Computer Fraud and Abuse Act

Computer Fraud and Abuse Act

Computer Fraud and Abuse Act
by Charles Doyle, en.wikipedia.org
July 12th 2007
The Computer Fraud and Abuse Act is a law passed by the United States Congress in 1986, intended to reduce cracking of computer systems and to address federal computer-related offenses. The Act (codified as 18 U.S.C. § 1030) governs cases with a compelling federal interest, where computers of the federal government or certain financial institutions are involved, where the crime itself is interstate in nature, or where computers are used in interstate and foreign commerce.

It was amended in 1988, 1994, 1996, in 2001 by the USA PATRIOT Act, 2002, and in 2008 by the Identity Theft Enforcement and Restitution Act. Subsection (b) of the Act punishes anyone who not only commits or attempts to commit an offense under the Act, but also those who conspire to do so.

Protected computers

The CFAA defines a “protected computer” under 18 U.S.C. § 1030(e)(2) to mean a computer:

exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or
which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States;
Criminal offenses under the Act

Knowingly accessing a computer without authorization in order to obtain national security data
Intentionally accessing a computer without authorization to obtain:
Information contained in a financial record of a financial institution, or contained in a file of a consumer reporting agency on a consumer;
Information from any department or agency of the United States; or
Information from any protected computer.
Intentionally accessing without authorization a government computer and affecting the use of the government’s operation of the computer.
Knowingly accessing a protected computer with the intent to defraud and there by obtaining anything of value.
Knowingly causing the transmission of a program, information, code, or command that causes damage or intentionally accessing a computer without authorization, and as a result of such conduct, causes damage that results in:
Loss to one or more persons during any one-year period aggregating at least $5,000 in value.
The modification or impairment, or potential modification or impairment, of the medical examination, diagnosis, treatment, or care of one or more individuals.
Physical injury to any person.
A threat to public health or safety.
Damage affecting a government computer system
Knowingly and with the intent to defraud, trafficking in a password or similar information through which a computer may be accessed without authorization.????
Specific sections

18 U.S.C. § 1030(a)(1): Computer Espionage
18 U.S.C. § 1030(a)(2): Computer tresspassing, and taking government, financial, or commerce info
18 U.S.C. § 1030(a)(3): Computer tresspassing in a government computer
18 U.S.C. § 1030(a)(4): Committing fraud with a protected computer
18 U.S.C. § 1030(a)(5): Damaging a protected computer (including viruses, worms)
18 U.S.C. § 1030(a)(6): Trafficking in passwords of a government or commerce computer
18 U.S.C. § 1030(a)(7): Threatening to damage a protected computer
18 U.S.C. § 1030(b): Conspiracy to violate (a)
18 U.S.C. § 1030(c): Penalties
18 U.S.C. § 1030(d) thru h: Miscellaney
Notable cases and decisions referring to the Act

United States v. Riggs, the famous case against people associated with Phrack magazine for taking the E911 document, as described in Bruce Sterling’s “Hacker Crackdown of 1990”. The government dropped the case after it was revealed that the document was for sale from AT&T for $13. The E911 document was related to the founding of the Electronic Frontier Foundation.[1]
United States v. Morris, 928 F.2d 504, decided March 7, 1991. After the release of the Morris worm, an early computer worm, its creator was convicted under the Act for causing damage and gaining unauthorized access to federal interest computers. This case in part led to the 1996 amendment of the act, which clarified the language that was argued during the case.[2]
Theofel v. Farey Jones, 2003 U.S. App. Lexis 17963, decided August 28, 2003 (U.S. Court of Appeals for the Ninth Circuit). Using a civil subpoena which is “patently unlawful”, “bad faith” and “at least gross negligence” to gain access to stored email is a breach of this act and the Stored Communications Act.[3]
International Airport Centers, L.L.C. v. Citrin, 2006, 18 U.S.C. § 1030(a)(5)(A)(i). Jacob Citrin deleted files off his company computer before he quit, in order to hide his alleged bad behavior while an employee. [4]
LVRC Holdings v. Brekka, 2009 1030(a)(2), 1030(a)(4). LVRC sued Brekka for allegedly taking information about clients and using it to start his own competing business. [5][6]
Robbins v. Lower Merion School District (U.S. Eastern District of Pennsylvania), where plaintiffs charged two suburban Philadelphia high schools secretly spied on students by surreptitiously and remotely activating webcams embedded in school-issued laptops the students were using at home, violating the Act. The schools admitted to secretly snapping over 66,000 webshots and screenshots, including webcam shots of students in their bedrooms.[7][8]
United States v. Lori Drew, 2008. The ‘cyberbullying’ case involving the suicide of a girl harassed on myspace. Charges were under 18 USC 1030(a)(2)(c) and (b)(2)(c). Judge Wu decided that using 18 U.S.C. § 1030(a)(2)(C) against someone violating a ‘terms of service’ agreement would make the law overly broad. 259 F.R.D. 449 [9][10]
People v. SCEA, 2010. Class action lawsuit against SCEA for removing OtherOS, the ability to install and run Linux (or other operating systems) on the PlayStation 3. Consumers were given the option to either keep OtherOS support or not. SCEA was allegedly in violation of this Act because if the consumers updated or not, they would still lose system functionality.[11]
Sony Computer Entertainment America v. George Hotz and Hotz v. SCEA, 2011. SCEA sued ‘Geohot’ and others for jailbreaking the PlayStation 3 system. The lawsuit alleged, among other things, that Hotz violated 18 U.S.C. § 1030(a)(2)(c) ([by] taking info from any protected computer). Hotz denied liability and contested the Court’s exercise of personal jurisdiction over him. [12] The parties settled out of court. The settlement caused Geohot to be unable to legally hack the Playstation 3 system furthermore.
United States v. Nosal, 2011. Nosal and others allegedly accessed a protected computer to take a database of contacts from his previous employer for use in his own business, violating 1030(a)(4)[13][14]
United States v. Drake, 2010. Drake was part of a whistle-blowing effort inside the NSA to expose waste, fraud, and abuse with the Trailblazer Project. He talked to a reporter about the project. He was originally charged with five Espionage Act counts for doing this. These charges were dropped just before his trial was to begin, and instead he pleaded guilty to one misdemeanor count of violating the CFAA, (a)(2), unauthorized access. One of his advisors, Jesselyn Radack of the Government Accountability Project, called his work an “act of civil disobedience”.[15]
United States v. Bradley Manning, 2010-. Bradley Manning was a soldier who allegedly disclosed tens of thousands of documents to those ‘not entitled to receive’ them. Among the 34 counts against him, there are several under (a)(1) and (a)(2) of the CFAA, some specifically linked to files like the Reykjavic 13 State Department cable and a video of the July 12, 2007 Baghdad airstrike. [16]
Grand Jury investigation in Cambridge, 2011. Unknown persons in Cambridge, Massachusetts, were ordered to attend Grand Jury hearings regarding charges under the CFAA, as well as the Espionage Act. Journalist Glenn Greenwald has written these were likely related to Wikileaks. [17]
United States v. Aaron Swartz, 2011. Aaron Swartz allegedly entered an MIT wiring closet and set up a laptop to mass-download articles from JSTOR, which he later used in an academic study. He allegedly avoided various attempts by JSTOR and MIT to stop this, such as MAC address spoofing. The CFAA statutes against him were (a)(2), (a)(4), (c)(2)(B)(iii), (a)(5)(B), and (c)(4)(A)(i)(I),(VI). [18]
United States v. Peter Alfred-Adekeye 2011. Adekeye allegedly violated (a)(2), when he allegedly downloaded CISCO iOS, allegedly something that the CISCO employee who gave him an access password did not permit. Adekeye was CEO of Multiven and had accused CISCO of anti-competitive practices.[19]
Pulte Homes v. Laborer’s International Union of North America et al. 2011. Pelte company fired a LIUNA employee, resulting in a labor dispute with LIUNA. LIUNA told its members to email and phone the company and tell it how they felt. This resulted in a CFAA charge because the company’s email system got overloaded. [20]
United States v Sergey Aleynikov, 2011. Aleynikov was a programmer at Goldman Sachs accused of copying code, like high-frequency trading code, allegedly in violation of 1030(a)(2)(c) and 1030(c)(2)(B)i-iii and 2. This charge was later dropped, and he was instead charged with theft of trade secrets and transporting stolen property.[21][22]
United States v Nada Nadim Prouty, circa 2010. [23] Prouty was an FBI and CIA agent who was prosecuted for having a fraudulent marriage to get US residency. She claims she was persecuted by a US attorney who was trying to gain media coverage by calling her a terrorist agent and get himself promoted to a federal judgeship. [24]
United States v. Neil Scott Kramer, 2011. Kramer was a court case where a cellphone was used to coerce a minor into engaging sex with an adult. Central to the case was whether a cellphone constituted a computer device. Ultimately, the United States Court of Appeals for the Eighth Circuit found that a cell phone can be considered a computer if “the phone perform[s] arithmetic, logical, and storage functions,” paving the way for harsher consequences for criminals engaging with minors over cellphones. [25]
See also

Defense Secrets Act of 1911 / Espionage Act of 1917 / McCarran Internal Security Act 1950
California Comprehensive Computer Data Access and Fraud Act
Electronic Communications Privacy Act
LVRC Holdings v. Brekka
In re DoubleClick
MBTA v. Anderson
Information technology audit
Computer security audit
Computer fraud case studies
The Hacker Crackdown (mentions the law, & the eponymous Chicago task force)
Protected Computer
Wikileaks
References

^ See article United States v. Riggs
^ , 928 F.2d 504, 505 (2d Cir. 1991).
^ “Ninth Circuit Court of Appeals: Stored Communications Act and Computer Fraud and Abuse Act Provide Cause of Action for Plaintiff | Stanford Center for Internet and Society”. Cyberlaw.stanford.edu. http://cyberlaw.stanford.edu/packets001500.shtml. Retrieved September 10, 2010.
^ US v Jacob Citrin, openjurist.org
^ US v Brekka 2009
^ Court: Disloyal Computing Is Not Illegal By David Kravets September 18, 2009, Wired.com
^ Doug Stanglin (February 18, 2010). “School district accused of spying on kids via laptop webcams”. USA Today. http://content.usatoday.com/communities/ondeadline/post/2010/02/school-district-accused-of-issuing-webcam-laptops-to-spy-on-students/1. Retrieved February 19, 2010.
^ “Initial LANrev System Findings”, LMSD Redacted Forensic Analysis, L-3 Services – prepared for Ballard Spahr (LMSD’s counsel), May 2010. Retrieved August 15, 2010.
^ US V Lori Drew, scribd
^ US v Lori Drew, psu.edu KYLE JOSEPH SASSMAN,
^ “. Retrieved February 21, 2011.
^ See the links to the original lawsuit documents which are indexed here: [1]
^ US v Nosal, uscourts.gov, 2011
^ Appeals Court: No Hacking Required to Be Prosecuted as a Hacker, By David Kravets, Wired, April 29, 2011
^ Too Classified to Try Myth in Failed Drake Prosecution, Jesselyn Radack, DailyKos, 6/11/11
^ See the linked articles about Bradley Manning, and his charge sheets here: Hague Justice Portal
^ FBI serves Grand Jury subpoena likely relating to WikiLeaks BY GLENN GREENWALD, Salon.com WEDNESDAY, APR 27, 2011 13:28 ET
^ See Internet Activist Charged in M.I.T. Data Theft, By NICK BILTON New York Times, July 19, 2011, 12:54 PM, as well as the Indictment
^ US v Adekeye Indictment. see also Federal Grand Jury indicts former Cisco Engineer By Howard Mintz, 08/05/2011, Mercury News
^ techdirt.com 2011 8 9, Mike Masnick, “Sending Too Many Emails to Someone Is Computer Hacking”
^ US v Sergey Aleynikov, Case 1:10-cr-00096-DLC Document 69 Filed 10/25/10
^ Ex-Goldman Programmer Described Code Downloads to FBI (Update1), David Glovin and David Scheer – July 10, 2009, Bloomberg
^ http://www.debbieschlussel.com/archives/hezbospyplea.pdf Plea Agreement], US District Court, Eastern District of Michigan, Southern Division. via debbieschlussel.com
^ Sibel Edmond’s Boiling Frogs podcast 61 Thursday, 13. October 2011. Interview with Prouty by Peter B. Collins and Sibel Edmonds
^ “United States of America v. Neil Scott Kramer”. http://www.ca8.uscourts.gov/opndir/11/02/101983P.pdf.

Advertisements

4 thoughts on “Computer Fraud and Abuse Act

  1. Pingback: Computer Fraud and Abuse Act | Ch1lleh

  2. I have no idea what these two are talking about, the website is fine, I appreciate the well written article and appreciate the information. To the two that spoke before me, you have broken computers, and you need to relearn the English language. Thank you and good day.

    Liked by 1 person

  3. Hi there Your website loads up literally slow in my situation, I not really know who’s issue is that however flickr starts fairly immediate.
    Around the other hand thanks for submitting
    terrific article. I think it has already been totally beneficial to user who visit here.
    I personally should tell you that you actually have done brilliant job with
    this and also expect to find much more wonderful stuff from you.
    Just after looking at your post, I’ve bookmarked your web site.

    Like

  4. Hello Your web site loads up incredibly slow if you ask me, I’m not
    sure who’s problem is that but youtube starts up quite
    fast. Well, I appreciate you for placing an incredibly wonderful articles.
    Most people who stumbled on this web site should have noticed this content honestly very helpful.
    I ought to tell you that you have done amazing work
    with this and additionally wish to find many more amazing things from you.

    After looking at your articles, I’ve book-marked your web blog.

    Liked by 1 person

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s