http:--www.usdoj.gov-criminal-cybercrime-
Computer Crime and Intellectual Property Section (CCIPS) 202-514-1026 Fax 202-514-6113 The CCIPS is responsible for implementing the Justice Department's Computer Crime Initiative, a comprehensive program designed to address the growing global computer crime problem. Section attorneys are actively working with other government officials (e.g., the FBI, Department of Defense, NASA) the private sector (including hardware and software vendors and telecommunications companies), academic institutions, and foreign representatives to develop a global response to cyberattacks. These attorneys, who are responsible for resolving unique issues raised by emerging computer and telecommunications technologies, litigate cases, provide litigation support to other prosecutors, train federal law enforcement personnel, comment upon and propose legislation, and coordinate international efforts to combat computer crime. _________________________________________________________________ Information is available via this web site about the following topics: I. COMPUTER FRAUD AND ABUSE 1. The National Information Infrastructure Protection Act of 1996 II. SEARCHING AND SEIZING COMPUTERS 1. Federal Guidelines for Searching and Seizing Computers 2. Supplement to Federal Guidelines for Searching and Seizing Computers III. PROTECTING INTELLECTUAL PROPERTY RIGHTS : Copyrights, Trademarks and Trade Secrets 1. Federal Guidelines for Prosecution of Violations of Intellectual Property Rights 2. Operation "Counter Copy" 3. "No Electronic Theft ('NET') Act" 4. The Economic Espionage Act IV. ENCRYPTION AND COMPUTER CRIME 1. Letter from Attorney General Janet Reno and others to Members of Congress regarding law enforcement's concerns related to encryption 2. Testimony of Deputy Assistant Attorney General Robert S. Litt, Before the Subcommittee on Telecommunications, Trade and Consumer Protection, of the House Commerce Committee on September 4, 1997 V. INTERNATIONAL ASPECTS OF COMPUTER CRIME 1. Attorney General Janet Reno's Speech to Senior Experts Representing the G-7 on January 21, 1997 2. Council of Europe Recommendation 95(13) VI. LAW ENFORCEMENT COORDINATION FOR HIGH-TECH CRIMES 1. Computer-Telecommunications Coordinator ("CTC") Program VII. PRIVACY ISSUES IN THE HIGH-TECH CONTEXT 1. Law Enforcement Concerns Related to Computerized Data Bases Enforcing the Criminal Wiretap Statute Other Relevant Links _________________________________________________________________ I. COMPUTER FRAUD AND ABUSE _________________________________________________________________ A. The National Information Infrascructure Protection Act of 1996 In October 1996, the National Information Infrastructure Protection Act of 1996 was enacted as part of Public Law 104-294. It amended the Computer Fraud and Abuse Act, which is codified at 18 U.S.C. § 1030. Below you will find links to the amended version of 18 U.S.C. § 1030, as well as a legislative analysis, prepared by attorneys from the Computer Crime and Intellectual Property Section. * Legislative Analysis * 18 U.S.C. §1030 Amended B. Other Relevant Web Sites _________________________________________________________________ II. SEARCHING AND SEIZING COMPUTERS _________________________________________________________________ A. Federal Guidelines for Searching and Seizing Computers The process of Searching and Seizing Computers raises unique issues for law enforcement personnel. The Federal Guidelines for searching and seizing computers illustrate some of the ways in which search a computer is different from searching a desk, a file cabinet, or an automobile. * Introductory Remarks * FEDERAL GUIDELINES - Table of Contents * Download the Zipped WordPerfect file [138K]. B. Supplement to Federal Guidelines for Searching and Seizing Computers In October 1997, the Computer Crime and Intellectual Property Section published a Supplement to Federal Guidelines for Searching and Seizing Computers. This Supplement is intended to update the Federal Guidelines for Searching and Seizing Computers that had been published in July 1994. The Supplement describes relevant federal cases decided since July 1994 as well as a number of additional earlier decisions. The Supplement also describes relevant state cases, which had not been incorporated in the original Guidelines. The cases in this Supplement are organized according to the sections in the Guidelines. Supplement to Federal Guidelines for Searching and Seizing Computers Preface to Supplement to Federal Guidelines for Searching and Seizing Computers Supplement to Federal Guidelines for Searching and Seizing Computers - Table of Contents Download the Zipped WordPerfect 6.1 file [231k] C. Other Relevant Web Sites _________________________________________________________________ III. PROTECTING INTELLECTUAL PROPERTY RIGHTS : Copyrights, Trademarks and Trade Secrets _________________________________________________________________ A. Federal Guidelines for Prosecution of Violations of Intellectual Property Rights (Copyrights, Trademarks and Trade Secrets) The importance of the protection of intellectual property to the economic well-being and security of the United States cannot be overestimated. The Computer Crime and Intellectual Property Section wrote the attached manual to assist law enforcement in the investigation and prosecution of violations of federal criminal copyright, trademark, and trade secret laws. Section I of the manual contains an overview of the protection of intellectual property, and discusses the basic scope of copyright, trademark, and trade secret and patent law. Section II focuses on intellectual property entitled to copyright protection and Section III describes the applicability of various federal criminal statutes to copyright infringement. Section IV addresses the prosecution for trafficking in counterfeit goods under 18 U.S.C. § 2320. Section V discusses the prosecution of trade secret thefts and analyzes the recently enacted Economic Espionage Act of 1996. Finally, Section VI contains a list of contact persons, model indictments, search warrant affidavits, jury instructions, state criminal trade secret statutes, and the legislative history of the Copyright Felony Act and the Economic Espionage Act of 1996. * Table of Contents * Download the Manual Zipped WordPerfect file [###K]. B. Operation "Counter Copy" In early May, the Department of Justice and the Federal Bureau of Investigation released the first results of a nationwide law enforcement effort to crack down on trademark and copyright fraud, which is estimated to cost American businesses millions of dollars each year and cheat unsuspecting consumers who purchase counterfeit products. As a result of the joint effort, called Operation "Counter Copy," 35 indictments were returned since the beginning of April for copyright or trademark infringement. More information about Operation Counter Copy, including a press release and brief summaries of the cases, are available via the links below. * Summaries of Cases * FBI page - Counter Copy Cases * Press Release " C. No Electronic Theft ('NET') Act" Computers are changing the way that copyrighted goods are being illegally copied and distributed, creating new challenges for copyright owners and for law enforcement. * The Statement of Kevin V. DiGregrory, Deputy Assistant Attorney General of the Criminal Division before the Subcommittee on Courts and Intellectual Property of the House Committee on the Judiciary, presented September 11, 1997, describes how law enforcement is addressing this challenge and expresses the Department's support for the goals of H.R. 2265, The "No Electronic Theft ('NET') Act." A one page Summary of Statement is also available. D. The Economic Espionage Act The Computer Crime and Intellectual Property Section is also charged with evaluating all requests for approval of charges under the Economic Espionage Act and making a recommendation regarding the approval of such requests to the Attorney General, Deputy Attorney General, or Assistant Attorney General. In addition, the Section also prosecutes certain Economic Espionage cases directly. Four Pillars Case One well-publicized case currently being prosecuted by the Section involves the alleged theft of trade secrets by the Four Pillars Enterprise Company, LTD, of Taiwan from an American corporation. Press releases relating to that case can be found below. * Press Release: Taiwanese businessman and daughter arrested on industrial espionage charges (September 5, 1997) Press Release: Taiwanese firm, its President and his daughter indicted in industrial espionage case; Third individual charged in Ohio case (October 1, 1997) E. Other Relevant Web Sites _________________________________________________________________ IV. ENCRYPTION AND COMPUTER CRIME _________________________________________________________________ The nation's policy on encryption must carefully balance important competing interests. The Department of Justice has a vital stake in the country's encryption policy because encryption may be used not only to protect lawful data against unauthorized intruders, it may also be used to conceal illegitimate materials from law enforcement. While we support the spread of strong encryption, we believe that the widespread dissemination of unbreakable encryption without any accommodation for law enforcement access is a serious threat to public safety and to the integrity of America's commercial infrastructure. Our goal is to encourage the use of strong encryption to protect privacy and commerce, but in a way that preserves (without extending) law enforcement's ability to protect public safety and national security. Accordingly, the Administration has promoted the manufacture and use of key recovery products, aided the development of a global key management infrastructure ("KMI"), and liberalized United States restrictions on the export of robust cryptographic products. We anticipate that market forces will make key recovery products a de facto industry standard and thus preserve the balance of privacy and public safety that our Constitution embodies. A. Letter from Attorney General Janet Reno and others to Members of Congress regarding law enforcement's concerns related to encryption On July 18, 1997, Attorney General Janet Reno and others sent a letter to Members of Congress outlining law enforcement's concerns about the public safety and national security threats posed by unbridled availability of strong encryption. It urged legislators to support a balanced approach that supports commercial and privacy interest while maintaining law enforcement's ability to investigate and prosecute serious crime. This letter was co-signed by: * Louis Freeh, Director, Federal Bureau of Investigation * Barry McCaffrey, Director, Office of National Drug Control Policy * Thomas A. Constantine, Director, Drug Enforcement Administration, * Lewis C. Merletti, Director, United States Secret Service * Raymond W. Kelly, Undersecretary for Enforcement, U.S. Department of Treasury * George J. Weise, Commissioner, United States Customs Service * John W. Magaw, Director, Bureau of Alcohol, Tobacco and Firearms An image of the letter, as signed, as well as the text of the letter is available via the links below: * Image of letter to Congress regarding encryption as signed Text of letter to Congress regarding encryption as signed (WordPerfect) B. Testimony of Robert S. Litt, Deputy Assistant Attorney General, before the Subcommittee on Telecommunications, Trade and Consumer Protection, of the House Commerce Committee, on September 4, 1997 Robert S. Litt, Deputy Assistant Attorney General, Criminal Division, Department of Justice, testified before the Subcommittee on Telecommunications, Trade and Consumer Protection, of the House Commerce Committee, on September 4, 1997. His testimony addressed encryption and one of the bills proposing to modify the United States' regulation of cryptography, H.R. 695. His tesimony, and a summary of his testimony, is available via the link below. * Summary of Robert Litt's testimony before the Subcommittee on Telecommunications, Trade and Consumer Protection, of the House Commerce Committee, on September 4, 1997 Robert Litt's testimony before the Subcommittee on Telecommunications, Trade and Consumer Protection, of the House Commerce Committee, on September 4, 1997 C. Other Relevant Web Sites _________________________________________________________________ V. INTERNATIONAL ASPECTS OF COMPUTER CRIME _________________________________________________________________ With the explosive growth of the Internet worldwide, computer crimes increasingly are prone to have international dimensions. Some of the challenges faced by law enforcement on the international front include: harmonization of countries' criminal laws; locating and identifying perpetrators across borders; and securing electronic evidence of their crimes so that they may be brought to justice. Complex jurisdictional issues arise at each step. The Department of Justice is working with foreign governments through many channels to address global threats related to computer crime. A. Attorney General Janet Reno's speech to Senior Experts representing the G-7 on January 21, 1997 On January 21, 1997, Attorney General Janet Reno spoke to Senior Experts representing the G-7 group of leading industrialized nations (now, with the inclusion of Russia, known as The Eight). The Attorney General's speech addressed the challenges presented to law enforcement by hightech and computer criminals, and she suggested a number ways in which the United States and its allies can respond to this global threat. Her speech is available via the link below. * Janet Reno's speech to Senior Experts representing the G-7 on January 21, 1997 B. Council of Europe Recommendation 95(13) In September 1995, the Council of Europe adopted eighteen (18) recommendations relating to problems of criminal procedural law connected with information technology. These recommendations are available via the link below. * Council of Europe Recommendation 95(13) relating to problems of criminal procedural law connected with information technology, Sept. 1995 C. Other Relevant Web Sites _________________________________________________________________ VI. LAW ENFORCEMENT COORDINATION FOR HIGH-TECH CRIMES _________________________________________________________________ A. Computer-Telecommunications Coordinator ("CTC") Program Coordination among prosecutors in high-tech crime cases has improved dramatically because of the implementation, since January 1995, of the "Computer-Telecommunications Coordinator" ("CTC") program. Under the CTC program, each United States Attorney's Office, as well as a few other Department entities, has designated at least one Assistant U.S. Attorney to serve as a CTC, with a few distinct areas of responsibility. To reach a CTC, contact the Computer Crime and Intellectual Property Section, or the U.S. Attorney's office in a particular district. CTC responsibilities are outlined below. * CTC responsibilities B. Other Relevant Web Sites _________________________________________________________________ VII. PRIVACY ISSUES IN THE HIGH-TECH CONTEXT _________________________________________________________________ A. Law Enforcement Concerns Related to Computerized Data Bases The Computer Crime and Intellectual Property Section of the Department of Justice submitted comments in response to the request of the Federal Trade Commission ("FTC") for comments on its workshop on Consumer Information Privacy and its Data Base Study. The Department is deeply concerned about the safety and security of American citizens. The Department is vigilant to take appropriate measures to guard their privacy while using all the resources at its disposal, including information resources, to investigate and prosecute violations of the federal criminal law. The comments are available via the link below: * CCIPS comments as submitted to the FTC workshop on Consumer Information Privacy and Data Base Study B. Enforcing the Criminal Wiretap Statute The Computer Crime and Intellectual Property Section helps to protect the privacy of Americans by enforcing the criminal wiretap statute, 18 U.S.C.§ 2511. One well-publicized interception involved a conference call in which the Speaker of the House Newt Gingrich participated. The couple that intercepted the call pleaded guilty on April 25, 1997, as is described in the press release below. * Press release regarding guilty plea for interception of a communication C. Other Relevant Web Sites Go to . . . Criminal Home Pages || Justice Department Home Pages _________________________________________________________________ Updated page December 8, 1997 usdoj-jmd/irm/css/jea _________________________________________________________________
participants (1)
-
Jim Choate