Congresswoman proposes computer fraud law amendment to honor Aaron Swartz
Congresswoman Zoe Lofgren drafts 'Aaron's Law' bill that would exclude terms of service from Computer Fraud and Abuse Act
IDG News Service - A draft bill to exclude terms of service violations from the Computer Fraud and Abuse Act (CFAA) is to be introduced in the U.S. House of Representatives.
The proposed amendment to the anti-hacking law comes in the wake of the suicide on Friday by Internet activist and computer prodigy Aaron Swartz, who was charged with wire fraud, computer fraud and other crimes for allegedly accessing and downloading over 4 million articles from the JSTOR online database through the network of the Massachusetts Institute of Technology.
Swartz allegedly intended to distribute a significant proportion of JSTOR's archive through file-sharing sites. If convicted, he could have faced up to 35 years in prison and a fine of US$1 million.
The government was able to bring disproportionate charges against Swartz because of the broad scope of CFAA and the wire fraud statute, wrote Representative Zoe Lofgren in a post on Tuesday on the Reddit news-sharing site in which Swartz played a key role. "It looks like the government used the vague wording of those laws to claim that violating an online service's user agreement or terms of service is a violation of the CFAA and the wire fraud statute," she said.
The proposed amendment to the CFAA (Section 1030(e)(6) of title 18, United States Code) excludes access in violation of an agreement or contractual obligation, such as an acceptable use policy or terms of service agreement, with an Internet service provider, Internet website, or employer, if such violation constitutes the sole basis for determining that access to a protected computer is unauthorized.
Lofgren plans a similar amendment to the statute on fraud by wire, radio, or television (Section 1343 of title 18, United States Code), which states that a violation of an agreement or contractual obligation regarding Internet or computer use, such as an acceptable use policy or terms of service agreement, with an Internet service provider, Internet website, or employer is not in itself a violation of this section.
A Democrat who represents California's 19th congressional district, Lofgren said she would seek cosponsors for the bill from both the Republican and Democratic parties. The bill to amend CFAA and wire fraud statutes, which she would like to call "Aaron's Law," should be enacted separately and swiftly, she said. "It could be an important tribute to him," Lofgren said.
The CFAA makes it illegal to gain access to protected computers without authorization or in a manner that exceeds authorized access, wrote Marcia Hofmann, senior staff attorney at the Electronic Frontier Foundation in a post earlier this week. "Unfortunately, the law doesn't clearly explain what a lack of 'authorization' actually means. Creative prosecutors have taken advantage of this confusion to craft criminal charges that aren't really about hacking a computer but instead target other behavior the prosecutors don't like," she wrote.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Cybercrime and Hacking White Papers | Webcasts