-Caveat Lector- <A HREF="http://www.ctrl.org/"> </A> -Cui Bono?- FULL TEXT OF REPORT AT: http://www.politechbot.com/docs/unlawfulconduct.txt ===== Wired News obtained this document, which the White House is preparing to release: http://www.wired.com/news/politics/0,1283,34720,00.html (4 Mar 2000) Politechbot.com archive and subscription information: http://www.politechbot.com/ President Clinton's executive order commissioning report: http://www.pub.whitehouse.gov/uri-res/I2R?urn:pdi://oma.eop.gov.us/1999/8/9/11 .text.2 An HTML version of this document is available: http://www.politechbot.com/docs/unlawfulconduct.html Photos from White House security summit in Feb 2000: http://www.mccullagh.org/theme/white-house-security.html Justice Department complains to Congress about anonymity online: http://www.wired.com/news/politics/0,1283,34659,00.html (1 Mar 2000) ---------------------------------------------------------------------------- THE ELECTRONIC FRONTIER: THE CHALLENGE OF UNLAWFUL CONDUCT INVOLVING THE USE OF THE INTERNET A Report of the Presidents Working Group on Unlawful Conduct on the Internet February 2000 THE ELECTRONIC FRONTIER: THE CHALLENGE OF UNLAWFUL CONDUCT INVOLVING THE USE OF THE INTERNET TABLE OF CONTENTS EXECUTIVE SUMMARY iv I. INTRODUCTION 1 A. Executive Order 13,133 2 B. The Working Group on Unlawful Conduct on the Internet 3 C. Summary of Strategy 4 II. POLICY FRAMEWORK AND LEGAL ANALYSIS 5 A. Understanding the Nature of Unlawful Conduct Involving Computers 7 1. Computers as Targets 7 2. Computers as Storage Devices 9 3. Computers as Communications Tools 9 B. A Framework for Evaluating Unlawful Conduct on the Internet 11 1. Online-Offline Consistency 11 2. Appropriate Investigative Tools 12 3. Technology-Neutrality 13 4. Consideration of Other Societal Interests 13 C. Sufficiency of Existing Federal Laws 14 1. Analysis of Substantive Laws 14 2. New Investigatory Challenges 16 III. LAW ENFORCEMENT NEEDS AND CHALLENGES 22 A. Protecting Computers and Networks 22 B. Federal Tools and Capabilities 23 1. Personnel, Equipment, and Training 23 2. Locating and Identifying Cybercriminals 26 3. Collecting Evidence 30 TABLE OF CONTENTS (cont.) C. State and Local Tools and Capabilities 30 1. Jurisdiction 30 2. Interstate and Federal-State Cooperation 32 3. Resources 33 D. Private Sector Leadership 34 E. Legal Authorities: Gaps in Domestic Laws 37 1. Pen Register and Trap and Trace Statute 37 2. Computer Fraud and Abuse Act 37 3. Privacy Protection Act 39 4. Electronic Communications Privacy Act 39 5. Telephone Harassment 40 6. Cable Communications Policy Act 40 F. Challenges for International Cooperation 41 1. Substantive International Criminal Law 41 2. Multilateral Efforts 43 3. Continuing Need for International Cooperation 43 IV. THE ROLE OF PUBLIC EDUCATION AND EMPOWERMENT 44 A. Educating and Empowering Parents, Teachers, and Children 44 1. Technological Tools 45 2. Non-technological Tools 47 B. Educating and Empowering Consumers 51 1. FTC Initiatives: Using Technology to Educate Consumers 52 2. Department of Commerce Initiatives 56 3. FDAs Outreach Campaign 56 4. SECs Investor Education Efforts 57 5. CPSCs Consumer Outreach Efforts 57 C. Developing Cybercitizens 57 V. CONCLUSIONS AND RECOMMENDATIONS 59 TABLE OF CONTENTS (cont.) APPENDICES A EXECUTIVE ORDER 13,133 B INTERNET FRAUD C ONLINE CHILD PORNOGRAPHY D INTERNET SALE OF PRESCRIPTION DRUGS AND CONTROLLED SUBSTANCES E INTERNET SALE OF FIREARMS F INTERNET GAMBLING G INTERNET SALE OF ALCOHOL H ONLINE SECURITIES FRAUD I SOFTWARE PIRACY AND INTELLECTUAL PROPERTY THEFT J MULTILATERAL EFFORTS <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are not allowed. Substance—not soap-boxing! These are sordid matters and 'conspiracy theory'—with its many half-truths, misdirections and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html http:[EMAIL PROTECTED]/ ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om