The Interplay of Borders Turf Cyberspace and Jurisdiction Issues Confronting U S Law Enforcement Updated January 17 2013 Congressional Research Service https crsreports congress gov R41927 The Interplay of Borders Turf Cyberspace and Jurisdiction Summary Savvy criminals constantly develop new techniques to target U S persons businesses and interests Individual criminals as well as broad criminal networks exploit geographic borders criminal turf cyberspace and law enforcement jurisdiction to dodge law enforcement countermeasures Further the interplay of these realities can potentially encumber policing measures In light of these interwoven realities policy makers may question how to best design policies to help law enforcement combat ever-evolving criminal threats Criminals routinely take advantage of geographic borders They thrive on their ability to illicitly cross borders subvert border security regimens and provide illegal products or services Many crimes—particularly those of a cyber nature—have become increasingly transnational While criminals may operate across geographic borders and jurisdictional boundaries law enforcement may not be able to do so with the same ease Moreover obstacles such as disparities between the legal regimens of nations what is considered a crime in one country may not be in another and differences in willingness to extradite suspected criminals can hamper prosecutions The law enforcement community has however expanded its working relationships with both domestic and international agencies Globalization and technological innovation have fostered the expansion of both legitimate and criminal operations across physical borders as well as throughout cyberspace Advanced rapid communication systems have made it easier for criminals to carry out their operations remotely from their victims and members of their illicit networks In the largely borderless cyber domain criminals can rely on relative anonymity and a rather seamless environment to conduct illicit business Further in the rapidly evolving digital age law enforcement may not have the technological capabilities to keep up with the pace of criminals Some criminal groups establish their own operational “borders” by defining and defending the “turf” or territories they control Similarly U S law enforcement often remains constrained by its own notions of “turf”—partly defined in terms of competing agency-level priorities and jurisdictions While some crimes are worked under the jurisdiction of a proprietary agency others are not investigated under such clear lines These investigative overlaps and a lack of data and information sharing can hinder law enforcement anti-crime efforts U S law enforcement has particularly since the terrorist attacks of September 11 2001 increasingly relied on intelligence-led policing enhanced interagency cooperation and technological implementation to confront 21st century crime For instance enforcement agencies have used formal and informal interagency agreements as well as fusion centers and task forces to assimilate information and coordinate operations Nonetheless there have been notable impediments in implementing effective information sharing systems and relying on up-to-date technology Congress may question how it can leverage its legislative and oversight roles to bolster U S law enforcement’s abilities to confront modern-day crime For instance Congress may consider whether federal law enforcement has the existing authorities technology and resources—both monetary and manpower—to counter 21st century criminals Congress may also examine whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information Congressional Research Service The Interplay of Borders Turf Cyberspace and Jurisdiction Contents Introduction 1 Boundaries in the Operational Realities 2 Borders 2 Turf 3 Cyberspace 4 Jurisdictional Lines 6 Interplay of Borders Turf Cyberspace and Jurisdiction Shaping Crime and Law Enforcement 7 Physical Borders and Jurisdictional Lines 8 Challenges for U S Law Enforcement 10 Cyberspace and Advancing Technologies 12 Cross-Border Criminal Networks 12 Trans-border Victimization 13 Barriers to Cyber Investigations 15 Jurisdictional Battles 19 Evolution of Criminal Turf 20 Law Enforcement and Operational Turf 21 U S Law Enforcement Efforts to Overcome Barriers 24 Interagency Cooperation and Information Sharing 24 Interagency Agreements 27 Fusion Centers and Task Forces 28 Information Sharing Systems 32 Technology Implementation 34 Conclusion 36 Figures Figure 1 Conceptualization of the Operational Universe of Crime and Law Enforcement 8 Contacts Author Information 37 Congressional Research Service The Interplay of Borders Turf Cyberspace and Jurisdiction Introduction Savvy criminals constantly develop new techniques to target U S persons businesses and interests Central to the evolution of modern-day crime are four broad operational realities— geographic borders criminal turf cyberspace and law enforcement jurisdiction Individual criminals as well as broad criminal networks exploit these realities and often leverage the unique characteristics of one against the other to dodge law enforcement countermeasures and efforts to disrupt illicit activity Further the interplay of these realities can potentially encumber policing measures In light of these interwoven realities policy makers may question how to best design policies to help law enforcement combat ever-evolving criminal threats In the first operational reality criminals routinely take advantage of geographic lines They thrive on their ability to illicitly cross borders and provide illegal products or services Indeed much criminal activity is predicated on the ability to subvert border security regimens thus earning a premium from black market clients and customers Drug trafficking organizations DTOs for example have constructed increasingly sophisticated cross-border tunnels to smuggle illegal drugs from Mexico into the United States And smugglers and fraudsters ship counterfeit goods from overseas flooding U S markets with sham goods and depriving genuine manufacturers of profits The second reality is broadly related to the first Some larger criminal groups even establish their own operational “borders” by defining and defending the “turf” or territories they control These boundaries are not formally recognized by law enforcement authorities but they have strong influence in the criminal underworld In fact much of the violence in Mexico along the U S Southwest border revolves around rival DTOs clashing over territorial control 1 The outlines of turf can cross borders at the national state and local levels thus complicating policing efforts The third reality involves a largely borderless virtual environment where criminals carry out illicit business Criminals operate in the cyber world partly to circumvent more conventional established constructs such as international borders In the virtual realm criminals can rely on relative anonymity and a rather seamless environment to conduct business For instance some criminals use electronic banking systems to quickly smuggle cash out of one nation and into another Finally U S law enforcement often remains constrained by geographic and legal boundaries or even its own notions of “turf”—partly defined in terms of competing agency-level priorities and jurisdictions U S officials have suggested that as criminals have evolved their operations they have relied less on turf to conduct business 2 the same evolution is unclear regarding U S law enforcement Law enforcement agencies even while collaborating through means such as interagency agreements task forces and fusion centers retain investigational jurisdiction over certain categories of crime And recent reports have suggested that interagency disagreements over organizational boundaries may remain 3 For more information on the drug trafficking-related violence in Mexico see CRS Report R41576 Mexico’s Drug Trafficking Organizations Source and Scope of the Rising Violence by June S Beittel 2 U S Department of Justice FY2012 Performance Budget Drug Enforcement Administration U S Department of Justice Congressional Budget Submission p 11 http www justice gov jmd 2012justification pdf fy12-deajustification pdf 3 U S Government Accountability Office Law Enforcement Coordination DOJ Could Improve Its Process for Identifying Disagreements Among Agents GAO-11-314 April 2011 p 2 http www gao gov new items d11314 pdf See also U S Department of Justice Office of the Inspector General Audit Division The Federal Bureau of 1 Congressional Research Service 1 The Interplay of Borders Turf Cyberspace and Jurisdiction In addition to challenges presented by each of these four operational realities individually law enforcement faces hurdles presented by the overlap of any or all of the realities Complicating this policy changes in one reality—both administratively and legislatively—can impact criminal activity and law enforcement countermeasures in other realities Policy makers have expressed interest in ensuring that law enforcement is keeping pace with 21st century criminals who threaten American society 4 Given that criminal investigations unfold in an environment of geographic borders criminal turf borderless cyberspace and law enforcement jurisdictions policy makers may question how to direct policy to best enable U S law enforcement to target contemporary criminals For instance Congress may choose to examine whether law enforcement agencies are effectively coordinating their investigations through the use of interagency agreements task forces and fusion centers Policy makers may also debate whether law enforcement has the existing legal authorities technology and resources—both financial and manpower—to counter 21st century criminals One of the principal debates for policy makers may be whether or how to design policies that cut across multiple operational realities This report examines the four operational realities within which law enforcement and crime operate It analyzes the challenges for U S law enforcement in each of these realities individually and in selected cases where they overlap The report also discusses how law enforcement has adapted to combat present-day criminals Throughout it raises questions regarding how Congress may leverage its legislative and oversight roles to help U S law enforcement most effectively protect U S persons businesses and interests Boundaries in the Operational Realities Physical and virtual boundaries play significant roles in both criminal activity and police work In the physical world recognized borders delineate the lines of municipal state and national authority At their most basic level legally defined geographic borders outline the sovereignty of these entities For example at official crossings along the U S border with Mexico law enforcement presence helps to distinguish one nation from another Between ports of entry the U S Customs and Border Protection CBP has deployed personnel technology and tactical infrastructure along the Southwest border to impede the illegal entry of vehicles and unauthorized persons When it comes to criminal turf the virtual realm and law enforcement jurisdictions the lines separating one authority—legitimate or illegitimate—from another often grow fuzzier The following sections lay out discussions of borders turf cyberspace the virtual world and jurisdiction that help shape modern criminal activity as well as law enforcement counter efforts Borders As suggested physical or geographic borders—whether they divide countries states or even neighbors’ plots of land—are often recognized with relative ease Frequently there are signals indicating when one is entering or leaving a given geographic area Road signs for instance may provide notice of crossing from one city county state etc to another International border checkpoints can signal that one is entering or leaving a country Along several portions of the Investigation’s Ability to Address the National Security Cyber Intrusion Threat Audit Report 11-22 April 2011 pp iv - vii http www justice gov oig reports FBI a1122r pdf 4 See U S Congress Senate Committee on the Judiciary Subcommittee on Crime and Terrorism Cybersecurity Responding to the Threat of Cyber Crime and Terrorism 112th Cong 1st sess April 12 2011 Congressional Research Service 2 The Interplay of Borders Turf Cyberspace and Jurisdiction Southwest border a fence separates the United States from Mexico 5 Such physical boundaries may aid in delineating the space within which a given set of rules applies 6 Nations have sovereign control over their countries and territories and may enforce the laws of their lands within those bounds In the United States the federal government is responsible for enforcing federal laws within the country and each state is responsible for enforcing state laws within its physical borders And rules that hold in one state may not apply in a neighboring state with different laws For example stealing $500 worth of goods is considered felony theft in New Mexico but a criminal needs to steal $1 000 worth of goods in neighboring Arizona for the crime to reach the felony theft threshold 7 Similarly laws that apply in certain states may not apply under federal law to the country as a whole Globalization technological innovation and heightened security concerns have complicated traditional understanding of borders Business for instance has become increasingly borderless 8 so too have criminal enterprises Since the terrorist attacks of September 11 2001 the United States has experienced an expanded tension between border protection concerns and free market ideals 9 Open border regimens are encouraged by a desire for efficiently moving goods and services However security screenings and concerns over safety may slow down the transit of these items Criminals may then capitalize on any weaknesses in border regimens to supply black market goods and services where there is a demand In other words border protection systems and enforcement efforts can have the unintended consequence of introducing inefficiencies to market systems These inefficiencies can in turn present profitable opportunities for criminal networks 10 Turf Some criminals—such as drug cartels and street gangs—have established turf boundaries for their operations These boundaries may or may not coincide with geographically and legally defined borders Criminal turf often delineates a territory within which illegal entities carry out their operations In the United States street gang warfare has historically centered around the establishment and protection of turf 11 Other criminal networks have used various means to establish operational turf as well For instance in February 2011 22 members of a violent fraudulent document-trafficking organization including the manager of the organization’s U S operations were indicted for crimes including the use of “brutal violence to eliminate rivals protect its turf and enforce discipline against its own members ”12 The organization based in Mexico has operations in 19 5 For more information see archived CRS Report RL33659 Border Security Barriers Along the U S International Border by Chad C Haddal and Michael John Garcia 6 David R Johnson and David Post “Law and Borders—The Rise of Law in Cyberspace ” Stanford Law Review vol 48 May 1996 p 1370 7 See N M Stat Ann §30-16-1 2012 Ariz Rev Stat §13-1802 2012 8 National Intelligence Council Global Trends 2025 A Transformed World NIC 2008-003 November 2008 p 17 http www dni gov nic PDF_2025 2025_Global_Trends_Final_Report pdf 9 CRS Report R41237 People Crossing Borders An Analysis of U S Border Protection Policies by Alison Siskin 10 Ibid 11 James C Howell and John P Moore History of Street Gangs in the United States U S Department of Justice Bureau of Justice Assistance Office of Juvenile Justice and Delinquency Prevention May 2010 http www ojp usdoj gov BJA pdf NGC_History_Street_Gangs pdf 12 Statement of U S Attorney MacBride United States Attorneys Office “Twenty-Two Alleged Members of Congressional Research Service 3 The Interplay of Borders Turf Cyberspace and Jurisdiction U S cities and 11 states selling counterfeit Resident Alien and Social Security cards to unauthorized immigrants The suspects in this case allegedly protected the organization’s turf by posing as customers looking to buy the counterfeit identification cards The “customers” would then attack competitors when they met for a supposed sale Victims’ hands feet and mouths were bound and they were beaten and threatened with death should they continue to operate on the organization’s turf 13 Turf may be readily established in the real world as criminals can rely upon the physical environment to establish territory In the cyber world however it may appear to be difficult to establish virtual turf lines but they exist nonetheless For example two Trojans 14 believed to be based in Russia engaged in a cyber turf battle in 2010 The two Trojans—ZeuS and its smaller competitor SpyEye—would both steal online banking information They would then transfer funds to money mules or U S residents with bank accounts who would then move the money out of the United States SpyEye challenged ZeuS by stealing information from ZeuS and then removing the ZeuS toolkit from infected computers 15 The turf war reportedly ended when the ZeuS Trojan was no longer maintained and its code was allegedly merged with that of SpyEye 16 Cyberspace As mentioned the relatively clear borders and turf lines within the physical world are not replicated in the virtual realm Of course some distinct boundaries separate the physical and the cyber worlds a keyboard mouse screen and password can all mediate between these physical and virtual realms 17 Within cyberspace however the notion of a border is much more nebulous This is in part because the same geographic borders that exist in the real world do not exist in the cyber world 18 High-speed Internet communication has not only facilitated the growth of legitimate business but it has bolstered criminals’ abilities to operate in an environment where they can broaden their pool of potential targets and rapidly exploit their victims Between 2000 and 2012 the estimated number of Internet users grew from almost 361 million to over 2 4 billion—an increase of more than 566% 19 Frauds and schemes that were once conducted face-to-face can now be carried out remotely from across the country or even across the world The United Nations Office on Drugs Sophisticated Violent Fraudulent Document Ring Indicted ” press release February 24 2011 http www justice gov usao vae news 2011 02 20110224arellanonr html 13 Ibid 14 A Trojan is a type of malware It is a type of software that once activated can damage the host and provide back doors for malicious users to access the computer system For more information on the various types of malware see Cisco What Is the Difference Viruses Worms Trojans and Bots http www cisco com web about security intelligence virus-worm-diffs html 15 “SpyEye vs ZeuS Rivalry ” krebsonsecurity com April 1 2010 http krebsonsecurity com 2010 04 spyeye-vs-zeusrivalry See also Nick Farrell “Cyber gangs fight turf war From Russia with Love ” TechEye net February 10 2011 http www techeye net security cyber-gangs-fight-turf-war 16 “SpyEye vs ZeuS Rivalry Ends in Quiet Merger ” krebsonsecurity com October 24 2010 http krebsonsecurity com 2010 10 spyeye-v-zeus-rivalry-ends-in-quiet-merger 17 David R Johnson and David Post “Law and Borders—The Rise of Law in Cyberspace ” Stanford Law Review vol 48 May 1996 p 1379 18 David R Johnson and David Post “Law and Borders—The Rise of Law in Cyberspace ” Stanford Law Review vol 48 May 1996 p 1370 19 Internet World Stats Internet Usage Statistics The Internet Big Picture World Internet Users and Population Stats http www internetworldstats com stats htm Congressional Research Service 4 The Interplay of Borders Turf Cyberspace and Jurisdiction and Crime notes that cybercrime has “evolved from the mischievous one-upmanship of cybervandals to a range of profit-making criminal enterprises in a remarkably short time ”20 U S policy makers officials and law enforcement have become increasingly concerned about the threats posed by criminals in the virtual world 21 Even cyberspace though has some boundaries—both technological and jurisdictional Some web addresses for instance are country-specific and the administration of those websites is controlled by particular nations For instance website addresses ending in “ us” indicate that the United States owns the server controlling the website while those ending in “ au” indicate Australian control 22 Another barrier in cyberspace may involve subscriptions or fee-based access to particular website content Certain businesses—news sites journals file sharing sites and others—may require paid access There are also legal parameters governing what private citizens or law enforcement can lawfully do online Despite this an enhanced sense of anonymity offered to actors in the cyber world may encourage illicit behavior Certain traditional crimes such as fraud and identity theft are increasingly being seen as typical cybercrimes A primary difference between these lines in the cyber and physical worlds is the venue in which crimes are committed It appears that many crimes considered cybercrimes could be considered traditional or “real world ” crimes if not for the virtual venue in which they occur On one hand the virtual world may be seen as a borderless space that provides criminals with relative anonymity and a place to operate However cyberspace can also be seen as a tool that criminals use to subvert borders Due to the global nature of the Internet and other rapid communication systems crimes committed via or with the aid of the Internet can quickly impact victims in multiple state and national jurisdictions Congressional testimony from a Department of Justice DOJ official indicated that most cybersecurity incidents are transnational in nature 23 For instance in May 2010 U S law enforcement indicted three individuals located in the United States Ukraine and Sweden for their roles in an international scareware scam 24 The alleged fraudsters led Internet users in these 20 United Nations Office on Drugs and Crime The Globalization of Crime A Transnational Organized Crime Threat Assessment ISBN 978-92-1-130295-0 2010 p 203 http www unodc org documents data-and-analysis tocta TOCTA_Report_2010_low_res pdf 21 Congress has held several hearings on such threats See for example U S Congress House Committee on the Judiciary Subcommittee on Intellectual Property Competition and the Internet Cybersecurity Innovative Solutions to Challenging Problems 112th Cong 1st sess May 25 2011 and U S Congress House Committee on the Judiciary Subcommittee on Crime Terrorism and Homeland Security Data Retention as a Tool for Investigating Internet Child Pornography and Other Internet Crimes 112th Cong 1st sess January 25 2011 22 The Internet Assigned Numbers Authority IANA is responsible for managing internet domain names the Internet Protocol addressing systems and the Autonomous System Numbers used for routing internet traffic See http www iana org See also CRS Report 97-868 Internet Domain Names Background and Policy Issues by Lennard G Kruger 23 Testimony by Jason Weinstein Criminal Division U S Department of Justice before U S Congress Senate Committee on the Judiciary Subcommittee on Crime and Terrorism Cybersecurity Responding to the Threat of Cyber Crime and Terrorism 112th Cong 1st sess April 12 2011 http www justice gov criminal pr testimony 2011 crmtestimony-110412 html 24 Federal Bureau of Investigation “U S Indicts Ohio Man and Two Foreign Residents in Alleged Ukraine-Based ‘Scareware’ Fraud Scheme That Caused $100 Million in Losses to Internet Victims Worldwide ” press release May 27 2010 http chicago fbi gov dojpressrel pressrel10 cg052710 htm Scareware is fake security software that appears to be legitimate It misleads users into purchasing fake anti-virus or hard drive cleanup software that may prove to be malicious For more information see Gregg Keizer “Windows Scareware Fakes Impending Drive Disaster ” ComputerWorld May 16 2011 http www computerworld com s article 9216765 Windows_scareware_fakes_impending_drive_disaster taxonomyId 17 Congressional Research Service 5 The Interplay of Borders Turf Cyberspace and Jurisdiction countries to falsely believe that their computers had become infected with malware They then enticed their victims into buying bogus scareware software products that they advertised would remedy the contaminated computers In reality the software had no effect as the supposedly infected computers were not truly compromised This scam resulted in over $100 million in total losses Transnational cases such as this may raise proprietary questions regarding case investigation and prosecution and may cause significant challenges for law enforcement moving forward with the case as is discussed later in this report Jurisdictional Lines For legal purposes jurisdictional boundaries have been drawn between nations states and other localities Within these territories various enforcement agencies are designated authority to administer justice When crimes cross state boundaries in violation of federal law the states may no longer have sole responsibility for criminal enforcement and the federal government may claim jurisdiction 25 Importantly laws remain effective primarily within the territorial lines of a given jurisdiction Criminals have long understood this phenomenon—and exploited it For example boosters in organized retail crime ORC rings26 may travel across state lines to target various locations of a specific retail establishment in multiple states They can steal goods from each location taking just enough to remain under the felony theft level for a given state and thus avoid prosecution for felony theft In May 2009 for instance four New York residents were arrested in New Hampshire for allegedly stealing hair care products from pharmacies Authorities reportedly found in the suspects’ van maps indicating drugstore locations in several East Coast states 27 Jurisdictional lines exist not only within the United States but internationally as well The United States shares borders with Canada and Mexico and on each side of these boundaries sovereign nations govern A perpetrator committing a crime in the United States may flee across the northern or southern borders or to another country overseas to a land where the United States no longer has legal jurisdiction In one case prosecuted by DOJ a New Jersey man was convicted in 2005 for his role in a conspiracy to bring heroin to the United States from Colombia Before he could be sentenced he fled to Colombia until he was later caught and extradited to the United States in March 2009 28 In the United States jurisdictional battles exist not only between federal and state law enforcement—where these fights may be complicated by federal state concurrent jurisdiction For more information see Daniel C Richman “The Changing Boundaries Between Federal and Local Law Enforcement ” Boundary Changes in Criminal Justice Organizations pp 81-111 http www ncjrs gov criminal_justice2000 vol_2 02d2 pdf For a legal discussion of state sovereignty and federalism issues see CRS Report RL30315 Federalism State Sovereignty and the Constitution Basis and Limits of Congressional Power by Kenneth R Thomas 26 ORC typically refers to large-scale retail theft and fraud by organized groups of professional shoplifters or “boosters ” A booster is someone who steals merchandise and then sells it to a “fence” for a profit A fence is someone who knowingly buys illegally obtained goods from a booster and then sells the goods for a profit For more information on ORC see CRS Report R41118 Organized Retail Crime by Kristin M Finklea 27 “Organized Retail Crime Jumps to 92% ” Retailer Daily June 10 2009 pp http www retailerdaily com entry 41799 organized-retail-crime-jumps 28 U S Department of Justice “New Jersey Man Sentenced to 13 Years in Federal Prison ” press release June 17 2010 http www justice gov usao ncw press mendoza html 25 Congressional Research Service 6 The Interplay of Borders Turf Cyberspace and Jurisdiction over a case—but between federal law enforcement agencies themselves Several agencies have overlapping missions and jurisdictions over the types of cases they may prosecute For instance there have been turf disputes between the Federal Bureau of Investigation FBI and the Bureau of Alcohol Tobacco Firearms and Explosives ATF over cigarette smuggling and explosives cases among others 29 between U S Immigration and Customs Enforcement ICE and ATF over transnational firearms trafficking cases and firearms cases involving unauthorized immigrants 30 and between ICE and the Drug Enforcement Administration DEA over transnational drug trafficking and other cases 31 For law enforcement these struggles to establish programmatic scope may be equally prevalent in the physical and cyber worlds In both domains however agencies can rely in part on authorized jurisdictional boundaries to stake claim to their operational turf And in the real world law enforcement can also rely on geographic borders where those borders simultaneously designate jurisdictional lines Interplay of Borders Turf Cyberspace and Jurisdiction Shaping Crime and Law Enforcement As mentioned many 21st century criminals exploit borders and cyberspace in their illicit activities and they occasionally establish operational turf In addition as criminals may clash over their turf law enforcement too can struggle over jurisdiction Each of these realities presents unique opportunities for criminals and challenges to U S law enforcement Further the intersection of these elements can potentially compound obstacles to counter-crime efforts As seen in Figure 1 criminals may operate alone or as part of an extensive network Without regard for geographic borders or law enforcement jurisdictions criminals may organize with one another and carry out their illicit activities Likewise their operational turf is unconstrained by these lines Criminals also rely on constantly advancing technology and near anonymity in cyberspace to work both within and across borders and jurisdictions All the while law enforcement jurisdiction is often constrained by boundaries—established by jurisdictions and otherwise Even within a given jurisdictional boundary multiple agencies may have investigative authority contributing to possible disagreements over case leadership and control Jerry Markon “FBI-ATF Turf Battle Hurts Bomb Probes Official Says ” The Washington Post August 27 2010 http www washingtonpost com wp-dyn content article 2010 08 26 AR2010082606631 html See also Jerry Markon “FBI ATF Battle for Control Of Cases Cooperation Lags Despite Merger ” Washington Post May 10 2008 http www washingtonpost com wp-dyn content article 2008 05 09 AR2008050903096 html 30 U S Department of Justice Office of the Inspector General Review of ATF’s Project Gunrunner I-2011-001 November 2010 http www justice gov oig reports ATF e1101 pdf See also U S Immigration and Customs Enforcement “ATF ICE update partnership agreement to maximize investigative efforts ” press release June 30 2009 http www ice gov news releases 0906 090630albuquerque htm 31 See for example Joe Palazzolo “Rival Agencies Agree to Halt Turf Battles ” August 10 2009 http www mainjustice com 2009 08 10 justice-department-and-immigration-and-customs-enforcement-forge-newpartnership 29 Congressional Research Service 7 The Interplay of Borders Turf Cyberspace and Jurisdiction Figure 1 Conceptualization of the Operational Universe of Crime and Law Enforcement Each of the four operational realities within which law enforcement and crime operate borders turf cyberspace and jurisdictions also overlap The following sections analyze selected areas of overlap highlighting the modern-day opportunities for criminals and challenges to policing In light of these interwoven realities law enforcement and policy makers may question how to best design administrative and legislative policies to combat ever-evolving criminal threats Physical Borders and Jurisdictional Lines One author has noted “Criminal networks thrive on international mobility and their ability to take advantage of the opportunities that flow from the separation of marketplaces into sovereign states with borders ”32 Criminals are proactive creative and flexible They are not constrained by jurisdiction in the same manner as law enforcement They carry out their illicit activities in spite of geographic lines or Source CRS jurisdictional boundaries Criminals routinely move illicit products and proceeds across state and international boundaries Criminals have creatively circumvented both geographic borders and law enforcement jurisdictions Mexican drug traffickers for instance utilize underground cross-border tunnels— which have become increasingly prevalent and sophisticated—to smuggle drugs from Mexico into the United States Simple “gopher hole” tunnels are dug on the Mexican side of the border travel just below the surface and pop out on the U S side as close as 100 feet from the border More advanced tunnels rely on existing infrastructure such as storm drains or sewage systems These systems may be shared by neighboring border cities such as the tunnel shared by Nogales AZ in the United States and Nogales Sonora in Mexico Exploiting infrastructure allows smugglers to move drugs further than they could by digging tunnels alone The most sophisticated tunnels can have rail ventilation and electrical systems The most extensive of such tunnels discovered to date were found in January 2006 in Otay Mesa CA They stretched nearly three-quarters of a mile in length traveled over 85 feet below the surface of the earth and had lighting ventilation and groundwater drainage systems 33 In July 2012 three sophisticated drug smuggling tunnels were uncovered along the Southwest border in less than a week 34 32 Moisés Naím Illicit How Smugglers Traffickers and Copycats are Hijacking the Global Economy New York Anchor Books 2005 p 13 33 This tunnel bust resulted in the seizure of more than two tons of marijuana U S Drug Enforcement Administration “DEA ICE Uncover ‘Massive’ Cross-Border Drug Tunnel Cement lined passage thought to link warehouses in Tijuana and Otay Mesa ” press release January 26 2006 http www justice gov dea pubs pressrel pr012606 html 34 Elliot Spagat and Jacques Billeaud “Drug Tunnels Discovered Between U S -Mexico Border Contained Railcar Congressional Research Service 8 The Interplay of Borders Turf Cyberspace and Jurisdiction Traffickers have also used semi-submersible maritime vessels ultralight aircraft 35 and other means to move illicit products Semi-submersible vessels are typically made of fiberglass can travel up to 2 000 miles with multi-ton shipments of drugs—primarily Colombian cocaine—and are difficult to detect from the air 36 The U S Coast Guard has indicated that over 25% of the cocaine eventually destined for the United States is moved during part of its journey via semisubmersible vessels 37 Mexican drug traffickers have increasingly used ultralight aircraft to smuggle drugs across the Southwest border These small planes can fly as low as tree level and are not easily detected Some traffickers land the ultralights on the U S side of the border to pass off drug loads to distributors Others attach drop baskets38 to release packages of drugs that will fall to the ground when a lever in the aircraft is activated These packages are then picked up and distributed by local traffickers or gangs In FY2010 border authorities reported 228 ultralight incursions from Mexico into the United States—nearly double the number reported from FY2009 39 Smugglers and traffickers are constantly innovating means to circumvent borders and supply their products to areas where there is demand In January 2010 smugglers along the Southwest border were intercepted in Mexico as they prepared a catapult device equipped to fling 4 4-pound packages of marijuana over the fence along the international border between Mexico and the United States 40 While the attempt was unsuccessful—the drugs and catapult were both seized by authorities—this highlights criminal will to overcome physical legal and other barriers to generating profit In another instance in April 2010 smugglers used a portable folding ramp mounted on a truck to allow vehicles to drive over the international border fence U S Border Patrol agents spotted a vehicle that had used this ramp and seized 1 000 pounds of marijuana after the suspects abandoned their vehicle and fled back to Mexico 41 In another instance in December 2012 smugglers used a pneumatic cannon to propel 33 cans of marijuana—totaling about 85 pounds and worth about $42 500—over the fence along the Southwest border Before the smugglers were able to collect their goods on the U S side of the fence Border Patrol officials seized the cans of marijuana and a tank of carbon dioxide 42 System Tons Of Pot ” Huffington Post July 13 2012 35 The Federal Aviation Administration FAA does not classify ultralights as “aircraft ” For the FAA definition of an ultralight see the Code of Federal Regulations CFR Title 14 Section 103 http ecfr gpoaccess gov cgi t text textidx c ecfr sid 77f64066b8e425c01339f918e6e9f291 rgn div5 view text node 14 2 0 1 3 16 idno 14 36 “Self-Propelled Semi-Submersible SPSS Watercraft ” GlobalSecurity org June 28 2008 http www globalsecurity org military world para spss htm See also “Waving Not Drowning Cocaine Now Moves by Submarine ” The Economist May 1 2008 http www economist com node 11294435 story_id 11294435 37 Rear Admiral Vincent Atkins U S Coast Guard Testimony before the House Subcommittee on Homeland Security on Department of Homeland Security Air and Marine Operations and Investments April 19 2010 http www dhs gov ynews testimony testimony_1271690315007 shtm 38 Drop baskets can carry over 300 pounds of marijuana or other drugs 39 Richard Marosi “Ultralight Aircraft Now Ferrying Drugs Across U S -Mexico Border ” Los Angeles Times May 19 2011 http www latimes com news local la-me-border-ultralight-20110520 0 7315999 story 40 “Mexican Drug Cartels Use Catapult to Launch Drug Packages Across Border ” Homeland Security Newswire January 27 2011 http homelandsecuritynewswire com mexican-drug-cartels-use-catapult-launch-drug-packagesacross-border 41 “Smugglers Use Portable Ramp to Jump Border Fence ” Homeland Security Newswire April 19 2011 http homelandsecuritynewswire com smugglers-use-portable-ramp-jump-border-fence See also Chris McDaniel “Smugglers Improvise Ramp to Drive Over Border Fence ” Yuma Sun April 8 2011 http www yumasun com articles border-69033-fence-ramp html 42 “Marijuana Shot Over Border Fence With Cannon Seized ” Yuma Sun December 11 2012 http www yumasun com articles -83831— html Congressional Research Service 9 The Interplay of Borders Turf Cyberspace and Jurisdiction While many scholars believe that borders present opportunities for criminals others have noted challenges Criminals may be able to establish roots in new territory if there “is the presence of a demand for criminal protection in the new place The presence of large illegal markets booms in construction an export-oriented economy incentives to create cartel agreements or the inability of the state to settle legal disputes quickly and effectively usually generate such a demand ”43 In fact criminal organizations may expand into new territories by force rather than by choice They may be moving to escape criminal infighting turf battles or effective law enforcement 44 Challenges for U S Law Enforcement While criminals may operate across jurisdictional boundaries law enforcement cannot As mentioned jurisdictional lines generally follow territorial lines and U S federal law enforcement may investigate and prosecute qualifying federal crimes within the territorial confines of the United States For a given crime federal law enforcement may be able to pursue an investigation provided that the criminal act criminal actors and victims are all within the United States However many crimes—particularly those of the cyber nature—have become increasingly transnational While Congress has provided federal law enforcement extraterritorial jurisdiction for certain crimes this does not necessarily clear law enforcement’s path to engage in such investigations 45 Perhaps an alleged criminal committed a crime within the United States and then fled the country to evade prosecution Or perhaps a criminal targeted U S persons businesses or interests from outside U S territorial bounds The United States may have to rely on other countries’ law enforcement to assist in a criminal investigation or to help extradite suspected criminals to face prosecution in the United States 46 One such barrier to investigation and prosecution exists when the United States does not have an extradition or legal assistance arrangement with the country in which a fugitive has found haven 47 Even if there is an extradition treaty however extradition can be complicated for a number of reasons For one an illegal action in one country may not be prohibited in another 48 This could contribute to one country’s reluctance to work with another or to turn over a suspect for prosecution In the United States for example creating possessing and distributing child pornography are illegal this is not the case however in a number of other countries A 2006 study by the International Center for Missing and Exploited Children found that 43 Federico Varese Mafias on the Move How Organized Crime Conquers New Territories Princeton NJ Princeton University Press 2011 pp 7-8 44 Ibid p 8 45 For a detailed discussion of extraterritorial jurisdiction see CRS Report 94-166 Extraterritorial Application of American Criminal Law by Charles Doyle 46 The Cybersecurity Act of 2012 S 2105 S 3414 would among other things require the Attorney General and the Director of the FBI to submit a report to Congress regarding DOJ investigations and prosecutions relating to cybercrimes and intrusions this report would be required to contain information on the number of arrests and prosecutions related to cybercrimes instances in which investigations or prosecutions have been hampered by an inability to extradite the suspected criminal manpower and financial resources devoted to combating cybercrimes and legal impediments both domestic and international to prosecuting cybercrimes and intrusions 47 For a list of countries with which the United States has an extradition agreement see 18 U S C §3181 The United States maintains diplomatic relations with a number of countries with which it does not share an extradition treaty For instance while the United States has diplomatic relations with China and Russia it does not share extradition treaties with these nations 48 U S Government Accountability Office Cybercrime Public and Private Entities Face Challenges in Addressing Cyber Threats GAO-07-705 June 2007 p 41 http www gao gov new items d07705 pdf Congressional Research Service 10 The Interplay of Borders Turf Cyberspace and Jurisdiction of 184 International Criminal Police Organization INTERPOL member countries 95 countries had no laws criminalizing child pornography 49 The disparity between countries’ cybercrime laws has been cited as another obstacle to investigations Law enforcement has used the investigation of the “Love Bug ” or “I Love You ” computer virus as a prominent example of this barrier 50 This virus was unleashed in the Philippines and it attacked computers worldwide including in Asia Europe Australia and the United States The creator of the virus although arrested was not charged with a crime because Philippine law at the time was not sufficient to address hacking and computer crimes 51 In addition to the challenges posed by investigating transnational criminals impediments exist for U S law enforcement in combating criminals crossing boundaries within the territorial United States The prevention and control of domestic crime has traditionally been a responsibility of state and local governments with the federal government playing more of a supportive role However between the mid-1980s and mid-1990s federal law enforcement agencies saw an expansion of their role in fighting domestic crime as Congress began to add more crimes to the federal criminal code that were previously under the sole jurisdiction of state and local governments While the federalization of crimes has increased criminals can commit any number of crimes domestically that are investigated primarily under the purview of state and local law enforcement 52 Organized retail crime ORC for example is often multi-jurisdictional Retail criminals may operate freely across state lines stealing just enough merchandise to remain under the major theft limit Theft laws vary from state to state regarding the monetary threshold that constitutes major theft There is currently no federal law specifically prohibiting organized retail crime as such but there are provisions in the law that federal law enforcement uses to bring forth cases against ORC rings 53 For crimes such as ORC that frequently cross borders Congress has debated whether current law should be amended to provide provisions specifically criminalizing this activity In this debate surrounding ORC for instance proponents of such legislation argue that criminalizing ORC may benefit law enforcement in several ways including 1 illuminating the growing problem of ORC and 2 providing a statutory framework for tracking ORC case data rather than lumping these cases into other categories for statistical purposes Opponents of legislation criminalizing ORC argue that already-existing statutes allow for effective investigation and prosecution of ORC and that creating a separate provision for ORC would be redundant Indeed representatives from federal law enforcement agencies have provided congressional testimony indicating that they have sufficient laws and procedural tools to investigate ORC 54 49 International Center for Missing and Exploited Children ICMEC Results of the Global Child Pornography Study 2006 http www icmec org en_X1 pdf SummerNewsletter2006formatted pdf ICMEC is a nonprofit organization based in Virginia whose goal is to protect children from sexual exploitation and abduction 50 U S Department of Justice “Remarks of Kevin DiGregory Fighting Cybercrime—What are the Challenges facing Europe ” press release September 19 2000 http www justice gov criminal cybercrime EUremarks htm 51 The Philippine Congress subsequently passed a law specifically dealing with computer-related crimes Wayne Arnold “Philippines to Drop Charges on E-Mail Virus ” The New York Times August 22 2000 http www nytimes com 2000 08 22 business technology-philippines-to-drop-charges-on-e-mail-virus html 52 For more information on federal crime control issues see CRS Report R40812 Federal Crime Control Issues in the 111th Congress by Kristin M Finklea 53 These include statutes such as the Racketeer Influenced and Corrupt Organizations RICO provisions money laundering and transportation or sale of stolen goods provisions 54 Testimony by law enforcement representatives from the FBI ICE USSS and USPIS before the U S Congress House Committee on the Judiciary Subcommittee on Crime Terrorism and Homeland Security Combating Congressional Research Service 11 The Interplay of Borders Turf Cyberspace and Jurisdiction This highlights a larger federal debate regarding the federalization of offenses In light of increasingly trans-border crimes Congress may be faced with deciding whether these offenses are best criminalized at the state or federal level One factor that may strongly influence this debate is whether state and local law enforcement agencies are equipped with the needed tools and authorities to keep up with savvy criminals who are constantly devising new means to profit and evade the law One alternative to federalizing offenses is to provide state and local law enforcement with assistance—monetary manpower or technological Congress has provided such assistance through funding grant programs such as the Community Oriented Policing Services COPS grant program55 and the Edward Byrne Memorial Justice Assistance Grant JAG program 56 Through these programs state and local law enforcement assistance is available for a variety of purpose areas Yet another option that Congress may consider is incentivizing federal state and local law enforcement coordination and information sharing through the participation in task forces and fusion centers The issue of law enforcement coordination is discussed further in the section “Interagency Cooperation and Information Sharing ” Cyberspace and Advancing Technologies Globalization and technological innovation have fostered the expansion of criminal and legitimate operations across physical borders as well as throughout cyberspace Advanced rapid communication systems have made it easier for criminals to operate remotely not only from other members of their illicit networks but from their victims as well Cross-Border Criminal Networks Criminal organizations have evolved to be more networked and cellular than their hierarchical predecessors 57 Criminals operating as part of a network no longer need to live in the same city state or even country as one another Various components of an organization may perform specific roles that need not be carried out in the same locality in which other members of the illicit network operate As criminals take on more specialized roles organizations may outsource portions of their operations to specialists Specialists can be incorporated into a criminal scheme from all corners of the globe and opportunistic networks may form around specific schemes According to the U S Secret Service USSS “more exclusive online groups of criminals count among their members professional criminals who have a decade or more of experience and extensive contacts in diverse criminal communities ”58 Web-based criminal forums for instance have global membership many with “strong representation of members from Eastern Europe ”59 Some of these online forums act as business platforms where members of criminal communities can gather virtually to share and market their expertise 60 One such forum was known as Organized Retail Crime The Role of Federal Law Enforcement 111th Cong 1st sess November 5 2009 55 For more information on COPS see CRS Report RL33308 Community Oriented Policing Services COPS Background and Funding by Nathan James and CRS Report R40709 Community Oriented Policing Services COPS Current Legislative Issues by Nathan James 56 For more information on JAG see CRS Report RS22416 Edward Byrne Memorial Justice Assistance Grant JAG Program by Nathan James 57 For more information on the evolution of organized crime see CRS Report R41547 Organized Crime An Evolving Challenge for U S Law Enforcement by Jerome P Bjelopera and Kristin M Finklea 58 Verizon RISK Team and U S Secret Service 2010 Data Breach Investigations Report p 58 59 Ibid 60 The USSS has identified some specialized roles as carders who traffic and exploit stolen financial data hackers and security technologists spammers bot herders money launderers internet developers and host providers malware Congressional Research Service 12 The Interplay of Borders Turf Cyberspace and Jurisdiction CarderPlanet founded by Vladislav Horohorin or “BadB ” While CarderPlanet shut down after law enforcement arrested several high-level members 61 Horohorin’s criminal network “remains one of the most sophisticated organizations of online financial criminals in the world ”62 As a byproduct of this organizational structure one component of the network may have limited knowledge of the activities of other members of the network Therefore if one component is disrupted by law enforcement other components of the network may be shielded by the loose organizational structure While this may protect an organization from being wholly dismantled it can potentially limit information sharing within an organization This can subsequently stunt the sharing of key communications necessary for organizational learning and growth 63 Indirectly the cellular networked structures that criminals have adapted and that in part allow them to more effectively operate across borders can hinder their internal operations and potential growth This phenomenon is not exclusive to criminal organizations however While there has been a trend towards increased information sharing in the law enforcement community—particularly since the terrorist attacks of September 11 2001—compartmentalization still exists 64 Agencies have adopted more intelligence-led investigations but they still compartmentalize their operations and restrict information on a need-to-know basis 65 In this fashion they also put up barriers to potential organizational growth and learning Some have suggested that while criminals and police both compartmentalize information the means and speed with which they ultimately share information may differ One scholar has analyzed this phenomenon in the context of smuggling networks noting that they “often process information make decisions coordinate behavior and change practices faster than the cumbersome bureaucracies that confront them ”66 Trans-border Victimization Not only do criminals operate and network with one another across borders but criminals both individuals and organizations often target victims without regard for borders According to the Internet Crime Complaint Center IC3 67 of those reported scams and frauds from 2010 where the locations of the victim and perpetrator were both known a minority of cases involved victims and perpetrators in the same state 68 For instance in California the state with the largest developers document forgers information service providers hardware providers calling services and drop money mule managers Ibid p 59 61 Kimberly Kiefer Peretti Data Breaches What the Underground World of “Carding” Reveals U S Department of Justice Computer Crime and Intellectual Property Section p 9 http www justice gov criminal cybercrime DataBreachesArticle pdf 62 U S Department of Justice “Alleged International Credit Card Trafficker Arrested in France on U S Charges Related to Sale of Stolen Card Data ” press release August 11 2010 http www justice gov opa pr 2010 August 10crm-921 html 63 Michael Kenney From Pablo to Osama Trafficking and Terrorist Networks Government Bureaucracies and Competitive Adaptation University Park PA The Pennsylvania State University Press 2007 p 5 Hereinafter Kenney From Pablo to Osama 64 For more information on intelligence sharing see CRS Report R41848 Intelligence Information Need-to-Know vs Need-to-Share by Richard F Grimmett 65 Ibid See also Kenney From Pablo to Osama p 7 103 66 Kenney From Pablo to Osama p 7 67 The FBI partners with the National White Collar Crime Center NW3C to form the IC3 The IC3 serves the broad law enforcement community to receive develop and refer internet crime complaints 68 Internet Crime Complaint Center 2010 Internet Crime Report p 9 http ic3report nw3c org docs 2010_IC3_Report_02_10_11_low_res pdf These are the most recent data as the 2011 report does not contain data on victim and perpetrator location Congressional Research Service 13 The Interplay of Borders Turf Cyberspace and Jurisdiction proportion of victims and perpetrators reportedly in the same state 39 1% of cases with known location information indicated that the victim and perpetrator were both located in California Anonymity in the cyber world helps criminals operate with relative freedom In addition criminals may operate under numerous identities—actual stolen or cyber—that can link them to different parts of the world confounding victims and law enforcement alike Modern criminals can readily leverage technology to victimize targets across borders They can rely upon botnets 69 for instance to electronically target victims throughout borderless cyberspace Simultaneously the criminals themselves need not cross a single border The Coreflood botnet for one has infected over 2 3 million computers around the world—almost 1 9 million of which are located in the United States 70 This botnet or virus is a malicious keylogging program that records users’ keystrokes and transmits the data to cyber thieves who can use these data to steal personal and financial information Compromised U S businesses suffering financial losses from the botnet range from real estate and investment companies to law firms and defense contractors The FBI has filed a complaint against 13 “John Doe” defendants believed to have engaged in wire fraud bank fraud and illegal interception of electronic communications in connection with the Coreflood botnet 71 It is unknown whether authorities have determined the exact identities or locations of these alleged criminals but they are believed to be foreign nationals 72 Notably authorities in the United States and Estonia have seized servers that are believed to have current or have had previous control over the Coreflood botnet 73 In another case from December 2012 U S law enforcement in conjunction with international partners arrested 10 individuals located in the United States United Kingdom Peru New Zeland Macedonia Croatia and Bosnia and Herzegovina for their roles in an international cybercrime ring involved with the Butterfly Botnet 74 Advance fee fraud AFF schemes have even before the proliferation of the Internet been used to swindle victims across borders The Internet has only hastened the speed with which these fraudsters can reach their targets and increased the number of potential victims AFF scams often involve criminals sending unsolicited or spam e-mails that present an opportunity for a “lucky” individual to come into a large sum of money 75 The letters promise the money will be disbursed once the victim sends a small cash payment purportedly used to facilitate the transfer Only the large sum of money is never transferred to the victim In one case from February 2011 the second of two Nigerian nationals was sentenced to nine years in prison for his role in an AFF scheme 69 Botnets are groups of computers that are remotely controlled by hackers They have been infected by downloading malicious software and are used to carry out malicious activities on behalf of the hackers 70 U S v John Doe Complaint April 11 2011 U S District Court of Connecticut http newhaven fbi gov dojpressrel pressrel11 pdf nh041311_4 pdf 71 Federal Bureau of Investigation “Department of Justice Takes Action to Disable International Botnet More Than Two Million Computers Infected with Keylogging Software as Part of Massive Fraud Scheme ” press release April 13 2011 http newhaven fbi gov dojpressrel pressrel11 nh041311 htm 72 U S v John Doe Complaint April 11 2011 U S District Court of Connecticut http newhaven fbi gov dojpressrel pressrel11 pdf nh041311_4 pdf 73 Kim Zetter “FBI vs Coreflood Botnet Round 1 Goes to the Feds ” Wired com April 26 2011 http www wired com threatlevel 2011 04 coreflood_results 74 Federal Bureau of Investigation “FBI International Law Enforcement Disrupt International Organized Cyber Crime Ring Related to Butterfly Botnet ” press release December 11 http www fbi gov news pressrel press-releases fbiinternational-law-enforcement-disrupt-international-organized-cyber-crime-ring-related-to-butterfly-botnet utm_campaign email-Daily utm_medium email utm_source fbi-in-the-news utm_content 160758 75 Federal Bureau of Investigation “Common Fraud Schemes ” http www fbi gov majcases fraud fraudschemes htm For more information on the development of AFF scams see CRS Report R41547 Organized Crime An Evolving Challenge for U S Law Enforcement by Jerome P Bjelopera and Kristin M Finklea Congressional Research Service 14 The Interplay of Borders Turf Cyberspace and Jurisdiction targeting U S European and Australian individuals 76 At least 18 people were duped out of over $9 5 million The fraudsters posed as lawyers bankers and government officials who collected the “fees” that were advertised as necessary to secure the transfer of large sums of money to the victims Of course the victims never received their promised riches The perpetrators were eventually arrested in the Netherlands where they had been residing and extradited to the United States The Internet has also been used to perpetuate trans-border intellectual property rights IPR violations—one of the primary cybercrime concerns voiced by federal law enforcement and the Obama Administration 77 Counterfeit and pirated goods harm legitimate businesses and consumers on several levels This crime threatens competition and innovation siphons profits deserved by the rightful manufacturer and poses health risks to consumers In June 2011 a Chinese national was sentenced for trafficking in counterfeit versions of the pharmaceutical weight-loss drug “Alli”—an over-the-counter weight-loss drug manufactured by GlaxoSmithKlein The defendant reportedly shipped the products from China to a business partner in Texas for U S distribution The FDA had issued public alerts about this as well as other supposed weight-loss products 78 The warnings indicated that the counterfeit drugs were being imported from China and that the “counterfeit version of Alli did not contain orlistat the active ingredient in its product Instead the counterfeit product contained the controlled substance sibutramine ” One consumer was even reported to have suffered a mild stroke after consuming the counterfeit product 79 Over the course of the investigation law enforcement purchased the counterfeit drug and traced the wired money used in the purchase of the counterfeit drug They located the defendant in China and posing as potential buyers of the drug agreed to meet the defendant face-to-face Law enforcement later met the defendant in Hawaii where he was arrested 80 Barriers to Cyber Investigations Many of law enforcement’s barriers in the cyber world have a technological dimension rather than being purely jurisdictional Police agencies face challenges in identifying and prosecuting criminals81 who can operate under a variety of identities including cyber identities that can be U S Department of Justice “Nigerian National Sentenced in North Carolina to 108 Months in Prison for Role in Advance Fee Fraud Scheme ” press release February 24 2011 http www justice gov opa pr 2011 February 11-crm242 html 77 See Federal Bureau of Investigation “Gordon M Snow Assistant Director Cyber Division Federal Bureau of Investigation Statement Before the Senate Judiciary Committee Subcommittee on Crime and Terrorism ” April 11 2011 http www fbi gov news testimony cybersecurity-responding-to-the-threat-of-cyber-crime-and-terrorism See also White House International Strategy for Cyberspace Prosperity Security and Openness in a Networked World May 2011 p 4 http www whitehouse gov sites default files rss_viewer international_strategy_for_cyberspace pdf 78 U S Immigration and Customs Enforcement “Chinese National Sentenced to More Than 7 Years in Federal Prison for Trafficking Counterfeit Pharmaceutical Weight-Loss Drug ” press release June 3 2011 http www ice gov news releases 1106 110603denver htm 79 U S Immigration and Customs Enforcement “Chinese National Sentenced to More Than 7 Years in Federal Prison for Trafficking Counterfeit Pharmaceutical Weight-Loss Drug ” press release June 3 2011 http www ice gov news releases 1106 110603denver htm 80 U S Food and Drug Administration “FDA Warns Consumers about Counterfeit Alli ” press release January 18 2010 http www fda gov NewsEvents Newsroom PressAnnouncements ucm197857 htm 81 The Cybersecurity Act of 2012 S 2105 S 3414 would among other things require the Attorney General and the Director of the FBI to submit a report to Congress regarding DOJ investigations and prosecutions relating to cybercrimes and intrusions this report would be required to contain information on the number of arrests and prosecutions related to cybercrimes instances in which investigations or prosecutions have been hampered by an 76 Congressional Research Service 15 The Interplay of Borders Turf Cyberspace and Jurisdiction instantaneously altered and who can conduct operations throughout the world without regard for borders of which law enforcement is acutely aware According to the FBI “cyber criminals routinely change their nicknames e-mails digital currency accounts and the ICQ or instant messaging numbers they use in forums Not only do they change these accounts and identifying numbers but they also use different combinations of the information in each forum they participate in ”82 Location of Crimes and Criminals Cybercriminals often target victims in one or more different countries Further given the nature of the cyber world crimes can be routed through servers in countries entirely separate from those where the perpetrators and victims are located The Financial Action Task Force FATF has indicated that “it appears that the perpetrators take advantage of the near anonymity that can sometimes be achieved through internet communication on the internet as well as the difficulty in following the path of communication links from one internet server to another ”83 The Rustock botnet for example was a vast network of computers—estimated at over 1 million computers around the world—that sent malicious spam 84 Reports indicate that this botnet may have been responsible for over half of worldwide spam at the end of 2010 “Command-andcontrol” machines responsible for sending instructions to the other infected computers were located primarily in the United States Microsoft worked with the U S Marshals Service and the Dutch High Tech Crime Unit in the Netherlands to dismantle the command-and-control structure 85 In another case from December 2010 DOJ arraigned a Russian national with the cyber identity “AKILL ” who was the reported ringleader of the Mega-D botnet 86 This botnet could send 10 billion e-mails daily AKILL supposedly falsified the e-mail header information to disguise the e-mails’ true origins One technique to enhance anonymity used by botnet leaders or botmasters is to launder their Internet traffic through a variety of intermediate Internet hosts protocols and anonymous networks Similar to money laundering this traffic laundering makes it increasingly difficult for law enforcement to detect the source of the malicious botnet activity 87 Same Crimes Advanced Technologies Criminals exploit rapidly evolving technology to stay ahead of law enforcement Internet technology is used not only in the furtherance of cybercrimes but in more traditional real world crimes as well According to Europol’s 2011 Organized Crime Threat Assessment inability to extradite the suspected criminal manpower and financial resources devoted to combating cybercrimes and legal impediments both domestic and international to prosecuting cybercrimes and intrusions 82 Federal Bureau of Investigation Steven R Chabinsky Deputy Assistant Director Cyber Division at the GovSec FOSE Conference March 23 2010 http www fbi gov news speeches the-cyber-threat-whos-doing-what-towhom 83 Financial Action Task Force on Money Laundering Report on Money Laundering Typologies 2000 - 2001 February 1 2001 p 3 http www fatf-gafi org dataoecd 29 36 34038090 pdf 84 Nick Wingfield “Spam Network Shut Down ” WSJ com March 18 2011 http online wsj com article SB10001424052748703328404576207173861008758 html KEYWORDS nick wingfield 85 Microsoft “Taking Down Botnets Microsoft and the Rustock Botnet ” March 17 2011 http blogs technet com b microsoft_on_the_issues archive 2011 03 18 taking-down-botnets-microsoft-and-the-rustock-botnet aspx 86 U S Department of Justice “Russian Man Charged with Sending Thousands of Spam Emails ” press release December 3 2010 http www justice gov usao wie press_releases 2010 pr20101203_Russian_Press_release pdf 87 Xinyuan Wang and Daniel Ramsbrock “The Botnet Problem ” Computer and Information Security Handbook ed John R Vacca Elsevier Inc 2009 p 129 Congressional Research Service 16 The Interplay of Borders Turf Cyberspace and Jurisdiction Internet technology has now emerged as a key facilitator for the vast majority of offline organised crime activity In addition to the high-tech crimes of cybercrime payment card fraud the distribution of child abuse material and audio visual piracy extensive use of the Internet now underpins illicit drug synthesis extraction and distribution the recruitment and marketing of victims of trafficking in human beings THB the facilitation of illegal immigration the supply of counterfeit commodities trafficking in endangered species and many other criminal activities It is also widely used as a secure communication and money laundering tool by criminal groups 88 While criminals are proactively searching for new techniques to accomplish the same crimes and generate money law enforcement is reacting to criminals’ activities Take for instance advances in the movement of illegal drug trafficking proceeds across the U S border with Mexico While bulk cash smuggling has been an important means by which criminals have moved illegal profits from the United States into Mexico traffickers have increasingly turned to stored-value cards to move money With these cards criminals are able to avoid the reporting requirement under which they would have to declare any amount over $10 000 in cash moving across the border 89 Current federal regulations regarding international transportation only apply to monetary instruments as defined under the Bank Secrecy Act BSA 90 Of note a stored-value card is not currently considered a monetary instrument under current law These transportation regulations indicate that Each person who physically transports mails or ships or causes to be physically transported mailed or shipped or attempts to physically transport mail or ship or attempts to cause to be physically transported mailed or shipped currency or other monetary instruments in an aggregate amount exceeding $10 000 at one time from the United States to any place outside the United States or into the United States from any place outside the United States shall make a report thereof A person is deemed to have caused such transportation mailing or shipping when he aids abets counsels commands procures or requests it to be done by a financial institution or any other person 91 The Financial Crimes Enforcement Network FinCEN 92 has issued a final rule defining “stored value” as “prepaid access” and implementing regulations regarding the recordkeeping and suspicious activity reporting requirements for prepaid access products and services 93 This rule does not however directly address whether stored value or prepaid access cards would be subject 88 Europol EU Organized Threat Assessment OCTA 2011 File No 2530-274 April 28 2011 p 6 http www europol europa eu publications European_Organised_Crime_Threat_Assessment_%28OCTA%29 OCTA_2011 pdf 89 Legislation was introduced in the 111th Congress H R 5127 that would have among other things classified storedvalue cards as monetary instruments in order to require individuals to declare to Customs over $10 000 that they are carrying on a stored value card 90 31 U S C §5312 a 3 defines a monetary instrument as “ A United States coins and currency B as the Secretary may prescribe by regulation coins and currency of a foreign country travelers’ checks bearer negotiable instruments bearer investment securities bearer securities stock on which title is passed on delivery and similar material and C as the Secretary of the Treasury shall provide by regulation for purposes of sections 5316 and 5331 checks drafts notes money orders and other similar instruments which are drawn on or by a foreign financial institution and are not in bearer form ” 91 31 C F R §103 23 a 92 FinCEN under the Department of the Treasury administers the BSA and the nation’s financial intelligence unit FinCEN also supports law enforcement intelligence and regulatory agencies by analyzing and sharing financial intelligence information For more information see http www fincen gov about_fincen wwd strategic html 93 Department of the Treasury Financial Crimes Enforcement Network “Bank Secrecy Act Regulations—Definitions and Other Regulations Relating to Prepaid Access ” 76 No 146 Federal Register 45403-45420 July 29 2011 Congressional Research Service 17 The Interplay of Borders Turf Cyberspace and Jurisdiction to current regulations regarding the international transportation of monetary instruments A separate proposed rule would amend the definition of “monetary instrument ” for the purposes of BSA international monetary transport regulations to include prepaid access devices 94 Even if FinCEN were to issue a final rule and implement regulations requiring individuals leaving the United States to declare stored value the Government Accountability Office GAO has identified several challenges that would remain 95 These challenges relate to law enforcement’s ability to detect the actual cards and to differentiate legitimate from illegitimate stored value on cards travelers’ abilities to remember the amount of stored value on any given card and law enforcement’s ability to determine where illegitimate stored value is physically held and subsequently freeze and seize the assets Aside from bulk cash smuggling and stored-value cards traffickers move and launder money by using digital currency accounts e-businesses that facilitate money transfers via the Internet online role-playing games or virtual worlds that enable the exchange of game-based currencies for real currency and mobile banking wherein traffickers have remote access—via cell phones— to bank and credit card accounts as well as prepaid cards 96 Technology Outpacing Law Enforcement Savvy criminals can evade law enforcement because they use at times technology and methods that are beyond the reach and expertise of law enforcement In the rapidly evolving digital age law enforcement may not have the capabilities to keep up with the pace of criminals For instance law enforcement specialists face mounting challenges in gathering information protected by sophisticated encryption 97 Criminals can use data encryption software to mask electronic communications—sending information to undisclosed locations and individuals While law enforcement may be able to intercept these data they may not have the tools to crack the encryption and obtain valuable evidence 98 This could potentially contribute to large amounts of data that can be collected but not analyzed The FBI has described a problem that results from a gap between investigative authority and capability While law enforcement has the legal authority to conduct electronic surveillance and wiretaps investigators may not be able to utilize these techniques if communications providers’ technologies or lack thereof prevent law enforcement from implementing their legal authorities 99 In essence the FBI may be “‘in the dark’ by the loss of evidence that they would Department of the Treasury “Bank Secrecy Act Regulations Definition of “Monetary Instrument ” 76 Federal Register 64049 October 17 2011 95 GAO Moving Illegal Proceeds Challenges Exist in the Federal Government’s Effort to Stem Cross Border Smuggling October 2010 pp 48–49 96 Douglas Farah “Money Laundering and Bulk Cash Smuggling Challenges for the Merida Initiative ” in Shared Responsibility U S -Mexico Policy Options for Confronting Organized Crime ed Eric L Olson David A Shirk and Andrew D Selee 2010 97 See archived CRS Report 98-905 The Encryption Debate Intelligence Aspects by Keith G Tidball and Richard A Best Jr 98 Microsoft has created a tool to help law enforcement overcome some barriers posed by its data encryption tool BitLocker The Computer Online Forensic Evidence Extractor COFEE can help law enforcement capture live data on a computer The tool ceases to work however if the computer is shut down Nancy Gohring “Microsoft Helps Law Enforcement Get Around Encryption ” PCWorld April 29 2008 http www pcworld com businesscenter article 145318 microsoft_helps_law_enforcement_get_around_encryption html 99 Federal Bureau of Investigation “Valerie Caproni General Counsel Statement Before the House Judiciary Committee Subcommittee on Crime Terrorism and Homeland Security ” February 17 2011 http www fbi gov news testimony going-dark-lawful-electronic-surveillance-in-the-face-of-new-technologies 94 Congressional Research Service 18 The Interplay of Borders Turf Cyberspace and Jurisdiction be lawfully entitled to due to advances in technology antiquated ELSUR electronic surveillance laws and or lack of resources training personnel ”100 As such the FBI has created the “Going Dark” initiative discussed later which “is a National Electronic Surveillance Strategy which focuses on law enforcement’s impending inability to conduct electronic surveillance on certain communications devices due to rapid changes in technology ”101 Not only can criminals’ innovation and use of technology outpace law enforcement’s investigations but the relative costs to criminals and law enforcement appear to be unbalanced as well Technology leveraged by criminals can be relatively low-cost 102 In comparison the costs to investigate these crimes—in terms of both financial and personnel resource costs—can be higher Jurisdictional Battles Establishing maintaining and expanding operational turf can all pose challenges to criminals Criminals open themselves to increased exposure—to rival actors and law enforcement alike— when efforts to stake claim to and defend turf occur in the open Criminals generally do not strive to publicize their illicit activities In effect this is a key element that separates criminals from terrorists Criminals are often motivated by profit They try to keep their activities under wraps without letting their identities be known This anonymity increases the likelihood that they will be able to continue their activities without detection As noted criminals operate with relative ease across borders They have connections and trusted networks in different geographic areas For instance in order to facilitate the distribution and sale of drugs in the United States Mexican DTOs have formed relationships with U S street gangs prison gangs and outlaw motorcycle gangs 103 While criminals may work through fluid transborder alliances law enforcement may not have parallel partnerships in each of the jurisdictional areas where criminal networks operate Thus criminals may be shielded from prosecution in jurisdictions with less robust police partnerships Nonetheless turf battles between criminals continue to exist These disputes are often seen in areas where gangs and other criminal networks are involved in trafficking and distributing illicit drugs Researchers in Camden NJ studied violent crime near street corners with the presence of gangs involved in drug distribution Results of their research indicated that street corners with the presence of more than one gang have significantly more crime than those street corners with the presence of only one gang 104 The scholars noted that these results are consistent with qualitative research suggesting that violence is likely in areas where territory is disputed 100 See Freedom of Information Act FOIA documents provided by the FBI to the Electronic Frontier Foundation EFF p 120 http www eff org files 20110207_FBI_Going_Dark_Release_Part_4 pdf Links to the all relevant FOIA documents provided to the EFF are referenced by Jennifer Lynch “Newly Released Documents Detail FBI’s Plan to Expand Federal Surveillance Laws ” Electronic Frontier Foundation February 15 2011 http www eff org deeplinks 2011 02 newly-released-documents-detail-fbi-s-plan-expand 101 See Freedom of Information Act FOIA documents provided by the FBI to the Electronic Frontier Foundation EFF p 110 http www eff org files 20110207_FBI_Going_Dark_Release_Part_4 pdf 102 Phil Williams “Transnational Criminal Networks ” in Networks and Netwars The Future of Terror Crime and Military ed John Arquilla and David Ronfeldt RAND 2001 p 82 103 U S Department of Justice National Drug Intelligence Center National Drug Threat Assessment 2010 Product No 2010-Q0317-001 February 2010 pp 12-13 http www justice gov ndic pubs38 38661 38661p pdf 104 Jerry H Ratcliffe and Travis A Taniguchi “Is Crime Higher Around Drug Gang Street corners Two Spatial Approaches to the Relationship Between Gang Set Spaces and Local Crime Levels ” Crime Patterns and Analysis vol 1 no 1 2008 pp 23 - 45 Congressional Research Service 19 The Interplay of Borders Turf Cyberspace and Jurisdiction Take for example the escalating drug trafficking-related violence in Mexico Much of the violence had been a result of clashes between the drug trafficking organizations DTOs over territory within Mexico and key smuggling routes into the United States 105 According to Mexican government official estimates this violence has resulted in more than 34 500 deaths in Mexico since President Felipe Calderón took office in December 2006 106 Targets of this violence most often include rival DTOs or affiliated gang members 107 Increased violence and visibility of these battles have helped garner increased attention from both the Mexican and U S governments which have in turn elevated their determination and resources to combat the DTOs 108 Another way in which turf can be a barrier to criminals is that a heavy focus on turf can stunt criminals’ profit if their activities are relegated to a particular turf Focusing on a specific crime in a specific location may not prove to be the most profitable of business practices for criminals Gangs as mentioned are notorious for violently defending the space in which they operate and controlling the activities that take place within given turf boundaries While this has been standard practice criminal gangs have modified this standard to expand their profitable activities both within and beyond their turf According to the DEA many “ g angs have evolved from turforiented entities to profit-driven organized criminal enterprises whose activities include not only retail drug distribution but also other aspects of the trade including smuggling transportation and wholesale distribution ”109 Evolution of Criminal Turf As discussed to date turf may have been more readily established in the physical world than in the cyber world—at least by criminals Some have predicted however that this landscape may change in the coming years In the cyber world the evolution of operating systems may provide a wider variety of turf platforms on which criminals may operate The number of Windowsalternative operating systems is increasing and malicious code that some criminals use to compromise Windows for instance may not be compatible across operating systems This diversification may contribute to establishing various platforms of cyber turf on which differing cyber gangs and criminal organizations may specialize their operations This may contribute to what some have predicted—possible turf wars between hackers and groups of hackers 110 105 Some of the violence is also directed at the Mexican government police and military attempting to enforce the drug laws in Mexico For more information on the violence see CRS Report R41576 Mexico’s Drug Trafficking Organizations Source and Scope of the Rising Violence by June S Beittel 106 Viridiana Ríos and David A Shirk Drug Violence In Mexico Data and Analysis Through 2010 University of San Diego Trans-Border Institute February 2011 http justiceinmexico files wordpress com 2011 02 2011-tbidrugviolence4 pdf 107 Targets have also included Mexican police military and government officials journalists and civilians—including Americans 108 For more information on U S and Mexican efforts to combat the DTOs see CRS Report R41349 U S -Mexican Security Cooperation The Mérida Initiative and Beyond by Clare Ribando Seelke and Kristin M Finklea 109 U S Department of Justice FY2012 Performance Budget Drug Enforcement Administration U S Department of Justice Congressional Budget Submission p 11 http www justice gov jmd 2012justification pdf fy12-deajustification pdf 110 Kaspersky Lab presented a forecast for the 2011–2020 information technology IT landscape Forecast details are discussed in “Cybercrime Outlook 2020 From Kaspersky Lab ” securelist com February 11 2011 http www securelist com en analysis 204792165 Cybercrime_Outlook_2020_From_Kaspersky_Lab Congressional Research Service 20 The Interplay of Borders Turf Cyberspace and Jurisdiction Law Enforcement and Operational Turf Just as territorial control impacts criminals turf also influences law enforcement operations While some crimes are investigated under the jurisdiction of a proprietary agency e g the FBI is the lead federal agency responsible for terrorism investigations other crimes are not investigated under such clear lines For instance various federal agencies including the FBI USSS U S Postal Inspection Service USPIS and ICE are involved in investigating identity theft 111 Multiple agencies investigating a particular genre of crime can open the doors to investigative overlaps and possible turf battles as well as data challenges According to GAO a “lack of coordination can lead to confusion frustration and a waste of law enforcement resources pose a risk to law enforcement personnel and limit the overall effectiveness of the federal effort ”112 Investigative Overlaps Jurisdictional battles between federal law enforcement agencies—particularly in areas of overlapping investigative authority—are not new phenomena These battles have contributed in part to what some have characterized as inefficient information sharing ATF’s Project Gunrunner for example is one of various measures to reduce the illegal flow of weapons into Mexico One purported cornerstone of Project Gunrunner is intelligence information sharing between federal state local tribal and international law enforcement partners 113 It aims to disrupt the illegal flow of guns from the United States to Mexico enhance U S and Mexican law enforcement coordination and train U S and Mexican law enforcement officials to identify firearms traffickers In November 2010 the DOJ Office of the Inspector General OIG issued a report on Project Gunrunner The OIG report criticized Project Gunrunner in part because “ATF does not systematically and consistently exchange intelligence with its Mexican and some U S partner agencies ”114 These domestic partner agencies include DEA and ICE This lack of information sharing and subsequent criticism exist despite the presence of a Memorandum of Understanding MOU between ATF and ICE agreeing to enhance information sharing in cases of shared jurisdiction It is unclear however whether the criticized lack of coordination arose from jurisdictional conflicts between partner agencies or from inefficient project planning and outreach to policing partners Regardless Project Gunrunner’s inadequacies highlight the difficulties of sharing investigative information across agencies Another example of shared jurisdiction and inter-agency competition involves the National Cyber Investigative Joint Task Force NCIJTF In 2008 the FBI established the NCIJTF to coordinate information from 18 intelligence and law enforcement agencies This task force was created to share information on all domestic cyber threat investigations 115 An April 2011 DOJ OIG report 111 For more information on identity theft investigations see CRS Report R40599 Identity Theft Trends and Issues by Kristin M Finklea See also International Association of Chiefs of Police IACP National Law Enforcement Policy Center Identity Theft Concepts and Issues Paper March 2002 p 2 http www mrsc org artdocmisc identity%20theft%20paper pdf 112 U S Government Accountability Office Law Enforcement Coordination DOJ Could Improve Its Process for Identifying Disagreements Among Agents GAO-11-314 April 2011 p 2 http www gao gov new items d11314 pdf 113 ATF Project Gunrunner http www atf gov firearms programs project-gunrunner For more information on Project Gunrunner see CRS Report R41206 The Bureau of Alcohol Tobacco Firearms and Explosives ATF Budget and Operations for FY2011 by William J Krouse 114 U S Department of Justice Office of the Inspector General Review of ATF’s Project Gunrunner I-2011-001 November 2010 p iii http www justice gov oig reports ATF e1101 pdf 115 Federal Bureau of Investigation National Cyber Investigative Joint Task Force http www fbi gov about-us investigate cyber ncijtf Congressional Research Service 21 The Interplay of Borders Turf Cyberspace and Jurisdiction indicated that “the NCIJTF was not always sharing information about cyber threats among the partner agencies participating in the NCIJTF” and that “task force members first attempted to determine the relevancy and importance of its information to another agency’s operations before sharing that information with another agency ”116 In essence it appears that members were sharing information more on a need-to-know basis rather than automatically In addition the report indicated that during NCIJTF threat focus cell meetings where agencies share new information regarding specific cyber threats some agencies were asked to leave Recently GAO released a study on law enforcement coordination within DOJ Over one-third 37% of DOJ agents from the FBI DEA ATF and U S Marshals interviewed by GAO indicated that they had experienced disagreements with other DOJ agencies regarding roles and responsibilities in an investigation 117 Further of those agents reporting disagreements 78% indicated that these inter-agency disputes adversely impacted investigations Also within the subset of agents reporting disagreements 28% indicated that the source of the problem was a lack of information sharing from other agencies conducting similar investigations The GAO study also suggests that the more agencies there are sharing jurisdiction on a particular investigative area the less clear the agents may be regarding their agency’s roles and responsibilities 118 This lack of clarity may invite more turf battles and disputes that could in turn hamper an investigation Of note not all investigative overlaps result in turf battles and not all turf battles are ultimately detrimental to law enforcement efforts Agencies can capitalize on shared jurisdiction and effectively pool their efforts as is discussed in detail in the section “Interagency Cooperation and Information Sharing ” Information and Data Sharing When multiple agencies investigate a particular type of crime a lack of centralized compatible comprehensive data may hamper their abilities to measure the true scope of a crime share information and coordinate investigations For instance several federal agencies investigate and record information on bulk cash smuggling These include the DEA through the National Seizure System at the El Paso Intelligence Center EPIC ICE through its Bulk Cash Smuggling Center and the Department of the Treasury through the Treasury Enforcement Communications System database Each of these databases is distinct from the others and they are not set up to automatically share information Of note the Office of National Drug Control Policy ONDCP has recommended that increased information sharing among federal agencies—as well as between federal state and local law enforcement— could aid in investigations of DTOs involved in bulk cash smuggling 119 Similarly there are multiple agencies gathering information on cybercrime and specific subsets of cybercrime For example there are various agencies collecting data on identity theft The FBI partners with the National White Collar Crime Center to host the Internet Crime Complaint Center IC3 The IC3 has a database of cybercrime complaints including those regarding identity theft The Federal Trade Commission is another agency maintaining a database of U S Department of Justice Office of the Inspector General Audit Division The Federal Bureau of Investigation’s Ability to Address the National Security Cyber Intrusion Threat Audit Report 11-22 April 2011 pp iv - vii http www justice gov oig reports FBI a1122r pdf 117 U S Government Accountability Office Law Enforcement Coordination DOJ Could Improve Its Process for Identifying Disagreements Among Agents GAO-11-314 April 2011 p 8 http www gao gov new items d11314 pdf 118 Ibid p 10 119 Office of National Drug Control Strategy National Southwest Border Counternarcotics Strategy June 2009 p 25 116 Congressional Research Service 22 The Interplay of Borders Turf Cyberspace and Jurisdiction consumer complaints on a range of frauds such as identity theft ICE also collects this information through its Cyber Crime Center C3 and the USPIS maintains information in its Financial Crimes Database The range of agencies and databases hosting information on identity theft can present challenges to law enforcement effectively combating the crime Moreover the President’s Identity Theft Task Force noted that One barrier to more complete coordination is that identity theft information resides in multiple databases even within individual law enforcement agencies A single instance of identity theft may result in information being posted at federal state and local law enforcement agencies credit reporting agencies credit issuers financial institutions telecommunications companies and regulatory agencies This in turn leads to the inefficient “stove-piping” of relevant data and intelligence Additionally in many cases agencies do not or cannot share information with other agencies making it difficult to determine whether an identity theft complaint is related to a single incident or a series of incidents 120 Even when centralized databases information sharing mechanisms or directives are available inter-agency coordination and sharing may not occur For instance DOJ has issued two MOUs in an attempt to clarify FBI and ATF roles in explosives investigations 121 The first MOU in 2004 reportedly had ambiguous language regarding how to determine a lead agency in explosives investigations In addition DOJ FBI and ATF did not implement the outlined procedures regarding information sharing database consolidation training and laboratory resources 122 A subsequent 2008 MOU reportedly had similar issues in that it did not clarify investigative jurisdiction 123 DOJ’s Office of the Inspector General OIG has indicated that despite two MOUs FBI and ATF do not adequately coordinate their explosives investigations and continue to dispute which is the lead agency in a given investigation 124 Further as of 2009 the two agencies continued to maintain separate explosives-related databases despite instructions in the 2004 MOU directing their consolidation 125 Jurisdictional battles impacting information sharing are not exclusive to federal law enforcement agencies Such discrepancies may exist between federal and state or local law enforcement as well as between federal law enforcement and foreign counterparts For example multilateral information relating to drug alien and weapon smuggling is intended to be shared through EPIC 126 EPIC is a fully coordinated multi-agency tactical intelligence center supported by databases and resources from member agencies Its online query capability consists of 33 federal The President’s Identity Theft Task Force Combating Identity Theft A Strategic Plan April 23 2007 p 55 http www identitytheft gov reports StrategicPlan pdf 121 U S Department of Justice Office of the Inspector General Explosives Investigation Coordination Between the Federal Bureau of Investigation and the Bureau of Alcohol Tobacco Firearms and Explosives Audit Report 10-01 October 2009 see Appendix IV and Appendix VI http www justice gov oig reports plus a1001 pdf 122 Ibid p ii 123 Ibid p iii 124 Ibid p ii 125 GAO has subsequently noted DOJ plans to implement an information sharing system between the FBI and ATF U S Government Accountability Office Opportunities to Reduce Potential Duplication in Government Programs GAO-11-318SP March 2011 http www gao gov products GAO-11-318SP#mt e-report st 3 126 Agencies represented at EPIC include DEA which leads the center CBP ICE U S Coast Guard USSS Department of Defense DOD Department of the Interior FBI ATF U S Marshals Service Federal Aviation Administration National Drug Intelligence Center NDIC Internal Revenue Service National Geospatial-Intelligence Agency Joint Task Force-North Joint Interagency Task Force-South Texas Department of Public Safety Texas Air National Guard and the El Paso County Sheriff’s Office For more information on EPIC see http www justice gov dea programs epic htm 120 Congressional Research Service 23 The Interplay of Borders Turf Cyberspace and Jurisdiction databases 6 commercial databases and its own internal database It operates a 24 7 watch program manned by special agents investigative assistants and intelligence analysts to provide timely tactical intelligence in support of field operations In a June 2010 review of the El Paso Intelligence Center DOJ’s OIG indicated that the lack of an up-to-date agreement between EPIC and its member agencies has led to several coordination issues including a lack of information sharing among agencies 127 Similar OIG critiques have been made of the National Gang Intelligence Center NGIC The NGIC coordinates intelligence information from federal state and local policing agencies It supports law enforcement investigations by providing strategic and tactical analysis of intelligence 128 In a November 2009 DOJ OIG review of DOJ’s anti-gang intelligence and coordination centers including NGIC the OIG concluded that the NGIC had not created a gang information database as had been directed by Congress 129 Further the “NGIC is perceived as predominately an FBI organization and it has not developed the capability to effectively share gang intelligence and information with other law enforcement organizations ” It cannot be determined however whether the coordination flaws were due to jurisdictional struggles between partner agencies or to a lack of information-sharing mechanisms in place When exercising its oversight role one issue Congress may wish to explore is whether existing MOUs and other inter-agency agreements regarding information sharing are being adequately formulated and implemented Congress may also investigate the extent to which these agreements are being effectively overseen by applicable agency leadership U S Law Enforcement Efforts to Overcome Barriers Modern-day criminals take advantage of geographic borders criminal turf cyberspace and law enforcement jurisdictions This has led law enforcement to transform their crime fighting efforts For instance the FBI has—particularly since September 11 2001—relied more heavily on collaboration information sharing and technology 130 The following sections outline how federal law enforcement has relied on interagency cooperation and technological implementation to confront 21st century crime Interagency Cooperation and Information Sharing As discussed crimes—particularly those considered cybercrimes or that contain a cyber component—are increasingly trans-border and transnational Further criminal organizations are becoming less hierarchical and more networked in structure These evolutions in the nature of crime and criminal organizations may require that law enforcement simultaneously become more nimble and networked in order to effectively counter the threats Generally law enforcement agencies and government entities charged with combating criminal networks are relatively hierarchical in comparison and some experts have suggested that “hierarchies have a difficult U S Department of Justice Office of the Inspector General Review of the Drug Enforcement Administration’s El Paso Intelligence Center I-2010-005 June 2010 p ii http www justice gov oig reports DEA a1005 pdf 128 For more information on the NGIC see http www fbi gov about-us investigate vc_majorthefts gangs ngic 129 U S Department of Justice Office of the Inspector General A Review of the Department’s Anti-Gang Intelligence and Coordination Centers I-2010-001 November 2009 http www justice gov oig reports FBI i2010001 pdf 130 Federal Bureau of Investigation “Richard A McFeely Special Agent in Charge FBI Statement Before the Senate Judiciary Committee Wilmington Delaware ” June 20 2011 http www fbi gov news testimony information-sharingefforts-with-partners-span-many-fbi-programs 127 Congressional Research Service 24 The Interplay of Borders Turf Cyberspace and Jurisdiction time fighting networks ”131 This does not necessarily mean that it would be possible or even beneficial to make law enforcement and government entities less hierarchical However law enforcement adoption of networked practices rather than actual structure may better equip them to confront 21st century criminals 132 One such networked practice involves interagency coordination Federal law enforcement has already taken steps to network with other federal state local and international partners This model has been used for decades to combat more traditional crime and it has more recently been used to combat cybercrime For instance the FBI began embedding agents with international law enforcement partners in Romania in 2006 in order to target cyber criminals 133 FBI collaboration has since been expanded to countries including Estonia Ukraine and the Netherlands 134 These partnerships have proved beneficial in investigating and prosecuting transnational criminals For example law enforcement agencies including the FBI USSS Estonian Central Criminal Police Netherlands Police Agency National Crime Squad High Tech Crime Unit and the Netherlands National Public Prosecutor’s Office as well as the Hong Kong Police Force all contributed to investigating a criminal network involved in hacking the RBS WorldPay computer network 135 Five hackers have been indicted in the case These individuals allegedly defeated the encryption used by RBS WorldPay to protect customer information associated with the payroll card processing system Using counterfeit payroll debit cards—cards that allow employees to withdraw their regular salaries from ATMs—the hackers and their associates withdrew more than $9 million from over 2 100 ATMs across at least 280 cities around the globe—including in the United States Russia Ukraine Estonia Italy Hong Kong Japan and Canada Notably the over $9 million loss occurred in under 12 hours 136 In August 2010 Estonia extradited to the United States one of the principal leaders of the hacking ring who has since been arraigned on charges of conspiracy to commit wire fraud wire fraud conspiracy to commit computer fraud computer fraud and aggravated identity theft 137 In another case from June 2011 U S Colombian and Italian law enforcement worked together to investigate “La Oficina de Envigado ” a Colombian narcotics trafficking and money laundering network 138 The organization—a vestige of the notorious Medellín Cartel—is based in Medellín Colombia but operates internationally including in Massachusetts Authorities seized 48 bank accounts in the United States In addition officials estimate that through the course of this “The Advent of Netwar Revisited ” in Networks and Netwars The Future of Terror Crime and Militancy ed John Arquilla and David Ronfeldt p 15 132 Ibid p 18 133 Robert McMillan “FBI Embeds Cyber-Investigators in Ukraine Estonia ” PCWorld March 4 2010 http www pcworld com article 190837 fbi_embeds_cyberinvestigators_in_ukraine_estonia html Embedding agents with international law enforcement partners allows U S and foreign law enforcement to work together in the same location to counter specific threats 134 Ibid 135 RBS WorldPay is an Atlanta Georgia-based credit card processing company that is part of the Royal Bank of Scotland For more information on this case see U S Department of Justice “Alleged International Hacking Ring Caught in $9 Million Fraud ” press release November 10 2009 http www justice gov opa pr 2009 November 09crm-1212 html 136 Ibid 137 U S Department of Justice “International Hacker Arraigned After Extradition ” press release August 6 2010 http www justice gov usao gan press 2010 08-06-10 pdf 138 For more information see Drug Enforcement Administration “Twenty Alleged Members and Associates of Colombia’s Largest Drug Cartel Charged ” press release June 2 2011 http www justice gov dea pubs states newsrel 2011 boston060211 html 131 Congressional Research Service 25 The Interplay of Borders Turf Cyberspace and Jurisdiction operation known as “Operation Fire and Ice ” they seized over $200 million in cash over 1 100 kilograms of cocaine and 46 kilograms of heroin around the world 139 Federal law enforcement agencies may work with one another and with their international counterparts either informally or through formal agreements to counter the transnational nature of crimes—both traditional and cyber For example the United States is a signatory to the United Nations Convention Against Transnational Organized Crime as well as the Council of Europe’s Convention on Cybercrime and participates in the Group of 8 G8 140 High Tech Crime Subgroup as discussed below United Nations Convention Against Transnational Organized Crime The United Nations Convention Against Transnational Organized Crime is the primary international tool for combating organized crime 141 In 2005 the United States ratified the convention as well as the companion protocols on trafficking in persons and smuggling of migrants Among other provisions the convention provides for greater law enforcement cooperation and mutual legal assistance across nations where there were no previous agreements for such assistance The convention also requires signatories to criminalize certain offenses such as participation in an organized criminal group money laundering corruption and obstruction of justice It also requires the enhancement of training and technical assistance to combat transnational organized crime By ratifying the convention in 2005 Congress took a step in working with foreign governments and law enforcement agencies to combat multi-national and multi-jurisdictional organized crime Given the increasingly transnational nature of organized crime this coordination with international organizations is seen as essential 142 Council of Europe Convention on Cybercrime The Council of Europe’s Convention on Cybercrime was developed in 2001 to address several categories of crimes committed via the Internet and other information networks 143 It is the first international treaty on this issue and its primary goal is to “pursue a common criminal policy aimed at the protection of society against cybercrime especially by adopting appropriate legislation and fostering international co-operation ” To date 47 countries are signatories to the convention and 31 of these—including the United States—have ratified it 144 “Drug money laundering ring with ties to Colombia and Italy busted in Boston ” The Boston Globe June 2 2011 http www boston com news local breaking_news 2011 06 multi-million_m html 140 The G8 was established in 1975 as a forum for world leaders to discuss economic issues It has since expanded to include subgroups one of which focuses on high tech crime 141 United Nations Office of Drugs and Crime United Nations Convention Against Transnational Organized Crime and the Protocols Thereto United Nations New York 2004 142 From remarks by Bruce Swartz Deputy Assistant Attorney General Criminal Division U S Department of Justice at U S Congress Senate Committee on Foreign Relations Hearing on Law Enforcement Treaties Treaty Doc 107-18 Inter-American Convention Against Terrorism Treaty Doc 108-6 Protocol of Amendment to the International Convention on the Simplification and Harmonization of Customs Procedures Treaty Doc 108-11 Council of Europe Convention on Cybercrime Treaty Doc 108-16 U N Convention Against Transnational Organized Crime and Protocols on Trafficking in Persons and Smuggling of Migrants 108th Cong 2nd sess June 17 2004 pp 29-37 143 For more information on the Convention see archived CRS Report RS21208 Cybercrime The Council of Europe Convention by Kristin Archick A copy of the Convention is available at http conventions coe int Treaty EN Treaties html 185 htm 144 The U S Senate ratified the Convention on August 3 2006 For the current list of signatories and ratifications see http conventions coe int Treaty Commun ChercheSig asp NT 185 CM 1 DF CL ENG 139 Congressional Research Service 26 The Interplay of Borders Turf Cyberspace and Jurisdiction As mentioned not all activities considered to be crimes in one country are also considered criminal acts in another Further there is not a harmonized view on what constitutes cyber or computer-related crime Signatories to the convention however must define criminal offenses and sanctions under their domestic laws for four categories of computer-related crimes security breaches such as hacking illegal data interception and system interferences that compromise network integrity and availability fraud and forgery child pornography and copyright infringements The convention also requires signatories to establish domestic procedures for detecting investigating and prosecuting computer crimes as well as collecting electronic evidence of any criminal offense It also requires that signatories engage in international cooperation “to the widest extent possible ” G8 High Tech Crime Subgroup DOJ is a key player in U S participation in the G8 Subgroup on High Tech Crime In 1996 the G8 created the Lyon group of experts on transnational organized crime These experts developed Forty Recommendations to combat transnational organized crime Subsequently the G8 created various subgroups one of which is a High Tech Crime subgroup to address various crime-related issues 145 The subgroup has created a Network for 24-Hour Points of Contact for high tech crime It has negotiated an action plan and a set of widely accepted principles to combat high tech crime It has also created numerous best practices documents such as guides for securing computer networks requesting international assistance drafting legislation and tracing networked communications across borders The subgroup has assessed threats and the impact on law enforcement from new technology such as encryption as well as malicious Internet activities such as viruses and worms It has also sponsored training conferences for cybercrime agencies as well as conferences for law enforcement and industry on improved cooperation 146 Interagency Agreements One mechanism that federal law enforcement agencies have used to try to minimize jurisdictional discrepancies and coordinate work is through interagency agreements and Memoranda of Understanding MOUs For instance on June 30 2009 ATF and ICE signed an MOU citing a shared jurisdiction in combating criminal organizations engaging in violent crime and drug trafficking The agencies agreed to involve one another in cases of shared jurisdiction and to enhance information sharing in such cases 147 The DOJ OIG found that despite this MOU ATF and ICE do not work together effectively on investigations of firearms trafficking to Mexico and therefore ATF’s Project Gunrunner cases do not benefit from ICE’s intelligence and prosecutorial options ATF and ICE rarely conduct joint investigations of firearms trafficking to Mexico do not consistently notify each other of their firearms trafficking cases and do not consistently coordinate their investigative work with each other 148 145 U S Department of Justice Background on the G8 http www justice gov criminal cybercrime g82004 g8_background html 146 Ibid 147 Statement of Janice Ayala Deputy Assistant Director Office of Investigations U S Immigration and Customs Enforcement Department of Homeland Security before the U S Congress House Committee on Homeland Security Subcommittee on Border Maritime and Global Counterterrorism Cargo Security at Land Ports of Entry Are We Meeting the Challenge 111th Cong 1st sess October 22 2009 148 U S Department of Justice Office of the Inspector General Review of ATF’s Project Gunrunner I-2011-001 November 2010 p vi http www justice gov oig reports ATF e1101 pdf Congressional Research Service 27 The Interplay of Borders Turf Cyberspace and Jurisdiction The OIG attributed this lack of information sharing to both an unawareness of the MOU’s existence as well as misunderstanding of its purpose ICE also shares an interagency cooperation agreement with the DEA that has been in effect since June 18 2009 The agencies agree to share information through the DEA’s Special Operations Division the Organized Crime Drug Enforcement Task Force OCDETF program Fusion Center and EPIC The agreement also allows ICE to select agents for cross-designation by the DEA Administrator and permits these ICE agents to investigate narcotics smuggling with a clear nexus to the U S border It also provides procedures for deconfliction149 and operational coordination in domestic and international cases 150 On August 10 2009 ICE and DOJ signed two MOUs to enhance information sharing at the OCDETF Fusion Center and the International Organized Crime Intelligence and Operations Center IOC-2 151 It is unknown however how well the agreements and MOUs between ICE and DEA as well as between ICE and DOJ have reduced any turf battles in their areas of overlapping jurisdiction Fusion Centers and Task Forces As modern law enforcement operations have become increasingly intelligence-led agencies have come to rely heavily on fusion centers and task forces According to DHS fusion centers and task forces with specific reference to Joint Terrorism Task Forces or JTTFs serve “distinct but complementary roles ”152 Fusion centers have been defined as a “collaborative effort of two or more Federal state local or tribal government agencies that combines resources expertise or information with the goal of maximizing the ability of such agencies to detect prevent investigate apprehend and respond to criminal or terrorist activity ”153 DHS has indicated that F usion centers serve as focal points within the state and local environment for the receipt analysis gathering and sharing of threat-related information among federal and state local tribal and territorial SLTT partners They produce actionable intelligence for dissemination which can aid other law enforcement organizations including the JTTFs in their investigative operations 154 While fusion centers are generally intelligence-based law enforcement task forces appear to be generally operational in nature 155 These multi-jurisdictional entities are established to counter a According to DOJ deconfliction means “ensure ing that two or more agencies are not duplicating resources or that one agency’s investigation will not have a negative impact on another agency’s investigation ” In other words deconfliction is intended in part to reduce turf battles See U S Department of Justice “ICE and DOJ Sign Agreements to Share Information on Drug Trafficking and Organized Crime ” press release August 10 2009 http www justice gov opa pr 2009 August 09-crm-784 html 150 Statement of Janice Ayala Deputy Assistant Director Office of Investigations U S Immigration and Customs Enforcement Department of Homeland Security before the U S Congress House Committee on Homeland Security Subcommittee on Border Maritime and Global Counterterrorism Cargo Security at Land Ports of Entry Are We Meeting the Challenge 111th Cong 1st sess October 22 2009 151 U S Department of Justice “ICE and DOJ Sign Agreements to Share Information on Drug Trafficking and Organized Crime ” press release August 10 2009 http www justice gov opa pr 2009 August 09-crm-784 html 152 Department of Homeland Security Fusion Centers and Joint Terrorism Task Forces February 28 2011 http www dhs gov files programs gc_1298911926746 shtm 153 P L 110-53 Aug 3 2007 §511 121 STAT 322 Amends Homeland Security Act of 2002 by adding §210A j 154 Department of Homeland Security Fusion Centers and Joint Terrorism Task Forces February 28 2011 http www dhs gov files programs gc_1298911926746 shtm 155 There are some entities that are hybrid centers focusing both on intelligence and operations The National Counter Terrorism Center NCTC for example is a center for joint intelligence and operational planning Similarly the National Intellectual Property Rights Coordination Center IPR Center serves as an information repository as well as a 149 Congressional Research Service 28 The Interplay of Borders Turf Cyberspace and Jurisdiction specific threat such as violent gangs156 or online fraud 157 The sections below discuss selected fusion centers and task forces Fusion Center Model The majority of fusion centers located in states and major urban areas throughout the country were created post-9 11 though interagency information sharing centers had been emerging since at least the 1990s 158 One precursor to the formal fusion center concept is the High Intensity Drug Trafficking Area HIDTA program The HIDTA program originally authorized by the Anti-Drug Abuse Act of 1988 P L 100-690 159 provides assistance to federal state and local law enforcement operating in areas deemed as the most impacted by drug trafficking Each HIDTA is governed by a separate executive board comprised of about eight federal agencies and eight state or local agencies The program’s main goals are to assess regional drug threats develop strategies focusing efforts on combating drug trafficking threats create and fund initiatives to improve these strategies facilitate coordination between federal state and local efforts and produce efficient drug control efforts to reduce eliminate the impact of drug trafficking 160 The Director of the Office of National Drug Control Policy ONDCP has the authority to designate areas within the United States and its territories that are centers of illegal drug production manufacturing importation or distribution as HIDTAs—of which there are currently 28 161 The Southwest Border Region HIDTA for example includes portions of California Arizona New Mexico and Texas The HIDTA collects and shares intelligence and coordinates task forces composed of federal state and local agencies that target drug-trafficking operations along the border In one case from June 2011 the Milwaukee WI HIDTA was involved in the indictments of 24 individuals involved in a drug trafficking and illegal gambling ring Couriers in the network transported hundreds of pounds of marijuana from Seattle WA and Vancouver BC place to develop initiatives and coordinate law enforcement investigations 156 The FBI leads 160 Violent Gang Safe Streets Task Forces around the country For more information see http www fbi gov about-us investigate vc_majorthefts gangs violent-gangs-task-forces 157 The USSS leads 28 Electronic Fraud Task Forces Information provided to CRS by USSS Congressional Affairs For more information see http www secretservice gov ectf shtml 158 For more information on fusion centers see archived CRS Report RL34070 Fusion Centers Issues and Options for Congress by John Rollins 159 21 U S C §1706 160 Office of National Drug Control Policy The High-Intensity Drug Trafficking Area Program An Overview http whitehousedrugpolicy gov hidta overview html 161 Ibid Four main criteria are considered when designating an area as a HIDTA “ 1 the extent to which the area is a significant center of illegal drug production manufacturing importation or distribution 2 the extent to which State local and tribal law enforcement agencies have committed resources to respond to the drug trafficking problem in the area thereby indicating a determination to respond aggressively to the problem 3 the extent to which drug-related activities in the area are having a significant harmful impact in the area and in other areas of the country and 4 the extent to which a significant increase in allocation of Federal resources is necessary to respond adequately to drug related activities in the area ” Congressional Research Service 29 The Interplay of Borders Turf Cyberspace and Jurisdiction to Minnesota Wisconsin and Illinois and transported bulk cash—about $1 3 million in proceeds from drug sales and illegal gambling—back to the Pacific Northwest 162 Several law enforcement fusion centers have been created to target criminal networks including the Organized Crime Drug Enforcement Task Force OCDETF Fusion Center OFC the International Organized Crime Intelligence and Operations Center IOC-2 the National Gang Intelligence Center NGIC and the El Paso Intelligence Center EPIC They are charged with consolidating and disseminating intelligence on various organized crime matters For instance the OFC assimilates information for the OCDETF Program targeting major drug trafficking and money laundering organizations The IOC-2—housed at the OFC—was created by DOJ in 2009 to bring together the FBI ICE DEA IRS ATF USSS USPIS U S Department of State Bureau of Diplomatic Security U S Department of Labor Office of the Inspector General and DOJ’s Criminal Division in partnership with the 94 U S Attorneys’ Offices and the U S Department of the Treasury Office of Terrorism and Financial Intelligence The IOC-2 is charged with analyzing and resolving information conflicts on a host of organized crime cases not solely those that center on drug trafficking Despite successes using the fusion center model not all fusion centers have been funded While NGIC EPIC and the OFC have received funding the IOC-2 has not One issue that Congress may consider is whether such intelligence-sharing centers bolster federal law enforcement’s abilities to combat networked trans-border crime If they are effective Congress may debate whether increasing resources for existing centers would in turn increase law enforcement operations Increased funding could boost law enforcement investigations in number and or in quality One question surrounding any increase in funding for investigations is whether enhanced investigative resources are balanced with complementary resources for prosecutions If policy makers enable law enforcement to investigate a greater number of cases they may chose to consider whether they are balancing investigative resources with prosecutorial resources With respect to the coordination of federal efforts to combat criminal networks one nonlegislative option that Congress may consider is enforcing its oversight over existing fusion centers As mentioned in June 2010 the DOJ Office of the Inspector General OIG issued a review of EPIC The review suggested that while EPIC’s users value its products EPIC could gain from fully developing the National Seizure System and coordinating the HIDTA program consistently coordinating with intelligence organizations across the country maintaining and analyzing current information from all available sources and creating objective performance measures by which to evaluate its programs among other things 163 Before determining whether to increase decrease or maintain funding for existing fusion centers policy makers may debate whether these centers have taken measures to most effectively obtain their respective goals For instance has EPIC taken measures to analyze current information from all its available resources or has the OFC effectively used its resources to pursue CPOT targets Task Force Model Federal law enforcement has increasingly relied on the task force model to coordinate investigations One such task force is the Organized Crime Drug Enforcement Task Force OCDETF program The OCDETF program targets—with the intent to disrupt and dismantle— U S Department of Justice “Twenty-Four Defendants Federally Indicted in Southeast Wisconsin Drug Trafficking and Illegal Gambling Case ” press release June 2 2011 http www justice gov usao wie press_releases 2011 pr20110602_24_Defendants_Indicted_Drug_Trafficking-Illegal_Gambling pdf 163 U S Department of Justice Office of the Inspector General Review of the Drug Enforcement Administration’s El Paso Intelligence Center I-2010-005 June 2010 p ii http www justice gov oig reports DEA a1005 pdf 162 Congressional Research Service 30 The Interplay of Borders Turf Cyberspace and Jurisdiction major drug trafficking and money laundering organizations Federal agencies that participate in the OCDETF Program include the DEA FBI ICE ATF U S Marshals Internal Revenue Service IRS U S Coast Guard USCG the 94 U S Attorneys Offices USAOs and DOJ’s Criminal and Tax Divisions These federal agencies also collaborate with state and local law enforcement The OCDETFs operate in nine regions around the country and target those organizations that have been identified on the Consolidated Priority Organization Targets CPOT List which is the “most wanted” list for leaders of drug trafficking and money laundering organizations 164 In FY2011 OCDETF filed 3 031 cases with the U S Attorneys Offices 165 While OCDETFs operate throughout the country Border Enforcement Security Taskforces BESTs operate along the northern and southern borders The BEST initiative consists of a series of multi-agency investigative task forces of which ICE is the lead agency 166 They seek to identify disrupt and dismantle criminal organizations posing significant threats to border security along both borders Other agency participants include CBP DEA ATF FBI USCG and the U S Attorneys Offices and state and local law enforcement The Mexican law enforcement agency Secretaria de Seguridad Publica is a partner along the Southwest border On the northern border Canadian law enforcement agencies like the Canada Border Services Agency the Royal Canadian Mounted Police the Ontario Provincial Police the Niagara Regional Police Service the Toronto Metropolitan Police the Windsor Police Service and the Amherstburg Police Service are active members The Argentinean customs agency is part of the Miami BEST and the Colombian National Police is part of both the Miami and New York-New Jersey BESTs Currently there are 21 BESTs with locations around the United States and in Mexico Each BEST concentrates on the prevalent threats in its area On the southern border for instance this entails cross-border violence weapons smuggling and trafficking illegal drug and other contraband smuggling money laundering and bulk cash smuggling as well as human smuggling and trafficking Both policy makers and Administration officials have been concerned about financial fraud particularly as the nation emerges from the most recent economic downturn Because of these concerns President Obama established a Financial Fraud Enforcement Task Force in November 2009 167 The task force chaired by the Attorney General includes more than 20 federal agencies the U S Attorneys Offices and state and local partners It targets a range of financial crimes from mortgage fraud and identity theft to credit card fraud and Ponzi schemes For example the task force was involved in investigating and prosecuting a husband and wife team for defrauding over 250 individuals of about $1 5 million through an Internet fraud scheme The couple advertised high-end kitchen appliances on e-Bay though they were not licensed dealers of these products When customers bought the advertised items the team of perpetrators used this money to purchase luxury items and stocks and did not to deliver the merchandise 168 One task force centered around cyber threats is the National Cyber Investigative Joint Task Force NCIJTF led by the FBI The NCIJTF includes 18 law enforcement and intelligence agencies that work together to counter a variety of cyber threats including national security intrusions criminal intrusions online child pornography intellectual property rights violations and Internet 164 U S Department of Justice FY2012 Budget and Performance Summary Interagency Crime and Drug Enforcement ICDE http www justice gov jmd 2012summary pdf fy12-icde-bud-summary pdf 165 Data provided to CRS by USAO Congressional Affairs 166 Department of Homeland Security U S Immigration and Customs Enforcement ICE Fact Sheet Border Enforcement Security Task Forces August 2010 http www ice gov news library factsheets best htm 167 For more information see http www stopfraud gov 168 Federal Bureau of Investigation “E-Bay Fraudster Sentenced to 12½ Years in Prison ” press release May 31 2011 http www fbi gov lasvegas press-releases 2011 e-bay-fraudster-sentenced-to-12-1-2-years-in-prison Congressional Research Service 31 The Interplay of Borders Turf Cyberspace and Jurisdiction fraud 169 Within this task force model the FBI operates smaller Threat Focus Cells that center around specific types of cyber threat such as botnets 170 The Botnet Focus Cell was instrumental in countering the Mariposa botnet This botnet also known as “Butterfly Bot ” was an information-stealing botnet that infected up to 12 million computers around the world Butterfly Bot stole passwords for websites and financial institutions as well as credit card and bank account information from computer users The FBI investigated this case in collaboration with Spanish and Slovenian police who arrested both users and the creator of the botnet 171 Policy makers may choose to evaluate whether the task force model is an effective means to share information and counter emerging threats As illustrated turf battles even between agencies that have established working relationships can hinder investigations Agencies may be at odds over leadership in a given case They may also share information on a “need to know” rather than a “need to share” basis 172 Carefully protecting information however is not inherently problematic The more people who have access to information the greater the chances it can be leaked or intercepted by malicious actors The need to keep investigative information from criminals’ eyes is an incentive to keep intelligence information among as few individuals as possible 173 Nonetheless Congress may debate the appropriate level of information sharing within task forces as well as through other inter-agency forums Information Sharing Systems In addition to the benefits of operational collaboration and coordination policy makers and law enforcement have cited the value of interagency information sharing The push for information sharing has been more visible regarding the investigation of terrorism and related crimes than it has been for the investigation of more traditional crime For instance in the 2004 Intelligence Reform and Terrorism Prevention Act P L 108-458 Congress mandated the creation of an Information Sharing Environment—commonly known as the “ISE ”174 Through this act Congress also directed that the ISE provide and facilitate the means of sharing terrorism information among all appropriate federal state local and tribal entities as well as the private sector through the use of policy guidelines and technologies Congress has not directed the creation of such an U S Department of Justice Office of the Inspector General Audit Division The Federal Bureau of Investigation’s Ability to Address the National Security Cyber Intrusion Threat Audit Report 11-22 April 2011 pp ii - iii http www justice gov oig reports FBI a1122r pdf See also Federal Bureau of Investigation National Cyber Investigative Joint Task Force http www fbi gov about-us investigate cyber ncijtf 170 See remarks of Robert S Mueller III Director Federal Bureau of Investigation “International Conference on Cyber Security 2010 ” August 5 2010 http www fbi gov news speeches using-partnerships-to-combat-cyber-threats 171 Federal Bureau of Investigation “FBI Slovenian and Spanish Police Arrest Mariposa Botnet Creator Operators ” press release July 28 2010 http www fbi gov news pressrel press-releases fbi-slovenian-and-spanish-police-arrestmariposa-botnet-creator-operators 172 The continuum between need to know and need to share has most often been discussed in the arena of counterterrorism intelligence information sharing See for instance U S Congress House Committee on Government Reform Moving From “Need to Know” to Need to Share” A Review of the 9 11 Commission’s Recommendations 108th Cong 2nd sess August 3 2004 173 Michael E Buerger Karen E Gardner and Bernard H Levin et al Incorporating Local Police Agencies Into a National Intelligence Network Futures Working Group Futures Working Group White Paper Series Vol 1 No 1 July 2008 pp 42-43 http fwg cos ucf edu publications LocalIntel pdf 174 For more information on the ISE see CRS Report R40901 Terrorism Information Sharing and the Nationwide Suspicious Activity Report Initiative Background and Issues for Congress by Jerome P Bjelopera See also http www ise gov 169 Congressional Research Service 32 The Interplay of Borders Turf Cyberspace and Jurisdiction information sharing environment for the investigation of more traditional crimes in either the real or cyber worlds While there is not a sole clearinghouse for information sharing on traditional criminal investigations there are a number of databases that contain a given subset of information These include the FBI’s Law Enforcement Online Automated Fingerprint Identification System National Crime Information Center National Data Exchange and Violent Criminal Apprehension Program ATF’s Arson Explosives National Repository and Bomb Arson Tracking System and the High Intensity Drug Trafficking Area Deconfliction among others 175 Through a 2006 nationwide survey the Justice Statistics and Research Association JSRA identified 266 information sharing systems that were either in place or under development spanning 35 states and Canada 176 These systems share information about crime at the national regional state and county levels Of these systems 10% were identified as sharing national-level data When survey respondents recommended system improvements the most common suggestion involved including additional agencies in the information sharing system 177 Databases have been established to coordinate information on specific types of crime For instance the National Identity Crimes Law Enforcement NICLE was established to coordinate information on identity theft and related crimes 178 This network organized and led by the U S Attorney’s Office for the Eastern District of Pennsylvania consolidates information from local state and federal law enforcement agencies Data in NICLE is available to nearly 100 law enforcement agencies through the Regional Information Sharing System Intranet RISSNET 179 The President’s Identity Theft Task Force had recommended the establishment of a national database for law enforcement to consolidate information on identity theft 180 Public Private Partnerships Law enforcement has recognized the benefits of working with private entities in order to gather information and enhance investigations One such partnership is InfraGard through which the FBI gathers information on cybercrimes and other cases 181 InfraGard is an FBI partnership with businesses academic institutions and other law enforcement agencies Through this program the bureau can collect and disseminate information to private sector entities as well as other law enforcement partners The InfraGard program began as a means to share cybercrime information but its mission has expanded to include other crimes and threats particularly those involving 175 For more databases see the Justice Research and Statistics Association JRSA Information Sharing Systems A Survey of Law Enforcement July 31 2006 p 14 http www jrsa org pubs reports improving-crime-data Info_Sharing pdf 176 Ibid p 6 JSRA surveyed law enforcement analysts Statistical Analysis Center directors and Uniform Crime Reporting program managers 177 Ibid p 7 178 U S Department of Justice United States Attorney Eastern District of Pennsylvania Launch of the National Identity Crime Law Enforcement Network NICLE http www theiacp org investigateid pdf appendices Launch-ofthe-Natitonal-Identity-Crime-Law-Enforcement-Network-NICLE pdf 179 The RISS program is funded and administered by DOJ’s Bureau of Justice Assistance For more information see http www riss net 180 The President’s Identity Theft Task Force Combating Identity Theft A Strategic Plan April 23 2007 p 56 http www identitytheft gov reports StrategicPlan pdf 181 http www infragard net index php Congressional Research Service 33 The Interplay of Borders Turf Cyberspace and Jurisdiction critical infrastructure As of March 2010 InfraGard had more than 35 000 members across chapters in 85 U S cities 182 Similar to InfraGard is the Domestic Security Alliance Council DSAC 183 DSAC is a security and intelligence-sharing initiative between the FBI DHS and the private sector and the focus is on crimes impacting interstate commerce These include computer intrusions insider threats fraud theft of trade secrets product tampering and workplace violence As of March 2011 DSAC had nearly 200 U S private sector companies and organizations Another partnership—the Law Enforcement Retail Partnership Network LERPnet —has been established to combat organized retail crime 184 In 2006 through the Violence Against Women and Department of Justice Reauthorization Act of 2005 185 Congress directed the Attorney General and the FBI to establish a clearinghouse within the private sector for information sharing between retailers and law enforcement The result was LERPnet It began as a partnership between the FBI ICE various local police departments individual retailers and retail organizations including the Food Marketing Institute FMI National Retail Federation NRF and Retail Industry Leaders Association RILA Since January 2010 LERPnet has been linked with the FBI’s Law Enforcement Online LEO system providing federal and local law enforcement with a direct link to retail industry crime reports Technology Implementation Savvy criminals are constantly evolving their methods to stay paces ahead of law enforcement They traverse through and around physical and cyber space capitalizing on ever advancing technology to evade detection In response law enforcement has utilized an array of methods from human intelligence to advanced technology to investigate these criminals As discussed Mexican drug traffickers have dug subterranean tunnels to smuggle illicit drugs from Mexico into the United States The United States employs various tunnel detection technologies such as ground penetrating radar GPR to locate and shut down these tunnels 186 GPR is limited however by factors such as soil condition and tunnel diameter and depth Law enforcement may also use sonic equipment to detect the sounds of digging and tunnel construction as well as seismic technologies to detect blasts that may be indicative of tunnel excavation U S officials have acknowledged that law enforcement currently does not have technology that is reliably able to detect the more sophisticated tunnels 187 Rather tunnels are more effectively discovered as a result of human intelligence and tips rather than technology Indeed human intelligence or HUMINT “is the oldest method for collecting information and until the technical revolution of the mid to late twentieth century it was the primary source of intelligence HUMINT is used mainly by the CIA Central Intelligence Agency the Department of State the DoD Department of Defense and the FBI ”188 Further the Interagency Threat 182 Federal Bureau of Investigation InfraGard A Parnership That Works March 8 2010 http www fbi gov news stories 2010 march infragard_030810 183 Federal Bureau of Investigation Domestic Security Combating Crime Protecting Commerce March 14 2011 http www fbi gov news stories 2011 march security_031411 184 For more information on LERPnet see http www lerpnet2 com 185 P L 109-162 §1105 codified at 28 U S C §509 note 186 For more information see http www geophysical com militarysecurity htm 187 Ken Stier “Underground Threat Tunnels Pose Trouble from Mexico to Middle East ” Time May 2 2009 188 Office of the Director of National Intelligence How Do We Collect Intelligence http www dni gov what_collection htm Congressional Research Service 34 The Interplay of Borders Turf Cyberspace and Jurisdiction Assessment and Coordination Group ITACG at the National Counterterrorism Center has indicated that “HUMINT can often collect information that is difficult or sometimes impossible to collect by other more technical means ”189 As crime has transformed to involve more technology law enforcement has moved to keep pace Nonetheless the FBI and others continue to recognize the value of human intelligence and confidential sources informants Reportedly the FBI maintains over 15 000 such sources 190 Even in cyber investigations the FBI and other federal law enforcement agencies rely heavily on confidential sources It has been estimated that “25% of hackers in the US may have been recruited by the federal authorities to be their eyes and ears ”191 Both the FBI and the USSS have had success in infiltrating the underground world of hackers and hackers-turned-informants have worked not only with law enforcement but with the military as well For instance in 2004 Adrian Lamo a notorious hacker pled guilty to hacking into The New York Times’s internal network containing personally identifiable information of Times contributors 192 He also reportedly accessed the Times’s LexisNexis subscription account creating fictitious usernames and conducting unauthorized searches In 2010 Lamo was purportedly contacted by Bradley Manning a U S Army intelligence analyst who is alleged to have passed classified cables to Wikileaks After Manning supposedly claimed responsibility for the leaks Lamo reportedly turned Manning over to the Army and FBI 193 Despite the use of human intelligence advances in technology outmoded laws and a lack of resources training and personnel can keep law enforcement “in the dark” as criminals evade detection 194 Because of this very issue the FBI has created the “Going Dark” initiative This initiative is based on the premise that rapid changes in technology may impede the bureau’s ability to conduct electronic surveillance 195 Law enforcement has indicated that while they have the legal authorities to do so they may not have the technological capabilities Congress may debate how to best enable law enforcement to leverage their authorities and available technology to conduct necessary investigations while also protecting personal communications and privacy One concern of privacy advocates is that enabling law enforcement to more easily obtain information from communications services providers could jeopardize individuals’ privacy 196 Some have suggested that “ a lthough massive penetration into criminal communities may help curtail some unlawful activities the invasive penetration into communities 189 National Counterterrorism Center Interagency Threat Assessment and Coordination Group Intelligence Guide for First Responders p 7 http www nctc gov docs itacg_guide_for_first_responders pdf 190 Evan Ratliff “The Mark A Reporter at Large ” The New Yorker May 2 2011 p 56 191 Ed Pilkington “One in four US hackers ‘is an FBI informer’ ” The Guardian June 6 2011 http www guardian co uk technology 2011 jun 06 us-hackers-fbi-informer 192 U S Department of Justice “Hacker Pleads Guilty in Manhattan Federal Court to Illegally Accessing New York Times Computer Network ” press release January 8 2004 http www justice gov criminal cybercrime lamoPlea htm 193 Kevin Poulsen and Kim Zetter “‘I Can’t Believe What I’m Confessing to You’ The Wikileaks Chats ” Wired com June 10 2010 http www wired com threatlevel 2010 06 wikileaks-chat 194 See Freedom of Information Act FOIA documents provided by the FBI to the Electronic Frontier Foundation EFF p 120 http www eff org files 20110207_FBI_Going_Dark_Release_Part_4 pdf Links to the all relevant FOIA documents provided to the EFF are referenced by Jennifer Lynch “Newly Released Documents Detail FBI’s Plan to Expand Federal Surveillance Laws ” Electronic Frontier Foundation February 15 2011 http www eff org deeplinks 2011 02 newly-released-documents-detail-fbi-s-plan-expand 195 See Freedom of Information Act FOIA documents provided by the FBI to the Electronic Frontier Foundation EFF p 110 http www eff org files 20110207_FBI_Going_Dark_Release_Part_4 pdf 196 Declan McCullagh “FBI to Announce New Net-Wiretapping Push ” PrivacyInc February 16 2011 http news cnet com 8301-31921_3-20032518-281 html Congressional Research Service 35 The Interplay of Borders Turf Cyberspace and Jurisdiction and the absolute control over whatever happens in the digital space amount to disruption of natural rights ”197 Policy makers may weigh whether the best means to aid federal law enforcement involve bolstering authorities to use encryption-breaking technologies enhancing training of law enforcement personnel so they can best leverage existing authorities and technologies or encouraging agencies to direct their manpower and financial resources to investigating cybercrimes among other options Conclusion The operational realities of 21st century crime and policing present significant challenges to U S policy makers In particular the interplay between borders criminal turf cyberspace and law enforcement jurisdiction is such that policies directed toward countering crime in one reality will impact crime and law enforcement countermeasures in other realities As such Congress may choose to debate a host of legislative and oversight options to most effectively empower law enforcement Legislatively Congress may consider whether law enforcement has the existing authorities technology and resources—both monetary and manpower—to counter 21st century criminals For instance given that many crimes are increasingly trans-border in nature Congress may deliberate whether certain offenses are best criminalized at the state or federal level If Congress determines that these crimes may be most effectively countered at the federal level policy makers may consider expanding federal law enforcement’s statutory authorities to investigate these offenses Policy makers may also consider whether to direct existing or additional resources toward bolstering federal law enforcement agents’ skills and abilities to counter modern day threats For example Congress may direct the allocation of agent resources toward combating more traditional yet evolving crimes such as financial fraud Policy makers may also choose to direct law enforcement training to enhance agents’ technological savvy such that policing efforts can keep pace with modern-day criminals Further state and local law enforcement agencies are also tasked with countering these criminal threats As such Congress may debate whether to provide financial technological or investigative support to state and local law enforcement operations In exercising its oversight responsibilities Congress may examine whether law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information U S law enforcement has particularly since the terrorist attacks of September 11 2001 increasingly relied on intelligence-led policing enhanced interagency cooperation through formal and informal interagency agreements as well as fusion centers and task forces and technological implementation to confront 21st century crime Nonetheless there have been notable impediments in implementing effective information sharing systems and relying on up-to-date technology As such policy makers may consider what is the appropriate level of interagency information sharing and whether law enforcement is effectively achieving this goal Congress may also wish to explore whether existing inter-agency agreements are being adequately formulated implemented and overseen by the relevant agencies Jijo Jacob “FBI moles run illegal sites that deal in hackers’ loot of sensitive data ” International Business Times June 7 2011 http www ibtimes com articles 158620 20110607 fbi-hacking-hackers-hacktivists-moles-sites-lulzsecurity-lulzsec-sony-infragard-one-in-four-anonymo htm 197 Congressional Research Service 36 The Interplay of Borders Turf Cyberspace and Jurisdiction Author Information Kristin M Finklea Specialist in Domestic Security Disclaimer This document was prepared by the Congressional Research Service CRS CRS serves as nonpartisan shared staff to congressional committees and Members of Congress It operates solely at the behest of and under the direction of Congress Information in a CRS Report should not be relied upon for purposes other than public understanding of information that has been provided by CRS to Members of Congress in connection with CRS’s institutional role CRS Reports as a work of the United States Government are not subject to copyright protection in the United States Any CRS Report may be reproduced and distributed in its entirety without permission from CRS However as a CRS Report may include copyrighted images or material from a third party you may need to obtain the permission of the copyright holder if you wish to copy or otherwise use copyrighted material Congressional Research Service R41927 · VERSION 10 · UPDATED 37
OCR of the Document
View the Document >>