Criminal activity in cyberspace.
Remember — All tools can be used maliciously.
Prohibits unauthorized access to certain protected computers of interest to the federal government.
On “Without Authorization” — Because it isn’t always an outsider without authorization committing crime (stereotypical hacker). Sometimes it is someone authorized exceeding their authorization.
Important — Seven crimes can be prosecuted by the CFAA.
TODO
| Offense | Section | Sentence |
|---|---|---|
| Obtaining National Security Information | ||
| Accessing a Comuter and Obtaining Information | ||
| Trespassing in a Government Computer | ||
| Accessig na Computer to Defraud and Obtain Value | ||
| Intentionally Damaging by Knowing Transmission | ||
| Recklessly Damaging by Intentional Accesss | ||
| Negligently Causing Damange and Loss By Intentional Access | ||
| Trafficking in Passwords | ||
| ??? |
Electronic communicates should be handled by the government in the same way telephone communication is handled.
History
- Originally applied to telephone taps.
- Amended in 1986 to cover electronic communications.
- This intentionally broad term catches all computer network communications.
Remember — This applies to any person, not just law enforcement.
Protects data, email, and voicemail from unauthorized access.
Greatly expanded government powers in response to the September 11 attacks to allow mass monitoring of civilians.
On Title II: Allows interception of wire/oral/electronic communications to get evidence for (1) specified chemical weapons or terrorism offenses; and (2) computer fraud and abuse. Among other things, allows for:
- Bulk collection of electronic data.
- Nationwide search warrants.
- Surveillance of citizens and non citizens.
- Roving wiretaps.
Also relaxes requirements for permission to surveil, and expands scope of subpoenas of electronic data.
Sunset and FREEDOM ACT:
- Although the Patriot act was allowed to Sunset in 2005, the Freedom Acct reinstated most of the powers of the Patriot act.
TODO Article notes (read articles linked on Canvas).
“The easy, bad, and scary.”
All sexually explicit content is subject to federal regulation.
Remember — Never investigate something yourself, report immediately to NCMEC or FBI.
Pirated copies of proprietary commercial software, typically distributed over the internet after any copyright protection mechanisms have been disabled.
In the same vein as property theft, copyright infringement, piracy, illegal sports streaming, etc.
Digital Evidence: Information stored or transmitted in binary form than is associated with electronic crimes, and it used to prosecute all types of crimes.
???
- Do you know your footprint?
- Do you have incriminating digital evidence?
- What online activity is sus?