Hacking democracy is apparently very easy for people hell-bent on perpetrating election fraud and winning a race for their candidate, and the key to overriding an actual vote and stealing a win is apparently a memory card with a few lines of computer code, according to the Emmy-nominated documentary Hacking Democracy. Show More Summary
The 1986 Computer Fraud and Abuse Act remains one of the most controversial federal tech-regulating laws on the books. The “anti-hacking” measure was meant to protect against a range of online crimes, but 30 years later there is still little consensus about what a computer crime is, and what the law actually covers. Show More Summary
MSNBC’s Joy Reid, who was swift to condemn Republican concerns of voter fraud, was equally as fast at accusing them of plotting to steal the election. Reid’s concern centered on a computer system called CrossCheck which was developed to find duplicate names on the voter rolls so they can be removed. Show More Summary
The son of a prominent Russian politician has been convicted in Seattle of 38 charges related to stolen credit card information, including 10 counts of wire fraud and nine counts of obtaining information from a protected computer, the US Justice Department announced on Thursday. More »
The son of a prominent Russian politician has been convicted in Seattle of 38 charges related to stolen credit card information, including 10 counts of wire fraud and nine counts of obtaining information from a protected computer, the Justice Department announced on Thursday. Read more...
by Jennifer Campbell Oh, there's the Russian hack button! David Carillet In last night's episode of CSI: Cyber: Seattle, a Russian computer hacker named Track 2 (Roman Seleznev) is finally convicted, two years after being arrested on his way to a luxury resort in the Maldives, an act Seleznev's politician father tried to frame as a kidnapping. Show More Summary
Promobot. (Photo: Promobot) For a viral-aspiring Youtube video, this one starts off pretty boring. Three people, two men and one woman, are gathered around a table, which holds a computer broadcasting the 2016 Río Opening Ceremonies....Show More Summary
Sorry to disappoint the conspiracy theorists, but when it comes to sinister suspicions about election fraud, the best test is a piece of computer programmers’ lingo that comes down to: Don’t look for evil plots to explain an anomaly when simple incompetence is probably the cause. Donald J. Trump, the...
Matthew Keys, a 29-year-old journalist, was sentenced to two years in prison this April after being convicted on three felony counts related to the Computer Fraud and Abuse Act (CFAA). Calling Keys a disgruntled ex-employee of the Tribune...Show More Summary
Last week’s Ninth Circuit case of Facebook v. Vachani is making many observers uneasy. Orin Kerr writes: For those of us worried about broad readings of the Computer Fraud and Abuse Act, the decision is quite troubling. Its reasoning appears to be very broad. Show More Summary
In the past few weeks, we've written about two troubling rulings in the 9th Circuit appeals court concerning the CFAA, the Computer Fraud and Abuse Act. That law, that was literally written in response to Ronald Reagan being freakedShow More Summary
Using the internet just got a bit riskier, thanks to the Ninth Circuit. In two recent rulings, separated by only one week, the Ninth Circuit has greatly expanded the reach of the Computer Fraud and Abuse Act, a federal anti-hacking law from 1989. Under the Ninth Circuit's new interpretation......
Another week, another CFAA (Computer Fraud & Abuse Act) ruling out of the 9th Circuit Appeals Court. This time it's the infamous Facebook v. Power.com case that's been going on since 2008. When we first came across the case, in early 2009, we insisted that it made no sense. Show More Summary
I’m not saying this is a good decision because it sounds a bit overreaching to say the least. Nonetheless: The U.S. Court of Appeals for the 9th Circuit has handed down a very important decision on the Computer Fraud and Abuse Act, Facebook v. Vachani, which I flagged just last week. For those of us […]
On July 5, a federal court in California issued an opinion that if you share your Netflix, HBO Go or any other streaming service password, it is a violation of the U.S. Computer Fraud and Abuse Act. This was based
A federal court has ruled that sharing your Netflix password – in fact, sharing any password, is a federal crime under the Computer Fraud and Abuse Act (CFAA). No, we’re not joking. According to a report from Fortune, the decision, by the U.S. Show More Summary
A Ninth Circuit Court of Appeals ruling has determined that sharing passwords counts as a violation of the Computer Fraud and Abuse Act.
James Vincent, writing for The Verge: A hacker has pleaded guilty for his role in the “Celebgate” breach of 2014. Edward Majerczyk faces up to five years in federal prison for violating the Computer Fraud and Abuse Act. Like fellow hacker...Show More Summary
Edward Majerczyk, a 28-year-old Chicago man who played a role in the phishing of celebrity iCloud accounts in 2014, has signed a plea agreement and agreed to plead guilty to a violation of the Computer Fraud and Abuse Act, accordingShow More Summary
The ACLU is suing to repeal parts of the Computer Fraud and Abuse Act (CFAA), a 1980s-vintage hacking law that makes it a felony to "exceed authorization" on a remote computer, and which companies and the US government have used to prosecute researchers who violated websites' terms of service. (more…)