Cybercrime: an Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Cybercrime: an Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Order Code 97-1025 CRS Report for Congress Received through the CRS Web Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws Updated June 28, 2005 Charles Doyle Senior Specialist American Law Division Alyssa Bartlett Weir Law Clerk American Law Division Congressional Research Service ˜ The Library of Congress Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws Summary The federal computer fraud and abuse statute, 18 U.S.C. 1030, protects federal computers, bank computers, and computers used in interstate and foreign commerce. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills crack and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of section 1030 and some of its federal statutory companions. In their present form, the seven paragraphs of subsection 1030(a) outlaw: ! computer trespassing (e.g., hacking) in a government computer, 18 U.S.C. 1030(a)(3); ! computer trespassing (e.g., hackers) resulting in exposure to certain governmental, credit, financial, or commercial information, 18 U.S.C. 1030(a)(2); ! damaging a government computer, a bank computer, or a computer used in interstate or foreign commerce (e.g., a worm, computer virus, Trojan horse, time bomb, a denial of service attack, and other forms of cyber attack, cyber crime, or cyber terrorism), 18 U.S.C. 1030(a)(5); ! committing fraud an integral part of which involves unauthorized access to a government computer, a bank computer, or a computer used in interstate or foreign commerce, 18 U.S.C. 1030(a)(4); ! threatening to damage a government computer, a bank computer, or a computer used in interstate or foreign commerce, 18 U.S.C. 1030(a)(7); ! trafficking in passwords for a government computer, a bank computer, or a computer used in interstate or foreign commerce, 18 U.S.C. 1030(a)(6); and ! accessing a computer to commit espionage, 18 U.S.C. 1030(a)(1). Subsection 1030(b) makes it a crime to attempt to commit any of these offenses. Subsection 1030(c) catalogs the penalties for committing them, penalties that range from imprisonment for not more than a year for simple cyberspace trespassing to a maximum of life imprisonment when death results from intentional computer damage. Subsection 1030(d) preserves the investigative authority of the Secret Service. Subsection 1030(e) supplies common definitions. Subsection 1030(f) disclaims any application to otherwise permissible law enforcement activities. Subsection 1030(g) creates a civil cause of action of victims of these crimes. Earlier versions of this report appeared under the title, Computer Fraud and Abuse: An Overview of 18 U.S.C. 1030 and Related Federal Criminal Laws. Contents Introduction ..................................................1 Trespassing in Government Cyberspace 18 U.S.C. 1030(a)(3) .......................................3 Intent ...................................................4 Jurisdiction...............................................4 Unauthorized Access .......................................5 Affects the Use............................................6 Penalties .................................................6 Other Crimes ............................................10 Obtaining Information by Unauthorized Computer Access 18 U.S.C. 1030(a)(2) ......................................16 Jurisdiction..............................................18 Intent ..................................................19 Penalties ................................................19 Other Crimes ............................................21 Causing Computer Damage 18 U.S.C. 1030(a)(5) ......................................23 Intent ..................................................24 Damage ................................................24 Jurisdiction..............................................27 Penalties ................................................29 Other Crimes ............................................31 Computer Fraud 18 U.S.C. 1030(a)(4) ......................................42 Jurisdiction..............................................42 Intent ..................................................43 Penalties ................................................44 Other Crimes ............................................45 Extortionate Threats 18 U.S.C. 1030(a)(7) ......................................72 Jurisdiction..............................................73 Threat of “damage” .......................................73 Intent ..................................................74 Threats.................................................74 Penalties ................................................75 Other crimes.............................................76 Trafficking in Computer Access 18 U.S.C. 1030(a)(6) ................79 Jurisdiction..............................................80 Intent ..................................................80 Penalties ................................................80 Other crimes.............................................81 Computer Espionage 18 U.S.C. 1030(a)(1) ......................................81 Jurisdiction..............................................83 Intent ..................................................83 Penalties ................................................83 Other crimes.............................................84 APPENDIX.................................................88 Selected Bibliography .........................................88 18 U.S.C. 1030 ...............................................89 Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws Introduction The federal computer fraud and abuse statute, 18 U.S.C. 1030,1 protects computers in which there is a federal interest – federal computers, bank computers, and computers used in interstate and foreign commerce. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, instead it fills cracks and gaps in the protection afforded by other state and federal criminal laws. It is a work that over the last two decades, Congress has kneaded, reworked, recast, and amended to bolster the uncertain coverage of more general federal trespassing, threat, malicious mischief, fraud, and espionage statutes.2 This is a brief description of section 1030 and its federal statutory companions. 1 The full text of 18 U.S.C. 1030 is appended. 2 Congressional inquiry began no later than 1976, S. Comm. on Government Operations, Problems Associated with Computer Technology in Federal Programs and Private Industry – Computer Abuses, 94th Cong., 2d Sess. (1976)(Comm.Print). Hearings were held in successive Congresses thereafter until passage of the original version of section 1030 as part of the Comprehensive Crime Control Act of 1984, Pub.L.No. 98-473, 98 Stat. 2190; see e.g., Federal Computer Systems Protection Act: Hearings Before the Subcomm. on Criminal Laws and Procedures of the Senate Comm. on the Judiciary, 95th Cong., 2d Sess.(1978); S.240, the Computer Systems Protection Act of 1979: Hearings Before the Subcomm. on Criminal Justice of the Senate Comm. on the Judiciary, 96th Cong., 2d Sess.(1980); Federal Computer System Protection Act, H.R. 3970: Hearings Before the House Comm. on the Judiciary, 97th Cong., 2d Sess.(1982); Computer Crime: Hearings Before the House Comm. on the Judiciary, 98th Cong., 1st Sess. (1983). Refurbishing of the original 1984 legislation occurred in 1986, 1988, 1989, 1990, 1994, and 1996: Pub.L.No. 99-474, 100 Stat. 1213; Pub.L.No. 100-690, 102 Stat. 4404; Pub.L.No. 101-73, 103 Stat. 502; Pub.L.No. 101-647, 104 Stat. 4831; Pub.L.No. 103-322, 108 Stat. 2097; Pub.L.No. 104-294, 110 Stat. 3491. Most recently, both the USA PATRIOT Act, Pub.L.No. 107-56, 115 Stat. 272 (2001) and the Department of Homeland Security Act, Pub.L.No. 107-296, 116 Stat. 72135 (2002) amended provisions of section 1030. For a chronological history of the Act up to but not including the 1996 amendments, see Adams, Controlling Cyberspace: Applying the Computer Fraud and Abuse Act to the Internet, 12 SANTA CLARA COMPUTER & HIGH TECHNOLOGY LAW JOURNAL 403 (1996). For a general description of the validity and application of this Act, see Buchman, Validity, Construction, and Application of Computer Fraud and Abuse Act, 174 ALR Fed. 101 (2004); Berkowitz, Computer Security and Privacy: The Third Wave of Property Law, 33 COLORADO LAWYER 57 (Feb. 2004). CRS-2 There are other laws that address the subject of crime and computers. Section 1030 deals with computers as victims; other laws deal with computers as arenas for crime or as repositories of the evidence of crime or from some other perspective. These other laws – laws that are about things like encryption, obscenity, pornography, and gambling – are beyond the scope of this report.3 In their present form, the seven paragraphs of subsection 1030(a) outlaw: ! computer trespassing in a government computer, 18 U.S.C. 1030(a)(3); ! computer trespassing resulting in exposure to certain governmental, credit, financial, or commercial information, 18 U.S.C. 1030(a)(2); ! damaging a government computer, a bank computer, or a computer used in interstate or foreign commerce, 18 U.S.C. 1030(a)(5); ! committing fraud an integral part of which involves

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    97 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us