U.S. Supreme Court,
Government,
Criminal,
Administrative/Regulatory
Sep. 26, 2017
How the Computer Fraud and Abuse Act is being misused
Last month I discussed how the CFAA has strayed from its roots. This month, I want to discuss examples of how the act is being misused today.





Jason S. Leiderman
Law Offices of Jay LeidermanEmail: Jay@Criminal-Lawyer.me
"Jay" Leiderman is an attorney in Ventura who specializes in hacking and computer crime.

HACKING THE LAW
In last month’s column I discussed how far the Computer Fraud and Abuse Act has strayed from its roots. According to the Guardian: “One night in June 1983, [film enthusiast Ronald Reagan] sat down [ ] to watch WarGames. The film stars Matthew Broderick as a tech-wiz teenager who unwittingly hacks into the main computer at Norad, the North American Aerospace Defense Command. [Broderick almost starts globalthermo nuclear warfare....
For only $95 a month (the price of 2 article purchases)
Receive unlimited article access and full access to our archives,
Daily Appellate Report, award winning columns, and our
Verdicts and Settlements.
Or
$795 for an entire year!
Or access this article for $45
(Purchase provides 7-day access to this article. Printing, posting or downloading is not allowed.)
Already a subscriber?
Sign In