9/29 - illegal hacking

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/45

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

46 Terms

1
New cards

What inspired early U.S. anti-hacking laws?

The 1983 Congressional hearing, influenced by the movie WarGames, highlighted risks of unauthorized access and intention behind hacking, prompting lawmakers to craft legislation like the CFAA.

2
New cards

What does the CFAA (Computer Fraud and Abuse Act) prohibit?

Knowingly accessing a computer without authorization or exceeding authorized access. Key disputes arise over what counts as “authorization” or “access.”

3
New cards

How is “exceeds authorized access” defined under the CFAA?

Accessing a computer with authorization but using that access to obtain or alter information one is not entitled to access or modify.

4
New cards

What was the significance of US v. Morris (1991) regarding unauthorized access?

Morris exploited holes in mail and directory programs, bypassing intended functions to access other computers. The court ruled this was unauthorized access even though he had initial permission to use the programs.

5
New cards

What was the MySpace case (Drew) about?

A mother pretended to be a 16-year-old boy, posted a photo of a juvenile without consent, and communicated with another minor. Violating MySpace’s MSTOS was the basis for unauthorized access claims.

6
New cards

Why is relying on terms-of-service violations problematic in criminal cases?

Criminalizing any TOS violation would make statutes overbroad, potentially turning minor breaches into felony offenses.

7
New cards

What does “access” a computer mean legally under broad statutory definitions?

To approach, instruct, communicate with, store data in, retrieve data from, or otherwise make use of any computer resources.

8
New cards

How did State v. Riley (1993) interpret “access”?

Entering random 6-digit codes via a phone switch constituted “access” because Riley made use of the computer’s resources, even if he was unsuccessful in obtaining information.

9
New cards

What did State v. Allen (1996) determine about access?

Only once passwords are entered beyond the initial banner can a person be considered to have accessed a computer; mere approach does not count.

10
New cards

What did Moulton v. VC3 (2000) establish?

Running port scans without compromising public data does not constitute access to a network.

11
New cards

How does AOL v. National Health Care Discount (2000) define access?

Sending emails that traverse multiple computers counts as accessing all intermediate systems under CFAA.

12
New cards

What is the “intended function” test for authorization?

Access is authorized if used for the system’s intended function. US v. Morris (1991) exemplifies that using access in unintended ways counts as unauthorized.

13
New cards

What is the Agency Theory of Authorization?

Authorization ends when an employee or agent acts on behalf of another party against the system owner’s interests, as in Shurgard Storage Centers v. Safeguard Self Storage (2000).

14
New cards

What does State v. Olson (1987) say about unauthorized access?

Violating internal use policies does not necessarily make access unauthorized if the person had general permission to access the system.

15
New cards
16
New cards

What was EF Cultural Travel BV v. Explorica Inc. (2001) about?

Automated “scraper” programs sending massive queries to a website exceeded authorized use, constituting abuse under CFAA.

17
New cards
18
New cards

What did AOL v. LCGM Inc (1998) establish about TOS?

Violating AOL’s prohibition on harvesting emails via robots counted as unauthorized access.

19
New cards
20
New cards

What did Register.com v. Verio (2000) establish about web scraping?

Using search robots against a site that objects to such automated queries constitutes unauthorized access.

21
New cards
22
New cards

What did U.S. v. Rodriguez (2010) clarify about business use?

Accessing databases for nonbusiness purposes exceeds authorization under CFAA, as personal motives fall outside granted access.

23
New cards
24
New cards

What is the key holding in U.S. v. Nosal (2012) regarding CFAA scope?

“Exceeds authorized access” is limited to restrictions on information access, not general misappropriation or violating company policies; CFAA is focused on hacking, not trade secrets.

25
New cards
26
New cards

What are arguments in favor of “hacking back” measures?

Faster response than government, leverages private-sector expertise, allows immediate mitigation of attacks.

27
New cards
28
New cards

What are arguments against “hacking back” measures?

Potential violation of foreign laws and CFAA, attribution challenges, risk of escalating conflicts, and chaos in cyber operations.

29
New cards
30
New cards

What does the ACDC Act propose?

Excludes prosecution under CFAA for victims taking active cyber defense measures, such as accessing an attacker’s system to gather evidence or disrupt continued unauthorized activity, with limits on destructive or harmful actions.

31
New cards
32
New cards

What was the Assange/Manning incident?

Alleged assistance in cracking a DoD password on SIPRNet to obtain administrative privileges and conceal evidence of leaks; unclear if password was ever cracked.

33
New cards
34
New cards

What does Van Buren v. United States (2021) clarify about CFAA?

“Access without authorization” or “exceeds authorized access” involves bypassing a gate that is off-limits, focusing on restricted areas (files, folders, databases) rather than contract or policy limits.

35
New cards
36
New cards

What do the 2022 Sentencing Guidelines say about vulnerability testing?

Prosecutors are advised to avoid cases when computers are accessed to test or fix vulnerabilities in ways that avoid harm, though civil suits and state law prosecution remain possible.

37
New cards
38
New cards

What was the Paige Thompson case about?

Downloaded personal information from 100M+ Capital One customers by exploiting AWS vulnerabilities; prosecution debated whether her actions were criminal or resembled legitimate security research.

39
New cards
40
New cards

What is the “cyber kill chain” in cyber attacks?

Sequence of steps for attackers: Delivery (deploy code), Exploitation (run code), Installation (persist), Command & Control (control remotely), Action on Objective (steal data or cause damage).

41
New cards
42
New cards

What is a chokepoint in cyber defense?

A step in the attack chain where defenders can place barriers that are hard for attackers to bypass, focusing on stages with high enforcement feasibility and low attacker adaptability.

43
New cards
44
New cards

What is war driving?

Driving around to detect vulnerable wireless networks.

45
New cards
46
New cards

What was the North Korea Sony breach (2014) about?

Retaliatory cyberattack by North Korea over the movie The Interview, illustrating nation-state motivations in hacking.