11/28/2010 8:49:00 PM Table of Contents COMPUTER FRAUD AND ABUSE ACT .............................................................................................................. 2 ECONOMIC CRIMES ................................................................................................................................................ 5 THREATS AND HARASSMENT ............................................................................................................................ 6 VICE CRIMES ............................................................................................................................................................ 6 CHILD EXPLOITATION CRIMES ......................................................................................................................... 7 ENTRAPMENT/TRAVELER CASES .................................................................................................................... 7 SENTENCING GUIDELINES (PG 278 OF THE BOOK) ................................................................................... 8 4TH AMENDMENT.................................................................................................................................................... 8 ENCRYPTION ........................................................................................................................................................ 11 THE 4TH AMENDMENT IN THE NETWORK CONTEXT.............................................................................. 11 STATUTORY PRIVACY PROTECTIONS ......................................................................................................... 12 THE WIRETAP ACT (“TITLE III”) ................................................................................................................... 13 THE PEN REGISTER STATUTE ........................................................................................................................ 14 STORED COMMUNICATIONS ACT .................................................................................................................. 14 SCOPE OF FEDERAL POWER VS. STATE POWER ...................................................................................... 16 INTERNATIONAL COMPUTER CRIMES......................................................................................................... 17 FISA STUFF ............................................................................................................................................................ 19 Computer Fraud and Abuse Act Access and Authorization o Computer Access- two types Virtual- access when you get into the computer by user’s perception Physical- just visiting a website is access (majority view) Assume everything is access and focus on authorization o Authorization Three ways access can be unauthorized Circumventing code/ “code based” Without Authorization- bypassing a wall by wrong means, guessing a password, exploiting a weakness in a program contrary to its intended use The Authorization given applies to specific computer/files and not the entire network Contract violation Unauthorized access can be defined by terms of service, but are subject to the void for vagueness doctrine Breach of duty of loyalty? Limitations must be on what a person can obtain/alter, but employers MUST limit use Social Norms Disloyal employee 7th Cir sys that breaching duty of loyalty to employer is exceeding authorization (Nosal) 9th Cir- (Brekka) Adopts code based only- if you work for the company, and use the computer to harm your employer, that’s not exceeding access The Computer Fraud and Abuse Act- 18 USC §1030 o (e) Definitions of key terms “Protected computer” is basically any computer now “Exceeds authorized access”- accessing a computer with authorization and using that access to alter information that the person is not entitled to obtain/alter “Damage”- any impairment to the integrity/availability of the data, program, system, or information “Loss”- any reasonable cost to any victim, including consequential damages incurred because of interruption of service Must have a nexus to the intrusion Look at hours worked x hourly rate o (a) Violations of the statute (based on trespass regime of unauthorized access) Prohibits access to a protected computer without authorization and/or exceeding authorized access to a protected computer (1) Hacking to obtain classified government secrets (2) Obtaining information plus unauthorized access Obtaining information includes mere observation of the data Type of data is irrelevant Protected computer is basically any computer Normally a misdemeanor with one year max punishment Felony with 5 year max if o Committed for commercial advantage/ private commercial gain o In furtherance of a criminal act OR o Value of information exceeds $5,000 o Multiple convictions can trigger a felony violation and up to 10 years in prison (3) Trespass to US government computers Always a misdemeanor No requirement that any information be obtained Only for access without authorization (4) Fraud unauthorized access plus computer misuse that furthers a fraud o Property-based approach This section doesn’t apply ONLY IF the object of the fraud is the use of the computer and value of the use is no more than $5,000. (5) Computer misuse that results in damage and intentionally damaging Mens Rea- unauthorized access must be intentional, but damages don’t have to be (A) Knowingly causes damage without authorization o Damage is the thing that is not authorized Sending something to the server that causes damage o Can be misdemeanor or felony (B) Intentional access without authorization that recklessly causes damages o Doesn’t require loss o Requires recklessly impairing integrity of availability of information (C) Intentional access without authorization that causes damages and loss o Strict liability beyond intentional access without authorization Can only be a misdemeanor o Requires impairing integrity or availability of information and causing financial loss (A) and (B) are a felony if o $5000 or more of loss, physical injury, modification of medical diagnosis, threat to public health, US government computers for administering justice, damage to 10 or more computers. (6) Password Trafficking (7) Extortion Prohibits extorting money or property by threats to cause damage to computers 5 year felony o (b) Attempting to violate this statute is a crime as well o (g) Authorizes civil lawsuits under this statute Economic Crimes General Property Crimes o Theft/Fraud- taking with intent to permanently deprive o Possessing stolen property- knowingly possessing property that is stolen o Transporting stolen property- across state lines Electronic Espionage Act o Trade Secrets Punishes stealing, copying without authorization, downloading, uploading, etc. of a trade secret with intent to convert it for the economic benefit of someone other than the owner Trade secret- information with economic value because it is not generally known, and the owner has taken reasonable measures to keep that information a secret Not something tangible- must be something about the product that gives it credence o Fraudulent Documents Deals with fake passports, IDs, government docs generally made by computers Treats these items like contraband- no possession o Access Device Fraud Any card/number/code that can be used to help obtain goods and services Prohibits using, possessing trafficking, etc. to use counterfeit/unauthorized access devices with the intent to defraud Copyright Law o Protects rights in original works in tangible mediums for limited times o Only protects the expression of the idea, not the idea itself o Fair use allows de minimus infringement. Basically small use that’s not economically harmful o Criminal Law factors Defendant infringed the copyright Acted willfully Defendant must know that what he is doing is unlawful Engaging in the business to want/try for a profit is enough Sometimes must prove certain dollar value of loss Felony is total loss of $2500 or more Actual profit not required, just that you want to/are trying to make a profit Intent to profit is just an enhancement to the punishment Threats and Harassment Interstate threat to kidnap or injure the person of another (felony) 18 USC 875(c) o Transmission in interstate/foreign commerce o Threat – serious expression of intent to harm, aimed at achieving some goal o Remember no protection for a true threat- where the speaker means to communicate a serious expression of an intent to commit an act of unlawful violence to a person/group Look at language itself, context, testimony by recipient Threats to harm property/ threats to damage a computer [10 USC 1030(a)(7)] Harassment statute- Crime to make a telephone call/use telecom device without disclosing identity and intent to annoy Cyber stalking- intent to place another in state of reasonable fear of death or serious bodily injury to them, immediate family, spouse/gf, and uses any instrumentality of interstate commerce Vice Crimes Wage Wire Act prohibits being in the business of taking bets if taking bets is illegal under state law o This also prohibits transmission of information assisting in the placing of bets as well as the bets themselves o Very hard to enforce because of jurisdictional issues Obscenity o Can punish distribution, but not possession (except for child porn) o Obscenity test If the average person, using contemporary community standards, would find that the work appeals to the prurient interest Whether the work depicts/describes sexual conduct in a patently offensive way (Community standard) Whether it lacks serious literary, artistic, political, or scientific value Child Exploitation Crimes Receipt, Distribution, and Possession of Digital Contraband o 18 USC 2252(a) (1)Prohibits knowingly sending child pornography in interstate commerce (2) Prohibits exchange of possession of child porn (3) Prohibits selling/possession with intent to sell (4) Prohibits possession on federal property o To prosecute, must show The images possessed depicted real minors (not virtual images) AND Possession requires knowledge and control That the defendant knew the images he possessed depicted real minors Use of direct and circumstantial evidence of actual knowledge or willful blindness Entrapment/Traveler Cases Enticement o Persuading minor to travel interstate to engage in an illegal sexual act o Using means of interstate commerce to persuade/attempt to persuade minor to engage in an illegal sexual act Persuade = actually convince Attempt= substantial step towards persuading Entrapment Defense o Entrapment is a jury question o Defendant has the burden to show he was induced, then the government has the burden to show BRD that the defendant was not induced or that he was predisposed to commit the crime Inducement- opportunity to commit the crime plus some excessive pressure Predisposition- evidence from defendant’s past to show he was unusually inclined to commit the crime o Basically- Did the government’s conduct cause the crime? Sentencing Guidelines (Pg 278 of the book) Special skill enhancement o You are more liable if you use your special skills to exploit people o Special computer skill- extraordinary knowledge of how computers work and how to bypass security systems o Test- Special skill as compared to society at large Computer Misuse Cases/Economic Crimes o Offense level starts at 6 o Punishment based on amount of economic loss (reasonably foreseeable $$ harm) Remember that in 1030 crimes, unforeseeable $$ harms are included in loss o Guilty plea- deduct 2 points Child porn o Start with 18 points (for just possession) or 22 (for distribution, receipt, or possession w/ intent to sell) Special circumstances of supervised release must be reasonably related to factors (Factors to argue- not binding) o Nature of the circumstances of offense/defendant’s record o Adequate deterrence to criminal conduct o Protecting the public from future crimes o Can't be greater deprivation of liberty than reasonably necessary to achieve goal 4th Amendment Search- invasion into someone’s reasonable expectation of privacy o Must be objectively and subjectively reasonable o Presumptively unreasonable if no warrant unless exception applies Exigency, Consent, SITLA, Border searches, Plain view o Test for government action Whether government knew of and acquiesced in the search Whether private person intended to assist law enforcement or had some other specific motivation o Things that are visible on the outside are not protected by 4A, just like a container Seizure- meaningful interference with an individual’s possessory interest in that property o Data seizures Copying serial numbers is not a seizure- no interference with possessory interest in property Pen register- seizure of number dialed 4th amendment protects the information, not just the media that it’s on. Sniffing for a password is not a seizure because no violation of possessory interest If a private actor conducts a computer search, three options for what the police can access o Only the entirety of the file(s) previously searched/exposed o The entire physical device (5th Cir rule) o Only the information exposed (meaning parts of files seen) Exceptions to the Warrant Requirement o Knock and talk o Exigency- degree of urgency and time it would take to get a warrant Generally, for computer crimes, there can be a warrantless seizure but not a warrantless search because once you have the data, it’s not going anywhere o Consent- what a typical reasonable person would believe the scope of the consent is 3rd party consent- common authority is enough, but password protection defeats common authority Also invalid where 1st party is present and objects Apparent authority- search may still be reasonable if officers reasonably believed at the time of the search that the 3P had authority to consent Password protection is the same as a locked trunk o SITLA- can search the person and his wingspan pursuant to lawful arrest Can search pagers pursuant to lawful arrest (exigency) Probably can't search a cell phone incident to arrest because too much information and not necessary for cop’s safety o Border Searches- Warrantless searches at the border are permissible under sovereignty grounds. No cause or warrant needed. o Workplace Searches Private Sector- 4th Amendment applies, employees have a reasonable expectation of privacy except things that are open to the public Employers can consent usually under 3P doctrine or police need a warrant Public sector- Government workers have a REP unless Others have access to the same space Legitimate workplace regulations can deprive employees of privacy rights this is critical to the inquiry Court must determine whether the search was reasonable in scope, work related, and justified by non-law enforcement needs Search Warrants o Probable cause requirement applies to any computers in the home Fair probability that contraband/evidence of a crime will be found in a particular place o Must be sufficiently particular Test Whether PC exists to seize all items of a particular type described in the warrant Whether the warrant sets out objective standards by which executing officers can differentiate items subject to seizure from those which are not AND Whether the government was able to describe the items more particularly in light of the information available to it at the time the warrant was issued Also: Must be more particular than “all computers”, but can just list category of electronically stored evidence that the police are looking for Good faith exception: Error in approval of the warrant doesn’t require suppression if officers relied on the warrant in good faith o Plain View exception- can seize evidence unrelated to the justification of the search if the incriminating nature of the evidence is apparent. Subjective standard- As long as the officer is looking for evidence described in the warrant, evidence beyond the scope of the warrant is admissible. (Majority view) Objective standard- If the warrant gives the authority to open and look at each file, there is no violation of privacy regardless of the officer’s subjective motivations. Encryption The 5th amendment applies to prevent a person from incriminating themselves by entering a password if o There is legal force applied o The information is incriminating o The conduct/statement is testimonial Typing a password to decrypt can be testimonial Assume this is the law everywhere The 4th Amendment in the Network Context Ways to conceptualize o Internet as letters- communications over the internet are like sent letters Outside of the letter is not protected because it’s exposed Contents of the letter are protected Exception- Pen Register is not a search because no REP in numbers dialed o Internet as speech- no 4th amendment rights because you are speaking out loud with no REP For Content Information and privacy, all judicial opinions have been stricken, but some factors to balance o User perception o ISP practice o Analogy to telegraphs, etc. o Terms of service of the ISP o Legislation Kerr’s view: Communications networks are substitutes for what happens in the real world. The 4th amendment should be technology neutral. o Means there should be 4th amendment protection for content information, but not non-content because it would be public. Statutory Privacy Protections First question: is the Surveillance Prospective or Retrospective? o Prospective- real time during transit/ in the course of transmission Wiretapping goes here o Retrospective- access to stored communications kept in ordinary course of business by a 3rd party provider Second question: Content or Non-Content Information? o Content- substance of the message o Non-Content- information used to deliver communication and network generated information Prospective Retrospective Contents Wiretap Act (18 U.S.C. § 2510-22) Stored Comm. Act (18 U.S.C. § 2701-11) Non-Content Pen Register Statute (18 U.S.C. § 3121-27) Stored Comm. Act The Wiretap Act (“Title III”) Remember this only applies to real time content (repeated access in transit) access o Real time- repeated accesses in transit Prohibits the interception of communications without a court order o Very high burden to meet (higher than probable cause) o Most of the time, exceptions are used instead Delineation between wire and electronic communications o Wire- communications that contain the human voice and sent over a wire (basically telephone) o Electronic- doesn’t contain a human voice o Basically this Act applies as soon as communication is sent into the network and ends when delivered to the end user The only suppression remedy is for the telephone and not electronics If Surveillance Tool is programmed to pick up contents, it must comply with the Wiretap Act. o If programmed to pick up dialing, routing, addressing, or signaling (DRAS) information, the tool must comply with the pen/trap statute Lingering Policy Question o How much protection should be offered for each type of surveillance? Too low fishing expedition, too high harmful to investigation Key is to balance privacy and law enforcement needs Exceptions to the Court Order Requirement o Consent- Any party to a communication can consent to monitoring Only one party’s consent is needed Defining “party”- easy to figure out for the phone, for the internet, either look at who the communication is addressed to or who can consent to the communication Must be consent in fact, but can be inferred from actual notice o Provider Exception- The network can provide monitoring to uphold the integrity of the network Basic standard is reasonableness in protecting the integrity of the network Exception is very narrow and has to be provider driven The government can't direct the provider to monitor Motive of the provider basically needs to be protection of property o Trespasser Exception [18 USC 2511(i)] Allows a person acting under color of state law to intercept communications of a trespasser if Owner/operator of the protected computer authorizes the interception The person acting is lawfully engaged in an investigation Person has reasonable grounds to believe the contents of the trespasser’s communications will be relevant to the investigation AND He only acquires communications transmitted to or from the trespasser The Pen Register Statute If dialing, routing, addressing, addressing, or signaling information, use Pen Register For collecting non-content information in real time o Remember no 4th amendment protection for this information Can't use a pen register or trap device without a court order o Remedies for violations of this are criminal misdemeanors o No suppression remedies for a violation though If there was a court order, was it done properly? o Identification, Certification that the information is relevant, Issued by magistrate The Exceptions are almost the same as those for the Wiretap Act, but apply to private actors as well o Consent- allows caller ID o Provider- extra broad to prevent unlawful/abusive use of service Stored Communications Act (See Chart on pg. 517) Governs privacy of records held by 3rd party ISPs Any time the government want to get information on an internet user from an ISP, it must comply with the SCA Content Information- o Remote Computing Service vs. Electronic Communications Service RCS- Providing computer storage to the public by means of an ECS Maybe only a subpoena/court order plus notice is needed to access RCS For retrieved email, public ISP is RCS Except in the 9th Circuit where all email is ECS until it expires in the normal course ISP storing/processing communications is RCS if available to the public If not available to the public, its neither an ECS or RCS (4th amendment protection is all you get) ECS- Any service that allows users to send/receive wire or electronic communications Requires a warrant to access Internet user using the ISP to send/receive communications makes ISP an ECS For unopened email, ISP is ECS No protection for remotely stored files held by non-public provider Ex- Private Law Firm. Only a 4th amendment question Non- Content Information o General records of information regarding a customer/subscriber o Specific types of information- name, address, billing credit card, length of service, logs of session times, list of assigned IP addresses Compelled Disclosure 18 USC 2703 o Thresholds to Compel Basic subscriber information- subpoena Session logs/IP addresses-subpoena Other records- 2703(d) order Contents held by an ECS Warrant needed if held for less than 180 days, treat as RCS if held for more Content held by an RCS Subpoena with notice OR 2703(d) order with notice OR “Specific and articulable facts” order Can delay notice by 90 days with showing of good cause Warrant without notice. o Preservation Request Allows the government to request that a provider preserve records already created pending legal process. Only applies to records already created Voluntary Disclosure 18 USC 2702 o Non-public provider can disclose any stored materials at will o Public provider Can’t disclose content(e-mails, documents, etc.) unless Consent of addressee, intended recipient, or his agent Provider exception from Wiretap Act Exigent circumstances Inadvertently obtained and appear to pertain to a crime Can't disclose non-content/records (subscriber information, etc.) unless Consent by customer/subscriber Disclosure to someone non-governmental Exigency Provider exception If the information is content and non-content, must satisfy both exceptions Scope of Federal Power vs. State Power Federal o Constitutionally- Congress can regulate purely personal use if it affects interstate commerce in the aggregate (Rational basis) Local production of child porn substantially affects interstate commerce o Substantive Power- Basically the internet allows inference of interstate movement So crimes by be committed in a method affecting interstate commerce and not in interstate commerce State o Substantive Limits- Constitution/Dormant Commerce Clause What states can/can't regulate is based on what other states/Fed is doing States can enact concurrent criminal statutes (mirroring 1030 or child porn) Can have computer crimes statutes is Identical to state/federal regulations Somehow applies to purely intrastate commerce Can't enact new types of laws Pike Balancing Test- State can't regulate intrastate transactions if the impact on interstate commerce outweighs the local benefits o Procedural Limits Federal statutory laws that impose explicit limit on state law procedure State Statutes can be more restrictive than the Federal statute State Constitutions Must follow 4th amendment rules Practical Investigatory Issues State court order is only binding in that state Out of state evidence collection Voluntary assistance Other state can open up an investigation Give to Feds International Computer Crimes To get jurisdiction over someone internationally for computer crimes (one or both) o Intended effect doctrine- If the person abroad intended and actually caused detrimental effects within the US, there is jurisdiction to bring charges in the US. o Extraterritoriality- For charge someone with an international computer crime, Congress must have intended it to apply to computers in foreign commerce Can be inferred thru intent to be enforced outside the US International Evidence Collection o Procedurally Only a 4th amendment question You have 4th amendment rights abroad only if you have a voluntary connection to the US (basically resident aliens and citizens) If the US is on a join venture with a foreign government, as long as the laws of the foreign government are reasonably complied with, and doesn’t shock the conscience, its not a 4th amendment problem (admissible). o Substantively Rogatory Letters Request from tribunal in one country to tribunal in another Very slow process- 6-12 months Treaties Extradition Requires the crime to be a crime in both countries. Must be a felony in the US and should carry the potential penalty of at least 1 year in prison Mutual Legal Assistance Treaties Imposes mutual legal obligations on evidence collection US has MLAT with 45 countries o No extradition if prosecution would violate US constitutional law. 24 Hour Contact Points Each country has 24 hour access to computer crime agents and prosecutors to evidence collection in an emergency (US and most of Western Europe plus Canada and South Korea and Japan) Policy Proposals Uniform substantive laws for extradition and dual criminality MLAT. Also to avoid safe havens and synchronize legal assistance One world government? European law? US law? Very broad substantive and procedural laws Effects on domestic power? Privacy? Council of Europe Cybercrime Convention Enacts something similar to US law (1030, etc.) FISA Stuff Can conduct surveillance on foreign agent without a warrant if it meets the test o Foreign agent- spies, terrorists, foreign embassy officials o Test: Probable cause that the person is agent of foreign power, significant purpose is for foreign intelligence power FISA Pen Register Statute- same idea but for national security purpose, not for a criminal case “Protect America Act” o FISA warrants not needed to monitor targets reasonably believed to be located outside of the US Can get email from Gmail server of people believed to be outside the US