{ "id": "R42403", "type": "CRS Report", "typeId": "REPORTS", "number": "R42403", "active": true, "source": "EveryCRSReport.com, University of North Texas Libraries Government Documents Department", "versions": [ { "source": "EveryCRSReport.com", "id": 417053, "date": "2013-01-28", "retrieved": "2016-04-06T21:25:02.724975", "title": "Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)\u2014A Legal Analysis", "summary": "The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cybercrimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).\nThe bill would (1) establish a three-year mandatory minimum term of imprisonment for aggravated damage to a critical infrastructure computer; (2) streamline and increase the maximum penalties for the cybercrimes proscribed in CFAA; (3) authorize the confiscation of real property used to facilitate the commission of such cyberoffenses and permit forfeiture of real and personal property generated by, or used to facilitate the commission of, such an offense, under either civil or criminal forfeiture procedures; (4) add such cybercrimes to the racketeering (RICO) predicate offense list, permitting some victims to sue for treble damages and attorneys\u2019 fees; (5) increase the types of password equivalents covered by the trafficking offense and the scope of federal jurisdiction over the crime; (6) confirm that conspiracies to commit one of the CFAA offenses carry the same penalties as the underlying crimes; and (7) provide that a cybercrime prosecution under CFAA could not be grounded exclusively on the failure to comply with a term of service agreement or similar breach of contract or agreement, apparently in response to prosecution theory espoused in Drew. With the exception of this last limitation on prosecutions, the Justice Department has endorsed the proposals found in S. 2111.\nThe bill was placed on the Senate calendar, but the 112th Congress adjourned without taking further action on S. 2111 or S. 1151.\nRelated CRS reports include CRS Report 97-1025, Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws, available in abridged form as CRS Report RS20830, Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R42403", "sha1": "0b66a9f4e2924b488f5a3afd71a9717569df0aef", "filename": "files/20130128_R42403_0b66a9f4e2924b488f5a3afd71a9717569df0aef.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R42403", "sha1": "d8c4ac1013611d2360334edc8ffed427d7b30f7e", "filename": "files/20130128_R42403_d8c4ac1013611d2360334edc8ffed427d7b30f7e.pdf", "images": null } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc86604/", "id": "R42403_2012Mar12", "date": "2012-03-12", "retrieved": "2012-06-15T10:07:48", "title": "Cybersecurity: Cyber Crime Protection Security Act (S. 2111)\u2014A Legal Analysis", "summary": "The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20120312_R42403_359826e7394759a54eb5341aa01e2f07b0f8a6b3.pdf" }, { "format": "HTML", "filename": "files/20120312_R42403_359826e7394759a54eb5341aa01e2f07b0f8a6b3.html" } ], "topics": [ { "source": "LIV", "id": "Crime and criminals", "name": "Crime and criminals" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Computer hackers", "name": "Computer hackers" } ] } ], "topics": [ "American Law", "Intelligence and National Security" ] }