Crime in the Evolved Digital Age
Crime in the Evolved Digital Age
June 2015
Recommended Citation
Patel (now Kanwar), Anar (2015) "Crime in the Evolved Digital Age," Journal of Technology Law & Policy:
Vol. 20: Iss. 1, Article 2.
Available at: https://scholarship.law.ufl.edu/jtlp/vol20/iss1/2
This Article is brought to you for free and open access by UF Law Scholarship Repository. It has been accepted for
inclusion in Journal of Technology Law & Policy by an authorized editor of UF Law Scholarship Repository. For
more information, please contact kaleita@law.ufl.edu.
CRIME IN THE EVOLVED DIGITAL AGE
I. INTRODUCTION .......................................................................... 19
V. CONCLUSION ............................................................................ 37
I. INTRODUCTION
* Anar Patel, J.D. 2015, Arizona Summit Law School; B.S. 2013, Business
Administration & Management, with a concentration in Accounting, Boston University.
1. Julie A. Tower, Hacking Vermont's Computer Crime Statute, 25 VT. L. REv. 945, 945
(2001) (discussing how evolving computer technology is leading to more complex computer
crimes). The state statutes that I am referring to are California, Vermont, Arkansas, and Arizona.
2. Id.
3. Id. at 949.
4. HG.ORG LEGAL RESOURCES, http://www.hg.org/computer-crime.html (last visited June
30, 2015).
5. Tobias Loetzke, The TJMAXX Credit CardIncident,tlotzke.myweb.usf.edu/tjx credit
card.pdf (last visited June 30, 2015).
JOURNAL OF TECHNOLOGY LAW & POLICY [Vol. 20
their systems were compromised and faced the largest credit-card theft in
history. 6 The company lost 45.7 million credit and debit card numbers
that resulted in a large number of fraudulent transactions.7
There are two standards with wireless encryption: Wired Equivalent
Privacy (WEP) standard and a Wi-Fi Protected Access (WPA). 8 Because
WEP 9 networks were easily hacked with accessible software, the wireless
industry created a better WPA10 standard. 1 Unfortunately, TJX did not
upgrade their systems to the WPA standard and hackers obtained easy
access to the local system and managed to create their own user accounts
with full administrator rights.' 2 Not only did hackers obtain credit and
debit card numbers, but also social security numbers, and driver's license
numbers, which they sold in packages to private Internet pages all over
the world.' 3 This data was used to make fraudulent withdrawals from
14
consumers' bank accounts.
This security breach put millions of consumers at risk for identity theft
and burdened banks with the financial responsibility of covering all
expenses for replacing compromised cards.' 5 As a result, banks lobbied
for legislation to "place full financial responsibility for security breaches
6. Mark Jewell, T.J. Maxx Theft BelievedLargest Hack Ever, NBC NEWS, http://www.nbc
news.com/id/1 7871485/ns/technologyand science-security/t/tj-maxx-theft-believed-largest-hac
k-ever/ (last updated Mar. 30, 2007).
7. Loetzke, supra note 5.
8. Margaret Rouse, Wi-Fi Protected Access (WPA), TECHTARGET (Nov. 2005),
http://searchmobilecomputing.techtarget.com/definition/Wi-Fi-Protected-Access.
9. What Is WEP Wireless Encryption?, NETGEAR SUPPORT, http://kb.netgear.com/app/
answers/detail/aid/I 14 1/-/what-is-wep-wireless-encryption%3F (last updated Dec. 26, 2014)
("Wired Equivalent Privacy (WEP) is a security protocol for wireless networks that encrypts
transmitted data. The disadvantage is that without any security, the data can be intercepted without
difficulty.").
10. Rouse, supra note 8.
Id.
II. Loetzke, supra note 5.
12. Id
13. Id.
14. Joseph Pereira, How Credit-Card Data Went Out Wireless Door, WALL ST. J.,
http://www.wsj.com/articles/SB 117824446226991797 (last updated May 4, 2007).
15. Loetzke, supra note 5.
CRIME IN THE EVOLVED DIGITAL AGE
The Computer Fraud and Abuse Act, defines "fraud" and related
activity in connection with computers as, "whoever intentionally accesses
a computer without authorization or exceeds authorized access, and
thereby obtains (a) information contained in a financial record of a
financial institution, "20 "or of a card issuer, or contained in a file of
consumer reporting agency on a consumer; (b) information from any
department or agency of the United States; or information from any
protected computer." 2' The federal statute focuses primarily on 22
protecting the interests of financial institutions and the government.
States have enacted legislation that further defines computer related
crimes and the extent to which they relate to businesses and individuals
within the state.2 3
California Legislature enacted section 502 of the California Penal
Code to expand the degree of protection afforded to individuals,
16. Id.
17. Id.
18. Id.
19. BLACK'S LAW DICTIONARY 452 (10th ed. 2014) (defining computer crime, or
cybercrime, as a crime that "involves the use of a computer, such as sabotaging or stealing
electronically stored data.").
20. Id. at 748 (defining financial institution as "[A] business, organization, or other entity
that manages money, credit, or capital, such as a bank, credit union, savings-and-loan association,
securities broker or dealer, pawnbroker, or investment company.").
21. 18 U.S.C. § 1030 (2008).
22. See id.
23. E.g., CAL. PENAL CODE § 502 (2011).
JOURNAL OF TECHNOLOGYLA W & POLICY [Vol. 20
For the purposes of this statute, "access" means to gain entry to, instruct,
or communicate with the logical, arithmetical, or memory function
resources of a computer, computer system, or computer network.26
Subdivision (b) of the statute defines the various terms used within
the statute, except for the word "computer." 27 Subdivision (b)(2) defines
"computer network" as "any system which provides communications
between one or more computer systems and input/output devices
including, but not limited to, display terminals and printers connected by
telecommunication facilities." 28 Subdivision (b)(5) defines "computer
system" as "a device or a collection of devices..., one or more of which
contain computer programs, electronic instructions, input data, and
output data, that performs functions including, but not limited to, logic,
arithmetic, data storage and retrieval, communication, and control. 29
Subdivision (c) of the statute is a list of "illegal activity ranging from the
use of a computer to defraud or extort, to infecting a computer with a
virus." 30 Subdivision (c)(7) covers one who "knowingly and without
permission accesses or causes to be accessed any computer, computer
31
system, or computer network.",
On September 17,2014, an Act to amend Section 502 of the California
Penal Code was filed.32 Existing law was amended to expand the
33
definition of computer crime, imposing a state-mandated local program.
This bill sought to update existing law with a heavy emphasis on
disruption of government computer services or public safety
24. BLACK'S LAW DICTIONARY 75 (10th ed. 2014) (defining Government Agency as a
governmental body with the authority to implement and administer particular legislation).
25. CAL. PENAL CODE § 502 (2011).
26. 19 CAL. JUR. 3d Criminal Law: Miscellaneous Offenses § 311 (2015).
27. People v. Lawton, 56 Cal. Rptr. 2d 521, 523 (Cal. App. Dep't. Super. Ct. 1996).
28. Id.
29. Id.
30. Id.
31. Id.
32. A.B. 1649, Cal. Gen. Assemb., Reg. Sess. (Cal. 2014).
33. Id.
CRIME IN THE EVOLVED DIGITAL AGE
34. Id.
35. Id.
36. What Is a Remote System?, ORACLE, http://docs.oracle.com/cd/E23824_0I/html/821-
1454/wwrsov-3.html (last visited Nov. 27, 2014) ("A remote system is a workstation or server
that is connected to the local system with any type of physical network and configured for TCP/IP
communication."); see also Margaret Rouse, TCP/IP (Transmission Control Protocol/Internet
Protocol) Definition, TECHTARGET (Oct. 2008), http://searchnetworking.techtarget.com/
definition/TCP-IP ("TCP/IP is short for Transmission Control Protocol/Intemet Protocol and it is
the basic communication language of the Internet.").
37. A.B. 1649, Cal. Gen. Assemb., Reg. Sess. (Cal. 2014).
38. Matthew S. Borick, A Look at Vermont's Computer Crime Statute, 34 VT. B.J. 38, 38
(2008) (citing VT. STAT. ANN. tit. 13, § 4101(2)-(7)).
39. Id.
JOURNAL OF TECHNOLOGY LAW & POLICY [Vol. 20
Arkansas has two other statutes that define computer trespass and
unlawful acts regarding computers. 4 2 Computer trespass is when, (3) "a
person intentionally and without authorization accesses, alters, deletes,
damages, destroys, or disrupts any computer, computer system, computer
network, computer program or data. ' '43 "A person commits an unlawful
act regarding a computer if the person knowingly and without
authorization: .. ." (4) obtains and discloses, publishes, transfers, or uses
a device used to access a computer, system, network, or data.4 4
Arizona's computer tampering statute defines,
The evolving nature of the Internet makes it difficult for the United
States to "develop and implement electronic criminal and civil laws that
protect Americans." 47 Computer fraud and cyberattacks become more
advanced with each day while the federal government continues to fight
cybercrime with an outdated federal statute. 48 The increased use of
computers has been accompanied by an increase in computer fraud and
computer related crimes. 49 The Computer Fraud and Abuse Act (CFAA)
is a federal computer security statute that aims to protect computers
operated by financial institutions, the federal government, and computers
linked to the Internet. 50 For years, courts have taken two approaches
interpreting the terms of the CFAA. 5 1 "Courts around the country struggle
with whether the CFAA applies in a situation where an employee who
has been granted access to his employer's computers uses that access for
an improper purpose." 52 A court that has adopted the narrow approach
held that, "once an employee is granted 'authorization' to access an
employer's computer that stores confidential company information, the
employee does not violate the CFAA regardless of how he subsequently
uses the information." 53 Another court that adopted the broader approach
held that, "an employee access[es] a computer without authorization
when the employee, without the employer's knowledge, acquires an
interest that is adverse to that of his employer or is guilty of a serious
breach of loyalty."54 While many courts argue that the CFAA's plain
language and legislative history support the narrow approach, and
adopting the narrow approach rules out any ambiguity,5 5 the fact that
courts have argued for both the narrow and the broad approach prove
ambiguity exists. As the federal statute is ambiguous and outdated, states
have enacted legislation defining aspects of computer fraud.56
"All fifty states have enacted legislation that may impact a user's
access to open wireless networks." 57 These statutes vary in name,
including: "computer trespass, unauthorized use, computer tampering,
computer crime, criminal use of a computer, offenses against computer
users, and criminal invasion of computer privacy."5 A substantial
number of states outlaw using computers to commit fraud, or using a
"computer, computer system, computer network, or any part thereof for
'59
the purpose of devising, or executing any scheme or artifice to defraud,
or for "obtaining money, property, or services by means of false or
52. Id.
53. Id.
54. Id.
55. Shurguard Storage Ctrs., Inc. v. Safeguard Self Storage, Inc., 119 F. Supp. 2d 1121,
1127 (W.D. Wash. 2000); see also S. Rep. No. 99-432 (1986) (explaining that the first version of
the CFAA was passed in 1984, and this first bill was directed at protecting classified information
on government computers as well as protecting financial records and credit information on
government and financial institution computers. In 1986, the CFAA was amended to "provide
additional penalties for fraud and related activities in connection with access devices and
computers." Specifically, the 1986 amendments added protection for "federal interest computers,"
and therefore, the original version of the CFAA did not intend to enact sweeping federal
jurisdiction.).
56. Imparl, supra note 49, at 18.
57. Matthew Bierlein, Policing The Wireless World: Access Liability In The Open Wi-Fi
Era, 67 OHIO ST. L.J. 1123, 1136 (2006).
58. Id.at 1136-37.
59. 2 Data Sec. & Privacy Law § 15:25 (2014); Pinguelo, 16 VA. J.L. & TECH. at 132
(explaining that hacking is an example of using computers to commit fraud. Hacking is defined
as "gaining unauthorized access to a computer system, programs or data." Hackers sometimes
hack into government networks or business networks for profit among other things. Hackers can
now easily retrieve an attack code from the Internet and use it against victim websites without
leaving a trace.).
CRIME IN THE EVOLVED DIGITAL AGE
2
services that computers store and provide.
Vermont's computer crime statute, "An Act Relating to Computer
Crimes," criminalized computer-related activities in an attempt to get
tough on cybercriminals. 83 However, the statute is in need of legislative
reform in order to effectively prosecute computer crimes.8 While
Vermont's statute conveys conciseness and clarity, it falls short of
serving as an effective vehicle for prosecuting computer crimes. 85 Section
4101 of"An Act Relating to Computer Crimes" is a glossary that defines
computer-related terms used throughout the statute. 86 Section 4102 deals
with unauthorized access of any computer, computer system, computer
network, computer program or data. 87 Section 4103 makes it a crime to
access computers for fraudulent purposes. 88 Section 4104 addresses
alteration, damage, or interference with the operation of any computer,
computer system, computer network, computer software, computer
program, or data. 89 Section 4105 criminalizes the theft or destruction of
a computer system, computer network, computer software, computer
program, or data.90 Section 4106 addresses civil liability and permits a
person damaged as a result of a violation of the statute to bring civil action
against the violator. 9 1 Lastly, section 4107 pertains to venue, and provides
that any violation of the statute shall be considered to have been
committed in the state, if Vermont is the state from 92 which or to which any
use of a computer or computer network was made.
While legislators attempted to balance the need to devise statutory
language that is broad enough to yield an effective prosecution and
constitutional rights, Vermont's computer crimes statute illustrates where
such attempts can fall short, which amounts to something that is less than
effective legislation. 93 Specifically, Vermont's computer crime statute
contains several inadequacies or loopholes where language is too broad
or highly generalized, when it could be more specific and detailed. 94
Additionally, this new but outdated statute is steps behind technology and
therefore demands review to promote effective prosecution of computer
95. Id.
96. Id.at 967.
97. Id.
98. See id at 966.
99. Kevin M. Lemley, Beyond Trade Secrets: Protecting Business Information in
Arkansas, 43 SPG ARK. LAW. 10, 13 (2008).
100. Id (citing ARK. CODE ANN. § 5-41-104).
101. Id.(citing ARK. CODE ANN. § 5-41-103).
102. Id.
103. See ARIz. REV. STAT. ANN. § 13-2316 (2014).
104. State v. Fimbres, 213 P.3d 1020, 1023 (2009).
105. Id.
106. Id.
107. Id.
108. Id.
CRIME IN THE EVOLVED DIGITAL AGE
from the store also showed the appellant using the gift cards to pay for
merchandise. 109 While the appellant admitted he made purchases with the
gift cards, he claimed that he did not know that the cards had been
altered. 110
Appellant claimed that the evidence presented against him could not
support a computer tampering conviction because the plain meaning of
§ 13-2316 demonstrated the statute was enacted solely to criminalize
"computer hacking" and does not include other computer-related
conduct, such as swiping gift cards encoded with illegally obtained credit
and debit card numbers through a credit card reader."' The court
determined that the plain meaning of § 13-23 16 is clear and demonstrated
the statute is not limited to computer hacking. 112 A.R.S § 13-2316
provides:
The court further found that in order for a store's credit card reader to
charge or debit customers' accounts, the reader must be linked to the
store's computer system or network.1 4 Therefore, the court concluded a
defendant who swipes gift cards bearing illegally obtained credit and
debit card numbers in a store credit card reader ultimately accesses the
store's computer system or network with the intent to execute a scheme
to defraud." 5
Another application of A.R.S. § 13-2316 is demonstrated in State v.
Young, where the defendant, Clifton Young, was convicted of computer
tampering in violation of § 13-2316(A)(7)." 6 The defendant was
employed by the Arizona Department of Transportation (ADOT) as a
member of the server management team.' 17 As a member of the team, the
109. Id.
110. Id.at 1023-24.
111. Id.at1025.
112. Id
113. Id. (citing Ariz. Rev. Stat. Ann. § 13-2316).
114. Id.
115. Id.at 1023.
116. Young, 224 P.3d 944, 946 (Ariz. Ct. App. 2010).
117. Id.
JOURNAL OF TECHNOLOGYLAW& POLICY [Vol. 20
118. Id.
119. Id.
120. Id.
121. Id.
122. Id.
123. Id.
124. Id.at 946-47.
125. at 947.
Id.
126. at 946.
Id.
127. at 947.
Id.
CRIME IN THE EVOLVED DIGITAL AGE
The Computer Fraud and Abuse Act affords the broadest protection
against computer crimes, but it is not very specific. To accompany the
broad, ambiguous language of the federal statute, states have enacted
legislation to combat computer crime that is much stricter than the federal
statute. Both the federal statute and state statutes protect against
unauthorized access of a computer, computer system, computer network,
computer program or data,' 30 but neither the federal statute nor the state
statutes are updated to include mobile devices such as smartphones'31 or
tablet computers 132 in the working definition of "computer. ,133 These
outdated statutes need to be updated to include "any electronic or digital
134. DEL. CODE tit. 12, § 5002 (2015) ("[A] 'digital device' [is] an electronic device that can
create, generate, send, share, communicate, receive, store, display, or process information, and
such electronic devices shall include, but not limited to, desktops, laptops, tablets, peripherals,
servers, mobile telephones, smartphones, and any similar storage device which currently exists or
may exist as technology develops or such comparable items as technology develops.").
135. 19 U.S.C. § 1401 (2014) (explaining that an electronic or digital device that is
transmitted creates an electronic transmission. Electronic transmission means "the transfer of data
or information through an authorized electronic data interchange system consisting of, but not
limited to, computer modems and computer networks.").
136. Margaret Rouse, Two-Factor Authentication (2FA), SEARCHSECURITY (Mar. 2015),
http://searchsecurity.techtarget.com/definition/ two-factor-authentication.
Id.
137. Margaret Rouse, Multifactor Authentication (MFA), SEARCHSECURITY (Mar. 2015),
http://searchsecurity.techtarget.com/definition/ multifactor-authentication-MFA.
Id.
139. Priya Viswanathan, What is a Mobile Application?, ABOUT TECH, http://mobiledevices.
about.com/od/glossary/g/What-ls-A-Mobile-Application.htm. ("Mobile applications or mobile
apps are [software] applications [designed to run on] small handheld devices, such as mobile
phones, smartphones, PDAs[, tablet computer.]").
140. User Account, PC MAG, http://www.pcmag.com/encyclopedia/term/53549/user-acc
ount (last visited Nov. 29, 2014) ("[A user account is] an established relationship between a user
and a computer, network[,] or information service. User accounts are assigned a usemame [and
passwords, while] optional for computers and networks, [are] mandatory for registrations and
subscriptions to online services.").
JOURNAL OFTECHNOLOGY LAW & POLICY [Vol. 20
141. Bruce Erskine, Starbucks Blames Weak Passwordfor Phone App Hacking, CHRON.
HERALD (July 8, 2014, 4:32 PM), http://thechronicleherald.ca/business/1221352-starbucks-bla
mes-weak-password-for-phone-app-hacking.
142. Cory Janssen, Clickwrap Agreement, TECHOPEDIA, http://www.techopedia.com/definit
ion/4243/clickwrap-agreement (last visited Nov. 27, 2014).
access.
It is imperative that businesses are up to date with all security
measures and take extra measures to ensure the customer's safety. In the
TJX incident, TJX did not upgrade their Wi-Fi standard to WPA. Due to
TJX's failure to upgrade to the more secure Wi-Fi standard, hackers were
easily able to gain access to sensitive information and data stored on
TJX's systems. As a result, hackers were able to change system
administrator settings' 43 within the system to give themselves complete
access to all sensitive data.
Businesses should be required to take preventive measures to protect
themselves and the identities of their customers from such incidents.
Businesses have a moral obligation to their clients, consumers, or
customers to protect their identity. If businesses are not taking proper
precautions and fail to implement the latest security standard, businesses
are compromising consumer identity and opening themselves up to a
variety of lawsuits. The federal statute serves to combat computer crimes,
but attacks, such as the TJX incident, are still occurring because
businesses are not updating their security. In order to protect against
computer crimes, businesses should be constantly updating security to the
latest security standards in efforts toward taking preventive measures.
However, businesses are not taking such preventive measure, and
therefore it is imperative the federal statute, mandate these businesses to
constantly update their security to the latest standard in order to reduce
the level of risk.
V. CONCLUSION