{ "id": "97-1025", "type": "CRS Report", "typeId": "REPORTS", "number": "97-1025", "active": true, "source": "EveryCRSReport.com, University of North Texas Libraries Government Documents Department", "versions": [ { "source": "EveryCRSReport.com", "id": 434958, "date": "2014-10-15", "retrieved": "2016-04-06T20:00:48.467599", "title": "Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws", "summary": "The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of CFAA and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act, P.L. 110-326, 122 Stat. 3560 (2008).\nIn their present form, the seven paragraphs of subsection 1030(a) outlaw\ncomputer trespassing (e.g., hacking) in a government computer, 18 U.S.C. 1030(a)(3);\ncomputer trespassing (e.g., hacking) resulting in exposure to certain governmental, credit, financial, or computer-housed information, 18 U.S.C. 1030(a)(2);\ndamaging a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce (e.g., a worm, computer virus, Trojan horse, time bomb, a denial of service attack, and other forms of cyber attack, cyber crime, or cyber terrorism), 18 U.S.C. 1030(a)(5);\ncommitting fraud an integral part of which involves unauthorized access to a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce, 18 U.S.C. 1030(a)(4);\nthreatening to damage a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce, 18 U.S.C. 1030(a)(7);\ntrafficking in passwords for a government computer, or when the trafficking affects interstate or foreign commerce, 18 U.S.C. 1030(a)(6); and\naccessing a computer to commit espionage, 18 U.S.C. 1030(a)(1).\nSubsection 1030(b) makes it a crime to attempt or conspire to commit any of these offenses. Subsection 1030(c) catalogs the penalties for committing them, penalties that range from imprisonment for not more than a year for simple cyberspace trespassing to a maximum of life imprisonment when death results from intentional computer damage. Subsection 1030(d) preserves the investigative authority of the Secret Service. Subsection 1030(e) supplies common definitions. Subsection 1030(f) disclaims any application to otherwise permissible law enforcement activities. Subsection 1030(g) creates a civil cause of action for victims of these crimes. Subsections 1030(i) and (j) authorize forfeiture of tainted property.\nThis report is available in abbreviated form\u2014without the footnotes, citations, quotations, or appendixes found in this report\u2014under the title CRS Report RS20830, Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws, by Charles Doyle.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/97-1025", "sha1": "a3011cfc4f2ceddb0c7be28d169598139ff41a92", "filename": "files/20141015_97-1025_a3011cfc4f2ceddb0c7be28d169598139ff41a92.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/97-1025", "sha1": "31056cd16cc55cc39047e24e327a15875045157f", "filename": "files/20141015_97-1025_31056cd16cc55cc39047e24e327a15875045157f.pdf", "images": null } ], "topics": [ { "source": "IBCList", "id": 272, "name": "International Trafficking and Crime" }, { "source": "IBCList", "id": 4300, "name": "Cybersecurity" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc819470/", "id": "97-1025_2012Mar21", "date": "2012-03-21", "retrieved": "2016-03-19T13:57:26", "title": "Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20120321_97-1025_2a3dc3ca560d0dae92c615adcb18174629e1c60e.pdf" }, { "format": "HTML", "filename": "files/20120321_97-1025_2a3dc3ca560d0dae92c615adcb18174629e1c60e.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc83829/", "id": "97-1025_2010Dec27", "date": "2010-12-27", "retrieved": "2012-04-27T15:49:45", "title": "Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws", "summary": "The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20101227_97-1025_7a1f6245bc6b04604ae278aa5f41e87ba833d9ed.pdf" }, { "format": "HTML", "filename": "files/20101227_97-1025_7a1f6245bc6b04604ae278aa5f41e87ba833d9ed.html" } ], "topics": [ { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Computer crimes - Law and legislation", "name": "Computer crimes - Law and legislation" }, { "source": "LIV", "id": "Technology", "name": "Technology" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc810858/", "id": "97-1025_2008Feb25", "date": "2008-02-25", "retrieved": "2016-03-19T13:57:26", "title": "Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20080225_97-1025_fef88869192ec59a0633ff66141e520b0194be24.pdf" }, { "format": "HTML", "filename": "files/20080225_97-1025_fef88869192ec59a0633ff66141e520b0194be24.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs9303/", "id": "97-1025 2005-06-28", "date": "2005-06-28", "retrieved": "2006-12-05T08:56:01", "title": "Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws", "summary": "The federal computer fraud and abuse statute, 18 U.S.C. 1030, protects federal computers, bank computers, and computers used in interstate and foreign commerce. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills crack and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of section 1030 and some of its federal statutory companions.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20050628_97-1025_a930ee431f0b4982f520249f48e0b72004b98232.pdf" }, { "format": "HTML", "filename": "files/20050628_97-1025_a930ee431f0b4982f520249f48e0b72004b98232.html" } ], "topics": [ { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Computer crimes - Law and legislation", "name": "Computer crimes - Law and legislation" }, { "source": "LIV", "id": "Technology", "name": "Technology" } ] } ], "topics": [ "American Law", "Intelligence and National Security" ] }