Dept of Treasury Letter


SUBMITTED BY: trickle999

DATE: May 15, 2019, 6:11 p.m.

FORMAT: Text only

SIZE: 11.9 kB

HITS: 393

  1. Click here first https://www.coinbase.com/join/57262bab931380250e000181
  2. then read below, very very interesting......
  3. Here is a letter from the Director of the Secret Service to US
  4. Rep. Don Edwards, D-California, in response to questions raised
  5. by Edwards' Subcommittee. This copy comes from Computer Professionals
  6. for Social Responsibility in Washington, DC.
  7. DEPARTMENT OF TREASURY
  8. UNITED STATES SECRET SERVICE
  9. WASHINGTON, DC 20223
  10. APR 30 1990
  11. The Honorable Don Edwards
  12. Chairman
  13. Subcommittee on Civil and Constitutional Rights
  14. Committee on the Judiciary
  15. House of Representatives
  16. Washington, D.C. 20515
  17. Dear Mr. Chairman:
  18. Thank you for your letter of April 3, 1990, concerning your
  19. committee's interest in computer fraud. We welcome the
  20. opportunity to discuss this issue with your committee and I
  21. hope the following responses adequately answer your
  22. questions.
  23. Question 1:
  24. Please describe the Secret Service's process for investigating
  25. computer related crimes under Title 18, United States Code,
  26. Section 1030 and any other related statutes.
  27. Response:
  28. The process by which the Secret Service investigates
  29. computer related crimes is similar to the methods we use to
  30. investigate other types of criminal investigations. Most of the
  31. investigative techniques are the same; surveillances, record
  32. checks, witness and suspect interviews, etc. the primary
  33. difference is we had to develop resources to assist in the
  34. collection and review of computer evidence.
  35. To provide our agents with this expertise, the secret service
  36. developed a computer fraud investigation course which, as of
  37. this date, has trained approximately 150 agents in the proper
  38. methods for conducting a computer fraud investigation.
  39. Additionally, we established a computer Diagnostics center,
  40. staffed with computer professional, to review evidence on
  41. computer systems.
  42. Referrals of computer related criminal investigations occur in
  43. much the same manner as any other case. A victim sustains a
  44. loss and reports the crime, or, a computer related crime is
  45. discovered during the course of another investigation.
  46. In the investigations we do select, it is not our intention to
  47. attempt to supplant local or state law enforcement. We
  48. provide enforcement in those cases that are interstate or
  49. international in nature and for one reason or another are
  50. beyond the capability of state and local law enforcement
  51. agencies.
  52. When computer related crimes are referred by the various
  53. affected industries to the local field offices, the Special
  54. Agent in Charge (SAIC) determines which cases will be
  55. investigated based on a variety of criteria. Each SAIC must
  56. consider the economic impact of each case, the prosecutive
  57. guidelines of the United States Attorney, and the investigative
  58. resources available in the office to investigate the case .
  59. In response to the other portion of your question, the other
  60. primary statute we use to investigate computer related crimes
  61. is Title 18, United States Code, Section 1029 ( Access Device
  62. Fraud). This service has primary jurisdiction in those cases
  63. which are initiated outside a bank and do not involve
  64. organized crime, terrorism, or foreign counterintelligence
  65. (traditional responsibilities of the FBI).
  66. The term "access device" encompasses credit cards, debit
  67. cards, automatic teller machines (ATM) cards, personal
  68. identification numbers (PIN's) used to activate ATM machines,
  69. credit or debit card account numbers, long distance telephone
  70. access codes, computer passwords and logon sequences, and
  71. among other things the computer chips in cellular car phones
  72. which assign billing.
  73. Additionally, this Service has primary jurisdiction in cases
  74. involving electronic fund transfers by consumer (individuals)
  75. under Title 15, U. S. code, section 169n (Electronic Fund
  76. Transfer Act). This could involve any scheme designed to
  77. defraud EFT systems used by the public, such as pay by phone
  78. systems, home banking, direct deposit, automatic payments,
  79. and violations concerning automatic teller machines. If the
  80. violations can be construed to be a violation of the banking
  81. laws by bank employee, the FBI would have primary
  82. jurisdiction.
  83. There are many other statutes which have been used to
  84. prosecute computer criminals but it is within the purview of
  85. the U.S. Attorney to determine which statute will be used to
  86. prosecute an individual.
  87. Question 2:
  88. Has the Secret Service ever monitored any computer bulletin
  89. boards or networks? Please describe the procedures for
  90. initiating such monitoring, and list those computer bulletin
  91. boards or networks monitored by the Secret Service since
  92. January 1988.
  93. Response:
  94. Yes, we have occasionally monitored computer bulletin boards.
  95. The monitoring occurred after we received complaints
  96. concerning criminal activity on a particular computer bulletin
  97. board. The computer bulletin boards were monitored as part of
  98. an official investigation and in accordance with the directives
  99. of the Electronic Communications Privacy Act of 1986 (Title
  100. 18 USC 2510)
  101. The procedures used to monitor computer bulletin boards
  102. during an official investigation have involved either the use of
  103. an informant (under the direct supervision of the investigating
  104. agent) or an agent operating in an undercover capacity. In
  105. either case, the informant or agent had received authorization
  106. from the computer bulletin board's owner/operator to access
  107. the system.
  108. We do not keep records of the bulletin boards which we have
  109. monitored but can provide information concerning a particular
  110. board if we are given the name of the board.
  111. Question 3:
  112. Has the Secret Service or someone acting its direction ever
  113. opened an account on a computer bulletin board or network?
  114. Please describe the procedures for opening such an account and
  115. list those bulletin boards or networks on which such accounts
  116. have been opened since January 1988.
  117. Response:
  118. Yes, the U.S. Secret Service has on many occasions, during the
  119. course of a criminal investigation, opened accounts on
  120. computer bulletin boards or networks.
  121. The procedure for opening an account involves asking the
  122. system administrator/operator for permission to access to the
  123. system. Generally, the system administrator/operator will
  124. grant everyone immediate access to the computer bulletin
  125. board but only for lower level of the system. The common
  126. "pirate" computer bulletin boards associated with most of
  127. computer crimes have many different level in their systems.
  128. The first level is generally available to the public and does not
  129. contain any information relation to criminal activity. Only
  130. after a person has demonstrated unique computer skills, been
  131. referred by a known "hacker," or provided stolen long-distance
  132. telephone access codes or stolen credit card account
  133. information, will the system administrator/operator permit a
  134. person to access the higher levels of the bulletin board system
  135. which contains the information on the criminal activity.
  136. As previously reported in our answer for Question 2, we do not
  137. keep records of the computer bulletin boards on which we have
  138. established accounts.
  139. Question 4:
  140. Has the Secret Service os0someone acting under its direction
  141. ever created a computer bulletin board or network that was
  142. offered to the public? Please describe any such bulletin board
  143. or networks.
  144. Response:
  145. No, the U. S. Secret Service has not created a computer bulletin
  146. board nor a network which was offered to members of the
  147. public. We have created an undercover bulletin board which
  148. was offered to a select number of individuals who had
  149. demonstrated an interest in conducting criminal activities.
  150. This was done with the guidance of the U.S. Attorney's office
  151. and was consistent with the Electronic Communications
  152. Privacy Act.
  153. Question 5:
  154. Has the Secret Service ever collected, reviewed or
  155. "downloaded" transmissions or information from any computer
  156. network or bulletin board? What procedures does the Secret
  157. Service have for obtaining information from computer bulletin
  158. boards or networks? Please list the occasions where
  159. information has been obtained since January 1988, including
  160. the identity of the bulletin boards or networks, the type of
  161. information obtained, and how that information was obtained
  162. (was it downloaded, for example).
  163. Response:
  164. Yes, during the course of several investigations, the U. S.
  165. Secret Service has "down loaded" information from computer
  166. bulletin boards. A review of information gained in this manner
  167. (in an undercover capacity after being granted access to the
  168. system by it's system administrator) is performed in order to
  169. determine whether or not that bulletin board is being used to
  170. traffic in unauthorized access codes or to gather other
  171. information of a criminal intelligence nature. At all times,
  172. our methods are in keeping with the procedures as outlined in
  173. the Electronic Communications Privacy Act (ECPA).
  174. If a commercial network was suspected of containing
  175. information concerning a criminal activity, we would obtain
  176. the proper court order to obtain this information in keeping
  177. with the ECPA.
  178. The U. S. Secret Service does not maintain a record of the
  179. bulletin boards we have accessed.
  180. Question 6:
  181. Does the Secret Service employ, or is it considering employing,
  182. any system or program that could automatically review the
  183. contents of a computer file, scan the file for key items,
  184. phrases or data elements, and flag them or recommend further
  185. investigative action? If so, what is the status of any such
  186. system. Please describe this system and research being
  187. conducted to develop it.
  188. Response:
  189. The Secret Service has pioneered the concept of a Computer
  190. Diagnostic Center (CDC) to facilitate the review and
  191. evaluation of electronically stored information. To streamline
  192. the tedious task of reviewing thousands of files per
  193. investigation, we have gathered both hardware and software
  194. tools to assist our search of files for specific information or
  195. characteristics. Almost all of these products are
  196. commercially developed products and are available to the
  197. public. It is conceivable that an artificial intelligence process
  198. may someday be developed and have application to this law
  199. enforcement function but we are unaware if such a system is
  200. being developed.
  201. The process of evaluating the information and making
  202. recommendations for further investigative action is currently
  203. a manual one at our CDC. We process thousands of computer
  204. disks annually as well as review evidence contained in other
  205. types of storage devices (tapes, hard drives, etc.). We are
  206. constantly seeking ways to enhance our investigative mission.
  207. The development of high tech resources like the CDC saved
  208. investigative manhours and assist in the detection of criminal
  209. activity.
  210. Again, thank you for your interest. Should you have any further
  211. questions, we will be happy to address them.
  212. Sincerely,
  213. /s/
  214. John R. Simpson, Director
  215. cc: Honorable Charles E. Schumer

comments powered by Disqus