PLAY PODCASTS
Van Buren v. US and Amy Coney Barrett’s So-So Textualism
Episode 1220

Van Buren v. US and Amy Coney Barrett’s So-So Textualism

OA1220 - What’s an FBI agent to do when a notorious low life reports a local cop is asking for a bribe? Turn him into a confidential information of course, and see how far you can get that dirty cop to go. A tale of two assholes, steadily making...

Opening Arguments · Opening Arguments Media LLC

December 29, 20251h 6m

Audio is streamed directly from the publisher (dts.podtrac.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

OA1220 - What’s an FBI agent to do when a notorious low life reports a local cop is asking for a bribe? Turn him into a confidential information of course, and see how far you can get that dirty cop to go. A tale of two assholes, steadily making each others’ lives worse and worse, while one is wearing a wire.

Now, why does the Supreme Court care about any of this? Half the conviction hinges on whether this cop “exceeded authorized access” under the Computer Fraud and Abuse Act (CFAA), and no one can agree what that means… including your cohosts. Hear Thomas try to figure out why Amy Coney Barrett is so obsessed with the definition of the word “so”, and Jenessa… defend Clarence Thomas?! This case is a hot mess, but the good news is everyone sucks here and no one wins.

The relevant language: “The Act subjects to criminal liability anyone who “intentionally accesses a computer without authorization or exceeds authorized access,” and thereby obtains computer information. 18 U. S. C. §1030(a)(2). It defines the term “exceeds authorized access” to mean “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.” §1030(e)(6).”

Barrett’s ruling: “In sum, an individual “exceeds authorized access” when he accesses a computer with authorization but then obtains information located in particular areas of the computer—such as files, folders, or databases—that are off limits to him.”

Check out the OA Linktree for all the places to go and things to do!