Computer Fraud And Abuse Act (CFAA)

Superior Essays
The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information. The act had the intended …show more content…
Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security. Amendments to the CFAA have been added over the years to address crimes which use the computer to defraud and destroy data. Legislation has been enacted to protect victims of malicious code and denial-of-service attack (Department of Justice, n.d.). The CFAA was not intended to be a catch all statute for cyber-related crimes. “Congress addressed federalism concerns in the CFAA by limiting federal jurisdiction to Prosecuting Computer Crimes cases with a compelling federal interest—i.e., where computers of the federal government or certain financial institutions are involved or where the crime itself is interstate in nature” (Department of Justice, n.d., p.4).

Over the years, the CFAA has taken on different meanings in how it has been applied by federal prosecutors. Robert Morris and Lori Drew serve as examples in how differently the meaning, unauthorized access, is interpreted. Both Morris and Drew have entirely different storylines, Morris was a graduate student and computer scientist, Drew was suburban house mom - both used the internet to facilitate their actions which were later prosecuted (Wolff,

Related Documents

  • Improved Essays

    UNITED STATES OF AMERICA V. DAVID NOSAL BRIEF FACTS: During the time spanning approximately April 1996 to October 2004, David Nosal was employed at Korn/Ferry International (KFI), an executive search firm. David Nosal left the employment of KFI to start his own competing entity. David Nosal convinces his former colleagues, who were authorized to access the databases at KFI, to access confidential information located on KFI’s computer system and transfer same to David Nosal. While former colleagues had authorization to access the confidential data, the company policy at KFI prohibited divulging such information.…

    • 886 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    This author himself is a highly educated, college professor. Even with that perspective of being a scholar in this field of study for more than 5 years, Herb does not frame this article to be viewed by other highly educated university professors in his similar field of study. As I mentioned before he aims this article at a more general population. The actual audience of this piece would be subscribers to the Washington Post where this article was published. In addition to the subscribers, the ideal audience would include individuals in care about the Equifax hack or cyber space policy and security.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The Federal Information Security Management (FISMA) was set up by the United States government for cyber security purposes such as to increase the level of security of software applications, systems and databases. As stated by (Kim, n.d.), “When FISMA was enacted, its purpose was to ensure that federal agencies secure the information contained in the non-defense information systems of the Unites States government”. To protect the systems and data it is important to have a security plan developed for not just federal agencies but also for the government contractors and organizations affiliated with the information. According to (Kim, n.d.), “These grades have trended slightly upward in recent years, with the grades from 2005 through 2007 being…

    • 166 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    9/11 Research Paper

    • 1403 Words
    • 6 Pages

    That inability to share made it more difficult for us to arrest the person and charge him criminally, because the two sets of agents could not share information back and forth. That has changed. There is now ample sharing of information, and we can now readily use criminal charges to incapacitate people from doing harm and to improve our human intelligence cadre” (Caproni). While increased government surveillance may make some people uncomfortable, there is now a better chance an event like 9/11 will be…

    • 1403 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Fisa Pros And Cons

    • 531 Words
    • 3 Pages

    The fact that National Security Agency was authorized to monitor Americans’ international phone calls and emails together with warrantless wiretapping and searches proves that the law was unconstitutional. The Act requires several other amendments to address technological advancements such as automated monitoring methods and foreign intelligence needs. This would be essential in implementation of proper programmatic approval processes. Another criticism arose in that, there was no proper framework to detect who the terrorists were despite the fact that FISA provided for monitoring mere communications of known…

    • 531 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    So, this in retrospect allows the right hand to know what the left hand is doing when it needs to know and when requested. All the agencies now can coordinate and share information and can gather information in many different ways. For example, the writer sees it that the Patriot act really enhances the governments’ surveillance techniques in four ways; one being record searches and how the government is able to look into the personal records of individuals activity section 215 of the Patriot Act allows the FBI to force anyone at all - including doctors, libraries, bookstores, universities, and Internet service providers - to turn over records on their clients or customers, two being intelligence (intel) searching and how the government gathers foreign intelligence without violating the fourth amendment, third secret searches and how the government in certain cases does not need to inform an owner of a certain property that they are searching the premises the government to conduct searches without notifying the subjects, at least until long after the search has been executed this means that the government can enter a house, apartment or office with a search warrant when the occupants are away, search through their property, take photographs, and in some cases even seize property - and not tell them until later, and lastly trace searches and how the government is able to find the origin of certain communications using a special variety of techniques for example the FBI can secretly conduct a physical search or wiretap on American citizens to obtain evidence of crime without proving probable cause, as the Fourth Amendment explicitly…

    • 836 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    A provision of the act allows law enforcers to carry out searches without warrants (Collins, 2015). Dubbed the “sneak and peek provision”, FBI agents can search and individual’s home and business with judicial authorization, however, they do not have to inform the individual (Johnson, 2011). ACLU investigators have discovered from public reports that less than 1% of these types of searches happen for terrorism investigations. They have been used instead for immigration and drug cases and sometimes fraud cases (Johnson, 2011). The act has also been criticized for its broad definition of “domestic terrorism” and for using the provisions to prosecute crimes other than terrorism (“What Wrong With”, 2003).…

    • 1181 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    For years prior to the terrorist events that occurred on September 11, 2001, the government currently had programs in place that were programs tracking private citizens' phone and internet use. These surveillance technologies being monitored were audio recordings, video recordings, databases, and other technologies. Although these programs were not considered a priority to the Federal Investigation Bureau, they soon became so after the attacks occurred. , FBI Director Robert Mueller suggested that the government might have prevented the 9/11 terrorist attacks if more surveillance programs had been implemented prior to 2001. Many Americans feel that these programs set in place violates their amendment rights.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    In October 1998, the Identity Theft and Assumption act were passed by the United States congress. Over the years since the passing of this bill federal and state governments have passed additional bills to try to strengthen the initial bill. In 2003, the Fair Credit Reporting Act (FCRA) and the Fair and Accurate Credit Transaction Act (FACTA) were created. FACTA addressed a variety of changes but it primarily addressed consumer rights and more specifically identity theft. The Free credit report was a provision of FACTA which gave the consumer 1 free credit report through each of the three major credit reporting agencies (Equifax, Experian, and the TransUnion).…

    • 206 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The Patriot Act reshaped the methods and collection techniques of government ordered surveillance (Welch, 2015). The Patriot Act enabled the government…

    • 231 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Conspiracy Pros And Cons

    • 632 Words
    • 3 Pages

    After the terror attacks of September 9, 2001, the United States Congress rushed a bill through its system, called the “Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001” or the “U.S.A. P.A.T.R.I.O.T. Act,” and signed into effect by President George W. Bush. Its goal is “to deter and punish terrorist acts in the United States and around the World, to enhance law enforcement investigatory tools, and other purposes” (United States, Congress, House 1). Thereby, giving more legislative power to investigate “suspected” acts of terrorism. Its goal is not just to prevent the act of terror itself, but to investigate those individuals, who launder and finance acts of terrorism.…

    • 632 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Patriot Act

    • 596 Words
    • 3 Pages

    The Patriot Act was passed after the terrorist attacks of September 11, 2001. This act allows the government and or federal officials to track and intercept our communications with one another. It also makes new crimes, punishments, and new procedures that we use for terrorists. The history of the Patriot Act, the abuse of our civil liberties, and the current issues with the act lead Americans to feel like they cannot trust their government.…

    • 596 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    The Electronic Communications Privacy Act, which updated the Federal Wiretap Act of 1968, expanded it to include provisions for interception of computer and other electronic communications. (DHS/Office for Civil Rights and Civil Liberties and DHS/Privacy Office) 3. The Foreign Intelligence Surveillance Act, enacted in 1978, a very effective method for monitoring the activities of foreign powers and agents of said powers while they operate within the United States. It was augmented even more with the enactment of the PATRIOT Act, which enhanced the federal government’s capacity to share intelligence, strengthened criminal laws against terrorism, removed obstacles to investigating terrorism, and updated the law to reflect new technology. (James G. McAdams)…

    • 1195 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    The Computer Misuse act is a law that was introduced in 1990. Because of the problem of people hacking computer systems to cause harm this act was introduced to make sure that is something done to the people who are hacking systems. This laws protect company’s when someone has unauthorized access to computer material, unauthorized access with intent to commit or facilitate a crime, Unauthorized modification of computer material and making, supplying or obtaining anything which can be used in computer misuse offences. If any of these offences are committed against a company then the company can take action against the…

    • 102 Words
    • 1 Pages
    Decent Essays