COMPUTER FRAUD AND ABUSE ACT OF 1986
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP87B00858R000400480020-8
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
22
Document Creation Date:
December 22, 2016
Document Release Date:
March 15, 2011
Sequence Number:
20
Case Number:
Publication Date:
September 3, 1986
Content Type:
OPEN SOURCE
File:
Attachment | Size |
---|---|
![]() | 1.42 MB |
Body:
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
99TH CONGRESS
2d Session
Calendar No. 883
( REPORT
jl 99-432
COMPUTER FRAUD AND ABUSE ACT OF 1986
Filed under authority of the order of the Senate of August 16 (legislative day,
August 11), 1986
Mr. THURMOND, from the Committee on the Judiciary,
submitted the following
REPORT
together with
ADDITIONAL VIEWS
[To accompany S. 2281, as amended]
The Committee on the Judiciary, to which was referred the bill
(S. 2281) to amend title 18, United States Code, to provide addition-
al penalties for fraud and related activities in connection with
access devices and computers, and for other purposes, having con-
sidered the same, reports favorably thereon with amendments and
recommends that the bill, as amended, do pass.
Page
1. General statement and history of the legislation ........................................... 2
II. Discussion of committee action and amendments ........................................... 4
III. Section-by-section analysis ................................................................................... 5
IV. Agency views .......................................................................................................... 14
V. Congressional Budget Office statement ............................................................ 15
VI. Regulatory impact statement .............................................................................. 15
VII. Changes in existing law ....................................................................................... 16
VIII. Additional views of Messrs. Mathias and Leahy ............................................. 20
I. GENERAL STATEMENT AND HISTORY OF THE LEGISLATION
During the past several years, the Congress has been investigat-
ing the problems of computer fraud and abuse to determine wheth-
63-281 O
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
er Federal criminal laws should be revised to cope more effectively
with such acts. The Judiciary Committee's concern about these
problems has become more pronounced as computers proliferate in
businesses and homes across the nation and as evidence mounts
that existing criminal laws are insufficient to address the problem
of computer crime.
For some time, the United States has been in the midst of a tech-
nological explosion. The Federal Government alone operates more
than 18,000 medium-scale and large-scale computers at some 4,500
different sites, and the Office of Technology Assessment estimates
the Government's investment in computers over the past four
years at roughly $60 billion. The General Services Administration
estimates that there will be 250,000 to 500,000 computers in use by
the Federal Government by 1990.
Computer use has also become much more widespread among the
nation's private sector. In 1978, there were an estimated 5,000
desk-top computers in this country; today there are nearly 5 mil-
lion. Financial institutions, in particular, rely heavily on computer
communications; for instance, the Bureau of Justice Statistics re-
ported that in 1983, corporate transfers of funds via computer to-
taled more than $100 trillion.' In addition, more than 100,000 per-
sonal computers have been installed in the country's schools, and
computers are found in millions of American homes.
This technological explosion has made the computer a mainstay
of our communications system, and it has brought a great many
benefits to the government, to American businesses, and to all of
our lives. But it has also created a new type of criminal-one who
uses computers to steal, to defraud, and to abuse the property of
others. The proliferation of computers and computer data has
spread before the nation's criminals a vast array of property that,
in many cases, is wholly unprotected against crime.
In June 1984, the American Bar Association Task Force on Com-
puter Crime, chaired by Joseph Tompkins, Jr., issued its Report on
Computer Crime (hereinafter referred to as the "ABA Report"), a
study based upon a survey of approximately 1,000 private organiza-
tions and public agencies.2 The ABA Report found that more than
50 percent of the 283 respondents had been victimized by some
form of computer crime,3 and that more than 25 percent of the re-
spondents had sustained financial losses totaling between an esti-
mated $145 million and $730 million during one twelve-month
period.4 The ABA Report also concluded that computer crime is
among the worst white-collar offenses.5 The Committee agrees but
notes particularly that computer crimes pose a threat that is not
solely financial in nature.
In 1983, for example, a group of adolescents known as the "414
Gang" broke into the computer system at Memorial Sloan-Ketter-
ing Cancer Center in New York. In so doing, they gained access to
' Bureau of Justice Statistics, Report on Electronic Funds Transfer Fraud, March 1985, NCJ-
96666.
2 Report on Computer Crime; Task Force on Computer Crime, Section of Criminal Justice,
American Bar Association; June 1984)
Ibid., pp. 16-18, Table 12.
. Ibid., p. 38.
S Ibid., pp. 36-40.
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
the radiation treatment records of 6,000 past and present cancer
patients and had at their fingertips the ability to alter the radi-
ation treatment levels that each patient received. No financial
losses were at stake in this case, but the potentially life-threaten-
ing nature of such mischief is a source of serious concern to the
Committee.
Similarly, so-called "pirate bulletin boards" have sprung up
around the country for the sole purpose of exchanging passwords to
other people's computer systems. The Richmond (Va.) Times-Dis-
patch recently reported that three such bulletin boards operating
in Virginia carry information on how to break into the computers
of the U.S. Defense Department and the Republican National Com-
mittee. While financial losses resulting from such pirate bulletin
boards may not be imminent, the Committee believes that know-
ingly trafficking in other people's computer passwords should be
proscribed.
It is clear that much computer crime can be prevented by those
who are potential targets of such conduct. The ABA Report indicat-
ed that while the respondents to the survey overwhelmingly sup-
ported a Federal computer crime statute,6 they also believed that
the most effective means of preventing and deterring computer
crime is "more comprehensive and effective self-protection by pri-
vate business" 7 and that the primary responsibility for controlling
the incidence of computer crime falls upon private industry and in-
dividual users, rather than on the Federal, State, or local govern-
ments." The Committee strongly agrees with these views.
The Committee also finds that education programs for both com-
puter users and the general public should be undertaken to make
young people and others aware of the ethical and legal questions at
stake in the use of computers and to deflate the myth that comput-
er crimes are glamorous, harmless pranks. The respondents to the
ABA survey indicated strong support for such programs,9 many of
which are underway throughout the nation. The Committee com-
mends those education and security improvement efforts and urges
their continuation.
At the same time, the Committee finds that Federal criminal
penalties for computer crime are an appropriate punishment for
certain acts and can serve to deter would-be computer criminals
and to reinforce education and security improvement programs.
To that end, both the Senate and House have devoted consider-
able attention to determining how the Federal Government can
best approach computer-related crimes. The first Federal computer
crime statute was enacted in 1984 as part of P.L. 98-473. This is
the present 18 U.S.C. 1030, which makes it a felony to access classi-
fied information in a computer without authorization and makes it
a misdemeanor to access financial records or credit histories in fi-
nancial institutions or to trespass into a Government computer.
Legislation was introduced in both the Senate and House early
in the 99th Congress to expand and to amend 18 U.S.C. 1030. On
6 Ibid., p. 44.
7 Ibid., p. 23, Table 17.
8 Ibid., p. 11, Table 8.
9 Ibid., p. 23, Table 17.
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
May 23, 1985, the House Subcommittee on Crime held a hearing on
H.R. 1001 (introduced by Representative William J. Hughes (D-
N.J.) and H.R. 930 (introduced by Representative Bill Nelson (D-
Fla.). Representative Bill McCollum, R-Fla., subsequently intro-
duced a computer crime bill, H.R. 3381, at the request of the De-
partment of Justice. The Senate Subcommittee on Criminal Law
held a hearing on October 30, 1985, on two computer crime bills: S.
440 (introduced by Senator Paul Trible (R-Va.) and S. 1678 (intro-
duced by Senator Strom Thurmond, (R-S.C., at the request of the
Department of Justice). S. 1678 is the Senate companion to H.R.
3381.
As a result of the testimony given at both the Senate and House
hearings, Senator Trible and Representative Hughes introduced
identical computer crime bills (S. 2281 and H.R. 4562) on April 10,
1986. The House Subcommittee on Crime considered H.R. 4562 on
April 23, and on April 30 the subcommittee forwarded a clean bill,
H.R. 4718, to the Committee on the Judiciary in lieu of H.R. 4562.
The Committee on the Judiciary ordered H.R. 4718, as amended,
reported on May 6 (see House Report 99-612), and on June 3 the
House passed the bill by voice vote. In the Senate, the Committee
on the Judiciary held a hearing on S. 2281 on April 16, 1986. The
Committee ordered the bill, as amended, reported to the Senate on
June 12, 1986.
Throughout its consideration of computer crime, the Committee
has been especially concerned about the appropriate scope of Fed-
eral jurisdiction in this area. It has been suggested that, because
some States lack comprehensive computer crime statutes of their
own, the Congress should enact as sweeping a Federal statute as
possible so that no computer crime is potentially uncovered. The
Committee rejects this approach and prefers instead to limit Feder-
al jurisdiction over computer crime to those cases in which there is
a compelling Federal interest, i.e., where computers of the Federal
Government or certain financial institutions are involved, or where
the crime itself is interstate in nature. The Committee is convinced
that this approach strikes the appropriate balance between the
Federal Government's interest in computer crime and the interests
and abilities of the States to proscribe and punish such offenses.
S. 2281, as reported by the Committee, is a consensus bill aimed
at deterring and punishing certain "high-tech" crimes in a manner
consistent with the States' own criminal laws in this area.
II. DISCUSSION OF COMMITTEE ACTION AND AMENDMENTS
On June 12, 1986, the Committee on the Judiciary met and
unanimously ordered S. 2281 reported favorably to the full Senate.
Several minor amendments were also approved unanimously by
the Committee.
The first amendment was a technical change to page two, line
eight of the bill, made necessary because of the second Committee
amendment. That second amendment struck lines 9-24, relating to
unauthorized access of Government computers, on page two, and
inserted in their place the language that forms the new subsection
18 U.S.C. 1030(a)(3), as reported. That subsection is explained in
detail in the section-by-section analysis of this Report.
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
The third Committee amendment struck the new subsection (a)(5)
from S. 2281 as introduced, and replaced it with amended lan-
guage. In so doing the Committee added to (a)(5) the words "dam-
ages, or destroys" to make explicit the subsection's application to
acts-such as erasing data-that go beyond mere alteration of in-
formation. This amendment also changed "that computer" (as writ-
ten in the original S. 2281) to "any such Federal interest comput-
er". The Committee wanted to prevent the possibility that a de-
fense would be raised to the effect that the information that was
altered, damaged, or destroyed, was not in the very same computer
on to which the offender had signed. The use of "any such Federal
interest computer" makes clear that no such defense is possible.
This amendment also deleted "another" from the portion of S. 2281
relating to subsection (a)(5); the phrase "one or more others" was
inserted in its place. The Committee does not intend that every
victim of acts proscribed under (a)(5) must individually suffer a loss
of $1,000. Certain types of malicious mischief may cause smaller
amounts of damage to numerous individuals, and thereby collec-
tively create a loss of more than $1,000. By using "one or more
others", the Committee intends to make clear that losses caused by
the same act may be aggregated for purposes of meeting the $1,000
threshold. Finally, this amendment added to the coverage of the
new subsection (a)(5) acts that alter, damage, or destroy computer-
ized medical records, and thereby impair or threaten to impair an
individual's medical care. The Committee's rationale for this addi-
tion is explained more fully in the section-by-section analysis per-
taining to the new 18 U.S.C. 1030(a)(5).
The fourth Committee amendment changed "such use" to "the
use of the financial institution's operation or the Government's op-
eration of such computer". This change simply makes clear that a
computer that is not used exclusively by the United States Govern-
ment or by a financial institution, as that term is defined by pro-
posed 18 U.S.C. 1030(e)(4), is a Federal interest computer only to
the extent that its use by the Government or the financial institu-
tion is affected. This clarification also appears in the Committee's
amendment affecting proposed 18 U.S.C. 1030(a)(3).
The fifth Committee amendment was merely a technical change
made necessary because the sixth Committee amendment added
"department of the United States" to the list of terms defined in
the bill.
III. SECTION-BY-SECTION ANALYSIS
The following is a section-by-section analysis of S. 2281, as report-
ed by the Committee on the Judiciary.
Section 1 of the bill contains its short title, the "Computer Fraud
and Abuse Act of 1986".
Section 2(a)(1) amends 18 U.S.C. 1030(a)(2) to change the scienter
requirement from "knowingly" to "intentionally", for two reasons.
First, intentional acts of unauthorized access-rather than mistak-
en, inadvertent, or careless ones-are precisely what the Commit-
tee intends to proscribe. Second, the Committee is concerned that
the "knowingly" standard in the existing statute might be inappro-
priate for cases involving computer technology. The Senate's
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Report on the Criminal Code (Report No. 96-1396, pg. 33, citing
United States v. United States Gypsum Co., 438 U.S. 422, 425
(1978)), states that a person is "said to act knowingly if he is aware
`that the result is practically certain to follow from his conduct,
whatever his desire may be as to that result.'" (Footnote omitted.)
While appropriate to many criminal statutes, this standard might
not be sufficient to preclude liability on the part of those who inad-
vertently "stumble into" someone else's computer file or computer
data. This is particularly true in those cases where an individual is
authorized to sign onto and use a particular computer, but subse-
quently exceeds his authorized access by mistakenly entering an-
other computer file or data that happens to be accessible from the
same terminal. Because the user had "knowingly" signed onto that
terminal in the first place, the danger exists that he might incur
liability for his mistaken access to another file. This is so because,
while he may not have desired that result, i.e., the access of an-
other file, it is possible that a trier of fact will infer that the user
was "practically certain" such mistaken access could result from
his initial decision to access the computer. The substitution of an
"intentional" standard is designed to focus Federal criminal pros-
ecutions on those whose conduct evinces a clear intent to enter,
without proper authorization, computer files or data belonging to
another. Again, this will comport with the Senate Report on the
Criminal Code, which states that "'intentional' means more than
that one voluntarily engaged in conduct or caused a result. Such
conduct or the causing of the result must have been the person's
conscious objective." (Footnote omitted.)
Section 2(a)(2) deletes from the existing 18 U.S.C. 1030(a)(2) the
phrase "as such terms are defined in the Right to Financial Priva-
cy Act of 1978 (12 U.S.C. 3401 et seq.),". The terms to which that
phrase is applicable, "financial institution" and "financial record,"
are defined in section (2)(g) of S. 2281.
The premise of 18 U.S.C. 1030(a)(2) will remain the protection, for
privacy reasons, of computerized credit records and computerized
information relating to customers' relationships with financial in-
stitutions. This protection is imperative in light of the sensitive
and personal financial information contained in such computer
files. However, by referring to the Right to Financial Privacy Act,
the current statute limits its coverage to financial institution cus-
tomers who are individuals, or are partnerships with five or fewer
partners. The Committee intends S. 2281 to extend the same priva-
cy protections to the financial records of all customers-individual,
partnership, or corporate-of financial institutions.
The Department of Justice has expressed concerns that the term
"obtains information" in 18 U.S.C. 1030(a)(2) makes that subsection
more than an unauthorized access offense, i.e., that it might re-
quire the prosecution to prove asportation of the data in ques-
tion.10 Because the premise of this subsection is privacy protection,
the Committee wishes to make clear that "obtaining information"
in this context includes mere observation of the data. Actual aspor-
tation, in the sense of physically removing the data from its origi-
10 Statement of Victoria Toensing, Deputy Assistant Attorney General, Criminal Division;
before the Senate Judiciary Committee, April 16, 1986.
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
nal location or transcribing the data, need not be proved in order
to establish a violation of this subsection.
Section 2(b) of S. 2281 provides a substitute for the present 18
U.S.C. 1030(a)(3), and is designed to accomplish several goals.
First, it will change the scienter requirement from "knowingly"
to "intentionally". The same explanation offered for section 2(a)(1)
is applicable here.
Second, section 2(b) will clarify the present 18 U.S.C. 1030 (a)(3),
making clear that it applies to acts of simple trespass against com-
puters belonging to, or being used by or for, the Federal Govern-
ment. The Department of Justice and others have expressed con-
cerns about whether the present subsection covers acts of mere
trespass, i.e., unauthorized access, or whether it requires a further
showing that the information perused was "used, modified, de-
stroyed, or disclosed." 11 To alleviate those concerns, the Commit-
tee wants to make clear that the new subsection will be a simple
trespass offense, applicable to persons without authorized access to
Federal computers.
The Committee wishes to be very precise about who may be pros-
ecuted under the new subsection (a)(3). The Committee was con-
cerned that a Federal computer crime statute not be so broad as to
create a risk that government employees and others who are au-
thorized to use a Federal Government computer would face pros-
ecution for acts of computer access and use that, while technically
wrong, should not rise to the level of criminal conduct. At the same
time, the Committee was required to balance its concern for Feder-
al employees and other authorized users against the legitimate
need to protect Government computers against abuse by "outsid-
ers." The Committee struck that balance in the following manner.
In the first place, the Committee has declined to criminalize acts
in which the offending employee merely "exceeds authorized
access" to computers in his own department ("department" is de-
fined in section 2(g) of S. 2281). It is not difficult to envision an em-
ployee or other individual who, while authorized to use a particular
computer in one department, briefly exceeds his authorized access
and peruses data belonging to the department that he is not sup-
posed to look at. This is especially true where the department in
question lacks a clear method of delineating which individuals are
authorized to access certain of its data. The Committee believes
that administrative sanctions are more appropriate than criminal
punishment in such a case. The Committee wishes to avoid the
danger that every time an employee exceeds his authorized access
to his department's computers-no matter how slightly-he could
be prosecuted under this subsection. That danger will be prevented
by not including "exceeds authorized access" as part of this subsec-
tion's offense.
In the second place, the Committee has distinguished between
acts of unauthorized access that occur within a department and
those that involve trespasses into computers belonging to another
department. The former are not covered by subsection (a)(3); the
latter are. Again, it is not difficult to envision an individual who,
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
while authorized to use certain computers in one department, is
not authorized to use them all. The danger existed that S. 2281, as
originally introduced, might cover every employee who happens to
sit down, within his department, at a computer terminal which he
is not officially authorized to use. These acts can also be best han-
dled by administrative sanctions, rather than by criminal punish-
ment. To that end, the Committee has constructed its amended ver-
sion of (a)(3) to prevent prosecution of those who, while authorized
to use some computers in their department, use others for which
they lack the proper authorization. By precluding liability in
purely "insider" cases such as these, the Committee also seeks to
alleviate concerns raised by Senators Mathias and Leahy that the
existing statute casts a wide net over "whistleblowers,' who dis-
close information they have gleaned from a government computer.
Senators Mathias and Leahy first expressed their concerns in 1984
about the effect of the current statute on whistleblowers. Their
concerns were embodied in S. 610, a bill they introduced early in
the 99th Congress. (See, Statements by Senator Mathias and Sena-
tor Leahy, Congressional Record of March 7, 1985; pp. S 2728-2730.
See also their "Additional Views" in this report.)
The Committee has thus limited 18 U.S.C. 1030(a)(3) to cases
where the offender is completely outside the Government, and has
no authority to access a computer of any agency or department of
the United States, or where the offenders act of trespass is interde-
partmental in nature. The Committee does not intend to preclude
prosecution under this subsection if, for example, a Labor Depart-
ment employee authorized to use Labor's computers accesses with-
out authorization an FBI computer. An employee who uses his de-
partment's computer and, without authorization, forages into data
belonging to another department, is engaged in conduct directly
analagous to an "outsider" tampering with Government computers.
In both cases, the user is wholly lacking in authority to access or
use that department's computer. The Committee believes criminal
prosecution should be available in such cases.
The Committee acknowledges that in rare circumstances this
may leave serious cases of intradepartmental trespass free from
criminal prosecution under (a)(3). However, the Committee notes
that such serious acts may be subject to other criminal penalties if,
for example, they violate trade secrets laws or 18 U.S.C. 1030 (a)(1),
(a)(4), (a)(5), or (a)(6), as proposed in this legislation. The Committee
believes this to be the best means of balancing the legitimate need
to protect the Government's computers against the need to prevent
unwarranted prosecutions of Federal employees and others author-
ized to use Federal computers.
The third goal of Section 2(b) is to clarify subsection (a)(3) to
make clear that one trespassing in a computer used only part-time
by the Federal Government need not be shown to have affected the
operation of the government as a whole. The Department of Justice
has expressed concerns that the present subsection's language
could be construed to require a showing that the offender's conduct
harmed the overall operation of the Government and that this
would be an exceedingly difficult task for Federal prosecutors.12
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Accordingly, Section 2(b) will make clear that the offender's con-
duct need only affect the use of the Government's operation of the
computer in question.
Section 2(c) substitutes the phrase "exceeds authorized access"
for the more cumbersome phrase in present 18 U.S.C. 1030 (a)(1)
and (a)(2), "or having accessed a computer with authorization, uses
the opportunity such access provides for purposes to which such au-
thorization does not extend". The Committee intends this change to
simplify the language in 18 U.S.C. 1030(a) (1) and (2), and the
phrase "exceeds authorized access" is defined separately in Section
(2)(g) of the bill.
. Section (2)(d) adds three new offenses to 18 U.S.C. 1030. The new
subsection 1030(a)(4) to be created by this bill is designed to penal-
ize thefts of property via computer that occur as part of a scheme
to defraud. It will require a showing that the use of the computer
or computers in question was integral to the intended fraud and
was not merely incidental. It has been suggested that the Commit-
tee approach all computer fraud in a manner that directly tracks
the existing mail fraud and wire fraud statutes. However, the Com-
mittee was concerned that such an approach might permit prosecu-
tion under this subsection of acts that do not deserve classification
as "computer fraud."
The Committee was concerned that computer usage that is
wholly extraneous to an intended fraud might nevertheless be cov-
ered by this subsection if the subsection were patterned directly
after the current mail fraud and wire fraud laws. If it were so pat-
terned, the subsection might be construed as covering an individual
who had devised a scheme or artifice to defraud solely because he
used a computer to keep records or to add up his potential "take"
from the crime. The Committee does not believe that a scheme or
artifice to defraud should fall under the ambit of subsection (a)(4)
merely because the offender signed onto a computer at some point
near to the commission or execution of the fraud. While such a ten-
uous link might be covered under current law where the instru-
mentality used is the mails or the wires, the Committee does not
consider that link sufficient with respect to computers. To be pros-
ecuted under this subsection, the use of the computer must be
more directly linked to the intended fraud. That is, it must be used
by an offender without authorization or in excess of his authoriza-
tion to obtain property of another, which property furthers the in-
tended fraud. Likewise, this subsection may be triggered by con-
duct that can be shown to constitute an attempted offense.
This approach is designed, in part, to help distinguish between
acts of theft via computer and acts of computer trespass. In inten-
tionally trespassing into someone else's computer files, the offender
obtains at the very least information as to how to break into that
computer system. If that is all he obtains, the offense should prop-
erly be treated as a simple trespass. But because the offender has
obtained the small bit of information needed to get into the com-
puter system, the danger exists that his and every other computer
trespass could be treated as a theft, punishable as a felony under
this subsection. A similar problem arises from recommendations
made to the Committee that every act of unauthorized access to a
"Federal interest computer" be treated as theft of computer time,
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
punishable under this subsection as part of a scheme to defraud.
The Committee agrees that the mere use of a computer or comput-
er service has a value all its own. Mere trespasses onto someone
else's computer system can cost the system provider a "port" or
access channel that he might otherwise be making available for a
fee to an authorized user. At the same time, the Committee be-
lieves it is important to distinguish clearly between acts of fraud
under (a)(4), punishable as felonies, and acts of simple trespass,
punishable in the first instance as misdemeanors. That distinction
would be wiped out were the Committee to treat every trespass as
an attempt to defraud a service provider of computer time. One
simply cannot trespass into another's computer without occupying
a portion of the time that that computer service is available. Thus,
that suggested approach would treat every act of unauthorized
entry to a Federal interest computer-no matter how brief-as an
act of fraud, punishable at the felony level. The Committee does
not believe this is a proper approach to this problem. For that
reason, the Committee has excluded from coverage under this sub-
section those instances where "the object of the fraud and the
thing obtained consists only of the use of the computer."
However, the Committee agrees that lost computer time result-
ing from repeated or sustained trespasses can reach a level of seri-
ousness sufficient to warrant Federal prosecution. The Committee
believes such instances are more appropriately punished under the
provision of the new subsection (a)(5) relating to preventing author-
ized use of a computer. A more detailed explanation of the Commit-
tee's intent respecting lost computer time is contained in the analy-
sis for (a)(5).
The Committee remains convinced that there must be a clear dis-
tinction between computer theft, punishable as a felony, and com-
puter trespass, punishable in the first instance as a misdemeanor.
The element in the new paragraph (a)(4), requiring a showing of an
intent to defraud, is meant to preserve that distinction, as is the
requirement that the property wrongfully obtained via computer
furthers the intended fraud. The new felony created by this subsec-
tion limits its jurisdiction to "Federal interest computers." These
are defined in Section (2)(g) of the bill as computers used by the
Federal Government or by financial institutions, or as computers
located in different States.
The scienter requirement for this subsection, "knowingly and
with intent to defraud," is the same as the standard used for 18
U.S.C. 1029 relating to credit card fraud.
The new subsection 1030(a)(5) to be created by the bill is designed
to penalize those who intentionally alter, damage, or destroy cer-
tain computerized data belonging to another. The "intentional"
standard is the same as that employed in Section 2(a)(1) and 2(b)(1)
of the bill. Like the new subsection 18 U.S.C. 1030(a)(3), this subsec-
tion will be aimed at "outsiders," i.e., those lacking authorization
to access any Federal interest computer. It will penalize alteration,
damage, or destruction in two circumstances. The first is those
which cause a loss to the victim or victims totalling $1,000 or more
in any single year period. The Committee believes this threshold is
necessary to prevent the bringing of felony-level charges against
every individual who modifies another's computer data. Some
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
modifications or alterations, while constituting "damage" in a
sense, do not warrant felony-level punishment, particularly when
almost no effort or expense is required to restore the affected data
to its original condition. The $1,000 valuation has been reasonably
calculated by the Committee to preclude felony punishment in
those cases, while preserving the option of felony punishment in
cases involving more serious alteration, damage, or destruction. In
many instances where the requisite dollar amount cannot be
shown, misdemeanor-level penalties will remain available against
the offender under subsections 1030(a)(2) or 1030(a)(3).
The Department of Justice has suggested that the concept of
"loss" embodied in this subsection not be limited to the costs of
actual repairs. The Committee agrees and intends that other ex-
penses accruing to the victim-such as lost computer time and the
cost of reprogramming or restoring data to its original condition-
be permitted to count toward the $1,000 valuation. The Committee
wishes to leave no doubt that it intends lost computer time to be
covered by this subsection. Once again, the Committee recognizes
the inherent value of using computer time or of occupying a por-
tion of the time that a computer service is made available. Many
commercial services obtain revenue by charging authorized sub-
scribers for the amount of time they are using the service. An un-
authorized user can therefore impose substantial costs on the serv-
ice provider by tying up one channel of access-a channel that the
provider might otherwise be leasing at a profit to an authorized
subscriber. The Committee recognizes this danger, and intends sub-
section (a)(5) to cover cases where an offender, having obtained un-
authorized access to the computer, prevents authorized use of such
a computer by occupying an access channel or "port" that is in
demand by authorized subscribers. In the preceding discussion of
subsection (a)(4), the Committee made clear that acts of trespass
causing a loss of computer time should not be treated as acts of
fraud for purposes of that subsection. However, it is clear that lost
computer time can impose significant costs on providers of comput-
er services. Where those costs total more than $1,000 in any one-
year period, the Committee believes prosecution should be avail-
able under this subsection.
Likewise, the Committee intends that certain network communi-
cations costs be permitted to count toward the $1,000 valuation; a
summary of a recent incident best illustrates this area. Often, a
telecommunications firm (called the host company) will allow users
from all over the country to access its computers by dialing a
phone number that is local to the user. A second company (called a
network company) will provide the service that connects the user,
via phone lines, to the host company's computer, thus acting as a
bridge between the two. The fee for the network company's service
is often paid by the host company itself. In the incident under dis-
cussion, an unauthorized user programmed his computer to make
repeated, automatic calls to the host company's computers in an
effort to break into these computers. The effort to break in failed,
but the user's automatic dialing mechanism made repeated use of
the network company's communications service. In turn, the net-
work company billed the host company for the time during which
the unauthorized user had accessed its communications line. This
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
is obviously unfair to the host company. Where billings to a host
company for incidents such as this exceed $1,000 in a one-year
period, the Committee believes they should be subject to prosecu-
tion under this subsection.
Similarly, the Committee is concerned that authorized users of
computer services might incur substantial costs as a result of rely-
ing on information contained in a database that has been tampered
with. For example, an individual who invests in a stock, after
having read a computerized market analysis that had been altered
to make it appear the stock's potential had improved, has clearly
incurred a cost. The Committee intends that those costs also be
permitted to count toward the $1,000 valuation.
The second circumstance in which this subsection will penalize
alteration, damage, or destruction is in connection with data relat-
ing to medical care and treatment. The Sloan-Kettering case dis-
cussed earlier in this report is but one example of computer crimes
directed at altering medical treatment records. Where such con-
duct impairs or potentially impairs an individual's medical care,
the Committee does not believe a showing of $1,000 in financial
losses is necessary. Tampering with computerized medical treat-
ment records, especially given the potentially life-threatening
nature of such conduct, is serious enough to warrant punishment
without a showing of pecuniary loss to the victim or victims. The
Committee also wishes to make clear that convictions are attain-
able under this subsection without a showing that the victim was
actually given an incorrect or harmful treatment, or otherwise suf-
fered as a result of the changed medical record. That his examina-
tion, diagnosis, treatment, or care was potentially changed or im-
paired is sufficient to warrant prosecution under this subsection.
Two other important concerns have also been expressed to the
Committee regarding the reach of the new subsection (a)(5). The
first is that it might cover authorized "repairs" to a computer
system because "alteration" of the data is part of the gravamen of
the offense, and repairs presumably can involve altering data. It is
not the Committee's intent to criminalize properly authorized
repair activities. For example, this section does not prohibit em-
ployees of communications common carriers from engaging in ac-
tivities that are necessary to the repair of the carrier's service. The
Committee believes that the requirement in subsection (a)(5) that
alterations occur after an unauthorized access is sufficient in itself
to preclude its application to authorized repairs but wishes to leave
no doubt that authorized repair activities are not covered by (a)(5).
The second concern is that (a)(5) might be construed as crimina-
lizing the use in computer leasing services of automatic termina-
tion devices or so-called "time bombs". Frequently, a provider of
computer services will build into his program a mechanism that
automatically terminates the service if a user fails to pay his bill
for the service on time. Concerns have been expressed that the pro-
vider might be considered liable under (a)(5) for having "prevented
authorized use" of the service. That is not the Committee's intent.
Having failed to pay his bill for the Committee service, the delin-
quent user is no longer an "authorized user" of the service, and
termination of his access to the service is not an offense under this
subsection.
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
The new subsection 1030(a)(6) to be created by the bill is a misde-
meanor offense aimed at penalizing conduct associated with "pirate
bulletin boards," where passwords are displayed that permit unau-
thorized access to others' computers. It will authorize prosecution
of those who, knowingly and with intent to defraud, traffic in such
computer passwords. If those elements are present-and if the
password in question would enable unauthorized access to a Feder-
al Government computer, or if the trafficking affects interstate or
foreign commerce-this subsection may be invoked. The concept of
"traffic" means to transfer, or otherwise dispose of, to another, or
to obtain control of with intent to transfer or dispose of such pass-
words; the concept was borrowed from 18 U.S.C. 1029 relating to
credit card offenses. The Committee also wishes to make clear that
"password", as used in this subsection, does not mean only a single
word that enables one to access a computer. The Committee recog-
nizes that a "password" may actually be comprised of a set of in-
structions or directions for gaining access to a computer and in-
tends that the word "password" be construed broadly enough to en-
compass both single words and longer more detailed explanations
on how to access others' computers.
Section 2(e) eliminates the specific conspiracy offense in the
present law. The Committee intends that such conduct be governed
by the general conspiracy offense in 18 U.S.C. 371.
Section 2(f) conforms the "fine" provisions of 18 U.S.C. 1030 and
this bill with the general fine provisions of the Criminal Fine En-
forcement Act of 1984. It also contains the penalty provisions for
the two new felony provisions (5 years first offense, 10 years second
offense) and one new misdemeanor/felony provision (one year first
offense, 10 years second offense).
Section (2)(g) establishes definitions for a "Federal interest com-
puter, " "State", "financial institution", "financial record", the
term "exceeds authorized access," and the term "department of the
United States", all of which are self-explanatory. The only commit-
tee note is that obtaining information as encompassed in the defini-
tion for "exceeds authorized access" would include observing infor-
mation as we discussed under Section 2(a)(2) supra.
Section 2(h) conforms the exception for proper law enforcement
and intelligence activity in the computer crime bill with the credit
card legislation in 18 U.S.C. 1029(f).
Finally, the Committee wishes to make two general observations
that apply to each of the computer crime offenses amended or cre-
ated by S. 2281.
First, the Committee recognizes the necessity that computerized
information be considered "property" for purposes of Federal
criminal law. To date, computer users and providers of computer
services have had to wrestle with a criminal justice system that in
many respects is ill-equipped to handle their needs. Computer tech-
nology simply does not fit some of the older, more traditional legal
approaches to theft or abuse of property. For example, computer
data may be "stolen" in the sense that it is copied by an unauthor-
ized user, even though the original data has not been removed or
altered in any way. As long ago as 1983, the Department of Justice
stated that:
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Any enforcement action in response to criminal conduct
indirectly or directly related to computers must rely upon
a statutory restriction dealing with some other offense.
This requires the law enforcement officer, initially the
agent, and then the prosecutor, to attempt to create a
"theory of prosecution" that somehow fits what may be
the square peg of computer fraud into the round hole of
theft, embezzlement or even the illegal conversion of trade
secrets. 13
These enforcement problems can largely be overcome by recog-
nizing computerized information as property. The Congress began
that recognition by enacting the Computer Fraud and Abuse Act of
1984. The Committee intends S. 2281 to affirm the government's
recognition of computerized information as property.
Secondly, the Committee wishes to make clear its intent to dis-
tinguish between conduct that is completely inadvertent and con-
duct that is initially inadvertent but later becomes an intentional
crime. It has been suggested that this is a difficult line to draw in
the area of computer technology because of the possibility of mis-
takenly accessing another's computer files. Nevertheless, the Com-
mittee would expect one whose access to another's computer files
or data was truly mistaken to withdraw immediately from such
access. If he does not and instead deliberately maintains unauthor-
ized access after a non-intentional initial contact, then the Commit-
tee believes prosecution is warranted. The individual's intent may
have been formed after his initial, inadvertent access. But his is an
intentional crime nonetheless, and the Committee does not wish to
preclude prosecution in such instances.
IV. AGENCY VIEWS
In its testimony on April 16, 1986, the Department of Justice sup-
ported S. 2281, although it recommended several amendments to
the bill.14 The Committee adopted some of those recommendations,
including an amendment clarifying the degree to which the offense
in subsection 1030(a)(3) must affect the operation of the Govern-
ment computer in question. Many of the Department's recommen-
dations were incorporated into the Committee's report on S. 2281.
V. CONGRESSIONAL BUDGET OFFICE STATEMENT
U.S. CONGRESS,
CONGRESSIONAL BUDGET OFFICE,
Washington, DC, June 25, 1986.
Hon. STROM THURMOND,
Chairman, Committee on the Judiciary,
U.S. Senate, Washington, DC.
DEAR MR. CHAIRMAN: The Congressional Budget Office has re-
viewed S. 2281, the Computer Fraud and Abuse Act of 1986, as or-
'' Statement by John C. Keeney, Deputy Assistant Attorney General, Criminal Division;
before the Senate Subcommittee on Oversight of Government Management, Committee on Gov-
ernmental Affairs; October 26, 1983.
14 See, Statement of Victoria Toensing, Deputy Assistant Attorney General, Criminal Divi-
sion, U.S. Department of Justice, before the Senate Judiciary Committee; April 16, 1986.
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
dered reported by the Senate Committee on the Judiciary, June 12,
1986. We estimate that no significant cost to the Federal Govern-
ment, and no cost to State or local governments would result from
enactment of this bill.
S. 2281 makes a number of amendments to Section 1030 of Title
18 of the United States Code, dealing with computer fraud and re-
lated activity. These amendments include several changes in the
standards determining violations of the law. The bill extends the
existing Federal privacy protection of computerized financial infor-
mation to cover all such records of financial institutions, as defined
in the bill, and clarifies the prohibition against unauthorized access
of computers used by the U.S. government. S. 2281 also creates
three new offenses involving theft in the form of unauthorized com-
puter access with the intent to defraud, malicious damage through
unauthorized computer access, and trafficking in computer pass-
words with the intent to defraud. The provisions governing fines
for new and existing offenses would be made to conform with the
Criminal Fine Enforcement Act of 1984.
Based on information from the Department of Justice, we expect
that S. 2281 would provide a more specific statute on which to base
the investigation and prosecution of these activities, which the De-
partment is currently undertaking under other authority. Enact-
ment of the bill is not expected to result in a significant change in
the government's law enforcement practices or expenditures.
If you wish further details on this estimate, we will be pleased to
provide them.
With best wishes,
Sincerely,
RUDOLPH G. PENNER.
VI. REGULATORY IMPACT STATEMENT
Pursuant to paragraph 11(b), rule XXVI, of the Standing Rules of
the Senate, the Committee has concluded that the bill will have no
direct regulatory impact. The bill encourages, but does not require,
the agencies and departments of the Federal Government to devel-
op clear rules and sanctions regulating the use of Government com-
puters by employees and other authorized individuals. The bill also
encourages other owners and users of Federal interest computers
to establish clear statements of the scope of authority for those
who use the Federal interest computers.
VII. CHANGES IN EXISTING LAW
In compliance with paragraph (12) of rule XXVI of the Standing
rules of the Senate, changes in existing law made by S. 2281 are as
follows: Existing law proposed to be omitted is enclosed in black
brackets, new material is printed in italic, existing law in which no
change is proposed is shown in roman.
UNITED STATES CODE
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
TITLE 18: CRIMES AND CRIMINAL
PROCEDURE
Sec.
1030. Fraud and related activity in connection with computers.
? 1030. Fraud and related activity in connection with computers
(a) Whoever-
(1) knowingly accesses a computer without authorization
or having accessed a computer with authorization, uses the op-
portunity such access provides for purposes to which such au-
thorization does not extend] or exceeds authorized access, and
by means of such conduct obtains information that has been
determined by the United States Government pursuant to an
Executive order or statute to require protection against unau-
thorized disclosure for reasons of national defense or foreign
relations, or any restricted data, as defined in paragraph r. of
section 11 of the Atomic Energy Act of 1954, with the intent or
reason to believe that such information so obtained is to be
used to the injury of the United States, or to the advantage of
any foreign nation;
(2) [knowingly] intentionally accesses a computer without
authorization[, or having accessed a computer with authoriza-
tion, uses the opportunity such access provides for purposes to
which such authorization does not extend] or exceeds author-
ized access, and thereby obtains information contained in a fi-
nancial record of a financial institution, [as such terms are de-
fined in the Right to Financial Privacy Act of 1978 (12 U.S.C.
3401 et seq.),] or contained in a file of a consumer reporting
agency on a consumer, as such terms are defined in the Fair
Credit Reporting Act (15 U.S.C. 1681 et seq.); or
(3) [knowingly accesses a computer without authorization,
or having accessed a computer with authorization, uses the op-
portunity such access provides for purposes to which such au-
thorization does not extend, and by means of such conduct
knowingly uses, modifies, destroys, or discloses information in,
or prevents authorized use of, such computer, if such computer
is operated for or on behalf of the Government of the United
States and such conduct affects such operation;] intentionally,
without authorization to access any computer of a department
or agency of the United States, accesses such a computer of that
department or agency that is exclusively for the use of the Gov-
ernment of the United States or, in the case of a computer not
exclusively for such use, is used by or for the Government of the
United States and such conduct affects the use of the Govern-
ment's operation of such computer,-
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
(4) Knowingly and with intent to defraud, accesses a Federal
interest computer without authorization, or exceeds authorized
access, and by means of such conduct furthers the intended
fraud and obtains anything of value, unless the object of the
fraud and the thing obtained consists only of the use of the
computer;
(5) intentionally accesses a Federal interest computer without
authorization, and by means of one or more instances of such
conduct alters, damages, or destroys information in any such
Federal interest computer, or prevents authorized use of any
such computer or information, and thereby-
(A) causes loss to one or more others of a value aggregat-
ing $1, 000 or more during any one year period; or
(B) modifies or impairs, or potentially modifies or im-
pairs, the medical examination, medical diagnosis, medical
treatment, or medical care of one or more individuals; or
(6) knowingly and with intent to defraud traffics (as defined
in section 1029) in any password or similar information
through which a computer may be accessed without authoriza-
tion, if-
(A) such trafficking affects interstate or foreign com-
merce; or
(B) such computer is used by or for the Government of the
United States;
(b)[1] Whoever attempts to commit an offense under subsection
(a) of this section shall be punished as provided in subsection (c) of
this section.
[(2) Whoever is a party to a conspiracy of two or more persons to
commit an offense under subsection (a) of this section, if any of the
parties engages in any conduct in furtherance of such offense, shall
be fined an amount not great than the amount provided as the
maximum fine for such offense under subsection (c) of this section
or imprisoned not longer than one-half the period provided as the
maximum imprisonment for such offense under subsection (c) of
this section, or both.]
(c) The punishment for an offense under subsection (a) or (b)(1) of
this section is-
(1)(A) a fine [of not more than the greater $10,000 or twice
the value obtained by the offense] under this title or imprison-
ment for not more than ten years, or both, in the case of an
offense under subsection (a)(1) of this section which does not
occur after a conviction for another offense under such subsec-
tion, or an attempt to commit an offense punishable under this
subparagraph; and
(B) a fine [of not more than the greater of $100,000 or twice
the value obtained by the offense] under this title or imprison-
ment for not more than twenty years, or both, in the case of an
offense under subsection (a)(1) of this section which occurs
after a conviction for another offense under such subsection, or
an attempt to commit an offense punishable under this sub-
paragraph; and
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
(2)(A) a fine [of not more than the greater of $5,000 or twice
the value obtained or loss created by the offense] under this
title or imprisonment for not more than one year, or both, in
the case of an offense under subsection (a)(2) [or (a)(3)], (a)(3)
or (a)(6) of this section which does not occur after a conviction
for another offense under such subsection, or an attempt to
commit an offense punishable under this subparagraph; and
(B) a fine [of not more than the greater of $10,000 or twice
the value obtained or loss created by the offense] under this
title or imprisonment for [not than] not more than ten years,
or both, in the case of an offense under subsection (a)(2) [ or
(a)(3)], (a)(3) or (a)(6) of this section which occurs after a convic-
tion for another offense under such subsection, or an attempt
to commit an offense punishable under this subparagraph[.];
and
(3)(A) a fine under this title or imprisonment for not more
than five years, or both, in the case of an offense under subsec-
tion (a)(4) or (a)(5) of this section which does not occur after a
conviction for another offense under such subsection, or an at-
tempt to commit an offense punishable under this subpara-
graph; and
(B) a fine under this title or imprisonment for not more than
ten years, or both, in the case of an offense under subsection
(a)(4) or (a)(5) of this section which occurs after a conviction for
another offense under such subsection, or an attempt to commit
an offense punishable under this subparagraph.
(e) As used in this [section section-
(1) the term "computer' means an electronic, magnetic, opti-
cal, electrochemical, or other high speed data processing device
performing logical, arithmetic, or storage functions, and in-
cludes any data storage facility or communications facility di-
rectly related to or operating in conjunction with such device,
but such term does not include an automated typewriter or
typesetter, a portable hand held calculator, or other similar
device [.];
(2) the term "Federal interest computer" means a computer-
(A) exclusively for the use of a financial institution or
the United States Government, or, in the case of a computer
not exclusively for such use, used by or for a financial insti-
tution or the United States Government and the conduct
constituting the offense affects the use of the financial in-
stitution's operation or the Government's operation of such
computer; or
(B) which is one of two or more computers used in com-
mitting the offense, not all of which are located in the
same State;
(3) the term "State" includes the District of Columbia, the
Commonwealth of Puerto Rico, and any other possession or ter-
ritory of the United States;
(4) the term "financial institution" means-
(A) a bank with deposits insured by the Federal Deposit
Insurance Corporation;
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
(B) the Federal Reserve or a member of the Federal Re-
serve including any Federal Reserve Bank;
(C) an institution with accounts insured by the Federal
Savings and Loan Insurance Corporation;
(D) a credit union with accounts insured by the National
Credit Union Administration;
(E) a member of the Federal home loan bank system and
any home loan bank; and
(F) any institution of the Farm Credit System under the
Farm Credit Act of 1971;
(5) the term "financial record" means information derived
from any record held by a financial institution pertaining to a
customer's relationship with the financial institution;
(6) the term "exceeds authorized access" means to access a
computer with authorization and to use such access to obtain or
alter information in the computer that the accesser is not enti-
tled so to obtain or alter; and
(7) the term "department of the United States" means the leg-
islative or judicial branch of the Government or one of the exec-
utive departments enumerated in section 101 of title 5.
(f) This section does not prohibit any lawfully authorized investi-
gative, protective, or intelligence activity of a law enforcement
agency of the United States, a State, or a political subdivision of a
State, or of an intelligence agency of the United States.
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
VIII. ADDITIONAL VIEWS OF MESSRS. MATHIAS AND
LEAHY
We are pleased to join with our colleagues on the Judiciary Com-
mittee in reporting S. 2281, the Computer Fraud and Abuse Act of
1986. The authors of the legislation have effectively carried out a
delicate and complex task. The result is a bill that offers an appro-
priate Federal response to the real and growing problem of comput-
er crime.
The committee's report on S. 2281 thoroughly describes the scope
of that problem, and the details of that response. As the report
notes, this bill builds upon the computer crime legislation enacted
in the closing days of the 98th Congress. We wish to emphasize
that S. 2281 not only refines and extends the computer crime provi-
sions of Public Law 98-473, it also refocuses that legislation on its
principal objectives, and minimizes the likelihood that it will be
misused to cut back on the American public's right to know about
the activities of its government.
As enacted in 1984, the provision now codified as section
1030(a)(3) of title 18 makes it a crime to "knowingly use ... or dis-
close information in [any] computer ... operated for or on behalf of
the Government of the United States," when the defendant gains
access to the computer without authorization or his conduct ex-
ceeds the scope of his authorization. By its literal terms, this provi-
sion sweeps in all computerized government information, including
documents that must, under the Freedom of Information Act, be
disclosed to any member of the public upon proper request. Section
1030(a)(3) also glosses over the reality that the existence or exact
scope of a government employee's authority to access a particular
computerized data base is not always free from doubt. Under these
circumstances, any employee asked to release data that must be
disclosed under the FOIA would be understandably reluctant to do
so unless assured of the precise contours of his authorization to
access it. An incorrect assertion of authorization could expose the
employee to prosecution and imprisonment. Any prudent employee
would resolve doubts against disclosure, a conclusion directly con-
trary to the principles of open government underlying the FOIA.
Motivated by these concerns arising from provisions of the
House-passed computer crime bill, the Senate, on the next-to-last
day of the 98th Congress, unanimously approved our amendment to
the bill which narrowed the sweeping provisions of the disclosure
offense under section 1030(a)(3). Unfortunately, in the rush toward
adjournment, the House never acted on the Senate amendment to
this bill. Instead, the free-standing computer crime legislation was
overtaken by a continuing appropriations resolution, to which had
been appended hundreds of pages of crime legislation, including
portions of the unamended House computer crime bill. Thus, in a
particularly graphic lesson in the shortcomings of legislation by
(20)
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
rider, section 1030(a)(3) was signed into law, despite the Senate's
unanimous view that its scope was too broad.
The bill we now report, unlike its predecessor, has had the bene-
fit of nearly 2 years of careful scrutiny and study by the Subcom-
mittee on Criminal Law. Among the many improvements that it
would make is a complete revision of section 1030(a)(3). The revised
provision includes three salutary features that minimize the possi-
bility that this computer crime legislation could be misused to
weaken the Freedom of Information Act, or to impose unnecessary
obstacles to the public's right to know about government activities.
First, the mental state required to establish a violation of revised
section 1030(a)(3) is increased from "knowingly" to "intentionally."
As the committee report points out, the "intentional" standard pre-
cludes criminal liability for inadvertent acts of unauthorized
access. Instead, it is "designed to focus Federal criminal prosecu-
tions on those who evince a clear intent to enter, without proper
authorization, computer files or data belonging to another."
Second, S. 2281 would eliminate coverage for authorized access
that aims at "purposes to which such authorization does not
extend." This removes from the sweep of the statute one of the
murkier grounds of liability, under which a Federal employee's
access to computerized data might be legitimate in some circum-
stances, but criminal in other (not clearly distinguishable) circum-
stances that might be held to exceed his authorization. As the com-
mittee report points out, administrative sanctions should ordinarily
be adequate to deal with real abuses of authorized access to Feder-
al computers (assuming, of course, that no other provision of sec-
tion 1030 is violated). Like the heightened scienter requirement,
this change serves to minimize the likelihood that a Federal em-
ployee, uncertain about the scope of his authority, would face a
Hobson's choice between the disclosure mandates of FOIA and the
criminal sanctions of title 18.
Finally, revised section 1030(a)(3) would not apply to access by a
Federal employee of computers of that employee's own agency.
This exclusion recognizes the reality that computer access rules for
employees within a single agency are rarely as clear as rules gov-
erning access by outsiders to that agency's computers. Revised sec-
tion 1030(a)(3) would provide prosecutors a clear, workable rule, re-
gardless of the intricacies of a particular agency's computer access
policies: absent a fraudulent motive, an employee could not be
prosecuted for simple "trespass" into one of his agency's own com-
puters.
Like any bright-line rule, this one does not conform perfectly to
the behavior it addresses. To treat employees of other agencies as
"outsiders" for the purposes of this statute may, in an exceptional
instance, work some hardship. The committee report notes that the
revised subsection may, on rare occasions, prove underinclusive; as
well, it may be overinclusive in unusual cases. The fact is that
many Federal agency data bases are separated from those of sister
agencies not by well-defined walls, but by permeable membranes.
Information sharing may become computer sharing without formal
protocols of authorization. Access by one who appears to be an
"outsider" to the agency may be not only excusable, but helpful to
the agency's mission.
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8
But certainly this imprecision can be accommodated. Just as
other criminal sanctions may well be at hand in cases that fall
through the net of the revised subsection (a)(3), so administrative
sanctions-and, of course, the discretion not to prosecute-will
remain available for those cases of interdepartmental unauthorized
access that do not justify prosecution.
S. 2281's revisions to section 1030(a)(3) do not track the approach
adopted by the Senate in 1984, and embodied in our bill in this
Congress, S. 610, for correcting the course set by the 1984 computer
crime legislation. Both the 1984 Senate amendment, and S. 610, fo-
cused on the disclosure aspect of the offense created by section
1030(a)(3), and sought to exclude from the offense information
whose disclosure ought not to be discouraged. Because the revised
subsection is a simple trespass offense, rather than one requiring
disclosure or some other act beyond access to the data, our earlier
approach to the problem is now less apposite. We think the balance
struck by S. 2281 on this issue is reasonable. It largely ameliorates
our concern about the effect of section 1030(a)(3) on the free flow of
government information to the American people. It goes far toward
restoring the incentive for Federal employees to comply voluntarily
with the Freedom of Information Act in their dealings with re-
quests for computerized government information. At the same
time, it gives the Government an adequate prosecutorial tool for
deterring and punishing unauthorized access to sensitive Govern-
ment information by those who have no colorable claim of a right
to obtain it outside proper channels.
In this and other aspects, S. 2281 constitutes a real improvement
on existing computer crime law. The Subcommittee on Criminal
Law, under Senator Laxalt's leadership, and its House counterpart,
the Subcommittee on Crime, have crafted well-considered and con-
structive legislation, and we are pleased to support it.
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480020-8