Overview#Computer Fraud and Abuse Act (CFAA) of 1986 is a Act of Congress codified in U.S.C. Title 18 § 1030 as an amendment to existing computer fraud law (U.S.C. Title 18 § 1030), which had been included in the Comprehensive Crime Control Act of 1984.
The Comprehensive Crime Control Act of 1984 bill was enacted in response to concern that computer-related crimes might go unpunished. The House Committee Report to the original computer crime bill characterized the 1983 techno-thriller film WarGames—in which a young Matthew Broderick breaks into a U.S. military supercomputer programmed to predict possible outcomes of nuclear war and unwittingly almost starts World War III—as “a realistic representation of the automatic dialing and access capabilities of the personal computer.”
Computer Fraud and Abuse Act was written to increase the scope of the previous version of U.S.C. Title 18 § 1030 while, in theory, limiting federal jurisdiction to cases "with a compelling federal interest-i.e., where computers of the federal government or certain financial institutions are involved or where the crime itself is interstate in nature." (see "Protected Computer", below). In addition to amending a number of the provisions in the original section 1030, the CFAA also criminalized additional computer-related acts. Provisions addressed the distribution of malicious code and denial of service attacks. Congress also included in the CFAA a provision criminalizing trafficking in passwords and similar items.
Since then, the Act has been amended a number of times—in 1989, 1994, 1996, in 2001 by the USA PATRIOT Act, 2002, and in 2008 by the Identity Theft Enforcement and Restitution Act.
In January 2015 Barack Obama proposed expanding the CFAA and the RICO Act in his Modernizing Law Enforcement Authorities to Combat Cyber Crime proposal. DEF CON organizer and Cloudflare researcher Marc Rogers, Senator Ron Wyden, and Representative Zoe Lofgren have stated opposition to this on the grounds it will make many regular Internet activities illegal, and moves further away from what they were trying to accomplish with Aaron's Law.
More Information#There might be more information for this subject on one of the following:
- [#1] - https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act - based on information obtained 2017-12-20-