18 U.S.C. Sec. 1029(A)(5) Fraudulent Transactions with Another's Access Device covers a variety of illegal activities, including trafficking in, using, producing, or possessing with the intent to use, counterfeit, or illegally traffic in an access device; using an access device to obtain something of value with knowledge that the device has been stolen, counterfitted, or obtained with intent to defraud; using an access device without authorization; and exceeding authorized access to obtain or attempt to obtain something of value. In addition, this section also covers the production, possession, or trafficking of devices designed to access protected computers without authorization.