home *** CD-ROM | disk | FTP | other *** search
- From telecom@delta.eecs.nwu.edu Mon Feb 1 10:12:37 1993
- Received: from delta.eecs.nwu.edu by gaak.LCS.MIT.EDU via TCP with SMTP
- id AA00606; Mon, 1 Feb 93 10:12:31 EST
- Received: by delta.eecs.nwu.edu id AA13053
- (5.65c/IDA-1.4.4 for ptownson@gaak.lcs.mit.edu); Mon, 1 Feb 1993 09:11:45 -0600
- Date: Mon, 1 Feb 1993 09:11:45 -0600
- From: TELECOM Moderator <telecom@delta.eecs.nwu.edu>
- Message-Id: <199302011511.AA13053@delta.eecs.nwu.edu>
- To: ptownson@gaak.LCS.MIT.EDU
- Subject: computer crime put in security files
- Status: R
-
-
- Path: telecom-request@eecs.nwu.edu
- From: TELECOM Moderator
- Newsgroups: comp.dcom.telecom
- Subject: Federal Crackdown on Computer Abuse and Misuse
- Message-ID: <02.01.93.1@eecs.nwu.edu>
- Date: Mon, 1 Feb 1993 09:10:00 CST
- Sender: telecom@eecs.nwu.edu
- Reply-To: TELECOM Moderator <telecom@eecs.nwu.edu>
- Organization: TELECOM Digest
- Lines: 314
- Approved: Telecom@eecs.nwu.edu
- X-Submissions-To: telecom@eecs.nwu.edu
- X-Administrivia-To: telecom-request@eecs.nwu.edu
-
- I received this file over the weekend and am passing it along FYI to
- TELECOM Digest readers. It appears the government wants to see time in
- prison for anyone/everyone found guilty of numerous crimes involving
- the use of computers, based on the sentencing guidelines proposed.
-
- Comments should be directed to the CPSR, the Sentencing Commission, or
- one of the newsgroups/mailing lists where the discussion will no doubt
- be continuing, such as Computer Underground Digest.
-
-
- PAT
-
- Organization: Computer Professionals for Social Responsibility
- From: Dave Banisar <banisar@washofc.cpsr.org>
- Date: Sat, 30 Jan 1993 15:12:11 EST
- Subject: Revised Computer Crime Sentencing Guidelines
-
- From Jack King (gjk@well.sf.ca.us)
-
- The U.S. Dept. of Justice has asked the U.S. Sentencing Commission to
- promulgate a new federal sentencing guideline, Sec. 2F2.1,
- specifically addressing the Computer Fraud and Abuse Act of 1988 (18
- USC 1030), with a base offense level of 6 and enhancements of 4 to 6
- levels for violations of specific provisions of the statute. The new
- guideline practically guarantees some period of confinement, even for
- first offenders who plead guilty.
-
- For example, the guideline would provide that if the defendant
- obtained ``protected'' information (defined as ``private information,
- non-public government information, or proprietary commercial
- information), the offense level would be increased by two; if the
- defendant disclosed protected information to any person, the offense
- level would be increased by four levels, and if the defendant
- distributed the information by means of "a general distribution
- system," the offense level would go up six levels.
-
- The proposed commentary explains that a "general distribution system"
- includes "electronic bulletin board and voice mail systems,
- newsletters and other publications, and any other form of group
- dissemination, by any means."
-
- So, in effect, a person who obtains information from the computer of
- another, and gives that information to another gets a base offense
- level of 10; if he used a 'zine or BBS to disseminate it, he would get
- a base offense level of 12. The federal guidelines prescribe 6-12
- months in jail for a first offender with an offense level of 10, and
- 10-16 months for same with an offense level of 12. Pleading guilty
- can get the base offense level down by two levels; probation would
- then be an option for the first offender with an offense level of 10
- (reduced to 8). But remember: there is no more federal parole. The
- time a defendant gets is the time s/he serves (minus a couple days a
- month "good time").
-
- If, however, the offense caused an economic loss, the offense level
- would be increased according to the general fraud table (Sec. 2F1.1).
- The proposed commentary explains that computer offenses often cause
- intangible harms, such as individual privacy rights or by impairing
- computer operations, property values not readily translatable to the
- general fraud table. The proposed commentary also suggests that if the
- defendant has a prior conviction for "similar misconduct that is not
- adequately reflected in the criminal history score, an upward
- departure may be warranted." An upward departure may also be
- warranted, DOJ suggests, if "the defendant's conduct has affected or
- was likely to affect public service or confidence" in "public
- interests" such as common carriers, utilities, and institutions.
-
- Based on the way U.S. Attorneys and their computer experts have
- guesstimated economic "losses" in a few prior cases, a convicted
- tamperer can get whacked with a couple of years in the slammer, a
- whopping fine, full "restitution" and one to two years of supervised
- release (which is like going to a parole officer). (Actually, it *is*
- going to a parole officer, because although there is no more federal
- parole, they didn't get rid of all those parole officers. They have
- them supervise convicts' return to society.)
-
- This, and other proposed sentencing guidelines, can be found at 57 Fed
- Reg 62832-62857 (Dec. 31, 1992).
-
- The U.S. Sentencing Commission wants to hear from YOU. Write: U.S.
- Sentencing Commission, One Columbus Circle, N.E., Suite 2-500,
- Washington DC 20002-8002, Attention: Public Information. Comments
- must be received by March 15, 1993.
-
-
- * * *
-
- Actual text of relevant ammendments:
-
- UNITED STATES SENTENCING COMMISSION
- AGENCY: United States Sentencing Commission.
- 57 FR 62832
-
- December 31, 1992
-
- Sentencing Guidelines for United States Courts
-
- ACTION: Notice of proposed amendments to sentencing guidelines, policy
- statements, and commentary. Request for public comment. Notice of
- hearing.
-
- SUMMARY: The Commission is considering promulgating certain amendments
- to the sentencing guidelines, policy statements, and commentary. The
- proposed amendments and a synopsis of issues to be addressed are set
- forth below. The Commission may report amendments to the Congress on
- or before May 1, 1993. Comment is sought on all proposals, alternative
- proposals, and any other aspect of the sentencing guidelines, policy
- statements, and commentary.
-
- DATES: The Commission has scheduled a public hearing on these proposed
- amendments for March 22, 1993, at 9:30 a.m. at the Ceremonial
- Courtroom, United States Courthouse, 3d and Constitution Avenue, NW.,
- Washington, DC 20001.
-
- Anyone wishing to testify at this public hearing should notify
- Michael Courlander, Public Information Specialist, at (202) 273-4590
- by March 1, 1993.
-
- Public comment, as well as written testimony for the hearing,
- should be received by the Commission no later than March 15, 1993, in
- order to be considered by the Commission in the promulgation of
- amendments due to the Congress by May 1, 1993.
-
- ADDRESSES: Public comment should be sent to: United States Sentencing
- Commission, One Columbus Circle, NE., suite 2-500, South Lobby,
- Washington, DC 20002-8002, Attention: Public Information.
-
- FOR FURTHER INFORMATION CONTACT: Michael Courlander, Public
- Information Specialist, Telephone: (202) 273-4590.
-
- * * *
-
- 59. Synopsis of Amendment: This amendment creates a new guideline
- applicable to violations of the Computer Fraud and Abuse Act of 1988
- (18 U.S.C. 1030). Violations of this statute are currently subject to
- the fraud guidelines at S. 2F1.1, which rely heavily on the dollar
- amount of loss caused to the victim. Computer offenses, however,
- commonly protect against harms that cannot be adequately quantified by
- examining dollar losses. Illegal access to consumer credit reports,
- for example, which may have little monetary value, nevertheless can
- represent a serious intrusion into privacy interests. Illegal
- intrusions in the computers which control telephone systems may
- disrupt normal telephone service and present hazards to emergency
- systems, neither of which are readily quantifiable. This amendment
- proposes a new Section 2F2.1, which provides sentencing guidelines
- particularly designed for this unique and rapidly developing area of
- the law.
-
- Proposed Amendment: Part F is amended by inserting the following
- section, numbered S. 2F2.1, and captioned "Computer Fraud and Abuse,"
- immediately following Section 2F1.2:
-
- "S. 2F2.1. Computer Fraud and Abuse
-
- (a) Base Offense Level: 6
-
- (b) Specific Offense Characteristics
-
- (1) Reliability of data. If the defendant altered information,
- increase by 2 levels; if the defendant altered protected information,
- or public records filed or maintained under law or regulation,
- increase by 6 levels.
-
- (2) Confidentiality of data. If the defendant obtained protected
- information, increase by 2 levels; if the defendant disclosed
- protected information to any person, increase by 4 levels; if the
- defendant disclosed protected information to the public by means of a
- general distribution system, increase by 6 levels.
-
- Provided that the cumulative adjustments from (1) and (2), shall
- not exceed 8.
-
- (3) If the offense caused or was likely to cause
-
- (A) interference with the administration of justice (civil or
- criminal) or harm to any person's health or safety, or
-
- (B) interference with any facility (public or private) or
- communications network that serves the public health or safety,
- increase by 6 levels.
-
- (4) If the offense caused economic loss, increase the offense
- level according to the tables in S. 2F1.1 (Fraud and Deceit). In
- using those tables, include the following:
-
- (A) Costs of system recovery, and
-
- (B) Consequential losses from trafficking in passwords.
-
- (5) If an offense was committed for the purpose of malicious
- destruction or damage, increase by 4 levels.
-
- (c) Cross References
-
- (1) If the offense is also covered by another offense guideline
- section, apply that offense guideline section if the resulting level
- is greater. Other guidelines that may cover the same conduct include,
- for example: for 18 U.S.C. 1030(a)(1), S. 2M3.2 (Gathering National
- Defense Information); for 18 U.S.C. 1030(a)(3), S. 2B1.1 (Larceny,
- Embezzlement, and Other Forms of Theft), S. 2B1.2 (Receiving,
- Transporting, Transferring, Transmitting, or Possessing Stolen
-
- Property), and S. 2H3.1 (Interception of Communications or
- Eavesdropping); for 18 U.S.C. 1030(a)(4), S. 2F1.1 (Fraud and
- Deceit), and S. 2B1.1 (Larceny, Embezzlement, and Other Forms of
- Theft); for 18 U.S.C. S. 1030(a)(5), S. 2H2.1 (Obstructing an
- Election or Registration), S. 2J1.2 (Obstruction of Justice), and S.
- 2B3.2 (Extortion); and for 18 U.S.C. S. 1030(a)(6), S. 2F1.1 (Fraud
- and Deceit) and S. 2B1.1 (Larceny, Embezzlement, and Other Forms of
- Theft).
-
- Commentary
-
- Statutory Provisions: 18 U.S.C. 1030(a)(1)-(a)(6)
-
- Application Notes:
-
- 1. This guideline is necessary because computer offenses often harm
- intangible values, such as privacy rights or the unimpaired operation
- of networks, more than the kinds of property values which the general
- fraud table measures. See S. 2F1.1, Note 10. If the defendant was
- previously convicted of similar misconduct that is not adequately
- reflected in the criminal history score, an upward departure may be
- warranted.
-
- 2. The harms expressed in paragraph (b)(1) pertain to the
- reliability and integrity of data; those in (b)(2) concern the
- confidentiality and privacy of data. Although some crimes will cause
- both harms, it is possible to cause either one alone. Clearly a
- defendant can obtain or distribute protected information without
- altering it. And by launching a virus, a defendant may alter or
- destroy data without ever obtaining it. For this reason, the harms are
- listed separately and are meant to be cumulative.
-
- 3. The terms "information," "records," and "data" are
- interchangeable.
-
- 4. The term "protected information" means private information,
- non-public government information, or proprietary commercial
- information.
-
- 5. The term "private information" means confidential information
- (including medical, financial, educational, employment, legal, and tax
- information) maintained under law, regulation, or other duty (whether
- held by public agencies or privately) regarding the history or status
- of any person, business, corporation, or other organization.
-
- 6. The term "non-public government information" means unclassified
- information which was maintained by any government agency, contractor
- or agent; which had not been released to the public; and which was
- related to military operations or readiness, foreign relations or
- intelligence, or law enforcement investigations or operations.
-
- 7. The term "proprietary commercial information" means non-public
- business information, including information which is sensitive,
- confidential, restricted, trade secret, or otherwise not meant for
- public distribution. If the proprietary information has an
- ascertainable value, apply paragraph (b) (4) to the economic loss
- rather than (b) (1) and (2), if the resulting offense level is
- greater.
-
- 8. Public records protected under paragraph (b) (1) must be filed
- or maintained under a law or regulation of the federal government, a
- state or territory, or any of their political subdivisions.
-
- 9. The term "altered" covers all changes to data, whether the
- defendant added, deleted, amended, or destroyed any or all of it.
-
- 10. A "general distribution system" includes electronic bulletin
- board and voice mail systems, newsletters and other publications, and
- any other form of group dissemination, by any means.
-
- 11. The term "malicious destruction or damage" includes injury to
- business and personal reputations.
-
- 12. Costs of system recovery: Include the costs accrued by the
- victim in identifying and tracking the defendant, ascertaining the
- damage, and restoring the system or data to its original condition.
- In computing these costs, include material and personnel costs, as
- well as losses incurred from interruptions of service. If several
- people obtained unauthorized access to any system during the same
- period, each defendant is responsible for the full amount of recovery
- or repair loss, minus any costs which are clearly attributable only to
- acts of other individuals.
-
- 13. Consequential losses from trafficking in passwords: A defendant
- who trafficked in passwords by using or maintaining a general
- distribution system is responsible for all economic losses that
- resulted from the use of the password after the date of his or her
- first general distribution, minus any specific amounts which are
- clearly attributable only to acts of other individuals. The term
- "passwords" includes any form of personalized access identification,
- such as user codes or names.
-
- 14. If the defendant's acts harmed public interests not adequately
- reflected in these guidelines, an upward departure may be warranted.
- Examples include interference with common carriers, utilities, and
- institutions (such as educational, governmental, or financial
- institutions), whenever the defendant's conduct has affected or was
- likely to affect public service or confidence".
-
-
- * * *
-
- -------------------
-
- This file has been provided FYI to TELECOM Digest readers. Comments
- should be directed to either the CPSR or the Sentencing Commission or
- other newsgroups or mailing lists (such as Computer Underground
- Digest) where the discussion will no doubt be continuing.
-
-
- PAT
-
-
-