Blog Layout

News: Supreme Court Limits Scope of Controversial Hacking Law

The United States Supreme Court has ruled that a police officer who received money for obtaining data from a law-enforcement database for an associate did not violate a controversial federal hacking law, marking a victory for the ethical hacking community by limiting the law’s scope.


In a landmark ruling in Van Buren v. United States, the court ruled that former Georgia police sergeant Nathan Van Buren did not violate the Computer Fraud and Abuse Act of 1986 (CFAA) when he accessed a police database to retrieve information about a license plate in exchange for $6,000 in cash.

Judges ruled in a 6-3 decision–which now limits the scope of the CFAA–that because Van Buren used his own credentials to access the information, he did not violate the law, “which subjects to criminal liability anyone who ‘intentionally accesses a computer without authorization or exceeds authorized access,'” according to the ruling.


The court pointed to a number of structural issues with the law which go against the federal case for contending that Van Buren violated the CFAA. One of the keys to the decision is the phrase “exceeds authorized access,” which would suggest Van Buren overstepped his authority as a police officer in accessing the database that held the information that was exchanged, according to the ruling.


“The relevant question, however, is not whether Van Buren exceeded his authorized access but whether he exceeded his authorized access as the CFAA defines that phrase,” according to the ruling. “For reasons given elsewhere, he did not.”


Case History

The case stems from an occurrence in which the FBI caught Van Buren using the computer in his patrol car to access the Georgia Crime Information Center (GCIC) database to obtain license-plate information in exchange for a cash payment from a person known to have ties to criminal activity.


Though he used his own valid credentials to access the database, Van Buren’s reason for using the computer was not consistent with performing his duties as a police officer, and he was brought up on federal criminal charges.


The U.S. District Court for the Northern District of Georgia convicted him on two charges– violating his department’s policy by obtaining database information for a personal purpose and violating the CFAA by using a computer network for purposes other than his police-officer duties. Van Buren was sentenced to 18 months in prison.


The officer appealed the conviction to the U.S. Court of Appeals for the Eleventh Circuit, where it was upheld. Eventually, it reached the Supreme Court and its aforementioned ruling in favor of Van Buren. The Supreme Court did uphold the previous judgment that Van Buren’s actions violated his department’s policy, however.


Ramifications and Dissent

The case is an important one especially for the ethical hacking community, for whom the CFAA has been historically troubling due to some of its wording, which could be interpreted in an over-reaching way to convict them of violating the law, security experts have said.


The Electronic Frontier Foundation (EFF) went a step further and declared the ruling “a victory for all internet users,” saying that it should now prevent misuse of the CFAA to “prosecute beneficial and important online activity,” according to a blog post published Thursday.


“It affirmed that online services cannot use the CFAA’s criminal provisions to enforce limitations on how or why you use their service, including for purposes such as collecting evidence of discrimination or identifying security vulnerabilities,” according to the post, written by EFF Senior Staff Attorney Aaron Mackey and Deputy Executive Director and General Counsel Kurt Opsahl. “It also rejected the use of troubling physical-world analogies and legal theories to interpret the law, which in the past have resulted in some of its most dangerous abuses.”


The three judges who disagreed with the ruling–Chief Justice Clarence Thomas and Justices Samuel Alito and John Roberts—believed that Van Buren breached the CFAA because he was forbidden to obtain the license-plate information for anything other than law-enforcement purposes.


“A person is entitled to do something only if he has a ‘right’ to do it,” according to the dissenting opinion, penned by Justice Roberts. “Van Buren never had ‘a right’ to use the computer to obtain the specific license-plate information. Everyone agrees that he obtained it for personal gain, not for a valid law-enforcement purpose.”

By info 04 Jan, 2024
Section four of the "Executive Order on Improving the Nation’s Cybersecurity" introduced a lot of people in tech to the concept of a “Software Supply Chain” and securing it. If you make software and ever hope to sell it to one or more federal agencies, you have to pay attention to this. Even if you never plan to sell to a government, understanding your Software Supply Chain and
By info 02 Jan, 2024
Google has agreed to settle a lawsuit filed in June 2020 that alleged that the company misled users by tracking their surfing activity who thought that their internet use remained private when using the “incognito” or “private” mode on web browsers. The class-action lawsuit sought at least $5 billion in damages. The settlement terms were not disclosed. The plaintiffs had
By info 30 Dec, 2023
Cybersecurity researchers are warning about an increase in phishing attacks that are capable of draining cryptocurrency wallets. "These threats are unique in their approach, targeting a wide range of blockchain networks, from Ethereum and Binance Smart Chain to Polygon, Avalanche, and almost 20 other networks by using a crypto wallet-draining technique," Check Point researchers Oded Vanunu,
By fleming_danyetta 25 Jul, 2022
This is a question anyone can ask and should be asking on behalf of themselves and within your organizations. However, we often view cybersecurity through the lens of feeling vulnerable. In this post we explore a few ways to start to empower yourself and organization to tackle cybersecurity.
By fleming_danyetta 25 Jul, 2022
The Insider threat in cybersecurity is a tricky subject. We often don't want to approach it because, as the name says, this is someone we have given our trust to that frankly can't be trusted. However, this week we talk about cybersecurity from this angle. The internet village we all share requires us to share and trust in ways we never expected.
24 Jul, 2022
Leadership: A female perspective Danyetta Fleming Magana and Javeria Ayaz Malik reflect upon the role of women in crisis leadership
By fleming_danyetta 18 Apr, 2022
I had planned to share a wonderfully done newsletter article but opted to share from the heart. I've been truly blessed and honored to be in the security community for over 20 years and have many colleagues and friends who help secure our physical and virtual world. While I admit I love the work from home and the ability to order groceries online, I wouldn't say I like watching children bullied, the elderly targeted and pensions stolen, charities losing donations, and companies going out of business due to the insecurity of our global internet village. It was out of this place that I realized that we needed to reignite a fundamental truth that "We Are One" always connected.
By fleming_danyetta 25 Oct, 2021
Humanitarian Cyber Career chat and social media do’s and dont’s for high school and college students - please circulate this flier with your teachers and students so they register! As a part of registration they can enter up to 3 questions they’d like answered at the event. Speakers include Patricia Zebertavage (FBI), Keith Moulsdale (cyber attorney), Veda Woods (leveraging cyber to combat child trafficking), Sean Anthony Guillory, Ph.D. (Cyber automation SME), and more!
By fleming_danyetta 01 Jul, 2021
How long will I be down from a ransomware attack?
More Posts
Share by: