Swartz suicide shines light on federal anti-hacking law
Federal Computer Fraud and Abuse Act is applied too broadly in alleged data theft cases, critics say
Computerworld - The suicide of Internet activist and pioneer Aaron Swartz has focused attention on what some activists say is the overzealous use of the federal Computer Fraud and Abuse Act (CFAA) anti-hacking statute.
Swartz, 26, hanged himself last Friday, apparently over concerns stemming for the prospect of spending up to 35 years in prison on hacking-related charges.
Federal prosecutors had indicted Swartz on 13 counts of felony hacking and wire fraud related to the alleged theft of millions of documents from JSTOR, an online library of literary journals and scholarly documents sold by subscription to universities and other institutions.
Several charges against Swartz were tied to alleged CFAA violations.
Swartz's death prompted calls by some legal experts for a review of CFAA. A petition launched Monday on the White House's website that called for reforming the anti-hacking law had garnered about 550 signatures.
The CFAA, enacted by Congress in 1986, makes it illegal to knowingly access a computer without authorization, to exceed authorized use of a system, or to to access information valued at more than $5,000.
In intent and spirit, CFAA is an online anti-trespassing law targeting criminal hackers who break into systems to steal or sabotage data. Penalties range from five-years prison sentences to life in prison.
Federal prosecutors in Massachusetts alleged that Swartz violated the provisions of the law by allegedly misusing guest access privileges on Massachusetts Institute of Technology's network to systematically access and download a huge number of documents from JSTOR.
In court documents, prosecutors alleged that while a Fellow at Harvard University's Safra Center for Ethics between Sept. 2010 and Jan 2011, Swartz registered for guest access on MITs network using a fictitious name and temporary email address.
According to the documents, Swartz downloaded more than two million JSTOR documents over a two-week period by using a variety of deliberate, evasive tactics designed to confound JSTOR controls.
Swartz maintained that the sole motivation for accessing the scholarly documents was to make them freely available on the Internet.
In a blog post , Orin Kerr, a professor of law at the George Washington University Law School noted that from a strictly legal standpoint, the charges against Swartz were based on what appears to have been a fair application of the CFAA and federal wire fraud laws.
Even so, legions of Swartz supporters appeared outraged that he faced a long prison term.
"The government should never have thrown the book at Aaron for accessing MIT's network and downloading scholarly research," the Electronic Frontier Foundation (EFF) said in a blog post Monday. The CFAA's broad reach and vague language help the government unfairly bring a potentially crippling criminal prosecution against Swartz, the EFF said.
"Aaron's tragedy also shines a spotlight on a couple profound flaws of the Computer Fraud and Abuse Act in particular, and gives us an opportunity to think about how to address them," the rights group noted.
Hanni Fakhoury, staff attorney at the EFF said that a big problems with the law is its loose definitions of key terms, including those related to unauthorized access to data. Over the years, creative prosecutors have taken advantage of the law and applied it to situations that it was never meant to tackle, Fakhoury said.
- Kicking the stool out from under the cybercrime economy
- Chinese man indicted over theft of Boeing C-17 secrets
- The making of a cybercrime market
- Arrests made after international cyber-ring targets StubHub
- International police operation disrupts Shylock banking Trojan
- Spamhaus pushes for arrests of alleged DDoS participants
- Accused Russian point-of-sale hacker arrested, will face U.S. charges
- No-IP regains control of some domains wrested by Microsoft
- Microsoft legal action cramping other hacking campaigns, Kaspersky says
- Microsoft admits technical error in IP takeover, but No-IP still down
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts