Calendar No. 546
104th Congress Report
SENATE
2d Session 104-359
_______________________________________________________________________
THE INDUSTRIAL ESPIONAGE ACT OF 1996
_______
August 27, 1996.--Ordered to be printed
Filed under authority of the order of the Senate of August 2, 1996
_______________________________________________________________________
Mr. Hatch, from the Committee on the Judiciary, submitted the following
R E P O R T
[To accompany S. 1556]
The Committee on the Judiciary, to which was referred the
bill (S. 1556) to amend provisions of title 18, United States
Code, with respect to the prohibition of industrial espionage,
and for other purposes, having considered the same, reports
favorably thereon, with an amendment in the nature of a
substitute, and recommends that the bill, as amended, do pass.
CONTENTS
Page
I. Purpose..........................................................4
II. Legislative history..............................................4
III. Discussion.......................................................5
IV. Section-by-section analysis.....................................13
V. Regulatory impact statement.....................................18
VI. Cost estimate...................................................18
VII. Changes in existing law.........................................19
The amendment is as follows:
Strike all after the enacting clause and insert the
following:
SECTION 1. SHORT TITLE.
This Act may be cited as the ``Industrial Espionage Act of 1996.''
SEC. 2. FINDINGS AND PURPOSES.
(a) Findings.--Congress finds that--
(1) sustaining a healthy and competitive national economy is
imperative;
(2) the development and production of proprietary economic
information involves every aspect of interstate commerce and
business;
(3) the development, production, protection, and lawful
exchange, sale, and transfer of proprietary economic
information is essential to maintaining the health and
competitiveness of interstate commerce and the national
economy;
(4) much proprietary economic information moves in interstate
and foreign commerce and proprietary economic information that
does not move in interstate or foreign commerce directly and
substantially affects proprietary economic information that
does;
(5) the theft, wrongful destruction or alteration,
misappropriation, and wrongful conversion of proprietary
economic information substantially affects and harms interstate
commerce, costing United States firms, businesses, industries,
and consumers millions of dollars each year; and
(6) enforcement of existing State laws protecting proprietary
economic information is frustrated by the ease with which
stolen or wrongfully appropriated proprietary economic
information is transferred across State and national
boundaries.
(b) Purpose.--The purpose of this Act is--
(1) to promote the development and lawful utilization of
United States proprietary economic information produced for, or
placed in, interstate and foreign commerce by protecting it
from theft, wrongful destruction or alteration,
misappropriation, and conversion; and
(2) to secure to authors and inventors the exclusive right to
their respective writings and discoveries.
SEC. 3. PREVENTION OF ECONOMIC ESPIONAGE AND PROTECTION OF PROPRIETARY
ECONOMIC INFORMATION IN INTERSTATE AND FOREIGN
COMMERCE.
(a) In General.--Title 18, United States Code, is amended by
inserting after chapter 89 the following new chapter:
``CHAPTER 90--PROTECTION OF PROPRIETARY ECONOMIC INFORMATION
``Sec.
``1831. Definitions.
``1832. Criminal activities affecting proprietary economic
information.
``1833. Criminal forfeiture.
``1834. Import and export sanctions.
``1835. Extraterritoriality.
``1836. Construction with other laws.
``1837. Preservation of confidentiality.
``1838. Prior authorization requirement.
``1839. Law enforcement and intelligence activities.
``1831. Definitions
``As used in this chapter:
``(1) The term `person' means a natural person, corporation,
agency, association, institution, or any other legal,
commercial, or business entity.
``(2) The term `proprietary economic information' means all
forms and types of financial, business, scientific, technical,
economic, or engineering information, including data, plans,
tools, mechanisms, compounds, formulas, designs, prototypes,
processes, procedures, programs, codes, or commercial
strategies, whether tangible or intangible, and whether stored,
complied, or memorialized physically, electronically,
graphically, photographically, or in writing that--
``(A) the owner thereof has taken reasonable measures
to keep such information confidential; and
``(B) the information derives independent economic
value, actual or potential, from not being generally
known to, and not being readily ascertainable,
acquired, or developed by legal means by the public.
The term does not include any knowledge, experience, training,
or skill that a person lawfully has acquired due to his work as
an employee of or as an independent contractor for any person.
``(3) The term `owner' means the person or persons in whom,
or United States Government component, department, or agency in
which, rightful legal, beneficial, or equitable title to, or
license in, proprietary economic information is reposed.
``(4) The term `United States person' means--
``(A) in the case of a natural person, a United
States citizen or permanent resident alien; and
``(B) in the case of a nonnatural person, an entity
substantially owned or controlled by the United States
Government or by United States citizens or permanent
resident aliens, or incorporated in the United States.
``(5) The term `without authorization' means not permitted,
expressly or implicitly, by the owner.
``1832. Criminal activities affecting proprietary economic information
``(a) Any person, with intent to, or reason to believe that it
will, injure any owner of proprietary economic information having a
value of not less than $100,000 and with intent to convert it to his or
her own use or benefit or the use or benefit of another, who
knowingly--
``(1) steals, or without authorization appropriates, takes,
carries away, or conceals, or by fraud, artifice, or deception
obtains such information;
``(2) without authorization copies, duplicates, sketches,
draws, photographs, downloads, uploads, alters, destroys,
photocopies, replicates, transmits, delivers, sends, mails,
communicates, or conveys such information;
``(3) receives, buys, or possesses such information, knowing
the same to have been stolen or appropriated, obtained, or
converted without authorization;
``(4) attempts to commit any offense described in paragraphs
(1) through (3);
``(5) wrongfully solicits another to commit any offense
described in paragraphs (1) through (3); or
``(6) conspires with one or more other persons to commit any
offense described in paragraphs (1) through (3), and one or
more of such persons do any act to effect the object of the
conspiracy,
shall, except as provided in subsection (b), be fined up to $250,000,
or twice the value of the proprietary economic information, whichever
is greater, or imprisoned not more that 10 years, or both.
``(b) Any corporation that commits any offense described in
paragraphs (1) through (6) of subsection (a) shall be fined up to
$10,000,000, or twice the economic value of the proprietary economic
information, whichever is greater.
``(c) This section does not prohibit the reporting of any suspected
criminal activity or regulatory violation to any appropriate agency or
instrumentality of the United States, or a political subdivision of a
State, or to Congress.
``1833. Criminal forfeiture
``(a) Notwithstanding any provision of State law, any person
convicted of a violation under this chapter shall forfeit to the United
States--
``(1) any property constituting or derived from, any proceeds
the person obtained, directly or indirectly, as the result of
such violation; and
``(2) any of the person's property used, or intended to be
used, in any manner or part to commit or facilitate the
commission of such violation.
``(b) the court, in imposing a sentence on such person, shall
order, in addition to any other sentence imposed pursuant to this
chapter, that the person forfeit to the United States all property
described in this section.
``(c) Property subject to forfeiture under this section, any
seizure and disposition thereof, and any administrative or judicial
proceeding in relation thereto, shall be governed by section 413 of the
Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C.
853), except for subsection 413(d) which shall not apply to forfeitures
under this section.
``(d) Notwithstanding section 524(c) of title 28, there shall be
deposited in the Crime Victims Fund established under section 1402 of
the Victims of Crime Act of 1984 (42 U.S.C. 10601) all amounts from the
forfeiture of property under this section remaining after the payment
of expenses and sale authorized by law.
``1834. Import and export sanctions
``(a) The President may, to the extent consistent with
international agreements to which the United States is a party,
prohibit, for a period of not longer than 5 years, the importation
into, or exportation from, the United States, whether by carriage of
tangible items or by transmission, any merchandise produced, made,
assembled, or manufactured by a person convicted of any offense
described in section 1832 of this title, or in the case of an
organization convicted of any offense described in such section, its
successor entity or entities.
``(b)(1) The Secretary of the Treasury may impose on any other
person who knowingly violates any order of the President issued under
the authority of this section, a civil penalty equal to not more than 5
times the value of the exports or imports involved, or $100,000,
whichever is greater.
``(2) Any merchandise imported or exported in violation of an order
of the President issued under this section shall be subject to seizure
and forfeiture in accordance with sections 602 through 619 of the
Tariff Act of 1930.
``(3) The provisions of law relating to seizure, summary and
judicial forfeiture, and condemnation of property for violation of the
United States customs laws, the disposition of such property or the
proceeds from the sale thereof, the remission or mitigation of such
forfeiture, and the compromise of claims, shall apply to seizures and
forfeitures incurred, or alleged to have been incurred under this
section to the extent that they are applicable and not inconsistent
with the provisions of this chapter.
``1835. Extraterritoriality
``(a) This chapter applies to conduct occurring within the United
States.
``(b) This chapter applies to conduct occurring outside the
territorial and special maritime jurisdiction of the United States, its
territories, and possessions if--
``(1) the offender is a United States person; or
``(2) an act in furtherance of the offence was committed in
the United States.
``1836. Construction with other laws
``This chapter shall not be construed to preempt or displace any
other Federal or State remedies, whether civil or criminal, for the
misappropriation of proprietary economic information, or to affect the
otherwise lawful disclosure of information by any government employee
under section 552 of title 5 (commonly known as the Freedom of
Information Act).
``1837. Preservation of confidentiality
``In any prosecution under this chapter, the court may enter such
orders and take such other action as may be necessary and appropriate
to preserve the confidentiality of proprietary economic information,
consistent with rule 16 of the Federal Rules of Criminal Procedure, the
Federal Rules of Evidence, and other applicable laws. An interlocutory
appeal by the United States shall lie from a decision or order of a
district court authorizing the disclosure of proprietary economic
information.
``1838. Prior authorization requirement
``The United States may not file a charge under this chapter or use
a violation of this chapter as a predicate offense under any other law
without the personal approval of the Attorney General, the Deputy
Attorney General, or the Assistant Attorney General for the Criminal
Division of the Department of Justice.
``1839. Law enforcement and intelligence activities
``This chapter does not prohibit any and shall not impair otherwise
lawful activity conducted by any agency or instrumentality of the
United States, a State, or a political subdivision of a State, or an
intelligence agency of the United States.''.
(b) Technical Amendment.--The table of chapters for title 18,
United States Code, is amended by inserting after the item relating to
chapter 89 the following new item:
``90. Protection of Proprietary Economic Information........... 1831''.
SE
SEC. 4. WIRE AND ELECTRONIC COMMUNICATIONS INTERCEPTION AND
INTERCEPTION OF ORAL COMMUNICATIONS.
Section 2516(1)(a) of title 18, United States Code, is amended by
inserting ``chapter 90 (relating to economic espionage and protection
of proprietary economic information in interstate and foreign
commerce),'' after ``title:''.
I. Purpose
The Industrial Espionage Act of 1996, S. 1556, would
provide for Federal criminal penalties for the theft,
unauthorized appropriation, or other misuse of proprietary
economic information.
II. Legislative History
The basis for the protection of proprietary economic
information is rooted in the U.S. Constitution, which
explicitly grants Congress the power ``to promote the progress
of science and useful arts, by securing for limited times to
authors and inventors the exclusive right to their respective
writings and discoveries,'' U.S. Const. art. I, sec. 8, cl. 8,
and which also gives Congress the power ``[t]o regulate
Commerce * * * among the several States.'' U.S. Const. art. I,
sec. 8, cl. 3.
The goal of this legislation is to punish the theft,
unauthorized appropriation, or unauthorized dissemination of
proprietary economic information.
This legislation was introduced by Senators Kohl and
Specter on February 1, 1996, in the 104th Congress. On February
28, 1996, the Subcommittee on Terrorism, Technology and
Government Information held a hearing jointly with the Select
Committee on Intelligence on the measure and the general issue
of the theft of proprietary economic information. The Director
of the Federal Bureau of Investigation, Louis Freeh, testified.
The Committee also heard testimony from Geoffrey Shaw, the
former CEO of Ellery Systems, Inc., of Boulder, CO, and Dr.
Raymond Damadian, president and chairman of Fonar Corporation
of Melville, NY. In addition, written statements were received
from John J. Higgins, senior vice president and general counsel
of the Hughes Electronics Corp.; Norman Augustine, president
and CEO of Lockheed Martin Corp.; and the National Information
Infrastructure Testbed. A classified briefing by the FBI
Director for members of the Judiciary and Intelligence
Committees was held on March 13, 1996. The House Committee on
the Judiciary, Subcommittee on Crime, also held hearings on
this issue on May 9, 1996.
On July 25, 1996, the Judiciary Committee met in executive
session to consider the bill. The Committee unanimously
approved the measure, with an amendment in the nature of a
substitute, proposed by Senators Kohl and Specter. Embodied in
the substitute amendment were several changes to the original
text of the bill. The first was a change in the definition of
``owner'' intended to bring the bill into full accord with the
General Agreement on Trade and Tariffs. The second was a change
in the definition of ``proprietary economic information''
designed to clarify the scope of the definition. The third was
a change in the elements of the offense designed to clarify the
exact nature of the act criminalized. The fourth was a
reduction in the possible prison term in order to align the
penalties with those available under the National Stolen
Property Act, 18 U.S.C. 2314. The fifth was an alteration in
the available fines in order to allow fines be levied in
relation to the value of the stolen information. The sixth was
an alteration in the import and export sanctions provisions in
order to clarify the procedures for their use. The seventh
narrowed the extraterritorial application of the legislation.
The eighth was the requirement of prior authorization by the
Attorney General, the Deputy Attorney General, or the Assistant
Attorney General for the Criminal Division of the Justice
Department before a prosecution under the measure can be
commenced.
III. Discussion
Congress has heretofore confined its protection of
intellectual property to patented and copyrighted material.
With this legislation, Congress extends the protection of
Federal law to the equally important area of proprietary
economic information. During the course of the Committee's
hearings, we documented that proprietary economic information
is vital to the prosperity of the American economy, that it is
increasingly the target of thieves, and that our current laws
are inadequate to punish people who steal the information.
In a world where a nation's power is now determined as much
by economic strength as by armed might, we cannot afford to
neglect to protect our intellectual property. Today, a piece of
information can be as valuable as a factory is to a business.
The theft of that information can do more harm than if an
arsonist torched that factory. But our Federal criminal laws do
not recognize this and do not punish the information thief.
This is an unacceptable oversight. The Industrial Espionage Act
is an effort to remedy the problem.
Growing Importance of Proprietary Economic Information
The United States produces the vast majority of the
intellectual property in the world. This includes patented
inventions, copyrighted material, and proprietary economic
information. Proprietary information, in contrast with
copyrighted material and patented inventions, is secret. The
value of the information is almost entirely dependent on its
being a closely held secret. It includes, but is not limited
to, information such as production processes, bid estimates,
production schedules, computer software, technology schematics,
and trade secrets. It is, in short, the very information that
drives the American economy. For many companies this
information is the keystone to their economic competitiveness.
They spend many millions of dollars developing the information,
take great pains and invest enormous resources to keep it
secret, and expect to reap rewards from their investment.
In the last few decades, intangible assets have become more
and more important to the prosperity of companies. A recent
analysis by the Brookings Institute indicates that in 1982, the
tangible assets of mining and manufacturing companies accounted
for 62 percent of their market value. By 1992, they represented
only 38 percent of the market value. Blair, ``Ownership and
Control: Rethinking Corporate Governance for the Twenty-First
Century'', 234 n.57 (1995). As this Nation moves into the high-
technology, information age, the value of these intangible
assets will only continue to grow. Ironically, the very
conditions that make this proprietary information so much more
valuable make it easily stolen. Computer technology enables
rapid and surreptitious duplications of the information.
Hundreds of pages of information can be loaded onto a small
computer diskette, placed into a coat pocket, and taken from
the legal owner.
This material is a prime target for theft precisely because
it costs so much to develop independently, because it is so
valuable, and because there are virtually no penalties for its
theft. The information is pilfered by a variety of people and
organizations for a variety of reasons. A great deal of the
theft is committed by disgruntled individuals or employees who
hope to harm their former company or line their own pockets. In
other instances, outsiders target a company and systematically
infiltrate the company then steal its vital information. More
disturbingly, there is considerable evidence that foreign
governments are using their espionage capabilities against
American companies.<SUP>1
---------------------------------------------------------------------------
\1\ S. 1556 was introduced in tandem with S. 1557, ``The Economic
Security Act of 1996.'' S. 1557, which was referred to the Select
Committee on Intelligence, specifically addresses the problem of
foreign government-sponsored theft of proprietary economic information.
S. 1557 includes enhanced penalties when the theft is sponsored by a
foreign government. On April 30, 1996, the Intelligence Committee
favorably reported a measure almost identical to S. 1557 as title V of
S. 1718, ``The Intelligence Authorization Act for Fiscal Year 1997.''
---------------------------------------------------------------------------
We use the term economic or industrial espionage advisedly.
Espionage is typically an organized effort by one country's
government to obtain the vital national security secrets of
another country. Typically, espionage has focused on military
secrets. But even as the cold war has drawn to a close, this
classic form of espionage has evolved. Economic superiority is
increasingly as important as military superiority. And the
espionage industry is being retooled with this in mind.
It is important, however, to remember that the nature and
purpose of industrial espionage are sharply different from
those of classic political or military espionage. When we use
the phrase industrial espionage, we include a variety of
behavior--from the foreign government that uses its classic
espionage apparatus to spy on a company, to the two American
companies that are attempting to uncover each other's bid
proposals, to the disgruntled former employee who walks out of
his former company with a computer diskette full of engineering
schematics. All of these forms of industrial espionage are
troubling, and they are punished as the theft of proprietary
economic information in this measure.
Increasing Incidents of Theft of Proprietary Economic Information
Director Freeh testified at the Subcommittee's February
hearing that ``[f]oreign governments * * * actively target U.S.
persons, firms, industries, and the U.S. Government itself to
steal or wrongfully obtain critical technologies, data and
information in order to provide their own industrial sectors
with a competitive advantage.'' Director Freeh reported that in
the last year, the number of cases of economic espionage that
the FBI is investigating doubled from 400 to 800. Twenty-three
countries are involved in those cases.
During 1992 hearings before the House Committee on the
Judiciary, Subcommittee on Economic and Commercial Law, the
Director of the Central Intelligence Agency, Robert Gates,
stated that:
Our fundamental assessment is that while the end of
the Cold War did not bring an end to the foreign
intelligence threat, it did change the nature of that
threat. The threat has become more diversified and more
complex. In a world that increasingly measures national
power and national security in economic terms as well
as military terms, many foreign intelligence services
around the world are shifting the emphasis in
targeting. Foreign targeting of American technology
continues; technology is important for economic as well
as military reasons. Since the U.S. continues to be on
the cutting edge of technological innovation,
technology theft will remain a major concern for us.
``The Threat of Foreign Economic Espionage to U.S.
Corporations: Hearings Before the Subcomm. on Economic and
Commercial Law of the House Comm. on the Judiciary,'' 102d
Cong., 2d sess. 59 (1977).
A report of the National Counterintelligence Center in 1995
indicated that biotechnology, aerospace, telecommunications,
computer software, transportation, advanced materials, energy
research, defense, and semiconductor companies are all top
targets for foreign economic espionage. These sectors are
``aggressively targeted'' according to the report. ``National
Counterintelligence Center, Annual Report to Congress on
Foreign Economic Collection and Industrial Espionage,'' 15
(1995). That report identified 20 different methods used to
conduct industrial espionage. The traditional methods include
recruiting an agent and then inserting the agent into the
target company, or breaking into an office to take equipment
and information. According to the report, ``computer
intrusions, telecommunications targeting and intercept and
private-sector encryption weaknesses * * * account for the
largest portion of economic and industrial information lost by
U.S. corporations.'' Id. at 16. Most American companies are
poorly prepared to deal with these sophisticated and
coordinated efforts to obtain their proprietary economic
information.
But even as American companies are attempting to deal with
foreign espionage, they also have to deal with theft by
insiders. A survey by the American Society for Industrial
Security of 325 companies in 1995 found that almost half of
them had experienced trade secret theft of some sort during the
previous two years. Heffernan and Smartwood, ``Trends in
Intellectual Property Loss Survey,'' 4 (1996). They also
reported a 323-percent increase in the number of incidents of
intellectual property loss. Id. A 1988 National Institute of
Justice study of trade secret theft in high technology
industries found that 48 percent of 150 research and
development companies surveyed had been the victims of trade
secrets theft. Mock and Rosenbaum, ``A Study of Trade Secrets
Theft in High-Technology Industries,'' National Institute of
Justice Discussion Paper 6 (1988). Almost half of the time the
target was research and development data while 38 percent of
the time the target was new technology. Id. at 16. Forty
percent of the victims found out about the theft from their
competitors. Id.
The Committee has learned of several disturbing examples of
how this theft is occurring. For example, in Arizona, an
engineer for an automobile air bag manufacturer was arrested in
1993 for selling manufacturing designs, strategies, and plans.
He asked the company's competition for more than half a million
dollars--to be paid in small bills. And he sent potential
buyers a laundry list of information they could buy. He asked
$500 for the company's capital budget plan; $1,000 for a piece
of equipment; and $6,000 for planning and product documents.
See ``Industrial Espionage By 2 Mesa Men Alleged,'' the Phoenix
Gazette, Aug. 31, 1993, at A1. The engineer subsequently
reached a plea agreement with the U.S. Government and was
sentenced to less than 6 months in prison.
Just last year, Bill Gaede, the former employee of two
major computer companies, admitted to stealing vital
information on the manufacture of microchips and selling it to
China, Cuba, and Iran. For almost a decade, he copied
manufacturing specifications worth millions of dollars. And
armed with this material, the Chinese, Cubans, and Iranians
have been able to close the gap on our technology leads. Late
last year, the FBI arrested this man and charged him under the
Federal stolen property and mail fraud laws. See ``Troubling
Issues in a Silicon Valley Spy Case,'' the New York Times, July
8, 1996, at D1. Gaede has recently reached a plea agreement
with the U.S. Government.
During its hearings, the Committee learned how an employee
of Ellery Systems in Boulder, CO, transmitted that company's
source code to another person in what appeared to be an attempt
to appropriate the source code for his own personal use. Ellery
Systems was a computer firm that supplied software technology
to various government projects, primarily in NASA astrophysics
activities. That theft of their source code, possibly at the
behest of a foreign government, ultimately destroyed the
financial viability of Ellery Systems. But all efforts to
prosecute the putative thief failed because of gaps in current
law.
Dr. Raymond Damadian, the inventor of magnetic resonance
imaging technology and founder of an MRI manufacturing company,
Fonar Corp., told the Committee that his company had been the
subject of persistent infiltration and theft. In one case, an
unauthorized service company hired former Fonar engineers to
give them the proprietary technology--the diagnostic software
and schematics--needed to service Fonar MRI machines. When
Fonar discovered the misappropriation, it sought an injunction
in Federal court. The injunction was issued, but the service
company simply violated the injunction, flouting all possible
penalties.
Director Freeh told the Committee about an FBI
investigation involving the theft of proprietary information
from two major pharmaceutical manufacturers. Two people were
offering to sell trade secrets involving two fermentation
processes covered by active patents. In February 1990, an FBI
undercover agent posed as a potential buyer and was offered the
information on one process for $1.5 million. The second process
was for sale for $6 to $8 million.
As a result of industrial espionage, American companies
have been severely damaged. The NCIC report concluded that
``[i]ndustry victims have reported the loss of hundreds of
millions of dollars, lost jobs, and lost market share.'' NCIC,
supra, at 16. The ASIS survey concluded that the potential
losses could total $63 billion. Heffernan and Smartwood, supra,
at 15.
In response to the growing problem of the theft of
proprietary economic information, the FBI has shifted the focus
of its Development of Espionage, Counterintelligence and
Counterterrorism Awareness (DECA) Program. This program has
been in place for more than 20 years. But in the last few
years, DECA has widened its efforts to address industrial
espionage. DECA coordinators in each of the FBI's 56 field
offices maintain contact with companies in their region and now
regularly brief them about methods and prevention of industrial
espionage. During the 1993 and 1994 fiscal years, the FBI
briefed almost 20,000 companies under the DECA Program.
Gaps in Current Federal Law
Developments in the law, however, have not kept pace with
this rapidly changing environment. Although Congress has
enacted patent and copyright protection laws, and computer
crime statutes, no Federal law protects proprietary economic
information from theft and misappropriation in a systematic,
principled manner. As a result, prosecutors have had trouble
shoe-horning economic espionage into these laws. Sometimes they
have succeeded, but often they have failed. See Toren, ``The
Prosecution of Trade Secrets Thefts Under Federal Law,'' 22
Pepp. L. Rev. 59, 64-94 (1994).
One provision Federal prosecutors have attempted to use is
the Depression-era National Stolen Property Act, 18 U.S.C.
2314-15. This law was designed to foil the ``roving criminal''
whose access to automobiles made movement of stolen property
across State lines so easy that State and local officials were
stymied in their pursuit. While the law works well enough for
crimes involving traditional ``goods, wares, and merchandise,''
it was drafted at a time when computers, biotechnology, and
copy machines did not even exist. Consequently, it is not
particularly well suited to deal with situations in which
intangible information alone is wrongfully duplicated and
transmitted electronically with a few keystrokes.
Moreover, recent court decisions suggest that this statute
is limited to tangible property. In Dowling v. United States,
473 U.S. 207 (1985), the Supreme Court reversed the conviction
of a man who had distributed bootlegged Elvis Presley records.
He violated copyright law, but the Court suggested that the
National Stolen Property Act only applies to tangible goods.
Id. at 216. Later appellate courts have interpreted Dowling to
preclude prosecution of the theft of ``purely intellectual
property.'' United States v. Brown, 925 F.2d 1301, 1307 (10th
Cir. 1991). We do not address whether these cases properly
understood the legislative intent of the National Stolen
Property Act, but merely point out that this caselaw makes
prosecutions for the theft of proprietary economic information
under the act difficult, making the need for this legislation
more and more urgent.
Other existing statutes used by law enforcement agencies to
combat economic espionage have similar limitations. Although
proprietary information is property under the mail and wire
fraud statutes, 18 U.S.C. 1341-43, see U.S. v. Carpenter, 484
U.S. 19, 28 (1987), prosecutors have found it difficult to use
these statutes because the theft often does not involve the use
of mail or wire. In addition, since a thief merely copies
information and does not necessarily ``defraud'' the company
permanently of the data, prosecutions are more difficult.
Under many Federal statutes, even basic concepts can prove
problematic. For example, if an individual ``downloads''
computer source code without permission of the owner, has a
theft occurred even though the true owner never lost possession
of the original and is not permanently deprived of its use?
Another difficulty with existing law is that it fails to afford
explicit protection to the confidential nature of the
information in question during enforcement proceedings. By its
nature, proprietary economic information derives value from its
exclusivity and confidentiality. If either or both are
compromised during legal proceedings, the value of the
information is diminished.
As a result of these problems, the FBI has had difficulty
conducting investigations or had prosecutions declined.
Director Freeh pointed to one case in which an association of
consultants, all of whom were long-term employees of U.S.
corporations, attempted to sell proprietary high technology to
foreign powers. The FBI sought consensual monitoring of a
subject. Its request was turned down by an Assistant U.S.
Attorney, citing Brown as holding that the consultants' actions
did not constitute criminal behavior. Director Freeh pointed to
another example in which the FBI investigated an information
broker who was engaged by two foreign companies to gather
proprietary bid information from a major U.S. company regarding
a multimillion dollar international construction project. The
information broker contacted several employees from the U.S.
company, paid them for information, and passed the information
onto the foreign companies. The broker was then paid a large
sum of money for his services. For lack of a more applicable
violation, the case was investigated as a wire fraud violation,
but a U.S. Attorney's office declined to prosecute.
Significantly, a similar investigation regarding the same
construction project and foreign companies was initiated in the
United Kingdom. This investigation resulted in prison sentences
for two other information brokers headquartered in England.
State Laws Inadequate
State laws do not fill in the gaps left by Federal law.
What State law there is protects proprietary economic
information only haphazardly. The majority of States have some
form of civil remedy for the theft of such information--either
adopting some version of the Uniform Trade Secrets Act,
acknowledging a tort for the misappropriation of the
information, or enforcing various contractual arrangements
dealing with trade secrets. These civil remedies, however,
often are insufficient. Many companies chose to forgo civil
suits because the thief is essentially judgment proof--a young
engineer who has few resources--or too difficult to pursue--a
sophisticated foreign company or government. In addition,
companies often do not have the resources or the time to bring
suit. They also frequently do not have the investigative
resources to pursue a case. Even if a company does bring suit,
the civil penalties often are absorbed by the offender as a
cost of doing business and the stolen information retained for
continued use. Only a few States have any form of criminal law
dealing with the theft of this type of information. Most such
laws are only misdemeanors, and they are rarely used by State
prosecutors.
Need for a Comprehensive Federal Law
These, and other problems, underscore the importance of
developing a systematic approach to the problem of economic
espionage. Only by adopting a national scheme to protect U.S.
proprietary economic information can we hope to maintain our
industrial and economic edge and thus safeguard our national
security. Foremost, we believe that the greatest benefit of the
Federal statute will be as a powerful deterrent. In addition, a
Federal criminal law is needed because of the international and
interstate nature of this activity, because of the
sophisticated techniques used to steal proprietary economic
information, and because of the national implications of the
theft. Moreover, a Federal criminal statute will provide a
comprehensive approach to this problem--with clear
extraterritoriality, criminal forfeiture, and import-export
sanction provisions.
S. 1556 Does Not Apply to General Knowledge and Skills
This legislation does not apply to innocent innovators or
to individuals who seek to capitalize on their lawfully
developed knowledge, skill or abilities. Employees, for
example, who change employers or start their own companies
should be able to apply their talents without fear of
prosecution because two safeguards against overreaching are
built into the law.
First, protection is provided by the definition of
``proprietary economic information'' itself. The definition
requires that an owner take objectively reasonable, proactive
measures, under the circumstances, to protect the information.
If, consequently, an owner fails to safeguard his or her
proprietary information, then no one could be rightfully
accused of misappropriating it. Most owners do take reasonable
measures to protect their proprietary economic information,
thereby placing employees and others on clear notice of the
discreet, proprietary nature of the information.
The bill explicitly states that the term proprietary
economic information does not include the general knowledge,
skills or experience that a person has. A prosecution under
this statute must establish a particular piece of information
that a person has stolen or misappropriated. It is not enough
to say that a person has accumulated experience and knowledge
during the course of his or her employ. Nor can a person be
prosecuted on the basis of an assertion that he or she was
exposed to proprietary economic information while employed. A
prosecution that attempts to tie skill and experience to a
particular piece of proprietary economic information cannot
succeed without showing that the particular material was stolen
or misappropriated. The Government cannot prosecute an
individual for taking advantage of the general knowledge and
skills or experience that he or she obtains or comes by during
his tenure with a company. Allowing such prosecutions to go
forward and allowing the risk of such charges to be brought
would unduly endanger legitimate and desirable economic
behavior.
As the Pennsylvania Supreme Court noted in Spring Steels
v. Molloy, 400 Pa. 354, 363 (1960):
It is not a phenomenal thing in American business
life to see an employee, after a long period of
service, leave his employment and start a business of
his own or in association with others. And it is
inevitable in such a situation, where the former
employee has dealt with customers on a personal basis
that some of those customers will want to continue to
deal with him in [that] new association. This is * * *
natural, logical and part of human fellowship * * *
This legislation does not criminalize or in any way hamper
these natural incidents of employment. The free and unfettered
flow of individuals from one job to another, the ability of a
person to start a new business based upon his or her experience
and expertise, should not be injured or chilled in any way by
this legislation. Individuals must have the opportunity to take
advantage of their talents and to seek and accept other
employment that enables them to profit from their abilities and
experience. And companies must have the opportunity to employ
these people. This measure attempts to safeguard an
individual's career mobility and at the same time to preserve
the proprietary economic information that underpins the
economic viability of the very company that would offer a
person a new job.
The second safeguard is provided by the bill's use of the
term ``knowingly.'' For a person to be prosecuted, the person
must know or have a firm belief that the information he or she
is taking is in fact proprietary. Under theft statutes dealing
with tangible property, normally, the thief knows that the
object he has stolen is indeed a piece of property that he has
no lawful right to convert for his personal use. The same
principle applies to this measure--for someone to be convicted
under this statute he must be aware or substantially certain
that he is misappropriating proprietary economic information
(although a defense should succeed if it is proven that he
actually believed that the information was not proprietary
after taking reasonable steps to warrant such belief). A person
who takes proprietary economic information because of
ignorance, mistake or accident cannot be prosecuted under the
act. (The bill also provides a similar safeguard by requiring
that the appropriation be without authorization.)
This requirement should not prove a great barrier to
legitimate and warranted prosecutions. Most companies go to
considerable pains to protect their proprietary economic
information. Documents are marked proprietary; security
measures put in place; and employees often sign confidentiality
agreements.
IV. Section-by-Section Analysis
Section 1. Short Title
This section sets forth the short title of the Act, which
emphasizes that the focus of the bill is on ``industrial
espionage'' and the protection of trade secrets. ``Industrial
espionage'' means activity directed at the U.S. Government or
U.S. corporations, establishments, or persons for the purpose
of unlawfully obtaining proprietary economic information. The
emphasis of this legislation is on the theft of that
proprietary economic information.
Section 2. Findings and Purpose
This section sets forth the congressional findings upon
which the Act is predicated and the remedial purposes of the
Act. The section reflects congressional determinations that the
development and production of trade secrets is integral to the
maintenance of a healthy and competitive national economy and
that, in turn, maintenance of a competitive national economy is
imperative to national security. This section also recognizes
that the Constitution grants Congress the power to protect and
enforce the exclusive rights of authors and inventors to their
writings and discoveries. One of the Act's purposes is,
therefore, to promote the development and lawful utilization of
proprietary economic information by protecting it from theft,
unauthorized misappropriation or conversion. Notwithstanding
the holding of Dowling v. United States, 473 U.S. 207 (1985),
it is intended that the provisions of the Act should apply
regardless of whether the conduct at issue could also fall
within the prohibitions of the copyright laws.
Section 3. Prevention of Industrial Espionage
This section is the core component of the Act and would add
a new Chapter ``90--Protection of Proprietary Economic
Information'' to title 18, United States Code.
Sec. 1831. Definitions
This section sets forth definitions of certain key items
used in the new chapter and builds upon the definitions already
set out in chapter 1 of title 18.
(a) ``Person'' is defined to include both individuals and
entities, such as corporations, agencies, and associations.
(b) ``Proprietary economic information'' is defined as a
type of intellectual property connoted by four characteristics:
(1) it is proprietary; (2) its nature is economic, business,
scientific, technical, or engineering; (3) it consists of
information, data, plans, tools, mechanisms, compounds,
formulas, designs, prototypes, processes, procedures, programs,
codes, or commercial strategies; and (4) it derives value from
its exclusivity. These features distinguish it from other forms
of intellectual property, such as literary or artistic works.
Both tangible and intangible forms of property and all forms of
data or information are covered, regardless of how stored or
memorialized. Additionally, the definition makes clear that the
owner of the property must have taken objectively reasonable
and proactive steps to keep the information confidential; that
is, information or data that is available generally to the
public is not included. The efforts to protect material,
however, need not be heroic merely reasonable. The term
``proprietary economic information'' also does not include
general knowledge, experience, training, or skill acquired by a
person as a result of his or her employment or hire by any
owner.
This definition is closely modeled on the definition of a
``trade secret'' used in the Uniform Trade Secrets Act. It
parallels similar definitions used by many States in their own
trade secrets legislation. Thus, it is familiar to most firms,
businesses, and individuals who commonly deal with trade
secrets and intellectual property. Congress intends to draw
upon the considerable case law and experience interpreting
``trade secrets'' to illuminate the meaning of the term
``proprietary economic information.''
(c) ``Owner'' is defined to include any person, including
the U.S. Government, having legal, beneficial, or equitable
title to, or license in, the proprietary economic information
in question.
(d) ``U.S. Person'' is defined to mean U.S. citizens or
permanent resident aliens in the case of natural persons; and,
in the case of nonnatural persons, entities substantially owned
or controlled by the U.S. Government or by U.S. citizens or
permanent resident aliens, or incorporated in the United
States.
(e) ``Without authorization'' is defined to mean without
permission of the owner. It is intended to emphasize that
innocent or negligent actors cannot be prosecuted under the
statute. See, in this regard, the additional comments regarding
section 1832 in the Discussion and below.
Sec. 1832. Criminal activities affecting proprietary economic
information
This section punishes the theft, unauthorized
appropriation, and unauthorized conversion, duplication,
alteration, or destruction of proprietary economic information.
This section is written to cover both traditional instances of
theft, where the object of the crime is removed from the
rightful owner's control and possession, as well as
nontraditional methods of misappropriation and destruction,
involving electronic duplication or alteration. With these
nontraditional methods the original property never leaves the
dominion or control of the rightful owner, but the unauthorized
duplication or misappropriation effectively destroys the value
of what is left with the rightful owner. In an electronic
environment, information can be stolen without asportation, and
the original usually remains intact. Our intent, therefore, is
to ensure that the theft of intangible information is
prohibited in the same way that theft of physical items are
protected.
This section requires that the person intends that his
actions will injure the owner of the information. This does not
require that the prosecution prove malice or evil intent. It
merely requires that the actor knew or was aware to a practical
certainty that his conduct would cause such a result. The actor
must intend to use the information for his or her personal
benefit or the benefit of another. By benefit we mean economic
benefit not abstract or reputational enhancements. This
provision means that a person who discloses proprietary
economic information but does not intend to materially gain
from it or intend the recipient to so benefit cannot be
prosecuted.
The requirement that the information have a value of not
less than $100,000 is jurisdictional and is not intended to be
an element of the crime; the prosecution need not prove that
the person knew the exact value of the information. In
determining the value of the information, the prosecution may
use the valuation technique that is appropriate in light of the
circumstances of the case. A variety of valuation methods have
been used in civil and criminal cases involving trade secrets.
See generally Rosenhouse, Annotation, Proper Measure of Damages
for Misappropriation of Trade Secrets, 11 A.L.R.4th 12. <SUP>2
They include determining the profits that the owner would have
realized had the information remained proprietary. See, e.g.,
Sperry Rand Corp. v. A-T-O, Inc., 447 F.2d 1387, 1392-94 (4th
Cir. 1971). In other cases, the value of the stolen information
has been calculated by determining the profits that the
defendant gained by selling it. See, e.g., Univ. Computing Co.
v. Lykes-Youngstown Corp., 504 F.2d 518, 535-36 (5th Cir.
1974). Courts have also recognized the research and development
costs of the proprietary economic information as a proper
measure of its value. See, e.g., Salsbury Lab., Inc. v. Merieux
Lab., Inc., 735 F. Supp. 1555, 1579 (M.D. Ga. 1989), aff'd in
part and rev'd in part, 908 F.2d 706 (11th Cir. 1990). Other
methods of valuing proprietary economic information may also be
available. The Committee believes that these techniques are
valid.
---------------------------------------------------------------------------
\2\ We recognize that damages in a civil suit are not the exact
equivalent of value. But in the course of determining the compensatory
damages available to a victorious plaintiff, many courts have developed
methods for valuing trade secrets.
---------------------------------------------------------------------------
The actor must knowingly steal the information, or take it
without authorization, or transmit it without authorization. A
knowing state of mind with respect to an element of the offense
is (1) an awareness of the nature of one's conduct, and (2) an
awareness of or a firm belief in or knowledge to a substantial
certainty of the existence of a relevant circumstance, such as
whether the information is proprietary economic information as
defined by this statute. The statute does not require proof
that the actor knew that his conduct violated Federal law. The
Committee intends that the knowing state of mind requirement
may be satisfied by proof that the actor was aware of a high
probability of the existence of the circumstance, although a
defense should succeed if it is proven that the actor actually
and reasonably believed that the circumstance did not exist.
This is similar to the practice of the proposed Model Penal
Code (section 2.02(7)). This approach deals with the situation
that has been called willful blindness, the case of the actor
who is aware of the probable existence of a material fact--for
example, that he has no authority, or that the information is
proprietary--but does not satisfy himself that it does not in
fact exist.
Sec. 1833. Forfeiture
This section is designed to permit recapture of both the
proceeds and implements of the offenses specified in the
chapter. This provision may prove especially telling, since the
proceeds of proprietary economic property theft may be
staggering in certain cases. These forfeiture provisions are
meant to supplement, not replace, the authorized punishments in
appropriate cases. The section incorporates through reference
existing law that sets forth procedures to be used in the
detention, seizure, forfeiture, and ultimate disposition of
property forfeited under this section. It provides for an in
personam action against the offender, rather than only one
against the property itself, and it preserves the rights of
innocent third parties.
Sec. 1834. Import and export sanctions
This section authorizes the President to prohibit, for a
period of up to 5 years, the importation into, or exportation
from, the United States of any product produced, made,
assembled, or manufactured by a person convicted of any offense
under section 1832. This sanction, too, is meant to enhance the
bill's prophylactic effect by imposing another important
sanction on offenders. Any sanctions so imposed are enforceable
through a civil action that may be brought by the Secretary of
the Treasury and which could result in the imposition of a
civil penalty of not less than $100,000. It is anticipated that
this sanction will generally be used against egregious and
persistent violators.
Sec. 1835. Extraterritoriality
To rebut the general presumption against the
extraterritoriality of U.S. criminal laws, this section makes
it clear that the Act is meant to apply to certain conduct
occurring beyond U.S. borders. To ensure that there is some
nexus between the assertion of such jurisdiction and the
offense, extraterritorial jurisdiction exists only if the
offender is a citizen, permanent resident alien, or corporation
of the United States; or an act in furtherance of the offense
is committed in the United States. In pursuing such cases, it
is expected that the Department of Justice will focus its
investigative and prosecutorial resources on those instances in
which there has been a substantial harm to U.S. interests.
Sec. 1836. Construction with other laws
This section makes clear that the Act does not preempt non-
Federal remedies, whether civil or criminal, for dealing with
the theft or misappropriation of economic proprietary
information. Many States have criminalized the theft of
intellectual property, but enforcement may be frustrated by the
ease with which such property is transferred across State or
national boundaries.
Sec. 1837. Preservation of confidentiality
This section authorizes a court to preserve the
confidentiality of alleged proprietary economic information
during legal proceedings under the Act consistent with existing
rules of criminal procedure and evidence, and other applicable
laws. This preserves the information's confidential nature and,
hence, its value. Without such a provision, owners may be
reluctant to cooperate in prosecutions for fear of exposing
their proprietary information to public view--thereby
destroying its worth.
Sec. 1838. Prior authorization requirement
This section requires that the Attorney General, the Deputy
Attorney General, or the Assistant Attorney General for the
Criminal Division of the Department of Justice must personally
approve in advance any charge under this bill. This duty is
nondelegable. This provision has been added as a safeguard
against overzealous invocation of this new law. It is intended
to help ensure that businesses and individuals are not chilled
from making legitimate business decisions.
Sec. 1839. Law enforcement and intelligence activities
This section makes clear that the new chapter does not
prohibit any lawfully authorized investigative, protective, or
intelligence activity of the United States.
Section 4. Wire and Electronic Communications Interception and
Interception of Oral Communications
This provision adds newly created crimes to the list of
offenses which may be investigated with authorized wire, oral,
or electronic intercepts.
V. Regulatory Impact Statement
Pursuant to paragraph 11(b), rule XXVI of the Standing
Rules of the Senate, the Committee, after due consideration,
concludes that Senate bill 1556 will not have direct regulatory
impact.
VI. Cost Estimate
U.S. Congress,
Congressional Budget Office,
Washington, DC, August 21, 1996.
Hon. Orrin G. Hatch,
Chairman, Committee on the Judiciary,
U.S. Senate, Washington, DC.
Dear Mr. Chairman: The Congressional Budget Office has
reviewed S. 1556, the Industrial Espionage Act of 1996, as
reported by the Senate Committee on the Judiciary on July 30,
1996. CBO estimates that enacting the bill would result in no
significant net impact on the federal budget. Enacting S. 1556
would affect direct spending and receipts by increasing the
amount of forfeiture receipts and penalties collected and spent
by the government, but we estimate that such effects would not
occur until after fiscal year 1998. Thus, the bill would not be
subject to pay-as-you-go procedures, which apply only through
fiscal year 1998. In any event, we expect that the bill would
have no significant net effect on the federal budget over time
because receipts from criminal fines and the sale of forfeited
property would be spent, generally within one year of receipt.
Bill Purpose. Enacting S. 1556 would make it a federal
crime to steal proprietary economic information having a value
of at least $100,000 from an owner of such information. Under
current law, cases involving economic espionage are prosecuted
under various statutes; however, none is broad enough to
accommodate most cases of economic espionage. Under this bill,
economic information would include intellectual property as
well as physical property, and violations would include
duplication of information as well as physical theft. Violators
would be subject to imprisonment, criminal fines, and
forfeiture of the property involved in the crime. Enacting this
bill also would allow the President to prohibit a person
convicted of economic espionage from importing goods into, or
exporting goods from, the United States for a period up to five
years. Violators of such Presidential orders would be subject
to civil fines and the forfeiture of related property.
Federal Budgetary Impact. While pursuing investigations
would consume staff time and other resources of the federal
government, CBO estimates that the Department of Justice and
the Federal Bureau of Investigation (FBI) would not need
significant additional resources to enforce the provisions of
the bill over the next several years. Based on information from
the FBI, CBO assumes that few cases would be investigated and
prosecuted over the next several years, but that the caseload
would grow over time. Corporations, which constitute the
majority of victims of industrial espionage, are reluctant to
publicly admit theft out of fear that they would be forced to
reveal proprietary information when the case goes to court. In
addition, prosecutions under this bill would require prior
approval of the Attorney General (AG) or certain members of the
AG staff. As a result of this requirement, CBO anticipates that
the number of cases prosecuted would be kept to a minimum
because prosecutors would only pursue those cases with
substantial evidence. CBO estimates that, in the long term, the
government's caseload could significantly increase and
additional resources could be needed if corporations become
more comfortable with reporting economic espionage and the
government pursues more cases involving economic espionage. Any
such additional resources would be subject to the availability
of appropriated funds.
This bill also would establish penalties--including fines,
imprisonment, and the forfeiture of property involved in the
crime--for violations of the provisions of this bill. Such
criminal fines and receipts from the sale of forfeited property
would be deposited in the Crime Victims Fund and spent in the
following year. Civil penalties would be paid to a receipt
account in the Treasury, but we expect that any such revenues
would not be significant. CBO estimates that because it would
take at least two years to investigate and prosecute a case,
the government would not collect any fines or receipts from the
sale of forfeited property through 1998. Based on conversations
with the FBI, we estimate that additional receipts paid into
the Crime Victims Fund after fiscal year 1998 could exceed $5
million a year. Spending from the fund would increase in the
same amounts, but with a one-year lag. In addition, CBO does
not expect any significant increase in prison costs as a result
of this bill.
Mandate Statement. S. 1556 contains no private-sector or
intergovernmental mandates as defined in the Unfunded Mandates
Reform Act of 1995 (Public Law 104-4), and would have no impact
on the budgets of state, local, or tribal governments.
If you wish further details on this estimate, we will be
pleased to provide them. The CBO staff contacts are Jonathan
Womer and Susanne Mehlman.
Sincerely,
June E. O'Neill, Director.
VII. Changes in Existing Law
In compliance with paragraph 12 of rule XXVI of the
Standing Rules of the Senate, the changes in existing law made
by the bill, as reported by the committee, are shown as follows
(existing law proposed to be omitted is enclosed in bold
brackets, new matter is printed in italic, and existing law
with no changes is printed in roman):
UNITED STATES CODE
* * * * * * *
TITLE 18--CRIMES AND CRIMINAL PROCEDURE
PART I.--CRIMES
Chapter Sec.
1. General provisions............................................. 1
* * * * * * *
89. Professions and occupations................................... 1821
90. Protection of Proprietary Economic Information................ 1831
* * * * * * *
CHAPTER 90--PROTECTION OF PROPRIETARY ECONOMIC INFORMATION
Sec.
1831. Definitions.
1832. Criminal activities affecting proprietary economic information.
1833. Criminal forfeiture.
1834. Import and export sanctions.
1835. Extraterritoriality.
1836. Construction with other laws.
1837. Preservation of confidentiality.
1838. Prior authorization requirement.
1839. Law enforcement and intelligence activities.
Sec. 1831. Definitions
As used in this chapter:
(1) The term ``person'' means a natural person,
corporation, agency, association, institution, or any
other legal, commercial, or business entity.
(2) The term ``proprietary economic information''
means all forms and types of financial, business,
scientific, technical, economic, or engineering
information, including data, plans, tools, mechanisms,
compounds, formulas, designs, prototypes, processes,
procedures, programs, codes, or commercial strategies,
whether tangible or intangible, and whether stored,
compiled, or memorialized physically, electronically,
graphically, photographically, or in writing that--
(A) the owner thereof has taken reasonable
measures to keep such information confidential;
and
(B) the information derives independent
economic value, actual or potential, from not
being generally known to, and not being readily
ascertainable, acquired, or developed by legal
means by the public.
The term does not include any general knowledge,
experience, training, or skill that a person lawfully
has acquired due his work as an employee of or as an
independent contractor for any person.
(3) The term ``owner'' means the person or persons in
whom, or United States Government component,
department, or agency in which, rightful legal,
beneficial, or equitable title to, or license in,
proprietary economic information is reposed.
(4) The term ``United States person'' means--
(A) in the case of a natural person, or
United States citizen or permanent resident
alien; and
(B) in the case of nonnatural person, an
entity substantially owned or controlled by the
United States Government or by United States
citizens or permanent resident aliens, or
incorporated in the United States.
(5) The term ``without authorization'' means not
permitted, expressly or implicitly, by the owner.
Sec. 1832. Criminal activities affecting proprietary economic
information
(a) Any person, with intent to, or reason to believe that
it will, injure any owner of proprietary economic information
having a value of not less than $100,000 and with intent to
convert it to his or her own use or benefit or the use or
benefit of another, who knowingly--
(1) steals, or without authorization appropriates,
takes, carries away, or conceals, or by fraud,
artifice, or deception obtains such information;
(2) without authorization copies, duplicates,
sketches, draws, photographs, downloads, uploads,
alters, destroys, photocopies, replicates, transmits,
delivers, sends, mails, communicates, or conveys such
information;
(3) receives, buys, or possesses such information,
knowing the same to have been stolen or appropriated,
obtained, or converted without authorization;
(4) attempts to commit any offense described in
paragraphs (1) through (3);
(5) wrongfully solicits another to commit any offense
described in paragraphs (1) through (3); or
(6) conspires with one or more other persons to
commit any offense described in paragraphs (1) through
(3), and one or more of such persons do any act to
effect the object of the conspiracy,
shall, except as provided in subsection (b), be fined up to
$250,000, or twice the value of the proprietary economic
information, whichever is greater, or imprisoned not more than
10 years, or both.
(b) Any corporation that commits any offense described in
paragraphs (1) through (6) of subsection (a) shall be fined up
to $10,000,000, or twice the economic value of the proprietary
economic information, whichever is greater.
(c) This section does not prohibit the reporting of any
suspected criminal activity or regulatory violation to any
appropriate agency or instrumentality of the United States, or
a political subdivision of a State, or to Congress.
Sec. 1833. Criminal forfeiture
(a) Notwithstanding any provision of State law, any person
convicted of a violation under this chapter shall forfeit to
the United States--
(1) any property, constituting or derived from, any
proceeds the person obtained, directly or indirectly,
as the result of such violations; and
(2) any of the person's property used, or intended to
be used, in any manner or part to commit or facilitate
the commission of such violation.
(b) The court, in imposing a sentence on such person, shall
order, in addition to any other sentence imposed pursuant to
this chapter, that the person forfeit to the United States all
property described in this section.
(c) Property subject to forfeiture under this section, any
seizure and disposition thereof, and any administrative or
judicial proceeding in relation thereto, shall be governed by
section 413 of the Comprehensive Drug Abuse Prevention and
Control Act of 1970 (21 U.S.C. 853), except for subsection
413(d) which shall not apply to forfeitures under this section.
(d) Notwithstanding section 524(c) of title 28, there shall
be deposited in the Crime Victims Fund established under
section 1402 of the Victims of Crime Act of 1984 (42 U.S.C.
10601) all amounts from the forfeiture of property under this
section remaining after the payment of expenses and sale
authorized by law.
Sec. 1834. Import and export sanctions
(a) The President may, to the extent consistent with
international agreements to which the United States is a party,
prohibit, for a period of not longer than 5 years, the
importation into, or exportation from, the United States,
whether by carriage of tangible items or by transmission, any
merchandise produced, made, assembled, or manufactured by a
person convicted of any offense described in section 1832 of
this title, or in the case of an organization convicted of any
offense described in such section, its successor entity or
entities.
(b)(1) The Secretary of the Treasury may impose on any
person who knowingly violates any order of the President issued
under the authority of this section, a civil penalty equal to
not more than 5 times the value of the exports or imports
involved, or $100,000, whichever is greater.
(2) Any merchandise imported or exported in violation of an
order of the President issued under this section shall be
subject to seizure and forfeiture in accordance with sections
602 through 619 of the Tariff Act of 1930.
(3) The provisions of law relating to seizure, summary and
judicial forfeiture, and condemnation of property for violation
of the United States customs laws, the disposition of such
property or the proceeds from the sale thereof, the remission
or mitigation of such forfeiture, and the compromise of claims,
shall apply to seizures and forfeitures incurred, or alleged to
have been incurred under this section to the extent that they
are applicable and not inconsistent with the provisions of this
chapter.
Sec. 1835. Extraterritoriality
(a) This chapter applies to conduct occurring within the
United States.
(b) This chapter applies to conduct occurring outside the
territorial and special maritime jurisdiction of the United
States, its territories, and possessions if--
(1) the offender is a United States person; or
(2) an act in furtherance of the offense was
committed in the United States.
Sec. 1836. Construction with other laws
This chapter shall not be construed to preempt or displace
any other Federal or State remedies, whether civil or criminal,
for the misappropriation of proprietary economic information,
or to affect the otherwise lawful disclosure of information by
any government employee under section 552 of title 5 (commonly
known as the Freedom of Information Act).
Sec. 1837. Preservation of confidentiality
In any prosecution under this chapter, the court may enter
such orders and take such other action as may be necessary and
appropriate to preserve the confidentiality of proprietary
economic information, consistent with rule 16 of the Federal
Rules of Criminal Procedure, the Federal Rules of Evidence, and
other applicable laws. An interlocutory appeal by the United
States shall lie from a decision or order of a district court
authorizing the disclosure of proprietary economic information.
Sec. 1838. Prior authorization requirement
The United States may not file a charge under this chapter
or use a violation of this chapter as a predicate offense under
any other law without the personal approval of the Attorney
General, the Deputy Attorney General, or the Assistant Attorney
General for the Criminal Division of the Department of Justice.
Sec. 1839. Law enforcement and intelligence activities
This chapter does not prohibit any and shall not impair
otherwise lawful activity conducted by an agency or
instrumentality of the United States, a State, or a political
subdivision of a State, or an intelligence agency of the United
States.
* * * * * * *
CHAPTER 119--WIRE INTERCEPTION AND INTERCEPTION OF ORAL COMMUNICATIONS
* * * * * * *
Sec. 2516. Authorization for interception of wire, oral, or electronic
communications
(1) The Attorney General, Deputy Attorney General,
Associate Attorney General, or any Assistant Attorney General,
any acting Assistant Attorney General, or any Deputy Assistant
Attorney General in the Criminal Division specially designated
by the Attorney General, may authorize an application to a
Federal judge of competent jurisdiction for, and such judge may
grant in conformity with section 2518 of this chapter an order
authorizing or approving the interception of wire or oral
communications by the Federal Bureau of Investigation, or a
Federal agency having responsibility for the investigation of
the offense as to which the application is made, when such
interception may provide or has provided evidence of--
(a) any offense punishable by death or by
imprisonment for more than one year under sections 2274
through 2277 of title 42 of the United States Code
(relating to the enforcement of the Atomic Energy Act
of 1954), section 2284 of title 42 of the United States
Code (relating to sabotage of nuclear facilities or
fuel), or under the following chapters of this title:
chapter 90 (relating to economic espionage and
protection of proprietary economic information in
interstate and foreign commerce), chapter 37 (relating
to espionage), chapter 105 (relating to sabotage),
chapter 115 (relating to treason), chapter 102
(relating to riots) chapter 65 (relating to malicious
mischief), chapter 111 (relating to destruction of
vessels), or chapter 81 (relating to piracy);
<greek-d>
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|