Cybercrime and the Law: Computer Fraud and Abuse Act (CFAA) and the 116th Congress

Cybercrime and the Law: Computer Fraud and
September 21, 2020
Abuse Act (CFAA) and the 116th Congress
Peter G. Berris
The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030, is a civil and criminal
Legislative Attorney
cybercrime law prohibiting a variety of computer-related conduct. Although sometimes described

as an anti-hacking law, the CFAA is much broader in scope. Indeed, it prohibits seven categories
of conduct including, with certain exceptions and conditions:

1. Obtaining national security information through unauthorized computer access and sharing or retaining it;
2. Obtaining certain types of information through unauthorized computer access;
3. Trespassing in a government computer;
4. Engaging in computer-based frauds through unauthorized computer access;
5. Knowingly causing damage to certain computers by transmission of a program, information, code, or command;
6. Trafficking in passwords or other means of unauthorized access to a computer;
7. Making extortionate threats to harm a computer or based on information obtained through unauthorized access to a
computer.
Since the original enactment of the CFAA in 1984, technology and the human relationship to it have continued to evolve.
Although Congress has amended the CFAA on numerous occasions to respond to new conditions, the rapid pace of
technological advancement continues to present novel legal issues under the statute. For example, with increasing
computerization has come a corresponding proliferation of Terms of Service (ToS) agreements—contractual restrictions on
computer use. But federal courts disagree on whether the CFAA imposes criminal liability for ToS violations, and the United
States Supreme Court is currently considering a case on this issue. Another technological development that has created
tension under the CFAA is the rise of botnets, which are networks of compromised computers often used by cybercriminals.
Although the CFAA prohibits creating botnets and using them to commit certain crimes, it is unclear if selling or renting a
botnet violates the statute—a potential concern given that botnet access is often rented from botnet brokers. On a more basic
level, another change that has prompted some reexamination of the CFAA is the seemingly-growing frequency of computer
crime. Some contend that the prevalence and perniciousness of hacking requires private actors to defend themselves by
hacking back—that is, initiating some level of intrusion into the computer of the initial attacker. The same provisions of the
CFAA that prohibit hacking ostensibly also make it a crime to hack back, which some legislation has sought to change.

Congressional Research Service


link to page 4 link to page 5 link to page 7 link to page 7 link to page 7 link to page 9 link to page 11 link to page 11 link to page 12 link to page 12 link to page 13 link to page 15 link to page 17 link to page 20 link to page 21 link to page 23 link to page 26 link to page 27 link to page 29 link to page 32 link to page 24 link to page 25 link to page 25 link to page 26 link to page 34 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

Contents
Introduction ................................................................................................................... 1
History of the CFAA........................................................................................................ 2
Overview of the CFAA .................................................................................................... 4
Key CFAA Terms ...................................................................................................... 4
Computer ............................................................................................................ 4
Without Authorization and Exceeds Authorized Access .............................................. 6
Prohibited Conduct Under the CFAA ............................................................................ 8
Cyber Espionage, 18 U.S.C. § 1030(a)(1)................................................................. 8
Obtaining Information by Unauthorized Computer Access, 18 U.S.C.
§ 1030(a)(2)...................................................................................................... 9
Government Computer Trespassing, 18 U.S.C. § 1030(a)(3) ..................................... 10
Computer Fraud: 18 U.S.C. § 1030(a)(4) ............................................................... 12
Damaging a Computer, 1030(a)(5) ........................................................................ 14
Password Trafficking, 18 U.S.C. § 1030(a)(6) ......................................................... 17
Threats and Extortion, 18 U.S.C. § 1030(a)(7) ........................................................ 18
Remedies and Penalties.................................................................................................. 20
Selected CFAA Issues in the 116th Congress ..................................................................... 23
The CFAA and ToS Violations ................................................................................... 24
Botnet Trafficking ................................................................................................... 26
Hacking Back ......................................................................................................... 29

Tables
Table 1. Overview of CFAA Maximum Penalties ............................................................... 21
Table 2. Overview of Maximum Penalties Under 18 U.S.C. § 1030(a)(2) ............................... 22
Table 3. Overview of Maximum Penalties Under 18 U.S.C. § 1030(a)(5)(A) .......................... 22
Table 4. Overview of Maximum Penalties Under 18 U.S.C. § 1030(a)(5)(B) .......................... 23

Contacts
Author Information ....................................................................................................... 31

Congressional Research Service


link to page 7 link to page 4 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

Introduction
Today, with computers more prevalent than ever before,1 il icit computer-based activities such as
hacking—intrusions or trespasses “into computer systems or data”2—are commonplace.3 For
example, on July 15, 2020, a malicious actor temporarily coopted the social media profiles of
prominent politicians as part of an apparent scam to obtain cryptocurrency.4 That same week,
domestic and foreign intel igence agencies warned that hackers with an al eged connection to
Russia are believed to be spying on coronavirus vaccine research in the United States and
elsewhere.5 Earlier in 2020, the Federal Bureau of Investigation (FBI) reported a spike in
COVID-19-related phishing emails—messages designed to trick recipients into divulging
personal information so the sender may access, for example, the recipient’s email or bank
accounts.6
Congress was prescient about the ubiquity of cybercrime nearly 40 years ago when it enacted the
Computer Fraud and Abuse Act (CFAA)—a civil7 and criminal law that prohibits a range of
computer-based behaviors.8 While a number of federal statutes may be relevant to combatting

1 According to the United States Census Bureau (Census Bureau), by one measure only 8% of households had a
computer in 1984. CAMILLE RYAN & JAMIE M. LEWIS, COMPUTER AND INTERNET USE IN THE UNITED STATES: 2015, U.S.
CENSUS BUREAU 2 (Sept. 2017), https://www.census.gov/content/dam/Census/library/publications/2017/acs/acs-37.pdf.
T hat same report indicated that the percentage increased to 87% of households in 2015, up from 84% in 2013. Id. For
its part, the Federal T rade Commission has estimated that 50 billion devices will be connected to the Internet of T hings
(IoT ) in 2020, a figure that includes internet -enabled devices such as smart appliances and fitness trackers. FEDERAL
T RADE COMMISSION, INTERNET OF THINGS: PRIVACY & SECURITY IN A CONNECTED WORLD i (Jan. 2015),
https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-
entitled-internet-things-privacy/150127iotrpt.pdf. For a review of Computer Fraud and Abuse Act (CFAA) issues
unique to the IoT , see generally Sara Sun Beale & Peter Berris, Hacking the Internet of Things: Vulnerabilities,
Dangers, and Legal Responses
, 16 DUKE L. & T ECH. REV. 161, 162 (Feb. 14, 2018). As discussed below, these devices
are computers in the context of the CFAA. See infra § “ Computer.”
2 United States v. Valle, 807 F.3d 508, 525 (2d Cir. 2015).
3 In 2019, the Federal Bureau of Investigation’s (FBI) Internet Crime Center (IC3) received 467,361 complaints
regarding internet -enabled crimes—“ an average of nearly 1,300 every day.” FBI, 2019 Internet Crim e Report Released
(Feb. 11, 2020), https://www.fbi.gov/news/stories/2019-internet -crime-report-released-021120. T he actual number of
computer and internet crimes is almost certainly higher, as many may escape detection entirely. See Beale, supra note
1, at 167–68 (“ Additionally, in many cases consumers have little or no way to know when their . . . devices have been
compromised . . . [as] [m]any objects connected to the internet continue to serve the function for which consumers
purchased them long aft er their software becomes insecure.”); see also Michel Cukier, Study: Hackers Attack Every 39
Seconds
, A. JAMES CLARK SCH. OF ENG’G (Feb. 9, 2007), https://eng.umd.edu/news/story/study-hackers-attack-every-
39-seconds#:~:text=A%20Clark%20School%20study%20is,attackers%20more%20chance%20of%20success
(concluding that computers connected to the internet are attacked “ every 39 seconds on average” by hackers).
4 Philip Ewing, Twitter Attack Underscores Broad Cyber Risks Still Facing U.S. Elections, NPR (July 17, 2020),
https://www.npr.org/2020/07/17/892044086/twitter-attack-underscores-broad-cyber-risks-still-facing-u-s-elections.
5 Chris Fox & Leo Kelion, Coronavirus: Russian Spies Target Covid-19 Vaccine Research, BBC (July 16, 2020),
https://www.bbc.com/news/technology-53429506.
6 CRS Legal Sidebar LSB10446, An Overview of Federal Criminal Laws Implicated by the COVID-19 Pandemic, by
Peter G. Berris.
7 T his Report cites to civil CFAA opinions as “most of the published cases interpreting § 1030 arise in the civil context
rather than the criminal context” and “[c]ourts generally use civil and criminal interpretations of federal statutes
interchangeably absent an indication that Congress intended a contrary approach.” ORIN S. KERR, COMPUTER CRIME
LAW 31, 75 (3d ed. 2013).
8 H.R. REP. NO. 98-894, at 10 (1984) (“[B]y combining the ubiquity of the telephone with the capability of the personal
computer, a whole new dimension of criminal activity becomes possible.”).
Congressional Research Service
1

link to page 5 link to page 29 link to page 32 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

nefarious computer activities such as those discussed above,9 the CFAA is perhaps the most
relevant, as it has been described as “the most important piece of U.S. legislation used to combat
computer crime.”10Among other things, the CFAA prohibits a person from trespassing into,
damaging, or acquiring information from certain categories of computers, assuming the user lacks
authorization for that conduct.11 Indeed, prosecutors invoke the CFAA to combat a variety of
computer-based activities.12 Nevertheless, some have suggested that the rapid pace of
technological change has rendered some provisions of the CFAA outmoded and difficult to apply
to new technologies and emerging cybercrime threats.13
This report provides a brief overview of the CFAA and legal issues under the statute brought
about by technological change—with primary emphasis on the CFAA’s role as a criminal statute.
The report begins with a history of the CFAA, before detailing the seven categories of conduct
that the statute prohibits. After summarizing the remedies and penalties available for CFAA
violations, the report provides a sketch of three select legal issues of possible interest for the
116th Congress. The first is whether the CFAA imposes criminal liability for violations of Terms
of Service Agreements—contracts placing restrictions on computer use.14 The Second involves
the problem of individuals sel ing access to botnets, which are networks of infected computers
often used by cybercriminals—transactions that may not be il egal under the CFAA.15 Third, the
Report describes the legal status of, and debate surrounding, hacking back—where the victim of a
computer intrusion responds by hacking back against the original malicious actor.16
History of the CFAA
By many accounts, the history of the CFAA begins with a movie—the 1983 thril er WarGames17
starring Matthew Broderick.18 In WarGames, Broderick’s character, a rebel ious high school

9 For example, relevant provisions might include, among others, federal laws criminalizing wire fraud under 18 U.S.C.
§ 1343, cyberstalking under 18 U.S.C. § 2261A, the interception of electronic communications under 18 U.S.C. § 2511,
or the unlawful access of stored communications under 18 U.S.C. § 2701. For an examination of how these and other
statutes apply to cybercrime, see generally U.S. DEP ’T OF JUSTICE, COMPUTER CRIME & INTELLECTUAL PROPERTY
SECTION, CRIMINAL DIVISION, PROSECUTING COMPUTER CRIMES (2015), https://www.justice.gov/sites/default/files/
criminal-ccips/legacy/2015/01/14/ccmanual.pdf.
10 DANIEL ETCOVICH & THYLA VAN DER MERWE, COMING IN FROM THE COLD: A SAFE HARBOR FROM THE CFAA AND THE
DMCA § 1201 FOR SECURITY RESEARCHERS, BERKMAN KLEIN CTR. RSCH. PUBL’N NO. 2018-4, HARVARD UNIV. 7
(2018), https://dash.harvard.edu/bitstream/handle/1/37135306/ComingOutoftheCold_FINAL.pdf#page=11 .
11 18 U.S.C. § 1030.
12 See U.S. DEP’T OF JUSTICE, supra note 9, at 35 (providing examples of the types of conduct that may be prosecuted
under just one of the CFAA’s subsections).
13 See, e.g., Andrea M. Matwyshyn & Stephanie K. Pell, Broken, 32 HARV. J.L. & T ECH. 479, 481 (2019) (“[O]ur
definitive computer intrusion statute, the [CFAA], belies its last -century crafting, as it strains under the new threat
vectors leveraged by this century’s formidable attackers.”); Amanda B. Gottlieb, Reevaluating the Com puter Fraud
and Abuse Act: Am ending the Statute to Explicitly Address the Cloud
, 86 FORDHAM L. REV. 767, 770 (2017)
(expressing opinion that “ in practice [the CFAA] has not been able to keep up with new innovations” and examining
whether the law adequately protects computers connected to the cloud); Marcelo T riana, Is Selling Malware A Federal
Crim e?
, 93 N.Y.U. L. REV. 1311, 1315 (2018) (examining whether the CFAA prohibits the sale of malware).
14 See generally CRS Legal Sidebar LSB10423, From Clickwrap to RAP Sheet: Criminal Liability under the Computer
Fraud and Abuse Act for Term s of Service Violations
, by Peter G. Berris (examining judicial disagreement on the
breadth of the CFAA with respect to T erms of Service Agreements violations).
15 See infra § “Botnet T rafficking.”
16 See infra § “Hacking Back.”
17 WARGAMES (Metro-Goldwyn-Mayer Studios 1983).
18 See Fred Kaplan, ‘WarGames’ and Cybersecurity’s Debt to a Hollywood Hack, N.Y. T IMES (Feb. 19, 2016),
Congressional Research Service
2

link to page 5 link to page 5 link to page 6 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

student, nearly starts World War III when he accesses the computer system controlling the United
States nuclear arsenal, mistaking the system for an interactive video game.19 The movie’s
depiction of the dangers of the computer age—where even nuclear annihilation could be a few
keystrokes away—was not lost on policy makers.20 According to one report, after viewing
WarGames at Camp David, President Ronald Reagan asked advisers and the chair of the Joint
Chiefs of Staff whether the plot of the movie was possible.21 The CFAA is sometimes “said to be
the [eventual] result of their deliberations,”22 although congressional interest in computer crimes
may be traced back at least as far as the 1970s.23
The first major federal computer-crime enactment came in the form of the Counterfeit Access
Device and Computer Fraud and Abuse Act of 1984 (the 1984 Act).24 With exceptions, the law
prohibited three subsets of computer-based conduct: (1) obtaining national security information
through unauthorized computer access; (2) obtaining financial information through unauthorized
computer access, and (3) trespassing into a government computer and “knowingly us[ing],
modif[ying], destroy[ing], or disclos[ing] information” on that computer.25 The 1984 Act faced a
number of criticisms over its relatively narrow scope,26 and the Department of Justice (DOJ)
expressed concern that the 1984 Act made computer crime prosecutions difficult.27 In 1986,
Congress substantial y amended the 1984 Act, and the modern CFAA has many of its roots in that
1986 amendment.28 Among other things, the 1986 amendment modified intent requirements and
prohibited new categories of conduct including password trafficking, damaging computers, and
accessing computers with intent to defraud.29 Since 1986, Congress has amended the CFAA on

https://www.nytimes.com/2016/02/21/movies/wargames-and-cybersecuritys-debt-to-a-hollywood-hack.html
(describing the birth of federal cybersecurity laws following President Ronald Reagan’s concern over the movie
“WarGames”); Ivan Evtimov et al., Is Tricking A Robot Hacking?, 34 BERKELEY TECH. L.J. 891, 904 (2019)
(“According to popular lore, President Reagan saw the movie War Games and met with his national security advisers
the next day to discuss America’s cyber vulnerabilities. T he CFAA is said to be the result of their deliberations.”); Jay
P. Kesan & Carol M. Hayes, Mitigative Counterstriking: Self-Defense and Deterrence in Cyberspace, 25 HARV. J.L. &
T ECH. 429, 492 (2012) (“ There is some evidence that when the CFAA was originally enacted in 1984, it was partially
in response to the situations depicted in the action film WarGames.”).
19 See Roger Ebert, WarGames, ROGEREBERT.COM (June 3, 1983), https://www.rogerebert.com/reviews/wargames-
1983 (reviewing and summarizing plot of WarGam es).
20 H.R. REP. NO. 98-894, at 10 (1984) (referencing WarGames in discussion of necessity of computer fraud legislation).
21 Kaplan, supra note 18.
22 Evtimov, supra note 18, at 904.
23 See CRS Report 97-1025, Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related
Federal Crim inal Laws
, by Charles Doyle, at n.2 (chronicling legislative history of CFAA).
24 Greg Pollaro, Note, Disloyal Computer Use and the Computer Fraud and Abuse Act: Narrowing the Scope, 2010
DUKE L. & T ECH. REV. 12, 4 (Aug. 26, 2010).
25 Pub. L. No. 98-473, § 2102, 98 Stat. 1837 (1984) (codified at 18 U.S.C. § 1030).
26 See, e.g., Jo-Ann M. Adams, Controlling Cyberspace: Applying the Computer Fraud and Abuse Act to the Internet,
12 SANTA CLARA COMPUTER & HIGH TECH. L.J. 403, 422 (1996) (“[The 1984 Act] protected a very narrow class of
financial and credit information.”).
27 See generally S. REP. NO. 99-432, at 6–9 (1986) (summarizing concerns expressed by DOJ).
28 Adams, supra note 26, at 422.
29 Id. at 423.
Congressional Research Service
3

link to page 6 link to page 5 link to page 4 link to page 5 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

numerous occasions,30 broadening both the conduct prohibited by the statute and the types of
computers protected.31 Today, the CFAA is the main federal32 computer fraud statute.33
Overview of the CFAA
Key CFAA Terms
Although the CFAA is the primary federal anti-hacking statute,34 the word “hacking” does not
appear in any of its various provisions.35 Instead, the statute criminalizes several categories of
conduct that include many types of computer hacking as wel as a variety of other computer-
based activities.36 Each category of conduct that the CFAA criminalizes tends to be defined by
several overarching key terms that appear throughout the CFAA. General y, the CFAA prohibits
conduct that (1) is carried out by an individual “without authorization” or who “exceeds
authorized access,” and that (2) involves a computer.37 Thus, the meanings of “computer,”
“without authorization,” and “exceeds authorized access” are al crucial to understanding the
scope of the CFAA.
Computer
The CFAA broadly38 defines “computer” as any “electronic, magnetic, optical, electrochemical,
or other high speed data processing device performing logical, arithmetic, or storage functions,”
including “any data storage facility or communications facility directly related to or operating in
conjunction with such device . . . .”39 The CFAA excludes only automated typewriters,
typesetters, portable hand held calculators, and similar devices from its definition of computer.40
These limited exceptions to the CFAA’s definition of “computer” “show just how general” the
statute’s definition of computer is.41 As one court explained, the definition includes any device
with an electronic data processor, of which there are numerous examples.42 Thus, under the
CFAA, computers include not only laptops and desktops, but also a wide array of computerized

30 See Doyle, supra note 23, at n.2 (listing CFAA amendments).
31 See U.S. DEP’T OF JUSTICE, supra note 9, at 1–2 (summarizing amendments to CFAA).
32 T he CFAA exists against the backdrop of numerous state computer crime laws that are beyond the scope of this
Report. E.g., VT. STAT. ANN. tit. 13, §§ 4101–07. Computer misuse statutes have been enacted in “ all fifty states . . . .”
KERR, supra note 7, at 29; accord Com puter Crim e Statutes, NAT’L CONF. OF STATE LEGISLATURES (Feb. 24, 2020),
https://www.ncsl.org/research/telecommunications-and-information-technology/computer-hacking-and-unauthorized-
access-laws.aspx (conducting survey of the computer crime laws of all 50 states).
33 See Evtimov, supra note 18, at 904 (“Since its implementation, the CFAA has been the nation’s predominant anti-
hacking law.”).
34 See id.
35 See 18 U.S.C. § 1030 (proscribing various conduct without use of the word “hacking”).
36 Id.
37 See, e.g., id. § 1030(a)(2) (prohibiting “intentionally access[ing] a computer without authorization” or in excess of
authorization, and obtaining certain types of information).
38 See United States v. Mitra, 405 F.3d 492, 495 (7th Cir. 2005) (discussing breadth of CFAA with respect to the types
of computers it governs).
39 18 U.S.C. § 1030(e)(1).
40 Id.
41 Mitra, 405 F.3d at 495 (emphasis omitted).
42 United States v. Kramer, 631 F.3d 900, 902 (8th Cir. 2011).
Congressional Research Service
4

link to page 4 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

devices ranging from cellphones to objects embedded with microchips, such as certain
microwave ovens, watches, and televisions.43
Protected Computers
Several provisions within the CFAA specifically concern “protected computers.”44 Among other
things, the CFAA defines protected computers as those that are either “exclusively for the use of
a financial institution or the United States Government” or that are “used in or affecting interstate
or foreign commerce or communication . . . .”45 Courts have construed the latter phrase as
including any computer connected to the internet.46 Thus, most modern computing devices are
subject to the CFAA’s protections, including Internet of Things devices such as smart appliances
and fitness trackers.47 Another important type of computer that fits within the definition of
protected computer is a server—a computer that manage website data and other information.48
For example, courts have concluded that the web servers storing and sharing the member data of
a large social media website qualified as protected computers.49

43 Id. at 902–03; accord United States v. Nosal, 844 F.3d 1024, 1050 (9th Cir. 2016) (“This means that nearly all
desktops, laptops, servers, smart -phones, as well as any ‘iPad, Kindle, Nook, X–box, Blu–Ray player or any other
Internet -enabled device,’ including even some thermost ats qualify as [protected computers].” (quoting United States v.
Nosal, 676 F.3d 854, 861 (9th Cir. 2012)); Berris, supra note Error! Bookmark not de fined., at 2 (describing CFAA
as “an anti-hacking law covering most computers, including laptops, desktops, websites, and computerized devices”).
44 18 U.S.C. § 1030.
45 Id. § 1030(e)(2).
46 See, e.g., hiQ Labs, Inc. v. LinkedIn Corp., 938 F.3d 985, 999 (9th Cir. 2019) (“The term ‘protected computer’ refers
to any computer ‘used in or affecting interstate or foreign commerce or communication,’ . . .
effectively any computer connected to the Internet . . . including servers, computers that manage network resources and
provide data to other computers.” (quoting 18 U.S.C. § 1030(e)(2)(B)) (internal citations omitted)).
47 Although federal cases specifically examining the CFAA’s applicability in the context of the Internet of T hings are
scarce, the general consensus among observers is that internet-enabled objects qualify as protected computers. E.g.,
Beale, supra note 1, at 170; accord Matthew Ashton, Note, Debugging the Real World: Robust Crim inal Prosecution
in the Internet of Things
, 59 ARIZ. L. REV. 805, 813 (2017) (“ Phones, tablets, Fitbits, and even public transit cards with
embedded computer chips are all included in the definition of a protected com puter.”); T J Wong, Is My Toaster a
Computer? The Computer Fraud and Abuse Act’s Definition of “Protected Computer” in the Age of the Internet of
Things
, COLUMB. J.L. & SOC. PROBS. (Mar. 30, 2019), http://jlsp.law.columbia.edu/2019/03/30/is-my-toaster-a-
computer-the-computer-fraud-and-abuse-acts-definition-of-protected-computer-in-the-age-of-the-internet-of-things/
(explaining that the definition of computer includes “ all IOT devices feeding us data online, such as fitness watches and
voice assistants,” which means that in “the age of IOT , the CFAA’s definition of ‘protected computers’ expands to
cover items beyond the plain meaning of the term” including toasters and refrigerators).
One interesting example from case law is that of United States v. Peterson. 776 F. App’x 533 (9th Cir. 2019). In
Peterson, the Federal Court of Appeals for the Ninth Circuit considered a vagueness challenge to a condition of
supervised release imposed on a defendant convicted of possessing child pornography. Id. at 533. The condition at
issue restricted the defendant from accessing a computer as defined by the CFAA. Id. at 534. In agreeing with the
defendant that the condition was potentially overbroad, the court observed that a wide range of objects fall within the
definition of computer under the CFAA, including “ refrigerators with Internet connectivity, Fitbit™ watches” and
certain automobiles. Id. at n.3. Although the court did not discuss these devices in relation to the phrase “ protected
computer,” it described them in a manner that would satisfy the definition of protected computer under the CFAA; as
the court noted, Internet of T hings devices are (1) computers (2) connected to the internet. Id.
48 hiQ Labs, Inc., 938 F.3d at 999.
49 Id.
Congressional Research Service
5

link to page 27 link to page 27 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

Without Authorization and Exceeds Authorized Access
Numerous provisions in the CFAA only apply if the defendant acts “without authorization” or if
he “exceeds authorized access” when committing the relevant conduct.50 For example, Section
1030(a)(2) prohibits intentional y accessing a computer without authorization or in excess of
authorization and obtaining information from a financial institution, the federal government, or a
protected computer.51 Other provisions contain nearly identical requirements.52
While the CFAA repeatedly uses the phrases “exceeds authorized access” and “without
authorization,” the statute does not fully define either phrase.53 In fact, the statute offers no
definition for “without authorization.”54 And, although the CFAA does explain that “exceeds
authorized access” means “access[ing] a computer with authorization and to use such access to
obtain or alter information in the computer that the accesser is not entitled so to obtain or alter,”
that definition hinges on the meaning of the undefined phrase “with authorization.”55
On a more fundamental level, the meaning of authority—the common concept in “exceeds
authorized access” and “without authorization”—is also undefined by the CFAA.56 In practice, it
appears that authority to use a computer may be positively granted in a number of ways—for
example through an employer who lets an employee use a work computer for business purposes57
or a website that al ows users to access its servers for some function.58 But the scope of
authority—and therefore its meaning under the CFAA—largely depends on the negative limits
placed on that authority in the specific context in which the statute is applied.59 As a result, it is
difficult if not impossible to separate authority from the phrases “exceeds authorized access” and
“without authorization,” as those phrases represent the outer boundaries of authorized computer
use.60 And those boundaries are hazy under the CFAA; courts, for example, disagree on the
extent to which authority may be curtailed by contractual restrictions,61 as opposed to
technological restrictions such as password requirements.62

50 18 U.S.C. § 1030.
51 Id. § 1030(a)(2).
52 Id. § 1030.
53 Id.
54 Id. § 1030(e).
55 Id. (emphasis added).
56 Id. § 1030.
57 See, e.g., United States v. Rodriguez, 628 F.3d 1258, 1263 (11th Cir. 2010) (explaining that employee was
authorized by employer to use database).
58 hiQ Labs, Inc. v. LinkedIn Corp., 938 F.3d 985, 1002 (9th Cir. 2019) (examining authority to access information on
website servers as byproduct of that information being generally available to the public).
59 See, e.g., Rodriguez, 628 F.3d at 1263 (describing scope of employee’s authority to use databases by its outer limit,
specifically that “use of databases to obtain personal information is authorized only when done for business reasons”);
Facebook, Inc. v. Power Ventures, Inc., 844 F.3d 1058 , 1067 (9th Cir. 2016) (describing how authorization was
removed by a written cease and desist letter).
60 See, e.g., hiQ Labs, Inc., 938 F.3d at 1003 (exploring limits of authority based on whether use of a computer fell into
the “without authorization” category as a result of a cease and desist letter).
61 Indeed, there is an unresolved split in the federal courts of appeals over whether “without authorization” and
“exceeds authorized access” permit criminal liability for violations of contracts restricting the permissible uses of a
given computer, such as employer computer use policies or T oS agreements—contracts that govern the use of a product
such as a website. See infra § “ T he CFAA and T oS Violations.
62 See infra § “T he CFAA and T oS Violations.” One scholar has suggested three types of restrictions that may limit
authorized computer use, including: (1) code based restrictions such as passwords or other means of programming
Congressional Research Service
6

link to page 4 link to page 5 link to page 10 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

Even if the meanings of “exceeds authorized access” and “without authorization” are unclear,
there is some indication in legislative history that the two phrases were intended to correspond to
different categories of unauthorized computer use.63 At least in theory, the intent was for “without
authorization” to apply to outsiders such as hackers,64 who are “wholly lacking in authority to
access or use [the relevant] computer.”65 In contrast, it appears that “exceeds authorized access”
may have been meant to apply to insiders66 such as employees who have some authorization to
use a computer, but who surpass that authority.67 For example, the Senate Report accompanying
the 1986 amendment to the CFAA reflects a concern that § 1030(a)(3)—which prohibits
trespassing in government computers—would be interpreted “so broad[ly] as to create a risk that
government employees and others who are authorized to use a Federal Government computer
would face prosecution” when they went beyond their authorization.68 According to that report, to
prevent the application of the law to such insiders, the “Committee [on the Judiciary] declined to
criminalize acts in which the offending employee merely ‘exceeds authorized access . . . .’”69
Whatever the legislative intent, judicial interpretations of “without authorization” and “exceeds
authorized access” have not been entirely consistent, and as one court opined, the difference
between the terms is “paper thin.”70 Some courts have maintained the distinction between insiders
and outsiders with respect to “exceeds authorized access” and “without authorization:”
concluding that insiders may act without authorization only after their authorization has been
terminated by an affirmative act such as a cease and desist letter.71 Similarly, some courts have
concluded that “without authorization” applies only to individuals who have no right to access a
computer whatsoever, such as those who bypass password requirements72 or who otherwise
“circumvent[] technological access restrictions.”73 But broader interpretations of “without
authorization” have been applied in other jurisdictions, including by some courts that have held
that insiders may act without authorization if they breach a duty of loyalty to an employer.74

hardware or software to restrict access; (2) contractual restrictions such as T erms of Service agreements; and (3) social
norms of computer use. KERR, supra note 7, at 40–41.
63 See U.S. DEP’T OF JUSTICE, supra note 9, at 5–6 (recounting legislative history regarding intended meanings of
“exceeds authorized access” and “without authorization”).
64 S. REP. No. 104-357, at 9 (1996) (describing outsiders as those “who gain access to a computer without
authorization.”).
65 S. REP. No. 99-432, at 8 (1986).
66 See S. REP. No. 104-357, at 6 (1996) (“The amendment specifically covers the conduct of . . . an insider who exceeds
authorized access . . . .”).
67 S. REP. No. 99-432, at 8 (1986) (describing “ purely ‘insider’ cases” as those of individuals “who, while authorized to
use some computers in their department, use others for which they lack the proper authorization.”).
68 Id. at 7.
69 Id.
70 Int’l Airport Ctrs., LLC v. Citrin, 440 F.3d 418, 420 (7th Cir. 2006). According to Professor Orin S. Kerr,
“technological changes have blurred the line between” the phrases “without authorization” and “exceeds authorized
access.” Brief of Professor Orin S. Kerr as Amicus Curiae in Support of Petitioner, Van Buren v. United States, No. 19 -
783, 2020 WL 4003433, at *16 (U.S. July 8, 2020).
71 See, e.g., LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1135 (9th Cir. 2009) (“Rather, we hold that a person uses
a computer ‘without authorization’ under §§ 1030(a)(2) and (4) when the person has not received permission to use the
computer for any purpose (such as when a hacker accesses someone’s computer without any permission), or when the
employer has rescinded permission to access the comput er and the defendant uses the computer anyway.”).
72 See, e.g., Pulte Homes, Inc. v. Laborers’ Int’l Union of N. Am., 648 F.3d 295, 304 (6th Cir. 2011) (holding that party
did not act without authorization by accessing an “unprotected public communications system[]”).
73 Brief of Professor Orin S. Kerr as Amicus Curiae in Support of Petitioner, supra note 70, at *16.
74 See Int’l Airport Ctrs., LLC, 440 F.3d at 420 (holding that employee’s authorization to use employer’s computer
Congressional Research Service
7

link to page 6 link to page 6 link to page 5 link to page 4 link to page 5 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

Prohibited Conduct Under the CFAA
The CFAA prohibits seven categories of conduct, ranging from certain acts of computer trespass
to unauthorized computer access with an intent to defraud.75
Cyber Espionage, 18 U.S.C. § 1030(a)(1)
Section 1030(a)(1)76 is a cyber-espionage provision that in certain instances prohibits obtaining
and sharing national security information77—such as “information that has been determined by
the United States Government pursuant to an Executive order or statute to require protection
against unauthorized disclosure for reasons of national defense or foreign relations . . . .”78
According to the DOJ, examples of national security information under § 1030(a)(1) could
include “classified information obtained from a Department of Defense computer or restricted
data obtained from a Department of Energy computer.”79 Nevertheless, in practice, the provision
has been rarely invoked, if at al ,80 perhaps because prosecutors charge offenses involving
national security information under federal espionage statutes that overlap with § 1030(a)(1).81
Prosecutions under § 1030(a)(1) require the government to establish several elements beyond a
reasonable doubt. First, the government would need to prove that the defendant obtained the
national security information by knowingly82 accessing a computer without authorization or in

terminated where he breached duty of loyalty and improperly erased em ployer’s data).
75 T he content of this section draws heavily from Doyle, supra note 23.
76 18 U.S.C. § 1030(a)(1) imposes criminal penalties on:
(a) Whoever--
(1) having knowingly accessed a computer without authorization or exceeding authorized
access, and by means of such conduct having obtained information that has been determined by
the United States Government pursuant to an Executive order or statute to require protection
against unauthorized disclosure for reasons of national defense or foreign relations, or any
restricted data, as defined in paragraph y. of section 11 of the Atomic Energy Act of 1954, with
reason to believe that such information so obtained could be used to the injury of the United
States, or to the advantage of any foreign nation willfully communicates, delivers, transmits, or
causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver,
transmit or cause to be communicated, delivered, or transmitted the same to any person not
entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee
of the United States entitled to receive it.
77 Doyle, supra note 23, at 71–72 (noting that § 1030(a)(1) “essentially tracks existing federal espio nage laws” and
prohibits the willful disclosure, attempted disclosure, or failure to return “ classified information concerning national
defense, foreign relations, or atomic energy” when certain conditions are met).
78 18 U.S.C. § 1030(a)(1).
79 U.S. DEP’T OF JUSTICE, supra note 9, at 13.
80 See KERR, supra note 7, at 30 (“Although it is the first in the list of § 1030(a) crimes, [§ 1030(a)(1)] appears never to
have been used.”).
81 See, e.g., Press Release, U.S. Dep’t of Justice, Defense Department Linguist Charged with Espionage (Mar. 4, 2020),
https://www.justice.gov/opa/pr/defense-department -linguist-charged-espionage (announcing charges against defendant
under espionage statutes rather than § 1030(a)(1) for alleged conduct including improperly accessing United States
Department of Defense “classified systems” which defendant “had no need to access” and transmitting that information
to “a foreign terrorist organization”); accord U.S. DEP’T OF JUSTICE, supra note 9, at 15 (“In situations where both [§
1030(a)(1) and a federal espionage statute] . . . are applicable, prosecutors may tend towards using [the espionage
statutes], for which guidance and precedent are more prevalent.”).
82 Although the CFAA does not define “knowingly,” and despite a dearth of case law on § 1030(a)(1), a Senate Report
accompanying the 1986 amendment to the CFAA noted that a knowing act is one where the person is aware “that the
result is practically certain to follow from his conduct, whatever his desire may be as to that result.” S. REP . NO. 99-432,
Congressional Research Service
8

link to page 5 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

excess of authorization.83 Notably, § 1030(a)(1) broadly covers al computers, as opposed to just
protected computers.84 Second, a § 1030(a)(1) violation requires the government to establish that
the defendant had reason to believe that the information could cause “injury to the United States”
or benefit “any foreign nation.”85 There is little case law expounding on this element, but the DOJ
has indicated that it can likely be satisfied where “the national security information is classified or
restricted” and the defendant was aware of that fact.86 Final y, the government must prove that the
defendant “wil fully communicate[d], deliver[ed], transmit[ted] or . . . retain[ed]” the national
security information, or attempted to do so, or caused the communication, delivery, or
transmission of national security information.87 This element is broad, and by its own terms
includes a range of activities including the failure to return national security information or the
disclosure of that information. 88 However, such behavior must be intentional.89
Obtaining Information by Unauthorized Computer Access, 18 U.S.C.
§ 1030(a)(2)

Section 1030(a)(2)90 general y prohibits accessing a computer without authorization or in excess
of authorization and obtaining information in certain circumstances. Although at first glance it
could appear that to “obtain information” might refer specifical y to misappropriation or theft of
information, the concept is much broader.91 Indeed, as interpreted by courts, “obtaining
information” includes “mere observation of the data” such as looking at or reading information on
a screen.92 Perhaps unsurprisingly then, the government has invoked § 1030(a)(2) in a variety of

at 6 (1986) (quoting United States v. U.S. Gypsum Co., 438 U.S. 422, 445 (1978)). T hat description tracks judicial
interpretations of the word knowing under other subsections of the CFAA, where courts have concluded that the term
excludes accidental behavior. See QVC, Inc. v. Resultly, LLC, 99 F. Supp. 3d 525, 536 (E.D. Pa. 2015) (concluding
that § 1030(a)(5)(A) requires showing that “ defendant intended to cause harm” and that “[d]amage caused by mere
recklessness or negligence is insufficient”).
83 18 U.S.C. § 1030(a)(1).
84 Id.
85 Id.
86 U.S. DEP’T OF JUSTICE, supra note 9, at 14.
87 18 U.S.C. § 1030(a)(1).
88 Id.
89 Id.
90 Section 1030(a)(2) imposes criminal liability on:
(a) Whoever--
(2) intentionally accesses a computer without authorization or exceeds authorized access, and
thereby obtains--
(A) information contained in a financial record of a financial institution, or of a card issuer
as defined in section 1602(n) of title 15, or contained in a file of a consumer reporting
agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15
U.S.C. 1681 et seq.);
(B) information from any department or agency of the United States; or
(C) information from any protected computer.
91 See United States v. Drew, 259 F.R.D. 449, 457 (C.D. Cal. 2009) (“‘Obtain[ing] information from a computer’ has
been described as ‘includ[ing] mere observation of the data. Actual aspiration . . . need not be proved in order to
establish a violation . . . .’” (alterations in original) (quoting S. REP. NO. 99-432, at 6–7 (1986))); Am. Online, Inc. v.
Nat’l Health Care Disc., Inc., 121 F. Supp. 2d 1255, 1276 (N.D. Iowa 2000) (looking to legislative history for the
preposition that § 1030(a)(2) covers not just theft but also the observation of data).
92 See Drew, 259 F.R.D. at 457 n.13 (“[T]he term ‘obtaining information’ includes merely reading it.” (alteration in
Congressional Research Service
9

link to page 4 link to page 4 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

prosecutions,93 including that of a former police sergeant for using a restricted law enforcement
database for non-law enforcement purposes94 and an Italian citizen for “hack[ing] into thousands
of computers without permission [and] . . . gaining access to al of the information stored on those
computers.”95
Although they do not significantly limit the provision’s scope, there are three additional statutory
requirements that the government must satisfy to prove a § 1030(a)(2) violation.96 First, §
1030(a)(2) requires intentional access to a computer by the defendant, “rather than mistaken,
inadvertent, or careless” access.97 However, the intent requirement is a low bar to prosecution
because intent to obtain information is not required; instead al that is required is intent to access
a computer without authorization or in excess of authorization.98 Second, the defendant’s access
must be without authorization or in excess of authorization—elements that are discussed above.
Final y, for § 1030(a)(2) to apply, the information must be obtained from either a financial
institution,99 the federal government, or “any protected computer.”100 As discussed, any computer
connected to the internet suffices. Thus, as one court explained, barring a narrow interpretation of
“without authorization” or “exceeds authorized access,” it is possible that § 1030(a)(2) could
criminalize any conscious violation of ToS or other contractual restrictions on computer use.101 As
discussed below, however, prosecutorial discretion and DOJ charging policies may in practice
restrict the application of provisions such as § 1030(a)(2) to some degree.
Government Computer Trespassing, 18 U.S.C. § 1030(a)(3)
Section 1030(a)(3)102 general y prohibits intentional y accessing a government computer without
authorization. It is “a simple trespass offense,”103 which at common law often refers to an
unsanctioned entry on to the land of another, regardless of whether that entry caused any harm.104

original) (quoting S. REP . NO. 104–357, at 7 (1996))).
93 Section 1030(a)(2) is “the most commonly charged section of the [CFAA].” KERR, supra note 7, at 76.
94 United States v. Van Buren, 940 F.3d 1192, 1198 (11th Cir. 2019), cert. granted, No. 19-783, 2020 WL 1906566
(U.S. Apr. 20, 2020).
95 United States v. Gasperini, 894 F.3d 482, 487 (2d Cir. 2018).
96 See generally KERR, supra note 7, at 78–79 (explaining breadth of § 1030(a)(2) and why requirements in that
provision pose “relatively low thresholds”).
97 S. REP. NO. 99-432, at 5 (1986).
98 Drew, 259 F.R.D. at 467 (“T he only scienter element in section 1030(a)(2)(C) is the requirement that the person must
‘intentionally’ access a computer without authorization or ‘intentionally’ exceed authorized access.”).
99 T he provision also includes information obtained from card issuers and consumer reporting agencies. 18 U.S.C.
§ 1030(a)(2).
100 18 U.S.C. § 1030(a)(2).
101 Drew, 259 F.R.D. at 457.
102 18 U.S.C. § 1030(a)(3) imposes criminal liability on:
(a) Whoever--
(3) intentionally, without authorization to access any nonpublic computer of a department or
agency of the United States, accesses such a computer of that department or agency that is
exclusively for the use of the Government of the United States or, in the case of a computer not
exclusively for such use, is used by or for the Government of the United States and such conduct
affects that use by or for the Government of the United States.
103 S. REP. NO. 99-432, at 7 (1986) (clarifying that § 1030(a)(3) “applies to acts of simple trespass against computers
belonging to, or being used by or for, the Federal Government”).
104 E.g., Restatement (Second) of T orts § 158 (1965). Criminal liability for trespass—under various statutes—often
involves additional requirements such as notice to a person that he is trespassing, followed by that person’s knowing
Congressional Research Service
10

link to page 6 link to page 5 link to page 5 link to page 5 link to page 9 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

Thus, unlike the previous two CFAA prohibitions, the crux of a § 1030(a)(3) violation is
unauthorized entry into government computers, and the provision does not require that the
defendant do anything with, or obtain anything from, the covered computer once he has accessed
it.105 The provision is seldom invoked by prosecutors, likely because it overlaps significantly with
§ 1030(a)(2), which imposes stricter penalties.106
There are two ways the government can establish a § 1030(a)(3) violation.107 First, the
government may demonstrate that the defendant accessed a “nonpublic computer of a department
or agency of the United States” used exclusively by the federal government.108 A nonpublic
computer includes one for internal use, such as the data servers of a federal agency.109 The term
nonpublic computer excludes, however, public-facing government computers, internet servers,
and websites, such as those offering public services or information.110 Second, the government
may establish a § 1030(a)(3) violation where the defendant accesses a “nonpublic computer of a
department or agency of the United States,” if that computer is used in part by the federal
government and the defendant’s “conduct affects that use.”111 A computer used in part by the
federal government might include, for example, a private company’s computer on which the
federal government has an account.112 In practice, “[a]lmost any network intrusion wil affect the
government’s use of its computers because any intrusion potential y affects the confidentiality
and integrity of the government’s network and often requires substantial measures to assure the
integrity of data and the security of the network.”113
Regardless of the nature of the § 1030(a)(3) violation, the government must prove that the
defendant’s access was intentional and without authorization.114 The intent requirement is
identical to the one in § 1030(a)(2). Although the meaning of “without authorization” is also
discussed above,115 it is notable that the statute excludes liability where the defendant’s conduct
merely exceeds authorized access.116 Based on legislative history, it appears that such language
was omitted to foreclose criminal liability against those who have some authorization, like federal
employees approved to use a government computer, but who do so in an unapproved manner.117

refusal to vacate the area in which he is trespassing. E.g., CONN. GEN. STAT. § 53a-107.
105 Doyle, supra note 23, at 3 (explaining that “nothing more than unauthorized entry is required” to violate §
1030(a)(3).
106 See U.S. DEP’T OF JUSTICE, supra note 9, at 23, 25 (explaining why § 1030(a)(2) may be the “preferred charge” in
instances where both § 1030(a)(2) and § 1030(a)(3) could apply).
107 18 U.S.C. § 1030(a)(3).
108 Id.
109 See U.S. DEP’T OF JUSTICE, supra note 9, at 24 (“‘Nonpublic’ includes most government computers, but not Internet
servers that, by design, offer services to members of the general public.”).
110 Id.
111 18 U.S.C. § 1030(a)(3).
112 U.S. DEP’T OF JUSTICE, supra note 9, at 24.
113 Id.; accord Sawyer v. Dep’t of Air Force, 31 M.S.P.R. 193, 196 (1986) (“The elements for establishing a criminal
violation of 18 U.S.C. § 1030(a)(3) . . . do not include the requirement that the prohibited access to the computer
system be for the specific purpose of defrauding the government. Rather, that statutory provision defines as a criminal
violation the knowing unauthorized access or use of the system for any un authorized purpose.”).
114 18 U.S.C. § 1030(a)(3).
115 See supra § “Without Authorization and Exceeds Authorized Access.”
116 Id.
117 As noted in S. REP. NO. 99-432, at 7 (1986):
T he Committee wishes to be very precise about who may be prosecuted under the new subsection
Congressional Research Service
11

link to page 5 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

Computer Fraud: 18 U.S.C. § 1030(a)(4)
Section 1030(a)(4)118 is an anti-fraud provision, which makes it a crime to “knowingly and with
intent to defraud, access[] a protected computer without authorization, or exceed[] authorized
access” and obtain anything of value, or use of the computer itself if that use is worth at least
$5,000 a year.119 Prosecutors have used § 1030(a)(4) to charge a variety of fraudulent activity
involving computers, including the use of a lottery terminal to falsely generate winning tickets,120
a phishing scheme that netted “hundreds of thousands of dollars,”121 and a plot to use
misappropriated computer credentials to inflate grades at two universities.122
To prove a violation of § 1030(a)(4), the government must first establish that the defendant
“knowingly and with intent to defraud, access[ed] a protected computer without authorization, or
exceed[ed] authorized access.” The statute does not define what it means to act knowingly and
with intent to defraud in the context of § 1030(a)(4).123 However, in the context of a civil
§ 1030(a)(4) claim, at least one federal court has explained that “intent to defraud” means to act
“wil fully and with specific intent to deceive or cheat, usual y for the purpose of getting financial
gain for one’s self or causing financial loss to another.”124 Further guidance on the meaning of
“knowingly and with intent to defraud” may be found in the legislative history of § 1030(a)(4),
which notes that the identical standard is also employed in 18 U.S.C. § 1029, which governs
credit card fraud.125 In the context of § 1029, “knowingly and with intent to defraud” means “that
the offender is conscious of the natural consequences of his action (i.e., that it is likely that

(a)(3). T he Committee was concerned that a Federal computer crime statute not be so broad as to
create a risk that government employees and others who are authorized to use a Federal Government
computer would face prosecution for acts of computer access and use that, while technically wrong,
should not rise to the level of criminal conduct. At the same time, the Committee was required to
balance its concern for Federal employees and other authorized users against the legitimate need to
protect Government computers against abuse by “outsiders.”
118 18 U.S.C. § 1030(a)(4) imposes criminal liability on whoever:
[K]nowingly and with intent to defraud, accesses a protected computer without authorization, or
exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains
anything of value, unless the object of the fraud and the thing obtained consists only of the use of the
computer and the value of such use is not more than $5,000 in any 1 -year period.
119 Id.
120 United States v. Bae, 250 F.3d 774, 775 (D.C. Cir. 2001).
121 United States v. Iyamu, 356 F. Supp. 3d 810, 814 (D. Minn. 2018).
122 United States v. Barrington, 648 F.3d 1178, 1184 (11th Cir. 2011).
123 U.S. DEP’T OF JUSTICE, supra note 9, at 27 (“The phrase ‘knowingly and with intent to defraud’ is not defined by
section 1030. Very little case law under section 1030 exists as to its meaning, leaving open the question of how broadly
a court will interpret the phrase.”).
124 Fidlar T echs. v. LPS Real Estate Data Sols., Inc., 82 F. Supp. 3d 844, 851 (C.D. Ill. 2015) (quoting United States v.
Henningsen, 387 F.3d 585, 590–91 (7th Cir. 2004)), aff’d, 810 F.3d 1075 (7th Cir. 2016); see also United States v.
Nosal, 676 F.3d 854, 864 (9th Cir. 2012) (Silverman J., dissenting) (concluding that § 1030(a)(4) requires specific
intent to defraud). More generally, other federal courts that have concluded that to “ defraud” under § 1030(a)(4) refers
broadly to wrongdoing rather than to the specific elements of common law fraud—see, e.g., Hanger Prosthetics &
Orthotics, Inc. v. Capstone Orthopedic, Inc., 556 F. Supp. 2d 1122, 1131 (E.D. Cal. 2008) (“ The term ‘defraud’ for
purposes of § 1030(a)(4) simply means wrongdoing and does not require proof of common law fraud.”) —namely “(1) a
representation; (2) its falsity; (3) its materiality; (4) the speaker's knowledge of its falsity or ignorance of its truth; (5)
an intent that it be acted on by the person and in the manner reasonably contemplated; (6) the hearer's ignorance of its
falsity; (7) reliance on its truth; (8) the right to rely thereon; and (9) consequent and proximate injury.” Wilcox v. First
Interstate Bank of Or., NA, 815 F.2d 522, 531 n.7 (9th Cir. 1987) (citing Rice v. McAlister, 519 P.2d 1263, 1265 (Or.
1974)).
125 S. REP. NO. 99-432, at 10 (1986).
Congressional Research Service
12

link to page 6 link to page 5 link to page 4 link to page 5 link to page 6 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

someone will be defrauded) and intends that those consequences should occur (i.e., he intends
that someone should be defrauded).”126
There are two additional requirements to violate § 1030(a)(4). First, the government must prove
that in accessing the protected computer, the defendant furthered the fraud.127 In other words, the
access must be “directly linked to the intended fraud.”128 Thus, § 1030(a)(4) does not govern
frauds where computer use is incidental—for example where an individual simply uses the
computer for record keeping or to “add up his potential ‘take’ from the [fraud].”129 Second, the
government must prove that the defendant obtained “anything of value.”130 That element is
“easily met if the defendant obtained money, cash, or a good or service with measurable value.”131
However, merely obtaining information may not alone suffice.132 In addition, at least one court
has concluded that whatever is taken must be valuable not merely in the abstract, but specifical y
to the defendant “in light of a fraudulent scheme.”133 Computer use, in and of itself, may be a
thing of value for the purposes of § 1030(a)(4), but only if that use is worth at least $5,000 a
year.134 Although the concept of computer use as a thing of value is underdeveloped in case law, a
Senate Report accompanying the 1986 Amendment to the CFAA provides some indication that
computer use may be a thing of value where it reduces computer availability that would otherwise
generate revenue for the computer owner through usage fees paid by valid users.135 Although
some observers have suggested that this idea is outmoded given the modern prevalence of
computers and the corresponding decrease in the value of computer use,136 the DOJ has suggested
that it may still be possible for computer use to meet the $5,000 threshold in the case of recurring
or continuing use of an expensive computer.137 In any event, the $5,000 threshold for fraud solely
resulting in computer use is intended to “minimize[] the possibility that mere computer
trespassing will be prosecuted as fraud.”138 As the same 1986 Senate Report observed, if every
trespass were thought of as “an attempt to defraud a service provider of computer time,” it would
obliterate the distinction between § 1030(a)(4) and the CFAA provisions that prohibit trespass. 139
In practice, it is difficult to invoke § 1030(a)(4) against a computer trespasser in the absence of
other conduct, because courts may be reluctant to infer adequate proof of an intent to defraud
from mere unauthorized computer access or even observation of data 140

126 See Doyle, supra note 23, at 50.
127 18 U.S.C. § 1030(a)(4).
128 S. REP. NO. 99-432, at 9 (1986).
129 Id.
130 18 U.S.C. § 1030(a)(4).
131 U.S. DEP’T OF JUSTICE, supra note 9, at 32.
132 United States v. Czubinski, 106 F.3d 1069, 1078–79 (1st Cir. 1997) (reversing defendant’s § 1030(a)(4) conviction
for obtaining information because the “ [t]he value of information is relative to one’s needs and objectives” and “ the
government had to show that the information was valuable to [the defendant] in light of a f raudulent scheme”).
133 Id. at 1078.
134 18 U.S.C. § 1030(a)(4).
135 S. REP. NO. 99-432, at 10 (1986) (“The Committee agrees that the mere use of a computer or computer service has a
value all its own. Mere trespasses onto someone else’s computer system can cost the system provider a ‘port’ or access
channel that he might otherwise be making available for a fee to an authorized user.”).
136 KERR, supra note 7, at 99.
137 U.S. DEP’T OF JUSTICE, supra note 9, at 32.
138 See Doyle, supra note 23, at 51.
139 S. REP. NO. 99-432, at 10 (1986).
140 Czubinski, 106. F3d at 1075 (concluding that government did not adequately p rove “intent to deprive . . . and, a
Congressional Research Service
13

link to page 5 link to page 4 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

Damaging a Computer, 1030(a)(5)
Broadly speaking, § 1030(a)(5)141 prohibits a variety of acts that result in damage to a computer.
Subsection 1030(a)(5) may be used to prosecute many of the activities that are commonly
associated with hacking, such as the transmission of viruses or worms and unauthorized access by
intruders who delete files or shut off computers.142 The provision may also be used to prosecute
the perpetrators of Distributed Denial of Service (DDoS) attacks,143 which occur, for example,
when an attacker overwhelms a server’s ability to process legitimate requests by overloading the
server with a flood of il egitimate traffic.144 Indeed, the government has invoked § 1030(a)(5) in a
variety of prosecutions, such as those of a Russian national for deploying malware that “resulted
in tens of mil ions of dollars of losses to victims worldwide”;145 an Il inois resident for developing
websites used to launch “mil ions of DDoS attacks that disrupted the internet connections of
targeted victim computers”;146 and the former IT employee of a major railroad who damaged his
employer’s computer network by “strategical y delet[ing] files, remov[ing] administrative-level
accounts, and chang[ing] passwords.”147
The first act that § 1030(a)(5)—specifical y under subsection (A)—criminalizes is to “knowingly
cause[] the transmission of a program, information, code, or command” and thereby
“intentional y cause[] damage without authorization, to a protected computer.”148 Transmission
“encompasses a range of hacking activities, such as ‘[t]he transfer of operation or confidential
information,’ ‘malicious software updates,’ ‘code injection attacks,’ DDoS, and the ‘embedding
of malicious code’ or malware.”149 Transmission may occur through use of the internet or

fortiori, a scheme to defraud” where defendant accessed computer and looked at confidential information, but there was
no evidence that defendant intended to use that information for anything other than browsing).
141 18 U.S.C. § 1030(a)(5) imposes criminal liability on:
(a) Whoever--
(5)(A) knowingly causes the transmission of a program, information, code, or command, and as
a result of such conduct, intentionally causes damage without authorization, to a protected
computer;
(B) intentionally accesses a protected computer without authorization, and as a result of such
conduct, recklessly causes damage; or
(C) intentionally accesses a protected computer without authorization, and as a result of such
conduct, causes damage and loss.
142 U.S. DEP’T OF JUSTICE, supra note 9, at 35.
143 Id.
144 Cybersec. & Infrastructure Sec. Agency, Security Tip (ST04-015): Understanding Denial-of-Service Attacks (last
revised Nov. 20, 2019), https://us-cert.cisa.gov/ncas/tips/ST 04-015.
145 Press Release, U.S. Dep’t of Justice, Russian National Charged with Decade-Long Series of Hacking and Bank
Fraud Offenses Resulting in T ens of Millions in Losses and Second Russian National Charged with Involvement in
Deployment of “Bugat” Malware (Dec. 5, 2019), https://www.justice.gov/opa/pr/russian-national-charged-decade-long-
series-hacking-and-bank-fraud-offenses-resulting-tens (quoting statement of Assistant Attorney General Brian A.
Benczkowski).
146 Press Release, U.S. Dep’t of Justice, Former Operator of Illegal Booter Services Sentenced for Conspiracy to
Commit Computer Damage and Abuse (Nov. 15, 2019), https://www.justice.gov/opa/pr/former-operator-illegal-booter-
services-sentenced-conspiracy-commit-computer-damage-and-abuse.
147 Press Release, U.S. Dep’t of Justice, Former IT Employee of T ranscontinental Railroad Sentenced to Prison for
Damaging Ex-Employer’s Computer Network (Feb. 13, 2018), https://www.justice.gov/opa/pr/former-it-employee-
transcontinental-railroad-sentenced-prison-damaging-ex-employer-s-computer.
148 18 U.S.C. § 1030(a)(5)(A).
149 Beale, supra note 1, at 170 (quoting Ioana Vasiu & Lucian Vasiu, Break on Through: An Analysis of Computer
Dam age Cases
, 14 U. PITT. J. T ECH. L. POL’Y 158, 167–69 (2014)).
Congressional Research Service
14

link to page 4 link to page 5 link to page 4 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

physical mediums like compact discs.150 Indeed, some courts have gone so far as to conclude that
the exact means of transmission is actual y irrelevant, focusing instead on whether the program,
information, code, or command caused damage.151 The phrase “program, information, code, or
command” meanwhile, broadly includes “al transmissions that are capable of having an effect on
a computer’s operation,” such as worms, “software commands (such as an instruction to delete
information),” and “network packets designed to flood a network connection or exploit system
vulnerabilities.”152
To prove a § 1030(a)(5)(A) violation, the government must establish dual intents on the part of
the defendant. First, the government must prove that the defendant’s transmission was
knowing.153 That requirement excludes accidental transmission—for example, in the case of an
unsuspecting user who recklessly or negligently forwards an email with malware attached in a file
or link.154 Second, the government must prove that the defendant intentional y caused damage to
a protected computer without authorization.155 The meanings of protected computer and without
authorization are discussed in detail above, but the meaning of intent to cause damage requires
further discussion. According to at least one court, intent in the context of § 1030(a)(5)(A) means
that the defendant had the “conscious purpose of causing damage . . . to [the relevant]
computer.”156 The CFAA defines damage to mean “impairment to the integrity or availability of
data, a program, a system, or information,”157 which occurs, for example, where a hacker causes a
computer to behave in a manner contrary to the intentions of its owner.158 Thus, an act that causes
damage under the CFAA may include “clearly destructive behavior such as using a virus or worm
or deleting data . . . [b]ut it may also include less obviously invasive conduct, such as flooding an
email account.”159 For example, one federal court concluded that damage occurred as a result of

150 Beale, supra note 1, at 170 (citing Deborah F. Buckman, Annotation, Validity, Construction, and Application of
Com puter Fraud and Abuse Act (18 U.S.C.A. § 1030)
, 174 A.L.R. FED. 101 (2001)); accord United States v. Sullivan,
40 F. App’x 740, 743–44 (4th Cir. 2002) (per curiam) (concluding that a transmission under 18 U.S.C. § 1030(a)(5)(A)
occurred through insertion of code into a computer system that eventually found its way into hand-held computers); N.
T ex. Preventive Imaging LLC v. Eisenberg, No. SA CV 96-71AHS(EEX), 1996 WL 1359212, at *6 (C.D. Cal. Aug.
19, 1996) (“T he transmission of a disabling code by floppy computer disk may fall within . . . [§ 1030(a)(5)(A)], if
accompanied by the intent to cause harm.”).
151 See, e.g., Patrick Patterson Custom Homes, Inc. v. Bach, 586 F. Supp. 2d 1026, 1035 (N.D. Ill. 2008) (“While
Plaintiffs acknowledge that the precise method of installation of the erasure program is unknown, the Seventh Circuit
recognizes that the precise mode of transmission is irrelevant.”).
152 U.S. DEP’T OF JUSTICE, supra note 9, at 37.
153 18 U.S.C. § 1030(a)(5)(A).
154 See QVC, Inc. v. Resultly, LLC, 99 F. Supp. 3d 525, 536 (E.D. Pa. 2015) (concluding that § 1030(a)(5)(A) requires
showing that “ defendant intended to cause harm” and that “[d]amage caused by mere recklessness or negligence is
insufficient”).
155 18 U.S.C. § 1030(a)(5)(A).
156 Pulte Homes, Inc. v. Laborers’ Int’l Union of N. Am., 648 F.3d 295, 303 (6th Cir. 2011); accord United States v.
Carlson, 209 F. App’x 181, 184 (3d Cir. 2006) (discussing § 1030(a)(5) prosecution and noting that although CFAA
does not define “intentionally,” “this Court has defined it in the criminal context as performing an act deliberately and
not by accident”).
157 18 U.S.C. § 1030(e)(8).
158 See Berris, supra note Error! Bookmark not defined., at 2 (explaining that damage “ occurs, for example, where a
hacker causes a comput er to behave in a manner contrary to the intentions of its owner.”); accord United States v.
Yücel, 97 F. Supp. 3d 413, 420 (S.D.N.Y. 2015) (construing damage under § 1030(a)(5) to include instances where a
computer is caused to “no longer operate[] only in response to the commands of the owner”). For a more detailed
examination of different examples of damage, see, e.g., KERR, supra note 7, at 107–08.
159 United States v. Hutchins, 361 F. Supp. 3d 779, 794 (E.D. Wis. 2019) (alterations in original) (quoting Fidlar T ech.
v. LPS Real Estate Data Sols., Inc., 810 F.3d 1075, 1084–85 (7th Cir. 2016)).
Congressional Research Service
15

link to page 4 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

an orchestrated effort to bombard a company’s “sales offices and three of its executives with
thousands of phone calls and e-mails,” which diminished the ability of that company to use their
systems.160
Other violations of § 1030(a)(5) may occur where a defendant intentional y accesses a protected
computer without authorization and causes damage, even if he does not intend to cause such
damage.161 However, for such unintended damage to amount to a § 1030(a)(5) violation, it must
either be reckless or result in loss.162 Although the CFAA does not define what it means to
recklessly cause damage, in general the “normal meaning of reckless in the criminal law (unlike
the civil law) is that the defendant disregarded ‘a risk of harm of which he is aware.’”163 Although
case law provides few il ustrations, an individual may recklessly cause damage to a computer if
he is aware of the risk that his unauthorized computer access may cause damage, but proceeds
anyway and does indeed damage the computer.164 The CFAA defines loss as “any reasonable cost
to any victim, including the cost of responding to an offense, conducting a damage assessment,
and restoring the data, program, system, or information to its condition prior to the offense, and
any revenue lost, cost incurred, or other consequential damages incurred because of interruption
of service.”165 Federal courts disagree on whether proving interruption of service—such as
computer systems or files being rendered unavailable—is a prerequisite to demonstrating loss.166
In other words, some courts construe loss to include reasonable costs caused by offenses
regardless of whether those offenses involve service interruption, but other courts more narrowly
interpret loss under the CFAA as requiring service interruption.167

160 Pulte Homes, Inc., 648 F.3d at 299, 301.
161 18 U.S.C. § 1030(a)(5).
162 Id.
163 United States v. McCord, Inc., 143 F.3d 1095, 1098 (8th Cir. 1998) (quoting Farmer v. Brennan, 511 U.S. 825, 837
(1994)).
164 For example, one federal court found that a plaintiff sufficiently alleged a civil § 1030(a)(5) violation with
allegations that the defendant recklessly caused damage by unauthorized computer access where he deleted data from
the plaintiff’s website, accounts, and server. MSC Safety Sols., LLC v. T rivent Safety Consulting, LLC, No. 19 -CV-
00938-MEH, 2019 WL 5189004, at *4 (D. Colo. Oct. 15, 2019).
165 18 U.S.C. § 1030 (e)(11). For a detailed examination of “loss,” see, e.g., KERR, supra note 7, at 120–25.
166 See, e.g., Brown Jordan Int’l, Inc. v. Carmicle, 846 F.3d 1167, 1173–74 (11th Cir. 2017) (comparing jurisdictions
that construe loss broadly to include any costs of responding to an offense regardless of whether there was an
interruption of service with those that narrowly construe loss as resulting only from an interruption of service).
167 Compare id. (adopting broad view of loss that includes reasonable costs of responding to an offense even where
there was no interruption of service) and Yoder & Frey Auctioneers, Inc. v. EquipmentFacts, LLC, 774 F.3d 1065,
1073 (6th Cir. 2014) (holding that loss under the CFAA includes both con sequential damages caused by service
interruption and reasonable costs of responding to an offense such as damage assessments) with Gen. Sci. Corp. v.
SheerVision, Inc., No. 10-CV-13582, 2011 WL 3880489, at *4 (E.D. Mich. Sept. 2, 2011) (“ The CFAA only covers
lost revenue if the loss occurred as a result of interrupted service.”) and CoStar Realty Info., Inc. v. Field, 737 F. Supp.
2d 496, 515 (D. Md. 2010) (“[A] violation of the CFAA must cause an interruption of service in order for lost revenue
to constitute as a qualifying ‘loss’ under the statute.”).
Congressional Research Service
16

link to page 6 link to page 5 link to page 15 link to page 5 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

Password Trafficking, 18 U.S.C. § 1030(a)(6)
Section 1030(a)(6)168 is an “infrequently” used169 section of the CFAA designed to protect
computer passwords. The provision is “aimed at penalizing conduct associated with ‘pirate
bulletin boards,’ where passwords are displayed that permit unauthorized access to others’
computers.”170 Specifical y, the law, assuming an appropriate jurisdictional nexus discussed
below, makes it a crime to traffic “knowingly and with intent to defraud” in “any password or
similar information through which a computer may be accessed without authorization.”171 For the
purposes of § 1030(a)(6), “traffic” means to “transfer, or otherwise dispose of, to another, or
obtain control of with intent to transfer or dispose of.”172 A defendant need not intend to profit to
engage in trafficking for § 1030(a)(6) purposes, but he must intend to transfer or dispose of the
passwords or similar information.173 “Knowingly with intent to defraud” has the identical
meaning as in § 1030(a)(4), discussed above, and generally refers to acts undertaken with the
knowledge that defrauding another is a likely consequence, and the intent that such fraud should
actually occur.174 “Password[s] or similar information”175 is a broad category intended to include
not “only a single word that enables one to access a computer,” but also “longer more detailed
explanations on how to access others’ computers.”176
For § 1030(a)(6) to apply, the defendant’s actions must satisfy one of two jurisdictional hooks.
First, § 1030(a)(6) could apply where the “trafficking affects interstate or foreign commerce.”177
Although undefined by the CFAA and underdeveloped in case law, at least some courts
examining civil § 1030(a)(6) claims appear to have construed the interstate or foreign commerce
requirement broadly.178 For example, for at least one court, trafficking involving the internet
could satisfy the requirement.179 Second, § 1030(a)(6) may also apply where the defendant
traffics in passwords or similar information that would al ow unauthorized entry into a “computer
. . . used by or for the Government of the United States.”180 Again there is no statutory definition

168 18 U.S.C. § 1030(a)(6) imposes criminal liability on:
(a) Whoever--
(6) knowingly and with intent to defraud traffics (as defined in section 1029) in any password
or similar information through which a computer may be accessed without authorization, if--
(A) such trafficking affects interstate or foreign commerce; or
(B) such computer is used by or for the Government of the United States.
169 See Doyle, supra note 23, at 69.
170 S. REP. NO. 99-432, at 13 (1986).
171 18 U.S.C. § 1030(a)(6).
172 Id. § 1029(e)(5); see id. § 1030.
173 U.S. DEP’T OF JUSTICE, supra note 9, at 50.
174 See supra § “Computer Fraud: 18 U.S.C. § 1030(a)(4).”
175 18 U.S.C. § 1030(a)(6).
176 S. REP. NO. 99-432, at 13 (1986); accord U.S. DEP’T OF JUSTICE, supra note 9, at 50 (“ Therefore, prosecutors should
apply the term ‘password’ using a broad meaning to include any instructions that safeguard a computer.”).
177 18 U.S.C. § 1030(a)(6)(A).
178 See T racfone Wireless, Inc. v. Simply Wireless, Inc., 229 F. Supp. 3d 1284, 1297 (S.D. Fla. 2017) (concluding that
plaintiff stated claim under § 1030(a)(6) where trafficking implicated the internet and a telecommunications network).
179 Id. Courts have reached similar conclusions when interpreting 18 U.S.C. § 1029, a credit card fraud statute that
prohibits trafficking that “affects interstate or foreign commerce.” See, e.g., United States v. Rushdan, 870 F.2d 1509,
1513–14 (9th Cir. 1989) (concluding that federal jurisdiction under § 1029 included “ possession of the numbers of out
of state credit card accounts”).
180 18 U.S.C. § 1030(a)(6)(B).
Congressional Research Service
17

link to page 5 link to page 6 link to page 6 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

and little interpretive case law, but according to the DOJ the “plain meaning [of the phrase]
should encompass any computer used for official business by a federal government employee or
on behalf of the federal government.”181 However, it is at least possible that the provision only
applies to passwords for executive branch agencies.182 That is because unlike other CFAA
provisions, § 1030(a)(6) does not specify that a government computer is one used by any
“department or agency of the United States” a phrase that the CFAA specifical y defines as
including legislative, executive, and judicial branch computers.183 Thus, it has been theorized that
the use in § 1030(a)(6) of the phrase “computer . . . . used by or for the Government of the United
States” might carry a meaning narrower than the phrase “computer[s] of a department or agency
of the United States” used elsewhere in the CFAA.184
Threats and Extortion, 18 U.S.C. § 1030(a)(7)
Section 1030(a)(7)185 prohibits certain extortionate threats concerning a protected computer, such
as threats to cause damage to, or disclose confidential information from, a protected computer
unless paid.186 The provision has been described as “a high-tech variation on old fashioned
extortion.”187 Although a number of other federal criminal statutes also prohibit extortionate
threats, the CFAA’s legislative history suggest that Congress’s concern in enacting this provision
was that other “extortion statutes, which protect against physical injury to person or property,
[might not] cover intangible computerized information.”188 In particular, the Senate Report
accompanying the 1996 Amendment to the CFAA noted concern with threats against computer
systems such as “situations in which hackers penetrate a system, encrypt a database and then
demand money for the decoding key.”189 Prosecutors have invoked § 1030(a)(7) to charge a
variety of threats against computer systems themselves, such as ransomware plots that use
software to encrypt the victim’s computer files (rendering them unavailable) until payment is
received to unlock those systems.190 The government has also relied on § 1030(a)(7) to prosecute

181 U.S. DEP’T OF JUSTICE, supra note 9, at 51.
182 See Doyle, supra note 23, at 69–70 (“[I]t is unclear whether the protection of paragraph 1030(a)(6) cloaks legislative
and judicial branch computers or is limited to those of the executive branch.”).
183 18 U.S.C. § 1030(e)(7) (“[T]he term ‘department of the United States’ means the legislative or judicial branch of the
Government or one of the executive departments . . . .”).
184 Doyle, supra note 23 (quoting (18 U.S.C. § 1030)).
185 18 U.S.C. § 1030(a)(7) imposes criminal liability on:
(a) Whoever--
(7) with intent to extort from any person any money or other thing of value, transmits in
interstate or foreign commerce any communication containing any --
(A) threat to cause damage to a protected computer;
(B) threat to obtain information from a protected computer without authorization or in
excess of authorization or to impair the confidentiality of infor mation obtained from a
protected computer without authorization or by exceeding authorized access; or
(C) demand or request for money or other thing of value in relation to damage to a protected
computer, where such damage was caused to facilitate the exto rtion.
186 Id.
187 See S. REP. NO. 104-357, at 12 (1996).
188 Id. (quoting statement of Attorney General to Sen. Leahy).
189 Id.
190 See, e.g., Indictment, United States v. Savandi, No. 3:18-cr-00704-BRM, 2018 WL 6798078 (D.N.J. Nov. 27,
2018); Press Release, U.S. Dep’t of Justice, T wo Iranian Men Indicted for Deploying Ransomwar e to Extort Hospitals,
Municipalities, and Public Institutions, Causing Over $30 Million in Losses (Nov. 28, 2018),
Congressional Research Service
18

link to page 21 link to page 22 link to page 5 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

instances where computers are not the subject of the threat, but rather the means of extortion. For
instance, prosecutors have brought charges under § 1030(a)(7) against a hacker who obtained
“sensitive records and information” from victim computers, which he threatened to release unless
paid a ransom.191 As another il ustration, federal prosecutors invoked § 1030(a)(7) in charging a
former government employee who used stolen passwords to obtain “sexual y explicit photographs
. . . from victims’ email and social media accounts,” which he “threatened to share . . . unless the
victims ceded to certain demands.”192
Section 1030(a)(7) specifical y prohibits three categories of extortionate threats. First, it
criminalizes “threat[s] to cause damage to a protected computer.”193 Threats to cause damage
might include threats to “interfer[e] in any way with the normal operation of the computer or
system in question, such as [by] denying access to authorized users, erasing or corrupting data or
programs, slowing down the operation of the computer or system, or encrypting data and then
demanding money for the key.”194 Second, § 1030(a)(7) proscribes “threat[s] to obtain
information from a protected computer without authorization or in excess of authorization or to
impair the confidentiality of information obtained from a protected computer without
authorization or by exceeding authorized access.”195 In other words, this second category includes
extortionate threats to obtain information through unauthorized access to a protected computer, or
to disclose information already obtained through unauthorized access into a protected
computer.196 For example, an individual may fall within this second category when he hacks into
a protected computer, obtains sensitive information, and then threatens to disclose it unless his
demands are met.197 Third, it is a crime under § 1030(a)(7) to “demand or request for money or
other thing of value in relation to damage to a protected computer, where such damage was
caused to facilitate the extortion.”198 An example of this type of threat is the use of ransomware to
extort payment in exchange for providing the decryption key for the victim’s files.199 The latter
two categories of threats are intended to “‘cover the situation in which a criminal has already
stolen the information and threatens to disclose it unless paid off’ and in which ‘other criminals

https://www.justice.gov/opa/pr/two-iranian-men-indicted-deploying-ransomware-extort-hospitals-municipalities-and-
public. T he installation of such ransomware may also violate § 1030(a)(5). See Indictment, Savandi, No. 3:18-cr-
00704-BRM, 2018 WL 6798078, supra note 190 (charging defendants under both 18 U.S.C. § 1030(a)(7)(C) and §
1030(a)(5)(A)).
191 Press Release, U.S. Dep’t of Justice, Member of “T he Dark Overlord” Hacking Group Extradited From United
Kingdom to Face Charges in St. Louis (Dec. 18, 2019), https://www.justice.gov/opa/pr/member-dark-overlord-hacking-
group-extradited-united-kingdom-face-charges-st-louis. See also Indictment, United States v. Wyatt , No. 4:17-cr-
00522-RLW-SPM, 2017 WL 11530077 (E.D. Mo. Nov. 8, 2017).
192 Press Release, U.S. Dep’t of Justice, Former U.S. Government Employee Charged in Computer Hacking and Cyber
Stalking Scheme (Aug. 19, 2015), https://www.justice.gov/opa/pr/former-us-government -employee-charged-computer-
hacking-and-cyber-stalking-scheme; see also Indictment, United States v. Ford, No. 1 15-CR-319, 2015 WL 4980336
(N.D. Ga. Aug. 18, 2015).
193 18 U.S.C. § 1030(a)(7)(A).
194 See S. REP. NO. 104-357, at 12 (1996).
195 18 U.S.C. § 1030(a)(7)(B) (emphasis added).
196 Id.
197 Indictment, Ford, No. 1 15-CR-319, 2015 WL 4980336, supra note 192.
198 18 U.S.C. § 1030(a)(7)(C).
199 U.S. DEP’T OF JUSTICE, supra note 9, at 54; accord S. REP. NO. 104-357, at 12 (1996) (discussing § 1030(a)(7) and
noting that “ [o]ne can imagine situations in which hackers penetrate a system, encrypt a database and then demand
money for the decoding key”).
Congressional Research Service
19

link to page 24 link to page 24 link to page 6 link to page 5 link to page 5 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

cause damage first—such as by accessing a corporate computer without authority and encrypting
critical data—and then threaten that they wil not correct the problem unless the victim pays.’”200
There are two important limitations to § 1030(a)(7) as it pertains to al three categories of threats,
however. First, for § 1030(a)(7) to apply, the defendant must have acted “with intent to extort
from any person any money or other thing of value.”201 In general, extortion refers to “obtaining
something or compel ing some action by il egal means, as by force or coercion.”202 In the context
of § 1030(a)(7), courts have found the requisite intent to extort where, for example, defendants
wrongfully obtained confidential information or credentials and demanded money for their
return.203 However, it may not be necessary to establish “that the defendant actual y succeeded in
obtaining the money or thing of value, or that the defendant actual y intended to carry out the
threat made.”204 Second, the defendant must have transmitted the threat “in interstate or foreign
commerce,”205 for example by transmitting the threat through the internet or between computers
in two different states.206
Remedies and Penalties
The CFAA provides a number of remedies when its various prohibitions are violated. Most
obviously, violations of the CFAA provisions discussed above are subject to various criminal
penalties of fines and imprisonment.207 The nature of those penalties varies based on the specific
subsection at issue (see Table 1).208 For example, the maximum prison term for first-time CFAA
offenders is one year under § 1030(a)(3),which governs certain act of trespassing in government
computers,209 but five years under § 1030(a)(4), which is the main anti-fraud provision in the
CFAA and which ordinarily involves conduct of a more serious nature.210 The distinction between
first time and repeat offenses is also relevant in the CFAA (see Table 1). For instance, under §

200 See Doyle, supra note 23, at 63 & n. 353 (quoting H.R. 4175, the Privacy and Cybercrime Enforcement Act of 2007:
Hearings Before the Subcom m . on Crim e, Terrorism , and Hom eland Security of the House Com m . on the Judici ary
,
110th Cong., 1st Sess. (2007) (statement of Acting Principal Deputy Assistant Attorney General Andrew Lourie)).
201 18 U.S.C. § 1030(a)(7).
202 Extortion, BLACK’S LAW DICTIONARY (11th ed. 2019).
203 See, e.g., Inplant Enviro-Sys. 2000 Atlanta, Inc. v. Lee, No. 1:15-CV-0394-LMM, 2015 WL 13297963, at *4 (N.D.
Ga. June 9, 2015) (holding that plaintiff alleged a valid claim for § 1030(a)(7) violation where defendant allegedly
demanded $137,705 for the return of master access to the plaintiff’s domains).
204 U.S. DEP’T OF JUSTICE, supra note 9, at 53.
205 18 U.S.C. § 1030(a)(7).
206 See Inplant Enviro-Sys. 2000 Atlanta, Inc., No. 1:15-CV-0394-LMM, 2015 WL 13297963, at *4 (concluding that
plaintiff adequately stated a § 1030(a)(7) violation against defendant who transmitted extortionate communication “in
interstate or foreign commerce, as [it was] sent via internet . . . .”); accord United States v. Kammersell, 196 F.3d 1137,
1139 (10th Cir. 1999) (concluding in that interstate commerce element of 18 U.S.C. § 875(c) —a federal threat
statute—was satisfied where defendant transmitted threat via instant message between computers in the same state,
where it was routed to a server in a second state).
207 18 U.S.C. § 1030. T he CFAA gives the FBI “primary authority to investigate” certain CFAA violations such as
those involving espionage or national security information, but the statute also expressly permits investigation by the
United States Secret Service and any other agency with authority. 18 U.S.C. § 1030(d); accord FBI, Cyber Crim e,
https://www.fbi.gov/investigate/cyber (last visited July 27, 2020). T he Department of Justice prosecutes CFAA
violations. See generally U.S. DEP ’T OF JUSTICE, supra note 9 (summarizing DOJ policies and guidance on CFAA
prosecutions).
208 18 U.S.C. § 1030.
209 Id. § 1030(c)(2)(A).
210 Id. § 1030(c)(3)(A).
Congressional Research Service
20

link to page 25 link to page 25 link to page 26 link to page 25 link to page 25 link to page 26 link to page 25 link to page 25 link to page 25 link to page 26 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

1030(a)(1)—which prohibits obtaining and disclosing national security information through
unauthorized computer access—a violation is general y subject to a maximum prison term of ten
years, a fine, or both.211 But if that violation occurs after another CFAA offense, it is subject to a
maximum prison term of twenty years, a fine, or both.212 Within some CFAA provisions, the
relevant penalties also depend on the gravity of the defendant’s conduct (see Table 2; Table 3;
Table 4). For example, under § 1030(a)(2)—prohibiting obtaining information in certain
circumstances—the penalties are stiffer if the value of the information obtained is greater than
$5,000 (see Table 2).213 The CFAA provision prohibiting damage to computers—§ 1030(a)(5)—
offers another il ustration (see Table 3; Table 4). It authorizes longer prison terms for certain
outcomes, such as when a violation results in bodily injury or death.214
Table 1. Overview of CFAA Maximum Penalties
Maximum Prison Terms by Subsection for First and Subsequent Of enses
Subsequent
Section*
Description
First Offense**
Offense***
1030(a)(1)
Cyber Espionage
10 Years
20 Years
1030(a)(2)
Obtaining Information by Unauthorized
1 Year (M); 5 Years
10 Years
Computer Access
(F)
1030(a)(3)
Government Computer Trespassing
1 Year
10 Years
1030(a)(4)
Computer Fraud
5 Years
10 Years
1030(a)(5)(A)
Knowing Transmission + Intentional
1 Year (M); 10 Years
20 Years
Damage to Computer
(F)
1030(a)(5)(B)
Intentional Access + Reckless Damage to
1 Year (M); 5 Years
20 Years
Computer
(F)
1030(a)(5)(C)
Intentional Access + Damage to Computer
1 Year
10 Years
+ Loss
1030(a)(6)
Password Trafficking
1 Year
10 Years
1030(a)(7)
Threats and Extortion
5 Years
10 Years
Source: 18 U.S.C. § 1030(c).
Notes:
* Bolded subsection authorizes additional penalties beyond those reflected in this Table where there are certain
aggravating factors such as causing death, broken down in further detail in Table 3.
** (M) denotes misdemeanor; (F) denotes felony. CFAA subsections that may be charged as a misdemeanor or a
felony are broken down in further detail in Table 2, Table 3, and Table 4.
*** Subsequent offense refers to maximum penalties possible for offense committed fol owing conviction for
another CFAA offense.

211 Id. § 1030(c)(1)(A).
212 Id. § 1030(c)(1)(B).
213 Id. § 1030(c)(2)(B).
214 Id. §§ 1030(c)(4)(E)–(F).
Congressional Research Service
21

Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

Table 2. Overview of Maximum Penalties Under 18 U.S.C. § 1030(a)(2)
Maximum Prison Terms for Obtaining Information by Unauthorized Computer Access
Description of Offense Under § 1030(a)(2)
Classification
Sentence
First Offense (No Special Conditions)
Misdemeanor
1 Year
Offense with One of Three Special Conditions:
Felony
5 Years
1. Offense committed for purpose of commercial
advantage or private financial gain;
2. Offense committed in furtherance of any
criminal or tortious act in violation of the
Constitution or state or federal law; or
3. The Value of the information obtained is greater
than $5,000.
Subsequent Offense*
Felony
10 Years
Source: 18 U.S.C. § 1030(c)(2)(C).
Note: * Subsequent offense refers to maximum penalties possible for offense committed fol owing conviction
for another CFAA offense.
Table 3. Overview of Maximum Penalties Under 18 U.S.C. § 1030(a)(5)(A)
Maximum Prison Terms for Knowing Transmission + Intentional Damage to a Computer
Description of Offense Under § 1030(a)(5)(A)
Classification
Sentence
First Offense (No Special Harms)
Misdemeanor
1 Year
First Offense with One of Six Special Harms:
Felony
10 Years
1. Minimum loss of $5,000 to at least one person
during a one year period;
2. Modification/impairment/potential modification
or impairment of medical examination,
diagnosis, treatment, or care of at least one
individual;
3. Physical injury to any person;
4. Threat to public health or safety;
5. Damage affecting a computer used by or for the
federal government in furtherance of the
administration of justice, national defense, or
national security; or
6. Damage affecting at least 10 protected
computers in a 1-year period.
Subsequent Offense*
Felony
20 Years
Offense where defendant knowingly/recklessly causes serious bodily
Felony
20 Years
injury, or attempts to do so
Offense where defendant knowingly/recklessly causes death, or
Felony
Life
attempts to do so
Imprisonment
Source: 18 U.S.C. § 1030(c)(4).
Note: * Subsequent offense refers to maximum penalties possible for offense committed fol owing conviction
for another CFAA offense.
Congressional Research Service
22

link to page 6 link to page 32 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

Table 4. Overview of Maximum Penalties Under 18 U.S.C. § 1030(a)(5)(B)
Maximum Prison Terms for Intentional Access + Reckless Damage to a Computer
Description of Offense Under § 1030(a)(5)(B)
Classification
Sentence
First Offense (No Special Harms)
Misdemeanor
1 Year
First Offense with One of Six Special Harms:
Felony
5 Years
1. Minimum loss of $5,000 to at least one person
during a one year period;
2. Modification/impairment/potential modification
or impairment of medical examination,
diagnosis, treatment, or care of at least one
individual;
3. Physical injury to any person;
4. Threat to public health or safety;
5. Damage affecting a computer used by or for the
federal government in furtherance of the
administration of justice, national defense, or
national security; or
6. Damage affecting at least 10 protected
computers in a 1-year period.
Subsequent Offense*
Felony
20 Years
Source: 18 U.S.C. § 1030(c)(4).
Note: * Subsequent offense refers to maximum penalties possible for offense committed fol owing conviction
for another CFAA offense.
In addition to these criminal penalties, the CFAA also provides a private right of action that
permits a person who suffers damage or loss due to a CFAA violation to bring suit against the
violator. Under a civil CFAA claim, the plaintiff can obtain compensatory damages and
injunctive relief or other equitable relief.215 However, civil actions are only possible if the
violation results in certain types of losses or damages, such as physical injury, a threat to public
health or safety, damage to 10 or more protected computers within the span of a year, or certain
losses with a total value of at least $5,000.216 Final y, the CFAA includes forfeiture provisions that
authorize government confiscation of property that was used in, or derived from, CFAA
violations.217
Selected CFAA Issues in the 116th Congress
The CFAA exists in the larger context of a rapidly changing technological world. Such changes
have made the application of the CFAA to certain activities uncertain and even controversial. For
example, with the modern prevalence of cybercrime, some contend that private actors who fal
victim to cyberattacks should be able to hack back against the initial aggressor.218 However, the

215 Id. § 1030(g).
216 Id. § 1030(c)(4)(A)(i). A complete examination of these requirements, and the CFAA’s civil remedy more broadly,
is beyond the scope of this Report. For a more detailed examination, see Doyle, supra note 23.
217 Id. § 1030(j). A more detailed examination of the laws governing forfeiture is beyond the scope of this Report. For
an analysis of forfeiture, including under § 1030, see CRS Report 97-139, Crim e and Forfeiture, by Charles Doyle.
218 See infra § “Hacking Back.”
Congressional Research Service
23

link to page 4 link to page 29 link to page 27 link to page 5 link to page 4 link to page 5 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

provisions of the CFAA that prohibit hacking also ostensibly criminalize hacking back, which
some legislation has sought to change.219 Another technological development that has prompted
reexamination of the CFAA by some policymakers involves the growing market for the sale and
rental of botnets: “network[s] of compromised computers, ‘often programmed to complete a set
of repetitive tasks’ without ‘the owner’s knowledge or permission.’”220 Although the CFAA
general y criminalizes creating botnets or using them for other computer crimes, it may not
prohibit the sale or renting of botnets.221 The proliferation of Terms of Service (ToS)
Agreements—contracts that govern the use of a product such as a website—has resulted in
another area of uncertainty under the CFAA.222 Specifical y, federal courts disagree over whether
the CFAA imposes criminal liability for ToS violations.223 This section discusses the CFAA in
relation to each of these examples of the intersection between technological change and the law.
The CFAA and ToS Violations
One ongoing issue with respect to the CFAA is whether the statute imposes criminal liability for
the bare violations of ToS agreements—contracts that govern the use of a product.224 The issue is
of considerable significance given the prevalence of ToS agreements, which frequently govern the
use of smartphones, tablets, personal computers, social media websites, apps, online shopping
platforms, streaming services, and more.225 The countervailing policy concerns are the danger of
over criminalization on the one hand, versus the importance of enforcing ToS agreements on the
other.226
Currently, there is an unresolved circuit split over whether the CFAA imposes criminal liability
for ToS violations, as a result of conflicting interpretations of the breadth of the phrases “without
authorization” and “exceeds authorized access.” Several courts, including the U.S. Court of
Appeals for the First,227 Fifth,228 Seventh,229 and Eleventh230 Circuits have interpreted “exceeds
authorized access” and “without authorization” broadly, in a manner that would permit criminal
liability for violations of ToS agreements and other contractual computer use restrictions. For

219 Id.
220 Beale, supra note 1, at 173 (quoting Zach Lerner, Microsoft the Botnet Hunter: The Role of Public-Private
Partnerships in Mitigating Botnets
, 28 HARV. J.L. & T ECH. 237, 239 (2014)); accord United States v. Gasperini, 894
F.3d 482, 485 (2d Cir. 2018) (describing botnets as “ network[s] of infected computers under the attacker’s control.”).
221 See infra § “Botnet T rafficking.”
222 See infra § “T he CFAA and T oS Violations.”
223 Id.
224 Berris, supra note 14. More broadly, legal commentators have described this issue as whether the CFAA imposes
criminal liability for the violation of “contract-based restrictions.” KERR, supra note 7, at 51.
225 Berris, supra note 14.
226 Id.
227 EF Cultural T ravel BV v. Zefer Corp., 318 F.3d 58, 62 (1st Cir. 2003) (“A lack of authorization could be established
by an explicit statement on the website restricting access.”).
228 United States v. John, 597 F.3d 263, 271 (5th Cir. 2010) (holding that authorized access may “ encompass limits
placed on the use of information obtained by permitted access to a computer system and data available on that system .
. . at least when the user knows or reasonably should know that he or she is not a uthorized to access a computer and
information obtainable from that access in furtherance of or to perpetrate a crime.”)
229 Int’l Airport Ctrs., LLC v. Citrin, 440 F.3d 418, 420–21 (7th Cir. 2006) (concluding that defendant lacked
authorization after breaching duty of loyalty to employer) .
230 United States v. Rodriguez, 628 F.3d 1258, 1263 (11th Cir. 2010) (concluding that defendant exceeded authorized
access by violating employer policy against using employer database for personal purposes).
Congressional Research Service
24

link to page 5 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

example, in United States v. Rodriguez, the Eleventh Circuit231 concluded that an employee
“exceeded authorized access” under the CFAA when he used a database he was authorized to
access, but did so for personal purposes in a manner prohibited by his employer’s computer use
policy.232 In other words, for the Eleventh Circuit, “the concept of ‘exceeds authorized access’
may include exceeding the purposes for which access is ‘authorized.’”233 In general, these courts
view the CFAA to be concerned with not just hacking, but also with other computer-based harms
such as the misappropriation of confidential information by rogue employees or former-
employees.234
In contrast, several other courts, including the Second,235 Fourth,236 and Ninth237 Circuits, have
more narrowly interpreted “without authorization” and “exceeds authorized access,” based on an
understanding that the CFAA’s central purpose is to criminalize hacking. These courts apply
CFAA liability only to those who lack any authorization to access a computer or website238 or
those who are “authorized to access only certain data or files” but access “unauthorized data or
files.”239 For example, under the narrow view, an employee with permission to access only
product information on his employer’s computer would exceed authorized access if he also looks
at customer data on that computer, as he was whol y lacking authority to view the customer
information.240 But, if that employee were permitted to access customer data for certain reasons
(e.g., business purposes) and he did so for other purposes (e.g., personal curiosity), under the
narrow view, he would not have exceeded authorized access. Thus, courts applying the narrow
view would general y exclude from CFAA liability those who have merely violated ToS
agreements because those agreements general y do not restrict access, but rather restrict the
purposes to which a database or computer may be used once it has been accessed.241 Under this
view, CFAA liability could only apply to such individuals if their permission to access a computer
or website “has been revoked explicitly,” such as through a cease and desist letter.242 Courts
adopting the narrow interpretation have expressed concern that a broad reading of “without
authorization” and “exceeds authorized access” would risk defining authorized access by contract
terms that “most people are only dimly aware of,” and are subject to change without notice,
risking “mak[ing] criminals of large groups of people who would have little reason to suspect

231 T his report references a significant number of decisions by federal appellate courts of various regional circuits. For
purposes of brevity, references to a particular circuit in the body of this report (e.g., the First Circuit) refer to the U.S.
Court of Appeals for that particular circuit.
232 Rodriguez, 628 F.3d at 1263.
233 John, 597 F.3d at 272.
234 Berris, supra note 14.
235 United States v. Valle, 807 F.3d 508, 523 (2d Cir. 2015) (concluding that an individual does not exceed authorized
access where individual is authorized for certain uses, and surpasses those).
236 WEC Carolina Energy Sols. LLC v. Miller, 687 F.3d 199, 206 (4th Cir. 2012) (“[W]e adopt a narrow reading of the
terms ‘without authorization’ and ‘exceeds authorized access’ and hold that they apply only when an individual
accesses a computer without permission or obtains or alters information on a computer beyond that which he is
authorized to access.”).
237 United States v. Nosal, 676 F.3d 854, 863 (9th Cir. 2012) (“ Instead, we hold that the phrase ‘exceeds authorized
access’ in the CFAA does not extend to violations of use restrictions.”).
238 See Valle, 807 F.3d at 528.
239 Nosal, 676 F.3d at 856–57.
240 Id. at 857.
241 Facebook, Inc. v. Power Ventures, Inc., 844 F.3d 1058, 1067 (9th Cir. 2016) (“Second, a violation of the terms of
use of a website—without more—cannot establish liability under the CFAA.”).
242 Id.
Congressional Research Service
25

link to page 5 link to page 4 link to page 4 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

they are committing a federal crime.”243 Adherents to the broad interpretation counter that
application of the CFAA is sufficiently tempered by, among other things, prosecutorial discretion
and statutory intent requirements.244
The Supreme Court is currently considering a case that could resolve whether the CFAA imposes
criminal liability for mere ToS violations. On April 20, 2020 the Court agreed to hear Van Buren
v. United States
,245 an appeal from the Eleventh Circuit.246 Van Buren, involves former police
sergeant Nathan Van Buren’s conviction for, among other things, violating § 1030(a)(2) by using
a law enforcement database for purposes prohibited by department policy.247 The Court is
expected to hear arguments in Van Buren in its October 2020 term.248
And regardless of what the Court does in Van Buren, Congress could clarify the CFAA’s reach
with respect to ToS agreements. In past Congresses, legislation has been introduced that sought to
modify the “without authorization” and “exceeds authorized access” language in the CFAA.249
One example, Aaron’s Law,250 “[n]amed in honor of the late Internet innovator and activist Aaron
Swartz,”251 was introduced in the 113th Congress. Aaron’s Law would have replaced the phrase
“exceeds authorized access” with the phrase “access without authorization,” defining the latter as
obtaining “information on a protected computer . . . that the accesser lacks authorization to
obtain” by “knowingly circumventing one or more technological or physical measures that are
designed to exclude or prevent unauthorized individuals from obtaining that information.”252 That
proposal would have limited the CFAA’s breadth in a manner more consistent with the
understanding of courts applying the narrow view of the statute. No bil s have been introduced in
this Congress addressing the split.
Botnet Trafficking
The role of the CFAA has also received attention in the context of botnets—“network[s] of
compromised computers, ‘often programmed to complete a set of repetitive tasks’ without ‘the
owner’s knowledge or permission.’”253 Botnets pose a significant risk because they are sometimes
used for attacks on the internet itself, for example in DDoS attacks against core internet
infrastructure.254 The creation of a botnet and the use of a botnet to commit crimes general y

243 Nosal, 676 F.3d at 859, 861.
244 Berris, supra note 14.
245 Van Buren v. United States, 206 L. Ed. 2d 822 (Apr. 20, 2020).
246 United States v. Van Buren, 940 F.3d 1192 (11th Cir. 2019), cert. granted, No. 19-783, 2020 WL 1906566 (Apr. 20,
2020).
247 Id. at 1197–98, 1208.
248 October Term 2020, SCOT USBLOG, https://www.scotusblog.com/case-files/terms/ot2020/?sort=mname (last visited
Sept. 9, 2020).
249 Aaron’s Law Act of 2013, H.R. 2454, 113th Cong. (2013).
250 Id.
251 Press Release, U.S. Congresswoman Zoe Lofgren, Rep Zoe Lofgren Introduces Bipartisan Aaron’s Law (June 20,
2013), https://lofgren.house.gov/media/press-releases/rep-zoe-lofgren-introduces-bipartisan-aarons-law.
252 Aaron’s Law Act of 2013, H.R. 2454, 113th Cong. (2013).
253 Beale, supra note 1, at 173 (quoting Zach Lerner, Microsoft the Botnet Hunter: The Role of Public-Private
Partnerships in Mitigating Botnets
, 28 HARV. J.L. & T ECH. 237, 239 (2014)); accord United States v. Gasperini, 894
F.3d 482, 485 (2d Cir. 2018) (describing botnets as “ network[s] of infected computers under the attacker’s control.”).
254 See Beale, supra note 1, at 190 (“In contrast, botnets present the reverse issue: devices connected to the internet may
be used to disrupt the internet itself.”).
Congressional Research Service
26

link to page 5 link to page 30 link to page 5 link to page 30 link to page 5 link to page 30 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

violates the CFAA.255 However, at times, individuals develop botnets that are rented or sold256 to
other individuals who, in turn, then use them for various crimes such as DDoS attacks and
identity theft.257 Federal courts have not resolved whether the CFAA criminalizes such botnet
trafficking, and the issue is particularly uncertain in the case of botnets offered for rent or sale by
individuals who did not also create them (the CFAA general y criminalizes the creation of a
botnet).258 For example, in a 2015 blog post the DOJ recounted one undercover investigation that
revealed a sel er offering a botnet comprised of thousands of computers; prosecutors were unable
to bring charges against the sel er because it was unclear whether he had created the botnet or was
simply sel ing it.259
Thus, the DOJ has seemingly acknowledged that some botnet trafficking conduct may fal outside
the scope of the CFAA.260 A review of the language of the CFAA reveals the reason. The only
CFAA provision that expressly prohibits trafficking—§ 1030(a)(6)—covers only passwords and
related information, not botnets.261 Another relevant CFAA subsection—§ 1030(a)(5)’s
prohibition against damaging certain computers—requires that the defendant acts with intent to
damage.262 However, those trafficking in botnets might lack such intent, if they simply intend to
profit or are unaware of how the botnet wil be used.263 Nevertheless, the DOJ has reached several
plea agreements with defendants accused of botnet trafficking.264 The counts included in those
plea agreements have general y been some combination of conspiracy (under 18 U.S.C. § 371) to
violate the CFAA or the wire fraud statute,265 attempt to damage computers by transmission of
programs, codes or commands in violation of the CFAA,266 and “advertising a device used to
intercept electronic communications” in violation of 18 U.S.C. § 2512.267
Although at first glance the conspiracy statute invoked by the DOJ in some such plea agreements
appears like it could have widespread applicability in the context of botnet trafficking, a

255 U.S. Dep’t of Justice, Prosecuting the Sale of Botnets and Malicious Software (Mar. 18, 2015),
https://www.justice.gov/archives/opa/blog/prosecuting-sale-botnets-and-malicious-software.
256 See Matwyshyn, supra note 13, at 503 (“T here are cases where brokers who sell access to botnets are not the
criminals who created them.”).
257 U.S. Dep’t of Justice, Prosecuting the Sale of Botnets, supra note 255.
258 Id.; accord T riana, supra note 13, at 1315 (discussing uncertainty of whether sale of botnets and malware would
violate the CFAA).
259 U.S. Dep’t of Justice, Prosecuting the Sale of Botnets, supra note 255.
260 See id. (“While trafficking in botnets is sometimes chargeable under other subsections of the Computer Fraud and
Abuse Act, [the problem of individuals trafficking in botnets that they did not create] has resulted in, and will
increasingly result in, the inability to prosecute individuals selling access to thousands of infected computers.”).
261 18 U.S.C. § 1030(a)(6).
262 Id. § 1030(a)(5).
263 See T riana, supra note 13, at 1315 (“ Since hackers selling malware more clearly intend to profit off of their skills,
they likely do not meet the mens rea requirement of ‘intentionally’ causing ‘damage.’”).
264 See, e.g., Press Release, U.S. Dep’t of Justice, Marcus Hutchins Pleads Guilty to Creating and Distributing the
Kronos Banking T rojan and UPAS Kit Malware (May 3, 2019), https://www.justice.gov/usao-edwi/pr/marcus-
hutchins-pleads-guilty-creating-and-distributing-kronos-banking-trojan-and-upas.
265 Id.; Press Release, U.S. Dep’t of Justice, Russian Citizen Sentenced to 46 Months in Prison for Involvement in
Global Botnet Conspiracy (Aug. 3, 2017), https://www.justice.gov/opa/pr/russian-citizen-sentenced-46-months-prison-
involvement -global-botnet-conspiracy.
266 See Press Release, U.S. Dep’t of Justice, Arizona Man Sentenced to 30 Months in Prison for Selling Access to
Botnets (Sept. 6, 2012), https://www.justice.gov/opa/pr/arizona-man-sentenced-30-months-prison-selling-access-
botnets.
267 See Press Release, supra note 264.
Congressional Research Service
27

link to page 30 link to page 23 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

defendant is not guilty of conspiracy unless: (1) he has agreed to commit a specific offense with
at least one other person; (2) he knowingly participated in the conspiracy while intending to
commit that offense; and (3) a conspirator commits an overt act in furtherance of the
conspiracy.268 The second element—intent—likely presents a significant obstacle in some cases,
because as discussed, botnet traffickers may be unaware of how the buyer or renter plans to use
the botnet, and may be intending only to profit.269 Thus, the sel er may lack the requisite intent to
commit an underlying offense.270 And, for the reasons outlined above, botnet trafficking by itself
does not appear to violate the CFAA and therefore would likely not amount to an underlying
federal offense. Even in instances where the conspiracy statute does reach botnet trafficking—for
example, if a botnet trafficker rents botnet access with the intent that it should be used to damage
a computer in violation of § 1030(a)(5)—the statute authorizes a maximum prison term of five
years,271 less than under some subsections of the CFAA.272
At least one state has enacted a law aimed at botnet trafficking,273 and the issue has generated
legislative proposals in previous administrations274 and Congress.275 For example, one proposal
introduced in the 116th Congress, titled the Defending American Security from Kremlin
Aggression Act of 2019, contains a provision that would amend the CFAA to prohibit
“intentional y traffic[king] in the means of access to a protected computer.”276 Although the
proposal does not define “means of access,” the intent appears to be to include botnets.277 If
enacted, the prohibition would be subject to two main limitations.278 First, the trafficker must
“know[] or [have] reason to know the protected computer has been damaged in a manner
prohibited by” the CFAA.279 Second, the trafficker must know or have reason to know that the
purchaser or renter intends to use the means of access to violate certain laws or to “damage a
protected computer” in violation of the CFAA.280 The botnet trafficking provision of in this
legislation is largely identical to a stand-alone botnet trafficking proposal first introduced in the
114th Congress: the Botnet Prevention Act of 2016.281 That legislation faced criticism from those
who feared it would criminalize valid cybersecurity research among other things.282 Proponents

268 United States v. Smith, 950 F.3d 893, 895 (D.C. Cir. 2020) (citing United States v. Gatling, 96 F.3d 1511, 1518
(D.C. Cir. 1996)). For a detailed examination of federal conspiracy law, see, e.g., CRS Report R41223, Federal
Conspiracy Law: A Brief Overview
, by Charles Doyle.
269 See supra note 263 and accompanying discussion.
270 Id.
271 18 U.S.C. § 371.
272 See supra § “Remedies and Penalties.”
273 T ex. Bus. & Com. Code Ann. § 324.055 (West).
274 President Barack Obama, Remarks by the President at the National Cybersecurity Communications Integration
Center (Jan. 13, 2015), reprinted at 2015 WL 163517, at *3 (“ [W]e’re proposing to update the authorities that law
enforcement uses to go after cyber criminals. We want to be able to better prosecute those who are involved in cyber
attacks, those who are involved in the sale of cyber weapons like botnets and spyware.”).
275 See, e.g., Defending American Security from Kremlin Aggression Act of 2019, S. 482, 116th Cong. (2019).
276 Id.
277 T he relevant provision is titled “Stopping T rafficking in Botnets; Forfeiture.” Id. § 406.
278 Id.
279 Id.
280 Id.
281 S. 2931, 114th Cong. (2016).
282 Letter from Access Now et al., to Senate (June 1, 2016), https://www.eff.org/document/coalition-letter-opposing-
botnet -prevention-act.
Congressional Research Service
28

link to page 30 link to page 4 link to page 4 link to page 4 link to page 32 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

have countered that proposals to prohibit botnet trafficking would be sufficiently limited by the
legislation’s intent requirements.283
Hacking Back
Another issue that has garnered legal,284 academic,285 media,286 and legislative287 attention is that
of “hacking back”—where the victim of hacking launches an invasive counterattack against the
initial hacker.288 Hacking back has been the subject of significant policy debate.289 Critics argue
that hacking back could result in escalation and retaliation290 and harm innocent parties though
misattribution of the source of a cyber-attack.291 Others have cautioned that hacking back could
cause private actors to inadvertently wade into the realm of cyberwarfare and foreign relations if
they hack back against an initial aggressor who turns out to be the agent of a foreign state.292
Much of the recent scholarship on hacking back has been in this vein,293 but hacking back has its

283 See U.S. Dep’t of Justice, Prosecuting the Sale of Botnets, supra note 255 (defending proposal to prohibit botnet
trafficking on grounds that “ proposal requires that the government . . . [meet] the burden to prove, beyond a reasonable
doubt, that the individual intentionally undertook an act (trafficking in a means of access) that he or she knew to be
wrongful”).
284 See, e.g., U.S. DEP’T OF JUSTICE, BEST PRACTICES FOR VICTIM RESPONSE AND REPORTING OF CYBER INCIDENTS 23
(2018), https://www.justice.gov/criminal-ccips/file/1096971/download#page=23 (discussing hacking back).
285 See, e.g., Shane Huang, Proposing A Self-Help Privilege for Victims of Cyber Attacks, 82 GEO. WASH. L. REV. 1229,
1233 (2014).
286 See, e.g., Nicholas Schmidle, Vigilantes Who Hack Back, NEW YORKER (Apr. 30, 2018),
https://www.newyorker.com/magazine/2018/05/07/the-digital-vigilantes-who-hack-back.
287 See, e.g., Active Cyber Defense Certainty Act, H.R. 3270, 116th Cong. (2019).
288 See Beale, supra note 1, at 189 n.190 (describing hacking back). Related terms include, “counterstrikes, ‘active
defense,’ ‘back hacking,’ ‘retaliatory hacking,’ or ‘offensive countermeasures’” Id. at 190 (quoting Sean L.
Harrington, Cyber Security Active Defense: Playing with Fire or Sound Risk Managem ent? 20 RICH. J.L. & TECH. 12, 4
(2014)).
289 Compare Josephine Wolff, Attack of the Hack Back, SLATE (Oct. 17, 2017),
https://slate.com/technology/2017/10/hacking-back-the-worst -idea-in-cybersecurity-rises-again.html (proclaiming
hacking back “[t]he worst idea in cybersecurity”) and Martin Giles, Five Reasons “Hacking Back” is a Recipe for
Cybersecurity Chaos
, MIT T ECH. REV. (June 21, 2019),
https://www.technologyreview.com/2019/06/21/134840/cybersecurity -hackers-hacking-back-us-congress/ (describing
hacking back as a “terrible idea”), with KERR, supra note 7, at 133 (summarizing debate over hacking back and
collecting articles arguing in favor of hacking back) and Michael Edmund O’Neill, Old Crim es in New Bottles:
Sanctioning Cybercrim e
, 9 GEO. MASON L. REV. 237, 277 (2000) (“ In other words, just as settlers in the American
West could not reliably count on the local sheriff to protect them, and instead kept a weapon handy to stymie potential
aggressors, Internet users may need to protect themselves.”).
290 Josephine Wolff, When Companies Get Hacked, Should They Be Allowed to Hack Back? , ATLANTIC (July 14, 2017),
https://www.theatlantic.com/business/archive/2017/07/hacking-back-active-defense/533679/ (summarizing concern of
security advocates that hacking back “will merely serve as a vehicle for more attacks and greater chaos, particularly if
victims incorrectly identify who is attacking them, or even invent or stage fake attacks from adversaries as an excuse
for hacking back”).
291 See, e.g., Beale, supra note 1, at 198 (summarizing view that due to difficulty in accurately attributing the source of
a cyber-attack, that “ remedial actions risk collateral damage to innocent parties”).
292 See PATRICK LIN, ETHICS OF HACKING BACK: SIX ARGUMENTS FROM ARMED CONFLICT TO ZOMBIES 15 (2016),
http://ethics.calpoly.edu/hackingback.pdf (“ Regardless of attribution, hacking back against a foreign target may be
misinterpreted by the receiving nation as a military response fr om our state, to serious political and economic
backlash.”).
293 See, e.g., CTR. FOR CYBER & HOMELAND SEC., GEO. WASH. UNIV., INTO THE GRAY ZONE: THE PRIVATE SECTOR AND
ACTIVE DEFENSE AGAINST CYBER THREATS 27 (2016), http://cchs.auburn.edu/_files/into-the-gray-zone.pdf (“ First,
‘hacking back’ by the private sector to intentionally cause substantial harm and destroy other parties’ data is clearly
unauthorized and rightly prohibited.”); accord Giles, supra note 289 (critiquing hacking back).
Congressional Research Service
29

link to page 4 link to page 32 link to page 32 link to page 4 link to page 32 Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

proponents who argue, among other things, that hacking back is necessary to “establish
attribution of an attack, . . . retrieve and destroy stolen files, [and] monitor the behavior of an
attacker.”294 In addition, it has been suggested that hacking back could be particularly useful in its
“ability to prevent future [cyber] attacks by combatting existing botnets.”295
The debate over hacking back is largely academic, as it appears that much hacking back is
currently il egal—at least when conducted by private actors.296 Although federal courts have not
resolved the issue, the weight of persuasive authority suggests that the same provisions of the
CFAA that prohibit hacking—such as § 1030(a)(5)’s prohibition against certain damage to
computers—also general y prohibit hacking back by the victim of the initial attack.297 At least one
legislative proposal introduced in the 116th Congress would aim to authorize certain self-help
measures. The Active Cyber Defense Certainty Act would create two new exceptions to the
CFAA that would clarify that the law does not prohibit hacking back.298 First, the Active Cyber
Defense Certainty Act would amend the CFAA to expressly permit certain attributional
technologies used to identify cyber intruders.299 Second, with exceptions, the proposal would
create an exclusion from CFAA prosecution for active cyber defense measures, which include
defensive measures “consisting of accessing without authorization” the attacker’s computer to
gather information necessary to determine attribution, disrupt certain continued authorized
activity, or monitor the behavior of an attacker to create “cyber defense techniques.”300 Such

294 Press Release, Congressman T om Graves, Graves, Gottheimer Introduce the Active Cyber Defense Certainty Act
(June 13, 2019), https://tomgraves.house.gov/news/documentsingle.aspx?Documen tID=401122.
295 Beale, supra note 1, at 191.
296 See, e.g., U.S. DEP’T OF JUSTICE, BEST PRACTICES FOR VICTIM RESPONSE, supra note 284, at 23 (cautioning that
“[r]egardless of the victim’s motive” it is possible that “accessing, modifying, or damaging a computer it does no t own
or operate” will “violate federal law and possibly also the laws of many states and foreign countries, if the accessed
computer is located abroad.”).
T he CFAA has a carve out for certain law enforcement activity, which provides that: “ This section does not prohibit
any lawfully authorized investigative, protective, or intelligence activity of a law enforcement agency of the United
States, a State, or a political subdivision of a State, or of an intelligence agency of the United States.” 18 U.S.C.
§ 1030(f).
Although beyond the scope of this Report, it is worth observing that the federal wiretapping statute, 18 U.S.C. § 2511,
contains the following carve out applicable to certain acts of hacking back conducted under color of law:
(i) It shall not be unlawful under this chapter for a person acting under color of law to intercept the wire or
electronic communications of a computer trespasser transmitted to, through, or from the protected computer, if --
(I) the owner or operator of the protected computer authorizes the interception of the computer trespasser’s
communications on the protected computer;
(II) the person acting under color of law is lawfully engaged in an investigation;
(III) the person acting under color of law has reasonable grounds to believe that the contents of the computer
trespasser’s communications will be relevant to the investigation; and
(IV) such interception does not acquire communications other than those transmitted to or from the computer
trespasser.
18 U.S.C. § 2511(2)(i).
297 E.g., U.S. DEP’T OF JUSTICE, BEST PRACTICES FOR VICTIM RESPONSE, supra note 284, at 23; Orin Kerr, The Legal
Case Against Hack-Back: A Response to Stewart Baker
, STEPTOE CYBERBLOG (Nov. 2, 2012),
https://www.steptoecyberblog.com/2012/11/02/the-hackback-debate/; Beale, supra note 1, at 191; CTR. FOR CYBER &
HOMELAND SEC., GEO. WASH. UNIV., supra note 293; but see Stewart Baker, RATs and Poison Part II: The Legal Case
for Counterhacking
, STEPTOE CYBERBLOG (Nov. 2, 2012), https://www.steptoecyberblog.com/2012/11/02/the-
hackback-debate/ (arguing that hacking back may not be a violation of the CFAA).
298 Active Cyber Defense Certainty Act, H.R. 3270, 116th Cong. (2019).
299 Id.
300 Id.
Congressional Research Service
30

Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

cyber defense measures would general y require notification to, and pre-approval by, the FBI.301
The Active Cyber Defense Certainty Act was previously introduced in the 115th Congress.302

Author Information

Peter G. Berris

Legislative Attorney



Disclaimer
This document was prepared by the Congressional Research Service (CRS). CRS serves as nonpartisan
shared staff to congressional committees and Members of Congress. It operates solely at the behest of and
under the direction of Congress. Information in a CRS Report should n ot be relied upon for purposes other
than public understanding of information that has been provided by CRS to Members of Congress in
connection with CRS’s institutional role. CRS Reports, as a work of the United States Government, are not
subject to copyright protection in the United States. Any CRS Report may be reproduced and distributed in
its entirety without permission from CRS. However, as a CRS Report may include copyrighted images or
material from a third party, you may need to obtain the permission of the copyright holder if you wish to
copy or otherwise use copyrighted material.


301 Id.
302 Active Cyber Defense Certainty Act, H.R. 4036, 115th Cong. (2017).
Congressional Research Service
R46536 · VERSION 1 · NEW
31