Editing Aaron projects/CFAA

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 45: Line 45:


=== Legal elements ===
=== Legal elements ===
There are 7 planks to [http://www.law.cornell.edu/uscode/text/18/1030 18 U.S.C. § 1030]
There are 7 planks to 10.30 title 18:


# Knowingly accessing a computer without access or exceeding access, and obtaining security, foreign relations, atomic info
# Security, foreign relations, atomic info
#: rarely used, as it is substantively overlapped by other ares
# Access to computer, obtaining info
# Intentionally accessing a computer without access or exceeding access, and in so doing obtaining "information," financial records, or U.S. government info.
# Accessing a US [gov owned or controlled] computer
#: the biggest and most frequently used for access-and-downloading type offenses
# Wire fraud  
# Accessing without authorization (not "exceeding") a US government owned or controlled computer
# Equivalent to the statute on [http://www.law.cornell.edu/uscode/text/18/1343 wire fraud], but replacing "wire" with "computer" and tweaking the details
#: Overlap with WFA, rather irrelevant in current environs
#: Overlap with WFA, rather irrelevant in current environs
# Computer damage
# Computer damage
#: three separate crimes ("damage" = impairment to integrity and availability of data; "loss" = reasonable cost of responding to offense, including costs of damage assessment)
#: Separates intent: recklessness; intent to damage; causing both damage + loss [~$5k threshhold] regardless of intent
#:: knowingly cause transmission of program and intentionally cause damage
#:: intentionally access a computer and as a result recklessly cause damage
#:: intentionally access a computer and as a result cause damage and "loss"
# Password Trafficking  
# Password Trafficking  
# Extortion through use of computer
# Extortion
#: intent to damage; to obtain access; to get $ compensation - done over a computer


== Guiding principles ==
== Guiding principles ==
Please note that all contributions to Noisebridge are considered to be released under the Creative Commons Attribution-NonCommercial-ShareAlike (see Noisebridge:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)