This article is for informational and educational use only. It does not provide legal, financial, or tax advice and does not form an attorney-client relationship. Legal requirements can differ by jurisdiction and may change without notice. A qualified professional can address specific facts and current rules.
Key Facts
- Federal level: 18 U.S.C. § 1030 targets conduct involving unauthorized access or exceeding authorized access to obtain information protected for reasons of national defense or foreign relations.
- Federal level: 18 U.S.C. § 1030 gives the U.S. Secret Service authority to investigate offenses under the section.
- Federal level: 18 U.S.C. § 1030 gives the FBI primary authority to investigate certain § 1030(a)(1) cases involving espionage and foreign counterintelligence for national defense or foreign relations protection reasons.
- Federal level: 50 U.S.C. § 1801 defines foreign intelligence information to include information relating to protecting against actual or potential attacks, sabotage, international terrorism, and WMD proliferation.
- Federal level: 50 U.S.C. § 1801 defines electronic surveillance to include acquiring the contents of wire or radio communications when a U.S. person is intentionally targeted in warrant-requiring circumstances for law-enforcement purposes.
- Federal level: 50 U.S.C. § 1801 defines minimization procedures to minimize acquisition and retention and prohibit dissemination of nonpublicly available information concerning unconsenting U.S. persons.
- Federal level: CISA explains that Executive Order 13691 directed DHS to encourage development of Information Sharing and Analysis Organizations (ISAOs) and coordinate with them via CISA Central for cybersecurity information sharing and analysis.
Last reviewed: May 2026. Legal rules, forms, deadlines, and procedures can change by jurisdiction, agency, and court system.
- Federal criminal cyber law that ties computing conduct to protected national defense and foreign relations information
- How 18 U.S.C. § 1030 allocates investigatory authority in certain national security cases
- FISA definitions that often shape how “intelligence surveillance” fits into cyber threat discussions
- Official agency descriptions that connect cyber investigations to national security and criminal activity
- CISA’s information sharing framework behind many “cybersecurity trends” discussions
- Why this archive recovery matters for modern readers revisiting a 2011 style framing
- Sources
This archive recovery uses official federal sources to explain the legal building blocks that commonly sit behind public discussions of “national security threats” and “cybersecurity trends,” while avoiding unsupported claims about the missing 2011 ABA Now text referenced by the legacy link.
In federal law, national security cyber discussions often converge on two tracks: criminal computer-activity statutes that treat certain protected information differently, and intelligence-surveillance definitions that help distinguish the meaning of key collection concepts under federal law.
Federal criminal cyber law that ties computing conduct to protected national defense and foreign relations information
Federal law provides a criminal framework in 18 U.S.C. § 1030) for “fraud and related activity in connection with computers,” including situations involving knowingly accessing a computer without authorization or exceeding authorized access to obtain information protected against unauthorized disclosure for reasons of national defense or foreign relations.
How 18 U.S.C. § 1030 allocates investigatory authority in certain national security cases
Section 1030 does more than define prohibited conduct; it also identifies investigation authority in specific subsections, including U.S. Secret Service authority and (for some cases) FBI “primary” authority.
| Statutory role inside § 1030 | What the statute says in substance | Source subsection |
|---|---|---|
| U.S. Secret Service investigation authority | The statute assigns the Secret Service authority to investigate offenses under the section | (d) |
| FBI “primary authority” to investigate certain cases | The statute assigns the FBI primary authority to investigate certain § 1030(a)(1) offenses involving espionage and foreign counterintelligence tied to national defense or foreign relations | (e)(2) |
Because these roles appear in the statute, they help explain why “national security cybersecurity threats” discussions frequently reference federal criminal law rather than treating cyber conduct as only a general civil or commercial issue.
FISA definitions that often shape how “intelligence surveillance” fits into cyber threat discussions
When public discussions use intelligence-collection language, the definitions in 50 U.S.C. § 1801) often provide the legal terms of art used in federal frameworks.
Key defined concepts include:
- Foreign intelligence information: information relating to protecting against actual or potential attack or other grave hostile acts, sabotage, international terrorism, and the international proliferation of weapons of mass destruction.
- Electronic surveillance: acquisition of the contents of wire or radio communications when a U.S. person is intentionally targeted in warrant-requiring circumstances for law-enforcement purposes.
- Minimization procedures: procedures designed to minimize acquisition and retention and prohibit dissemination of nonpublicly available information concerning unconsenting U.S. persons, consistent with the need to obtain foreign intelligence information.
Official agency descriptions that connect cyber investigations to national security and criminal activity
Federal criminal cyber law does not operate in a vacuum; agency missions and priorities supply the practical context for why certain cyber investigations are treated as national security-relevant.
- The FBI describes its FBI Cyber Division mission as coordinating, supervising, and facilitating investigations in which Internet, computer systems, or networks are exploited as principal instruments or targets of terrorist organizations, foreign government-sponsored intelligence operations, or criminal activity.
- The U.S. Department of Justice’s Computer Crime and Intellectual Property Section (CCIPS) describes DOJ CCIPS goals as pursuing overarching goals that include deterring and disrupting computer and intellectual property crime, guiding the proper collection of electronic evidence, and providing technical and legal advice and assistance to investigators and prosecutors.
CISA’s information sharing framework behind many “cybersecurity trends” discussions
Separate from criminal enforcement and intelligence definitions, federal policy discussions of “cybersecurity trends” often emphasize information sharing.
CISA’s explanation of CISA information sharing via Executive Order 13691 describes Executive Order 13691 as directing DHS to encourage development of Information Sharing and Analysis Organizations (ISAOs), and it also describes coordination with those organizations via “CISA Central” for cybersecurity information sharing and analysis.
Why this archive recovery matters for modern readers revisiting a 2011 style framing
The specific 2011 ABA Now text referenced by the provided legacy and target URLs was not available in the evidence record used for this recovery, so this article does not attribute particular statements to named counsel or list which “key national security and intelligence agencies” were singled out in the missing excerpt.
What can be recovered responsibly from official sources is the underlying legal architecture that commonly supports the broader 2011-era narrative: 18 U.S.C. § 1030’s national defense and foreign relations protected-information focus, FISA-related definitional terms for foreign intelligence and electronic surveillance, agency mission descriptions for cyber investigations, and CISA’s administrative information-sharing structure tied to Executive Order 13691.
Separation of powers and executive branch oversight archive provides additional archive context for readers who want to connect cybersecurity policy talk to broader government-oversight themes.