Civil and Criminal Hacking (The Computer Fraud and Abuse Act)

Scope

 * Use this page to list sources related to the Computer Fraud and Abuse Act or other sources related to unauthorized access to or attacks on computers or networks.

News / Editorial

 * Ian Mulgrew, A pound of flesh: how Cisco's "unmitigated gall" derailed one man's life, Ars Technica (Jul. 21, 2011).
 * John Timmer, Son of GhostNet: China-based hacking targets India government, Ars Technica (April 6, 2010).
 * AFP, Yahoo sidesteps China hack report, The AustralianIT (Mar. 31, 2010).
 * Mark Ballard, Cloud security weaknesses prompt call for global data protection law, ComputerWeekly.com (Mar. 26, 2010).
 * Declan McCullagh, T.J.Maxx hacker sentenced to 20 years in prison, cnet news (Mar. 25, 2010).
 * Ellen Nakashima, China leads the world in hacked computers, McAfee study says, Washington Post (Feb. 15, 2010).
 * Robert McMillan, Criminal hacker 'Iceman' gets 13 years, ComputerWorld (Feb. 12, 2010).
 * Janie Lorber, House Passes Cybersecurity Bill, New York Times (Feb. 4, 2010).
 * John Markoff, Google Asks Spy Agency for Help With Inquiry Into Cyberattacks, ZDNet News (Feb. 4, 2010).
 * AAP, UN calls for global cyber treaty, ZDNet News (Feb. 1, 2010).
 * Kim Zetter, Report: Critical Infrastructures Under Constant Cyberattack Globally, Wired (Jan. 28, 2010).
 * Erika Birg, Webinar: Computer Fraud and Abuse Act - What do you need to know?, Trading Secrets: A Low Blog on Trade Secrets, Non-Competes, and Computer Fraud (Jan. 27, 2010).
 * John Markoff, David E. Sanger and Thom Shanker, In Digital Combat, U.S. Finds No Easy Deterrent, The NY Times (Jan. 25, 2010).
 * Tom Spalding, Indianapolis man 1st to be prosecuted under computer-extortion law, The Indianapolis Star (Jan. 12, 2010).
 * The Associated Press, NJ man sentenced in Scientology cyber attack, The Washington Post (Nov. 18, 2009).
 * Nic Corbett, Verona man admits role in attack on Church of Scientology's websites, The Star-Ledger (Nov. 16, 2009).
 * Ryan Paul, Judge: TOS violations not a crime in teen suicide case, Ars Technica (Aug. 31, 2009).
 * Joe Hildebrand, Jail for cyber criminals: NSW govt, Australian IT (Jul. 11, 2009).
 * Nick Akerman, When Workers Steal Data to Use at New Jobs, The National Law Journal (Jul. 7, 2009).
 * Brian Krebs, PC Invader Costs Ky. County $415,000, Washington Post (Jul. 2, 2009).
 * Kim Zetter, Judge Acquits Lori Drew in Cyberbullying Case, Overrules Jury, Wired.com (Jul. 2, 2009).
 * Evan Brown, Unauthorized software downloads did not violate Computer Fraud and Abuse Act, Internet Cases (Jun. 23, 2009).
 * Jennifer Granick, Amendments to Computer Crime Law Are a Dark Cloud with a Ray of Light, EFF Deeplinks (Jun. 15, 2009).
 * Justin Ryan, Will Somebody Please Do Something About Boston?, Linux Journal (Apr. 15, 2009).
 * Matt Zimmerman, Boston College Campus Police: "Using Prompt Commands" May Be a Sign of Criminal Activity, EFF Deeplinks (Apr. 14, 2009).
 * Renai LeMay, Australian police may get hacking powers, CNET (Mar. 9, 2009).

Legal Opinions / Briefs/ Statutes

 * Pulte Homes, Inc. v. Laborers' International Union of North America, No. 09-13638 (E.D. Mich. May 12, 2010).
 * Czech v. Wall Street on Demand, Inc., No. 09-180 (D. Minn. Dec. 8, 2009) (Sending of unsolicited text messages did not violate CFAA).
 * LVRC Holdings LLC v. Brekka, No. 07-17116 (9th Cir. Sep. 15, 2009) (Where ex-employee emailed allegedly confidential information to himself before leaving, computer access was unauthorized only if contravening employer-placed limits, not once employee's mental state changed to competitor, rejecting contrary 7th Cir. precedent).
 * United States v. Drew, No. 08-00582 (C.D. Cal. Aug. 28, 2009).
 * Fink v. Time Warner Cable, No. 08-09628, 2009 U.S. Dist. LEXIS 63708, 2009 WL 2207920 (S.D.N.Y. Jul. 23, 2009) (dismissing CFAA claim based on Time Warner throttling p2p for failure to allege damage or loss).
 * State v. Wolf, 2009 Ohio 2018 (Ohio Ct. App. Apr. 28, 2009).
 * State Analysis, Inc. v. Am. Fin. Servs. Assoc., No. 09-01333, 2009 U.S. Dist. LEXIS 27548, 2009 WL 855793 (E.D. Va. Mar. 31, 2009).
 * Kluber Skahan & Assoc., Inc. v. Cordogan, Clark & Assoc., Inc., No. 08-1529, 2009 WL 466812 (N.D. Ill. Feb. 25, 2009).
 * Lasco Foods, Inc. v. Hall and Shaw Sales, Mktg & Consulting, LLC, 600 F. Supp. 2d 1045 (E.D. Mo. 2009).
 * Andritz, Inc. v. S. Maint. Contractor, LLC, No. 08-00044, 2009 WL 48187 (M.D. Ga. Jan. 7, 2009).
 * Kalow & Springnut, LLP v. Commence Corp., No. 07-3442, 2009 WL 44748 (D.N.J. Jan. 6, 2009).
 * Alliance Int'l Inc. v. Todd, No. 08-214, 2008 U.S. Dist. LEXIS 56077 (E.D.N.C. Jul. 22, 2008).
 * Universal Tube & Rollform Equipment Corp. v. YouTube, Inc., 2007 WL 1655507 (N.D. Ohio June 4, 2007) (rejecting theory that visitors to YouTube were trespassing on the UTube domain name).
 * Int'l Airport Ctrs. LLC v. Citrin, 440 F.3d 418 (7th Cir. 2006).
 * United States v. Millot, 433 F.3d 1057 (8th Cir. 2006).
 * EF Cultural Travel BV v. Zefer Corp., 318 F.3d 58 (1st Cir. 2003).
 * EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577 (1st Cir. 2001).
 * In re Intuit Privacy Litigation, 138 F. Supp. 2d 1272 (C.D. Cal. 2001).
 * Moulton v. VC3, 00-434 (N.D. Ga. 2000).
 * Shurgard Storage Center v. Safeguard Self Storage, Inc., 119 F. Supp. 2d 1121 (W.D. Wash. 2000).
 * YourNetDating LLC v. Mitchell, 88 F. Supp. 2d 870 (N.D. Ill. 2000).
 * Shaw v. Toshiba Am. Info. Sys., 91 F. Supp. 2d 926 (E.D. Tex. 1999).
 * North Texas Preventive Imaging LLC v. Eisenberg, 1996 WL 1359212 (C.D. Cal. Aug. 19, 1996).
 * State v. Allen, 917 P.2d 848 (Kan. 1996).

Scholarship

 * Orin S. Kerr, Vagueness Challenges to the Computer Fraud and Abuse Act, Minn. L. Rev. (forthcoming 2010).
 * Ruperto P. Majuca & Jay P. Kesan, Hacking Back: Optimal Use of Self-Defense in Cyberspace, Ill. Pub. Law & Legal Theory Papers Series (2009).
 * Reid Skibell, Cybercrimes & Misdemeanors: A Reevaluation of the Computer Fraud and Abuse Act, 18 Berkeley Tech. L.J. 909 (2003).
 * A. Hugh Scott, Computer and Intellectual Property Crime: Federal and State Statutes (2001).