Generated by GPT-5-mini| United States v. Morris | |
|---|---|
| Case name | United States v. Morris |
| Court | United States District Court for the District of New York; United States Court of Appeals for the Second Circuit |
| Citation | 928 F.2d 504 (2d Cir. 1991); 984 F.2d 1163 (2d Cir. 1993) (sentencing) |
| Decided | 1991–1993 |
| Judges | Motley, Winter, Leval (2d Cir.) |
| Prior | Indictment in District of New York |
| Subsequent | Sentencing affirmed in part, remanded in part |
United States v. Morris. The case involved prosecution of Robert Tappan Morris for releasing a self-replicating computer worm that infected thousands of computer hosts on the Internet in 1988, producing the first conviction under the federal Computer Fraud and Abuse Act; the litigation traversed the United States District Court for the District of New York and the United States Court of Appeals for the Second Circuit and influenced later cybersecurity law and computer crime policy. The prosecution connected actors and institutions active in information technology such as the Massachusetts Institute of Technology, the Defense Advanced Research Projects Agency, the National Science Foundation, and commercial Internet Service Provider operators. The decision intersected with debates in constitutional law, criminal procedure in the United States Constitution, and statutory construction of the Computer Fraud and Abuse Act of 1986.
In 1988 Robert Tappan Morris, then a graduate student at the Massachusetts Institute of Technology, authored and released a self-replicating program that propagated across the Internet by exploiting configuration details of Unix services and weak authentication on academic and research networks administered by entities including Cornell University, Stanford University, University of California, Berkeley, and nodes participating in the National Science Foundation Network. The incident triggered operational responses from network operators such as the Computer Emergency Response Team and led to involvement by the Federal Bureau of Investigation, the United States Attorney's Office for the Southern District of New York, and administrative actors from the Department of Justice and National Science Foundation. Media coverage by outlets like The New York Times, Wired (magazine), and Science (journal) amplified public debate among academics, policymakers at the Office of Technology Assessment, and technologists at venues like the Usenet and DEF CON-era conferences.
Morris was indicted under provisions of the Computer Fraud and Abuse Act for causing unauthorized access and damage to protected computer systems, alongside ancillary counts invoking statutes related to wire fraud, interstate commerce, and conspiratorial liability under federal criminal law. The indictment alleged that the worm exploited sendmail and finger protocols and a default rlogin behavior to force replication, imposing computational burdens on hosts administered by institutions such as Princeton University, Bell Laboratories, and research networks funded by the National Science Foundation. Prosecutors from the United States Attorney's Office framed the conduct as violating statutory protections designed by Congress following testimony from witnesses representing the National Security Agency, the Defense Advanced Research Projects Agency, and private sector entities like AT&T and IBM about harms to network integrity.
At trial in the United States District Court for the District of New York, the factual record included expert testimony from academics at Massachusetts Institute of Technology, operators from Carnegie Mellon University's CERT coordination center, and engineers from Digital Equipment Corporation and Sun Microsystems describing contagion dynamics, code structure, and resource exhaustion effects. The jury convicted Morris on counts under the Computer Fraud and Abuse Act, finding that the worm's propagation and payload caused damage to computer systems and that Morris acted with requisite intent under federal law. The contested legal issues on appeal involved statutory interpretation of terms such as "intentionally" and "damage" in the Computer Fraud and Abuse Act, as well as mens rea standards articulated in precedents from the United States Supreme Court and the Second Circuit Court of Appeals.
Sentencing proceedings referenced federal sentencing guidelines promulgated by the United States Sentencing Commission and considered restitution claims by affected institutions including Harvard University and MIT, with participation by intervening agencies like the Federal Communications Commission and recommendations from the Department of Justice. On appeal to the United States Court of Appeals for the Second Circuit, panels authored opinions analyzing statutory text, legislative history of the Computer Fraud and Abuse Act of 1986, and constitutional safeguards under the Due Process Clause of the United States Constitution. The appellate court affirmed conviction but remanded portions of sentencing and restitution determinations, producing an opinion cited in later decisions by circuits including the Ninth Circuit and decisions scrutinized by commentators in law reviews at institutions such as Yale Law School, Harvard Law School, and Stanford Law School.
The case established a landmark federal precedent for prosecutions under the Computer Fraud and Abuse Act, influencing subsequent enforcement actions by the Department of Justice and policy guidance from the National Institute of Standards and Technology and the Office of Management and Budget. Courts and commentators at venues like the American Bar Association and journals such as the Harvard Law Review and the Columbia Law Review have relied on the opinions for interpretation of statutory terms including "access" and "damage," shaping doctrine in related cases such as prosecutions of conduct attributed to actors linked to cyberespionage and cybercrime groups. The decision catalyzed legislative and regulatory responses engaging lawmakers from the United States Congress and oversight hearings before the Senate Judiciary Committee and House Committee on the Judiciary, and it remains a touchstone in scholarship at centers like the Berkman Klein Center for Internet & Society and the Electronic Frontier Foundation's advocacy.
Category:United States criminal case law