Federal Investigation and Prosecution of Computer and Intellectual Property Crimes Matthew Devlin Assistant United States Attorney Computer Hacking and.

Slides:



Advertisements
Similar presentations
Intellectual Property Rights: Criminal Enforcement
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
Association of Corporate Counsel Houston Chapter Meeting of June 8, 2010 What to Do When the Feds Come Knocking In-House Responsibilities for Criminal.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
Prosecuting Intellectual Property Cases Arnold H. Huftalen Assistant U.S. Attorney U.S. Department of Justice
Intellectual Property Task Force. Mission Statement To examine all aspects of the Department of Justice's activities in connection with the enforcement.
World Intellectual Property Organization (WIPO) Dispute Settlement and Effective Enforcement of IP.
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Lecture 14: Crime.
International Theft of Trade Secret: A Case Study Presented by: Nenette Day.
TCLEOSE Course No th Legislature SB – 473; SECTION 8. Section , Occupations Code, is amended by adding Subsection (i) to read as follows:
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
The University Startup Company Law Firm California Massachusetts Florida (310) Stephen P.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
 Freedom of Information Act General Background. Access to Army Records. Exemptions. Exclusions. Procedural Rules for Processing FOIA Requests for Army.
Mohd Taufik Abdullah Department of Computer Science
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Steven D. Grimberg United States Attorney’s Office Northern District of Georgia DATA SECURITY BREACHES.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
Intellectual Property Boston College Law School February 10, 2009 Trade Secret – Part 2.
Intellectual Property Boston College Law School February 13, 2008 Trade Secret – Part 3.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
INTERNET and CODE OF CONDUCT
Protecting your company’s valuable information
Class 7 Internet Privacy Law Your Digital Afterlife.
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
HIPAA PRIVACY AND SECURITY AWARENESS.
Anti-counterfeiting Activities by the Korean Intellectual Property Office June 2006 KIPO The Korean Intellectual Property Office.
Quick! What is a crime?. So, just how much has to be proven in court to find someone guilty of a crime? Burden of Proof The prosecution has the burden.
© 2009 Foley Hoag LLP. All Rights Reserved.Presentation Title Final Massachusetts Pharmaceutical and Medical Device Regulations Penalties and Enforcement.
WHEN THE DEPARTMENT OF JUSTICE KNOCKS DOJ Enforcement Trends: What to Expect and How to Respond Jacqueline Arango Shareholder Akerman Senterfitt.
Intellectual Property Intellectual Property. Intellectual Property Intellectual effort, not by physical labor Intangible property Lawsuits involve infringement.
U.S. Copyright Enforcement Benjamin Hardman Attorney / Advisor Office of Intellectual Property Policy & Enforcement, USPTO.
Chapter 9-Section 1 Resolving Credit Problems. Disputing Charges—Credit Card Statement  Disputing Charges—the process of informing a credit card company.
The AIRCRAFT SAFETY ACT of 2000 H.R Wendell H. Ford Aviation Investment and Reform Act for the 21st Century.
11 CLASS 14 Spyware & Computer Crimes pt. 2 Computers and the Law Randy Canis.
PROTECTING YOUR IP RIGHTS Waldo Steyn, Senior Associate, Intellectual Property December 2012.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 22 Criminal Law and Procedure in Business.
1 Enforcement Options and Case Studies Lisa Brown Assistant Counsel for Enforcement Cal/EPA CUPA/UST Conference February 8, 2006 February 8, 2006.
11 Controlling Organized Crime.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Financial Exploitation Legal. § 108A ‑ 102. Duty to report; content of report; immunity. Legal Section (a) Any person having reasonable cause to believe.
Mission Statement The mission of NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention,
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Cybercrime What is it, what does it cost, & how is it regulated?
Protection of Trade Secrets; current issues WIPO-UKRAINE SUMMER SCHOOL ON INTELLECTUAL PROPERTY – JULY 2011.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
Chapter 5 Criminal Law.  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for a crime?  What.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
Copyright, Intellectual Property, and Privacy 1 Lesson Plan: BMM A9-4.
The R.I.C.O. Statute By UN CICP. Why Is Organized Crime So Difficult to Fight? n It is a hidden phenomenon n It is produced by organizations that have:
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
IPR Enforcement in the United Kingdom Kenny Wright Danish Patent and Trademark Office.
Intro to Intellectual Property 3.0
Investigative Insights from the FDA Office of Criminal Investigations
U.S. Department of Justice
Forensic and Investigative Accounting
Trade Secret Definitions (common definition of value omitted)
Prosecuting International Intellectual Property Crimes
Theft of Trade Secrets & Economic Espionage
Trade Secrets CJ 520 / CJ September 27, 2010.
IPR Border Enforcement in the United States
Presentation transcript:

Federal Investigation and Prosecution of Computer and Intellectual Property Crimes Matthew Devlin Assistant United States Attorney Computer Hacking and Intellectual Property Coordinator United States Attorney’s Office Western District of Texas Austin, Texas 1Nov 2012

Overview Computer Hacking & Intellectual Property (CHIP) Program and Network Computer Hacking & Intellectual Property (CHIP) Program and Network DOJ Computer Crimes & Intellectual Property Section (CCIPS) DOJ Computer Crimes & Intellectual Property Section (CCIPS) Types of Cases Types of Cases Computer CrimesComputer Crimes Intellectual Property Rights CrimesIntellectual Property Rights Crimes Working With Victim Companies Working With Victim Companies 2 Nov 2012

What is the CHIP Program? Nationwide CHIP Network Nationwide CHIP Network At least one CHIP prosecutor in each of 93 U.S. Attorney’s Offices At least one CHIP prosecutor in each of 93 U.S. Attorney’s Offices More than 250 CHIP attorneys nationwideMore than 250 CHIP attorneys nationwide CHIP Units in 25 U.S. Attorney’s Offices CHIP Units in 25 U.S. Attorney’s Offices Austin/San AntonioAustin/San Antonio Dallas, San Francisco, Los Angeles, Sacramento, San Diego, Seattle Denver, New Haven, Tampa, Miami, Atlanta, Chicago, Baltimore, Boston, Detroit, Kansas City, Newark. Brooklyn, New York, Philadelphia, Pittsburgh, Nashville, Alexandria, and Washington, D.C.Dallas, San Francisco, Los Angeles, Sacramento, San Diego, Seattle Denver, New Haven, Tampa, Miami, Atlanta, Chicago, Baltimore, Boston, Detroit, Kansas City, Newark. Brooklyn, New York, Philadelphia, Pittsburgh, Nashville, Alexandria, and Washington, D.C. 3 Nov 2012

CHIP Responsibilities Prosecute Core Offenses Prosecute Core Offenses Computer CrimeComputer Crime Intellectual Property Rights OffensesIntellectual Property Rights Offenses In-house Subject Matter Expertise In-house Subject Matter Expertise Advice and training to prosecutors and agentsAdvice and training to prosecutors and agents Outreach: Law Enforcement Outreach: Law Enforcement Incident ResponseIncident Response Search Warrants / 2703 ProcessSearch Warrants / 2703 Process Advice and SupportAdvice and Support Outreach: Community Outreach: Community Familiarize IP community with law enforcement optionsFamiliarize IP community with law enforcement options 4 Nov 2012

Cybercrime.gov Public Page Public Page Latest News Releases Latest News Releases Documents & Reports Documents & Reports Contact Info Contact Info Cases Cases 5 Nov 2012

IP Enforcement National IP Rights Coordination Center (DHS) National IP Rights Coordination Center (DHS) Multi-agency clearinghouseMulti-agency clearinghouse FBI, DHS, USPIS, FDA, other agenciesFBI, DHS, USPIS, FDA, other agencies DOJ CCIPS DOJ CCIPS U.S. Attorney’s Offices – CHIP Program U.S. Attorney’s Offices – CHIP Program Nov

DOJ International Presence Intellectual Property Law Enforcement Coordinator (IPLEC) Intellectual Property Law Enforcement Coordinator (IPLEC) Bangkok, Thailand China/Southeast Asia Sofia, Bulgaria Eastern Europe 7 Nov 2012

International Cooperation G8 24/7 Network G8 24/7 Network 49 countries (map, right)49 countries (map, right) DOJ (CCIPS) is the U.S. point of contactDOJ (CCIPS) is the U.S. point of contact Around-the-clock assistance availableAround-the-clock assistance available Council of Europe Convention on Cybercrime Council of Europe Convention on Cybercrime Facilitates international investigation/ prosecutionFacilitates international investigation/ prosecution Minimizes substantive and procedural obstaclesMinimizes substantive and procedural obstacles 8 Nov 2012

Federal Judicial Districts in Texas SouthernDistrict Houston CorpusChristi Brownsville Laredo McAllen EasternDistrictSherman Tyler Beaumont Lufkin WesternDistrict El Paso Pecos Midland Del Rio San Antonio Austin Waco Alpine NorthernDistrict Amarillo Lubbock Fort Worth Abilene Dallas San Angelo 9 Nov 2012

Computer Crime Cases Hacking / Unauthorized Access Hacking / Unauthorized Access Virus/Worm attacksVirus/Worm attacks Denial of service attacksDenial of service attacks Theft of data and electronically stored infoTheft of data and electronically stored info Computer Fraud Computer Fraud PhishingPhishing Internet Fraud/Theft Internet Fraud/Theft 10 Nov 2012

Cybercrime Statutes Identity Theft (18 U.S.C. § 1028) Identity Theft (18 U.S.C. § 1028) Aggravated Identity Theft (18 U.S.C. § 1028A) Aggravated Identity Theft (18 U.S.C. § 1028A) Access Device Fraud (18 U.S.C. § 1029) Access Device Fraud (18 U.S.C. § 1029) Computer Fraud and Abuse (18 U.S.C. § 1030) Computer Fraud and Abuse (18 U.S.C. § 1030) CAN-SPAM Act (18 U.S.C. § 1037) CAN-SPAM Act (18 U.S.C. § 1037) Wire Fraud (18 U.S.C. § 1343) Wire Fraud (18 U.S.C. § 1343) Communications Interference (18 U.S.C. § 1362) Communications Interference (18 U.S.C. § 1362) Wiretap Act (18 U.S.C. § 2511) Wiretap Act (18 U.S.C. § 2511) Unlawful Access to Stored Communications (18 U.S.C. § 2701) Unlawful Access to Stored Communications (18 U.S.C. § 2701) 11 Nov 2012

Intellectual Property Cases Criminal Copyright Infringement Criminal Copyright Infringement Digital Millennium Copyright ActDigital Millennium Copyright Act Trademark / Counterfeit Product offenses Trademark / Counterfeit Product offenses Online PiracyOnline Piracy Counterfeit PharmaceuticalsCounterfeit Pharmaceuticals Economic Espionage Economic Espionage Theft of Trade Secrets Theft of Trade Secrets 12 Nov 2012

IPR Criminal Statutes Copyrighted Works Copyrighted Works Criminal Infringement of a Copyright (18 U.S.C. § 2319 & 17 U.S.C. § 506) - Up to 5 yearsCriminal Infringement of a Copyright (18 U.S.C. § 2319 & 17 U.S.C. § 506) - Up to 5 years Trafficking in Counterfeit Labels for Software & Music (18 U.S.C. § 2318) - Up to 5 yearsTrafficking in Counterfeit Labels for Software & Music (18 U.S.C. § 2318) - Up to 5 years Trafficking in Recordings/Videos of Live Musical Performances (18 U.S.C. § 2319A) - Up to 5 yearsTrafficking in Recordings/Videos of Live Musical Performances (18 U.S.C. § 2319A) - Up to 5 years Unauthorized Recording of Movies in a Theater (18 U.S.C. § 2319B) – Up to 3 yearsUnauthorized Recording of Movies in a Theater (18 U.S.C. § 2319B) – Up to 3 years Circumvention of Copyright Protection Systems (17 U.S.C. §§ ) - Up to 5 yearsCircumvention of Copyright Protection Systems (17 U.S.C. §§ ) - Up to 5 years Unauthorized Reception of Cable Services (47 U.S.C. § 553) - 6 mos (individual use) / 2 years (commercial gain)Unauthorized Reception of Cable Services (47 U.S.C. § 553) - 6 mos (individual use) / 2 years (commercial gain) 13 Nov 2012

IPR Criminal Statutes Trademarks Trademarks Trafficking in Counterfeit Goods & Services (18 U.S.C. § 2320) - Up to 10 yearsTrafficking in Counterfeit Goods & Services (18 U.S.C. § 2320) - Up to 10 years Trade Secrets Trade Secrets Economic Espionage (18 U.S.C. § 1831) - Up to 15 yearsEconomic Espionage (18 U.S.C. § 1831) - Up to 15 years Theft of Trade Secrets (18 U.S.C. § 1832) - Up to 10 years (corporation - up to $5M fine)Theft of Trade Secrets (18 U.S.C. § 1832) - Up to 10 years (corporation - up to $5M fine) Confidentiality- Protective orders and other actions authorized (18 U.S.C. § 1835)Confidentiality- Protective orders and other actions authorized (18 U.S.C. § 1835) 14 Nov 2012

18 U.S.C. § 1831 Economic Espionage Act (a) In general.--Whoever, intending or knowing that the offense will benefit any foreign government, foreign instrumentality, or foreign agent, knowingly-- (a) In general.--Whoever, intending or knowing that the offense will benefit any foreign government, foreign instrumentality, or foreign agent, knowingly-- (1) steals, or without authorization appropriates, takes, carries away, or conceals, or by fraud, artifice, or deception obtains a trade secret;(1) steals, or without authorization appropriates, takes, carries away, or conceals, or by fraud, artifice, or deception obtains a trade secret; (2) without authorization copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys a trade secret;(2) without authorization copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys a trade secret; (3) receives, buys, or possesses a trade secret, knowing the same to have been stolen or appropriated, obtained, or converted without authorization;(3) receives, buys, or possesses a trade secret, knowing the same to have been stolen or appropriated, obtained, or converted without authorization; (4) attempts to commit any offense described in any of paragraphs (1) through (3); or(4) attempts to commit any offense described in any of paragraphs (1) through (3); or (5) conspires with one or more other persons to commit any offense described in any of paragraphs (1) through (3), and one or more of such persons do any act to effect the object of the conspiracy,(5) conspires with one or more other persons to commit any offense described in any of paragraphs (1) through (3), and one or more of such persons do any act to effect the object of the conspiracy, shall, except as provided in subsection (b), be fined not more than $500,000 or imprisoned not more than 15 years, or both. (b) Organizations.--Any organization that commits any offense described in subsection (a) shall be fined not more than $10,000,000. (b) Organizations.--Any organization that commits any offense described in subsection (a) shall be fined not more than $10,000,000. Nov

18 U.S.C. § 1832 Theft of Trade Secrets (a) Whoever, with intent to convert a trade secret, that is related to or included in a product that is produced for or placed in interstate or foreign commerce, to the economic benefit of anyone other than the owner thereof, and intending or knowing that the offense will, injure any owner of that trade secret, knowingly-- (a) Whoever, with intent to convert a trade secret, that is related to or included in a product that is produced for or placed in interstate or foreign commerce, to the economic benefit of anyone other than the owner thereof, and intending or knowing that the offense will, injure any owner of that trade secret, knowingly-- (1) steals, or without authorization appropriates, takes, carries away, or conceals, or by fraud, artifice, or deception obtains such information;(1) steals, or without authorization appropriates, takes, carries away, or conceals, or by fraud, artifice, or deception obtains such information; (2) without authorization copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys such information;(2) without authorization copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys such information; (3) receives, buys, or possesses such information, knowing the same to have been stolen or appropriated, obtained, or converted without authorization;(3) receives, buys, or possesses such information, knowing the same to have been stolen or appropriated, obtained, or converted without authorization; (4) attempts to commit any offense described in paragraphs (1) through (3); or(4) attempts to commit any offense described in paragraphs (1) through (3); or (5) conspires with one or more other persons to commit any offense described in paragraphs (1) through (3), and one or more of such persons do any act to effect the object of the conspiracy,(5) conspires with one or more other persons to commit any offense described in paragraphs (1) through (3), and one or more of such persons do any act to effect the object of the conspiracy, shall, except as provided in subsection (b), be fined under this title or imprisoned not more than 10 years, or both. (b) Any organization that commits any offense described in subsection (a) shall be fined not more than $5,000,000. (b) Any organization that commits any offense described in subsection (a) shall be fined not more than $5,000,000. Nov

Trade Secret (18 U.S.C. § 1839) all forms and types of financial, business, scientific, technical, economic, or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing if …” all forms and types of financial, business, scientific, technical, economic, or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing if …” The owner has taken reasonable measures to keep such information secret - AND –The owner has taken reasonable measures to keep such information secret - AND – The information derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable through proper means by, the publicThe information derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable through proper means by, the public “owner” means the person or entity in whom or in which rightful legal or equitable title to, or license in, the trade secret is reposed. “owner” means the person or entity in whom or in which rightful legal or equitable title to, or license in, the trade secret is reposed. 17 Nov 2012

Foreign Instrumentality/Agent (18 U.S.C. § 1839) “foreign instrumentality” means any agency, bureau, ministry, component, institution, association, or any legal, commercial, or business organization, corporation, firm, or entity that is substantially owned, controlled, sponsored, commanded, managed, or dominated by a foreign government; “foreign instrumentality” means any agency, bureau, ministry, component, institution, association, or any legal, commercial, or business organization, corporation, firm, or entity that is substantially owned, controlled, sponsored, commanded, managed, or dominated by a foreign government; “foreign agent” means any officer, employee, proxy, servant, delegate, or representative of a foreign government; “foreign agent” means any officer, employee, proxy, servant, delegate, or representative of a foreign government; Nov

Confidentiality & Non-Disclosure (18 U.S.C. § 1835) In any prosecution or other proceeding under this chapter, the court shall enter such orders and take such other action as may be necessary and appropriate to preserve the confidentiality of trade secrets, consistent with the requirements of the Federal Rules of Criminal and Civil Procedure, the Federal Rules of Evidence, and all other applicable laws. An interlocutory appeal by the United States shall lie from a decision or order of a district court authorizing or directing the disclosure of any trade secret. In any prosecution or other proceeding under this chapter, the court shall enter such orders and take such other action as may be necessary and appropriate to preserve the confidentiality of trade secrets, consistent with the requirements of the Federal Rules of Criminal and Civil Procedure, the Federal Rules of Evidence, and all other applicable laws. An interlocutory appeal by the United States shall lie from a decision or order of a district court authorizing or directing the disclosure of any trade secret. Nov

Criminal Enforcement of IPR Criminal charges can be brought when there is willful or knowing infringement. Criminal charges can be brought when there is willful or knowing infringement. Criminal cases require a higher burden of proof: “Beyond a reasonable doubt” Criminal cases require a higher burden of proof: “Beyond a reasonable doubt” Remedies: incarceration, fines, and restitution Remedies: incarceration, fines, and restitution Common factors affecting whether to charge a criminal violation include: Common factors affecting whether to charge a criminal violation include: Organized Criminal InvolvementOrganized Criminal Involvement Public Health and Safety ConcernsPublic Health and Safety Concerns Commercial Nature of ViolationCommercial Nature of Violation Amount of Loss & HarmAmount of Loss & Harm Violation of Previous JudgmentViolation of Previous Judgment 20 Nov 2012

Criminal Investigation and Prosecution Team Coordinate investigative and legal strategy Coordinate investigative and legal strategy Focus On Electronic Evidence Focus On Electronic Evidence Determine source IP address(es)Determine source IP address(es) Seize ComputersSeize Computers Search Warrants Search Warrants Traditional Investigative Steps Traditional Investigative Steps Search Warrant / SurveillanceSearch Warrant / Surveillance Undercover / Confidential informantsUndercover / Confidential informants Banking / Transaction RecordsBanking / Transaction Records ConfessionConfession 21 Nov 2012

Why Report Cyber/IPR Crime? Perpetrators are organized and large-scale violators Perpetrators are organized and large-scale violators Anyone can be - and many have been - a victim... and may be again. Anyone can be - and many have been - a victim... and may be again. Help prevent future violations & losses Help prevent future violations & losses Ensure the costs of engaging in criminal activities outweigh the benefits Ensure the costs of engaging in criminal activities outweigh the benefits Public companies likely must disclose anyway Public companies likely must disclose anyway The sooner, the better The sooner, the better 22 Nov 2012

Why Report? Enforcing IP Rights Can: Enforcing IP Rights Can: Improve product-related health and safetyImprove product-related health and safety Foster growth of economic industries (software, high tech, etc.)Foster growth of economic industries (software, high tech, etc.) Foster creativityFoster creativity Create incentive for investmentCreate incentive for investment Fulfill international treaty obligationsFulfill international treaty obligations 23 Nov 2012

The Criminal Process: What to Expect Initial report to law enforcement Initial report to law enforcement Results of internal investigation?Results of internal investigation? Loss/Damage valuationLoss/Damage valuation Civil remedies should always be consideredCivil remedies should always be considered Sting operation?Sting operation? LE will use best efforts to minimize disruption to normal business operations LE will use best efforts to minimize disruption to normal business operations Victim cooperation Victim cooperation Establish Ownership / Unauthorized AccessEstablish Ownership / Unauthorized Access Identify Counterfeit ProductsIdentify Counterfeit Products Address Technical IssuesAddress Technical Issues Intrusion issues Intrusion issues Proving trade secret Proving trade secret Evidence gathering Evidence gathering GJ subpoenasGJ subpoenas Search Warrants / 2703 processSearch Warrants / 2703 process Evidence preservationEvidence preservation 24 Nov 2012

The Criminal Process: Prosecution Prosecution Prosecution Plea negotiationsPlea negotiations IndictmentIndictment Notification to victim of significant prosecution eventsNotification to victim of significant prosecution events Discovery Discovery Rule 16, FRCrPRule 16, FRCrP Brady obligationsBrady obligations Protective OrderProtective Order Sentencing Sentencing Loss/Damage amount Loss/Damage amount Restitution Restitution Forfeiture Forfeiture 25 Nov 2012

The Criminal Process: Things to Keep in Mind Pending/anticipated civil litigation Pending/anticipated civil litigation Expect public disclosure of the incident(s) at some point Expect public disclosure of the incident(s) at some point Criminal investigation should not be viewed as a way to develop a civil case Criminal investigation should not be viewed as a way to develop a civil case May have limited disclosure to victim about progress of criminal investigation May have limited disclosure to victim about progress of criminal investigation Privacy Act / FOIAPrivacy Act / FOIA Grand jury secrecyGrand jury secrecy Sealed court documentsSealed court documents Once charges are filed, prosecution will move forward quickly Once charges are filed, prosecution will move forward quickly 26 Nov 2012

Federal Law Enforcement Contacts Federal Law Enforcement Contacts U.S. Attorney’s Office U.S. Attorney’s Office U.S. Secret Service U.S. Secret Service Stolen financial dataStolen financial data U.S. Postal Inspection Service U.S. Postal Inspection Service IPR crimes involving the mailsIPR crimes involving the mails Drug Enforcement Administration Drug Enforcement Administrationwww.justice.gov/dea Counterfeit pharmaceuticalsCounterfeit pharmaceuticals Federal Bureau of Investigation Federal Bureau of Investigationwww.fbi.gov Computer intrusions & IP crimes Stolen data Theft of trade secrets U.S. Immigration and Customs Enforcement U.S. Immigration and Customs Enforcement Counterfeit imported goods U.S. Food & Drug Administration U.S. Food & Drug Administrationwww.fda.gov Counterfeit pharmaceuticals Nov