Obama administration seeks tougher penalties for cybercrime, but legal experts warn that current, imprecise proposals could be too widely applied.

Mathew J. Schwartz, Contributor

September 9, 2011

3 Min Read

The Obama administration on Wednesday appealed to the Senate Judiciary Committee to increase penalties for hacking, and to update current laws against organized crime for use against hackers.

The Obama Administration had first floated wide-ranging changes to the 1986 Computer Fraud and Abuse Act (CFAA) law in May, including a minimum three-year sentence for anyone who attacks critical infrastructure.

During the Senate hearing into updating CFAA, James A. Baker, associate deputy attorney general, reiterated that proposal. "In light of the grave risk posed by those who might compromise our critical infrastructure, even an unsuccessful attempt at damaging our nation's critical infrastructure merits actual imprisonment of a term not less than three years--not probation, intermittent confinement, community confinement, or home detention," he said.

But committee chairman Senator Patrick Leahy (D-Vt.) dismissed that request, saying he would not bring it before the committee, in part over wider concerns that changes to the hacking law might turn all computer-related crimes into federal offenses.

The committee, however, was much more receptive to the administration's proposal to make hacking subject to the Racketeering Influenced and Corrupt Organizations (RICO) Act, which targets organized crime. "RICO has been used for over 40 years to prosecute organized criminals ranging from mob bosses to Hells Angels to insider traders, and its legality has been consistently upheld by the courts," said Baker. "Just as it has proven to be an effective tool to prosecute the leaders of these organizations who may not have been directly involved in committing the underlying crimes and to dismantle whole organizations, so too can it be an effective tool to fight criminal organizations who use online means to commit their crimes."

The Obama administration is also calling for updating prison sentences for hacking to bring them in line with current sentencing guidelines. For example, Baker said, according to current guidelines, the maximum penalty (jail time) for fraud-related hacking is five years, compared to the 20-year maximum currently in place for committing mail or wire fraud. Likewise, if someone stole "a massive database of credit cards," he said, the maximum penalty would be five years, even though in a non-hacking context, federal sentencing guidelines would call for a longer period of incarceration.

Only two witnesses were called to the hearing: Baker, as well as Pablo A. Martinez, deputy special agent in charge of the criminal investigative division of the Secret Service, which investigates credit and debit card fraud, and often works with other agencies to investigate identity theft, computer fraud, and bank fraud.

But on Tuesday, in advance of the hearing, a letter signed by members of various non-governmental organizations and universities from across the political spectrum appealed to the committee to address a big-picture concern with CFAA: imprecise language.

"The CFAA imposes civil and criminal liability for accessing a protected computer 'without' or 'in excess of' authorization, but fails to define 'authorization.' This makes the definition of the precise activities that are punishable unavoidably vague," according to the letter. "As a result of this lack of clarity, several courts have used companies' network terms of use, which lay out contractual constraints on users' use of those networks, to also define what constitutes criminal behavior on those networks. The consequence is that private corporations can in effect establish what conduct violates federal criminal law when they draft such policies."

But in his testimony Wednesday, Baker said that the Obama administration would resist any attempts to restrict the CFAA's use of "exceeds authorized access" as a benchmark for determining when a crime had been committed, especially when malicious insiders were involved. "The plain meaning of the term 'exceeds authorized access,' as used in the CFAA, prohibits insiders from using their otherwise legitimate access to a computer system to engage in improper and often malicious activities," he said.

Security professionals often view compliance as a burden, but it doesn't have to be that way. In this report, we show the security team how to partner with the compliance pros. Download the report here. (Free registration required.)

About the Author(s)

Mathew J. Schwartz

Contributor

Mathew Schwartz served as the InformationWeek information security reporter from 2010 until mid-2014.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights