Eric Goldman, Do We Need a New Federal Trade Secret Law?, Santa Clara Univ. Legal Studies Research Paper No. 35-14 (September 2014).
Orin Kerr, Does the federal computer hacking law apply to a laptop not connected to the Internet?, The Volokh Conspiracy (Aug. 25, 2014).
Timothy P. O'Toole, Digital Defense: Meeting the Challenges That the Computer Fraud and Abuse Act Poses, The Champion (September/October 2013).
James Juo, Unauthorized Excess - After the death of Aaron Swartz, lawmakers have proposed reforms to the Computer Fraud and Abuse Act, Los Angeles Lawyer (July/August 2013).
Danielle E. Sunberg, Reining in the Rogue Employee: The Fourth Circuit Limits Employee Liability Under the CFAA, 62 Am. Univ. L. Rev. 1417 (2013).
Lothar Determann, Internet Freedom and Computer Abuse, 35 Hastings Comm. & Ent. L.J. 429 (March 2013).
Internet Law Treatise, Computer Fraud and Abuse Act (CFAA), Electronic Frontier Foundation (2013).
David Thaw, Criminalizing Hacking, Not Dating: Reconstructing the CFAA Intent Requirement, 103 J. Crim. L. & Criminology 907 (2013).
Continue reading below
Andrew T. Hernacki, A Vague Law in a Smartphone World: Limiting the Scope of Unauthorized Access under the Computer Fraud and Abuse Act, 61 Am. U. L. Rev. 1543 (2012).
Warren Thomas, Lenity on Me: LVRC v. BrekkaPoints the Way toward Defining Authorization and Solving the Split Over the Computer Fraud and Abuse Act, 27 Ga. St. U. L. Rev. 379 (2011).
Garrett D. Urban, Causing Damage without Authorization: The Limitations of Current Judicial Interpretations of Employee Authorization under the Computer Fraud and Abuse Act, 52 Wm. & Mary L. Rev. 1369 (2011).
"EFF, NACDL Ask Appeals Court to Block Attempt to Turn Misdemeanors into Felonies," NACDL News Release (August 6, 2010).
Continue reading below
Pre-Trial Suppression & Fourth Amendment Issues
This Trial Guide is a topical and practical handbook examining the nuts and bolts of the most current Fourth Amendment & Pre-Trial Suppression issues encountered in modern criminal cases.
Defense Counsel Playbook for Eyewitness ID Cases
This Trial Guide was written to help counsel use existing case law to its strongest advantage, and to create a framework for appellate challenges urging courts to adopt leading cases.
Ultimate Cross 2.0
This special CLE compilation program includes the highest-rated presentations on Cross-Examination techniques from NACDL's most recent seminars (2017-2019).
Forensic Sciences in Criminal Cases: A Multidiscipline Primer
In order to challenge forensic evidence, experts, reports and findings commonly encountered in the courtroom, an attorney must first have a basic understanding of the forensic issues that they will be confronting.
Orin Kerr, Vagueness Challenges to the Computer Fraud and Abuse Act, GWU Legal Research Paper No. 482 (Dec. 22 2009).
Nicholas R. Johnson, “I Agree” to Criminal Liability: Lori Drew’s Prosecution under §1030(A)(2)(C) of the Computer Fraud and Abuse Act, and Why Every Internet User Should Care, 2009 U. Ill. J.L. Tech. & Pol’y 561 (2009).
Kyle Wesley Brenton, Trade Secret Law and the Computer Fraud and Abuse Act: Two Problems and Two Solutions, U. Ill. J.L. Tech. (Sept. 1, 2009).
Reid Skibell, Cybercrimes & Misdemeanors: A Reevaluation of the Computer Fraud and Abuse Act, 18 Berkley Tech. L.J. 909 (2003).
Orin Kerr, Cybercrime's Scope: Interpreting 'Access' and 'Authorization' in Computer Misuse Statutes, 78 NYU L. Rev. 1596 (2003).