Book Read Free

Advanced Criminal Investigations and Intelligence Operations

Page 46

by Unknown


  Sec. 503. DNA identification of terrorists and other violent offenders.

  Sec. 504. Coordination with law enforcement.

  Sec. 505. Miscellaneous national security authorities.

  Sec. 506. Extension of Secret Service jurisdiction.

  Sec. 507. Disclosure of educational records.

  Sec. 508. Disclosure of information from NCES surveys.

  Title VI: Providing for Victims of Terrorism,

  Public Safety Officers, and Their Families

  Subtitle A: Aid to Families of Public Safety Officers

  Sec. 611. Expedited payment for public safety officers involved in the

  prevention, investigation, rescue, or recovery efforts related to a ter-

  rorist attack.

  Sec. 612. Technical correction with respect to expedited payments for

  heroic public safety officers.

  Sec. 613. Public safety officers benefit program payment increase.

  Sec. 614. Office of Justice programs.

  340

  Appendix B: Computer Crime and Privacy Laws

  Subtitle B: Amendments to the Victims of Crime Act of 1984

  Sec. 621. Crime victims fund.

  Sec. 622. Crime victim compensation.

  Sec. 623. Crime victim assistance.

  Sec. 624. Victims of terrorism.

  Title VII: Increased Information Sharing for

  Critical Infrastructure Protection

  Sec. 711. Expansion of regional information sharing system to facilitate

  Federal-State-local law enforcement response related to terrorist attacks.

  Title VIII: Strengthening the Criminal Laws against Terrorism

  Sec. 801. Terrorist attacks and other acts of violence against mass transportation systems.

  Sec. 802. Definition of domestic terrorism.

  Sec. 803. Prohibition against harboring terrorists.

  Sec. 804. Jurisdiction over crimes committed at U.S. facilities abroad.

  Sec. 805. Material support for terrorism.

  Sec. 806. Assets of terrorist organizations.

  Sec. 807. Technical clarification relating to provision of material sup-

  port to terrorism.

  Sec. 808. Definition of Federal crime of terrorism.

  Sec. 809. No statute of limitation for certain terrorism offenses.

  Sec. 810. Alternate maximum penalties for terrorism offenses.

  Sec. 811. Penalties for terrorist conspiracies.

  Sec. 812. Post-release supervision of terrorists.

  Sec. 813. Inclusion of acts of terrorism as racketeering activity.

  Sec. 814. Deterrence and prevention of cyberterrorism.

  Sec. 815. Additional defense to civil actions relating to preserving

  records in response to Government requests.

  Sec. 816. Development and support of cybersecurity forensic capabilities.

  Sec. 817. Expansion of the biological weapons statute.

  Title IX: Improved Intelligence

  Sec. 901. Responsibilities of Director of Central Intelligence regarding

  foreign intelligence collected under Foreign Intelligence Surveillance

  Act of 1978.

  Sec. 902. Inclusion of international terrorist activities within scope of foreign intelligence under National Security Act of 1947.

  Appendix B: Computer Crime and Privacy Laws

  341

  Sec. 903. Sense of Congress on the establishment and maintenance of

  intelligence relationships to acquire information on terrorists and

  terrorist organizations.

  Sec. 904. Temporary authority to defer submittal to Congress of reports

  on intelligence and intelligence-related matters.

  Sec. 905. Disclosure to Director of Central Intelligence of for-

  eign intelligence-related information with respect to criminal

  investigations.

  Sec. 906. Foreign terrorist asset tracking center.

  Sec. 907. National Virtual Translation Center.

  Sec. 908. Training of government officials regarding identification and

  use of foreign intelligence.

  Title X: Miscellaneous

  Sec. 1001. Review of the department of justice.

  Sec. 1002. Sense of congress.

  Sec. 1003. Definition of “electronic surveillance.”

  Sec. 1004. Venue in money laundering cases.

  Sec. 1005. First responders assistance act.

  Sec. 1006. Inadmissibility of aliens engaged in money laundering.

  Sec. 1007. Authorization of funds for DEA police training in south and

  central Asia.

  Sec. 1008. Feasibility study on use of biometric identifier scanning sys-

  tem with access to the FBI integrated automated fingerprint identi-

  fication system at overseas consular posts and points of entry to the

  United States.

  Sec. 1009. Study of access.

  Sec. 1010. Temporary authority to contract with local and State govern-

  ments for performance of security functions at United States mili-

  tary installations.

  Sec. 1011. Crimes against charitable Americans.

  Sec. 1012. Limitation on issuance of hazmat licenses.

  Sec. 1013. Expressing the sense of the senate concerning the provision

  of funding for bioterrorism preparedness and response.

  Sec. 1014. Grant program for State and local domestic preparedness

  support.

  Sec. 1015. Expansion and reauthorization of the crime identification

  technology act for antiterrorism grants to States and localities.

  Sec. 1016. Critical infrastructures protection.

  342

  Appendix B: Computer Crime and Privacy Laws

  Computer Fraud and Abuse Act (18 U.S.C. 1030)

  § 1030. Fraud and Related Activity

  in Connection with Computers

  (a) Whoever

  (1) having knowingly accessed a computer without authorization or

  exceeding authorized access, and by means of such conduct

  having obtained information that has been determined by the

  United States Government pursuant to an Executive order or

  statute to require protection against unauthorized disclosure

  for reasons of national defense or foreign relations, or any

  restricted data, as defined in paragraph y. of section 11 of the

  Atomic Energy Act of 1954, with reason to believe that such

  information so obtained could be used to the injury of the

  United States, or to the advantage of any foreign nation willfully

  communicates, delivers, transmits, or causes to be communi-

  cated, delivered, or transmitted, or attempts to communicate,

  deliver, transmit or cause to be communicated, delivered, or

  transmitted the same to any person not entitled to receive it, or

  willfully retains the same and fails to deliver it to the officer or

  employee of the United States entitled to receive it;

  (2) intentionally accesses a computer without authorization or

  exceeds authorized access, and thereby obtains

  (A) information contained in a financial record of a financial

  institution, or of a card issuer as defined in section 1602 (n)

  of title 15, or contained in a file of a consumer reporting

  agency on a consumer, as such terms are defined in the Fair

  Credit Reporting Act (15 U.S.C. 1681 et seq.);

  (B) information from any department or agency of the United

  States; or

  (C) information from any protected computer;

  (3) intentional y, without authorization to access any nonpublic com-

  puter of a department or agency of the United States, accesses

  such a computer of that department o
r agency that is exclusively

  for the use of the Government of the United States or, in the case

  of a computer not exclusively for such use, is used by or for the

  Government of the United States and such conduct affects that

  use by or for the Government of the United States;

  (4) knowingly and with intent to defraud, accesses a protected

  computer without authorization, or exceeds authorized access,

  and by means of such conduct furthers the intended fraud and

  obtains anything of value, unless the object of the fraud and the

  Appendix B: Computer Crime and Privacy Laws

  343

  thing obtained consists only of the use of the computer and the

  value of such use is not more than $5000 in any 1-year period;

  (5)

  (A) knowingly causes the transmission of a program, informa-

  tion, code, or command, and as a result of such conduct,

  intentionally causes damage without authorization, to a

  protected computer;

  (B) intentionally accesses a protected computer without autho-

  rization, and as a result of such conduct, recklessly causes

  damage; or

  (C) intentional y accesses a protected computer without autho-

  rization, and as a result of such conduct, causes damage and

  loss.

  (6) knowingly and with intent to defraud traffics (as defined in sec-

  tion 1029) in any password or similar information through which

  a computer may be accessed without authorization, if—

  (A) such trafficking affects interstate or foreign commerce; or

  (B) such computer is used by or for the Government of the

  United States;

  (7) with intent to extort from any person any money or other thing

  of value, transmits in interstate or foreign commerce any

  communication containing any—

  (A) threat to cause damage to a protected computer;

  (B) threat to obtain information from a protected computer

  without authorization or in excess of authorization or to

  impair the confidentiality of information obtained from a

  protected computer without authorization or by exceeding

  authorized access; or

  (C) demand or request for money or other thing of value in

  relation to damage to a protected computer, where such

  damage was caused to facilitate the extortion; shall be

  punished as provided in subsection (c) of this section.

  (b) Whoever conspires to commit or attempts to commit an offense

  under subsection (a) of this section shall be punished as provided in

  subsection (c) of this section.

  (c) The punishment for an offense under subsection (a) or (b) of this

  section is—

  (1)

  (A) a fine under this title or imprisonment for not more than ten

  years, or both, in the case of an offense under subsection (a)

  (1) of this section which does not occur after a conviction for

  another offense under this section, or an attempt to commit

  an offense punishable under this subparagraph; and

  344

  Appendix B: Computer Crime and Privacy Laws

  (B) a fine under this title or imprisonment for not more than

  twenty years, or both, in the case of an offense under sub-

  section (a) (1) of this section which occurs after a convic-

  tion for another offense under this section, or an attempt to

  commit an offense punishable under this subparagraph;

  (2)

  (A) except as provided in subparagraph (B), a fine under this

  title or imprisonment for not more than one year, or both,

  in the case of an offense under subsection (a)(2), (a)(3), or

  (a)(6) of this section which does not occur after a convic-

  tion for another offense under this section, or an attempt to

  commit an offense punishable under this subparagraph;

  (B) a fine under this title or imprisonment for not

  more than 5 years, or both, in the case of an offense

  under subsection (a)(2), or an attempt to commit an offense

  punishable under this subparagraph, if—

  (i) the offense was committed for purposes of commer-

  cial advantage or private financial gain;

  (i ) the offense was committed in furtherance of any crimi-

  nal or tortious act in violation of the Constitution or

  laws of the United States or of any State; or

  (iii) the value of the information obtained exceeds $5,000;

  and

  (C) a fine under this title or imprisonment for not more than

  ten years, or both, in the case of an offense under subsection

  (a)(2), (a)(3) or (a)(6) of this section which occurs after a con-

  viction for another offense under this section, or an attempt

  to commit an offense punishable under this subparagraph;

  (3)

  (A) a fine under this title or imprisonment for not more

  than five years, or both, in the case of an offense under

  subsection (a)(4) or (a)(7) of this section which does not

  occur after a conviction for another offense under this

  section, or an attempt to commit an offense punishable

  under this subparagraph; and

  (B) a fine under this title or imprisonment for not more than

  ten years, or both, in the case of an offense under subsection

  (a)(4), or (a)(7) of this section which occurs after a convic-

  tion for another offense under this section, or an attempt to

  commit an offense punishable under this subparagraph;

  Appendix B: Computer Crime and Privacy Laws

  345

  (4)

  (A) except as provided in subparagraphs (E) and (F), a fine

  under this title, imprisonment for not more than 5 years, or

  both, in the case of—

  (i) an offense under subsection (a)(5)(B), which does

  not occur after a conviction for another offense under

  this section, if the offense caused (or, in the case of an

  attempted offense, would, if completed, have caused)—

  (I) loss to 1 or more persons during any 1-year

  period (and, for purposes of an investigation,

  prosecution, or other proceeding brought by

  the United States only, loss resulting from a

  related course of conduct affecting 1 or more

  other protected computers) aggregating at least

  $5,000 in value;

  (II) the modification or impairment, or potential

  modification or impairment, of the medical

  examination, diagnosis, treatment, or care of 1

  or more individuals;

  (III) physical injury to any person;

  (IV) a threat to public health or safety;

  (V) damage affecting a computer used by or for an

  entity of the United States Government in fur-

  therance of the administration of justice, national

  defense, or national security; or

  (VI) damage affecting 10 or more protected comput-

  ers during any 1-year period; or

  (ii) an attempt to commit an offense punishable under

  this subparagraph;

  (B) except as provided in subparagraphs (E) and (F), a fine

  under this title, imprisonment for not more than 10 years,

  or both, in the case of—

  (i) an offense under subsection (a)(5)(A), which does not

  occur after a conviction for another offense under

  this section, if the offen
se caused (or, in the case of an

  attempted offense, would, if completed, have caused)

  a harm provided in subclauses (I) through (VI) of

  subparagraph (A)(i); or

  (ii) an attempt to commit an offense punishable under

  this subparagraph;

  346

  Appendix B: Computer Crime and Privacy Laws

  (C) except as provided in subparagraphs (E) and (F), a fine

  under this title, imprisonment for not more than 20 years,

  or both, in the case of—

  (i) an offense or an attempt to commit an offense under sub-

  paragraphs (A) or (B) of subsection (a)(5) that occurs after

  a conviction for another offense under this section; or

  (ii) an attempt to commit an offense punishable under

  this subparagraph;

  (D) a fine under this title, imprisonment for not more than

  10 years, or both, in the case of—

  (i) an offense or an attempt to commit an offense under

  subsection (a)(5)(C) that occurs after a conviction for

  another offense under this section; or

  (ii) an attempt to commit an offense punishable under

  this subparagraph;

  (E) if the offender attempts to cause or knowingly or recklessly

  causes serious bodily injury from conduct in violation of

  subsection (a)(5)(A), a fine under this title, imprisonment

  for not more than 20 years, or both;

  (F) if the offender attempts to cause or knowingly or recklessly

  causes death from conduct in violation of subsection (a)(5)

  (A), a fine under this title, imprisonment for any term of

  years or for life, or both; or

  (G) a fine under this title, imprisonment for not more than

  1 year, or both, for—

  (i) any other offense under subsection (a)(5); or

  (ii) an attempt to commit an offense punishable under

  this subparagraph.

  (d)

  (1) The United States Secret Service shall, in addition to any other

 

‹ Prev