Congresswoman proposes computer fraud law amendment to honor Aaron Swartz
Congresswoman Zoe Lofgren drafts 'Aaron's Law' bill that would exclude terms of service from Computer Fraud and Abuse Act
IDG News Service - A draft bill to exclude terms of service violations from the Computer Fraud and Abuse Act (CFAA) is to be introduced in the U.S. House of Representatives.
The proposed amendment to the anti-hacking law comes in the wake of the suicide on Friday by Internet activist and computer prodigy Aaron Swartz, who was charged with wire fraud, computer fraud and other crimes for allegedly accessing and downloading over 4 million articles from the JSTOR online database through the network of the Massachusetts Institute of Technology.
Swartz allegedly intended to distribute a significant proportion of JSTOR's archive through file-sharing sites. If convicted, he could have faced up to 35 years in prison and a fine of US$1 million.
The government was able to bring disproportionate charges against Swartz because of the broad scope of CFAA and the wire fraud statute, wrote Representative Zoe Lofgren in a post on Tuesday on the Reddit news-sharing site in which Swartz played a key role. "It looks like the government used the vague wording of those laws to claim that violating an online service's user agreement or terms of service is a violation of the CFAA and the wire fraud statute," she said.
The proposed amendment to the CFAA (Section 1030(e)(6) of title 18, United States Code) excludes access in violation of an agreement or contractual obligation, such as an acceptable use policy or terms of service agreement, with an Internet service provider, Internet website, or employer, if such violation constitutes the sole basis for determining that access to a protected computer is unauthorized.
Lofgren plans a similar amendment to the statute on fraud by wire, radio, or television (Section 1343 of title 18, United States Code), which states that a violation of an agreement or contractual obligation regarding Internet or computer use, such as an acceptable use policy or terms of service agreement, with an Internet service provider, Internet website, or employer is not in itself a violation of this section.
A Democrat who represents California's 19th congressional district, Lofgren said she would seek cosponsors for the bill from both the Republican and Democratic parties. The bill to amend CFAA and wire fraud statutes, which she would like to call "Aaron's Law," should be enacted separately and swiftly, she said. "It could be an important tribute to him," Lofgren said.
The CFAA makes it illegal to gain access to protected computers without authorization or in a manner that exceeds authorized access, wrote Marcia Hofmann, senior staff attorney at the Electronic Frontier Foundation in a post earlier this week. "Unfortunately, the law doesn't clearly explain what a lack of 'authorization' actually means. Creative prosecutors have taken advantage of this confusion to craft criminal charges that aren't really about hacking a computer but instead target other behavior the prosecutors don't like," she wrote.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Live Webcast IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!