-Caveat Lector-   <A HREF="http://www.ctrl.org/">
</A> -Cui Bono?-

FULL TEXT OF REPORT AT:
http://www.politechbot.com/docs/unlawfulconduct.txt
=====
   Wired News obtained this document, which the White House is preparing
   to release:
   http://www.wired.com/news/politics/0,1283,34720,00.html (4 Mar 2000)

   Politechbot.com archive and subscription information:
   http://www.politechbot.com/

   President Clinton's executive order commissioning report:

http://www.pub.whitehouse.gov/uri-res/I2R?urn:pdi://oma.eop.gov.us/1999/8/9/11
.text.2

   An HTML version of this document is available:
   http://www.politechbot.com/docs/unlawfulconduct.html

   Photos from White House security summit in Feb 2000:
   http://www.mccullagh.org/theme/white-house-security.html

   Justice Department complains to Congress about anonymity online:
   http://www.wired.com/news/politics/0,1283,34659,00.html (1 Mar 2000)

----------------------------------------------------------------------------


   THE ELECTRONIC FRONTIER: THE CHALLENGE OF
   UNLAWFUL CONDUCT INVOLVING THE USE OF THE INTERNET

   A Report of the Presidents Working Group
   on Unlawful Conduct on the Internet



   February 2000

   THE ELECTRONIC FRONTIER: THE CHALLENGE OF

   UNLAWFUL CONDUCT INVOLVING THE USE OF THE INTERNET


   TABLE OF CONTENTS


   EXECUTIVE SUMMARY
   iv

       I. INTRODUCTION 1

   A. Executive Order 13,133 2
       B. The Working Group on Unlawful Conduct on the Internet 3
       C. Summary of Strategy 4

   II. POLICY FRAMEWORK AND LEGAL ANALYSIS
   5

       A. Understanding the Nature of Unlawful Conduct Involving

   Computers 7

   1. Computers as Targets 7
       2. Computers as Storage Devices 9
       3. Computers as Communications Tools 9

   B. A Framework for Evaluating Unlawful Conduct on the

   Internet 11

   1. Online-Offline Consistency 11
       2. Appropriate Investigative Tools 12
       3. Technology-Neutrality 13
       4. Consideration of Other Societal Interests 13

   C. Sufficiency of Existing Federal Laws 14

   1. Analysis of Substantive Laws 14
       2. New Investigatory Challenges 16

   III. LAW ENFORCEMENT NEEDS AND CHALLENGES
   22

       A. Protecting Computers and Networks 22
       B. Federal Tools and Capabilities 23

   1. Personnel, Equipment, and Training 23
       2. Locating and Identifying Cybercriminals 26
       3. Collecting Evidence 30

   TABLE OF CONTENTS (cont.)


   C. State and Local Tools and Capabilities 30

   1. Jurisdiction 30
       2. Interstate and Federal-State Cooperation 32
       3. Resources 33

   D. Private Sector Leadership 34

   E. Legal Authorities: Gaps in Domestic Laws 37

   1. Pen Register and Trap and Trace Statute 37
       2. Computer Fraud and Abuse Act 37
       3. Privacy Protection Act 39
       4. Electronic Communications Privacy Act 39
       5. Telephone Harassment 40
       6. Cable Communications Policy Act 40

   F. Challenges for International Cooperation 41

   1. Substantive International Criminal Law 41
       2. Multilateral Efforts 43
       3. Continuing Need for International Cooperation 43

   IV. THE ROLE OF PUBLIC EDUCATION AND EMPOWERMENT
   44

       A. Educating and Empowering Parents, Teachers, and

   Children 44

   1. Technological Tools 45
       2. Non-technological Tools 47

   B. Educating and Empowering Consumers 51

   1. FTC Initiatives: Using Technology to Educate Consumers 52
       2. Department of Commerce Initiatives 56
       3. FDAs Outreach Campaign 56
       4. SECs Investor Education Efforts 57
       5. CPSCs Consumer Outreach Efforts 57

   C. Developing Cybercitizens 57

   V. CONCLUSIONS AND RECOMMENDATIONS
   59

   TABLE OF CONTENTS (cont.)


   APPENDICES

   A EXECUTIVE ORDER 13,133
       B INTERNET FRAUD
       C ONLINE CHILD PORNOGRAPHY
       D INTERNET SALE OF PRESCRIPTION DRUGS AND CONTROLLED

   SUBSTANCES

   E INTERNET SALE OF FIREARMS
       F INTERNET GAMBLING
       G INTERNET SALE OF ALCOHOL
       H ONLINE SECURITIES FRAUD
       I SOFTWARE PIRACY AND INTELLECTUAL PROPERTY THEFT
       J MULTILATERAL EFFORTS

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are not allowed. Substance—not soap-boxing!  These are sordid matters
and 'conspiracy theory'—with its many half-truths, misdirections and outright
frauds—is used politically by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to