Computer Crime & Intellectual Property Section
United States Department of Justice

ccips
download PDF

VIII.
Penalties, Restitution, and Forfeiture

  1. VIII.A. Introduction
  2. VIII.B. Statutory Penalties
  3. VIII.C. Sentencing Guidelines
    1. VIII.C.1. Offenses Involving Copyright (Including Bootleg Music, Camcorded Movies, and the Unauthorized Use of Satellite, Radio, and Cable Communications), Trademark, Counterfeit Labeling, and the DMCA
      1. VIII.C.1.a. Applicable Guideline is § 2B5.3
      2. VIII.C.1.b. Base Offense Level
      3. VIII.C.1.c. Adjust the Offense Level According to the "Infringement Amount"—U.S.S.G. § 2B5.3(b)(1)
        1. VIII.C.1.c.i. Formula
        2. VIII.C.1.c.ii. Number of Infringing Items
        3. VIII.C.1.c.iii. Retail Value
        4. VIII.C.1.c.iv. Determining Amounts and Values—Reasonable Estimates Allowed
        5. VIII.C.1.c.v. Cross-Reference to Loss Table in U.S.S.G. § 2B1.1
      4. VIII.C.1.d. Pre-release Piracy Increases the Offense Level by 2—U.S.S.G. § 2B5.3(b)(2)
      5. VIII.C.1.e. Manufacturing, Importing, or Uploading Infringing Items Increases the Offense Level by 2—U.S.S.G. § 2B5.3(b)(3) [before October 24, 2005: § 2B5.3(b)(2)]
      6. VIII.C.1.f. Offense Not Committed for Commercial Advantage or Private Financial Gain Reduces the Offense Level by 2—U.S.S.G. § 2B5.3(b)(4) [before October 24, 2005: § 2B5.3(b)(3)]
      7. VIII.C.1.g. Offense Involving Risk of Serious Bodily Injury or Possession of a Dangerous Weapon Increases the Offense Level by 2—U.S.S.G. § 2B5.3(b)(5) [before October 24, 2005: § 2B5.3(b)(4))
      8. VIII.C.1.h. Decryption or Circumvention of Access Controls Increases the Offense Level—U.S.S.G. § 3B1.3
      9. VIII.C.1.i. Upward Adjustment for Harm to Copyrightor Mark- Owner's Reputation, Connection with Organized Crime, or Other Unspecified Grounds
      10. VIII.C.1.j. Vulnerable Victims—U.S.S.G. § 3A1.1(b)
      11. VIII.C.1.k. No Downward Departure for the Victim's Participation in Prosecution
    2. VIII.C.2. Offenses Involving the Economic Espionage Act
      1. VIII.C.2.a. Applicable Guideline is § 2B1.1Except for Attempts and Conspiracies
      2. VIII.C.2.b. Base Offense Level—U.S.S.G. § 2B1.1(a)
      3. VIII.C.2.c. Loss—U.S.S.G. § 2B1.1(b)(1)
        1. VIII.C.2.c.i. Use Greater of Actual or Intended Loss
        2. VIII.C.2.c.ii. Reasonable Estimates Acceptable
        3. VIII.C.2.c.iii. Methods of Calculating Loss
      4. VIII.C.2.d. Intent to Benefit a Foreign Government, Instrumentality, or Agent—U.S.S.G. § 2B1.1(b)(5)
      5. VIII.C.2.e. Sophisticated Means—U.S.S.G. § 2B1.1(b)(9)(C)
      6. VIII.C.2.f. Upward Departure Considerations— U.S.S.G. § 2B1.1 cmt. n.19(A)
      7. VIII.C.2.g. Downward Departure Considerations— U.S.S.G. § 2B1.1 cmt. n.19(C)
      8. VIII.C.2.h. Abuse of a Position of Trust—U.S.S.G. § 3B1.3
      9. VIII.C.2.i. Use of Special Skill—U.S.S.G. § 3B1.3
      10. VIII.C.2.j. No Downward Departure for Victim's Participation in Developing the Case
  4. VIII.D. Restitution
    1. VIII.D.1. Restitution is Available—and Often Required—in Intellectual Property Prosecutions
    2. VIII.D.2. Victims Include Owners of Intellectual Property and Consumers Who Were Defrauded
    3. VIII.D.3. Determining a Restitution Figure
  5. VIII.E. Forfeiture
    1. VIII.E.1. Property Subject to Forfeiture
    2. VIII.E.2. Overview of Forfeiture Procedures
      1. VIII.E.2.a. Administrative Forfeiture Proceedings
      2. VIII.E.2.b. Civil and Criminal Proceedings
      3. VIII.E.2.c. Table of Forfeiture Provisions Arranged by Criminal IP Statute
    3. VIII.E.3. Choosing a Forfeiture Procedure
    4. VIII.E.4. Civil Forfeiture in IP Matters
      1. VIII.E.4.a. Proceeds
      2. VIII.E.4.b. Infringing Items, Other Contraband, and Facilitating Property
      3. VIII.E.4.c. Innocent Owner Defense
      4. VIII.E.4.d. Victims' Ability to Forfeit Property
    5. VIII.E.5. Criminal Forfeiture in IP Matters
      1. VIII.E.5.a. Proceeds
      2. VIII.E.5.b. Infringing Items, Other Contraband, and Facilitating Property

 

  1. VIII.A. Introduction
  2. This Chapter discusses the penalties for intellectual property crime, concentrating on the sentencing guidelines, restitution, and forfeiture.

    This Chapter does not address the sentencing issues raised by former Attorney General John Ashcroft's September 23, 2003 Memorandum on Department Policies and Procedures Concerning Charging Criminal Offenses, Disposition of Charges, and Sentencing, available at http://www.usdoj.gov/opa/pr/2003/September/03_ag_516.htm, which instructs that "federal prosecutors must charge and pursue the most serious, readily provable offense or offenses that are supported by the facts of the case, except as authorized by an Assistant Attorney General, United States Attorney, or designated supervisory attorney in the limited circumstances described below." For more on charging decisions, prosecutors should consult the Attorney General's Memorandum, and also Chapter IX of this Manual, which specifically addresses charging decisions in intellectual property cases.

  3. VIII.B. Statutory Penalties
  4. The maximum statutory penalties for intellectual property crimes are addressed in the chapters on the respective substantive laws and are summarized in Appendix I.

  5. VIII.C. Sentencing Guidelines
  6. This subsection addresses the interpretation and application of the United States Sentencing Guidelines ("U.S.S.G.") in intellectual property prosecutions, primarily § 2B1.1 for Economic Espionage Act cases, § 2B5.3 for all other intellectual property offenses, and § 3B1.3 for crimes in which the defendant abused a position of trust or used a special skill. This subsection should be read in conjunction with the sections covering penalties in the chapters that present the substantive offenses, as well as with the chapter on victims' rights.

    This Manual does not address the issues raised by United States v. Booker, 543 U.S. 220 (2005), in which the Supreme Court held that the United States Sentencing Guidelines must be considered at sentencing but are only advisory. As with other crimes, prosecutors should generally continue to seek sentences within the guidelines range in intellectual property prosecutions because they are presumptively reasonable. Memorandum from Assistant Attorney General Christopher A. Wray, Guidance Regarding the Application of United States v. Booker and United States v. Fanfan, 2005 WL 50108 (Jan. 12, 2005), to Pending Cases, at 5 (Jan. 19, 2005). The intellectual property guidelines have been intricately fashioned through amendment and re-amendment, often incorporating and reacting to court decisions. For general guidance on this issue, prosecutors should consult Deputy Attorney General James B. Comey's January 28th, 2005 Memorandum on Department Policies and Procedures Concerning Sentencing, which directs that "federal prosecutors must actively seek sentences within the range established by the Sentencing Guidelines in all but extraordinary cases."

    For assistance with any sentencing issues specific to intellectual property crimes, please call CCIPS at (202) 514-1026 for assistance.

  7. VIII.C.1. Offenses Involving Copyright (Including Bootleg Music, Camcorded Movies, and the Unauthorized Use of Satellite, Radio, and Cable Communications), Trademark, Counterfeit Labeling, and the DMCA
  8. VIII.C.1.a. Applicable Guideline is §  2B5.3
  9. U.S.S.G. § 2B5.3 governs sentencing for the following offenses:

    The guidelines' Statutory Index, U.S.S.G. App. A, refers these statutes to U.S.S.G. § 2B5.3.

    The one exception is the Digital Millennium Copyright Act, which is not listed in the guidelines' index at all. A statute not listed in this index should be sentenced under "the most analogous guideline." U.S.S.G. §§ 1B1.2(a), 2X5.1. In DMCA cases, the most analogous guideline is § 2B5.3. The DMCA was intended to safeguard the copyright protections for copyrighted works, and copyright crimes are sentenced under § 2B5.3. Moreover, § 2B5.3 implicitly refers to the DMCA in an application note that requires an adjustment for use of a special skill under U.S.S.G. § 3B1.3 "[i]f the defendant de-encrypted or otherwise circumvented a technological security measure to gain initial access to an infringed item." U.S.S.G. § 2B5.3 cmt. n.3 (2005). Although the DMCA and U.S.S.G. § 2B5.3 are not a perfect fit, they are the best match under the current guidelines.

    Section 2B5.3 has been amended a number of times. It was amended on May 1, 2000, to "ensure that the applicable guideline range for a defendant convicted of a crime against intellectual property" would be "sufficiently stringent to deter such a crime and to adequately reflect" consideration of "the retail value and quantity of the items with respect to which the crime against intellectual property was committed." No Electronic Theft (NET) Act of 1997, Pub. L. No. 105-147, § 2(g), 111 Stat. 2678 (1997). Among other things, the May 2000 amendments increased the applicable base offense level from 6 to 8 and increased the number and type of special offense characteristics to include not only the infringement amount, but also characteristics for manufacturing, uploading, or importing infringing items; for infringement not committed for commercial advantage or private financial gain; and for risk of serious bodily injury or possession of a dangerous weapon in connection with the offense. See U.S.S.G. App. C (Amendments 590, 593). Section 2B5.3 was amended again effective October 24, 2005, adding a new specific offense characteristic (2) addressing infringement of pre-release works, renumbering offense characteristics (2)-(4) as offense characteristics (3)-(5), clarifying the definition of uploading for technical purposes, and clarifying that the court can estimate the infringement amount using any relevant information. See U.S.S.G. App. C (Amendment 675).

    As of this writing, U.S.S.G. § 2B5.3 is likely to be amended again during 2006 pursuant to the Stop Counterfeiting in Manufactured Goods Act, Pub. L. No. 109-181, § 1, 120 Stat. 285, 287-88 (Mar. 16, 2006). It asks the Sentencing Commission to explore how the guideline should account for items that facilitate infringement such as counterfeit labels and DMCA circumvention devices. See also Section III.E.5. of this Manual.

    As discussed in Section VIII.C.2. of this Chapter, the Economic Espionage Act is sentenced under U.S.S.G. § 2B1.1.

  10. VIII.C.1.b. Base Offense Level
  11. U.S.S.G. § 2B5.3's base offense level is currently 8, up from a base offense level of 6 for offenses committed before May 1, 2000. See U.S.S.G. App. C (Amendments 590, 593). The base offense level was raised from 6 to 8 to reflect that "the vast majority" of intellectual property offenses involve more than minimal planning. Id.

  12. VIII.C.1.c. Adjust the Offense Level According to the "Infringement Amount"—U.S.S.G. § 2B5.3(b)(1)
  13. Under U.S.S.G. § 2B5.3(b)(1), the base offense level is then adjusted according to the "infringement amount," an estimate of the magnitude of infringement. "Similar to the sentences for theft and fraud offenses, the sentences for defendants convicted of intellectual property offenses should reflect the nature and magnitude of the pecuniary harm caused by their crimes. Accordingly, similar to the loss enhancement in the theft and fraud guideline, the infringement amount in subsection (b)(1) serves as a principal factor in determining the offense level for intellectual property offenses." U.S.S.G. § 2B5.3 cmt. backg'd. The mechanics of calculating the infringement amount are covered in U.S.S.G. § 2B5.3 cmt. n.2.

  14. VIII.C.1.c.i. Formula
  15. The infringement amount is generally calculated by multiplying the number of infringing goods by the goods' retail value. See U.S.S.G. § 2B5.3 cmt. n.2(A),(B).

    If the defendant infringed a variety of items, the infringement amount is the sum of the individual infringement amounts for each type of item. Id. cmt. n.2(D). The infringement amount for each type of item is calculated independently of the others, including whether the retail value should be that of an infringing (counterfeit) item or an infringed (legitimate) item. Id. See Section VIII.C.1.c.iii. of this Chapter. The individual infringement amounts are then aggregated into a total infringement amount, which is then plugged into the loss table in U.S.S.G. § 2B1.1. See Section VIII.C.1.c.v. of this Chapter.

  16. VIII.C.1.c.ii. Number of Infringing Items
  17. The number of infringing items can be easy to calculate. Victims or their representatives can often help verify the number when the number depends on whether an item's copyright or trademark has been registered. For a list of industry associations that represent victims, consult Appendix G of this Manual. When the number of infringing items is difficult or impossible to calculate, however, reasonable estimates are allowed. See Section VIII.C.1.c.iv. of this Chapter.

    In determining the number of infringing items, the biggest questions are often whether or to what extent to include items that are incomplete, such as items in the process of production, or that merely facilitate infringement, such as labels and packaging. These questions are discussed at length in Sections III.E.5. (sentencing issues concerning counterfeit marks) and VI.E.5. (sentencing issues concerning counterfeit and illicit labels, documentation, and packaging for copyrighted works) of this Manual. They are also likely to be addressed in upcoming guideline amendments that will be considered after this Manual is published mid-2006.

    A recurring question is whether the infringement amount should include all the infringing items that the defendant acquired or only those that he provided to another, such as a customer or co-conspirator. If trafficking is an element of the crime, then the infringement amount should include all items the defendant acquired because the intellectual property crimes define trafficking to include obtaining control over the infringing product with the intent to transport, transfer, or dispose of it. See United States v. DeFreitas, No. 98 CR. 1004(RWS), 2000 WL 763850, at *1 (S.D.N.Y. June 13, 2000) (trademark case), aff'd on other grounds, 8 Fed. Appx. 58 (2d Cir. 2001). The infringement amount should also include all the items the defendant acquired if he is convicted of an attempt, id., or conspiracy. In such cases, the infringement amount should include all infringing items in the defendant's inventory, plus all infringing items that had been transferred out of inventory.

    Determining the number of infringing items in a DMCA case can be a challenge because a defendant can violate the DMCA without engaging in any infringement. See Chapter V of this Manual. The guideline and its commentary give no help. Because these issues are complex and are also likely to be addressed in guidelines amendments that will be considered after this Manual is published in 2006, prosecutors are encouraged to consult CCIPS for guidance at (202) 514-1026.

  18. VIII.C.1.c.iii. Retail Value
  19. The major issues with determining the retail value are what to do when the items have not been fully manufactured, how to value items that facilitate infringement, which market should be used for reference, and whether to use the value of a counterfeit or a legitimate item. These questions are addressed below.

    If none of these situations apply, the retail value is that of the (infringing) counterfeit item. See U.S.S.G. § 2B5.3 cmt. n.2(B) & backg'd; id. App. C (Amendment 593). This includes cases involving the unlawful recording of a musical performance in violation of 18 U.S.C. § 2319A. U.S.S.G. § 2B5.3 cmt. n.2(B).

  20. VIII.C.1.c.iv. Determining Amounts and Values—Reasonable Estimates Allowed
  21. How to determine the infringing or infringed item's retail value? Any relevant source of information is appropriate. Actual prices are preferable, such as prices determined from the defendant's price list, prices charged during undercover buys, or actual retail prices for specific items in the legitimate manufacturer's catalogue. Approximations may be necessary, however, and they may include estimations of the average counterfeit prices in the market or region as determined by experts, or the average retail price for a product line in the manufacturer's catalogue.

    The same rule goes for determining the number of infringing items: actual counts are preferable, but approximations are appropriate.

    The courts allowed approximations of the infringement amount even before the guidelines did so explicitly. See United States v. Foote, 413 F.3d 1240, 1251 (10th Cir. 2005) (allowing analysis of defendant's bank records to aid in determining infringement amount); United States v. Slater, 348 F.3d 666, 670 (7th Cir. 2003) (confirming that district courts have "considerable leeway in assessing the retail value of the infringing items" and that courts "need only make a reasonable estimate of the loss, given the available information," citing the former U.S.S.G. § 2F1.1, now replaced by § 2B1.1); United States v. Kim, 963 F.2d 65, 69-70 (5th Cir. 1992) (analogizing to fraud guideline for principle that reasonable estimates are acceptable).

    Now, however, U.S.S.G. § 2B5.3 explicitly states that reasonable estimates are acceptable. On October 24, 2005, Application Note 2(E) to U.S.S.G. § 2B5.3 clarified as follows:

    (E) Indeterminate Number of Infringing Items.—In a case in which the court cannot determine the number of infringing items, the court need only make a reasonable estimate of the infringement amount using any relevant information, including financial records.
    See U.S.S.G. App. C (Amendment 675). The reference to financial records is likely an incorporation of the holding in Foote.

    Although statistical precision is preferable, it is not necessary. For example, in a case that turned on whether the 3,947 infringing pieces of computer software on a server were functioning or nonfunctioning, the FBI tested 71 programs and found that 94% were functioning. United States v. Rothberg, No. 00 CR 85, 2002 WL 171963, at *4 (N.D. Ill. Feb. 4, 2002), aff'd on other grounds, 348 F.3d 666 (7th Cir. 2003). To calculate the total number of functioning programs, the court multiplied the percentage from the sample (94%) by the total number of programs (3,947). Id. The court acknowledged that "the selection of the 71 programs was not random," but found that the selection was nevertheless "a reasonable basis for determining an estimate." Id.

    Whatever estimates the parties offer, however, the parties must explain how their estimate was calculated and why. In Rothberg, supra, the government first estimated the number of functioning programs based on a mathematical function it claimed derived from "information regarding [data] transmission error rates [the government] obtained from companies that maintain telephone lines." Id. at *3. The court rejected this estimate because the government had not explained how it "had derived the calculation or why it should be considered a reasonable basis for estimating the number of functioning programs." Id.

    Although U.S.S.G. § 2B5.3 speaks only of estimating the number of infringing items, there is no reason to believe that it abrogates earlier law allowing the estimation of retail values. E.g., Slater, supra; United States v. Foote, No. C.R.A. 00-20091-01-KHV, 2003 WL 22466158, at *6 (D. Kan. July 31, 2003) (estimating infringement amount from trademark counterfeiting by subtracting legitimate income from bank deposits, and further discounting by the percentage of sales attributable to non-infringing items), aff'd, 413 F.3d 1240, 1251-52 (10th Cir. 2005).

  22. VIII.C.1.c.v. Cross-Reference to Loss Table in U.S.S.G. § 2B1.1
  23. Once calculated, the infringement amount sets the scope of the enhancement in U.S.S.G. § 2B5.3(b)(1):

    When consulting U.S.S.G. § 2B1.1, look only to the loss table in subsection (b)(1); other portions of that guideline—including the base offense level, other offense enhancements, and the commentary—are inapplicable. See U.S.S.G. § 1B1.5(b)(2). Moreover, U.S.S.G. § 2B5.3(b)(1)'s citation to the loss table in U.S.S.G. § 2B1.1 does not mean that the infringement amount should equal the victim's loss. Rather, the infringement amount approximates the victim's loss, but need not equal it. See U.S. v. Cho, 136 F.3d 982 (5th Cir. 1998); see also U.S.S.G. App. C (Amendments 590, 593) (discussing infringement amount as similar to loss and an approximation of harm). On this technical point, United States v. Sung, 51 F.3d 92, 95 (7th Cir. 1995) is technically incorrect when it confuses the infringement amount with the loss incurred. Although the infringement amount is often characterized as describing the "loss" to the victim, it is not necessary for the government to show that the copyright owner suffered any actual pecuniary loss. See U.S. v. Powell, 139 Fed. Appx. 545 (4th Cir. July 19, 2005) (applying 2003 Guidelines, finding enhancement under § 2B1.1 table based on infringement amount of more than $250,000 was proper even though the victim suffered no pecuniary loss; sentence vacated and remanded on other grounds) (unpublished opinion).

  24. VIII.C.1.d. Pre-release Piracy Increases the Offense Level by 2—U.S.S.G. § 2B5.3(b)(2)
  25. Distribution of a copyrighted item before it is legally available to the consumer is more serious than the distribution of already available items. U.S.S.G. App. C (Amendment 675). Consequently, effective October 24, 2005, the Sentencing Commission added a 2-level enhancement for offenses that involve the display, performance, publication, reproduction, or distribution of a work being prepared for commercial distribution. See U.S.S.G. § 2B5.3(b)(2). A "work being prepared for commercial distribution" has the meaning given in 17 U.S.C.§ 506(a)(3). U.S.S.G. § 2B5.3 cmt. n.1. See also Chapter II of this Manual.

    The 2-level increase for pre-release piracy applies not only to the online pre-release offense set forth in 17 U.S.C. § 506(a)(1)(C) (which by definition involves pre-release piracy over publicly-accessible computer networks), but also to any copyright crimes under § 506(a)(1)(A) or (B) that involve pre-release piracy done through any other medium, such as a § 506(a)(1)(A) conviction for selling pirated pre-release movie DVDs.

  26. VIII.C.1.e. Manufacturing, Importing, or Uploading Infringing Items Increases the Offense Level by 2—U.S.S.G. § 2B5.3(b)(3) [before October 24, 2005: § 2B5.3(b)(2)]
  27. The offense level is increased by 2 levels if the offense involves the "manufacture, importation, or uploading of infringing items." U.S.S.G. § 2B5.3(b)(3). (Before the October 24, 2005 amendments, this provision was numbered § 2B5.3(b)(2). See U.S.S.G. App. C (Amendment 675).) If, after applying § 2B5.3(a), (b)(1), (b)(2), and the 2-level increase in (b)(3), the offense level is less than 12, then it must be increased to 12. U.S.S.G. § 2B5.3(b)(3).

    This upward adjustment reflects the need to punish those who introduce infringing goods into the stream of commerce. U.S.S.G. App. C (Amendments 590, 593).

    Uploading is particularly troublesome because it not only introduces infringing items into the stream of commerce, but also enables further infringement of the works. U.S.S.G. App. C (Amendments 590, 593). "'Uploading' means making an infringing item available on the Internet or a similar electronic bulletin board with the intent to enable other persons to (A) download or otherwise copy the infringing item; or (B) have access to the infringing item, including by storing the infringing item in an openly shared file." U.S.S.G. § 2B5.3 cmt. n.1 (Oct. 24, 2005). Uploading does not include merely downloading or installing an infringing item on a hard drive on a defendant's personal computer, unless the defendant places the infringing item in an openly shared file. Id. (Before the October 24, 2005 amendments, "uploading" was defined in § 2B5.3's first and third application notes. The 2005 amendments consolidated the definition into the first application note and clarified the circumstances in which loading a file onto a computer hard drive constitutes uploading. The amendment made no substantive change, however. See U.S.S.G. App. C (Amendment 675).)

    Manufacturing and importing infringing items are also singled out for a 2- level increase because those actions introduce infringing items into the stream of commerce. U.S.S.G. § 2B5.3 App. C (Amendments 590, 593).

    Although the guidelines do not define "manufacturing," the important distinction is between manufacturing (which gets the 2-level increase) and mere distribution and trafficking (which do not unless they involved importation or uploading). In the case of counterfeit trademarked goods, manufacturing should include not only producing the item, but also applying a counterfeit label to it, since an item does not become counterfeit until a counterfeit label is used in conjunction with it.

    Manufacturing should encompass not only the production of counterfeit trademarked hard goods, but also the performance of counterfeit service-marked services and the production and reproduction of pirated copyrighted works under 17 U.S.C. § 506; counterfeit labels under 18 U.S.C. § 2318; bootleg music recordings under 17 U.S.C. § 2319A; camcorded movies under 18 U.S.C. § 2319B; and illegal circumvention devices under 17 U.S.C. § 1204.

    If a defendant conspired with or aided and abetted another person who manufactured, uploaded, or imported infringing items, the defendant can qualify for this 2-level increase even if he did none of these things himself. The increase is triggered by whether the offense involved manufacturing, importation, or uploading, not whether the defendant performed these tasks. See U.S.S.G. § 2B5.3(b)(3) ("If the offense involved the manufacture, importation, or uploading ...") (emphasis added); U.S.S.G. § Ch. 2 (Introductory Commentary) ("Chapter Two pertains to offense conduct.").

  28. VIII.C.1.f. Offense Not Committed for Commercial Advantage or Private Financial Gain Reduces the Offense Level by 2—U.S.S.G. § 2B5.3(b)(4) [before October 24, 2005: § 2B5.3(b)(3)]
  29. The fourth offense characteristic, located in guideline § 2B5.3(b)(4), decreases the offense level by 2 levels if the offense was not committed for commercial advantage or private financial gain, but the resulting offense level cannot be less than 8. (This characteristic was renumbered from § 2B5.3(b)(3) to 2B5.3(b)(4) in the October 24, 2005 amendments. See U.S.S.G. App. C (Amendments 590, 593, 675).)

    The defendant bears the burden of proving that he is entitled to this offense characteristic, because it is structured as a decrease rather than an increase. See generally United States v. Ameline, 409 F.3d 1073, 1086 (9th Cir. 2005) (en banc); United States v. Dinges, 917 F.2d 1133, 1135 (8th Cir. 1990); United States v. Kirk, 894 F.2d 1162, 1164 (10th Cir. 1990); United States v. Urrego-Linares, 879 F.2d 1234, 1238-39 (4th Cir. 1989).

    For a complete discussion of what qualifies as conduct done for the purposes of commercial advantage or private financial gain, see Section II.B.4. of this Manual (copyright). The interpretation of commercial advantage and private financial gain in copyright cases applies equally to U.S.S.G. § 2B5.3 for any type of intellectual property crime because the statutory and guidelines definitions are nearly identical. Compare U.S.S.G. § 2B5.3 cmt. n.1 (defining terms) with 17 U.S.C. § 101 (same).

  30. VIII.C.1.g. Offense Involving Risk of Serious Bodily Injury or Possession of a Dangerous Weapon Increases the Offense Level by 2—U.S.S.G. § 2B5.3(b)(5) [before October 24, 2005: § 2B5.3(b)(4)]
  31. If the offense involved conscious or reckless risk of serious bodily injury or possession of a dangerous weapon, the offense level is increased by 2. U.S.S.G. § 2B5.3(b)(5). If the resulting offense level is less than 13, then it must be increased to level 13. See, e.g., United States v. Maloney, 85 Fed. Appx. 252, (2d Cir. 2004) (applying 2-level enhancement for possession of a dangerous weapon in connection with conviction under 18 U.S.C. § 2318(a),(c)(3) and § 2, even though defendant was acquitted at trial of a felon-in-possession of a firearm charge).

    This enhancement was partially motivated by the health and safety risks from counterfeit consumer products such as counterfeit batteries, airplane parts, and pharmaceuticals. See U.S.S.G. App. C (Amendments 590, 593). The October 24, 2005 amendments renumbered this enhancement from U.S.S.G. § 2B5.3(b)(4) to § 2B5.3(b)(5). Id. (Amendment 675).

  32. VIII.C.1.h. Decryption or Circumvention of Access Controls Increases the Offense Level—U.S.S.G. § 3B1.3
  33. The 2-level enhancement for use of a special skill under U.S.S.G. § 3B1.3 "shall apply" if the defendant decrypted or circumvented access controls. U.S.S.G. § 2B5.3 cmt. n.3 (emphasis added) (formerly n.4, before the Oct. 24, 2005 amendments, see U.S.S.G. App. C (Amendment 675)).

    Because the note quoted above refers only to the circumvention of access controls, it is unclear whether the special skill enhancement must also apply to decrypting or circumventing copy controls. There is no policy-related reason to treat access and copy controls differently at sentencing. In fact, U.S.S.G. § 3B1.3 applies to any defendant who commits an intellectual property crime while using a special skill. See Section VIII.C.2.i. of this Chapter for a more detailed description of what constitutes a special skill.

    This enhancement may not be assessed for use of a special skill if the adjustment under U.S.S.G. § 3B1.1 (Aggravating Role) is also assessed. See U.S.S.G. § 3B1.3.

  34. VIII.C.1.i. Upward Adjustment for Harm to Copyright or Mark- Owner's Reputation, Connection with Organized Crime, or Other Unspecified Grounds
  35. The fourth application note for § 2B5.3 (formerly application note 5, before the October 24, 2005 amendments) states that an upward departure may be warranted if the offense level determined under § 2B5.3 "substantially understates the seriousness of the offense," such as when the offense substantially harmed the victim's reputation in a way that is otherwise unaccounted for, including in calculating the infringement amount, and when the offense was in connection with or in furtherance of a national or international organized criminal enterprise. U.S.S.G. § 2B5.3 cmt. n.4; id. App. C (Amendments 590, 593).These two examples are not, however, exclusive.

  36. VIII.C.1.j. Vulnerable Victims—U.S.S.G. §  3A1.1(b)
  37. Intellectual property crime defendants are likely to qualify for an upward adjustment under U.S.S.G. § 3A1.1(b) if they knew or should have known that they were selling counterfeit products to vulnerable victims. A prime example of this would be selling counterfeit pharmaceuticals that are distributed or redistributed to sick patients. See United States v. Milstein, 401 F.3d 53, 74 (2d Cir. 2005) (affirming vulnerable victim adjustment for distributing counterfeit and misbranded drugs "to doctors, pharmacists, and pharmaceutical wholesalers, knowing that those customers would distribute the drugs to women with fertility problems and to Parkinson's disease patients").

  38. VIII.C.1.k. No Downward Departure for the Victim's Participation in Prosecution
  39. The court may not depart downward on the ground that the victim participated in the prosecution. In United States v. Yang, 281 F.3d 534 (6th Cir. 2002), cert. denied, 537 U.S. 1170 (2003), on appeal after new sentencing hearing, 144 Fed. Appx. 521 (6th Cir. 2005), a prosecution for theft of trade secret, mail fraud, wire fraud, and money laundering, the trial court departed downward 14 levels on the ground that the victim participated too much in the prosecution, specifically in calculating the loss it suffered. The 6th Circuit reversed, concluding that "the victim's participation in the prosecution is wholly irrelevant to either the defendant's guilt or the nature or extent of his sentence," and is therefore not a permissible basis for a downward departure. Yang, 281 F.3d at 545, 546.

  40. VIII.C.2. Offenses Involving the Economic Espionage Act
  41. VIII.C.2.a. Applicable Guideline is § 2B1.1 Except for Attempts and Conspiracies
  42. Unlike most other intellectual property offenses, which are sentenced under U.S.S.G. § 2B5.3, completed EEA offenses (both § 1831 and § 1832) are sentenced under U.S.S.G. § 2B1.1. See U.S.S.G. App. A. The choice of U.S.S.G. § 2B1.1 instead of U.S.S.G. § 2B5.3 likely reflects the idea that EEA offenses are primarily about stolen property rather than infringement. The superficial difference between stealing and infringement is that one physically dispossesses the victim of his property and the latter does not. However, the EEA punishes those who steal trade secrets without dispossessing the victim of his trade secret, and even after a trade secret is physically stolen, the victim may still use the information itself. The overlap between misappropriation and infringement therefore makes U.S.S.G. § 2B1.1 an interesting fit for the EEA.

    An EEA attempt or conspiracy is sentenced under U.S.S.G. § 2X1.1 (Conspiracies, Attempts, and Solicitations), which uses the offense level calculated under U.S.S.G. § 2B1.1 and decreases the base offense level 3 levels "unless the defendant completed all the acts the defendant believed necessary for successful completion of the substantive offense or the circumstances demonstrate that the defendant was about to complete all such acts but for apprehension or interruption by some similar event beyond the defendant's control." U.S.S.G. § 2X1.1(b)(1),(2). The 3-point reduction will rarely apply in EEA attempt cases resulting from undercover stings because in those operations the defendant has generally completed all necessary acts short of the actual receipt of what the defendant believed was a trade secret.

  43. VIII.C.2.b. Base Offense Level—U.S.S.G. § 2B1.1(a)
  44. The base offense level for a completed EEA crime is 6. U.S.S.G. § 2B1.1(a)(2).

  45. VIII.C.2.c. Loss—U.S.S.G. § 2B1.1(b)(1)
  46. The defendant's sentence is driven largely by the value of the misappropriated property. Under U.S.S.G. § 2B1.1(b)(1), the offense level increases according to the amount of the loss.

  47. VIII.C.2.c.i. Use Greater of Actual or Intended Loss
  48. This loss figure is "the greater of actual loss or intended loss." U.S.S.G. § 2B1.1 cmt. n.3(A). "Actual loss" is "the reasonably foreseeable pecuniary harm that resulted from the offense," whereas "intended loss (I) means the pecuniary harm that was intended to result from the offense; and (II) includes intended pecuniary harm that would have been impossible or unlikely to occur (e.g., as in a government sting operation, or an insurance fraud in which the claim exceeded the insured value)." Id. cmt. n.3(A)(i-ii).

  49. VIII.C.2.c.ii. Reasonable Estimates Acceptable
  50. Whatever method is chosen to calculate loss, the government's calculation need not be absolutely certain or precise. "The court need only make a reasonable estimate of the loss." U.S.S.G. § 2B1.1 cmt. n.3(C).

  51. VIII.C.2.c.iii. Methods of Calculating Loss
  52. Guideline § 2B1.1's application notes outline a number of general methods for calculating the loss, many of which are included as methods to estimate the loss:

    In a trade secrets case, calculating the loss can be complicated. First, consider the situations under which the defendant can be convicted: (a) merely conspiring to misappropriate a trade secret that the victim has not fully exploited to create a product; (b) receiving a trade secret, but not using the trade secret; (c) stealing a trade secret at no cost; (d) stealing a trade secret for an agreed-upon bribe; (e) receiving a trade secret and using it to create a product that has not been completed; (f) receiving a trade secret, using it to create a product, introducing the product, but not yet selling it; (g) receiving a trade secret, using it to create a product, and selling the product at a loss; (h) receiving the trade secret, using it, and selling the product at a profit, while the victim continues to profit from its own sales; and (i) receiving the trade secret, using it, and selling a product that displaces the victim's sales. These situations do not exhaust the possibilities. They illustrate, however, several complicating factors:

    The final complicating factor is that trade secrets are, by definition, not traded in an open market that allows the easy calculation of a trade secret's price or value.

    The variety of misappropriation scenarios, the variety of evidence available, and the broad principles of valuing trade secrets in criminal and civil law lead to one clear recommendation: prosecutors, agents, and courts should consider the variety of methods by which a trade secret can be valued, develop whatever evidence is reasonably available, and then be pragmatic about choosing which method to use, as long as it is equitable, appropriately punitive, and supported by the evidence. The cases bear this out.

  53. VIII.C.2.d. Intent to Benefit a Foreign Government, Instrumentality, or Agent—U.S.S.G. § 2B1.1(b)(5)
  54. The offense level is increased two points if the defendant knew or intended the offense to benefit a foreign government, foreign instrumentality, or foreign agent. See U.S.S.G. § 2B1.1(b)(5).

  55. VIII.C.2.e. Sophisticated Means—U.S.S.G. § 2B1.1(b)(9)(C)
  56. If the offense involved "sophisticated means," the offense level is increased by 2 levels, and if the resulting offense is less than 12, it must be increased to 12. U.S.S.G. § 2B1(b)(9)(C). "'[S]ophisticated means' means especially complex or especially intricate offense conduct pertaining to the execution or concealment of an offense," which includes "hiding assets or transactions," among other things. Id. cmt. n.8(B).

    The sophisticated means enhancement will often apply to trade secret offenses, because these crimes are often committed by corporate insiders who have the need and opportunity to take extensive precautions to shield their actions from their employers. A defendant can receive the adjustment for sophisticated means in addition to the adjustment for use of a special skill under U.S.S.G. § 3B1.3. See United States v. Rice, 52 F.3d 843, 851 (10th Cir. 1995) ("The purpose of the special skill enhancement is to punish those criminals who use their special talents to commit crime. In contrast, the sophisticated means and more than minimal planning enhancements [in predecessor guideline to § 2B1.1] are designed to target criminals who engage in complicated criminal activity because their actions are considered more blameworthy and deserving of greater punishment than a perpetrator of a simple version of the crime. We therefore see no double counting here."); United States v. Olis, 429 F.3d 540, 549 (5th Cir. 2005); United States v. Minneman, 143 F.3d 274, 283 (7th Cir. 1998).

  57. VIII.C.2.f. Upward Departure Considerations— U.S.S.G. § 2B1.1 cmt. n.19(A)
  58. A non-exhaustive list of factors in which an upward departure should be considered is set forth in Application Note 19 to U.S.S.G. § 2B1.1. The factors that are most likely to be relevant in a trade secret case are intending, risking, and causing non-monetary harm, such as emotional harm, because many EEA cases involve disgruntled employees or former employees out for revenge. U.S.S.G. § 2B1.1 cmt. n.19(i),(ii).

  59. VIII.C.2.g. Downward Departure Considerations— U.S.S.G. § 2B1.1 cmt. n.19(C)
  60. Application Note 19(C) to U.S.S.G. § 2B1.1 suggests that a downward departure may be warranted if the offense level "substantially overstates the seriousness of the offense." EEA defendants are likely to raise this as a basis for downward departure if the loss amount greatly outweighs the amount of the actual or intended gain or loss, as sometimes happens when the trade secret is valued by research and development costs.

  61. VIII.C.2.h. Abuse of a Position of Trust—U.S.S.G. §  3B1.3
  62. Trade secret offenses committed by corporate insiders often deserve the 2- level adjustment for abuse of a position of trust under U.S.S.G. § 3B1.3. The adjustment is appropriate when the defendant had "professional or managerial discretion (i.e., substantial discretionary judgment that is ordinarily given considerable deference)" and the position of trust "contributed in some significant way to facilitating the commission or concealment of the offense." Id. cmt. n.1. A defendant can receive the enhancements for abuse of a position of trust and sophisticated means simultaneously. Cf. United States v. Straus, 188 F.3d 520, 1999 WL 565502, at *5 (10th Cir. 1999) (table) (holding that abuse-of-trust and more-than-minimal-planning enhancements, the latter in a predecessor to U.S.S.G. § 2B1.1(b)(9)(C), can be applied to same conduct simultaneously).

  63. VIII.C.2.i. Use of Special Skill—U.S.S.G. §  3B1.3
  64. Trade secret defendants who use their specialized technical knowledge to understand and use the misappropriated trade secret will often qualify for an adjustment for use of a special skill under U.S.S.G. § 3B1.3. See, e.g., United States v. Lange, 312 F.3d 263, 270 (7th Cir. 2002).

    "'Special skill' refers to a skill not possessed by members of the general public and usually requiring substantial education, training, or licensing. Examples would include pilots, lawyers, doctors, accountants, chemists, and demolition experts." U.S.S.G. § 3B1.3 cmt. n.4. Special skill includes any type of special skill, not just one gained through advanced education. In Lange, it applied to a mechanical drafter, an EEA defendant who committed his offense using his associate's degree in graphic design and his ability to work with his former employer's engineering drawings in AutoCAD. Lange, 312 F.3d at 270.

    A defendant can receive the adjustment for use of a special skill in addition to the adjustment for sophisticated means under U.S.S.G. § 2B1.1(b)(9)(C).

  65. VIII.C.2.j. No Downward Departure for Victim's Participation in Developing the Case
  66. As noted in Section VIII.C.1.k. of this Chapter, the court may not depart downward on the ground that the victim participated in the prosecution.

  67. VIII.D. Restitution
  68. "'The principle of restitution is an integral part of virtually every formal system of criminal justice, of every culture and every time. It holds that, whatever else the sanctioning power of society does to punish its wrongdoers, it should also ensure that the wrongdoer is required to the degree possible to restore the victim to his or her prior state of well- being.'" Attorney General Guidelines on Victim and Witness Assistance, Art. V.A. (Dep't of Justice May 2005) (emphasis added in original) (quoting S. Rep. No. 104-179, at 12-13 (1996), reprinted in 1996 U.S.C.C.A.N. 924, 925-26).

    In intellectual property cases, there are two types of victim: the owner of the intellectual property that was infringed or misappropriated, and any consumer who was lured into purchasing the infringing goods by fraud. Both types of victim usually qualify for restitution if they have suffered a loss.

    This section discusses restitution in intellectual property crimes. For more detailed guidance on restitution principles and procedures, prosecutors should consult the Attorney General Guidelines on Victim and Witness Assistance, cited above, as well as the Prosecutor's Guide to Criminal Monetary Penalties: Determination, Imposition and Enforcement of Restitution, Fines & Other Monetary Impositions (Dep't of Justice Office of Legal Education May 2003).

  69. VIII.D.1. Restitution is Available—and Often Required—in Intellectual Property Prosecutions
  70. Most criminal intellectual property defendants must pay their victims restitution.

    Intellectual property offenses in Title 18 require restitution under the Mandatory Victims Restitution Act of 1996 ("MVRA"), codified in part at 18 U.S.C. § 3663A ("Mandatory restitution to victims of certain crimes"). Under the MVRA, restitution is mandatory following any "offense against property under [Title 18] ... including any offense committed by fraud or deceit ... in which an identifiable victim or victims suffered a pecuniary loss." 18 U.S.C. § 3663A(c)(1)(A)(ii),(B). Intellectual property crimes are offenses against property in two senses: some defraud unwitting customers into paying money for infringing products, and all involve intellectual property, which is property as much as any tangible property. See, e.g., United States v. Carpenter, 484 U.S. 19, 26 (1987) (stating that confidential information, another type of intangible property, has "long been recognized as property"); United States v. Trevino, 956 F.2d 276, 1992 WL 39028 (9th Cir. 1992) (table) (in counterfeit trademark prosecution, affirming order of restitution to nuclear power plant victim that had purchased counterfeit circuit breakers). The few cases on point confirm that intellectual property offenses are "offense[s] against property" for the purpose of § 3663A. See United States v. Chay, 281 F.3d 682 (7th Cir. 2002) (noting that a conviction under 18 U.S.C. § 2318(a) for trafficking in counterfeit documents and packaging for computer programs was an "offense against property" under 18 U.S.C. § 3663A and thus required mandatory restitution); United States v. Hanna, No. 02 CR. B64-01, 2003 WL 22705133 (S.D.N.Y. Nov. 17, 2003) (stating that a conviction under 18 U.S.C. § 2320 for trafficking in counterfeit trademarked handbags and other goods requires full restitution under 18 U.S.C. §§ 3663A, 3664). See also United States v. Cho, 136 F.3d 982, 983 (5th Cir. 1998) (mentioning restitution in trademark counterfeiting case); United States v. Manzer, 69 F.3d 222, 229-30 (8th Cir. 1995) (upholding restitution award of $2.7 million in mail fraud, wire fraud, and copyright infringement prosecution for the sale of modification and cloning packages for unauthorized decryption of premium channel satellite broadcasts); United States v. Sung, 51 F.3d 92, 96 (7th Cir. 1995) (mentioning restitution in trademark counterfeiting case); United States v. Bohai Trading Co., 45 F.3d 577, 579 (1st Cir. 1995) (same—restitution amount of $100,000); United States v. Hicks, 46 F.3d 1128, 1195 WL 20791, at *3 (4th Cir. 1995) (table) (upholding restitution award in satellite decryption and copyright case).

    These cases support the proposition that restitution is mandatory in all Title 18 intellectual property offenses, including § 1831 (economic espionage to benefit foreign government, instrumentality, or agent), § 1832 (general economic espionage), § 2318 (counterfeit and illicit labels and counterfeit documentation and packaging for copyrighted works), § 2319 (copyright), § 2319B (camcorded movies), and § 2320 (goods, services, labels, documentation, and packaging with counterfeit marks). In addition, Congress recently made clear that restitution must be ordered in appropriate § 2320 cases. See 18 U.S.C. § 2320(b)(4) (as amended by the Stop Counterfeiting in Manufactured Goods Act, Pub. L. No. 109-181, § 1, 120 Stat. 285, 286 (enacted March 16, 2006)).

    This list might also include violations of § 2319A (bootleg music and music video recordings), but defendants might argue that those crimes are not offenses against property on the ground that bootleg music and music video recordings do not infringe copyrighted property, see Section II.F. of this Manual (describing § 2319A's constitutional basis as the Commerce Clause rather than the Intellectual Property Clause), or any other type of property, and that any revenues from these offenses do not represent an actual pecuniary harm to the victim because bootleg music and music video recordings do not decrease artists' sales. Prosecutors may wish to consult CCIPS at (202) 514- 1026 to discuss restitution in § 2319A convictions.

    There are two principal exceptions to mandatory restitution provided for in § 3663A: "if (A) the number of identifiable victims is so large as to make restitution impracticable; or (B) determining complex issues of fact related to the cause or amount of the victim's losses would complicate or prolong the sentencing process to a degree that the need to provide restitution to any victim is outweighed by the burden on the sentencing process." 18 U.S.C. § 3663A(c)(3). Defendants can be expected to argue for one or both of these exceptions in cases of online copyright piracy that involve a large number of copyrighted works owned by a large number of victims, in cases of retail counterfeit goods cases that were sold to a large number of defrauded customers, and in trade secret cases that involve complex issues of valuation. "This 'exception' was intended to be used sparingly, and the court is expected to use every means available, including a continuance of the restitution determination of up to 90 days, if necessary, to identify as many victims and harms to those victims as possible. 18 U.S.C. § 3664(d)(5); U.S. v. Grimes, 173 F.3d 634 (7th Cir. 1999)." Prosecutor's Guide to Criminal Monetary Penalties: Determination, Imposition and Enforcement of Restitution, Fines & Other Monetary Impositions 28 (Dep't of Justice Office of Legal Education May 2003). Department policy also requires that "[w]hen this exception does apply, the prosecutor should nevertheless seek restitution for the benefit of the victims to the extent practicable," Attorney General Guidelines on Victim and Witness Assistance Art. V.F. (Dep't of Justice May 2005) (emphasis added), such as by asking the court to order restitution "for those victims and harms the court can identify," Prosecutor's Guide to Criminal Monetary Penalties at 30 (discussing similar exception for discretionary restitution). How to ensure restitution in such situations is addressed below in the discussion of how to set the restitution amount.

    Another possible exception to mandatory restitution may exist for criminal trademark, service mark, and certification mark cases under 18 U.S.C. § 2320 in which the mark-holder neglected to use the ® symbol (or other proper notice) and the defendant lacked actual notice that the mark was registered. See Section III.E.3. of this Manual. In those cases, however, even though restitution might not be awarded to the mark-holder, it should still be awarded to any customers of the defendant who were defrauded into buying what they thought were authentic goods or services. Id.

    Although technically not an exception to the mandatory restitution provisions in 18 U.S.C. § 3663A, there are two classes of intellectual property crimes for which there is no mandatory restitution under § 3663A. The first class consists of those intellectual property offenses located outside Title 18 of the United States Code. Mandatory restitution applies only to an "offense against property under this title [18]," 18 U.S.C. § 3663A(c)(1)(A)(ii), which by definition excludes intellectual property offenses located outside Title 18. These include violations of the Digital Millennium Copyright Act, 17 U.S.C. § 1204, and the unauthorized reception of cable and satellite service as prohibited by 47 U.S.C. §§ 553(b)(2), 605.

    The second class consists of any intellectual property offenses located in Title 18 that might be characterized as not being "offense[s] against property." § 3663A(c)(1)(A)(ii) (emphasis added). Examples might include violations of 18 U.S.C. § 2319A (bootleg music and music video recordings).

    Fortunately, even in the cases discussed in the previous paragraphs, there are other mechanisms to obtain restitution. For intellectual property offenses that are located in Title 18 but are not offenses against property, discretionary restitution is available under 18 U.S.C. § 3663(a)(1)(A). For intellectual property offenses that are located outside Title 18, restitution is available under a plea agreement. See 18 U.S.C. § 3663(a)(3). And, finally, discretionary restitution can be ordered for any intellectual property crime—in fact any crime at all, whether an intellectual property crime or not, whether in Title 18 or not, and whether an offense against property or not—as a condition of probation, or of supervised release after imprisonment. See 18 U.S.C. §§ 3563(b)(2) (probation), 3583(d) (supervised release). A good example of these principles is United States v. Lexington Wholesale Co., 71 Fed. Appx. 507 (6th Cir. 2003) (unpublished), in which a defendant was convicted for selling infant formula repackaged with counterfeit trademarks and without an accurate "use by" date, which resulted in one count for criminal trademark violations under 18 U.S.C. § 2320 and one count for misbranded food or drugs under Title 21. 71 Fed. Appx. at 508. The sentencing court imposed restitution to the victim of the misbranding count only, which the defendant argued was improper because restitution is authorized only for offenses under Title 18, not Title 21. Id. The appellate court affirmed restitution on the ground that it was authorized as a condition of probation and also by the plea agreement. Id. at 508- 09.

    In deciding whether to award discretionary restitution, the court must consider not only the victim's loss, but also the defendant's financial resources. 18 U.S.C. § 3663(a)(1)(B)(i); see also § 3563(b)(2) (allowing court to order restitution to a victim as a condition of probation "as [] reasonably necessary" and without regard to the limitations on restitution in § 3663(a) and § 3663A(c)(1)(A)). Mandatory restitution requires full restitution. Prosecutor's Guide to Criminal Monetary Penalties at 29-30. There is, however, a presumption for full restitution, even in discretionary restitution cases. Id. The Department's policy is to require full restitution in discretionary cases (assuming the defendant's current or future economic circumstances warrant it), but in discretionary cases to require nominal payment if economic circumstances so warrant. Id. at 30.

    In deciding whether to order discretionary restitution, the court should also consider whether "the complication and prolongation of the sentencing process ... outweighs the need to provide restitution." 18 U.S.C. § 3663(a)(1)(B)(ii). Again, however, the Department advises that "prosecutors should only ask the court to apply this provision narrowly, i.e., only to whatever portion of restitution it may be applicable, and to impose restitution for those victims and harms the court can identify." Prosecutor's Guide to Criminal Monetary Penalties at 30.

    Department policy requires consideration of the availability of restitution when making charging decisions, and to structure plea agreements to provide restitution whenever possible. See Attorney General Guidelines on Victim and Witness Assistance Arts. V.C.1. (stating that "[w]hen exercising their discretion, prosecutors shall give due consideration to the need to provide full restitution to the victims of Federal criminal offenses," among other charging considerations), V.D.1.-.6. (plea agreements, including required provisions and supervisors' duties for approval relating to restitution). If one of the charges would require restitution, the plea agreement should require full restitution even if the defendant pleads guilty to a charge that would not require restitution. Id.

  71. VIII.D.2. Victims Include Owners of Intellectual Property and Consumers Who Were Defrauded
  72. Prosecutors should consider all victims who suffered a loss, from the holder of the intellectual property to the direct purchaser and the ultimate consumer of the infringing good.

    Generally, the intellectual property rights-holder whose works were infringed or misappropriated qualifies for restitution. This is clear in cases involving copyrights, trademarks, and trade secrets. As noted in Section VIII.D.1. of this Chapter, DMCA offenses do not qualify for mandatory restitution. Moreover, the cases suggest that in DMCA or DMCA-like cases, the company whose technological measures are circumvented is not entitled to restitution unless the company also owns copyrighted works that were infringed as a result of the circumvention. See United States v. Oliver, No. 8:02CR3, 2005 WL 1691049, at *5 (D. Neb. July 18, 2005) ("Even if Sony had made money as a result of the defendant's criminal conduct [in modifying Sony Playstations to play pirated games in violation of the DMCA], it simply does not negate the fact that the defendant is guilty of violating Sony's copyright [by modifying the game machines to play pirated Sony games]."); United States v. Hicks, 46 F.3d 1128, 1995 WL 20791, at *1 (4th Cir. Jan. 20, 1995) (table) (holding that defendant convicted of selling modified satellite TV descrambling devices in violation of 47 U.S.C. § 605(e)(4) was not liable for restitution to descrambling device manufacturers because they had been fully compensated when they originally sold their devices, but ordering restitution to satellite service providers for what customers would have paid for the additional channels they could receive because of the defendant's modifications). Industry associations that represent intellectual property rights-holders can, in some circumstances, help identify rights-holders and receive and distribute the restitution to the rights-holders.

    Defrauded purchasers—if any—are entitled to restitution as well. See, e.g., United States v. Trevino, 956 F.2d 276, 1992 WL 39028 (9th Cir. 1992) (table) (in counterfeit trademark prosecution, affirming order of restitution to nuclear power plant victim that had purchased counterfeit circuit breakers). A defendant who has defrauded a large number of consumers can be expected to argue that restitution is not required because the class of defrauded consumers is impracticably large or difficult to identify. See 18 U.S.C. § 3663A(c)(3). There are procedures for ordering restitution for victims who can be identified by name but cannot presently be located at a particular address. See United States v. Berardini, 112 F.3d 606, 609-12 (2d Cir. 1997).

    Consumers who knew that they were purchasing counterfeits generally do not qualify as victims, because they have not been harmed. Distinguishing between consumers who were and were not defrauded may be a challenge.

    In determining whether an involved party qualifies as a victim for the purpose of restitution, the court will distinguish between those harmed by the defendant's relevant conduct and those harmed by the offense of conviction. (The rest of this paragraph consists largely of excerpts from the Prosecutor's Guide to Criminal Monetary Penalties: Determination, Imposition and Enforcement of Restitution, Fines & Other Monetary Impositions 32 (Dep't of Justice Office of Legal Education May 2003), with minor edits.) The court is statutorily authorized to impose restitution only to identifiable victims of the acts that are part of the offense of conviction. In Hughey v. United States, 495 U.S. 411, 413 (1990), the Supreme Court held that the restitution statutes limit restitution to "the loss caused by the specific conduct that is the basis of the offense of conviction." Restitution is not authorized for acts merely related to the offense of conviction, such as acts that are within "relevant conduct" under guideline sentencing (U.S.S.G. § 1B1.3), but are outside the actual offense of conviction itself. Under the primary restitution statutes, a victim is "a person directly and proximately harmed as a result of the commission of an offense for which restitution may be ordered." 18 U.S.C. §§ 3663A(a)(2), 3663(a)(2). Where the offense of conviction includes a scheme, conspiracy, or pattern of criminal activity, however, restitution can be imposed for the entire scheme, conspiracy, or pattern. Therefore, prosecutors should charge such offenses to indicate the specific nature and full extent of the acts that constitute the scheme, conspiracy, or pattern of which the offense of conviction is involved, in order to permit the broadest imposition of restitution.

    If the acts for which restitution is sought cannot be tied together with a scheme, pattern, or conspiracy, then the acts outside the offense of conviction generally do not trigger restitution. Under this rule, restitution is generally not triggered by one kind of act if the offense of conviction describes another kind of act, even if the acts are logically related in purpose or intent—for example, if the offense of conviction is possession of stolen credit cards, some courts will not impose restitution for the victims of the use of the cards. See, e.g., United States v. Blake, 81 F.3d 498 (4th Cir. 1996); United States v. Hayes, 32 F.3d 171 (5th Cir. 1994). However, some courts apply this rule more strictly than others. For example, to determine the existence of a scheme and what acts it included, some courts will consider the facts alleged in the indictment, proven at trial, or admitted in the plea colloquy. See, e.g., United States v. Jackson, 155 F.3d 942 (8th Cir. 1998); United States v. Ramirez, 196 F.3d 895 (8th Cir. 1999); United States v. Hughey (II), 147 F.3d 423, 438 (5th Cir. 1998) (suggesting that restitution might have been triggered by acts not in the indictment had they been established by the trial record).

    If no scheme, conspiracy, or pattern encompasses the acts for which injured parties seek restitution, restitution will likely be limited in two respects. First, a party who was injured solely by an act outside the offense of conviction—such as a party whose losses were proved only as relevant conduct—cannot obtain restitution. Second, a party who was injured by the offense of conviction can obtain restitution only for the offense-of- conviction acts and not acts proved only as relevant conduct at sentencing—even relevant conduct that counted towards the loss or infringement amount; however, some courts may still allow restitution for this type of relevant conduct if it is alleged in the indictment or proved at trial, not just at sentencing. The exception to both these limitations is, of course, restitution ordered pursuant to a stipulation in a plea agreement. See 18 U.S.C. § 3663(a)(3).

    Application of these principles to an intellectual property crime occurred in United States v. Manzer, 69 F.3d 222 (8th Cir. 1995), in which the court ordered $2.7 million in restitution from a defendant convicted of mail fraud, wire fraud, and criminal copyright infringement for trafficking in cloned computer chips. The cloned chips would allow satellite descrambling devices to decrypt cable satellite signals without authorization. The defendant objected to the $2.7 million restitution award on the ground that it included sales not identified in the indictment. Id. at 229-30. The Eighth Circuit disagreed, holding that the mail and wire fraud counts alleged a scheme to defraud that "encompass[ed] transactions beyond those alleged in the counts of conviction," including the sales not otherwise identified in the indictment. Id. at 230 (citation and internal quotation marks omitted). Note that the restitution might have been limited to the sales alleged the indictment if the defendant had pleaded to or been convicted of only the copyright charge.

    There are several ways to help ensure that restitution is awarded for harm caused. As part of any plea deal, the government should require the defendant to plead to the counts that offer maximum restitution, or the government should insist upon a comprehensive plea agreement that provides restitution to the victims of relevant offense conduct (whether the statutes or offenses of conviction provide for it or not). See 18 U.S.C. § 3663(a)(3) (allowing court to order restitution as provided in plea agreement); Prosecutor's Guide to Criminal Monetary Penalties: Determination, Imposition and Enforcement of Restitution, Fines & Other Monetary Impositions 22-24 (Dep't of Justice Office of Legal Education May 2003).

    At the beginning of the case, prosecutors should draft the indictment to maximize restitution. Id. at 21. As the Executive Office for United States Attorneys counsels:

    Prosecutors should avoid the "scheme" restitution pitfalls by:

    a) Charging offenses that involve the statutory elements of an "intent to defraud" or "intent to deceive" in the traditional wire/mail fraud (or conspiracy) format, where the scheme (or conspiracy) is described in detail and incorporated by reference into each specific act count; and

    b) Making sure the dates alleged as the beginning and end of the scheme or conspiracy include all acts in furtherance of the scheme or conspiracy for which restitution should be imposed.

    Id. at 22. Moreover, "[s]imply tracking the statutory language of such offenses does not clarify if the acts of conviction are part of a scheme, i.e., whether different kinds of acts make up a scheme to 'defraud' or 'deceive.' Numerous restitution orders have been vacated in such cases due to ambiguity of the 'scheme' issue." Id. The same concerns apply to whether acts in addition to those alleged as overt acts of a conspiracy can qualify as part of the conspiracy for purposes of awarding restitution. The Prosecutor's Guide to Criminal Monetary Penalties discusses specific ways to structure restitution provisions in a plea agreement to maximize restitution. Id. at 23-24.

  73. VIII.D.3. Determining a Restitution Figure
  74. Once the government has identified the people and entities who might be classified as victims—consumers who were defrauded and intellectual property rights-holders—the next question is how to calculate what the victims are owed, if anything.

    To begin with, as discussed in the prior section, the restitution award must be based on the loss caused by the defendant's offense of conviction.

    After determining which victims and transactions qualify for restitution, the government must determine how the restitution should be calculated. The most important principle is that restitution is intended to make the victims whole by compensating them for their losses. See 18 U.S.C. §§ 3663(a)(1)(B)(i)(I), 3663A(b), 3664(a); U.S.S.G. § 5E1.1(a). This principle has several consequences.

    First, the restitution order should require the defendant to return any of the victim's property that he took. See 18 U.S.C. §§ 3663(b)(1)(A), 3663A(b)(1)(A), 3664(f)(4)(A). This principle applies across all intellectual property offenses:

    Second, the restitution order should compensate the victim for any money spent to investigate the defendant's conduct, whether during the victim's own investigation or while helping the government investigate and prosecute. These costs often arise in intellectual property cases: employers conduct internal investigations into their employees' theft of trade secrets, and copyright and trademark-holders often hire private investigators to monitor and investigate suspected infringers. The mandatory and discretionary restitution statutes both authorize restitution "for lost income and necessary child care, transportation, and other expenses related to participation in the investigation or prosecution of the offense or attendance at proceedings related to the offense." 18 U.S.C. §§ 3663(b)(4), 3663A(b)(4). These provisions have been interpreted to cover not only the victim's expenses in helping the government, but also the costs of the victim's own investigation. See United States v. Brown, 150 Fed. Appx. 575 (8th Cir. 2005) (per curiam) (awarding restitution to victim company for staff investigation costs into reconstructing and correcting financial records related to defendant's embezzlement, where defendant contested proof of amount but not whether investigative costs as a category are awardable); United States v. Beaird, 145 Fed. Appx. 853 (5th Cir. 2005) (per curiam) (affirming $200,000 award of restitution for attorney's fees and litigation expenses associated with assisting the FBI's investigation), cert. denied, 126 S. Ct. 1382 (2006); United States v. Gordon, 393 F.3d 1044, 1049, 1056-57 (9th Cir. 2004) (discussing reimbursement of investigative costs in depth, in case affirming $1,038,477 in restitution for costs of company's internal investigation and responses to grand jury subpoenas), cert. denied, 126 S. Ct. 472 (2005). See also United States v. Susel, 429 F.3d 782, 783 (8th Cir. 2005) (per curiam) (affirming award of software company's administrative and transportation expenses during participation in the investigation and prosecution of the offense in criminal copyright case).

    Third, in deciding whether to award discretionary restitution, the court must consider not only the victim's loss, but also the defendant's financial resources. 18 U.S.C. § 3663(a)(1)(B)(i); see also 18 U.S.C. § 3563(b)(2) (allowing court to order restitution to a victim as a condition of probation "as [] reasonably necessary" and without regard to the limitations on restitution in § 3663(a) and § 3663A(c)(1)(A)). Mandatory restitution requires full restitution. Prosecutor's Guide to Criminal Monetary Penalties at 29-30. There is, however, a presumption for full restitution, even in discretionary restitution cases. Id. Department policy requires full restitution in discretionary cases (assuming the defendant's current or future economic circumstances warrant it), unless economic circumstances warrant nominal payment. Id. at 30. In no case shall the fact that a victim has received or is entitled to receive compensation with respect to a loss from insurance or any other source be considered in determining the amount of restitution. 18 U.S.C. § 3664(f)(1)(B).

    Fourth, victims have an important role in helping to determine the appropriate amount of restitution. The government must consult with witnesses and the court to consider victims' evidence at sentencing. See 42 U.S.C. § 10607(c)(3)(G); Attorney General Guidelines for Victim and Witness Assistance Art. IV.B.2.b(4) (May 4, 2005). See generally Chapter X of this Manual (Victims). The criminal intellectual property statutes similarly require the court to consider victims' evidence at sentencing. See 18 U.S.C. §§ 2319(d), 2319A(d), 2319B(e), 2320(d). The pre-sentence report must also include a verified assessment of victim impact in every case. Fed. R. Crim. P. 32(d)(2)(B). Trade associations can be very helpful in providing victim impact statements, particularly when an offense involves a large quantity and variety of infringing products. See the listing of intellectual property contacts in Appendix G of this Manual.

  75. VIII.E. Forfeiture
  76. In intellectual property (IP) crimes, forfeiture can serve several important functions. Forfeiting infringing items removes them from the stream of commerce so they cannot be sold or redistributed. Forfeiting the tools and equipment that defendants use to commit IP crimes prevents their being used to commit further IP crime. Forfeiting the proceeds of IP crime—the revenues and profits—prevents their reinvestment in a criminal enterprise. Finally, forfeiture can serve as a powerful deterrent.

    Congress has passed many forfeiture laws that address specific crimes, but in a manner that has created a complex web of forfeiture statutes. The specific IP forfeiture provisions vary with the IP crime, yet the underlying criminal IP statute will often not make it obvious which forfeiture remedies—administrative, civil, or criminal—are available.

    To make IP forfeiture more standard and intuitive, Congress passed the Stop Counterfeiting in Manufactured Goods Act, Pub. L. No. 109-181, 120 Stat. 285 (enacted March 16, 2006) to expand the type of property that can be forfeited and to clarify and standardize the procedures for doing so. The Act, however, affects only counterfeit trademark, service mark, and certification mark offenses in 18 U.S.C. § 2320. Consequently, the Administration has proposed similar amendments to the forfeiture provisions for other IP offenses.

    This Chapter is not a definitive guide to forfeiture law, but rather it provides a basic overview of the forfeiture remedies available in IP crimes. Due to the intricacies of forfeiture law (including both recent changes in 2006 and possible future revisions), prosecutors with questions concerning forfeiture practice and procedure should contact the forfeiture expert in their office or the Criminal Division's Asset Forfeiture and Money Laundering Section at (202) 514-1263.

  77. VIII.E.1. Property Subject to Forfeiture
  78. Intellectual property crimes give rise to three general categories of forfeitable property:

  79. VIII.E.2. Overview of Forfeiture Procedures
  80. There are three types of forfeiture procedures: administrative, civil, and criminal. This section gives a brief overview and includes a table that summarizes the types of forfeiture available for each kind of property, organized by intellectual property offense.

  81. VIII.E.2.a. Administrative Forfeiture Proceedings
  82. Administrative forfeiture occurs when a law enforcement agency forfeits property in an administrative, non-judicial matter. As with the other types of forfeiture procedure, administrative forfeiture is available only pursuant to a specific statute that authorizes such a procedure. Administrative forfeiture commences once an agency seizes property and then sends or publishes notice of the property seizure within the prescribed deadlines. If nobody responds to the notice by filing a claim of ownership claim within the allotted time, the property is forfeited without involving a prosecutor or judge. If a claim is filed, the seizing agency must either return the property or seek forfeiture through a judicial procedure.

    Administrative forfeiture in IP offenses is usually limited to situations that implicate the customs laws. For example, Immigration and Customs Enforcement (ICE) may seize, forfeit, and destroy imported copyright- infringing products administratively pursuant to 17 U.S.C. §§ 509(b) and 603(c). ICE may also seize, forfeit, and destroy imported trademark- infringing products administratively under 19 U.S.C. § 1526(e). Administrative forfeiture may also be available for violations of 18 U.S.C. §§ 2318 and 2319A. See 18 U.S.C. § 2318(e); 17 U.S.C. § 509; see also 18 U.S.C. § 981(d); 19 U.S.C. §§ 1607-09 (administrative forfeiture of proceeds); 49 U.S.C. § 80304 (administrative forfeiture of facilitating property).

    Real property and personal property (other than monetary instruments) that are worth more than $500,000 can never be forfeited in an administrative proceeding. See 19 U.S.C. § 1607; 18 U.S.C. § 985.

  83. VIII.E.2.b. Civil and Criminal Proceedings
  84. Unlike administrative forfeiture proceedings, civil and criminal forfeiture are judicial actions that require the involvement of prosecutors and the courts.

    Criminal forfeiture is an in personam proceeding that is executed as part of a criminal defendant's sentence. It thus requires a conviction and is limited to property belonging to the defendant that was involved in the offense of conviction. Criminal forfeiture cannot reach a third party's property, even if the defendant used the third party's property to commit the crime.

    Whereas criminal forfeiture is an in personam action against the defendant, civil forfeiture is an in rem action against the property itself. This means that civil forfeiture proceedings can reach property regardless of who owns it, if the government can prove that the property was derived from or used to commit a crime. Civil forfeiture proceedings are not part of a criminal case at all. The burden of proof is a preponderance of the evidence, and civil forfeiture proceedings can dispose of property even without a criminal conviction or the filing of any criminal charges.

  85. VIII.E.2.c. Table of Forfeiture Provisions Arranged by Criminal IP Statute
  86. The following list indicates the types of forfeiture available for each intellectual property offense. Note that administrative forfeiture is generally available for vessels used to transport contraband items pursuant to 49 U.S.C. § 80304. Note also that even where forfeiture of proceeds is not provided for directly, it may be available indirectly through money laundering statutes.

    CRIMINAL COPYRIGHT INFRINGEMENT
     Administrative Yes. 17 U.S.C. §§ 509(a) (forfeiture of infringing goods) and (b) (applying customs laws), 602-603 (specifically prohibiting imports of infringing copies). 18 U.S.C. § 981(d) (allowing administrative forfeiture for proceeds forfeitable civilly); 19 U.S.C. §§ 1595a, 1607-09.
     Civil 
     
    Infringing Items
    Yes. 17 U.S.C. §§ 509(a), 602-603 (prohibiting imports).
     
    Facilitating Property
    Yes. 17 U.S.C. § 509(a) (plates, molds, masters and other equipment used to make infringing copies).
     
    Proceeds
    Yes. 18 U.S.C. § 981(a)(1)(C).
      Criminal 
     
    Infringing Items
    Yes. 17 U.S.C. §§ 506(b), 602-603; 28 U.S.C. § 2461(c) (allowing criminal forfeiture where property could be seized civilly).
     
    Facilitating Property
    Yes. 17 U.S.C. § 506(b); 28 U.S.C. § 2461.
     
    Proceeds
    Yes. 18 U.S.C. § 981(a)(1)(C); 28 U.S.C. § 2461(c).

    DIGITAL MILLENNIUM COPYRIGHT ACT
      Administrative No.
      Civil None.
      Criminal None.

    ECONOMIC ESPIONAGE ACT (TRADE SECRET Theft)
      Administrative No.
      Civil None.
      Criminal
     
    Facilitating Property
    Yes (discretionary). 18 U.S.C. § 1834(a)(2).
     
    Proceeds
    Yes (mandatory). 18 U.S.C. § 1834(a)(1).

    COUNTERFEIT/ILLICIT LABELS, DOCUMENTATION, AND PACKAGING for COPYRIGHTED WORKS
      Administrative Yes. 18 U.S.C. § 2318(e); 17 U.S.C. § 509(b); 18 U.S.C. § 981(d); 19 U.S.C. §§ 1595a (allowing seizure and forfeiture by Customs), 1607-09.
      Civil
     
    Counterfeit/Infringing Items
    Yes. 18 U.S.C. § 2318(e); 17 U.S.C. § 509.
     
    Facilitating Property
    Yes. 18 U.S.C. § 2318(e); 17 U.S.C. § 509.
     
    Proceeds
    Yes. 18 U.S.C. §§ 981(a)(1)(C), 1956(c)(7).
      Criminal
     
    Counterfeit/Infringing Items
    Yes (mandatory). 18 U.S.C. § 2318(d).
     
    Facilitating Property
    Yes (mandatory as to plates, molds, masters, etc.; discretionary as to other equipment). 18 U.S.C. § 2318(d).
     
    Proceeds
    Yes. 18 U.S.C. §§ 981(a)(1)(C), 1956(c)(7); 28 U.S.C. § 2461(c).

    UNAUTHORIZED FIXATIONS OF LIVE MUSICAL PERFORMANCES ("BOOTLEGGING")
      Administrative Yes. 18 U.S.C §§ 2319A(c), 981(d); 19 U.S.C. §§ 1595a, 1607-09.
      Civil
     
    Unauthorized Recordings
    Yes. 18 U.S.C. § 2319A(c).
     
    Facilitating PropertyNo.
     
    Proceeds
    Yes. 18 U.S.C. § 981(a)(1)(C).
      Criminal
     
    Unauthorized Recordings
    Yes (mandatory). 18 U.S.C. § 2319A(b).
     
    Facilitating Property
    Yes (mandatory for plates, molds, masters, etc.; discretionary as to other equipment). 18 U.S.C. § 2319A(b).
     
    Proceeds
    Yes. 18 U.S.C. §§ 981(a)(1)(C), 1956(c)(7); 28 U.S.C. § 2461(c).

    UNATHORIZED RECORDING OF MOTION PICTURES ("CAMCORDING")
     
    Administrative No.
      Civil None.
      Criminal
     
    Unauthorized Recordings
    Yes (mandatory). 18 U.S.C. § 2319B(b).
     
    Facilitating Property
    Yes (mandatory). 18 U.S.C. § 2319B(b).
     
    Proceeds
    No.

    GOODS, SERVICES, LABELS, DOCUMENTATION, AND PACKAGING WITH COUNTERFEIT MARKS

    ***NOTE: 18 U.S.C. § 2320(b) was amended on March 16, 2006. The table below reflects these amendments. The pre-amendment provision is discussed and quoted in Sections VIII.E.4.b. and VIII.E.5. of this Chapter.

      Administrative Yes. 19 U.S.C. §§ 1595a, 1607-09; 18 U.S.C. § 981(d);
      Civil
    Counterfeit Items
    Yes. 18 U.S.C. § 2320(b)(1)(A).
     
    Facilitating Property
    Yes. 18 U.S.C. § 2320(b)(1)(B).
     
    Proceeds
    Yes. 18 U.S.C. §§ 981(a)(1)(C); 1956(c)(7); 28 U.S.C. § 2461(c).
      Criminal
     
    Counterfeit Items
    Yes (mandatory). 18 U.S.C. § 2320(b)(3)(A).
     
    Facilitating Property
    Yes (mandatory). 18 U.S.C. § 2320(b)(3)(A).
     
    Proceeds
    Yes. 18 U.S.C. § 2320(b)(3)(A); or alternatively: 18 U.S.C. §§ 981(a)(1) (C), 1956(c)(7); 28 U.S.C. § 2461(c).

    GOODS, SERVICES, LABELS, DOCUMENTATION, AND PACKAGING WITH COUNTERFEIT MARKS

    ***NOTE: 18 U.S.C. § 2320(b) was amended on March 16, 2006. The table below reflects these amendments. The pre-amendment provision is discussed and quoted in Sections VIII.E.4.b. and VIII.E.5. of this Chapter.   Administrative Yes. 19 U.S.C. §§ 1595a, 1607-09; 18 U.S.C. § 981(d);   Civil

    Counterfeit Items Yes. 18 U.S.C. § 2320(b)(1)(A).  

    Facilitating PropertyYes. 18 U.S.C. § 2320(b)(1)(B).  

    Proceeds Yes. 18 U.S.C. §§ 981(a)(1)(C); 1956(c)(7); 28 U.S.C. § 2461(c).   Criminal  

    Counterfeit Items Yes (mandatory). 18 U.S.C. § 2320(b)(3)(A).  

    Facilitating PropertyYes (mandatory). 18 U.S.C. § 2320(b)(3)(A).  

    Proceeds Yes. 18 U.S.C. § 2320(b)(3)(A); or alternatively: 18 U.S.C. §§ 981(a)(1) (C), 1956(c)(7); 28 U.S.C. § 2461(c).

  87. VIII.E.3. Choosing a Forfeiture Procedure
  88. Although the prosecutor may commence parallel civil and criminal forfeiture cases to keep all avenues of forfeiture open, various factors may affect which procedure is best to pursue:

  89. VIII.E.4. Civil Forfeiture in IP Matters
  90. Civil forfeiture is available in some (though not all) intellectual property offenses. It is available for property connected to criminal copyright infringement, 18 U.S.C. § 2319; trafficking in counterfeit or illicit labels or counterfeit documentation or packaging for copyrighted works, 18 U.S.C. § 2318; unauthorized fixations of live musical performances, 18 U.S.C. § 2319A; and trafficking in goods, services, labels, documentation, or packaging with counterfeit marks, 18 U.S.C. § 2320. Civil forfeiture is not available if the property is only connected to violations of the Digital Millennium Copyright Act, 17 U.S.C. § 1204, or the Economic Espionage Act, 18 U.S.C. §§ 1831, 1832. Again, the government need only prove that the crime was committed; it need not convict a specific defendant of the crime.

  91. VIII.E.4.a. Proceeds
  92. The government can forfeit the proceeds of 18 U.S.C. §§ 2318, 2319, 2319A, and 2320 offenses in civil forfeiture proceedings. Under the Civil Asset Forfeiture Reform Act of 2000 ("CAFRA") amendments to 18 U.S.C. § 981(a)(1)(C), a general civil forfeiture statute, the government can seek civil forfeiture of "[a]ny property, real or personal, which constitutes or is derived from proceeds traceable to," among other things, any offense defined as a specified unlawful activity in the money laundering provisions at 18 U.S.C. § 1956(c)(7). Specified unlawful activities include criminal copyright infringement and trademark counterfeiting, 18 U.S.C. § 1956(c)(7)(D) (citing 18 U.S.C. §§ 2319, 2320), as well as any offense listed as racketeering activity in 18 U.S.C. § 1961(1). Section 1961, in turn, lists not only §§ 2319 and 2320 violations, but also violations of 18 U.S.C. § 2318 (counterfeit labels, documentation, and packaging for copyrighted works) and § 2319A (bootleg musical recordings). Thus, civil forfeiture of proceeds is available for violations of 18 U.S.C. §§ 2318, 2319, 2319A, and 2320.

  93. VIII.E.4.b. Infringing Items, Other Contraband, and Facilitating Property
  94. Civil forfeiture of infringing and other contraband items, as well as facilitating property, is also available for some IP offenses, but varies greatly depending on the particular offense and property involved.

    For some copyright and copyright-related offenses, Title 17 provides for civil forfeiture of contraband such as infringing copies and certain types of facilitating property. Civil forfeiture is available against property that was manufactured or used in violation of the copyright laws, 17 U.S.C. § 509(a), specifically (a) infringing copies, or copies intended for infringing use; and (b) the plates, masters, or other means used for reproducing the infringing copies, as well as other devices for manufacturing, reproducing, or assembling infringing copies. See, e.g., United States v. One Sharp Photocopier, Model SF-7750, 771 F.Supp. 980, 983 (D. Minn. 1991) (holding that the government was entitled to forfeiture of copier used to produce infringing copies of a software instruction manual); see also 17 U.S.C. § 509(b) (incorporating administrative forfeiture provisions of Title 19 and the provisions relating to in rem admiralty actions). Civil forfeiture is also available against infringing articles or unauthorized fixations imported into the United States, in some circumstances. See 17 U.S.C. §§ 602-603 (infringing copies); 18 U.S.C. § 2319A (unauthorized fixations of live musical performances).

    For counterfeit trademark, service mark, and certification mark offenses, the forfeiture provisions changed markedly in 2006. Before the March 16, 2006 amendments, there was no civil forfeiture authority for these cases except in the context of importation or proceeds under the specified unlawful activity provisions discussed in above. However, the old version of the statute, 18 U.S.C. § 2320, included a hybrid forfeiture provision that used the civil preponderance-of-the-evidence standard but applied only in a criminal prosecution. Before its amendment, § 2320(b) provided that "[u]pon a determination by a preponderance of the evidence that any articles in the possession of a defendant in a prosecution under this section bear counterfeit marks, the United States may obtain an order for the destruction of such articles." 18 U.S.C. § 2320(b) (West 2005). Congress enacted this provision because "[e]ven if the defendant is ultimately acquitted of the criminal charge, there is no valid public policy reason to allow the defendant to retain materials that are in fact counterfeit." Joint Statement on Trademark Counterfeiting Legislation, 130 Cong. Rec. 31,674 (1984). See also United States v. Foote, 238 F.Supp.2d 1271 (D. Kan. 2002). This provision was revised considerably, however, by the Stop Counterfeiting in Manufactured Goods Act, Pub. L. No. 109-181, 120 Stat. 285 (enacted March 16, 2006) to provide for civil forfeiture of "[a]ny article bearing or consisting of a counterfeit mark used in committing" a § 2320 violation, and "[a]ny property used, in any manner or part, to commit or to facilitate the commission of" such a violation. 18 U.S.C. § 2320(b)(1).

  95. VIII.E.4.c. Innocent Owner Defense
  96. In most civil forfeiture actions, the innocent owner defense allows an owner to challenge the forfeiture on the ground that he was unaware that the property was being used for an illegal purpose, or took all reasonable steps under the circumstances to stop it. See United States v. 2001 Honda Accord EX, 245 F.Supp.2d 602 (M.D. Pa. 2003) (holding that CAFRA preserved the rule that the burden of proof shifts to the claimant to establish the innocent owner defense); United States v. 2526 Faxon Avenue, 145 F.Supp.2d 942 (W.D. Tenn. 2001) (holding that CAFRA requires the claimant to prove the affirmative innocent owner defense by a preponderance of the evidence). There are some exceptions, however, most notably for importation offenses, and therefore prosecutors may wish to consult with the Department's Asset Forfeiture and Money Laundering Section at (202) 514-1263 if an innocent owner is likely to submit a claim.

  97. VIII.E.4.d. Victims' Ability to Forfeit Property
  98. Note also that some IP rights-holders may obtain certain civil seizures that can complicate the government's criminal prosecution, not to mention its forfeiture proceedings. Mark-holders have an ex parte remedy for seizing infringing products and manufacturing equipment. 15 U.S.C. §1116(d). Mark-holders may also petition the court for seizure orders during a civil action against an infringer under 15 U.S.C. § 1114. Authority for an ex parte seizure order is provided at 15 U.S.C. § 1116(d)(1)(A). Mark- holders who seek such an order must give reasonable notice to the United States Attorney for the judicial district in which the order is sought, after which the United States Attorney "may participate in the proceedings arising under such application if such proceedings may affect evidence of an offense against the United States." 15 U.S.C. § 1116(d)(2). The mark-holder's application may be denied "if the court determines that the public interest in a potential prosecution so requires." Id. If the mark-holder's application is granted, then the seizure must be made by a federal, state, or local law enforcement officer. See 15 U.S.C. § 1116(d)(9).

    Similar ex parte seizure remedies are available to rights-holders in copyright and counterfeit or illicit labels cases. See 17 U.S.C. § 503; 18 U.S.C. § 2318(f).

    Prosecutors may need to participate in these civil proceedings in order to preserve evidence relevant to an incipient or ongoing criminal case, to contest the issuance of an order, to preserve an ongoing investigation, or to inform the mark-holder of his ability to initiate a parallel civil case to seize, forfeit, and destroy equipment used to manufacture the counterfeit trademark goods.

  99. VIII.E.5. Criminal Forfeiture in IP Matters
  100. As noted above, criminal forfeiture is an in personam action, and thus is available only once a defendant has been convicted, and then it is limited to property belonging to the defendant. See United States v. Totaro, 345 F.3d 989, 995 (8th Cir. 2003) (holding that criminal forfeiture is in personam, because if it allowed the forfeiture of a third party's interest, the forfeiture would become an in rem action and the third party could contest the forfeiture on more than ownership grounds); United States v. O'Dell, 247 F.3d 655, 680 (6th Cir. 2001) (recognizing that criminal forfeiture "entitles the government to forfeiture of a convicted defendant's interests and nothing more") (citation omitted); United States v. Gilbert, 244 F.3d 888, 919 (11th Cir. 2001) ("Because it seeks to penalize the defendant for his illegal activities, in personam forfeiture reaches only that property, or portion thereof, owned by the defendant.") (citation omitted).

    Even though criminal forfeiture is executed after conviction, the government should plan for criminal forfeiture during the investigation and at indictment. Pre-indictment seizure warrants can be used to seize infringing items (whether or not they are the property of a target). Moreover, the indictment should include separate forfeiture charges that identify any property that is forfeitable pursuant to the charged offenses. For forfeiture language to include in an indictment, prosecutors should consult the forfeiture expert in their office or the Criminal Division's Asset Forfeiture and Money Laundering Section.

    Criminal forfeiture is available for at least some types of property in cases involving the following criminal IP statutes: copyright, 17 U.S.C. § 506, 18 U.S.C. § 2319; trade secret theft, 18 U.S.C. § 1834; trafficking in counterfeit or illicit labels or counterfeit documentation or packaging for copyrighted works, 18 U.S.C. § 2318; trafficking in goods, services, labels, documentation, or packaging with counterfeit marks, 18 U.S.C. § 2320; bootlegged recordings of live musical performances, 18 U.S.C. § 2319A; and movie camcording, 18 U.S.C. § 2319B. Currently, there are no criminal forfeiture provisions for violations of the Digital Millennium Copyright Act, 17 U.S.C. § 1204.

  101. VIII.E.5.a. Proceeds
  102. The government can obtain criminal forfeiture of IP crime proceeds whenever those proceeds could be forfeited civilly: 18 U.S.C. §§ 2318, 2319, 2319A, and 2320. This is because CAFRA generally provided that criminal forfeiture is available whenever civil forfeiture is available:

    If a person is charged in a criminal case with a violation of an Act of Congress for which the civil or criminal forfeiture of property is authorized, the Government may include notice of the forfeiture in the indictment or information pursuant to the Federal Rules of Criminal Procedure. If the defendant is convicted of the offense giving rise to the forfeiture, the court shall order the forfeiture of the property as part of the sentence in the criminal case pursuant to the Federal Rules of Criminal Procedure and section 3554 of title 18, United States Code. The procedures in section 413 of the Controlled Substances Act (21 U.S.C. § 853) apply to all stages of a criminal forfeiture proceeding, except that subsection (d) of such section applies only in cases in which the defendant is convicted of a violation of such Act.
    28 U.S.C. § 2461(c). As discussed above, the offenses for which civil forfeiture is available are enumerated in 18 U.S.C. § 981, and include any offense constituting "specified unlawful activity" under 18 U.S.C. § 1956(c)(7), the money laundering statute. Section 1956(c)(7)'s list of "specified unlawful activity" includes, directly or indirectly, violations of 18 U.S.C. §§ 2318, 2319, 2319A, and 2320.

    Where a defendant has engaged in a monetary transaction involving the proceeds of an intellectual property offense, "knowing that the property involved in a financial transaction represents the proceeds of some form of unlawful activity"—regardless of whether the crime is listed in § 1956(c)(7)—the defendant may also be charged, and the proceeds subject to forfeiture, under the money laundering statute directly. See United States. v. Turner, 400 F.3d 491 (7th Cir. 2005) (holding that the defendant need not know the actual source of the money, but only that it came from "some illegal activity"); see also United States v. Khalil, No. CR. A. 95-577-01, 1999 WL 455698 (E.D. Pa. June 30, 1999) (forfeiture involving counterfeiting popular music).

    In addition, for counterfeit marks cases, the Stop Counterfeiting in Manufactured Goods Act (enacted March 16, 2006, discussed in Section VIII.E.4. of this Chapter) amended 18 U.S.C. § 2320 to provide for mandatory criminal forfeiture of proceeds (as well as other property). See 18 U.S.C. § 2320(b)(3)(A)(i) (as amended Mar. 16, 2006).

    The Economic Espionage Act provides for mandatory criminal forfeiture of the proceeds of a violation of 18 U.S.C. § 1831 or § 1832. See 18 U.S.C. § 1834(a)(1).

  103. VIII.E.5.b. Infringing Items, Other Contraband, and Facilitating Property
  104. Generally, criminal forfeiture is available against contraband items involved in an IP offense—such as infringing items, unauthorized recordings, and counterfeit labels or marks or articles bearing such marks—and in some cases those items are subject to mandatory destruction. Facilitating property is likewise subject to criminal forfeiture in most cases, although such equipment generally need not be destroyed and can instead be disposed of in other ways, such as at auction.

    Copyright offenses are subject to mandatory forfeiture: "When any person is convicted of a violation of subsection (a), the court in its judgment of conviction shall, in addition to the penalty therein prescribed, order the forfeiture and destruction or other disposition of all infringing copies or phonorecords and all implements, devices, or equipment used in the manufacture of such infringing copies or phonorecords." 17 U.S.C. § 506(b).

    Criminal forfeiture is likewise mandatory in offenses for camcording and trafficking in counterfeit and illicit labels and counterfeit documentation and packaging for copyrighted works. See 18 U.S.C. § 2318(d) (stating that the court must order "the forfeiture and destruction or other disposition of all counterfeit labels or illicit labels and all articles to which counterfeit labels or illicit labels have been affixed or which were intended to have had such labels affixed, and of any equipment, device, or material used to manufacture, reproduce, or assemble the counterfeit labels or illicit labels"); 18 U.S.C. § 2319B(b) (stating that upon conviction, the court "shall, in addition to any penalty provided, order the forfeiture and destruction or other disposition of all unauthorized copies of motion pictures or other audiovisual works protected under title 17, or parts thereof, and any audiovisual recording devices or other equipment used in connection with the offense").

    The "bootleg" statute, 18 U.S.C. § 2319A(b), contains a similar forfeiture provision, requiring forfeiture and destruction of unauthorized recordings. However, unlike the mandatory forfeiture of equipment discussed above, the forfeiture of equipment used to reproduce unauthorized recordings of live musical performances is left to the discretion of the court, "taking into account the nature, scope, and proportionality of the use of the equipment in the offense." Compare 18 U.S.C. § 2319A(b) with 17 U.S.C. § 506(b).

    For counterfeit marks cases, as noted above, until March 16, 2006, the criminal statute contained an unusual criminal forfeiture provision that allowed forfeiture of counterfeit goods upon a showing by a preponderance of the evidence (within or related to a criminal case) that the items bore counterfeit marks. See 18 U.S.C. § 2320(b) (West 2005). See supra VIII.E.4. Under the recent revisions to the forfeiture provisions in the Stop Counterfeiting in Manufactured Goods Act, 18 U.S.C. § 2320 now provides for mandatory forfeiture of "any article that bears or consists of a counterfeit mark used in committing the offense" and any of the defendant's property "used, or intended to be used, in any manner or part, to commit, facilitate, aid, or abet the commission of the offense." 18 U.S.C. § 2320(b)(3)(A). Any seized article bearing or consisting of a counterfeit mark must be destroyed. 18 U.S.C. § 2320(b)(3)(B).

    The Economic Espionage Act, governing theft of trade secrets, provides for forfeiture of property used in facilitating the commission of the offense, considering the nature, scope, and proportionality of the use of the property in the offense. 18 U.S.C. § 1834(a)(2).