Hacking a Computer or Computer Network

Defend your rights. We've helped 95 clients find attorneys today.

There was a problem with the submission. Please refresh the page and try again
Full Name is required
Email is required
Please add a valid Email
Phone Number is required
Please add a valid Phone Number
Zip Code is required
Please add a valid Zip Code
Description is required
By clicking "Find a Lawyer", you agree to the Martindale-Nolo Texting Terms. Martindale-Nolo and up to 5 participating attorneys may contact you on the number you provided for marketing purposes, discuss available services, etc. Messages may be sent using pre-recorded messages, auto-dialer or other automated technology. You are not required to provide consent as a condition of service. Attorneys have the option, but are not required, to send text messages to you. You will receive up to 2 messages per week from Martindale-Nolo. Frequency from attorney may vary. Message and data rates may apply. Your number will be held in accordance with our Privacy Policy.

You should not send any sensitive or confidential information through this site. Any information sent through this site does not create an attorney-client relationship and may not be treated as privileged or confidential. The lawyer or law firm you are contacting is not required to, and may choose not to, accept you as a client. The Internet is not necessarily secure and emails sent through this site could be intercepted or read by third parties.

We have all seen it in the movies or on television. The hacker, usually a young man in a dark t-shirt and hooded sweatshirt, sits in front of a computer scene, furiously typing, lines of code streaming by on the screen until the screen blinks and he's in—he's hacked into the system.

The real-life hacker could be anyone—a young computer protégé or a hardened criminal. Either way, hacking into a commercial database or computer can have serious consequences, including criminal charges.

What Is Hacking?

Hacking involves "breaking in" to a computer or computer network without permission. The hacker essentially trespasses into the computer or system.

Like a property trespasser, the hacker may be there just to look around or to do some damage. Accessing the computer can be an end, in and of itself, or it can be a step in committing a further crime, such as harming or disabling the computer's programs or stealing information.

Many early hackers were young computer enthusiasts, mostly interested in seeing what they could do, not in criminal activity per se. People still hack computer systems for this reason (some professionally). However, today there is a whole population of people who hack in order to access confidential or private information, often as part of a scheme to commit some other crime, such as:

Some criminal hackers work overseas and have ties to organized crime. The proliferation of hacking programs (sometimes called Trojan Horse software) that allow people to gain entry to systems through email attachments and pop-up advertisements has made hacking accessible even to people without a lot of specialized training or computer knowledge.

Is Hacking Illegal?

Any time a person hacks into a computer without permission, a crime is committed—even if the person doesn't steal information or damage the system. Hacking crimes can be prosecuted in state or federal court, likely for one of the crimes listed above. Some laws also specifically target hacking. For example, the federal government has enacted the Computer Fraud and Abuse Act (CFAA). Many states have enacted their own counterparts to the CFAA.

Under the CFAA, it is a crime to:

  • access or transmit government secrets, including any information pertaining to national security
  • access a government computer without authorization
  • access financial information on a computer without permission
  • access a "protected computer" (almost any computer used in government or business) without permission and with the intent to commit fraud causing losses of more than $5,000, or
  • enter into any computer system and cause damage or loss to the system.

The first person to be convicted under the CFAA had released a "worm" (a self-replicating computer program) that ultimately damaged thousands of computers. (United States v. Morris, 928 F.2d 504 (2nd. Cir. 1991).)

The CFAA also makes it a crime to traffic in computer passwords or threaten to steal information from or cause damage to a computer unless the victim pays money (extortion). (18 U.S.C. § 1030.)

State laws criminalizing hacking may be found under various computer-related crimes, such as computer trespass, unauthorized or unlawful computer access, computer damage, or computer fraud.

What Are the Penalties for Hacking?

Convictions for violating the CFAA can result in federal prison terms of up to five or ten years, or longer, as well as fines. The victims of computer hacking can also sue in civil court for damages (money). Punishment varies for violations of state law.

Obtaining Legal Assistance and Representation

If you are charged with a crime related to hacking, you should talk to a local criminal defense attorney with experience defending such cases. An attorney can tell you what to expect in court and how to best prepare your case. An attorney will be able to help you decide whether you are in a good position to negotiate a plea deal or go to trial, and, if convicted, what sort of sentence is likely to be imposed. Talking to an experienced attorney is the best way to protect your rights and defend yourself.

DEFEND YOUR RIGHTS
Talk to a Defense attorney
We've helped 95 clients find attorneys today.
There was a problem with the submission. Please refresh the page and try again
Full Name is required
Email is required
Please add a valid Email
Phone Number is required
Please add a valid Phone Number
Zip Code is required
Please add a valid Zip Code
Description is required
By clicking "Find a Lawyer", you agree to the Martindale-Nolo Texting Terms. Martindale-Nolo and up to 5 participating attorneys may contact you on the number you provided for marketing purposes, discuss available services, etc. Messages may be sent using pre-recorded messages, auto-dialer or other automated technology. You are not required to provide consent as a condition of service. Attorneys have the option, but are not required, to send text messages to you. You will receive up to 2 messages per week from Martindale-Nolo. Frequency from attorney may vary. Message and data rates may apply. Your number will be held in accordance with our Privacy Policy.

You should not send any sensitive or confidential information through this site. Any information sent through this site does not create an attorney-client relationship and may not be treated as privileged or confidential. The lawyer or law firm you are contacting is not required to, and may choose not to, accept you as a client. The Internet is not necessarily secure and emails sent through this site could be intercepted or read by third parties.

How It Works

  1. Briefly tell us about your case
  2. Provide your contact information
  3. Choose attorneys to contact you