8.85 Unauthorized Access Devices-Using or Trafficking (18 U.S.C. Sec. 1029(a)(2)) is a federal law in the United States which makes it illegal to either use or traffic in any device, hardware, software or code that can be used to access a computer or electronic device without authorization. This includes things like hacking tools, stolen access codes, data-mining tools, or any other device that can be used to steal or gain access to a system without permission. It also includes the buying, selling, or otherwise transferring of such devices without authorization. The penalty for violating this law can include fines and/or imprisonment. Types of unauthorized access devices which are covered by this law include but are not limited to: • Hacking tools • Stolen access codes • Data-mining tools • Malware programs • Spyware programs • Keyloggers • Logic bombs • Phishing tools • Password crackers • Exploits • Vulnerability scannerRootkitotkittttts.ts.