Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Looking back at 2021 and ahead to 2022
Monthly Minute | Protecting Against Data Scrapers
Death of Activist Aaron Swartz Could Spur Changes to Computer Fraud & Abuse Act
Employer’s Takeover of Former CEO’s LinkedIn Account Lawful Under CFAA
On July 18, 2024, a federal jury in Delaware found that an online travel booking company violated the Computer Fraud and Abuse Act (CFAA) by accessing portions of a European airline’s website without permission and “with...more
Russian intelligence agencies have hacked dozens of civilian organizations in the U.S. and other Ukraine-allied nations since February. While this activity has garnered a great deal of attention due to the conflict in...more
Takeaway: The DOJ’s recent revisions to their internal policy promote the Department’s goals that the CFAA is applied consistently by government attorneys and better understood by the public. These goals ensure that the law...more
On May 19, 2022, the Department of Justice (“DOJ”) announced significant clarifications to its policy on charging Computer Fraud and Abuse Act (“CFAA”) violations that give some comfort to cyber security consultants who...more
On May 19, 2022, the U.S. Department of Justice (DOJ) revised its policy regarding charging decisions under the Computer Fraud and Abuse Act (CFAA). The new policy makes clear, "for the first time," that the DOJ "should...more
In a significant development in anti-hacking criminal enforcement, the Department of Justice last week released new guidance for charging violations of the Computer Fraud and Abuse Act (“CFAA”), the nation’s premier computer...more
Today, the Department of Justice (“DOJ”) updated its policy regarding charging violations under the Computer Fraud and Abuse Act (“CFAA”). This is the first update to the DOJ’s policy since 2014, and it is effective...more
A search warrant is not required for law enforcement to use pen registers to record the IP addresses visited by a criminal suspect, a federal appeals court recently held. This follows a 1979 Supreme Court case, Smith v....more
Cybercrime has been on the rise in recent years. In response, the federal government has shown an increased interest in prosecuting cybercrime offenses. The Computer Fraud and Abuse Act, codified at 18 U.S.C. Section 1030, is...more
The Computer Fraud and Abuse Act (CFAA), codified at 18 U.S.C. Section 1030, is one of the U.S. Department of Justice’s most potent weapons in its fight against cybercrimes. It outlines numerous offenses, and it imposes...more
CYBERSECURITY - Another Win for Justice Department: Slilpp Marketplace Takedown - People always ask me if law enforcement is having any luck in combatting cyber criminals. Let me be clear: it is a very tough job to take...more
Family law blogs are usually not fertile grounds to write about criminal law. Yet even family lawyers are not immune from situations where our specialty crosses paths with the dark side. We have previously written about...more
Such Scraping “Plausibly Falls within the Ambit of the First Amendment” The Ninth Circuit is currently considering the appeal of the landmark hiQ decision, where a lower court had granted an injunction that limited the...more
With new developments regarding Uber Technologies Inc.’s 2016 data breach coming out almost daily, lawsuits against the company continue to pile-up. We previously reported that within days of Uber disclosing the data theft...more
Most people think of the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030, as the federal criminal statute addressing computer hacking and other cybercrime. But as more and more businesses vest their enterprise value in...more
Editor’s Note: This is the first of an end-of-year series of posts examining coming trends in cybersecurity. Posts will examine trends in state regulations, federal regulatory authority, the changing nature of the threat...more
On October 24, 2016, the Department of Justice (“DOJ”) publicly released an internal policy memorandum dated September 11, 2014 (“the policy”), that details the factors federal prosecutors should use in determining whether...more
We’ve all heard of the FBI’s “Most Wanted” list, but fewer people know that the FBI has a special most wanted list just for computer criminals. The FBI’s “Cyber’s Most Wanted” list features the FBI’s most wanted computer...more
On October 7, 2015, former Tribune Company employee Matthew Keys was convicted of three felonies stemming in part from assistance he provided to the hacking collective Anonymous to alter content on the LA Times’ website. ...more
Sergey Vovnenko, a Ukrainian hacker, was charged in New Jersey federal court this week for wire fraud conspiracy, unauthorized computer access and aggravated identity theft for allegedly hacking into networks of financial...more
Anonymous users of the almost 40 million users of the Ashley Madison website have filed suit against internet service providers (ISPs) GoDaddy and Amazon alleging that they have been damaged because the ISPs hosted the stolen...more
As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more
Obama administration proposal would reduce legal ambiguities and allow civil RICO claims. On January 2015, the Obama administration announced a series of proposals to strengthen the country’s response to...more
Self-proclaimed Internet troll and hacker Andrew “weev” Auernheimer has big plans now that he’s been sprung from prison. We identified Auernheimer’s imprisonment and appeal as one of the top trade secret stories of...more