Knowledge (XXG)

Protected computer

Source 📝

92:
non-exclusive basis if the conduct constituting the offense affected the Government's operation or the financial institution's operation of such computer. By changing § 1030(a)(5) from "federal interest computer" to "computer used in interstate commerce or communications," Congress may have inadvertently eliminated federal protection for those government and financial institution computers not used in interstate communications. For example, the integrity and availability of classified information contained in an intrastate local area network may not have been protected under the 1994 version of 18 U.S.C. § 1030(a)(5), although its confidentiality continued to be protected under 18 U.S.C. § 1030(a)(1). To remedy this situation in the 1996 Act, 18 U.S.C. § 1030(a)(5) was redrafted to cover any "protected computer," a new term defined in § 1030(e)(2) and used throughout the new statute--in § 1030(a)(5), as well as in §§ 1030(a)(2), (a)(4), and the new (a)(7). The definition of "protected computer" includes government computers, financial institution computers, and any computer "which is used in interstate or foreign commerce or communications."
96:
with numerous instances of international hacking, and with the growing possibility of increased global industrial espionage, it is important that the United States have jurisdiction over international computer crime cases. Arguably, the old definition of "federal interest computer" contained in 18 U.S.C. § 1030(e)(2) conferred such jurisdiction because the requirement that the computers used in committing the offense not all be located in the same state might be satisfied if one computer were located overseas. As a general rule, however, Congress's laws have been presumed to be domestic in scope only, absent a specific grant of extraterritorial jurisdiction. E.E.O.C. v. Arabian American Oil Co., 499 U.S. 244 (1991). To ensure clarity, the statute was amended to reference international communications explicitly.
88:
computers used in committing the offense, not all of which are located in the same State." This meant that a hacker who attacked other computers in the same state was not subject to federal jurisdiction, even when these actions may have severely affected interstate or foreign commerce. For example, individuals who attack telephone switches may disrupt interstate and foreign calls. The 1994 change remedied that defect.
50:(A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or 62:
The law prohibits unauthorized obtaining of "information from any protected computer if the conduct involved an interstate or foreign communication," and makes it a felony to intentionally transmit malware to a protected computer if more than $ 5000 in damage (such as to the integrity of data) were
95:
This broad definition addresses the original concerns regarding intrastate "phone phreakers" (i.e., hackers who penetrate telecommunications computers). It also specifically includes those computers used in "foreign" communications. With the continually expanding global information infrastructure,
87:
was broadened by replacing the term "federal interest computer" with the term "computer used in interstate commerce or communications." The latter term is broader because the old definition of "federal interest computer" in 18 U.S.C. § 1030(e)(2)(B) covered a computer "which is one of two or more
91:
However, the definition of federal interest computer actually covered more than simply interstate activity. More specifically, 18 U.S.C. § 1030(e)(2)(A) covered, generically, computers belonging to the United States Government or financial institutions, or those used by such entities on a
38:) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to the data stored on, "protected computers". The statute, as amended by the 58:
or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States.
261: 137: 39: 166: 127: 72: 266: 246: 190: 221: 147: 35: 116: 142: 271: 55: 31: 111: 42:
of 1996, defines "protected computers" (formerly known as "federal interest computers") as:
225: 194: 106: 255: 240: 17: 187: 218: 219:
Cybercrime.gov THE NATIONAL INFORMATION INFRASTRUCTURE PROTECTION ACT OF 1996
132: 122: 138:National Information Infrastructure Protection Act 40:National Information Infrastructure Protection Act 81:(of the National Information Infrastructure Act) 30:is a term used in Title 18, Section 1030 of the 8: 262:United States federal criminal legislation 209:18 U.S.C. § 1030(a)(5); 18 U.S.C. § 3559. 241:Cornell Law posting of US Code 18 § 1030 159: 7: 247:Computer Crime Policy & Programs 128:Immigration and Customs Enforcement 25: 83:, the reach of this subsection 178:18 U.S.C. § 1030(e)(2) (2006). 56:interstate or foreign commerce 1: 245:U. S. Department of Justice 148:United States Secret Service 36:Computer Fraud and Abuse Act 117:Defense Intelligence Agency 288: 85:(E. Subsection 1030(a)(5)) 267:Computer network security 143:United States v. Swartz 79:In the 1994 amendments 169:, 110 Stat. 3491-3494. 98: 60: 77: 73:US Justice Department 54:(B) which is used in 44: 167:Pub. L. No. 104-294 28:Protected computers 224:2007-11-04 at the 193:2008-10-15 at the 32:United States Code 18:Protected Computer 112:Computer trespass 16:(Redirected from 279: 228: 216: 210: 204: 198: 185: 179: 176: 170: 164: 21: 287: 286: 282: 281: 280: 278: 277: 276: 252: 251: 237: 232: 231: 226:Wayback Machine 217: 213: 205: 201: 195:Wayback Machine 186: 182: 177: 173: 165: 161: 156: 103: 69: 51: 47: 23: 22: 15: 12: 11: 5: 285: 283: 275: 274: 269: 264: 254: 253: 250: 249: 243: 236: 235:External links 233: 230: 229: 211: 199: 180: 171: 158: 157: 155: 152: 151: 150: 145: 140: 135: 130: 125: 120: 114: 109: 107:Computer crime 102: 99: 68: 65: 24: 14: 13: 10: 9: 6: 4: 3: 2: 284: 273: 270: 268: 265: 263: 260: 259: 257: 248: 244: 242: 239: 238: 234: 227: 223: 220: 215: 212: 208: 203: 200: 197:§ 1030(a)(2). 196: 192: 189: 184: 181: 175: 172: 168: 163: 160: 153: 149: 146: 144: 141: 139: 136: 134: 131: 129: 126: 124: 121: 118: 115: 113: 110: 108: 105: 104: 100: 97: 93: 89: 86: 82: 76: 74: 66: 64: 59: 57: 52: 48: 43: 41: 37: 33: 29: 19: 272:Computer law 214: 206: 202: 183: 174: 162: 94: 90: 84: 80: 78: 70: 61: 53: 49: 45: 27: 26: 63:to result. 46:a computer— 256:Categories 154:References 75:explains: 188:18 U.S.C. 222:Archived 191:Archived 133:Interpol 101:See also 34:, (the 119:(DIA) 67:Scope 71:The 207:See 123:FBI 258:: 20:)

Index

Protected Computer
United States Code
Computer Fraud and Abuse Act
National Information Infrastructure Protection Act
interstate or foreign commerce
US Justice Department
Computer crime
Computer trespass
Defense Intelligence Agency
FBI
Immigration and Customs Enforcement
Interpol
National Information Infrastructure Protection Act
United States v. Swartz
United States Secret Service
Pub. L. No. 104-294
18 U.S.C.
Archived
Wayback Machine
Cybercrime.gov THE NATIONAL INFORMATION INFRASTRUCTURE PROTECTION ACT OF 1996
Archived
Wayback Machine
Cornell Law posting of US Code 18 § 1030
Computer Crime Policy & Programs
Categories
United States federal criminal legislation
Computer network security
Computer law

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.