+ All Categories
Home > Technology > The Latest Developments in Computer Crime Law

The Latest Developments in Computer Crime Law

Date post: 25-Dec-2014
Category:
Upload: source-conference
View: 2,176 times
Download: 0 times
Share this document with a friend
Description:
SOURCE Seattle 2011 - Marcia Hofmann
22
The Latest Developments in Computer Crime Law SOURCE Seattle June 15, 2011 Marcia Hofmann, EFF
Transcript
Page 1: The Latest Developments in Computer Crime Law

The Latest Developments in

Computer Crime Law

SOURCE Seattle

June 15, 2011

Marcia Hofmann, EFF

Page 2: The Latest Developments in Computer Crime Law

what we’ll talk about today

✪ The federal hacking law and why it’s problematic.

✪ A couple trends that have emerged from recent

cases in which courts have interpreted the scope of

this law.

✪ What these trends suggest about the future.

Page 3: The Latest Developments in Computer Crime Law

Background

The Computer Fraud and Abuse Act

18 U.S.C. § 1030

Page 4: The Latest Developments in Computer Crime Law

seven basic prohibitions1) espionage

2) improperly accessing financial records, governmentinformation, or information on a “protected computer”

3) trespass to government computers

4) improperly accessing someone else’s computer with intentto defraud

5) causing damage to someone else’s computer

6) password trafficking with intent to defraud

7) extortion

Page 5: The Latest Developments in Computer Crime Law

improper access

The CFAA prohibits, among other things,

“intentionally access[ing] a computer withoutauthorization or in excess of authorization, andthereby obtain[ing] . . . information from anyprotected computer.”

18 U.S.C. § 1030(a)(2)(C).

Page 6: The Latest Developments in Computer Crime Law

improper access

Courts have interpreted “obtaining information”

broadly.

Basically any computer connected to the internet is a

“protected computer.”

So the major limiting principle is “authorized.”

Page 7: The Latest Developments in Computer Crime Law

development 1

expansive theories of unauthorized

access/exceeding authorized access

Page 8: The Latest Developments in Computer Crime Law

Some people have argued that authorization endswhen an employee violates a duty of loyalty to

an employer...

International Airport Centers v. Citrin

LVRC Holdings v. Brekka

Page 9: The Latest Developments in Computer Crime Law

Others have gone so far as to argue thatauthorization ends when a person violates a

web site’s terms of use.

United States v. Drew

Facebook v. Power Ventures

United States v. Lowson

Page 10: The Latest Developments in Computer Crime Law

The case law in this area recently took a turn for

the worse when an appeals court found that

violating an employer’s computer use policies

“exceeds authorized access.”

United States v. Nosal

Page 11: The Latest Developments in Computer Crime Law

The future?

Lee v. PMSI, Inc.

Sony v. Hotz

Page 12: The Latest Developments in Computer Crime Law

development 2

attempts to double-count penalties for

unauthorized access

Page 13: The Latest Developments in Computer Crime Law

A first-time violation of the “unauthorized

access” provision is generally a misdemeanor.

However, it can be elevated to a felony in certain

circumstances, like when the offense is

committed in furtherance of another crime or

tortious act.

Page 14: The Latest Developments in Computer Crime Law

United States v. Drew

Government: felony unauthorized access to a

computer in furtherance of intentionally

inflicting emotional distress.

Jury: no, misdemeanor unauthorized access.

Judge: no, violating terms of service is not

unauthorized access.

Page 15: The Latest Developments in Computer Crime Law

United States v. Kernell

Government: felony unauthorized access to a

computer in furtherance of unauthorized access

to email and unauthorized access to a computer.

Page 16: The Latest Developments in Computer Crime Law

United States v. Kernell

Government: felony unauthorized access to a

computer in furtherance of unauthorized access

to email and unauthorized access to a computer.

Do over!

Page 17: The Latest Developments in Computer Crime Law

United States v. Kernell

Government: felony unauthorized access to acomputer in furtherance of invasion of privacy

and aiding and abetting other unauthorizedaccesses to a computer.

Jury: no, misdemeanor unauthorized access.

Page 18: The Latest Developments in Computer Crime Law

United States v. Cioni

Government: felony unauthorized access to a

computer in furtherance of unauthorized access

to email.

Jury: yup, two felonies.

(This is a problem.)

Page 19: The Latest Developments in Computer Crime Law

The CFAA prohibits unauthorized access to and

obtaining information from a computer.

(Here, email.)

The Stored Communications Act prohibits

unauthorized access to an electronic communication

service and obtaining stored communications.

(Here, email.)

It’s the same thing.

Page 20: The Latest Developments in Computer Crime Law

United States v. Cioni

Government: felony unauthorized access to a

computer in furtherance of unauthorized access

to email.

Jury: yup, two felonies.

Appeals court: no, these are misdemeanors.

Page 21: The Latest Developments in Computer Crime Law

The future?

legislative changes

(enhanced penalties?)

Page 22: The Latest Developments in Computer Crime Law

questions?

Marcia Hofmann

Senior Staff Attorney, EFF

[email protected]


Recommended