Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Crypto-Counterfeiting, Joshua Fairfield Jan 2024

Crypto-Counterfeiting, Joshua Fairfield

Scholarly Articles

The current crypto winter has given rise to a range of legal challenges. One of the most important sets of legal challenges goes to the heart of cryptocurrency. Cryptocurrency was intended to be non-duplicatable at will, that is, not to be counterfeitable. Blockchain technology is supposed to prevent token counterfeiting through a combination of game theory and cryptography that prevents normal users from simply ordering the system to generate more tokens for their benefit.

The difficulty is that blockchain software is still software. People in charge can order and program the software to generate many more tokens for those individuals’ …


Criminal Trespass And Computer Crime, Laurent Sacharoff Jan 2020

Criminal Trespass And Computer Crime, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

The Computer Fraud and Abuse Act (CFAA) criminalizes the simple act of trespass upon a computer—intentional access without authorization. The law sweeps too broadly, but the courts and scholars seeking to fix it look in the wrong place. They uniformly focus on the term “without authorization” when instead they should focus on the statute’s mens rea. On a conceptual level, courts and scholars understand that the CFAA is a criminal law, of course, but fail to interpret it comprehensively as one.

This Article begins the first sustained treatment of the CFAA as a criminal law, with a full elaboration of …


A Code-Based Approach To Unauthorized Access Under The Computer Fraud Abuse Act, Patricia L. Bellia Jan 2016

A Code-Based Approach To Unauthorized Access Under The Computer Fraud Abuse Act, Patricia L. Bellia

Journal Articles

Thirty years ago, Congress passed the Computer Fraud and Abuse Act (CFAA) to combat the emerging problem of computer crime. The statute’s core prohibitions targeted one who “accesses” a computer “without authorization” or who “exceeds authorized access.” Over time, incremental statutory changes and large-scale technical changes have dramatically expanded the potential scope of the CFAA. The question of what constitutes unauthorized access has taken on far greater significance than it had thirty years ago, and courts remain deeply divided on this question. This Article explores the text, purpose, and history of the CFAA, as well as a range of normative …


Authority And Authors And Codes, Michael J. Madison Jan 2016

Authority And Authors And Codes, Michael J. Madison

Articles

Contests over the meaning and application of the federal Computer Fraud and Abuse Act (“CFAA”) expose long-standing, complex questions about the sources and impacts of the concept of authority in law and culture. Accessing a computer network “without authorization” and by “exceeding authorized access” is forbidden by the CFAA. Courts are divided in their interpretation of this language in the statute. This Article first proposes to address the issue with an insight from social science research. Neither criminal nor civil liability under the CFAA should attach unless the alleged violator has transgressed some border or boundary that is rendered visible …


Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw Jan 2013

Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw

Articles

Cybercrime is a growing problem in the United States and worldwide. Many questions remain unanswered as to the proper role and scope of criminal law in addressing socially-undesirable actions affecting and conducted through the use of computers and modern information technologies. This Article tackles perhaps the most exigent question in U.S. cybercrime law, the scope of activities that should be subject to criminal sanction under the Computer Fraud and Abuse Act (CFAA), the federal "anti-hacking" statute.

At the core of current CFAA debate is the question of whether private contracts, such as website "Terms of Use" or organizational "Acceptable Use …