PogoWasRight.org

Menu
  • About
  • Privacy
Menu

Does the federal computer hacking law apply to a laptop not connected to the Internet?

Posted on August 25, 2014July 1, 2025 by Dissent

Orin Kerr writes:

Last week, a district court considered whether the federal computer hacking statute, the Computer Fraud and Abuse Act, applies to a laptop computer not connected to the Internet. The court concluded in Pine Environmental Services v. Carson (D.Mass. August 20, 2014) (Talwani, J.), that the Act does not apply in such circumstances because the alleged crime is not interstate in nature. As much as I favor narrow readings of the CFAA, I think the court was incorrect. Unfortunately, the CFAA is so broad it includes pretty much every computer, connected to the Internet or not. In this post I’ll explain why.

Read more on WaPo The Volokh Conspiracy.

No related posts.

Category: BreachesCourtLaws

Post navigation

← For sale: Systems that can secretly track where cellphone users go around the globe
Children banned from mother’s nursing home over social media posts, suit claims →

Now more than ever

Search

Contact Me

Email: info@pogowasright.org

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

Categories

Recent Posts

  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard

RSS Recent Posts on DataBreaches.net

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
©2025 PogoWasRight.org. All rights reserved.
Menu
  • About
  • Privacy