26 Feb 2023

63

The Computer Fraud and Abuse Act (CFAA)

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 799

Pages: 3

Downloads: 0

The Computer Fraud and Abuse Act (CFAA) is an American law ratified to deal with cybercrime since 1986. The tenets of the law lay in securing computer data from access by unauthorized users. The threat that was perceived at the time when the legislation was passed was computer hacking. Computer users, at the time, had two fears; an unauthorized person would break into the nuclear control system or take control of the banking system. Recently, the act has been expanded through a series of amendments. The emergence of new threats from abroad has necessitated the American congress to revisit the CFAA and expand it to incorporate all America's computer resources. The CFAA is reportedly profoundly flawed as well as outdated. Representative Zoe Lofgren from California introduced a law “Aaron’s law,” which directly opposes the popular CFAA law. The Aaron law hugely limits some aspects of the CFAA law. The law was named after an activist, Aaron, who contributed immensely to the society both politically and technically before committing suicide at the age of twenty-six. Aaron's contribution enabled the massive sharing of web content, and his achievement was not technically limited. He is well known in the political arena as having pioneered the Demand Progress group (Brenton, 2009). The innovation prevented the limits of innovation and online free speech. He believed that government-funded research should be accessible to all through the web. Aaron is recorded to have downloaded a JSTOR document to his laptop. However, by setting up a computer at Massachusetts Institute of Technology and downloading the materials, it was purported that he committed a felony. The federal prosecutors had 11 felonies against Aaron. Consequently, for downloading the academic documents, Aaron faced a jail term of between five to thirty-five years. Aaron committed suicide two years to the start of the trials (Icove et al., 1995). It is no secret that Aaron was a victim of over prosecution. In another Pinstance, a young programmer was accused of attacking the Paypal server after his page was terminated. Twenty-eight-year-old Keith Downey, who hailed from Florida was accused and dubbed to have committed a felony. To date, the young Downey faces fifteen years in jail. The sentence is the same as for sex abuse or homicide convicts. Andrew Aurnheimer, 27 years old, was accused of trading illegally obtained information to Gawker.com about iPad users. However, Andrew together with his co-accused Daniel Spitler, in their presentation argued that they intended to show the weakness of the iPad generated information. The information in possession of AT&T could be generated by any other hacker and misused. After pleading guilty, Aurnheimer was sentenced to a 41-month sentence. Shockingly, it is the same sentence that a child pornographer had been handed earlier the same month. Aurnheimer’s case was intriguing. He was treated like a criminal instead of a whistleblower. The sentence, in all terms, is harsh. Throughout the world, the criminal law act differently. One has read of cases where thieves are thrown in prison to serve very long jail terms, and in extreme cases, thieves have had their arms or hands chopped off. The case should be different from America. Importantly, it is a country that believes in equal punishment to the crime committed. The CFAA laws were ambiguously written to the extending of handing down disproportionate sentences to the crime committed. The three convicts, Downey, Aaron, and Auernheimer, never committed any act of terrorism, but they were treated as such by the law. Aaron’s law must be amended for the intent of the crime to be clarified. Damages caused by computer crimes should be defined, and penalties should be proportionate to the crimes committed. Moreover, duplicating charges should be disallowed. The intent of modifying the CFAA would be to differentiate minor violations from serious computer fraud (Brenton, 2009. Reworking of the CFAA would be a significant milestone in fixing the chaotic bill. The contemporary society is alive to increasing computer crimes. As such, penalties should be enacted for serious computer crime offenders (Icove et al., 1995). However, it is prudent that the laws are written in a manner that does not over prosecute minor offenders. The impact of the law would not only be limited to the establishment of fairness but rather creates a forum for punishing serious computer offenders accordingly. The law should not generalize computer offenders. It is prudent that in every instance, the law establishes the intent of the computer crime offender. In 1989, three years after the anti-hacking statute was enacted, the government convicted a graduate of Cornell University, Robert Morris, of computer fraud. The convict was accused of creating and unleashing Morris worm, a virus that caused havoc. In the trial, Robert Morris was handed a three-year probation and 400 community working hours. In regards to the three cases discussed in this paper involving over prosecution, the Morris case was handled fairer to him. I simple terms, the CFAA law prohibits unauthorized access to information or exceeding authorized information access to both employees of ex-employees of a company (Brenton, 2009). That much is understandable and fair. However, the Case of Robert Morris was controversial. While Downey, Aaron, and Auernheimer were minor offenders; the three were victims of over prosecution. Robert Morris was handed a lesser punishment. In an American language, the punishment was less than his offense. The four hundred hours plus three years’ probation was improper. The felony deserved more as the intent of his actions is documented. He intended to cause harm, of which he did.

References

Brenton, K. W. (2009). Trade Secret Law and the Computer Fraud and Abuse Act: Two

Problems and Two Solutions. U. Ill. JL Tech. & Policy , 429.

Icove, D., Seger, K., & VonStorch, W. (1995). Computer crime: a crime fighter’s handbook .

Sebastopol, CA: O'Reilly & Associates.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay
Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). The Computer Fraud and Abuse Act (CFAA).
https://studybounty.com/the-computer-fraud-and-abuse-act-cfaa-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration