“Cybercrime” was not formally defined in federal law until the cybercrime provisions in the Violence Against Women Act Reauthorization Act of 2022, which set forth a two-pronged definition. In that act, “cybercrime against individuals” is defined as “a criminal offense [. . .] that involves the use of a computer to harass, threaten, stalk, extort, coerce, cause fear to, or intimidate an individual.” The definition also includes nonconsensual pornography, commonly known as revenge porn, which is an offense to “without consent distribute intimate images of an adult, except that use of a computer need not be an element of such an offense” (136 Stat. 945).
Of course, cybercrime-related concepts were defined in federal law prior to 2022, just under different terminology. Wire fraud was likely the earliest instance of a crime being defined by the technical means of communications technology used in its perpetration. Several other computer-based crimes were added by the Computer Fraud and Abuse Act (CFAA) in 1984 and 1986, initially and famously sparked by reactions to the 1983 film WarGames (Berris, 2023; Kaplan, 2016).
A concise summary of key cybercrime offenses defined under federal law follows:
Attempt to commit these offenses and conspiracy to commit these offenses are both considered offenses under the CFAA. Generally, the act applies to offenses involving “protected computers,” defined as computers used by the U.S. federal government or financial institutions, used in part of a voting system for federal elections, or used in interstate or foreign commerce—the latter clause of which has commonly been interpreted by the courts as including “any computer connected to the internet” (Berris, 2023, p. 6).
In addition, some specific categories of offenses defined in federal law may be said to include a cyber or computer component to them. For instance, the chapter of federal statute defining fraud and related offenses includes several variants that have a distinct cyber component to them, including 18 U.S.C. § 1029 and § 1037 concerning access device fraud (i.e., automated teller machine cards) and multiple deceptive email messages, respectively.
As noted in Chapter 1, it is beyond the panel’s scope to discuss the adequacy or coverage of federal or state cybercrime law. But it is relevant and worth observing that key words in definitions are periodically the focus of legal challenges. For instance, it remains to be seen whether or how Congress will react to a recent challenge to the federal CFAA’s underlying “(un)authorized access” definition. In Van Buren v. United States (2021), the U.S. Supreme Court reversed the conviction of a police officer under the terms of the CFAA. The officer, who had credentialed access to license plate databases, ran a search on a particular license plate in return for money. A divided Supreme Court ruled that the strict letter of the CFAA—defining “exceeds authorized access” to mean “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter” (18 U.S.C. § 1030(e) (6))—does not cover purpose-based violations, the misuse of information to which a database user is otherwise permitted to access. That is, the officer may have violated departmental policy in running a search on a law enforcement database for non-law-enforcement purposes but not the federal CFAA—a result that may be consequential in other data-related suits.
Though exact nomenclature and detail varies greatly across the states, a 2022 canvass by the National Conference of State Legislatures (2022) found that all 50 states have some form of computer crime statute in their penal
or criminal codes—Colorado seemingly being unique among the states in explicitly labeling the base offense as “cybercrime” (having switched from “computer crime” in 2018; C.R.S.A. § 18-5.5-102 [West]). The core computer crime typically involves one or more basic elements from the federal CFAA, criminalizing unauthorized access and computer trespass as well as more direct hacking/computer tampering (see also Brinton et al., 2023). The National Conference of State Legislatures, (2022) summary observed that at least 26 states explicitly reference denial-of-service attacks in their statutes, 12 states explicitly reference ransomware/computer extortion, and 23 states explicitly address phishing or social engineering.
This page intentionally left blank.