{"id":34530,"date":"2020-04-21T13:43:16","date_gmt":"2020-04-21T13:43:16","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31138\/The-CFAA-Is-Finally-Being-Reviewed-By-The-Supreme-Court.html"},"modified":"2020-04-21T13:43:16","modified_gmt":"2020-04-21T13:43:16","slug":"the-cfaa-is-finally-being-reviewed-by-the-supreme-court","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/","title":{"rendered":"The CFAA Is Finally Being Reviewed By The Supreme Court"},"content":{"rendered":"<p>The US Supreme Court has indicated it will finally address an issue that has been causing legal problems for nearly two decades: what exactly is \u201cauthorized use\u201d of a computer?<\/p>\n<p>If someone is authorized to use a computer \u2013 to access a database, for example \u2013 is that a blanket authorization, and can they use it so long as they continue to use their existing login? Or does it depend on the circumstances? Can someone\u2019s authorization be dependent on the application&#8217;s terms of service?<\/p>\n<p>The question may seem simple but the bigger issue is how the law \u2013 specifically the US Computer Fraud and Abuse Act (<a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/18\/1030\">CFAA<\/a>) \u2013 sees it. Because while an employee could be warned, or even fired, for abusing their access to information, the CFAA would make it a criminal act. People could go to jail for not following the correct terms of service.<\/p>\n<p>The particular case under review concerns former police sergeant Nathan Van Buren who was convicted in 2017 under the CFAA for running a computer search for a license plate number. Van Buren had authorized access to the police\u2019s database, but in this case he ran a license check in return for cash.<\/p>\n<p>The full details are unedifying: Van Buren needed money and offered to run plate checks for a stripper named Albo. Albo went to the local sheriff\u2019s office, which contacted the FBI and they set up a sting operation giving Albo a fake license which she gave to Van Buren. She said that she wanted to know if it belonged to an undercover cop who was trying to bust her for prostitution. She gave Van Buren cash and he ran the plate.<\/p>\n<p>Van Buren was arrested for breaking the CFAA. But in court, Van Buren\u2019s lawyers argued that he was authorized to use the system as a police officer and that that access couldn\u2019t be unauthorized, regardless of why he performed the search itself.<\/p>\n<p>In other words, he could be taken to task for taking money from a stripper to run a license plate \u2013 clearly unethical behavior \u2013 but he couldn\u2019t be convicted under the CFAA for doing so.<\/p>\n<h3 class=\"crosshead\"><span>Honest guv<\/span><\/h3>\n<p>He was charged with two cases: committing computer fraud for financial gain (violating the CPAA) and honest services fraud and violating the CFAA. He was found guilty on both counts and sentenced to prison for 18 months, with two years of supervised release. He appealed and the \u201chonest services\u201d charge was overturned but the CFAA computer fraud charge was not. And that\u2019s why it may be the perfect test case.<\/p>\n<p>Lawyers and legal minds have been fighting over the question of authorized and unauthorized use under the CFAA ever since it was enacted back in 1986. The advent of the internet however made the issue 100 times bigger and hence 100 times more important.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/03\/31\/shutterstock_cfaa.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Illustration of US flag, handcuffs, a computer mouse and code\"><\/p>\n<h2 title=\"If you ignore the T&amp;Cs to probe a site's algorithms, don't expect the Feds to swoop in using the dreaded CFAA\">Relax, breaking a website&#8217;s fine-print doesn&#8217;t make you a criminal hacker, says judge in US cyber-law legal row<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2020\/03\/31\/ai_algorithms_hacking_legal\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>The case has now been relisted with the Supreme Court because other Appeals Courts have had to decide similar cases in the meantime and have come up with different interpretations. In 2011, the Eleventh Circuit decided that violating a written restriction makes such access unauthorized in Van Buren\u2019s case.<\/p>\n<p>But the Second and Ninth Circuits have since rejected that argument, in large part because it would make criminals out of potentially millions of people for not following the terms of use put out by hundreds of different companies.<\/p>\n<p>As one example, professor of law at UC Berkeley, Orin Kerr, has <a target=\"_blank\" href=\"https:\/\/reason.com\/2020\/04\/15\/is-the-supreme-court-about-to-take-its-first-big-cfaa-case\/\" rel=\"noopener noreferrer\">argued<\/a> that if the CFAA is used to apply to terms of use then he is guilty of criminal conduct because he has given Facebook a false location for himself, an infringement of the social media giant\u2019s terms of us. And he commits a new crime every time he logs into the service.<\/p>\n<p>Van Buren is a fairly clean one for the Supreme Court in the sense that the legal issues are cleanly decided. He was charged with violating the CFAA, convicted \u2013 by a jury \u2013 and that conviction was then upheld. But his entire sentence is now based on that interpretation of the CFAA.<\/p>\n<p>And there are other appeals courts that have clearly said they do not agree with the interpretation. Plus, of course, it is of significant public interest and importance because it impacts the behavior of just about every citizen on a daily basis.<\/p>\n<h3 class=\"crosshead\"><span>Not strong arguments<\/span><\/h3>\n<p>The government is fearful of losing at the Supreme Court because it would immediately lead to appeals for all those who have been convicted under its current interpretation of the CFAA.<\/p>\n<p>If the Supreme Court does take the case up it will have to dig into such questions as: who sets the usage rules? What is legal and illegal to do from the same computer with the same access? Can an employer effectively turn its employees into criminals if they don\u2019t follow its rules? Can a tech company like Facebook put people in jail if it catches them breaking its terms of use?<\/p>\n<p>And, just to open Pandora\u2019s Box a little more: a change in how the CFAA works would impact one of the most controversial cases it was used in \u2013 to prosecute Aaron Swartz for downloading millions of research papers.<\/p>\n<p>Back in 2013, House Representative Zoe Lofgren (D-CA) drafted a bill that would have specifically excluded terms of service from the CFAA because of what happened to Swartz. The young co-founder of RSS was aggressively pursued under that aspect of the law and told he would face a million-dollar fine and up to 35 years in prison for his actions. Unable to deal with the pressure, he <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2013\/01\/13\/anger_death_aaron_swartz\/\" rel=\"noopener noreferrer\">committed suicide<\/a>.<\/p>\n<p>Lofgren\u2019s bill was beaten back \u2013 allegedly thanks to lobbying by Oracle \u2013 and she <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2015\/04\/23\/congress_reintroduces_aarons_law\/\" rel=\"noopener noreferrer\">reintroduced it<\/a> in 2015, but it again went nowhere. At the time \u2013 five years ago now \u2013 Lofgren argued that the CFAA was \u201clong overdue for reform.\u201d<\/p>\n<p>\u201cAt its very core,\u201d she argued, \u201cCFAA is an anti-hacking law. Unfortunately, over time we have seen prosecutors broadening the intent of the act, handing out inordinately severe criminal penalties for less-than-serious violations. It&#8217;s time we reformed this law to better focus on truly malicious hackers and bad actors, and away from common computer and Internet activities.&#8221;<\/p>\n<p>Somewhat unusually, a corrupt cop and a stripper may bring some much-delayed justice to Swartz and potentially dozens of others who have been found guilty under the government\u2019s interpretation of the CFAA. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1916\/-8373\/practical-tips-for-office-365-tenant-to-tenant-migration?td=wptl1916\">Practical tips for Office 365 tenant-to-tenant migration<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31138\/The-CFAA-Is-Finally-Being-Reviewed-By-The-Supreme-Court.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34531,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[603],"class_list":["post-34530","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentusa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The CFAA Is Finally Being Reviewed By The Supreme Court 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The CFAA Is Finally Being Reviewed By The Supreme Court 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-21T13:43:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The CFAA Is Finally Being Reviewed By The Supreme Court\",\"datePublished\":\"2020-04-21T13:43:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/\"},\"wordCount\":1103,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court.jpg\",\"keywords\":[\"headline,hacker,government,usa\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/\",\"name\":\"The CFAA Is Finally Being Reviewed By The Supreme Court 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court.jpg\",\"datePublished\":\"2020-04-21T13:43:16+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,usa\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusa\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The CFAA Is Finally Being Reviewed By The Supreme Court\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The CFAA Is Finally Being Reviewed By The Supreme Court 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/","og_locale":"en_US","og_type":"article","og_title":"The CFAA Is Finally Being Reviewed By The Supreme Court 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-21T13:43:16+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The CFAA Is Finally Being Reviewed By The Supreme Court","datePublished":"2020-04-21T13:43:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/"},"wordCount":1103,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court.jpg","keywords":["headline,hacker,government,usa"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/","url":"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/","name":"The CFAA Is Finally Being Reviewed By The Supreme Court 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court.jpg","datePublished":"2020-04-21T13:43:16+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-cfaa-is-finally-being-reviewed-by-the-supreme-court\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,usa","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusa\/"},{"@type":"ListItem","position":3,"name":"The CFAA Is Finally Being Reviewed By The Supreme Court"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34530"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34530\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34531"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}