Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
CRS - Cybersecurity 1-28-13

CRS - Cybersecurity 1-28-13

Ratings: (0)|Views: 12|Likes:
Published by Brian Iverson
Congressional request for report on Cyber Crime & US in particular the Cyber Crime Protection Security Act
Thanks to Federation of American Scientists
Congressional request for report on Cyber Crime & US in particular the Cyber Crime Protection Security Act
Thanks to Federation of American Scientists

More info:

Published by: Brian Iverson on Apr 01, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/15/2013

pdf

text

original

 
CRS Report for Congress
 Prepared for Members and Committees of Congress
Cybersecurity: Cyber Crime ProtectionSecurity Act (S. 2111, 112
th
Congress)—A Legal Analysis
Charles Doyle
Senior Specialist in American Public Law January 28, 2013
Congressional Research Service
7-5700www.crs.govR42403
 
Cyber Crime Protection Security Act (S. 2111, 112
th
Congress)—A Legal AnalysisCongressional Research Service
Summary
The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for thecybercrimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses includeespionage, hacking, fraud, destruction, password trafficking, and extortion committed againstcomputers and computer networks. S. 2111 contains some of the enhancements approved by theSenate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S.1151), S.Rept. 112-91 (2011).The bill would (1) establish a three-year mandatory minimum term of imprisonment for aggravated damage to a critical infrastructure computer; (2) streamline and increase the maximum penalties for the cybercrimes proscribed in CFAA; (3) authorize the confiscation of real propertyused to facilitate the commission of such cyberoffenses and permit forfeiture of real and personal property generated by, or used to facilitate the commission of, such an offense, under either civilor criminal forfeiture procedures; (4) add such cybercrimes to the racketeering (RICO) predicateoffense list, permitting some victims to sue for treble damages and attorneys’ fees; (5) increasethe types of password equivalents covered by the trafficking offense and the scope of federal jurisdiction over the crime; (6) confirm that conspiracies to commit one of the CFAA offensescarry the same penalties as the underlying crimes; and (7) provide that a cybercrime prosecutionunder CFAA could not be grounded exclusively on the failure to comply with a term of serviceagreement or similar breach of contract or agreement, apparently in response to prosecutiontheory espoused in
 Drew
. With the exception of this last limitation on prosecutions, the JusticeDepartment has endorsed the proposals found in S. 2111.The bill was placed on the Senate calendar, but the 112
th
Congress adjourned without takingfurther action on S. 2111 or S. 1151.Related CRS reports include CRS Report 97-1025,
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
, available in abridgedform as CRS Report RS20830,
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
.
 
Cyber Crime Protection Security Act (S. 2111, 112
th
Congress)—A Legal AnalysisCongressional Research Service
Contents
Introduction ...................................................................................................................................... 1
 
Background ...................................................................................................................................... 2
 
Aggravated Damage of Infrastructure Computers ........................................................................... 4
 
Forfeiture ......................................................................................................................................... 5
 
Exceeds Authorized Access ............................................................................................................. 7
 
Trafficking in Passwords ................................................................................................................. 9
 
Racketeering Predicates ................................................................................................................. 10
 
Conspiracy ..................................................................................................................................... 11
 
Sentencing Increases ...................................................................................................................... 12
 
Tables
Table 1. Sentences for Violations or Attempted Violations of 18 U.S.C. 1030 ............................. 13
 
Contacts
Author Contact Information........................................................................................................... 14
 

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->