Computer Crime & Intellectual Property Section
United States Department of Justice

ccips
download PDF

Chapter 5
Sentencing

  1. Base Offense Levels
    1. 1. Interstate Commerce or Communication Requirement
    2. 2. Extraterritoriality
  2. B. Adjustment Under 2B1.1
    1. 1. Background
    2. 2. Locations of Network Crimes
  3. C. CAN-SPAM Act
  4. D. Wiretap Act
    1. 1. Definition of Juvenile
    2. 2. Federal Jurisdiction
    3. 3. Delinquency Proceedings
    4. 4. Transfers to Adult Criminal Proceedings
    5. 5. Sentencing and Detention
    6. 6. Other Considerations
  5. E. Generally-Applicable Adjustments
  6. F. Conditions of Supervised Release

 

    This section addresses the United States Sentencing Guidelines ("Guidelines"), as well as the specific offense characteristics and adjustments, most commonly applicable to network crimes. This chapter should be read in light of the Supreme Court decision in United States v. Booker, 543 U.S. 220 (2005), which holds that courts must consider the United States Sentencing Guidelines but that the Guidelines are advisory rather than mandatory.

    The Guidelines treat most network crimes as basic economic offenses for which U.S.S.G. § 2B1.1 determines an offender's sentence. This guideline applies to property damage, theft, and fraud. Wiretap violations are sentenced under a different Guideline, U.S.S.G. § 2H3.1, which is discussed in Section C, below.

  1. A. Base Offense Levels
  2. Table 4 sets forth the applicable offense conduct guideline and base offense level for each of the crimes discussed in this manual. When the conviction is for an attempted violation of 18 U.S.C. § 1030(b), courts should apply the appropriate guideline for the substantive offense and then decrease the offense level by three. See U.S.S.G. § 2X1.1(a), (b)(1).

    Table 4. Sentencing Guidelines for Network Crimes
    Section of 18 U.S.C. Guidelines Base Offense Level
    § 1028(a)(7)
    § 1029
    § 1030(a)(2), (4), (5), (6)
    § 1037
    § 1343
    § 1362
    § 2701
    § 2B1.1 6; 7 if the statutory maximum term for defendant's conviction is 20 years or more
    § 1030(a)(1)
    § 1030(a)(3)
    § 1030(a)(7)
    § 2M3.2
    § 2B2.3
    § 2B3.2
    30; 35 for TS information
    4
    18
    § 2511 §§ 2B5.3, 2H3.1 8, 9

    As noted in Table 4, most network crimes will be sentenced under U.S.S.G. § 2B1.1. An offense sentenced under this section is usually assigned a basic offense level of 6.

  3. B. Adjustments Under Section 2B1.1
  4. After determining the base offense level, prosecutors must determine whether any specific offense characteristics and adjustments may apply. Several relevant specific offense characteristics and adjustments are discussed below.

    1. Loss

    Under U.S.S.G. § 2B1.1(b)(1), the base offense level is increased based on how much monetary loss the defendant caused according to a loss table:

    Table 5. Guidelines Adjustments for Loss

    LossIncreaseLossIncrease
    $5,000 or less0 More than $1,000,00016
    More than $5,0002 More than $2,500,00018
    More than $10,0004 More than $7,000,00020
    More than $30,0006 More than $20,000,00022
    More than $70,0008 More than $50,000,00024
    More than $120,00010 More than $100,000,00026
    More than $200,00012 More than $200,000,00028
    More than $400,00014 More than $400,000,00030

    The government bears the burden of proving the amount of loss by a preponderance of the evidence. See United States v. Jackson, 155 F.3d 942, 948 (8th Cir. 1998). Courts are not required to determine precisely the amount of loss attributable to a defendant. Rather, "[t]he court need only make a reasonable estimate of the loss." U.S.S.G. § 2B1.1, cmt. n.3(C); see also Elliott v. United States, 332 F.3d 753, 766 (4th Cir. 2003); Jackson, 155 F.3d at 948. That reasonable estimate should take into account available information, including, but not limited to, the following: "[t]he fair market value of the property taken ... and revenues generated by similar operations." U.S.S.G. § 2B1.1 cmt. n.3(C)(i), (v).

    In estimating the loss resulting from a defendant's unlawful intrusions, courts should include the reasonable cost of any harms caused by his criminal conduct. Such amounts should include the reasonable value of the property taken by defendant (such as the data copied). Moreover, the Application Notes instruct the court to use the greater of actual loss or intended loss to determine the appropriate offense level increase for an offender. U.S.S.G. § 2B1.1, cmt. n.3(A). If there is no reliable means of determining loss, the court is directed to use the gain to the defendant instead. U.S.S.G. § 2B1.1, cmt. n.3(B); cf. United States v. Chatterji, 46 F.3d 1336, 1340 (4th Cir. 1995) (holding that gain cannot be used where there is no loss); United States v. Andersen, 45 F.3d 217, 221-22 (7th Cir. 1995) (same).

    Generally, "actual loss" is limited to "reasonably foreseeable pecuniary harm that resulted from the offense." In addition, the definition of "intended loss" makes it clear that intended pecuniary harm should be counted even if it "would have been impossible or unlikely to occur." (See the discussion of the "economic realities" doctrine on page 114).

    Beyond the general rules for calculating loss under the Guidelines, there is an additional comment that expands the definition of "actual loss" to include certain additional harms, whether or not reasonably foreseeable, in cases brought under 18 U.S.C. § 1030. U.S.S.G. § 2B1.1, cmt. n.3(A)(v)(III). The commentary to the 2005 Guidelines states that for such offenses:

    actual loss includes the following pecuniary harm, regardless of whether such pecuniary harm was reasonably foreseeable: any reasonable cost to the victim including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other damages incurred because of interruption of service.

    Id. (emphasis added).

    Note that this definition adds to the normal definition of "actual loss" used to calculate sentences under the Guidelines. Accordingly, it is not to be used in place of, but rather in addition to, the fair market value of the data taken by a defendant. This additional language expands the usual definition of "actual loss" for section 1030 offenses by including the value of certain pecuniary harms even if not reasonably foreseeable. However, this expansion only applies to "actual loss" and not to "intended loss." Id.

    In a recent case, the Eighth Circuit upheld a sentence where the District Court calculated loss using the value of specialty commercial software illegally copied by the defendant. The Court of Appeals upheld the District Court's decision to rely upon the testimony of software professionals who estimated the loss using development costs and data from a recent transaction involving that software. United States v. Ameri, 412 F.3d 893, 900-01 (8th Cir. 2005).

    At least one Circuit has also allowed costs reasonably associated with "preventing further damage resulting from Defendant's conduct." United States v. Middleton, 231 F.3d 1207, 1213 (9th Cir. 2000). Such costs must not be "excessive" and may not be costs that "merely create an improved computer system unrelated to preventing further damage." Id. Given that instructions for exploiting known computer network vulnerabilities are easily shared via the Internet, the cost incurred by a victim to prevent attacks of those who might follow the defendant may be allowable as well.

    With the exception of offenses under 18 U.S.C. § 1030(a)(5) and civil suits brought under 18 U.S.C. § 1030(g), loss is not an element of any offense under § 1030. While there is very little published case law on the subject of calculating loss for sentencing purposes under § 1030(a)(5), there are a number of cases that address the issue of loss in civil suits authorized under 18 U.S.C. § 1030(g). Section 1030(g) requires that civil plaintiffs prove one of the factors in 1030(a)(5)(B)—typically loss of more than $5,000—before they can prevail. ("Loss" is discussed in detail beginning on page 37).

    With respect to sentencing in criminal cases brought under section 1030, however, loss is a central question. Furthermore, there are parallels between the language in the Guideline commentary for loss in section 1030 cases and the definition of loss that is a required element to prove a violation under 18 U.S.C. § 1030(a)(5), and, therefore, to support a civil claim under 18 U.S.C. § 1030(g). Compare 18 U.S.C. § 1030(e)(11) with U.S.S.G. § 2B1.1, cmt. n.3(A)(v)(III). Section 1030(e)(11) begins the definition of "loss" by stating that loss "means any reasonable cost to any victim." It then goes on to provide a nonexclusive list of costs that may be included within the definition of "loss" such as:

    the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service...

    18 U.S.C. § 1030(e)(11). This list is substantially similar to the list in the Guidelines commentary for § 2B1.1. See U.S.S.G. § 2B1.1, cmt. n.3(A)(v)(III). However, as was discussed previously, the commentary in the Guidelines merely provides authority to expand the normal definition of "actual loss" for such offenses and is not a substitute for the value of the property unlawfully taken by a defendant.

    In contrast, for civil cases brought under 18 U.S.C. § 1030(g), loss is limited to the definition set forth in section 1030(e)(11). In that context, a number of courts have held that revenue lost because a computer system was down due to an intrusion would be "loss," but revenue lost to competitors who used customer data stolen from the victim would not. See Civic Ctr. Motors, Ltd. v. Mason St. Imp. Cars, Ltd., 387 F.Supp.2d 378, 381 (S.D.N.Y. 2005) (holding "that revenue lost because a defendant used unlawfully gained information to unfairly compete was not a type of 'loss' contemplated under the CFAA") (citing Nexans Wires S.A. v. Sark- USA, Inc., 319 F.Supp.2d 468, 478 (S.D.N.Y. 2004)). According to this line of civil cases, lost revenue (e.g., from lost goodwill or lost business opportunities) would only be "loss" under the 1030(e)(11) "if it resulted from the impairment or unavailability of data or systems." Nexans, 319 F.Supp.2d 468, 477.

    Although the concept of loss may be constrained in civil cases brought under section 1030(g)—or when establishing a criminal violation under section 1030(a)(5)—prosecutors should be prepared to explain that courts are not similarly constrained when calculating loss at the time of sentencing for section 1030 offenses. In a criminal sentencing for a "protected computer" offense, the loss that stems from the intrusion is merely one type of loss to be tallied. For example, the fair market value of the data copied unlawfully by a defendant is clearly a proper category of loss to be attributed to him at sentencing, regardless of whether or not that value could have been used to satisfy the loss requirement in section 1030(a)(5).

    Where a network offense includes use of a victim's services without or in excess of authorization, loss may include the cost to the victim of providing such services. Cf. America Online, Inc. v. National Health Care Discount, Inc., 174 F.Supp.2d 890, 900-02 (N.D. Iowa 2001) (awarding AOL $0.78 per thousand pieces of electronic mail that a spammer caused to be delivered in violation of AOL's use policy). Loss does not include, however, expenses incurred cooperating with law enforcement's investigation of the offense. U.S.S.G. § 2B1.1, cmt. n.3(D)(ii); cf. United States v. Sablan, 92 F.3d 865, 870 (9th Cir. 1996) (excluding "expenses incurred due to meetings with the FBI" from loss calculation for purposes of restitution).

    Finally, section 2B1.1 offers special instructions for determining loss in cases involving "unauthorized access devices." Section 2B1.1 adopts the definitions used in 18 U.S.C. § 1029 for the terms "counterfeit access device" and "unauthorized access device." See U.S.S.G. § 2B1.1, cmt. n.3(F)(i), n.9(A). The statute's broad definition includes any code, account number, password, personal identification number, or other means of account access that has been stolen, forged, or obtained with intent to defraud. See 18 U.S.C. § 1029(e)(1)-(3); United States v. Petersen, 98 F.3d 502, 505 (9th Cir. 1996) (treating computer passwords as access devices). Where a defendant obtains access devices without authorization, by hacking a password file or by Internet credit card phishing, for example, "loss includes any unauthorized charges made with the counterfeit access device or unauthorized access device and shall not be less than $500 per access device." U.S.S.G. § 2B1.1, cmt. n.3(F)(i).

    In a credit card phishing case in which the defendant charged $45,000 worth of purchases to fraudulently-obtained credit card numbers, possessed an additional 250 credit card numbers that he had not used, and also possessed 150 email account passwords, the loss would be equal to the sum of the charges ($45,000), $500 for each unused credit card number (250 x $500 = $125,000), and $500 for each password (150 x $500 = $75,000), a total loss of $245,000 and an offense level increase of 12. Remember that $500 per access device is the minimum loss; if the actual charges exceed $500, the higher figure should be used instead. Under certain circumstances, it may even be appropriate to determine intended loss by aggregating the credit limits of the access devices: "[W]here a sentencing court has facts upon which to base findings that a defendant was capable of and intended to use the [credit] cards to secure amounts at or near their credit limits, aggregating the credit limits of the cards to calculate loss is appropriate." See United States v. Say, 923 F.Supp. 611, 614 (D. Vt. 1995) (citing United States v. Egemonye, 62 F.3d 425 (1st Cir. 1995); United States v. Sowels, 998 F.2d 249 (5th Cir. 1993)).

    2. Economic Realities Defense

    The appropriate loss figure for calculating the guideline sentence under the applicable Guidelines is "the greater of actual or intended loss." U.S.S.G. § 2B1.1(b)(1), cmt. n.3(A). Some defendants may, however, attempt to cite United States v. Stockheimer for the proposition that disparity between the intended loss and the foreseeable, potential loss overstates the seriousness of the offense. United States v. Stockheimer, 157 F.3d 1082 (7th Cir. 1998). They may argue that this "economic realities" doctrine justifies either a reduction in the calculated loss or a downward departure.

    However, the holdings in cases such as Stockheimer have effectively been rendered moot by amendments to the Guidelines. See United States v. McBride, 362 F.3d 360, 374 (6th Cir. 2004) (holding "the amendments abandon this circuit's interpretation of intended loss") (citing United States v. Anderson, 353 F.3d 490, 505 n.13 (6th Cir. 2003)). Under the current Guidelines, the likelihood that a scheme might be incapable of yielding the entire amount of loss intended is no longer to be considered when calculating the guideline range. The general rule that the greater of intended or actual loss should be used is still valid. U.S.S.G. § 2B1.1(b)(1), cmt. n.3(A). Since Amendment 617 took effect on November 1, 2001, the term "intended loss" is defined to include "intended pecuniary harm that would have been impossible or unlikely to occur (e.g., as in a government sting operation, or an insurance fraud in which the claim exceeded the insured value.)." U.S.S.G. § 2B1.1(b)(1), cmt. n.3(A)(ii).

    The "Reason for Amendment" commentary for Amendment 617 makes it clear that the purpose of the amendment was to address decisions such as Stockbridge where departures were granted based on the "economic realities" doctrine. "Concepts such as 'economic reality' or 'amounts put at risk' will no longer be considerations in the determination of intended loss." U.S.S.G. Amendment 617, November 1, 2001 (citing United States v. Bonanno, 146 F.3d 502 (7th Cir. 1998) (holding that the relevant inquiry is how much the scheme put at risk); United States v. Wells, 127 F. 3d 739 (8th Cir. 1997) (holding that intended loss properly was measured by the possible loss the defendant intended, and did not hinge on actual or net loss)).

    In light of the language of Amendment 617 and the Application Notes in the commentary for § 2B1.1, it is clear that under the current Guidelines defendants are to be held responsible for all the loss they intend. The "economic reality" doctrine is no longer a consideration and should not serve as basis for either a reduction in the calculated loss or a downward departure under that theory. U.S.S.G. § 2B1.1(b)(1), cmt. n.2(A).

    3. Number of Victims

    Section 2B1.1 imposes a graduated increase in offense level based on the number of victims that suffered actual loss as a result of the offense. See U.S.S.G. § 2B1.1(b)(2), cmt. n.1. If the offense causes loss to ten or more victims, the offense level is increased by two; if it causes loss to fifty or more victims, the offense level is increased by four; and if it causes loss to 250 or more victims, the offense level is increased by six. This specific offense characteristic may be particularly important in network crimes such as the propagation of worms or viruses, crimes that, by their very nature, involve a large number of victims.

    Although this specific offense characteristic takes into account only those victims that suffered actual loss as a result of the offense, courts have suggested that in cases in which there is a large, unrealized intended loss, an upward departure may be appropriate. See United States v. Mohammed, 315 F.Supp.2d 354 (S.D.N.Y. 2003). Similarly, although the specific offense characteristic does not take into account victims that have suffered non-monetary harm, it may be appropriate for the court to depart upward if there are a large number of such victims. See U.S.S.G. § 2B1.1, cmt. n.19(A)(ii) (indicating that upward departure may be appropriate if "[t]he offense caused or risked substantial non- monetary harm").

    4. Extraterritorial Conduct

    The Guidelines indicate that the sentencing court should increase the base offense level by two or, if such an increase does not result in an offense level of at least twelve, to twelve if "a substantial part of a fraudulent scheme was committed from outside the United States." U.S.S.G. § 2B1.1(b)(9)(B). Although no reported case offers insight into how courts will apply this specific offense characteristic to network crimes that cross international boundaries, there is a strong argument to be made that, even if an offender is physically located within the United States, if he avails himself of a foreign email account to receive, possess, and distribute messages in furtherance of a fraudulent scheme, he is subject to a two-level increase provided for in this specific offense characteristic. Similarly, if an intruder avails himself of a computer in another country as a tool dump site or a zombie through which he can intrude into other computers or launch attacks, his conduct falls within the scope of this specific offense characteristic.

    In United States v. Singh, 291 F.3d 756 (11th Cir. 2002), the defendant engaged in an elaborate scheme to obtain international long- distance telephone service free of charge for sale to third parties. After initiating a long-distance account with an American carrier using false information, the defendant would call his Kuwaiti "clients," who would then provide him a number (usually in a third country) with which they wished to be connected. The defendant would use the three-way calling feature of his phone service to connect the Kuwaiti client. The telephone companies were unable to charge defendant for these international calls (or anything else, for that matter) due to the fraudulent account information. Although the defendant did not originate this scheme outside the United States or personally take action outside the United States, and the government did not produce any evidence as to the identity or number of his coconspirators in Kuwait, the court upheld a sentencing enhancement on the basis that a substantial portion of the scheme was committed from outside the United States.

    5. Sophisticated Means

    Section 2B1.1 advises sentencing courts to increase the offense level by two levels (or to increase the offense level to 12, if the two-level increase results in an offense level lower than 12) if "the offense ... involved sophisticated means." U.S.S.G. § 2B1.1(b)(9)(C). A "sophisticated means" enhancement is appropriate if the offense includes "especially complex or especially intricate offense conduct pertaining to the execution or concealment of an offense." U.S.S.G. § 2B1.1, cmt. n.8(B). The Application Note offers use of a fictitious business entity to perpetrate a fraud as an example of a "sophisticated means." See also United States v. Paradies, 98 F.3d 1266, 1292 (11th Cir. 1996).

    There are few reported cases regarding the application of the sophisticated means enhancement to a computer crime defendant. See, e.g., United States v. Harvey, 413 F.3d 850 (8th Cir. 2005) (defendants' use of a computer to generate authentic looking checks as part of fraudulent scheme upheld as partial basis for sophisticated means enhancement); United States v. O'Brien, 435 F.3d 36 (1st Cir. 2006) (in section 1030(a)(5) case, upholding sentencing increase based on use of special skill—commission of the offense involved knowledge of specific computer program, which required special training, and defendant had considerable skill in using that program, as demonstrated by fact that he taught class for that program).

    By analogy to other areas of criminal law, it seems likely that the enhancement would apply to an online fraud scheme involving a fictitious business entity or a network intrusion or assault directed through several compromised computers. Prosecutors contemplating application of this enhancement to a computer crime are encouraged to contact CCIPS.

    6. Trafficking in Access Devices

    Section 2B1.1 advises sentencing courts to increase the offense level by two levels (or to increase the offense level to 12, if the two-level increase results in an offense level lower than 12) if "the offense involved ... trafficking of any unauthorized access device or counterfeit access device." U.S.S.G. § 2B1.1(b)(10)(B). The definition of "access device" includes computer passwords and credit cards. See 18 U.S.C. § 1029(e)(1); United States v. Peterson, 98 F.3d 502, 505 (9th Cir. 1996) (acknowledging district court's treatment of computer passwords as "access devices"); United States v. Caputo, 808 F.2d 963, 966 (2d Cir. 1987) (upholding district court finding that restaurant receipts containing credit card numbers are access devices). This specific offense characteristic may therefore be applicable to computer intrusion cases in which the intruder obtained the victim's password and to online fraud cases in which the perpetrators obtain the victims' password, credit card number, social security number, or bank account information.

    7. Risk of Death or Injury

    As basic services such as medical treatment, emergency response, public transportation, water treatment, and military protection rely increasingly on computer networks for their maintenance and operation, the risk that a computer crime might cause death or serious bodily injury increases. Section 2B1.1 takes this into account, providing a two-level increase (or an increase to level 14, if the two-level increase results in an offense level less than 14) "[i]f the offense involved ... the conscious or reckless risk of death or serious bodily injury." U.S.S.G. § 2B1.1(b)(12)(A). To merit this enhancement, the government must demonstrate by a preponderance of the evidence that the defendant was aware that his conduct created a risk of death or serious bodily injury and that he nonetheless consciously or recklessly disregarded that risk. See United States v. McCord, Inc., 143 F.3d 1095, 1098 (8th Cir. 1998). Courts have upheld application of this enhancement for a medical researcher who falsely reported the efficacy of a course of treatment for skin cancer, causing test subjects to forego other forms of treatment (see United States v. Snyder, 291 F.3d 1291, 1295 (11th Cir. 2002)), for a defense contractor who provided helicopter armor that had not undergone ballistics tests when the contract required pretested armor (see United States v. Cannon, 41 F.3d 1462, 1467 (11th Cir. 1995)), and for an airport security manager who consciously disregarded screening and testing requirements for airport security personnel (see United States v. Saffer, 118 F.Supp.2d 546, 548-49 (E.D. Pa. 2000)).

    8. Private Information

    Effective November 1, 2003, a new specific offense characteristic took effect. The new provision covers a seemingly random collection of subjects, providing sentencing enhancements for each. A defendant either gets an enhancement for obtaining personal information or for intentionally causing damage or for substantially disrupting a critical infrastructure, but no two of these enhancements may be combined to sentence an offense that, for instance, involves both intentionally damaging a computer and obtaining personal information. Below, each of these new enhancements will be addressed in turn.

    The first enhancement directs a sentencing court to increase by two the offense level of any defendant convicted of violating 18 U.S.C. § 1030 if his offense involved "an intent to obtain personal information." U.S.S.G. 2B1.1(b)(14)(A)(i)(II).[FN1] An accompanying note, Application Note 13, defines personal information as:

    sensitive or private information (including such information in the possession of a third party), including (i) medical records; (ii) wills; (iii) diaries; (iv) private correspondence, including email; (v) financial records; (vi) photographs of a sensitive or private nature; or (vii) similar information.

    Although the information obtained in many cases will fall squarely within the examples listed in this definition, other cases may require courts to extrapolate and determine whether specific information is of a kind that a reasonable computer user would consider sensitive or private.

    Two aspects of this provision deserve brief discussion. First, the provision does not require a defendant to actually obtain personal information—he must merely intend to obtain it. So, for instance, a defendant who accessed without authorization an email service provider's mail server but was unable to gain access to subscribers' emails would receive this enhancement if the evidence also included an email or a chat session in which he indicated that his intent was to obtain subscribers' emails and mine them for sensitive, valuable information. Second, the provision uses the term "obtain," a term which has been used broadly in the online context to include accessing or merely observing information. See S. Rep. No. 99-432, at 6-7 (1986), reprinted in 1986 U.S.C.C.A.N. 2479, 2484 (noting that "'obtaining information' [for the purposes of 18 U.S.C. § 1030(a)(2)] includes mere observation of the data. Actual asportation, in the sense of physically removing the data from its original location or transcribing the data, need not be proved in order to establish a violation of this subsection.").

    9. Intentional Damage

    The second new enhancement, U.S.S.G. § 2B1.1(b)(14)(A)(ii), requires a sentencing court to increase a defendant's offense level by four if the defendant was convicted of a violation of 18 U.S.C. § 1030(a)(5)(A)(i), which proscribes transmission of a program, information, code or command if such conduct intentionally causes unauthorized damage. This enhancement applies to any conviction under this statutory subsection, effectively raising the base offense level for such violations to 10.

    10. Critical Infrastructures

    The final new enhancement takes a "three-tiered" approach to computer crimes affecting or relating to "critical infrastructures." An Application Note defines "critical infrastructure" as:

    systems and assets vital to national defense, national security, economic security, public health or safety, or any combination of those matters. A critical infrastructure may be publicly or privately owned. Examples of critical infrastructures include gas and oil production, storage, and delivery systems, water supply systems, telecommunications networks, electrical power delivery systems, financing and banking systems, emergency services (including medical, police, fire, and rescue services), transportation systems and services (including highways, mass transit, airlines and airports), and government operations that provide essential services to the public.

    U.S.S.G. § 2B1.1, cmt. n.13(A).

    The first tier directs a court to increase a defendant's offense level by two if the offense was a violation of 18 U.S.C. § 1030 that "involved ... a computer system used to maintain or operate a critical infrastructure, or used by or for a government entity in furtherance of the administration of justice, national defense, or national security." U.S.S.G. § 2B1.1(b)(14)(A)(i). This lowest tier enhancement applies even if the computer in question is not damaged or disrupted; mere access to such a computer is sufficient to trigger the two-level increase.

    The second tier imposes a six-level enhancement (or, if the resulting offense level is still less than 24, an increase to 24) for violations of § 1030 that "caused a substantial disruption of a critical infrastructure." U.S.S.G. § 2B1.1(b)(14)(A)(iii), (b)(14)(B).

    The third tier indicates that an upward departure (beyond offense level 24) is appropriate if a violation of § 1030 is "so substantial as to have a debilitating impact on national security, national economic security, national public health or safety, or any combination of those matters." U.S.S.G. § 2B1.1, cmt. n.19(B) (emphasis added). The Sentencing Commission provides little guidance as to what qualifies as a "substantial disruption" or as a "debilitating impact." In defining "debilitating impact," the Commission added the word "national" as a modifier of "security," "economic security," and "public health or safety," indicating that with regard to these factors, a local (as opposed to national) disruption will not qualify as "debilitating."


    C. CAN-SPAM Act

    Section 2B1.1 contains a new two-level increase for defendants who are convicted of violating the CAN-SPAM Act, 18 U.S.C. § 1037, and whose offense "involved obtaining electronic mail addresses through improper means." U.S.S.G. § 2B1.1(b)(7). The commentary states that the term "improper means" includes "unauthorized harvesting of electronic mail addresses of users of a website, proprietary service, or other online public forum." U.S.S.G. § 2B1.1, cmt. n.6. Prosecutors considering use of this enhancement are encouraged to contact CCIPS.

    In addition, under U.S.S.G. § 2B1.1(b)(2)(A)(ii), a violator of section 1037 will automatically receive at least a two-level increase for mass-marketing, and may receive a larger increase based on the number of victims.


    D. Wiretap Act

    Sentences for most violations of the Wiretap Act involving network crimes are addressed by Guideline § 2H3.1 (Interception of Communications; Eavesdropping; Disclosure of Tax Return Information).[FN2] The base offense level is nine. U.S.S.G. § 2H3.1(a)(1). If the purpose of the offense was to obtain commercial advantage or economic gain, the offense level increases by three. U.S.S.G. § 2H3.1(b). If the violation also constitutes an attempt to commit another offense, courts should apply the guideline that would result in a greater offense level. U.S.S.G. § 2H3.1(c)(1).

    As a result of being grouped differently than most other network crimes, violations of the Wiretap Act generally begin with a higher Base Offense Level. This leads to a beginning sentencing range at least four months greater than comparable interceptions of stored communications. Compare U.S.S.G. § 2H3.1(a)(1) (base offense level 9 corresponding to imprisonment of 4-10 months at Criminal History Category I) with U.S.S.G. § 2B1.1(a)(2) (base offense level 6 corresponding to 0-6 months imprisonment at Criminal History Category I).

    However, Wiretap Act violations are not subject to the same specific offense characteristics and adjustments available in Guideline § 2B1.1. The absence of these potential enhancements to the offense level for, among other things, the amount of loss caused by the offense, could result in much shorter sentences for Wiretap Act violations than for unauthorized access to stored communications.

    For instance, a Wiretap Act violation not committed for economic gain by a person with no criminal history would result in a sentencing range of 4-10 months. Such a defendant would be in Zone B and thus eligible for a sentence of probation (combined with intermittent confinement, community confinement, or home detention). See U.S.S.G. § 2H3.1. The amount of loss caused by the individual's interception will not affect the sentence.

    In contrast, an intruder who illegally accessed a stored communication in violation of 18 U.S.C. § 2701 (rather than intercepting a communication contemporaneous with its transmission) faces a sentence that is potentially much more severe. Under section 2701, a sentence can be heavily influenced by the amount of damage caused by the intruder conduct. For instance, if an intruder's conduct caused more than $1,000,000 in loss, that individual would face a minimum sentence of almost three and one-half years.


    E. Generally-Applicable Adjustments

    1. Overview

    The sentencing adjustments set forth in Chapter 3 of the Guidelines may further alter the base offense level. In particular, if the computer crime involved or was intended to promote a federal crime of terrorism, U.S.S.G. § 3A1.4 may apply. It also may be appropriate to adjust the defendant's sentence based on his role in the crime. The defendant may have played an aggravating role (U.S.S.G. § 3B1.1) or a mitigating role (U.S.S.G. § 3B1.2), may have used special skill (U.S.S.G. § 3B1.3), or may have involved a minor in the commission of the crime (U.S.S.G. § 3B1.4). If the defendant has tried to delete or destroy evidence, or otherwise frustrate law enforcement's investigation of his crime, an obstruction adjustment may also be appropriate (U.S.S.G. § 3C1.1). On the other hand, if the defendant has been forthcoming about his role in committing the offense and has cooperated with law enforcement, a downward adjustment for acceptance of responsibility may be appropriate (U.S.S.G. § 3E1.1).

    2. Special Skill

    Section 3B1.3 of the Guidelines advises sentencing courts to increase a defendant's offense level by two "[i]f the defendant ... used a special skill[] in a manner that significantly facilitated the commission or concealment of the offense." Section 3B1.3 cautions, however, that courts should not impose the enhancement if the factual predicate that justifies a special skill enhancement has already been the basis for a specific offense characteristic (such as the "sophisticated means" characteristic under U.S.S.G. § 2B1.1). However, "so long as the court finds a sufficient independent factual basis for both" a sophisticated means enhancement and a special skill enhancement, "it may impose both." United States v. Minneman, 143 F.3d 274, 283 (7th Cir. 1998); see also United States v. Rice, 52 F.3d 843, 851 (10th Cir. 1995) (noting that both enhancements may be applied because "each of these enhancements serves a distinct purpose").

    The commentary provides some guidance as to what qualifies as a special skill:

    "Special skill" refers to a skill not possessed by members of the general public and usually requiring substantial education, training or licensing. Examples would include pilots, lawyers, doctors, accountants, chemists, and demolition experts.

    U.S.S.G. § 3B1.3, cmt. n.4. As courts have noted, however, "[a] defendant does not need to have formal education or professional stature to have a special skill within the meaning of § 3B1.3[;] a special skill can be derived from experience or from self-tutelage." United States v. Nelson-Rodriguez, 319 F.3d 12, 58 (1st Cir. 2003) (quoting United States v. Noah, 130 F.3d 490, 500 (1st Cir. 1997); see also United States v. Urban, 140 F.3d 229, 236 (1st Cir. 1998) ("[A] § 3B1.3 sentence enhancement is not limited to persons who have received substantial formal education, training from experts, or who have been licensed to perform a special skill.").

    The inquiry regarding whether a particular skill constitutes a "special skill" for the purposes of § 3B1.3 is intensely fact specific. The metric of comparison by which it is determined whether a skill is "special," i.e., the skill possessed by the general public, may also evolve over time and vary from one community to another. As a result, courts have not spoken with a clear voice regarding what qualifies as a special skill. Courts have upheld imposition of the enhancement upon a mechanical drafter whose knowledge of "complex" drafting software facilitated his theft of trade secrets (see United States v. Lange, 312 F.3d 263, 270 (7th Cir. 2002)) and upon an intruder who demonstrated an ability to "bypass security protocols to gain access to computer systems" (see United States v. Petersen, 98 F.3d 502, 508 n.5 (9th Cir. 1996) (noting that imposition of the enhancement is appropriate "[o]nly where a defendant's computer skills are particularly sophisticated")). On the other hand, courts have overturned application of the special skill enhancement to a defendant who copied and modified webpage source code to facilitate a fraud scheme (see United States v. Lee, 296 F.3d 792, 799 (9th Cir. 2002)) and a defendant who used off-the-shelf software to produce counterfeit currency (see United States v. Godman, 223 F.3d 320, 323 (6th Cir. 2000)). If there is coherent precedent to be gleaned from this case law, it is that the government must present to the sentencing court considerable evidence that the defendant's uncommon ability facilitated the commission or concealment of the crime.


    F. Conditions of Supervised Release

    Increasingly, prosecutors, parole officers, and courts struggle to impose appropriate conditions on the Internet use of defendants whose sentences include terms of supervised release. Courts have circumscribed discretion in imposing such conditions—they may fashion any remedy that takes into consideration certain enumerated criteria. See United States v. Holm, 326 F.3d 872, 876 (7th Cir. 2003); United States v. White, 244 F.3d 1199, 1204 (10th Cir. 2001); see also 18 U.S.C. §§ 3583(c), 3553 (enumerating the criteria). Of particular relevance to computer crimes, courts must consider the need for the sentence imposed "to afford adequate deterrence to criminal conduct" and "to protect the public from further crimes of the defendant." 18 U.S.C. § 3553(a)(2)(B), (a)(2)(C). Where a networked computer has been used to perpetrate online fraud, to receive contraband such as child pornography or stolen credit card numbers, or as the instrument of intrusions into or attacks on other computers, these considerations may militate in favor of imposing a restriction on computer use as a condition of supervised release.

    Section 3553(a) requires all conditions of supervised release to impose upon a defendant "no greater deprivation of liberty than is reasonably necessary to achieve" a valid penological purpose. Holm, 326 F.3d at 876; White, 244 F.3d at 1204-05. When such conditions affect a defendant's use of the Internet, a recognized forum for First Amendment activity, this statutory requirement takes on constitutional implications. See United States v. Scott, 316 F.3d 733, 736 (7th Cir. 2003); see generally ACLU v. Reno, 521 U.S. 844 (1997). On a more pragmatic level, courts have noted that in an era when the Internet is a prevalent means of communication, source of information, and medium for commercial transactions and the provision of public services, "a strict ban on all Internet use ... renders modern life ... exceptionally difficult." Holm, 326 F.3d at 878.

    As a result, appellate courts have routinely struck down conditions of supervised release that infringe upon a defendant's Internet use more than necessary, and admonished sentencing courts and parole officers to tailor the conditions more narrowly to the end to be served. See, e.g., United States v. Freeman, 316 F.3d 386, 392 (3d Cir. 2003); Scott, 316 F.3d at 737 (suggesting as an alternative to a total ban on Internet use unannounced inspections of a defendant's computer); Holm, 326 F.3d at 879 (suggesting random searches of a defendant's computer and use of filtering software as an appropriate condition for a defendant convicted of possessing child pornography); White, 244 F.3d at 1204-07. At least one court has suggested, however, that a total ban may be appropriate where a defendant's crime involves using a computer to attack or intrude upon others' networks. See Scott, 316 F.3d at 736 (dicta) (Inveterate intruders who have used access to injure others may be ordered to give up the digital world."). Similarly, courts have not hesitated to uphold limitations on computer use that are appropriately circumscribed. See United States v. Ristine, 335 F.3d 692 (8th Cir. 2003); United States v. Crandon, 173 F.3d 122 (3d Cir. 1999).

    These cases suggest that prosecutors and parole officers should work together to propose to sentencing courts conditions of supervised release that achieve their objectives while infringing upon defendants' legitimate Internet use with care. They also suggest, however, that if such conditions are reasonably crafted to be respectful of defendants' liberties, they are appropriate and will be upheld.

     


    FN 1. Section 2B1.1 indicates that "a substantial invasion of a privacy interest" is one valid ground for an upward departure. U.S.S.G. § 2B1.1, cmt. n.19(A)(ii).

    FN 2. Wiretap Act violations also may fall under Guideline § 2B5.3 (Criminal Infringement of Copyright or Trademark). As reflected in the Commentary, this provision is intended primarily for the interception of copyrighted satellite transmissions.