From a lawyer’s perspective, there’s not much difference between what Auernheimer and Spitler did and what Scripps did—both used fairly simple scraping techniques to acquire information that wasn’t protected by a password, firewall, or other security precaution. Spitler’s code generated random numbers in order to test out all possible SIM card identifiers; Wolf emphasized that Scripps didn’t use unscrambling or random number generation in its code. “Nothing we used was sophisticated or required guesswork or isn’t used in other newsrooms in the most basic capacity,” he says. A spokesman for TerraCom emphasized that only a few hundred of the documents Scripps accessed were available through Google, and that accessing the rest required messing around with the URL to find “non-public directories.”
But, as a matter of law, none of these distinctions matter much. “The real issue is: If information is publicly available on the Web, does accessing that information violate the CFAA?” says EFF staff attorney Hanni Fakhoury.
It’s a slippery enough issue that the behavior of the reporter, researcher, or troll accessing the information makes a big difference.
“Ultimately it comes down to the way you disclose the information. We’ve liked the idea that people should responsibly disclose and that they try to go to the company first to resolve the issue,” says EFF’s Fakhoury.
And any reporter using scraping should pay attention to how they approach the task.
“A smart reporter will get in touch—if it’s government data—will get in touch with the agency first,” says Steve Doig, the Knight Chair in Journalism at Arizona State University, who has consulted with a host of publications on computer-assisted reporting. The best approach may be to avoid the issue altogether, by asking for a copy of a database. “At least set up the script in a way that it doesn’t overload the server,” Doig says. “Have it run in the small hours of the night and have a reasonable rate of requests, so that you’re not doing what’s basically a denial of service attack.”
Doig also cautioned, though, that reporters should pay attention to the terms of service of the website they’re accessing. “Companies that have gathered information may make it available, but their terms of use make it clear that they consider their data proprietary and valuable and they would not take well to scraping what all they have,” he says.
And that’s exactly why groups like EFF are pushing for reform to the CFAA. They argue that it’s so broadly written that violating terms of service like those could, in theory, land a person in prison for years. Operating in good faith and in the service of the public helps. But if a company or a government agency decided to go after a reporter for this type of document diving, it could.
Disclosure: CJR has received funding from the Motion Picture Association of America (MPAA) to cover intellectual-property issues, but the organization has no influence on the content.

Sarah, if you are interested in the origins of this kind of CFAA dispute...try this out:
http://itlaw.wikia.com/wiki/EF_Cultural_Travel_v._Explorica
There is a sister case here as well, EF v. Zephr..this--with one legal caveat--dead on point to the questions/issues you raise.
http://www.internetlibrary.com/cases/lib_case312.cfm. If you want to discuss it let me know
#1 Posted by jon stanley, CJR on Fri 14 Jun 2013 at 07:43 AM
Interesting piece. Common sense should get everyone through this. Scripps did nothing wrong. It found information posted by the company in a public place. They simply used enhanced tools to download what was already in a public sphere. If you need an ill-gotten proprietary password to get into a house, an office or a computer file, of course you run the risk of criminal and civil penalties. I don't see Scripps being in any trouble other than from chuckling too hard at a table-thumping attorney. Again, good piece and thanks.
#2 Posted by Bob Frump, CJR on Sun 16 Jun 2013 at 06:06 PM
This smells like a Soviet-style trap; leave bait on an open server then prosecute any reporter that accesses it to scare reporters away from doing research and going back to transcribing official handouts as the news!
#3 Posted by Michael Rivero, CJR on Mon 17 Jun 2013 at 09:58 AM
The histrionics from TerrorCom's (sp? oops) lawyer (which if you say it with an Irish accent, sounds exactly like "liar") are the sorts of aggressive-CYA drivel that the more "Dershowitzy" of the legal fraternity resort to as a first resort.
It's designed as a shot across the bow, and sadly the legal 'profession' can not be bothered bringing these charlatans to ethical heel - and with the cost of .gov monopoly courts being prohibitive to anybody less wealthy than a Middle Eastern potentate, the obvious intent is to bludgeon the whistleblower (for want of a better word) into silence.
And the behaviour of TerrorCom's (oops! sp!) "loyer" is rampantly counterproductive: it shows that the 'victim' company is a bunch of asshats who care more about CYA than the ydo about client information; it serves as a disincentive for those who stumble across such troves to alert the company; and for those of us who know how to Diggety (giggety) it gets us mad.
You wouldn't like us when we's mad. Fnord.
#4 Posted by Kratoklastes, CJR on Mon 17 Jun 2013 at 08:27 PM
RE: Bob Frump's comments:
A man named Andrew Auernheimer is serving a federal prison sentence for doing what Scripps did...no passwords cracking, etc., he just discovered that ATT was storing user information related on their website in a way that was possible to access publicly.
#5 Posted by Brian Carnell, CJR on Tue 18 Jun 2013 at 03:32 PM