Computer Fraud And Abuse Act (CFAA)

Superior Essays
The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information. The act had the intended …show more content…
Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security. Amendments to the CFAA have been added over the years to address crimes which use the computer to defraud and destroy data. Legislation has been enacted to protect victims of malicious code and denial-of-service attack (Department of Justice, n.d.). The CFAA was not intended to be a catch all statute for cyber-related crimes. “Congress addressed federalism concerns in the CFAA by limiting federal jurisdiction to Prosecuting Computer Crimes cases with a compelling federal interest—i.e., where computers of the federal government or certain financial institutions are involved or where the crime itself is interstate in nature” (Department of Justice, n.d., p.4).

Over the years, the CFAA has taken on different meanings in how it has been applied by federal prosecutors. Robert Morris and Lori Drew serve as examples in how differently the meaning, unauthorized access, is interpreted. Both Morris and Drew have entirely different storylines, Morris was a graduate student and computer scientist, Drew was suburban house mom - both used the internet to facilitate their actions which were later prosecuted (Wolff,

Related Documents

  • Improved Essays

    UNITED STATES OF AMERICA V. DAVID NOSAL BRIEF FACTS: During the time spanning approximately April 1996 to October 2004, David Nosal was employed at Korn/Ferry International (KFI), an executive search firm. David Nosal left the employment of KFI to start his own competing entity. David Nosal convinces his former colleagues, who were authorized to access the databases at KFI, to access confidential information located on KFI’s computer system and transfer same to David Nosal. While former colleagues had authorization to access the confidential data, the company policy at KFI prohibited divulging such information.…

    • 886 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Federal Information Security Management (FISMA) was set up by the United States government for cyber security purposes such as to increase the level of security of software applications, systems and databases. As stated by (Kim, n.d.), “When FISMA was enacted, its purpose was to ensure that federal agencies secure the information contained in the non-defense information systems of the Unites States government”. To protect the systems and data it is important to have a security plan developed for not just federal agencies but also for the government contractors and organizations affiliated with the information. According to (Kim, n.d.), “These grades have trended slightly upward in recent years, with the grades from 2005 through 2007 being…

    • 166 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Robert Hanssen Failure

    • 1219 Words
    • 5 Pages

    Creating and designing policies and procedures geared towards being able to document and look back on security violations that have been reported is going to be a crucial step in this process (Office of the Inspector General Oversight and Review Division, 2007). Until filing this report, there was not a concrete way of doing it. Some tools that are in use today started from this report. An example of such tools is a financial disclosure program where annually FBI employees must disclose their finance records for review. This will give the FBI the opportunity to look for any discrepancies or sudden influxes of…

    • 1219 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    9/11 Research Paper

    • 1403 Words
    • 6 Pages

    FISA is a court order approving electronic surveillance or the search of a target who is suspected of acting on behalf of a foreign power or terrorist organization. The use of FISA after the attacks skyrocketed. In her article “Surveillance and Transparency” Valerie Caproni states, “After 9/11, the FBI moved thousands of agents who had been working traditional white-collar cases, bank robbery cases, and narcotic cases and put them to work in the national security area” (Caproni). Not only are there more people now working on national security through FISA, but they have a wider scope of ability. “Pre-9/11 it was almost impossible for agents working on a national security investigation that was using FISA to share the information they were collecting with criminal agents.…

    • 1403 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    New tools accessible from the Patriot Act Before September 11th, 2001 (9/11) the United States Federal Government had methods of…

    • 836 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Federal Information Security Management Act also known as FISMA is United States federal law enactment established to ensure government data, operations and resources against regular or man-made dangers are protected. FISMA was created in 2002 Electronic Government Act of 2002 before cybersecurity became such a vast problem. Modifications were made to FISMA law and renamed Federal Information Security Modernization Act of 2014. The cybersecurity market is continuously expanding as the society rely upon the development and utilization of information technology systems. Within recent years, there has been an increase in the number security risks and data breaches.…

    • 240 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    In October 1998, the Identity Theft and Assumption act were passed by the United States congress. Over the years since the passing of this bill federal and state governments have passed additional bills to try to strengthen the initial bill. In 2003, the Fair Credit Reporting Act (FCRA) and the Fair and Accurate Credit Transaction Act (FACTA) were created. FACTA addressed a variety of changes but it primarily addressed consumer rights and more specifically identity theft. The Free credit report was a provision of FACTA which gave the consumer 1 free credit report through each of the three major credit reporting agencies (Equifax, Experian, and the TransUnion).…

    • 206 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    For years prior to the terrorist events that occurred on September 11, 2001, the government currently had programs in place that were programs tracking private citizens' phone and internet use. These surveillance technologies being monitored were audio recordings, video recordings, databases, and other technologies. Although these programs were not considered a priority to the Federal Investigation Bureau, they soon became so after the attacks occurred. , FBI Director Robert Mueller suggested that the government might have prevented the 9/11 terrorist attacks if more surveillance programs had been implemented prior to 2001. Many Americans feel that these programs set in place violates their amendment rights.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    A provision of the act allows law enforcers to carry out searches without warrants (Collins, 2015). Dubbed the “sneak and peek provision”, FBI agents can search and individual’s home and business with judicial authorization, however, they do not have to inform the individual (Johnson, 2011). ACLU investigators have discovered from public reports that less than 1% of these types of searches happen for terrorism investigations. They have been used instead for immigration and drug cases and sometimes fraud cases (Johnson, 2011). The act has also been criticized for its broad definition of “domestic terrorism” and for using the provisions to prosecute crimes other than terrorism (“What Wrong With”, 2003).…

    • 1181 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Patriot Act reshaped the methods and collection techniques of government ordered surveillance (Welch, 2015). The Patriot Act enabled the government…

    • 231 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Conspiracy Pros And Cons

    • 632 Words
    • 3 Pages

    After the terror attacks of September 9, 2001, the United States Congress rushed a bill through its system, called the “Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001” or the “U.S.A. P.A.T.R.I.O.T. Act,” and signed into effect by President George W. Bush. Its goal is “to deter and punish terrorist acts in the United States and around the World, to enhance law enforcement investigatory tools, and other purposes” (United States, Congress, House 1). Thereby, giving more legislative power to investigate “suspected” acts of terrorism. Its goal is not just to prevent the act of terror itself, but to investigate those individuals, who launder and finance acts of terrorism.…

    • 632 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Furthermore, this act is, for the most part, well written. I like how it is not super long and how most terminology is clearly defined. With the world getting more advanced in technology, it is very necessary to update amendments and include acts dealing with computer crime issues. I think that what we have, is not good enough. There still seems to be lots of issues across the globe as far as what law enforcement can and cannot do, what is illegal and what is not, and of course the famous jurisdictional issues.…

    • 992 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Patriot Act

    • 596 Words
    • 3 Pages

    The Patriot Act was passed after the terrorist attacks of September 11, 2001. This act allows the government and or federal officials to track and intercept our communications with one another. It also makes new crimes, punishments, and new procedures that we use for terrorists. The history of the Patriot Act, the abuse of our civil liberties, and the current issues with the act lead Americans to feel like they cannot trust their government.…

    • 596 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The Computer Misuse act is a law that was introduced in 1990. Because of the problem of people hacking computer systems to cause harm this act was introduced to make sure that is something done to the people who are hacking systems. This laws protect company’s when someone has unauthorized access to computer material, unauthorized access with intent to commit or facilitate a crime, Unauthorized modification of computer material and making, supplying or obtaining anything which can be used in computer misuse offences. If any of these offences are committed against a company then the company can take action against the…

    • 102 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays