CFAA - The law behind authorized access

Penetration Testing Laws: CFAA and Computer Misuse Act

Why These Laws Matter

Two laws define the legal boundaries of computer security research in the English-speaking world more than any others: the Computer Fraud and Abuse Act (CFAA) in the United States and the Computer Misuse Act (CMA) in the United Kingdom. Similar laws exist in most countries, but these two set the precedents that influence legal interpretation globally.

Both laws were written before modern security research existed as a profession. The CFAA was enacted in 1986 - before the World Wide Web, before WiFi, before smartphones. The CMA was enacted in 1990. While both have been amended, their core concepts were designed for a different era of computing, and the fit with modern security research is sometimes awkward.

Understanding these laws is not optional for security researchers. Ignorance does not provide legal protection, and the penalties for violations are severe - felony charges, prison sentences, and civil liability.

graph TD
    subgraph "Computer Crime Law Overview"
        A[US - CFAA 1986] --> B[18 USC 1030]
        A --> C[Felony Charges Possible]
        A --> D[Up to 10+ Years Prison]
        A --> E[Civil Liability]
        F[UK - CMA 1990] --> G[Section 1 - Unauthorized Access]
        F --> H[Section 2 - Intent for Further Offense]
        F --> I[Section 3 - Unauthorized Modification]
        F --> J[Up to 10 Years Prison]
        B --> K[Without Authorization]
        B --> L[Exceeding Authorized Access]
        K --> M[Vaguely Defined]
        L --> M
    end

Key computer crime laws and their penalty structures

The CFAA - Computer Fraud and Abuse Act (US)

The Computer Fraud and Abuse Act (18 U.S.C. 1030) is the primary federal computer crime statute in the United States. Originally passed in 1984 as the Counterfeit Access Device and Computer Fraud and Abuse Act and significantly amended in 1986, it criminalizes various forms of unauthorized computer access.

The CFAA was initially focused on protecting government computers and financial systems. Over time, amendments expanded its scope to cover essentially any computer connected to the internet (a "protected computer" under the statute). Since almost every modern device is connected to the internet, the CFAA now applies to almost every computer, server, phone, IoT device, and network-connected system.

The law creates both criminal and civil liability. The Department of Justice can bring criminal charges, and victims of CFAA violations can file civil lawsuits for damages. This dual track means that even if prosecutors decline to bring criminal charges, a company can still sue a researcher civilly under the CFAA.

Key CFAA Provisions

The CFAA contains several subsections, each covering different types of computer-related offenses:

Section 1030(a)(1): Accessing a computer to obtain national defense information. Espionage-level offense.

Section 1030(a)(2): Accessing a computer to obtain information. This is the section most commonly applied to security researchers. It covers "intentionally accessing a computer without authorization or exceeding authorized access" to obtain information from any protected computer. Penalties: up to 5 years for first offense, 10 years for subsequent offenses.

Section 1030(a)(3): Accessing a government computer without authorization. Applies to federal systems specifically.

Section 1030(a)(4): Accessing a computer with intent to defraud. Requires proving fraudulent intent.

Section 1030(a)(5): Damaging a computer through knowing transmission of code, programs, or commands. This covers malware distribution, denial-of-service attacks, and any action that intentionally damages or impairs a computer system. Penalties: up to 10 years for first offense, 20 years for subsequent offenses.

Section 1030(a)(6): Trafficking in computer passwords. Covers selling or distributing credentials.

Section 1030(a)(7): Threatening to damage a computer or access data for extortion. Covers ransomware and similar threats.

The Authorization Problem

The central legal problem with the CFAA is the phrase "without authorization." The statute does not define what "authorization" means, and courts have interpreted it inconsistently for decades.

Two main interpretations have competed in federal courts:

Narrow interpretation (code-based): "Without authorization" means circumventing a technical access barrier - a password, an authentication system, a firewall. If you access publicly available data through a public-facing interface, you have not accessed it "without authorization" because no technical barrier was circumvented.

Broad interpretation (terms-based): "Without authorization" includes violating a website's terms of service, a computer use policy, or any other restriction placed on access by the system owner. Under this interpretation, violating a website's terms of service could be a federal crime.

The 2021 Supreme Court decision in Van Buren v. United States narrowed the interpretation significantly. The Court ruled that "exceeding authorized access" under the CFAA means accessing areas of a computer system that a person is not authorized to access - not simply using authorized access for an unauthorized purpose. This ruling reduced the scope of the CFAA but did not resolve all ambiguity around the "without authorization" standard.

graph TD
    subgraph "CFAA Authorization Interpretations"
        A[Without Authorization] --> B[Narrow - Code Based]
        A --> C[Broad - Terms Based]
        B --> D[Must Bypass Technical Barrier]
        B --> E[Public Data Access Not a Violation]
        C --> F[TOS Violation Could Be Crime]
        C --> G[Policy Violation Could Be Crime]
        H[Van Buren 2021] --> I[Narrowed Exceeding Authorized Access]
        I --> J[Cannot Criminalize Misuse of Legitimate Access]
        H --> K[Did Not Fully Resolve Without Authorization]
    end

The competing interpretations of authorization under the CFAA

Notable CFAA Cases

Several cases illustrate how the CFAA has been applied - and misapplied - to security researchers and technologists:

Aaron Swartz (2011): The co-founder of Reddit was charged with 13 felony counts under the CFAA for downloading academic articles from JSTOR through MIT's network. Swartz had authorized access to JSTOR through MIT's open campus network. The government argued he exceeded that access by downloading articles in bulk. Facing up to 35 years in prison and $1 million in fines, Swartz died by suicide in 2013. The case is widely cited as an example of prosecutorial overreach under the CFAA.

Andrew "weev" Auernheimer (2010): Auernheimer discovered that AT&T's website exposed iPad owners' email addresses through a predictable URL pattern. He collected approximately 114,000 email addresses by iterating through the URLs and provided them to a journalist. He was convicted under the CFAA and sentenced to 41 months in prison. The conviction was later overturned on jurisdictional grounds (the Third Circuit found the case was filed in the wrong district), but the underlying CFAA question was never definitively resolved.

Marcus Hutchins (2017): The security researcher who stopped the WannaCry ransomware attack was later arrested at DEF CON on charges related to banking malware he allegedly created years earlier. While not a typical "security researcher prosecuted for research" case, it highlighted the legal risks security professionals face under computer crime statutes.

Voatz Case (2020): A student researcher at MIT identified vulnerabilities in the Voatz mobile voting app. Voatz reported the researcher to the FBI rather than acknowledging the vulnerabilities. The case generated significant backlash against Voatz and highlighted the risks of security research even when conducted with good intentions.

The Computer Misuse Act (UK)

The Computer Misuse Act 1990 is the United Kingdom's primary computer crime statute. It was prompted by the case of R v. Gold and Schifreen (1988), where two hackers who accessed British Telecom's Prestel system (and left a message on Prince Philip's mailbox) could not be convicted under existing law.

The CMA has three main sections relevant to security researchers:

Section 1 - Unauthorized Access: Knowingly causing a computer to perform any function with intent to secure unauthorized access to any program or data. Maximum penalty: 2 years imprisonment. This is the basic "hacking" offense - accessing a computer system without permission.

Section 2 - Unauthorized Access with Intent: Committing a Section 1 offense with intent to commit or facilitate the commission of a further offense. Maximum penalty: 5 years imprisonment. This applies when unauthorized access is a means to commit another crime (fraud, theft, etc.).

Section 3 - Unauthorized Modification: Knowingly causing unauthorized modification of computer material. Maximum penalty: 10 years imprisonment. This covers actions like deploying malware, deleting data, encrypting files (ransomware), or altering system configurations without authorization.

Section 3A (added 2006): Making, supplying, or obtaining articles for use in offenses under Sections 1-3. This section criminalized the creation and distribution of "hacking tools" and raised concerns about its impact on legitimate security research tools. In practice, prosecution under 3A has been rare and focused on clearly malicious tools rather than dual-use security software.

Professional penetration testers navigate these laws through careful documentation and explicit authorization:

Written scope agreements: Every engagement begins with a written document specifying exactly what is authorized. Scope includes specific systems, networks, IP addresses, physical locations, and time windows. Anything not explicitly in scope is off-limits.

Rules of engagement: A detailed document specifying what techniques are permitted. Can you attempt social engineering? Physical access? Denial of service? Each technique must be explicitly authorized or excluded.

The authorization letter: Often called a "get out of jail free" letter, this is a signed statement from the client confirming that the pentester is authorized to perform the specified activities during the specified time period. Testers carry this document during physical engagements.

Specific IP ranges and dates: Scope agreements specify exact IP ranges, domain names, and building addresses that are in scope. They also specify exact dates and times when testing is authorized. Testing outside these parameters is unauthorized regardless of the client relationship.

Incident response procedures: Scope agreements include procedures for handling situations where testing causes unexpected impact - system crashes, data exposure, or triggering security alerts.

Safe Harbor Provisions

Some limited safe harbor protections exist for security researchers:

Bug bounty programs: Companies that operate bug bounty programs (through platforms like HackerOne and Bugcrowd) provide explicit authorization for researchers to test specific systems within defined rules. These programs serve as authorization under both the CFAA and CMA.

DMCA exemptions: The US Copyright Office has granted exemptions under the Digital Millennium Copyright Act for good-faith security research on certain types of devices. These exemptions are periodically reviewed and renewed.

DOJ policy updates: In 2022, the US Department of Justice updated its CFAA charging policy to state that good-faith security research should not be charged under the CFAA. However, this is a prosecutorial guideline, not a legal safe harbor - it does not prevent private civil suits or guarantee that local prosecutors will follow the guideline.

These provisions help, but they are incomplete. No jurisdiction has enacted comprehensive safe harbor legislation that fully protects good-faith security research.

The Chilling Effect on Research

The combination of vague laws, severe penalties, and inconsistent enforcement creates a chilling effect on legitimate security research. Researchers face a calculation: the benefit of discovering and reporting a vulnerability versus the risk of criminal prosecution or civil liability.

This chilling effect has real consequences. Vulnerabilities go unreported because researchers fear legal retaliation. Companies threaten researchers with CFAA charges to suppress vulnerability disclosures. The security community's collective knowledge suffers because some research is never conducted or never published.

The situation is improving slowly. Bug bounty programs, DOJ policy updates, and growing judicial skepticism of expansive CFAA interpretations are positive trends. But the fundamental tension between computer crime law and security research remains unresolved.

Conclusion

The CFAA and Computer Misuse Act define the legal boundaries for security research. Both laws criminalize unauthorized computer access, with penalties severe enough that understanding them is essential for anyone using security tools professionally.

The practical defense is authorization: written scope agreements, explicit permissions, and careful documentation. Whether you use the BLEShark Nano, Wireshark, Nmap, or any other security tool, the legal framework is the same. The tool does not determine legality - authorization does.

Get the BLEShark Nano - $36.99+
Back to blog

Leave a comment