ruled in
323:(B) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or
3191:
3166:
595:
signed a plea deal to charges of conspiring to disrupt access to the payment website PayPal in response to the payment shutdown to
2049:"Ninth Circuit Court of Appeals: Stored Communications Act and Computer Fraud and Abuse Act Provide Cause of Action for Plaintiff"
1877:
2932:
988:
violations. Many common and insignificant online acts, such as password-sharing and copyright infringement, can transform a CFAA
178:
113:
2696:
2384:
326:(C) intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage and loss.
2533:
3280:
3234:
2890:
2876:
2793:
2571:
1828:
1238:
1207:
1598:
3275:
3265:
3171:
485:
174:
3295:
3219:
3156:
2586:
2548:
1753:
936:
ruled that the LIUNA's instruction to call and email "intentionally caused damage," reversing the lower court's decision.
2505:
1423:"Securing Cyberspace – President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts"
2742:
2421:"The Failure of the Computer Fraud and Abuse Act: Time to Take an Administrative Approach to Regulating Computer Crime"
2403:
2020:
1163:
1148:
877:
791:
704:
557:
476:
464:
452:
440:
428:
416:
404:
392:
380:
364:
258:
105:
48:
1686:
3176:
2665:
1076:
drafted a bill that would help "prevent what happened to Aaron from happening to other Internet users". Aaron's Law (
229:
1668:
1173:
Provided a mechanism for civil and criminal forfeiture of property used in or derived from section 1030 violations.
583:
employee had violated the CFAA when he used an SSA database to look up information about people he knew personally.
1046:
Using the law in this way could criminalize many everyday activities and allow for outlandishly severe penalties.
185:
are involved or where the crime itself is interstate in nature", but its broad definitions have spilled over into
3151:
2760:
656:, allegedly something that the CISCO employee who gave him an access password did not permit. Adekeye was CEO of
3270:
3229:
3209:
2918:
2065:
1552:
1483:
1394:
1196:
580:
527:
297:(2) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains—
2177:
Sixth Circuit Decision in Pulte Homes Leaves Employers With Few Options In Response To Union High Tech Tactics
1325:
3260:
3186:
2842:
1584:
611:
2752:
807:
from his company computer before he quit, in order to conceal alleged bad behavior while he was an employee.
3214:
2939:
2904:
2838:
2822:
1910:
1840:
1788:
1709:
1233:
2457:
1771:
3224:
2846:
2834:
2826:
2818:
1993:"The Cybersecurity 202: There's finally a Supreme Court battle coming over the nation's main hacking law"
1721:
1706:
Aaron Swartz Case: U.S. DOJ Drops All Pending Charges Against The JSTOR Liberator, Days After His Suicide
1213:
1188:
1454:
1072:
terms of service allowed), lawmakers proposed amending the Computer Fraud and Abuse Act. Representative
193:, the CFAA also criminalized additional computer-related acts. Provisions addressed the distribution of
3290:
2854:
2850:
2830:
2814:
2756:
1928:
No Expansion of CFAA Liability for Monetary Exploit of Software Bug | New Media and Technology Law Blog
1389:
House Committee on the Judiciary (July 24, 1984). House Report No. 98-894. pp. 10–11. Accompanies
1035:
958:
760:
543:
241:
60:
2151:
189:(see "Protected Computer", below). In addition to amending a number of the provisions in the original
2925:
2786:
1816:
1100:
778:
2077:
3239:
890:
198:
2190:
1966:"Second Circuit Adopts Narrow Construction of Federal Computer Fraud Statute, Joins Circuit Split"
1558:
1159:
Created a criminal offense for conspiring to commit a computer hacking offense under section 1030;
1735:
844:
811:
498:
2724:
2560:
1296:
1126:
1081:
2728:
2721:
2717:
2564:
2526:
2522:
2091:
1855:, U.S. District Court, Eastern District of Michigan, Southern Division. via debbieschlussel.com
1122:
1077:
925:
to the company, expressing their opinions. As a result of the increased traffic, the company's
748:
678:
648:
635:
600:
2112:
1390:
996:. The punishments are severe, similar to sentences for selling or importing drugs, and may be
1570:
1192:
1001:
997:
856:
712:
373:
271:
182:
73:
28:
2779:
2642:
1939:
1852:
1623:
1249:
949:
872:
624:
208:
Since then, the Act has been amended a number of times—in 1989, 1994, 1996, in 2001 by the
980:
There have been criminal convictions for CFAA violations in the context of civil law, for
843:" to bypass an IP block set up to enforce a banning communicated via personally-addressed
795:
619:
allegedly entered an MIT wiring closet and set up a laptop to mass-download articles from
65:
8:
3078:
1997:
1111:
1000:. Prosecutors have used the CFAA to protect private business interests and to intimidate
828:
819:
737:
170:
117:
2021:"Supreme Court sides with police officer who improperly searched license plate database"
1167:
1152:
881:
561:
158:—as "a realistic representation of the automatic dialing and access capabilities of the
2666:"Darrell Issa Probing Prosecution Of Aaron Swartz, Internet Pioneer Who Killed Himself"
1884:
1867:
Thursday, 13. October 2011. Interview with Prouty by Peter B. Collins and Sibel Edmonds
1864:
1398:
1367:
1256:
1115:
1088:
violations from the 1984 Computer Fraud and Abuse Act and from the wire fraud statute.
981:
971:
ruled that the CFAA does not criminalize the violation of a website's terms of service.
886:
729:
640:
253:
1693:
1535:
1385:
A representative of GTE Telenet (November 10, 1983). "Hearing". Subcommittee on Crime.
875:
the PlayStation 3 system. The lawsuit alleged, among other things, that Hotz violated
444:
432:
420:
408:
396:
384:
368:
262:
2380:
2329:"Texas Man Sentenced to 57 Months for Computer Hacking and Aggravated Identity Theft"
1371:
1220:
929:
851:
840:
836:
689:
604:
592:
555:. Charges were under 18 USC 1030(a)(2)(c) and (b)(2)(c). Judge Wu decided that using
497:
The Computer Fraud and Abuse Act is both a criminal law and a statute that creates a
159:
139:
2530:
480:
468:
456:
3008:
2993:
2973:
2911:
2568:
2048:
1359:
1085:
985:
943:
669:
661:
566:
510:
2746:
2407:
1537:
244:
to provide a narrow interpretation of the meaning of "exceeds authorized access".
109:
3098:
3038:
2590:
2575:
2552:
2537:
2129:
1459:
209:
2355:"A Voice from Prison Blog | Criminal Justice Reform & Constitutional Rights"
2304:"A Voice from Prison Blog | Criminal Justice Reform & Constitutional Rights"
2165:
2011 8 9, Mike Masnick, "Sending Too Many Emails to Someone Is Computer Hacking"
116:. Prior to computer-specific criminal laws, computer crimes were prosecuted as
3118:
3108:
3088:
2963:
1427:
1243:
918:
623:. He allegedly avoided various attempts by JSTOR and MIT to stop this, such as
531:, 928 F.2d 504 (2d Cir. 1991), decided March 7, 1991. After the release of the
101:
2765:
2583:
2545:
2440:<CTRL><ALT><DELETE>: Rethinking Federal Computer Legislation
2282:"Computer Fraud and Abuse Act Enforcement: Cruel, Unusual, and Due for Reform"
1129:) and again stalled. There has been no further introduction of related bills.
201:. Congress also included in the CFAA a provision criminalizing trafficking in
3254:
3073:
3058:
3043:
3023:
2978:
2968:
1363:
1068:(who used a script to download scholarly research articles in excess of what
933:
894:
733:
725:
721:
674:
548:
536:
155:
147:
97:
94:
3128:
3123:
3013:
2998:
2594:
2556:
2389:
1092:
1065:
1043:
or terms of service is a violation of the CFAA and the wire fraud statute.
953:
926:
832:
804:
717:
682:
616:
514:
213:
186:
388:: Computer trespassing, and taking government, financial, or commerce info
177:
to cases "with a compelling federal interest—i.e., where computers of the
3133:
3113:
3103:
3068:
3028:
3018:
2983:
2802:
1096:
1073:
1056:
989:
914:
906:
532:
237:
151:
41:
2766:
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
2140:
1306:. Office of Legal Education Executive Office for United States Attorneys
337:(B) such computer is used by or for the Government of the United States;
3063:
3053:
3048:
3033:
1183:
824:
741:
506:
372:: Computer espionage. This section takes much of its language from the
225:
2204:"Startup that we all forgot gets small win against Facebook on appeal"
2152:
See the links to the original lawsuit documents which are indexed here
1326:"Who's Responsible? - Computer Crime Laws | Hackers | FRONTLINE | PBS"
1107:, announced an investigation of the Justice Department's prosecution.
961:
decision. The Ninth Circuit ultimately affirmed its original decision.
652:
2011. Adekeye allegedly violated (a)(2), when he allegedly downloaded
303:(B) information from any department or agency of the United States; or
3093:
3003:
1266:
596:
587:
233:
202:
2230:"Web scraping doesn't violate anti-hacking law, appeals court rules"
3083:
2579:
2541:
2256:"Court: Violating a site's terms of service isn't criminal hacking"
1488:
657:
492:
252:
The only computers, in theory, covered by the CFAA are defined as "
217:
166:
134:
2689:"Swartz doc director: Oracle and Larry Ellison killed Aaron's Law"
2638:"Lawmakers slam DOJ prosecution of Swartz as 'ridiculous, absurd'"
2609:"New 'Aaron's Law' aims to alter controversial computer fraud law"
2378:
2988:
628:
552:
502:
221:
194:
143:
129:
2385:"Most of what you do online is illegal. Let's end the absurdity"
2354:
2303:
2141:
3Taps Can't Shake Unauthorized Craigslist Access Claims – Law360
2113:"IP Cloaking Violates Computer Fraud and Abuse Act, Judge Rules"
1388:
2191:
https://www.employerlawreport.com/files/2013/09/Pulte-Homes.pdf
1841:
Ex-Goldman Programmer Described Code Downloads to FBI (Update1)
1736:
Appeals Court: No Hacking Required to Be Prosecuted as a Hacker
1384:
1011:
993:
436:: Trafficking in passwords of a government or commerce computer
334:(A) such trafficking affects interstate or foreign commerce; or
2771:
1687:
Internet Activist Charged in M.I.T. Data Theft, By NICK BILTON
1350:
Schulte, Stephanie (November 2008). "The WarGames Scenario".
1110:
By May 2014, Aaron's Law had stalled in committee. Filmmaker
1069:
922:
839:
wrote in his decision that "the average person does not use "
736:
in question did not demonstrate a tangential relationship to
620:
591:, 2011. A group of men and women connected to the collective
1624:"FindLaw's United States Eleventh Circuit case and opinions"
1536:
Legal Information Institute, Cornell University Law School.
1455:"Democrats, Tech Experts Slam Obama's Anti-Hacking Proposal"
2019:
Fung, Brian; de Vogue, Ariane; Cole, Devan (June 3, 2021).
1650:"PayPal 14 'Freedom Fighters' Plead Guilty to Cyber-Attack"
1440:
1271:
1203:
California Comprehensive Computer Data Access and Fraud Act
1253:(mentions the law, & the eponymous Chicago task force)
913:(LIUNA). After Pulte fired an employee represented by the
569:
agreement would make the law overly broad. 259 F.R.D. 449
424:: Damaging a protected computer (including viruses, worms)
100:
bill that was enacted in 1986 as an amendment to existing
2947:
Telemarketing and Consumer Fraud and Abuse Prevention Act
2025:
1911:"Feds Drop Hacking Charges in Video-Poker Glitching Case"
1843:, David Glovin and David Scheer. July 10, 2009, Bloomberg
1064:
In the wake of the prosecution and subsequent suicide of
125:
2506:"Congresswoman Introduces 'Aaron's Law' Honoring Swartz"
1484:"Supreme Court narrows scope of sweeping cybercrime law"
1407:
United States Code Congressional and Administrative News
1870:
1228:
Massachusetts Bay Transportation Authority v. Anderson
952:, 2019. The Ninth Circuit Court of Appeals ruled that
803:
ruled that Jacob Citrin had violated the CFAA when he
2499:
2497:
1118:'s financial interest in maintaining the status quo.
1162:
Broadened the definition of "protected computer" in
1831:, Case 1:10-cr-00096-DLC Document 69 Filed 10/25/10
607:. They later became known under the name PayPal 14.
345:(A) threat to cause damage to a protected computer;
2870:Omnibus Crime Control and Safe Streets Act of 1968
2494:
1091:In addition to Lofgren's efforts, Representatives
902:Pulte Homes, Inc. v. Laborers' International Union
864:Sony Computer Entertainment America v. George Hotz
285:
1666:
1599:"'MySpace mom' Lori Drew's conviction thrown out"
1295:Jarrett, H. Marshall; Bailie, Michael W. (2010).
551:case involving the suicide of a girl harassed on
132:that characterized the 1983 techno-thriller film
3252:
2018:
1817:Federal Grand Jury indicts former Cisco Engineer
493:Notable cases and decisions referring to the Act
1878:"United States of America v. Neil Scott Kramer"
1014:called the CFAA "the worst law in technology".
786:International Airport Centers, L.L.C. v. Citrin
400:: Computer trespassing in a government computer
120:, but the applying law was often insufficient.
3182:National Institute of Standards and Technology
2768:, by Charles Doyle, CRS, 12 27 2010, (FAS.org)
2130:Craigslist v. 3taps |Digital Media Law Project
1754:"Man Convicted of Hacking Despite Not Hacking"
1481:
1290:
1288:
1286:
911:Laborers' International Union of North America
639:, 2011. Nosal and others allegedly accessed a
603:which was part of a wider Anonymous campaign,
2787:
2451:
2449:
1647:
1482:Geller, Eric; Gerstein, Josh (June 3, 2021).
1294:
1004:, deterring undesirable, yet legal, conduct.
1544:
831:in order to access Craigslist's website and
448:: Threatening to damage a protected computer
306:(C) information from any protected computer;
3301:United States federal computing legislation
2425:The George Washington University Law School
1283:
150:programmed to predict possible outcomes of
3286:United States federal commerce legislation
2794:
2780:
2446:
2437:
1692:, July 19, 2011, 12:54 PM, as well as the
1512:"What is the Computer Fraud and Abuse Act"
1121:Aaron's Law was reintroduced in May 2015 (
871:, 2011. SCEA sued "Geohot" and others for
2898:Family Educational Rights and Privacy Act
1819:By Howard Mintz, 08/05/2011, Mercury News
724:does not constitute hacking because the
3192:U.S. Immigration and Customs Enforcement
2094:Court: Disloyal Computing Is Not Illegal
165:The CFAA was written to extend existing
2933:Immigration and Nationality Act of 1952
2631:
2629:
2481:
2418:
2279:
2201:
2110:
1908:
1865:Sibel Edmond's Boiling Frogs podcast 61
1751:
1349:
114:Comprehensive Crime Control Act of 1984
3253:
2663:
2503:
2455:
2046:
1858:
940:Facebook v. Power Ventures and Vachani
827:of breaching CFAA by circumventing an
673:, 2011. Aleynikov was a programmer at
247:
138:—in which a young teenager (played by
3235:Electronic Privacy Information Center
2891:Foreign Intelligence Surveillance Act
2877:Electronic Communications Privacy Act
2775:
2686:
2635:
2606:
2228:Lee, Timothy B. (September 9, 2019).
2179:, Employer Law Report, 3 August 2011.
2047:Gelman, Lauren (September 22, 2003).
1990:
1596:
1509:
1239:Information technology security audit
1208:Electronic Communications Privacy Act
1132:
649:United States v. Peter Alfred-Adekeye
2753:Computer Fraud and Abuse Act of 1986
2664:Reilly, Ryan J. (January 15, 2013).
2626:
2504:Reilly, Ryan J. (January 15, 2013).
728:in question failed to constitute a "
357:
216:proposed expanding the CFAA and the
87:Computer Fraud and Abuse Act of 1986
16:1986 United States cybersecurity law
3220:Center for Democracy and Technology
2636:Sasso, Brendan (January 16, 2013).
2253:
2227:
13:
3306:Title 18 of the United States Code
2607:Musil, Steven (January 15, 2013).
2254:Lee, Timothy B. (March 30, 2020).
2111:Kravets, David (August 20, 2013).
1667:Alexa O'Brien (December 5, 2013).
1648:David Gilbert (December 6, 2013).
705:United States v. Neil Scott Kramer
256:". They are defined under section
112:), which had been included in the
14:
3317:
2736:
1940:"United States v. Gilberto Valle"
1752:Kravets, David (April 24, 2013).
1399:Could become available on GovInfo
690:United States v Nada Nadim Prouty
685:and transporting stolen property.
577:Eleventh Circuit Court of Appeals
520:
484:: Investigative, protective, and
3162:Select Committee on Intelligence
2202:Farivar, Cyrus (July 12, 2016).
1991:Marks, Joseph (April 24, 2020).
1510:Varma, Corey (January 3, 2015).
909:brought a CFAA suit against the
801:Seventh Circuit Court of Appeals
412:: Committing fraud with computer
27:
3152:Federal Bureau of Investigation
2801:
2711:
2687:Dekel, Jonathan (May 1, 2014).
2680:
2657:
2600:
2516:
2475:
2442:. 27 Seton Hall Law Review 574.
2431:
2412:
2397:
2372:
2347:
2321:
2296:
2273:
2247:
2221:
2195:
2184:
2168:
2156:
2145:
2134:
2123:
2104:
2085:
2071:
2059:
2053:Center for Internet and Society
2040:
2012:
1984:
1958:
1932:
1921:
1902:
1846:
1834:
1822:
1806:
1781:
1764:
1745:
1729:
1715:
1698:
1679:
1660:
1641:
1616:
1590:
1578:
1564:
1029:
754:Second Circuit Court of Appeals
286:Criminal offenses under the Act
3230:Electronic Frontier Foundation
3210:American Civil Liberties Union
2919:Right to Financial Privacy Act
2438:Olivenbaum, Joseph M. (1997).
1944:Electronic Frontier Foundation
1909:Poulsen, Kevin (May 7, 2013).
1669:"Inside the 'PayPal 14' Trial"
1553:United States v. Morris (1991)
1529:
1503:
1475:
1447:
1415:
1378:
1343:
1318:
1197:McCarran Internal Security Act
969:Federal District Court of D.C.
768:
677:accused of copying code, like
588:United States v. Collins et al
581:Social Security Administration
528:United States v. Morris (1991)
154:and unwittingly almost starts
1:
2458:"Data Journalism and the Law"
1561:, 505 (2d Cir. 1991).
1277:
1114:alleges this occurred due to
823:, 2012. 3Taps was accused by
694:
612:United States v. Aaron Swartz
270:exclusively for the use of a
173:, while, in theory, limiting
3281:Information technology audit
3215:American Library Association
2940:Victims of Crime Act of 1984
2905:Money Laundering Control Act
2884:Computer Fraud and Abuse Act
2484:Wash. J. L. Tech. & Arts
1710:International Business Times
1654:International Business Times
1234:Information technology audit
975:
732:" under the statute (as the
565:against someone violating a
146:breaks into a U.S. military
22:Computer Fraud and Abuse Act
7:
3276:Hacking (computer security)
3266:98th United States Congress
3225:Center for Public Integrity
1597:Staff, Ars (July 2, 2009).
1214:LVRC Holdings LLC v. Brekka
1189:Defense Secrets Act of 1911
1177:
1022:around the CFAA increases.
460:: Conspiracy to violate (a)
49:United States Supreme Court
10:
3322:
3296:Fraud in the United States
3167:Department of the Treasury
2589:November 12, 2013, at the
2551:November 12, 2013, at the
2462:Columbia Journalism Review
2181:Retrieved 27 January 2013.
1036:Van Buren v. United States
1033:
959:Van Buren v. United States
761:Van Buren v. United States
573:United States v. Rodriguez
544:United States v. Lori Drew
242:Van Buren v. United States
61:Van Buren v. United States
3200:
3142:
2956:
2926:Fair Credit Reporting Act
2861:
2809:
2280:Curtiss, Tiffany (2016),
1772:"Nos. 14-10037, 14-10275"
1297:"Prosecution of Computer"
1262:Telecommunications Policy
1105:House Oversight Committee
1101:House Judiciary Committee
917:, LIUNA urged members to
779:Stored Communications Act
660:and had accused CISCO of
199:denial-of-service attacks
55:
47:
40:
35:
26:
3240:Humanitarian Law Project
1395:Metadata on Congress.gov
1364:10.1177/1527476408323345
1352:Television and New Media
1585:US v Lori Drew, psu.edu
885:( taking info from any
845:cease-and-desist letter
812:LVRC Holdings v. Brekka
796:§ 1030(a)(5)(A)(i)
499:private right of action
2574:July 15, 2018, at the
2536:July 15, 2018, at the
2456:Baranetsky, Victoria.
2055:. Stanford University.
1052:
1002:free-culture activists
775:Theofel v. Farey Jones
749:United States v. Valle
679:high-frequency trading
636:United States v. Nosal
601:Wau Holland Foundation
183:financial institutions
3271:Computing legislation
3157:Department of Justice
2419:Simmons, Ric (2016).
2286:Washington Law Review
2101:, September 18, 2009.
1829:US v Sergey Aleynikov
1815:Indictment. see also
1193:Espionage Act of 1917
1040:
857:acceptable use policy
716:, 2011. Exploiting a
713:United States v. Kane
374:Espionage Act of 1917
272:financial institution
236:, and Representative
3261:1986 in American law
2761:US Statutes at Large
2668:. Huffingtonpost.com
1793:www.supremecourt.gov
1789:"Docket for 16-1344"
1738:, By David Kravets,
1726:, uscourts.gov, 2011
1587:Kyle Joseph Sassman,
1559:928 F.2d 504
1250:The Hacker Crackdown
950:HiQ Labs v. LinkedIn
882:§ 1030(a)(2)(c)
625:MAC address spoofing
562:§ 1030(a)(2)(C)
266:to mean a computer:
175:federal jurisdiction
3177:Department of State
2379:Christian Sandvig;
2359:A Voice from Prison
2308:A Voice from Prison
1998:The Washington Post
1972:. December 10, 2015
1712:, January 15, 2013.
1112:Brian Knappenberger
897:system furthermore.
820:Craigslist v. 3Taps
738:interstate commerce
254:protected computers
248:Protected computers
205:and similar items.
171:intangible property
118:mail and wire fraud
23:
2699:on October 3, 2018
1890:on August 16, 2011
1463:. January 20, 2015
1431:. January 13, 2015
1257:Protected computer
1133:Amendments history
1116:Oracle Corporation
982:breach of contract
887:protected computer
730:protected computer
641:protected computer
179:federal government
21:
3291:Fraud legislation
3248:
3247:
2749:, text of the law
2381:Karrie Karahalios
2335:. August 13, 2020
2066:US v Jacob Citrin
1572:U.S. v. Lori Drew
1441:National Archives
1221:In re DoubleClick
1168:§ 1030(e)(2)
1153:§ 1030(a)(7)
852:Lee v. PMSI, Inc.
841:anonymous proxies
605:Operation Payback
445:§ 1030(a)(7)
433:§ 1030(a)(6)
421:§ 1030(a)(5)
409:§ 1030(a)(4)
397:§ 1030(a)(3)
385:§ 1030(a)(2)
369:§ 1030(a)(1)
358:Specific sections
263:§ 1030(e)(2)
160:personal computer
140:Matthew Broderick
83:
82:
3313:
3129:John Conyers Jr.
3009:Michael Chertoff
2994:Dianne Feinstein
2974:Alberto Gonzales
2912:Bank Secrecy Act
2796:
2789:
2782:
2773:
2772:
2731:
2715:
2709:
2708:
2706:
2704:
2695:. Archived from
2684:
2678:
2677:
2675:
2673:
2661:
2655:
2654:
2652:
2650:
2633:
2624:
2623:
2621:
2619:
2604:
2598:
2520:
2514:
2513:
2501:
2492:
2491:
2479:
2473:
2472:
2470:
2468:
2453:
2444:
2443:
2435:
2429:
2428:
2416:
2410:
2401:
2395:
2394:
2383:(July 1, 2006).
2376:
2370:
2369:
2367:
2365:
2351:
2345:
2344:
2342:
2340:
2325:
2319:
2318:
2316:
2314:
2300:
2294:
2293:
2277:
2271:
2270:
2268:
2266:
2251:
2245:
2244:
2242:
2240:
2225:
2219:
2218:
2216:
2214:
2199:
2193:
2188:
2182:
2172:
2166:
2160:
2154:
2149:
2143:
2138:
2132:
2127:
2121:
2120:
2108:
2102:
2092:Kravets, David,
2089:
2083:
2075:
2069:
2068:, openjurist.org
2063:
2057:
2056:
2044:
2038:
2037:
2035:
2033:
2016:
2010:
2009:
2007:
2005:
1988:
1982:
1981:
1979:
1977:
1962:
1956:
1955:
1953:
1951:
1936:
1930:
1925:
1919:
1918:
1906:
1900:
1899:
1897:
1895:
1889:
1883:. Archived from
1882:
1874:
1868:
1862:
1856:
1850:
1844:
1838:
1832:
1826:
1820:
1810:
1804:
1803:
1801:
1799:
1785:
1779:
1778:
1776:
1768:
1762:
1761:
1749:
1743:
1742:, April 29, 2011
1733:
1727:
1719:
1713:
1702:
1696:
1683:
1677:
1676:
1664:
1658:
1657:
1645:
1639:
1638:
1636:
1634:
1620:
1614:
1613:
1611:
1609:
1594:
1588:
1582:
1576:
1568:
1562:
1556:
1548:
1542:
1541:
1533:
1527:
1526:
1524:
1522:
1507:
1501:
1500:
1498:
1496:
1479:
1473:
1472:
1470:
1468:
1451:
1445:
1444:
1438:
1436:
1419:
1413:
1412:
1402:
1387:Transcribed in:
1386:
1382:
1376:
1375:
1347:
1341:
1340:
1338:
1336:
1322:
1316:
1315:
1313:
1311:
1301:
1292:
1086:terms of service
1084:) would exclude
1060:
998:disproportionate
986:terms of service
944:cease and desist
884:
798:
699:
696:
670:Sergey Aleynikov
668:United States v
662:anti-competitive
631:in January 2013.
567:terms of service
564:
511:equitable relief
483:
471:
459:
447:
435:
423:
411:
399:
387:
371:
265:
36:Major amendments
31:
24:
20:
3321:
3320:
3316:
3315:
3314:
3312:
3311:
3310:
3251:
3250:
3249:
3244:
3202:
3196:
3187:Customs Service
3144:
3138:
3099:Dennis Kucinich
3039:Jay Rockefeller
2952:
2857:
2805:
2800:
2739:
2734:
2716:
2712:
2702:
2700:
2685:
2681:
2671:
2669:
2662:
2658:
2648:
2646:
2634:
2627:
2617:
2615:
2605:
2601:
2591:Wayback Machine
2576:Wayback Machine
2553:Wayback Machine
2538:Wayback Machine
2521:
2517:
2510:Huffington Post
2502:
2495:
2480:
2476:
2466:
2464:
2454:
2447:
2436:
2432:
2417:
2413:
2402:
2398:
2377:
2373:
2363:
2361:
2353:
2352:
2348:
2338:
2336:
2333:www.justice.gov
2327:
2326:
2322:
2312:
2310:
2302:
2301:
2297:
2278:
2274:
2264:
2262:
2252:
2248:
2238:
2236:
2226:
2222:
2212:
2210:
2200:
2196:
2189:
2185:
2173:
2169:
2161:
2157:
2150:
2146:
2139:
2135:
2128:
2124:
2109:
2105:
2090:
2086:
2076:
2072:
2064:
2060:
2045:
2041:
2031:
2029:
2017:
2013:
2003:
2001:
1989:
1985:
1975:
1973:
1964:
1963:
1959:
1949:
1947:
1946:. March 6, 2015
1938:
1937:
1933:
1926:
1922:
1907:
1903:
1893:
1891:
1887:
1880:
1876:
1875:
1871:
1863:
1859:
1851:
1847:
1839:
1835:
1827:
1823:
1811:
1807:
1797:
1795:
1787:
1786:
1782:
1774:
1770:
1769:
1765:
1750:
1746:
1734:
1730:
1720:
1716:
1703:
1699:
1684:
1680:
1673:The Daily Beast
1665:
1661:
1646:
1642:
1632:
1630:
1622:
1621:
1617:
1607:
1605:
1595:
1591:
1583:
1579:
1569:
1565:
1550:
1549:
1545:
1534:
1530:
1520:
1518:
1508:
1504:
1494:
1492:
1480:
1476:
1466:
1464:
1460:Huffington Post
1453:
1452:
1448:
1434:
1432:
1421:
1420:
1416:
1404:
1403:Reproduced in:
1383:
1379:
1348:
1344:
1334:
1332:
1324:
1323:
1319:
1309:
1307:
1299:
1293:
1284:
1280:
1180:
1135:
1062:
1059:, Jan 15, 2013
1054:
1038:
1032:
978:
965:Sandvig v. Barr
876:
799:, in which the
790:
771:
697:
556:
523:
495:
475:
463:
451:
439:
427:
415:
403:
391:
379:
363:
360:
288:
257:
250:
210:USA PATRIOT Act
79:
42:USA Patriot Act
17:
12:
11:
5:
3319:
3309:
3308:
3303:
3298:
3293:
3288:
3283:
3278:
3273:
3268:
3263:
3246:
3245:
3243:
3242:
3237:
3232:
3227:
3222:
3217:
3212:
3206:
3204:
3201:Non-government
3198:
3197:
3195:
3194:
3189:
3184:
3179:
3174:
3169:
3164:
3159:
3154:
3148:
3146:
3140:
3139:
3137:
3136:
3131:
3126:
3121:
3119:Bernie Sanders
3116:
3114:Richard Durbin
3111:
3109:John E. Sununu
3106:
3101:
3096:
3091:
3089:Lisa Murkowski
3086:
3081:
3076:
3071:
3066:
3061:
3056:
3051:
3046:
3041:
3036:
3031:
3026:
3021:
3016:
3011:
3006:
3001:
2996:
2991:
2986:
2981:
2976:
2971:
2966:
2964:George W. Bush
2960:
2958:
2954:
2953:
2951:
2950:
2943:
2936:
2929:
2922:
2915:
2908:
2901:
2894:
2887:
2880:
2873:
2865:
2863:
2859:
2858:
2810:
2807:
2806:
2799:
2798:
2791:
2784:
2776:
2770:
2769:
2763:
2750:
2743:18 U.S.C.
2738:
2737:External links
2735:
2733:
2732:
2718:H.R. 1918
2710:
2679:
2656:
2625:
2599:
2523:H.R. 2454
2515:
2493:
2474:
2445:
2430:
2411:
2396:
2371:
2346:
2320:
2295:
2272:
2246:
2220:
2194:
2183:
2167:
2155:
2144:
2133:
2122:
2103:
2084:
2070:
2058:
2039:
2011:
1983:
1957:
1931:
1920:
1901:
1869:
1857:
1853:Plea Agreement
1845:
1833:
1821:
1805:
1780:
1763:
1744:
1728:
1714:
1697:
1690:New York Times
1678:
1659:
1640:
1615:
1589:
1577:
1563:
1543:
1528:
1516:CoreyCarma.com
1502:
1474:
1446:
1428:whitehouse.gov
1414:
1409:(U.S.C.C.A.N.)
1391:H.R. 5616
1377:
1358:(6): 487–513.
1342:
1317:
1281:
1279:
1276:
1275:
1274:
1269:
1264:
1259:
1254:
1246:
1244:Computer fraud
1241:
1236:
1231:
1224:
1217:
1210:
1205:
1200:
1186:
1179:
1176:
1175:
1174:
1171:
1164:18 U.S.C.
1160:
1157:
1149:18 U.S.C.
1145:
1142:
1134:
1131:
1123:H.R. 1918
1078:H.R. 2454
1039:
1031:
1028:
977:
974:
973:
972:
962:
947:
937:
898:
860:
848:
816:
808:
782:
770:
767:
766:
765:
757:
745:
709:
701:
686:
665:
645:
632:
608:
584:
570:
540:
522:
521:Criminal cases
519:
494:
491:
490:
489:
481:§ 1030(f)
473:
469:§ 1030(c)
461:
457:§ 1030(b)
449:
437:
425:
413:
401:
389:
377:
359:
356:
355:
354:
353:
352:
349:
346:
340:
339:
338:
335:
329:
328:
327:
324:
321:
315:
312:
309:
308:
307:
304:
301:
295:
287:
284:
280:
279:
275:
249:
246:
224:organizer and
195:malicious code
106:18 U.S.C.
102:computer fraud
81:
80:
78:
77:
76:___ (2021)
56:
53:
52:
45:
44:
38:
37:
33:
32:
15:
9:
6:
4:
3:
2:
3318:
3307:
3304:
3302:
3299:
3297:
3294:
3292:
3289:
3287:
3284:
3282:
3279:
3277:
3274:
3272:
3269:
3267:
3264:
3262:
3259:
3258:
3256:
3241:
3238:
3236:
3233:
3231:
3228:
3226:
3223:
3221:
3218:
3216:
3213:
3211:
3208:
3207:
3205:
3203:organizations
3199:
3193:
3190:
3188:
3185:
3183:
3180:
3178:
3175:
3173:
3170:
3168:
3165:
3163:
3160:
3158:
3155:
3153:
3150:
3149:
3147:
3145:organizations
3141:
3135:
3132:
3130:
3127:
3125:
3122:
3120:
3117:
3115:
3112:
3110:
3107:
3105:
3102:
3100:
3097:
3095:
3092:
3090:
3087:
3085:
3082:
3080:
3079:Ellen Huvelle
3077:
3075:
3074:Russ Feingold
3072:
3070:
3067:
3065:
3062:
3060:
3059:Paul Sarbanes
3057:
3055:
3052:
3050:
3047:
3045:
3044:Arlen Specter
3042:
3040:
3037:
3035:
3032:
3030:
3027:
3025:
3024:Chuck Schumer
3022:
3020:
3017:
3015:
3012:
3010:
3007:
3005:
3002:
3000:
2997:
2995:
2992:
2990:
2987:
2985:
2982:
2980:
2979:Patrick Leahy
2977:
2975:
2972:
2970:
2969:John Ashcroft
2967:
2965:
2962:
2961:
2959:
2955:
2949:
2948:
2944:
2942:
2941:
2937:
2935:
2934:
2930:
2928:
2927:
2923:
2921:
2920:
2916:
2914:
2913:
2909:
2907:
2906:
2902:
2900:
2899:
2895:
2893:
2892:
2888:
2886:
2885:
2881:
2879:
2878:
2874:
2872:
2871:
2867:
2866:
2864:
2862:Acts modified
2860:
2856:
2852:
2848:
2844:
2840:
2836:
2832:
2828:
2824:
2820:
2816:
2813:
2808:
2804:
2797:
2792:
2790:
2785:
2783:
2778:
2777:
2774:
2767:
2764:
2762:
2758:
2754:
2751:
2748:
2744:
2741:
2740:
2730:
2726:
2723:
2719:
2714:
2698:
2694:
2690:
2683:
2667:
2660:
2645:
2644:
2639:
2632:
2630:
2614:
2610:
2603:
2596:
2592:
2588:
2585:
2581:
2577:
2573:
2570:
2566:
2562:
2558:
2554:
2550:
2547:
2543:
2539:
2535:
2532:
2528:
2524:
2519:
2511:
2507:
2500:
2498:
2489:
2485:
2478:
2463:
2459:
2452:
2450:
2441:
2434:
2426:
2422:
2415:
2409:
2405:
2400:
2392:
2391:
2386:
2382:
2375:
2360:
2356:
2350:
2334:
2330:
2324:
2309:
2305:
2299:
2291:
2287:
2283:
2276:
2261:
2257:
2250:
2235:
2231:
2224:
2209:
2205:
2198:
2192:
2187:
2180:
2178:
2175:Hall, Brian,
2171:
2164:
2159:
2153:
2148:
2142:
2137:
2131:
2126:
2118:
2114:
2107:
2100:
2096:
2095:
2088:
2081:
2080:
2079:U.S. v Brekka
2074:
2067:
2062:
2054:
2050:
2043:
2028:
2027:
2022:
2015:
2000:
1999:
1994:
1987:
1971:
1970:Jackson Lewis
1967:
1961:
1945:
1941:
1935:
1929:
1924:
1916:
1912:
1905:
1886:
1879:
1873:
1866:
1861:
1854:
1849:
1842:
1837:
1830:
1825:
1818:
1814:
1809:
1794:
1790:
1784:
1773:
1767:
1759:
1755:
1748:
1741:
1737:
1732:
1725:
1724:
1723:U.S. v. Nosal
1718:
1711:
1707:
1701:
1695:
1691:
1688:
1682:
1674:
1670:
1663:
1655:
1651:
1644:
1629:
1625:
1619:
1604:
1600:
1593:
1586:
1581:
1574:
1573:
1567:
1560:
1555:
1554:
1547:
1539:
1538:"18 USC 1030"
1532:
1517:
1513:
1506:
1491:
1490:
1485:
1478:
1462:
1461:
1456:
1450:
1442:
1430:
1429:
1424:
1418:
1410:
1408:
1400:
1396:
1392:
1381:
1373:
1369:
1365:
1361:
1357:
1353:
1346:
1331:
1327:
1321:
1305:
1298:
1291:
1289:
1287:
1282:
1273:
1270:
1268:
1265:
1263:
1260:
1258:
1255:
1252:
1251:
1247:
1245:
1242:
1240:
1237:
1235:
1232:
1230:
1229:
1225:
1223:
1222:
1218:
1216:
1215:
1211:
1209:
1206:
1204:
1201:
1198:
1194:
1190:
1187:
1185:
1182:
1181:
1172:
1169:
1165:
1161:
1158:
1154:
1150:
1146:
1143:
1140:
1139:
1138:
1130:
1128:
1124:
1119:
1117:
1113:
1108:
1106:
1102:
1099:(also on the
1098:
1094:
1089:
1087:
1083:
1079:
1075:
1071:
1067:
1061:
1058:
1051:
1047:
1044:
1037:
1027:
1023:
1019:
1015:
1013:
1009:
1005:
1003:
999:
995:
991:
987:
983:
970:
966:
963:
960:
955:
951:
948:
945:
941:
938:
935:
934:Sixth Circuit
931:
928:
924:
920:
916:
912:
908:
904:
903:
899:
896:
895:PlayStation 3
892:
888:
883:
879:
874:
870:
866:
865:
861:
858:
854:
853:
849:
846:
842:
838:
834:
830:
826:
822:
821:
817:
814:
813:
809:
806:
805:deleted files
802:
797:
793:
788:
787:
783:
780:
776:
773:
772:
763:
762:
758:
755:
751:
750:
746:
743:
739:
735:
734:poker machine
731:
727:
726:poker machine
723:
722:poker machine
719:
715:
714:
710:
707:
706:
702:
692:
691:
687:
684:
683:trade secrets
680:
676:
675:Goldman Sachs
672:
671:
666:
663:
659:
655:
651:
650:
646:
642:
638:
637:
633:
630:
626:
622:
618:
614:
613:
609:
606:
602:
598:
594:
590:
589:
585:
582:
579:ruled that a
578:
574:
571:
568:
563:
559:
554:
550:
549:cyberbullying
546:
545:
541:
538:
537:computer worm
534:
530:
529:
525:
524:
518:
516:
515:trade secrets
512:
508:
504:
500:
487:
482:
478:
474:
470:
466:
462:
458:
454:
450:
446:
442:
438:
434:
430:
426:
422:
418:
414:
410:
406:
402:
398:
394:
390:
386:
382:
378:
375:
370:
366:
362:
361:
350:
347:
344:
343:
341:
336:
333:
332:
330:
325:
322:
319:
318:
316:
313:
310:
305:
302:
299:
298:
296:
293:
292:
291:
290:(a) Whoever—
283:
276:
273:
269:
268:
267:
264:
260:
255:
245:
243:
239:
235:
231:
227:
223:
219:
215:
211:
206:
204:
200:
196:
192:
188:
184:
180:
176:
172:
168:
163:
161:
157:
156:World War III
153:
149:
148:supercomputer
145:
141:
137:
136:
131:
127:
121:
119:
115:
111:
107:
103:
99:
98:cybersecurity
96:
95:United States
92:
88:
75:
71:
67:
63:
62:
58:
57:
54:
50:
46:
43:
39:
34:
30:
25:
19:
3124:Jerry Nadler
3014:Barack Obama
2999:Viet D. Dinh
2945:
2938:
2931:
2924:
2917:
2910:
2903:
2896:
2889:
2883:
2882:
2875:
2868:
2811:
2755:as enacted (
2729:Congress.gov
2725:S. 1030
2722:Congress.gov
2713:
2701:. Retrieved
2697:the original
2692:
2682:
2670:. Retrieved
2659:
2647:. Retrieved
2641:
2616:. Retrieved
2612:
2602:
2595:OpenCongress
2565:Congress.gov
2561:S. 1196
2557:OpenCongress
2527:Congress.gov
2518:
2509:
2487:
2483:
2477:
2465:. Retrieved
2461:
2439:
2433:
2424:
2414:
2399:
2390:The Guardian
2388:
2374:
2362:. Retrieved
2358:
2349:
2337:. Retrieved
2332:
2323:
2311:. Retrieved
2307:
2298:
2289:
2285:
2275:
2263:. Retrieved
2260:Ars Technica
2259:
2249:
2237:. Retrieved
2234:Ars Technica
2233:
2223:
2211:. Retrieved
2208:Ars Technica
2207:
2197:
2186:
2176:
2170:
2163:techdirt.com
2158:
2147:
2136:
2125:
2116:
2106:
2098:
2093:
2087:
2078:
2073:
2061:
2052:
2042:
2030:. Retrieved
2024:
2014:
2002:. Retrieved
1996:
1986:
1974:. Retrieved
1969:
1960:
1948:. Retrieved
1943:
1934:
1923:
1914:
1904:
1892:. Retrieved
1885:the original
1872:
1860:
1848:
1836:
1824:
1813:US v Adekeye
1808:
1796:. Retrieved
1792:
1783:
1766:
1757:
1747:
1739:
1731:
1722:
1717:
1704:Dave Smith,
1700:
1689:
1681:
1672:
1662:
1653:
1643:
1631:. Retrieved
1627:
1618:
1606:. Retrieved
1603:Ars Technica
1602:
1592:
1580:
1571:
1566:
1551:
1546:
1531:
1519:. Retrieved
1515:
1505:
1493:. Retrieved
1487:
1477:
1465:. Retrieved
1458:
1449:
1439:– via
1433:. Retrieved
1426:
1417:
1405:
1380:
1355:
1351:
1345:
1335:November 13,
1333:. Retrieved
1329:
1320:
1308:. Retrieved
1303:
1248:
1226:
1219:
1212:
1136:
1127:S. 1030
1120:
1109:
1093:Darrell Issa
1090:
1082:S. 1196
1066:Aaron Swartz
1063:
1053:
1048:
1045:
1041:
1030:Aaron Swartz
1024:
1020:
1016:
1010:
1006:
979:
967:, 2020. The
964:
939:
927:email system
900:
873:jailbreaking
869:Hotz v. SCEA
868:
862:
850:
818:
810:
784:
774:
759:
752:, 2015. The
747:
718:software bug
711:
703:
688:
667:
647:
634:
617:Aaron Swartz
610:
586:
575:, 2010. The
572:
547:, 2009. The
542:
526:
503:compensation
496:
486:intelligence
289:
281:
251:
214:Barack Obama
207:
191:section 1030
190:
187:contract law
164:
133:
122:
90:
86:
84:
59:
18:
3134:Butch Otter
3104:Larry Craig
3069:Tom Daschle
3029:Lamar Smith
3019:Eric Holder
2984:Orrin Hatch
2803:Patriot Act
2747:§ 1030
2672:January 16,
2649:January 16,
2618:October 19,
2467:October 16,
2364:October 25,
2339:October 25,
2313:October 25,
1467:January 30,
1435:January 30,
1330:www.pbs.org
1304:justice.gov
1097:Jared Polis
1074:Zoe Lofgren
1057:Zoe Lofgren
990:misdemeanor
907:Pulte Homes
769:Civil cases
698: 2010
535:, an early
533:Morris worm
501:, allowing
472:: Penalties
238:Zoe Lofgren
230:Marc Rogers
228:researcher
181:or certain
152:nuclear war
110:§ 1030
3255:Categories
3143:Government
3064:Trent Lott
3054:Dick Armey
3049:Mike Oxley
3034:Bob Graham
2408:1030(a)(4)
1694:Indictment
1278:References
1184:Cybercrime
1034:See also:
825:Craigslist
742:wire fraud
664:practices.
507:injunctive
488:activities
232:, Senator
226:Cloudflare
3094:Ron Wyden
3004:Joe Biden
2759:) in the
2693:Postmedia
2613:CNET News
2546:H.R. 2454
2531:H.R. 2454
2404:18 U.S.C.
2265:March 31,
2239:March 31,
2213:March 31,
1976:March 31,
1950:March 31,
1894:March 18,
1798:March 31,
1633:March 31,
1608:March 31,
1372:146669305
1267:WikiLeaks
1156:computer;
1147:Expanded
976:Criticism
921:and send
878:18 U.S.C.
792:18 U.S.C.
654:CISCO IOS
599:over the
597:WikiLeaks
593:Anonymous
558:18 U.S.C.
509:or other
477:18 U.S.C.
465:18 U.S.C.
453:18 U.S.C.
441:18 U.S.C.
429:18 U.S.C.
417:18 U.S.C.
405:18 U.S.C.
393:18 U.S.C.
381:18 U.S.C.
365:18 U.S.C.
259:18 U.S.C.
234:Ron Wyden
203:passwords
3084:Ron Paul
2727: at
2720: at
2643:The Hill
2587:Archived
2580:GovTrack
2572:Archived
2563: at
2549:Archived
2542:GovTrack
2534:Archived
2525: at
2004:July 15,
1575:, scribd
1521:June 10,
1489:Politico
1178:See also
954:scraping
829:IP block
789:, 2006,
658:Multiven
615:, 2011.
218:RICO Act
167:tort law
135:WarGames
2989:Jon Kyl
2855:History
2757:details
2584:S. 1196
2569:S. 1196
2032:June 3,
1628:Findlaw
1495:June 3,
1310:June 3,
992:into a
930:crashed
744:charge.
629:suicide
553:MySpace
222:DEF CON
144:Seattle
142:) from
130:Telenet
128:-owned
93:) is a
3172:FinCEN
2957:People
2812:Titles
2745:
2703:May 1,
1557:,
1370:
1166:
1151:
1055:—Rep.
1012:Tim Wu
994:felony
946:order.
932:. The
905:2011.
880:
837:Breyer
833:scrape
794:
560:
479:
467:
455:
443:
431:
419:
407:
395:
383:
367:
261:
108:
68:,
66:19-783
64:, No.
2117:Wired
2099:Wired
1915:Wired
1888:(PDF)
1881:(PDF)
1775:(PDF)
1758:Wired
1740:Wired
1368:S2CID
1300:(PDF)
1137:2008
1070:JSTOR
923:email
915:union
720:in a
621:JSTOR
104:law (
72:
51:cases
2843:VIII
2705:2014
2674:2013
2651:2013
2620:2021
2490:(2).
2469:2020
2366:2022
2341:2022
2315:2022
2267:2020
2241:2020
2215:2020
2082:2009
2034:2021
2006:2020
1978:2020
1952:2020
1896:2012
1800:2020
1685:See
1635:2020
1610:2020
1523:2015
1497:2021
1469:2015
1437:2015
1337:2021
1312:2013
1272:Weev
1199:1950
1095:and
919:call
893:the
891:hack
867:and
505:and
317:(5)
197:and
91:CFAA
85:The
74:U.S.
2839:VII
2823:III
2593:at
2578:at
2555:at
2540:at
2292:(4)
2026:CNN
1360:doi
984:or
517:).
278:...
169:to
162:."
126:GTE
70:593
3257::
2853:·
2849:·
2847:IX
2845:·
2841:·
2837:·
2835:VI
2833:·
2829:·
2827:IV
2825:·
2821:·
2819:II
2817:·
2691:.
2640:.
2628:^
2611:.
2582:;
2567:;
2559:.
2544:;
2529:;
2508:.
2496:^
2488:18
2486:.
2460:.
2448:^
2423:.
2406:§
2387:.
2357:.
2331:.
2306:.
2290:91
2288:,
2284:,
2258:.
2232:.
2206:.
2115:.
2097:,
2051:.
2023:.
1995:.
1968:.
1942:.
1913:.
1791:.
1756:.
1708:,
1671:.
1652:.
1626:.
1601:.
1514:.
1486:.
1457:.
1425:.
1397:.
1393:.
1366:.
1354:.
1328:.
1302:.
1285:^
1195:/
1191:/
1125:,
1080:,
695:c.
693:,
220:.
2851:X
2831:V
2815:I
2795:e
2788:t
2781:v
2707:.
2676:.
2653:.
2622:.
2597:.
2512:.
2471:.
2427:.
2393:.
2368:.
2343:.
2317:.
2269:.
2243:.
2217:.
2119:.
2036:.
2008:.
1980:.
1954:.
1917:.
1898:.
1802:.
1777:.
1760:.
1675:.
1656:.
1637:.
1612:.
1540:.
1525:.
1499:.
1471:.
1443:.
1401:.
1374:.
1362::
1356:9
1339:.
1314:.
781:.
89:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.