From 1984 to 1990, Congress established



Similar documents
INCREASED PENALTIES FOR CYBER SECURITY OFFENSES

Cybercrime: A Sketch of 18 U.S.C and Related Federal Criminal Laws

H. R. To amend titles 17 and 18, United States Code, to strengthen the protection of intellectual property, and for other purposes.

MANDATORY MINIMUM PENALTIES FOR IDENTITY THEFT OFFENSES

MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) SUBJECT: Identity Theft and Assumption Deterrence Act of 1998

Public Hearing Before the. United States Sentencing Commission. Panel Two

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft

The Florida Department of Agriculture and Consumer Services (FDACS) states:

TITLE I FORMER VICE PRESIDENT PROTECTION ACT

COMPUTER FRAUD AND ABUSE ACT. US Code as of: 01/05/99 Title 18 Sec Fraud and related activity in connection with computers

Overview of Federal Criminal Cases

Please see Section IX. for Additional Information:

Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART. Section 3.1 What Is a Crime?

SUBJECT: Department Policy Concerning Charging Criminal Offenses, Disposition of Charges, and Sentencing

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

ASSEMBLY, No. 352 STATE OF NEW JERSEY. 214th LEGISLATURE PRE-FILED FOR INTRODUCTION IN THE 2010 SESSION

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

Please see Section IX. for Additional Information:

Comments to Notice of Proposed Amendments to Federal Sentencing Guidelines Federal Register: F.R. Doc. E F.R. Publication Date: January 28, 2008

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)

Alternative Sentencing in the Federal Criminal Justice System

Computer Fraud & Abuse Act

NC General Statutes - Chapter 14 Article 60 1

District of Columbia Truth-in-Sentencing Commission 950 Pennsylvania Avenue Northwest, Washington, AC

Chapter No. 911] PUBLIC ACTS, CHAPTER NO. 911 HOUSE BILL NO. 3403

18 USC NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

Chapter 15 Criminal Law and Procedures

The Australian Privacy Foundation

New York Consolidated Law Service General Business Law Article 25 - Fair Credit Reporting Act

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

HOUSE DOCKET, NO FILED ON: 2/28/2014. HOUSE... No The Commonwealth of Massachusetts PRESENTED BY: Paul R. Heroux

IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT. No Non-Argument Calendar. D.C. Docket No. 3:11-cr RBD-JBT-1.

Senate Bill 50 (S-1) would amend the Code of Criminal Procedure to add the felonies proposed by Senate Bill 49 (S-1) to the sentencing guidelines.

[Philip Miller, Chief U.S. Probation Officer, Eastern District of Michigan] 2010 PROPOSED AMENDMENTS TO THE SENTENCING GUIDELINES

Updated Administration Proposal: Law Enforcement Provisions

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

SUPREME COURT OF ARIZONA ) ) ) ) ) ) ) ) ) ) ) )

REFERENCE ACTION ANALYST STAFF DIRECTOR 1) Public Safety & Domestic Security Policy Committee 10 Y, 0 N, As CS Billmeier Cunningham SUMMARY ANALYSIS

CRIMES OF DISHONESTY AND BREACH OF TRUST: IS THEFT SUCH A CRIME UNDER 18 U.S.C. 1033(e)?

MANDATORY MINIMUM REPORT FIELD INTERVIEW PROTOCOL FOR U.S. ATTORNEY REPRESENTATIVE

Sycamore Leaf Solutions LLC

New Jersey. Overall Ranking: Top Tier. New Jersey Research Facility Protection Law. N.J. STAT. ANN. 2C:17 3 (2010). Criminal mischief.

METHAMPHETAMINE SAMPLE ARGUMENT

In an age where so many businesses and systems are reliant on computer systems,

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Chapter IDENTITY AND ACCESS DEVICE CRIMES. Table of Instructions

RESPONSIBILITIES OF COUNTY ATTORNEYS AND ASSISTANT COUNTY ATTORNEYS

COMMUNITY PROTOCOL FOR DOMESTIC VIOLENCE CASES

MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008

FEDERAL RESERVE BANK of ATLANTA

Family Policy Compliance Office Guidelines: Disclosure of Education Records Concerning Registered Sex Offenders

Montana Legislative Services Division Legal Services Office. Memorandum

APPENDIX A Quick Reference Chart for Determining Key Immigration Consequences of Common New York Offenses

Section Fraud and related activity in connection with identification documents and information

STATEMENT OF RONALD A. CIMINO DEPUTY ASSISTANT ATTORNEY GENERAL FOR CRIMINAL MATTERS, TAX DIVISION, U.S. DEPARTMENT OF JUSTICE BEFORE THE

FORC QUARTERLY JOURNAL OF INSURANCE LAW AND REGULATION

Written Statement of Cynthia Hujar Orr. on behalf of the NATIONAL ASSOCIATION OF CRIMINAL DEFENSE LAWYERS

FEDERAL RESERVE BANK OF ATLANTA (Logo)

SENTENCING BENCHMARKS

United States Court of Appeals

Security freeze.

MCOLES Information and Tracking Network. Security Policy. Version 2.0

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

A PRIMER: WHAT STATE DEFENDERS MUST KNOW ABOUT FEDERAL LAW. Wendy Holton Attorney, Helena, Montana

Using Administrative Records to Report Federal Criminal Case Processing Statistics

BEFORE THE OFFICE OF ADMINISTRATIVE HEARINGS STATE OF OREGON for the DEPARTMENT OF CONSUMER AND BUSINESS SERVICES INSURANCE DIVISION ) ) ) ) )

109TH CONGRESS 1ST SESSION. discourage spyware, and for other purposes. To amend title 18, United States Code, to AN ACT H. R. 744

(CHRI) CHECKS OF INDIVIDUALS CONDUCTING BUSINESS IN THE AREA OF INSURANCE AND; 2.)

STORAGE NAME: h0151.wfm DATE: October 1, 1999 HOUSE OF REPRESENTATIVES COMMITTEE ON CRIME AND PUNISHMENT ANALYSIS BILL #: HB 151

OKLAHOMA LAWS RELATING TO IDENTITY THEFT

Case 3:09-cr JAP Document 84 Filed 11/30/11 Page 1 of 7 PageID: 376

NOT RECOMMENDED FOR FULL-TEXT PUBLICATION File Name: 10a0141n.06. No UNITED STATES COURT OF APPEALS FOR THE SIXTH CIRCUIT ) ) ) ) ) ) ) ) )

Workplace Policies. Computer Software (Unauthorized Copying)

CHAPTER 58. BE IT ENACTED by the Senate and General Assembly of the State of New Jersey:

COMPLIANCE PROGRAM GUIDANCE FOR MEDICARE FEE-FOR-SERVICE CONTRACTORS

MOBILE BANKING AGREEMENT AND DISCLOSURE ONLINE BANKING ADDENDUM

ALABAMA s FELONY DUI STATUTE- A HISTORY. [This document was originally prepared by AOC and was later revised and updated by Patrick Mahaney.

Comment [1]: BDERIV. Comment [2]: EDERIV

Process Evaluation of the Computer Fraud and Abuse Act of 1986.

TITLE 6: CRIMES AND CRIMINAL PROCEDURE DIVISION 1: CRIMES AGAINST THE PERSON

British Columbia, Crime Statistics in. Crime Statistics in British Columbia, Table of Contents

Copyright (c) 1995 National Association of Criminal Defense Lawyers, Inc. The Champion. January/February, Champion 45

SUBCHAPTER IV. OFFENSES AND PENALTIES

Legislative Language. Law Enforcement Provisions Related to Computer Security

Fraud Act 2006 CHAPTER 35 CONTENTS

Interests of the Commentators

Computer Forensics in Virginia. Presented by: Computer Forensic Examiner Christine Bryce and First Sergeant Rob Keeton

CHAPTER 37 BURGLARY AND HOME INVASION ARTICLE 1 BURGLARY

Legal protection of victims in Germany

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

IMMIGRATION CONSEQUENCES OF SELECTED FLORIDA OFFENSES: A QUICK REFERENCE CHART 1

Criminal Law. Month Content Skills August. Define the term jurisprudence. Introduction to law. What is law? Explain several reasons for having laws.

FEDERAL RESERVE BANK of ATLANTA

WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009

BOBCAT COMPUTING POLICY

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW SENATE BILL 707

Crime Statistics in. Crime Statistics in British Columbia, Table of Contents. Ministry of Justice Police Services Division

IMMIGRATION CONSEQUENCES OF CRIMINAL CONVICTION

Transcription:

U.S. Sentencing Commission One Columbus Circle, N.E. Suite 2-500 Washington, DC 20002-8002 REPORT SUMMARY Summary of Findings Computer Fraud Working Group From 984 to 990, Congress established six new criminal computer offenses, codified at 8 U.S.C. 030 under the caption "Fraud and related activity in connection with computers." During the Commission's 993 amendment cycle, the Department of Justice proposed a new sentencing guideline for cases involving computer fraud and abuse, one that would emphasize harms that cannot be adequately quantified by dollar loss (e.g., intrusion into privacy interests and disruption of telecommunications systems). The Commission responded by organizing the Since their inception, the federal sentencing guidelines have punished criminal computer fraud offenses under the general fraud guideline. In 993, a staff working group considered whether computer fraud offenses differed sufficiently from other more common fraud offenses to justify development of a separate computer fraud guideline. A summary of the working group's findings is provided in this first in a series of periodic reports that will highlight Sentencing Commission research activities. The full report is available through the Depository Libraries of the U.S. Government Printing Office, Superintendent of Documents. Computer Fraud Working Group to study computer fraud offenses and to investigate whether the nature of these crimes was sufficiently distinct from fraud offenses to justify development of a separate sentencing guideline. Computer Fraud Defined Reaching consensus on a definition of computer crime proved to be difficult. One early definition, advocated by John Taber, called it "a crime that, in fact, occurred and in which a computer was directly and significantly instrumental." 2 Taber's definition, while not universally accepted, initiated further discussion. Other scholars, seeking to narrow it, proposed alternative definitions of computer crime: any illegal act where a special knowledge of computer technology is essential for its perpetration, investigation, or prosecution; 3 2 3 The Working Group included members of the Commission's legal, research, and training staffs. J.K. Taber, "One Computer Crime," Computer Law J. 57-543 (979). See also J.K. Taber, "A Survey of Computer Crime Studies," 2 Computer Law J. 275-327 (980). D. Parker, Computer Crime: Criminal Justice Resource Manual 2 (989).

any traditional crime that has acquired a new dimension or order of magnitude through the aid of a computer, and abuses that have come into being because of computers; 4 any financial dishonesty that takes place in a computer environment; 5 and any threats to the computer itself, such as theft of hardware or software, sabotage and demands for ransom. 6 It could be argued that computer crime is not a unique offense but rather a novel means of committing a more traditional offense. Consequently, many computer crimes are prosecuted under such traditional criminal statutes as wire fraud and destruction of property. While existing criminal statutes are sufficiently generic to prosecute many computer-related offenses, these statutes are incomplete. For example, some offenses such as unauthorized access to a computer to permit "electronic browsing" are unique to computers and difficult to prosecute under traditional criminal statutes. These offenses typically target the computer in which proprietary information is stored and generally can be accessed, altered, stolen, or sabotaged without the perpetrator being physically present or without resorting to the use of force. Congress, responding to concerns that computers were being used as criminal instruments, enacted the Counterfeit Access Device and Computer Fraud and Abuse Act of 984 ("the Act"). In debating the need for this new criminal statute, Congress perceived the existing criminal justice system as ineffective against "unconventional computer operation." 7 Difficulties in prosecuting computer-related criminal activity arise because much of the property involved is intangible (in the form of magnetic impulses) and does not mesh well with traditional theft or larceny statutes. This problem was compounded by "the advent of... so-called %hackers& who have been able to access (trespass into) both private and public computer systems, sometimes with potentially serious results." 8 Codified at 8 U.S.C. 030, the Act extended computer-related crime beyond the traditional notions of fraud to other "related activity in connection with computers" by establishing six new offenses: knowingly accessing a computer without authorization to obtain national security data (subsection (a)()); intentionally accessing a computer without authorization to obtain certain confidential financial information (subsection (a)(2)); intentionally accessing a government computer thereby "affect[ing] the use of the government's operation of such computer" (subsection (a)(3)); 4 5 6 7 8 M.C. Gemignani, "What is Computer Crime and Why Should We Care?," 0 U. Ark. Little Rock L.J. 55, 56 (987-88). M. Wasik, Crime and the Computer (99). Id. at 2 (quoting S.L. Mandell, Computer, Data Processing and the Law 55 (984)). H. Rep. No. 98-894, 98th Cong., 2nd. Sess. 9 (984). Id. 2

accessing a computer with intent to defraud and thereby obtaining anything of value (subsection (a)(4)); intentionally accessing a computer without authorization, among other things to alter information, thereby causing a loss of at least $,000 (subsection (a)(5)); and trafficking in a password or similar information through which a computer can be accessed without authorization, knowingly and with intent to defraud (subsection (a)(6)). Empirical Study of Defendants Convicted Under 8 U.S.C. 030 Methodology The Computer Fraud Working Group studied defendants sentenced under the federal sentencing guidelines whose criminal conduct involved computer fraud and abuse. The Department of Justice confirmed the contention in the literature that the prosecution of certain cases involving computer fraud and abuse continued under traditional criminal statutes like wire fraud rather than under the computer fraud and abuse statute, 8 U.S.C. 030. Indeed, the Working Group found that computer fraud cases could be charged under approximately 40 different federal statutes. In the end, the Working Group limited its study to cases in which the defendant was convicted of at least one count of section 030. Commission data for the period January 9, 989, through April 30, 993, include 76 cases in which the statutes of conviction included 8 U.S.C. 030. Of these 76 cases, 50 were available for inspection. 9 The Working Group examined these cases to determine the incidence of significant sentencing factors identified by the Department of Justice in their proposed computer fraud amendment. Results In its examination of the 50 cases in which the defendant was charged under section 030, the Working Group found that the conduct frequently involved general fraud offenses. Table I and Figure I present the distribution of cases by the section 030 subsection charged. Table I indicates that the majority (54%, n=27) of the defendants were charged and convicted of section 030 (a)(4) general fraud. In these cases, the Working Group found that the pecuniary loss was readily quantifiable and that the existing fraud guideline, 2F., adequately addressed the offense conduct. 9 The remaining 26 cases were older and had been archived off-site. 3

Table I DISTRIBUTION OF CASES CONVICTED UNDER 8 U.S.C. 030 BY SUBSECTION CHARGED Subsection Nature of Offense Number Percent (a)() Effect on National Security 0 0 (a)(2) (a)(3) Access to Financial Information Affect Government Use of Computer 2 24 5 0 (a)(4) General Fraud 27 54 (a)(5) Alteration of Information 2 (a)(6) Trafficking in Passwords 6 2 Percentages total more than 00 because one defendant was charged under both subsections (a)(2) and (a)(4). In addition to the fraud offenses, 24 percent (n=2) of the defendants were convicted of subsection (a)(2) improperly accessing financial information. While these cases invoke the privacy provisions of section 030, the Working Group found that the defendant's motivation typically was to commit a fraud. Review of the case documents indicates that ten cases involved credit card fraud or altering credit histories to obtain bank loans improperly. The remaining two cases involved the theft/embezzlement of monies from a financial institution. Again, because the pecuniary loss in these cases was readily quantifiable, the Working Group found that the existing fraud guideline adequately addressed the offense conduct. Of the remaining 2 defendants, five were convicted of accessing a government computer and affecting its use (subsection (a)(3)) by committing the following offenses: improperly accessing a computer to obtain criminal history information from the National Criminal Information Center (NCIC) system for re-sale; 0 improperly accessing a computer to monitor an ongoing criminal investigation; improperly accessing a computer to use e-mail; and programming a computer to delete personal information upon the defendant's resignation from organization. One defendant was convicted of altering government computer information to browse the system, a violation of subsection (a)(5), and six defendants were convicted of trafficking stolen telephone access passwords, a violation of subsection (a)(6). Of these latter defendants, the Working Group found that the existing fraud guideline adequately covered the offense conduct because the loss caused by the use of the stolen telephone access passwords was readily quantifiable. 0 Two defendants were convicted of this offense. 4

Figure I DISTRIBUTION OF CASES CONVICTED UNDER 8 U.S.C. 030 BY SUBSECTION CHARGED In most convictions under section 030, the Working Group found that the courts generally were able to quantify the pecuniary loss (see Table II and Figure II). Table II indicates that the median loss amount was between $0,000 and $20,000; more than 78.3 percent of the cases involved losses to the victim of less than $70,000. Table II DISTRIBUTION OF CASES CONVICTED UNDER 8 U.S.C. 030 BY PECUNIARY LOSS Pecuniary Loss No. Percent Cumulative Percent $2,000 or less 0 2.7 2.7 More than $2,000 6 3.0 34.7 More than $5,000 6 3.0 47.7 More than $0,000 4 8.7 56.4 More than $20,000 6 3.0 69.4 More than $40,000 4 8.7 78. More than $70,000 3 6.5 84.6 More than $20,000 2.2 86.8 More than $200,000 2 4.4 9.2 More than $350,000 2 4.4 95.6 More than $500,000 0 0.0 95.6 More than $800,000 2 4.4 00.0 Four cases were excluded due to missing information describing the pecuniary loss to the victim. Finally, the Working Group found that the penalty imposed generally was proportional to the type of offense committed. Table III describes the distribution of sentences imposed according to the defendant's motivation. While the average sentence imposed was 6.8 months imprisonment, the data indicate that defendants who committed the least serious offenses (i.e., browsing computer systems, demonstrating computer prowess, or committing minor vandalism) were placed on probation; defendants who committed fraud, theft, or embezzlement were sentenced to an average of seven months imprisonment; and defendants who affected the administration of justice or committed industrial espionage were sentenced, on average, to 7.3 months imprisonment. Overall, the Working Group found that most of the cases sentenced pursuant to the guidelines involved economic harms and correlates of the kind addressed by 2F. (e.g., pecuniary loss and planning) and infrequently involved other harms identified by the Department of Justice as important (e.g., invasion of privacy). 5

Recommendation The Working Group concluded that the Commission should not create a separate guideline to govern computer fraud and abuse offenses. This recommendation was based on: () the difficulty in defining and measuring the harms that may flow from computer misconduct; (2) the charging decisions that could lead to application of different guidelines, with different sentencing outcomes, for similar computer crimes; and (3) the lack of empirical support for the creation of a separate guideline. The Working Group's review of the existing literature indicated no consensus on a definition of computer crime. The review of Sentencing Commission case files demonstrated that prosecutors can choose from numerous statutes to charge conduct that arises from computer fraud and abuse. Further, the review indicated that these cases typically involved the types of harms regularly processed under the theft, larceny, and fraud guidelines. Harms described by the Department of Justice as inadequately measured by the fraud guideline's loss table occur very infrequently. Table III DISTRIBUTION OF SENTENCES IMPOSED BY DEFENDANT'S MOTIVATION Defendant s Motivation Number Mean Sentence Total 50 6.8 All Forms of Fraud, Theft or Embezzlement Obtain Free Use of a Communications Facility 42 7.0 6 0.2 Obtain Free Use of a Computer 3 0.3 Other Fraud, Theft, or Embezzlement 33 8.9 Browsing Computer Systems 2 0.0 Demonstrate Computer Prowess 0.0 Vandalism 0.0 Industrial Espionage 8.0 Interference with the Administration of Justice 5 7.2 Other 4 5.0 Number of cases total more than 50 because some defendants were coded as having more than one motivation. Figure II DISTRIBUTION OF CASES CONVICTED UNDER 8 U.S.C. 030 BY PECUNIARY LOSS $2,000 or less $2,000 or more $5,000 or more $0,000 or more $20,000 or more $40,000 or more $70,000 or more $20,000 or more $200,000 or more $350,000 or more $500,000 or more $800,000 or more Pecuniary Loss 0 2 4 6 8 0 2 Number of Defendants Four cases were excluded due to missing information describing the pecuniary loss to the victim. In lieu of creating a separate computer fraud guideline, the Working Group recommended 6

that: () the existing commentary in 2F. be expanded to include the consequential damages of computer crimes; and (2) the Statutory Index be expanded to include references to other existing guidelines (e.g., 2B2.3 (Trespass)) that might address better than the fraud guideline the harms occurring under some subsections of 8 U.S.C. 030. Such changes to the existing commentary offer certain advantages over the creation of a new guideline: definitional problems could be dealt with more easily using commentary (e.g., the commentary generally could describe harms difficult to define such as privacy interests and note that where such harms occur to a significant degree, the court should consider a departure); and supplementing the loss commentary in the fraud guideline to include the relevance of consequential loss in computer fraud cases would conform to the current guideline structure that includes commentary explaining the relevance of consequential loss in product substitution and procurement cases. See USSG 2F., comment. (n. 7(c)). 7