To many who conduct work or research related to digital security, the legislation meant to protect against computer crimes has morphed into something harmful. The 1986 law, the U.S. Computer Fraud and Abuse Act, has been repeatedly described as vague and ineffectual — allowing overzealous prosecutors to saddle hacktivists and low-level criminals with excessive sentences.
Now, thanks to a legal challenge to the CFAA, the Department of Justice is for the first time releasing its 2014 guidelines on how prosecutors should charge computer crimes — when someone exceeds “authorized” access on a computer. (First Look Media, the publisher of The Intercept, is a plaintiff in the case.)
The Department of Justice acknowledges that “laws addressing the misuse of computers have not kept pace uniformly with developments in technology and criminal schemes” though it maintains that the law remains “important” in prosecuting cybercrimes.
Some of the prosecutions under the CFAA have proved controversial. Aaron Swartz, a well-known internet activist who downloaded academic journals en masse, faced years of grueling legal trials under the CFAA before he committed suicide. And Andrew Auernheimer was found guilty of conspiracy to violate the CFAA by uncovering AT&T customer data exposed on the company website.
The central cybercrime law is based around access to online systems or data “without authorization,” though it’s never been clear what that means. Committing a crime could include handing over a password to a hacker — something that Matthew Keys, a former Reuters journalist, did in 2010, when he provided Anonymous with access to the LA Times’s website. He was sentenced earlier this year to two years in prison for his role in defacing the newspaper’s website. He maintains his innocence.
Or it could threaten the livelihood of legitimate security researchers and penetration testers, who poke and prod at online systems to test their fortitude — in order to repair holes or flaws. “What we don’t know, and we’ve never known, is what ‘authorization’ means,” Nate Cardozo, senior staff attorney at the Electronic Frontier Foundation, told Dark Reading, an information security blog on the law’s 30th birthday this month.
There have been several unsuccessful attempts to reform the law in recent years.
According to the memorandum, titled “Intake and Charging Policy for Computer Crime Matters,” attorneys “contemplating charges” should consider as a matter of policy eight different conditions before proceeding.
First, the prosecutor should consider how “sensitive” the computer or information contained on the computer was — referring to classified or personal information like Social Security numbers or intellectual property. The prosecutor should determine if the digital intrusion endangered “national security” or other pillars of society — public health, market integrity, foreign affairs, or major infrastructure. If the hack was a part of an organized criminal effort, or posed possible physical harm to the target, those factors should be taken into consideration. And if charging the suspect might “deter” future crime, or if there was a large “impact” on a community, the prosecutor should also weigh those concerns.
Intention is also important, when it comes to prosecuting someone for exceeding their authorized access to a device or online system, like an email account or website. “The attorney for the government must be prepared to prove that the defendant knowingly violated restrictions on his authority to obtain or alter information stored on a computer,” reads the memorandum.
The list of conditions, according to the document, is “not intended to be all inclusive.”
WAIT! BEFORE YOU GO on about your day, ask yourself: How likely is it that the story you just read would have been produced by a different news outlet if The Intercept hadn’t done it?
Consider what the world of media would look like without The Intercept. Who would hold party elites accountable to the values they proclaim to have? How many covert wars, miscarriages of justice, and dystopian technologies would remain hidden if our reporters weren’t on the beat?
The kind of reporting we do is essential to democracy, but it is not easy, cheap, or profitable. The Intercept is an independent nonprofit news outlet. We don’t have ads, so we depend on our members to help us hold the powerful to account. Joining is simple and doesn’t need to cost a lot: You can become a sustaining member for as little as $3 or $5 a month. That’s all it takes to support the journalism you rely on.
We’re independent of corporate interests. Will you help us?
Latest Stories

Nick Turse Joins The Intercept as Inaugural National Security Reporting Fellow
The veteran investigative journalist will cover U.S. military operations, national security issues, and foreign affairs through this yearlong fellowship.

How Much Did Congress Make Off Market Turmoil and Why’re They Allowed to Make Anything at All?
Questions about who profited from Trump’s tariff flip-flop revived the push to ban members of Congress themselves from trading stocks.

The Case Against Mahmoud Khalil Hinges on Vague “Antisemitism” Claim
The Trump administration filed no new evidence in its case against Khalil, according to a new filing ahead of Friday's hearing.