Maybe it could count as "knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value".[0]
But they only bring out that kind of prosecutorial initiative and creativity, if you downloaded a bunch of academic articles after previously identifying yourself as a bit of a troublemaker (Aaron Swartz). Who cares about some old immigrant's restaurant? OK, enough cynicism for today..
But they only bring out that kind of prosecutorial initiative and creativity, if you downloaded a bunch of academic articles after previously identifying yourself as a bit of a troublemaker (Aaron Swartz). Who cares about some old immigrant's restaurant? OK, enough cynicism for today..
[0] http://www.law.cornell.edu/uscode/text/18/1030