Professional Documents
Culture Documents
16-1344 Nosal v. U.S. Amici Curiae Brief of S. Bratus at Al.
16-1344 Nosal v. U.S. Amici Curiae Brief of S. Bratus at Al.
16-1344
In the
Supreme Court of the United States
DAVID NOSAL,
Petitioner,
v.
Respondent.
273488
A
(800) 274-3321 (800) 359-6859
i
TABLE OF CONTENTS
Page
TABLE OF CONTENTS . . . . . . . . . . . . . . . . . . . . . . . . . . i
STATEMENT OF INTEREST OF
AMICI CURIAE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
SUMMARY OF ARGUMENT . . . . . . . . . . . . . . . . . . . . 3
ARGUMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
I. T H E C O U R T S H O U L D G R A N T
CERTIOR A RI TO CL A RIF Y THE
MEANING OF AUTHORIZED ACCESS
TO A COMPUTER UNDER THE CFAA . . . . 5
B. T h e C FA As A m b i g u i t y a s t o
Authorization is Indisputable . . . . . . . . . . 8
3. A g e n c y T h e o r y o f C FA A
Authorization . . . . . . . . . . . . . . . . . . . . . 13
ii
Table of Contents
Page
4. Anti-Hacking Theory of CFAA
Authorization . . . . . . . . . . . . . . . . . . . . . 14
5. Hy b r i d T h e o r i e s o f C FA A
Authorization . . . . . . . . . . . . . . . . . . . . . 16
II. T H E C O U R T S H O U L D G R A N T
CERT IOR A RI T O LI M I T T H E
U N I N T EN DED, DET R I M EN TA L
CONSEQUENCES THE CURRENT
CIRCUIT SPLIT FACILITATES . . . . . . . . . . 17
C. B r o a d B a s e d D e f i n i t i o n s o f
CFA A Author i zat ion May Have
Un i nt e n d e d C o n s e q u e n c e s fo r
Critical Industries . . . . . . . . . . . . . . . . . . . . 19
CONCLUSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
iii
Cited Authorities
Page
United States v. Matthew Keys,
No. 16-10197 (9th Cir.) . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Cited Authorities
Page
Statutes
18 U.S.C. 2701-12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Other Authorities
Cited Authorities
Page
Convention on Cybercrime,
Nov. 23, 3001, E.T. S. No. 185, art. 2 . . . . . . . . . . . . . . 7
Fed R. Crim. P. 29 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
O r i n S . K e r r, Va g u e n e s s C h a l l e n g e s
to the Computer Fraud and Abuse Act,
94 Minn. L. Rev. 1561 (May 2010) . . . . . . . . . . . . . . . 12
vii
Cited Authorities
Page
Peter A. Winn, The Guilty Eye: Unauthorized
Access, Trespass and Pr ivacy,
62 Bus. Law. 1395 (2007) . . . . . . . . . . . . . . . . . . . . . . . 7
SUMMARY OF ARGUMENT
ARGUMENT
v. Nosal, 844 F.3d 1024, 1028 (9th Cir. 2016) (Nosal II).
To bring much needed clarity to this debate, amici
attorneys, professors, and computer scientistsurge the
Court to grant certiorari.
5. See United States v. Nosal, 676 F.3d 854, 859 (9th Cir.
2012) (Nosal I) (discussing how the term should be consistently
interpreted throughout the statute).
1. I n t e n d e d U s e T h e o r y o f C FA A
Authorization
2. C o n t r a c t L a w T h e o r y o f C FA A
Authorization
11. The United States did not appeal the District Courts
ruling.
13
4. A n t i - H a c k i n g T h e o r y o f C FA A
Authorization
CONCLUSION
Respectfully submitted,
Tor Ekeland Roy I. Liebman
Tor Ekeland, P.C. Counsel of Record
43 West 43rd Street, Suite 50 Counsel Press
New York, NY 10036 460 W. 34th Street, 4th Floor
(718) 737-7264 New York, NY 10001
(212) 685-9800
rliebman@counselpress.com
Counsel for Amici Curiae