Calendar No. 546 104th Congress Report SENATE 2d Session 104-359 _______________________________________________________________________ THE INDUSTRIAL ESPIONAGE ACT OF 1996 _______ August 27, 1996.--Ordered to be printed Filed under authority of the order of the Senate of August 2, 1996 _______________________________________________________________________ Mr. Hatch, from the Committee on the Judiciary, submitted the following R E P O R T [To accompany S. 1556] The Committee on the Judiciary, to which was referred the bill (S. 1556) to amend provisions of title 18, United States Code, with respect to the prohibition of industrial espionage, and for other purposes, having considered the same, reports favorably thereon, with an amendment in the nature of a substitute, and recommends that the bill, as amended, do pass. CONTENTS Page I. Purpose..........................................................4 II. Legislative history..............................................4 III. Discussion.......................................................5 IV. Section-by-section analysis.....................................13 V. Regulatory impact statement.....................................18 VI. Cost estimate...................................................18 VII. Changes in existing law.........................................19 The amendment is as follows: Strike all after the enacting clause and insert the following: SECTION 1. SHORT TITLE. This Act may be cited as the ``Industrial Espionage Act of 1996.'' SEC. 2. FINDINGS AND PURPOSES. (a) Findings.--Congress finds that-- (1) sustaining a healthy and competitive national economy is imperative; (2) the development and production of proprietary economic information involves every aspect of interstate commerce and business; (3) the development, production, protection, and lawful exchange, sale, and transfer of proprietary economic information is essential to maintaining the health and competitiveness of interstate commerce and the national economy; (4) much proprietary economic information moves in interstate and foreign commerce and proprietary economic information that does not move in interstate or foreign commerce directly and substantially affects proprietary economic information that does; (5) the theft, wrongful destruction or alteration, misappropriation, and wrongful conversion of proprietary economic information substantially affects and harms interstate commerce, costing United States firms, businesses, industries, and consumers millions of dollars each year; and (6) enforcement of existing State laws protecting proprietary economic information is frustrated by the ease with which stolen or wrongfully appropriated proprietary economic information is transferred across State and national boundaries. (b) Purpose.--The purpose of this Act is-- (1) to promote the development and lawful utilization of United States proprietary economic information produced for, or placed in, interstate and foreign commerce by protecting it from theft, wrongful destruction or alteration, misappropriation, and conversion; and (2) to secure to authors and inventors the exclusive right to their respective writings and discoveries. SEC. 3. PREVENTION OF ECONOMIC ESPIONAGE AND PROTECTION OF PROPRIETARY ECONOMIC INFORMATION IN INTERSTATE AND FOREIGN COMMERCE. (a) In General.--Title 18, United States Code, is amended by inserting after chapter 89 the following new chapter: ``CHAPTER 90--PROTECTION OF PROPRIETARY ECONOMIC INFORMATION ``Sec. ``1831. Definitions. ``1832. Criminal activities affecting proprietary economic information. ``1833. Criminal forfeiture. ``1834. Import and export sanctions. ``1835. Extraterritoriality. ``1836. Construction with other laws. ``1837. Preservation of confidentiality. ``1838. Prior authorization requirement. ``1839. Law enforcement and intelligence activities. ``1831. Definitions ``As used in this chapter: ``(1) The term `person' means a natural person, corporation, agency, association, institution, or any other legal, commercial, or business entity. ``(2) The term `proprietary economic information' means all forms and types of financial, business, scientific, technical, economic, or engineering information, including data, plans, tools, mechanisms, compounds, formulas, designs, prototypes, processes, procedures, programs, codes, or commercial strategies, whether tangible or intangible, and whether stored, complied, or memorialized physically, electronically, graphically, photographically, or in writing that-- ``(A) the owner thereof has taken reasonable measures to keep such information confidential; and ``(B) the information derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable, acquired, or developed by legal means by the public. The term does not include any knowledge, experience, training, or skill that a person lawfully has acquired due to his work as an employee of or as an independent contractor for any person. ``(3) The term `owner' means the person or persons in whom, or United States Government component, department, or agency in which, rightful legal, beneficial, or equitable title to, or license in, proprietary economic information is reposed. ``(4) The term `United States person' means-- ``(A) in the case of a natural person, a United States citizen or permanent resident alien; and ``(B) in the case of a nonnatural person, an entity substantially owned or controlled by the United States Government or by United States citizens or permanent resident aliens, or incorporated in the United States. ``(5) The term `without authorization' means not permitted, expressly or implicitly, by the owner. ``1832. Criminal activities affecting proprietary economic information ``(a) Any person, with intent to, or reason to believe that it will, injure any owner of proprietary economic information having a value of not less than $100,000 and with intent to convert it to his or her own use or benefit or the use or benefit of another, who knowingly-- ``(1) steals, or without authorization appropriates, takes, carries away, or conceals, or by fraud, artifice, or deception obtains such information; ``(2) without authorization copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys such information; ``(3) receives, buys, or possesses such information, knowing the same to have been stolen or appropriated, obtained, or converted without authorization; ``(4) attempts to commit any offense described in paragraphs (1) through (3); ``(5) wrongfully solicits another to commit any offense described in paragraphs (1) through (3); or ``(6) conspires with one or more other persons to commit any offense described in paragraphs (1) through (3), and one or more of such persons do any act to effect the object of the conspiracy, shall, except as provided in subsection (b), be fined up to $250,000, or twice the value of the proprietary economic information, whichever is greater, or imprisoned not more that 10 years, or both. ``(b) Any corporation that commits any offense described in paragraphs (1) through (6) of subsection (a) shall be fined up to $10,000,000, or twice the economic value of the proprietary economic information, whichever is greater. ``(c) This section does not prohibit the reporting of any suspected criminal activity or regulatory violation to any appropriate agency or instrumentality of the United States, or a political subdivision of a State, or to Congress. ``1833. Criminal forfeiture ``(a) Notwithstanding any provision of State law, any person convicted of a violation under this chapter shall forfeit to the United States-- ``(1) any property constituting or derived from, any proceeds the person obtained, directly or indirectly, as the result of such violation; and ``(2) any of the person's property used, or intended to be used, in any manner or part to commit or facilitate the commission of such violation. ``(b) the court, in imposing a sentence on such person, shall order, in addition to any other sentence imposed pursuant to this chapter, that the person forfeit to the United States all property described in this section. ``(c) Property subject to forfeiture under this section, any seizure and disposition thereof, and any administrative or judicial proceeding in relation thereto, shall be governed by section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853), except for subsection 413(d) which shall not apply to forfeitures under this section. ``(d) Notwithstanding section 524(c) of title 28, there shall be deposited in the Crime Victims Fund established under section 1402 of the Victims of Crime Act of 1984 (42 U.S.C. 10601) all amounts from the forfeiture of property under this section remaining after the payment of expenses and sale authorized by law. ``1834. Import and export sanctions ``(a) The President may, to the extent consistent with international agreements to which the United States is a party, prohibit, for a period of not longer than 5 years, the importation into, or exportation from, the United States, whether by carriage of tangible items or by transmission, any merchandise produced, made, assembled, or manufactured by a person convicted of any offense described in section 1832 of this title, or in the case of an organization convicted of any offense described in such section, its successor entity or entities. ``(b)(1) The Secretary of the Treasury may impose on any other person who knowingly violates any order of the President issued under the authority of this section, a civil penalty equal to not more than 5 times the value of the exports or imports involved, or $100,000, whichever is greater. ``(2) Any merchandise imported or exported in violation of an order of the President issued under this section shall be subject to seizure and forfeiture in accordance with sections 602 through 619 of the Tariff Act of 1930. ``(3) The provisions of law relating to seizure, summary and judicial forfeiture, and condemnation of property for violation of the United States customs laws, the disposition of such property or the proceeds from the sale thereof, the remission or mitigation of such forfeiture, and the compromise of claims, shall apply to seizures and forfeitures incurred, or alleged to have been incurred under this section to the extent that they are applicable and not inconsistent with the provisions of this chapter. ``1835. Extraterritoriality ``(a) This chapter applies to conduct occurring within the United States. ``(b) This chapter applies to conduct occurring outside the territorial and special maritime jurisdiction of the United States, its territories, and possessions if-- ``(1) the offender is a United States person; or ``(2) an act in furtherance of the offence was committed in the United States. ``1836. Construction with other laws ``This chapter shall not be construed to preempt or displace any other Federal or State remedies, whether civil or criminal, for the misappropriation of proprietary economic information, or to affect the otherwise lawful disclosure of information by any government employee under section 552 of title 5 (commonly known as the Freedom of Information Act). ``1837. Preservation of confidentiality ``In any prosecution under this chapter, the court may enter such orders and take such other action as may be necessary and appropriate to preserve the confidentiality of proprietary economic information, consistent with rule 16 of the Federal Rules of Criminal Procedure, the Federal Rules of Evidence, and other applicable laws. An interlocutory appeal by the United States shall lie from a decision or order of a district court authorizing the disclosure of proprietary economic information. ``1838. Prior authorization requirement ``The United States may not file a charge under this chapter or use a violation of this chapter as a predicate offense under any other law without the personal approval of the Attorney General, the Deputy Attorney General, or the Assistant Attorney General for the Criminal Division of the Department of Justice. ``1839. Law enforcement and intelligence activities ``This chapter does not prohibit any and shall not impair otherwise lawful activity conducted by any agency or instrumentality of the United States, a State, or a political subdivision of a State, or an intelligence agency of the United States.''. (b) Technical Amendment.--The table of chapters for title 18, United States Code, is amended by inserting after the item relating to chapter 89 the following new item: ``90. Protection of Proprietary Economic Information........... 1831''. SE SEC. 4. WIRE AND ELECTRONIC COMMUNICATIONS INTERCEPTION AND INTERCEPTION OF ORAL COMMUNICATIONS. Section 2516(1)(a) of title 18, United States Code, is amended by inserting ``chapter 90 (relating to economic espionage and protection of proprietary economic information in interstate and foreign commerce),'' after ``title:''. I. Purpose The Industrial Espionage Act of 1996, S. 1556, would provide for Federal criminal penalties for the theft, unauthorized appropriation, or other misuse of proprietary economic information. II. Legislative History The basis for the protection of proprietary economic information is rooted in the U.S. Constitution, which explicitly grants Congress the power ``to promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries,'' U.S. Const. art. I, sec. 8, cl. 8, and which also gives Congress the power ``[t]o regulate Commerce * * * among the several States.'' U.S. Const. art. I, sec. 8, cl. 3. The goal of this legislation is to punish the theft, unauthorized appropriation, or unauthorized dissemination of proprietary economic information. This legislation was introduced by Senators Kohl and Specter on February 1, 1996, in the 104th Congress. On February 28, 1996, the Subcommittee on Terrorism, Technology and Government Information held a hearing jointly with the Select Committee on Intelligence on the measure and the general issue of the theft of proprietary economic information. The Director of the Federal Bureau of Investigation, Louis Freeh, testified. The Committee also heard testimony from Geoffrey Shaw, the former CEO of Ellery Systems, Inc., of Boulder, CO, and Dr. Raymond Damadian, president and chairman of Fonar Corporation of Melville, NY. In addition, written statements were received from John J. Higgins, senior vice president and general counsel of the Hughes Electronics Corp.; Norman Augustine, president and CEO of Lockheed Martin Corp.; and the National Information Infrastructure Testbed. A classified briefing by the FBI Director for members of the Judiciary and Intelligence Committees was held on March 13, 1996. The House Committee on the Judiciary, Subcommittee on Crime, also held hearings on this issue on May 9, 1996. On July 25, 1996, the Judiciary Committee met in executive session to consider the bill. The Committee unanimously approved the measure, with an amendment in the nature of a substitute, proposed by Senators Kohl and Specter. Embodied in the substitute amendment were several changes to the original text of the bill. The first was a change in the definition of ``owner'' intended to bring the bill into full accord with the General Agreement on Trade and Tariffs. The second was a change in the definition of ``proprietary economic information'' designed to clarify the scope of the definition. The third was a change in the elements of the offense designed to clarify the exact nature of the act criminalized. The fourth was a reduction in the possible prison term in order to align the penalties with those available under the National Stolen Property Act, 18 U.S.C. 2314. The fifth was an alteration in the available fines in order to allow fines be levied in relation to the value of the stolen information. The sixth was an alteration in the import and export sanctions provisions in order to clarify the procedures for their use. The seventh narrowed the extraterritorial application of the legislation. The eighth was the requirement of prior authorization by the Attorney General, the Deputy Attorney General, or the Assistant Attorney General for the Criminal Division of the Justice Department before a prosecution under the measure can be commenced. III. Discussion Congress has heretofore confined its protection of intellectual property to patented and copyrighted material. With this legislation, Congress extends the protection of Federal law to the equally important area of proprietary economic information. During the course of the Committee's hearings, we documented that proprietary economic information is vital to the prosperity of the American economy, that it is increasingly the target of thieves, and that our current laws are inadequate to punish people who steal the information. In a world where a nation's power is now determined as much by economic strength as by armed might, we cannot afford to neglect to protect our intellectual property. Today, a piece of information can be as valuable as a factory is to a business. The theft of that information can do more harm than if an arsonist torched that factory. But our Federal criminal laws do not recognize this and do not punish the information thief. This is an unacceptable oversight. The Industrial Espionage Act is an effort to remedy the problem. Growing Importance of Proprietary Economic Information The United States produces the vast majority of the intellectual property in the world. This includes patented inventions, copyrighted material, and proprietary economic information. Proprietary information, in contrast with copyrighted material and patented inventions, is secret. The value of the information is almost entirely dependent on its being a closely held secret. It includes, but is not limited to, information such as production processes, bid estimates, production schedules, computer software, technology schematics, and trade secrets. It is, in short, the very information that drives the American economy. For many companies this information is the keystone to their economic competitiveness. They spend many millions of dollars developing the information, take great pains and invest enormous resources to keep it secret, and expect to reap rewards from their investment. In the last few decades, intangible assets have become more and more important to the prosperity of companies. A recent analysis by the Brookings Institute indicates that in 1982, the tangible assets of mining and manufacturing companies accounted for 62 percent of their market value. By 1992, they represented only 38 percent of the market value. Blair, ``Ownership and Control: Rethinking Corporate Governance for the Twenty-First Century'', 234 n.57 (1995). As this Nation moves into the high- technology, information age, the value of these intangible assets will only continue to grow. Ironically, the very conditions that make this proprietary information so much more valuable make it easily stolen. Computer technology enables rapid and surreptitious duplications of the information. Hundreds of pages of information can be loaded onto a small computer diskette, placed into a coat pocket, and taken from the legal owner. This material is a prime target for theft precisely because it costs so much to develop independently, because it is so valuable, and because there are virtually no penalties for its theft. The information is pilfered by a variety of people and organizations for a variety of reasons. A great deal of the theft is committed by disgruntled individuals or employees who hope to harm their former company or line their own pockets. In other instances, outsiders target a company and systematically infiltrate the company then steal its vital information. More disturbingly, there is considerable evidence that foreign governments are using their espionage capabilities against American companies.<SUP>1 --------------------------------------------------------------------------- \1\ S. 1556 was introduced in tandem with S. 1557, ``The Economic Security Act of 1996.'' S. 1557, which was referred to the Select Committee on Intelligence, specifically addresses the problem of foreign government-sponsored theft of proprietary economic information. S. 1557 includes enhanced penalties when the theft is sponsored by a foreign government. On April 30, 1996, the Intelligence Committee favorably reported a measure almost identical to S. 1557 as title V of S. 1718, ``The Intelligence Authorization Act for Fiscal Year 1997.'' --------------------------------------------------------------------------- We use the term economic or industrial espionage advisedly. Espionage is typically an organized effort by one country's government to obtain the vital national security secrets of another country. Typically, espionage has focused on military secrets. But even as the cold war has drawn to a close, this classic form of espionage has evolved. Economic superiority is increasingly as important as military superiority. And the espionage industry is being retooled with this in mind. It is important, however, to remember that the nature and purpose of industrial espionage are sharply different from those of classic political or military espionage. When we use the phrase industrial espionage, we include a variety of behavior--from the foreign government that uses its classic espionage apparatus to spy on a company, to the two American companies that are attempting to uncover each other's bid proposals, to the disgruntled former employee who walks out of his former company with a computer diskette full of engineering schematics. All of these forms of industrial espionage are troubling, and they are punished as the theft of proprietary economic information in this measure. Increasing Incidents of Theft of Proprietary Economic Information Director Freeh testified at the Subcommittee's February hearing that ``[f]oreign governments * * * actively target U.S. persons, firms, industries, and the U.S. Government itself to steal or wrongfully obtain critical technologies, data and information in order to provide their own industrial sectors with a competitive advantage.'' Director Freeh reported that in the last year, the number of cases of economic espionage that the FBI is investigating doubled from 400 to 800. Twenty-three countries are involved in those cases. During 1992 hearings before the House Committee on the Judiciary, Subcommittee on Economic and Commercial Law, the Director of the Central Intelligence Agency, Robert Gates, stated that: Our fundamental assessment is that while the end of the Cold War did not bring an end to the foreign intelligence threat, it did change the nature of that threat. The threat has become more diversified and more complex. In a world that increasingly measures national power and national security in economic terms as well as military terms, many foreign intelligence services around the world are shifting the emphasis in targeting. Foreign targeting of American technology continues; technology is important for economic as well as military reasons. Since the U.S. continues to be on the cutting edge of technological innovation, technology theft will remain a major concern for us. ``The Threat of Foreign Economic Espionage to U.S. Corporations: Hearings Before the Subcomm. on Economic and Commercial Law of the House Comm. on the Judiciary,'' 102d Cong., 2d sess. 59 (1977). A report of the National Counterintelligence Center in 1995 indicated that biotechnology, aerospace, telecommunications, computer software, transportation, advanced materials, energy research, defense, and semiconductor companies are all top targets for foreign economic espionage. These sectors are ``aggressively targeted'' according to the report. ``National Counterintelligence Center, Annual Report to Congress on Foreign Economic Collection and Industrial Espionage,'' 15 (1995). That report identified 20 different methods used to conduct industrial espionage. The traditional methods include recruiting an agent and then inserting the agent into the target company, or breaking into an office to take equipment and information. According to the report, ``computer intrusions, telecommunications targeting and intercept and private-sector encryption weaknesses * * * account for the largest portion of economic and industrial information lost by U.S. corporations.'' Id. at 16. Most American companies are poorly prepared to deal with these sophisticated and coordinated efforts to obtain their proprietary economic information. But even as American companies are attempting to deal with foreign espionage, they also have to deal with theft by insiders. A survey by the American Society for Industrial Security of 325 companies in 1995 found that almost half of them had experienced trade secret theft of some sort during the previous two years. Heffernan and Smartwood, ``Trends in Intellectual Property Loss Survey,'' 4 (1996). They also reported a 323-percent increase in the number of incidents of intellectual property loss. Id. A 1988 National Institute of Justice study of trade secret theft in high technology industries found that 48 percent of 150 research and development companies surveyed had been the victims of trade secrets theft. Mock and Rosenbaum, ``A Study of Trade Secrets Theft in High-Technology Industries,'' National Institute of Justice Discussion Paper 6 (1988). Almost half of the time the target was research and development data while 38 percent of the time the target was new technology. Id. at 16. Forty percent of the victims found out about the theft from their competitors. Id. The Committee has learned of several disturbing examples of how this theft is occurring. For example, in Arizona, an engineer for an automobile air bag manufacturer was arrested in 1993 for selling manufacturing designs, strategies, and plans. He asked the company's competition for more than half a million dollars--to be paid in small bills. And he sent potential buyers a laundry list of information they could buy. He asked $500 for the company's capital budget plan; $1,000 for a piece of equipment; and $6,000 for planning and product documents. See ``Industrial Espionage By 2 Mesa Men Alleged,'' the Phoenix Gazette, Aug. 31, 1993, at A1. The engineer subsequently reached a plea agreement with the U.S. Government and was sentenced to less than 6 months in prison. Just last year, Bill Gaede, the former employee of two major computer companies, admitted to stealing vital information on the manufacture of microchips and selling it to China, Cuba, and Iran. For almost a decade, he copied manufacturing specifications worth millions of dollars. And armed with this material, the Chinese, Cubans, and Iranians have been able to close the gap on our technology leads. Late last year, the FBI arrested this man and charged him under the Federal stolen property and mail fraud laws. See ``Troubling Issues in a Silicon Valley Spy Case,'' the New York Times, July 8, 1996, at D1. Gaede has recently reached a plea agreement with the U.S. Government. During its hearings, the Committee learned how an employee of Ellery Systems in Boulder, CO, transmitted that company's source code to another person in what appeared to be an attempt to appropriate the source code for his own personal use. Ellery Systems was a computer firm that supplied software technology to various government projects, primarily in NASA astrophysics activities. That theft of their source code, possibly at the behest of a foreign government, ultimately destroyed the financial viability of Ellery Systems. But all efforts to prosecute the putative thief failed because of gaps in current law. Dr. Raymond Damadian, the inventor of magnetic resonance imaging technology and founder of an MRI manufacturing company, Fonar Corp., told the Committee that his company had been the subject of persistent infiltration and theft. In one case, an unauthorized service company hired former Fonar engineers to give them the proprietary technology--the diagnostic software and schematics--needed to service Fonar MRI machines. When Fonar discovered the misappropriation, it sought an injunction in Federal court. The injunction was issued, but the service company simply violated the injunction, flouting all possible penalties. Director Freeh told the Committee about an FBI investigation involving the theft of proprietary information from two major pharmaceutical manufacturers. Two people were offering to sell trade secrets involving two fermentation processes covered by active patents. In February 1990, an FBI undercover agent posed as a potential buyer and was offered the information on one process for $1.5 million. The second process was for sale for $6 to $8 million. As a result of industrial espionage, American companies have been severely damaged. The NCIC report concluded that ``[i]ndustry victims have reported the loss of hundreds of millions of dollars, lost jobs, and lost market share.'' NCIC, supra, at 16. The ASIS survey concluded that the potential losses could total $63 billion. Heffernan and Smartwood, supra, at 15. In response to the growing problem of the theft of proprietary economic information, the FBI has shifted the focus of its Development of Espionage, Counterintelligence and Counterterrorism Awareness (DECA) Program. This program has been in place for more than 20 years. But in the last few years, DECA has widened its efforts to address industrial espionage. DECA coordinators in each of the FBI's 56 field offices maintain contact with companies in their region and now regularly brief them about methods and prevention of industrial espionage. During the 1993 and 1994 fiscal years, the FBI briefed almost 20,000 companies under the DECA Program. Gaps in Current Federal Law Developments in the law, however, have not kept pace with this rapidly changing environment. Although Congress has enacted patent and copyright protection laws, and computer crime statutes, no Federal law protects proprietary economic information from theft and misappropriation in a systematic, principled manner. As a result, prosecutors have had trouble shoe-horning economic espionage into these laws. Sometimes they have succeeded, but often they have failed. See Toren, ``The Prosecution of Trade Secrets Thefts Under Federal Law,'' 22 Pepp. L. Rev. 59, 64-94 (1994). One provision Federal prosecutors have attempted to use is the Depression-era National Stolen Property Act, 18 U.S.C. 2314-15. This law was designed to foil the ``roving criminal'' whose access to automobiles made movement of stolen property across State lines so easy that State and local officials were stymied in their pursuit. While the law works well enough for crimes involving traditional ``goods, wares, and merchandise,'' it was drafted at a time when computers, biotechnology, and copy machines did not even exist. Consequently, it is not particularly well suited to deal with situations in which intangible information alone is wrongfully duplicated and transmitted electronically with a few keystrokes. Moreover, recent court decisions suggest that this statute is limited to tangible property. In Dowling v. United States, 473 U.S. 207 (1985), the Supreme Court reversed the conviction of a man who had distributed bootlegged Elvis Presley records. He violated copyright law, but the Court suggested that the National Stolen Property Act only applies to tangible goods. Id. at 216. Later appellate courts have interpreted Dowling to preclude prosecution of the theft of ``purely intellectual property.'' United States v. Brown, 925 F.2d 1301, 1307 (10th Cir. 1991). We do not address whether these cases properly understood the legislative intent of the National Stolen Property Act, but merely point out that this caselaw makes prosecutions for the theft of proprietary economic information under the act difficult, making the need for this legislation more and more urgent. Other existing statutes used by law enforcement agencies to combat economic espionage have similar limitations. Although proprietary information is property under the mail and wire fraud statutes, 18 U.S.C. 1341-43, see U.S. v. Carpenter, 484 U.S. 19, 28 (1987), prosecutors have found it difficult to use these statutes because the theft often does not involve the use of mail or wire. In addition, since a thief merely copies information and does not necessarily ``defraud'' the company permanently of the data, prosecutions are more difficult. Under many Federal statutes, even basic concepts can prove problematic. For example, if an individual ``downloads'' computer source code without permission of the owner, has a theft occurred even though the true owner never lost possession of the original and is not permanently deprived of its use? Another difficulty with existing law is that it fails to afford explicit protection to the confidential nature of the information in question during enforcement proceedings. By its nature, proprietary economic information derives value from its exclusivity and confidentiality. If either or both are compromised during legal proceedings, the value of the information is diminished. As a result of these problems, the FBI has had difficulty conducting investigations or had prosecutions declined. Director Freeh pointed to one case in which an association of consultants, all of whom were long-term employees of U.S. corporations, attempted to sell proprietary high technology to foreign powers. The FBI sought consensual monitoring of a subject. Its request was turned down by an Assistant U.S. Attorney, citing Brown as holding that the consultants' actions did not constitute criminal behavior. Director Freeh pointed to another example in which the FBI investigated an information broker who was engaged by two foreign companies to gather proprietary bid information from a major U.S. company regarding a multimillion dollar international construction project. The information broker contacted several employees from the U.S. company, paid them for information, and passed the information onto the foreign companies. The broker was then paid a large sum of money for his services. For lack of a more applicable violation, the case was investigated as a wire fraud violation, but a U.S. Attorney's office declined to prosecute. Significantly, a similar investigation regarding the same construction project and foreign companies was initiated in the United Kingdom. This investigation resulted in prison sentences for two other information brokers headquartered in England. State Laws Inadequate State laws do not fill in the gaps left by Federal law. What State law there is protects proprietary economic information only haphazardly. The majority of States have some form of civil remedy for the theft of such information--either adopting some version of the Uniform Trade Secrets Act, acknowledging a tort for the misappropriation of the information, or enforcing various contractual arrangements dealing with trade secrets. These civil remedies, however, often are insufficient. Many companies chose to forgo civil suits because the thief is essentially judgment proof--a young engineer who has few resources--or too difficult to pursue--a sophisticated foreign company or government. In addition, companies often do not have the resources or the time to bring suit. They also frequently do not have the investigative resources to pursue a case. Even if a company does bring suit, the civil penalties often are absorbed by the offender as a cost of doing business and the stolen information retained for continued use. Only a few States have any form of criminal law dealing with the theft of this type of information. Most such laws are only misdemeanors, and they are rarely used by State prosecutors. Need for a Comprehensive Federal Law These, and other problems, underscore the importance of developing a systematic approach to the problem of economic espionage. Only by adopting a national scheme to protect U.S. proprietary economic information can we hope to maintain our industrial and economic edge and thus safeguard our national security. Foremost, we believe that the greatest benefit of the Federal statute will be as a powerful deterrent. In addition, a Federal criminal law is needed because of the international and interstate nature of this activity, because of the sophisticated techniques used to steal proprietary economic information, and because of the national implications of the theft. Moreover, a Federal criminal statute will provide a comprehensive approach to this problem--with clear extraterritoriality, criminal forfeiture, and import-export sanction provisions. S. 1556 Does Not Apply to General Knowledge and Skills This legislation does not apply to innocent innovators or to individuals who seek to capitalize on their lawfully developed knowledge, skill or abilities. Employees, for example, who change employers or start their own companies should be able to apply their talents without fear of prosecution because two safeguards against overreaching are built into the law. First, protection is provided by the definition of ``proprietary economic information'' itself. The definition requires that an owner take objectively reasonable, proactive measures, under the circumstances, to protect the information. If, consequently, an owner fails to safeguard his or her proprietary information, then no one could be rightfully accused of misappropriating it. Most owners do take reasonable measures to protect their proprietary economic information, thereby placing employees and others on clear notice of the discreet, proprietary nature of the information. The bill explicitly states that the term proprietary economic information does not include the general knowledge, skills or experience that a person has. A prosecution under this statute must establish a particular piece of information that a person has stolen or misappropriated. It is not enough to say that a person has accumulated experience and knowledge during the course of his or her employ. Nor can a person be prosecuted on the basis of an assertion that he or she was exposed to proprietary economic information while employed. A prosecution that attempts to tie skill and experience to a particular piece of proprietary economic information cannot succeed without showing that the particular material was stolen or misappropriated. The Government cannot prosecute an individual for taking advantage of the general knowledge and skills or experience that he or she obtains or comes by during his tenure with a company. Allowing such prosecutions to go forward and allowing the risk of such charges to be brought would unduly endanger legitimate and desirable economic behavior. As the Pennsylvania Supreme Court noted in Spring Steels v. Molloy, 400 Pa. 354, 363 (1960): It is not a phenomenal thing in American business life to see an employee, after a long period of service, leave his employment and start a business of his own or in association with others. And it is inevitable in such a situation, where the former employee has dealt with customers on a personal basis that some of those customers will want to continue to deal with him in [that] new association. This is * * * natural, logical and part of human fellowship * * * This legislation does not criminalize or in any way hamper these natural incidents of employment. The free and unfettered flow of individuals from one job to another, the ability of a person to start a new business based upon his or her experience and expertise, should not be injured or chilled in any way by this legislation. Individuals must have the opportunity to take advantage of their talents and to seek and accept other employment that enables them to profit from their abilities and experience. And companies must have the opportunity to employ these people. This measure attempts to safeguard an individual's career mobility and at the same time to preserve the proprietary economic information that underpins the economic viability of the very company that would offer a person a new job. The second safeguard is provided by the bill's use of the term ``knowingly.'' For a person to be prosecuted, the person must know or have a firm belief that the information he or she is taking is in fact proprietary. Under theft statutes dealing with tangible property, normally, the thief knows that the object he has stolen is indeed a piece of property that he has no lawful right to convert for his personal use. The same principle applies to this measure--for someone to be convicted under this statute he must be aware or substantially certain that he is misappropriating proprietary economic information (although a defense should succeed if it is proven that he actually believed that the information was not proprietary after taking reasonable steps to warrant such belief). A person who takes proprietary economic information because of ignorance, mistake or accident cannot be prosecuted under the act. (The bill also provides a similar safeguard by requiring that the appropriation be without authorization.) This requirement should not prove a great barrier to legitimate and warranted prosecutions. Most companies go to considerable pains to protect their proprietary economic information. Documents are marked proprietary; security measures put in place; and employees often sign confidentiality agreements. IV. Section-by-Section Analysis Section 1. Short Title This section sets forth the short title of the Act, which emphasizes that the focus of the bill is on ``industrial espionage'' and the protection of trade secrets. ``Industrial espionage'' means activity directed at the U.S. Government or U.S. corporations, establishments, or persons for the purpose of unlawfully obtaining proprietary economic information. The emphasis of this legislation is on the theft of that proprietary economic information. Section 2. Findings and Purpose This section sets forth the congressional findings upon which the Act is predicated and the remedial purposes of the Act. The section reflects congressional determinations that the development and production of trade secrets is integral to the maintenance of a healthy and competitive national economy and that, in turn, maintenance of a competitive national economy is imperative to national security. This section also recognizes that the Constitution grants Congress the power to protect and enforce the exclusive rights of authors and inventors to their writings and discoveries. One of the Act's purposes is, therefore, to promote the development and lawful utilization of proprietary economic information by protecting it from theft, unauthorized misappropriation or conversion. Notwithstanding the holding of Dowling v. United States, 473 U.S. 207 (1985), it is intended that the provisions of the Act should apply regardless of whether the conduct at issue could also fall within the prohibitions of the copyright laws. Section 3. Prevention of Industrial Espionage This section is the core component of the Act and would add a new Chapter ``90--Protection of Proprietary Economic Information'' to title 18, United States Code. Sec. 1831. Definitions This section sets forth definitions of certain key items used in the new chapter and builds upon the definitions already set out in chapter 1 of title 18. (a) ``Person'' is defined to include both individuals and entities, such as corporations, agencies, and associations. (b) ``Proprietary economic information'' is defined as a type of intellectual property connoted by four characteristics: (1) it is proprietary; (2) its nature is economic, business, scientific, technical, or engineering; (3) it consists of information, data, plans, tools, mechanisms, compounds, formulas, designs, prototypes, processes, procedures, programs, codes, or commercial strategies; and (4) it derives value from its exclusivity. These features distinguish it from other forms of intellectual property, such as literary or artistic works. Both tangible and intangible forms of property and all forms of data or information are covered, regardless of how stored or memorialized. Additionally, the definition makes clear that the owner of the property must have taken objectively reasonable and proactive steps to keep the information confidential; that is, information or data that is available generally to the public is not included. The efforts to protect material, however, need not be heroic merely reasonable. The term ``proprietary economic information'' also does not include general knowledge, experience, training, or skill acquired by a person as a result of his or her employment or hire by any owner. This definition is closely modeled on the definition of a ``trade secret'' used in the Uniform Trade Secrets Act. It parallels similar definitions used by many States in their own trade secrets legislation. Thus, it is familiar to most firms, businesses, and individuals who commonly deal with trade secrets and intellectual property. Congress intends to draw upon the considerable case law and experience interpreting ``trade secrets'' to illuminate the meaning of the term ``proprietary economic information.'' (c) ``Owner'' is defined to include any person, including the U.S. Government, having legal, beneficial, or equitable title to, or license in, the proprietary economic information in question. (d) ``U.S. Person'' is defined to mean U.S. citizens or permanent resident aliens in the case of natural persons; and, in the case of nonnatural persons, entities substantially owned or controlled by the U.S. Government or by U.S. citizens or permanent resident aliens, or incorporated in the United States. (e) ``Without authorization'' is defined to mean without permission of the owner. It is intended to emphasize that innocent or negligent actors cannot be prosecuted under the statute. See, in this regard, the additional comments regarding section 1832 in the Discussion and below. Sec. 1832. Criminal activities affecting proprietary economic information This section punishes the theft, unauthorized appropriation, and unauthorized conversion, duplication, alteration, or destruction of proprietary economic information. This section is written to cover both traditional instances of theft, where the object of the crime is removed from the rightful owner's control and possession, as well as nontraditional methods of misappropriation and destruction, involving electronic duplication or alteration. With these nontraditional methods the original property never leaves the dominion or control of the rightful owner, but the unauthorized duplication or misappropriation effectively destroys the value of what is left with the rightful owner. In an electronic environment, information can be stolen without asportation, and the original usually remains intact. Our intent, therefore, is to ensure that the theft of intangible information is prohibited in the same way that theft of physical items are protected. This section requires that the person intends that his actions will injure the owner of the information. This does not require that the prosecution prove malice or evil intent. It merely requires that the actor knew or was aware to a practical certainty that his conduct would cause such a result. The actor must intend to use the information for his or her personal benefit or the benefit of another. By benefit we mean economic benefit not abstract or reputational enhancements. This provision means that a person who discloses proprietary economic information but does not intend to materially gain from it or intend the recipient to so benefit cannot be prosecuted. The requirement that the information have a value of not less than $100,000 is jurisdictional and is not intended to be an element of the crime; the prosecution need not prove that the person knew the exact value of the information. In determining the value of the information, the prosecution may use the valuation technique that is appropriate in light of the circumstances of the case. A variety of valuation methods have been used in civil and criminal cases involving trade secrets. See generally Rosenhouse, Annotation, Proper Measure of Damages for Misappropriation of Trade Secrets, 11 A.L.R.4th 12. <SUP>2 They include determining the profits that the owner would have realized had the information remained proprietary. See, e.g., Sperry Rand Corp. v. A-T-O, Inc., 447 F.2d 1387, 1392-94 (4th Cir. 1971). In other cases, the value of the stolen information has been calculated by determining the profits that the defendant gained by selling it. See, e.g., Univ. Computing Co. v. Lykes-Youngstown Corp., 504 F.2d 518, 535-36 (5th Cir. 1974). Courts have also recognized the research and development costs of the proprietary economic information as a proper measure of its value. See, e.g., Salsbury Lab., Inc. v. Merieux Lab., Inc., 735 F. Supp. 1555, 1579 (M.D. Ga. 1989), aff'd in part and rev'd in part, 908 F.2d 706 (11th Cir. 1990). Other methods of valuing proprietary economic information may also be available. The Committee believes that these techniques are valid. --------------------------------------------------------------------------- \2\ We recognize that damages in a civil suit are not the exact equivalent of value. But in the course of determining the compensatory damages available to a victorious plaintiff, many courts have developed methods for valuing trade secrets. --------------------------------------------------------------------------- The actor must knowingly steal the information, or take it without authorization, or transmit it without authorization. A knowing state of mind with respect to an element of the offense is (1) an awareness of the nature of one's conduct, and (2) an awareness of or a firm belief in or knowledge to a substantial certainty of the existence of a relevant circumstance, such as whether the information is proprietary economic information as defined by this statute. The statute does not require proof that the actor knew that his conduct violated Federal law. The Committee intends that the knowing state of mind requirement may be satisfied by proof that the actor was aware of a high probability of the existence of the circumstance, although a defense should succeed if it is proven that the actor actually and reasonably believed that the circumstance did not exist. This is similar to the practice of the proposed Model Penal Code (section 2.02(7)). This approach deals with the situation that has been called willful blindness, the case of the actor who is aware of the probable existence of a material fact--for example, that he has no authority, or that the information is proprietary--but does not satisfy himself that it does not in fact exist. Sec. 1833. Forfeiture This section is designed to permit recapture of both the proceeds and implements of the offenses specified in the chapter. This provision may prove especially telling, since the proceeds of proprietary economic property theft may be staggering in certain cases. These forfeiture provisions are meant to supplement, not replace, the authorized punishments in appropriate cases. The section incorporates through reference existing law that sets forth procedures to be used in the detention, seizure, forfeiture, and ultimate disposition of property forfeited under this section. It provides for an in personam action against the offender, rather than only one against the property itself, and it preserves the rights of innocent third parties. Sec. 1834. Import and export sanctions This section authorizes the President to prohibit, for a period of up to 5 years, the importation into, or exportation from, the United States of any product produced, made, assembled, or manufactured by a person convicted of any offense under section 1832. This sanction, too, is meant to enhance the bill's prophylactic effect by imposing another important sanction on offenders. Any sanctions so imposed are enforceable through a civil action that may be brought by the Secretary of the Treasury and which could result in the imposition of a civil penalty of not less than $100,000. It is anticipated that this sanction will generally be used against egregious and persistent violators. Sec. 1835. Extraterritoriality To rebut the general presumption against the extraterritoriality of U.S. criminal laws, this section makes it clear that the Act is meant to apply to certain conduct occurring beyond U.S. borders. To ensure that there is some nexus between the assertion of such jurisdiction and the offense, extraterritorial jurisdiction exists only if the offender is a citizen, permanent resident alien, or corporation of the United States; or an act in furtherance of the offense is committed in the United States. In pursuing such cases, it is expected that the Department of Justice will focus its investigative and prosecutorial resources on those instances in which there has been a substantial harm to U.S. interests. Sec. 1836. Construction with other laws This section makes clear that the Act does not preempt non- Federal remedies, whether civil or criminal, for dealing with the theft or misappropriation of economic proprietary information. Many States have criminalized the theft of intellectual property, but enforcement may be frustrated by the ease with which such property is transferred across State or national boundaries. Sec. 1837. Preservation of confidentiality This section authorizes a court to preserve the confidentiality of alleged proprietary economic information during legal proceedings under the Act consistent with existing rules of criminal procedure and evidence, and other applicable laws. This preserves the information's confidential nature and, hence, its value. Without such a provision, owners may be reluctant to cooperate in prosecutions for fear of exposing their proprietary information to public view--thereby destroying its worth. Sec. 1838. Prior authorization requirement This section requires that the Attorney General, the Deputy Attorney General, or the Assistant Attorney General for the Criminal Division of the Department of Justice must personally approve in advance any charge under this bill. This duty is nondelegable. This provision has been added as a safeguard against overzealous invocation of this new law. It is intended to help ensure that businesses and individuals are not chilled from making legitimate business decisions. Sec. 1839. Law enforcement and intelligence activities This section makes clear that the new chapter does not prohibit any lawfully authorized investigative, protective, or intelligence activity of the United States. Section 4. Wire and Electronic Communications Interception and Interception of Oral Communications This provision adds newly created crimes to the list of offenses which may be investigated with authorized wire, oral, or electronic intercepts. V. Regulatory Impact Statement Pursuant to paragraph 11(b), rule XXVI of the Standing Rules of the Senate, the Committee, after due consideration, concludes that Senate bill 1556 will not have direct regulatory impact. VI. Cost Estimate U.S. Congress, Congressional Budget Office, Washington, DC, August 21, 1996. Hon. Orrin G. Hatch, Chairman, Committee on the Judiciary, U.S. Senate, Washington, DC. Dear Mr. Chairman: The Congressional Budget Office has reviewed S. 1556, the Industrial Espionage Act of 1996, as reported by the Senate Committee on the Judiciary on July 30, 1996. CBO estimates that enacting the bill would result in no significant net impact on the federal budget. Enacting S. 1556 would affect direct spending and receipts by increasing the amount of forfeiture receipts and penalties collected and spent by the government, but we estimate that such effects would not occur until after fiscal year 1998. Thus, the bill would not be subject to pay-as-you-go procedures, which apply only through fiscal year 1998. In any event, we expect that the bill would have no significant net effect on the federal budget over time because receipts from criminal fines and the sale of forfeited property would be spent, generally within one year of receipt. Bill Purpose. Enacting S. 1556 would make it a federal crime to steal proprietary economic information having a value of at least $100,000 from an owner of such information. Under current law, cases involving economic espionage are prosecuted under various statutes; however, none is broad enough to accommodate most cases of economic espionage. Under this bill, economic information would include intellectual property as well as physical property, and violations would include duplication of information as well as physical theft. Violators would be subject to imprisonment, criminal fines, and forfeiture of the property involved in the crime. Enacting this bill also would allow the President to prohibit a person convicted of economic espionage from importing goods into, or exporting goods from, the United States for a period up to five years. Violators of such Presidential orders would be subject to civil fines and the forfeiture of related property. Federal Budgetary Impact. While pursuing investigations would consume staff time and other resources of the federal government, CBO estimates that the Department of Justice and the Federal Bureau of Investigation (FBI) would not need significant additional resources to enforce the provisions of the bill over the next several years. Based on information from the FBI, CBO assumes that few cases would be investigated and prosecuted over the next several years, but that the caseload would grow over time. Corporations, which constitute the majority of victims of industrial espionage, are reluctant to publicly admit theft out of fear that they would be forced to reveal proprietary information when the case goes to court. In addition, prosecutions under this bill would require prior approval of the Attorney General (AG) or certain members of the AG staff. As a result of this requirement, CBO anticipates that the number of cases prosecuted would be kept to a minimum because prosecutors would only pursue those cases with substantial evidence. CBO estimates that, in the long term, the government's caseload could significantly increase and additional resources could be needed if corporations become more comfortable with reporting economic espionage and the government pursues more cases involving economic espionage. Any such additional resources would be subject to the availability of appropriated funds. This bill also would establish penalties--including fines, imprisonment, and the forfeiture of property involved in the crime--for violations of the provisions of this bill. Such criminal fines and receipts from the sale of forfeited property would be deposited in the Crime Victims Fund and spent in the following year. Civil penalties would be paid to a receipt account in the Treasury, but we expect that any such revenues would not be significant. CBO estimates that because it would take at least two years to investigate and prosecute a case, the government would not collect any fines or receipts from the sale of forfeited property through 1998. Based on conversations with the FBI, we estimate that additional receipts paid into the Crime Victims Fund after fiscal year 1998 could exceed $5 million a year. Spending from the fund would increase in the same amounts, but with a one-year lag. In addition, CBO does not expect any significant increase in prison costs as a result of this bill. Mandate Statement. S. 1556 contains no private-sector or intergovernmental mandates as defined in the Unfunded Mandates Reform Act of 1995 (Public Law 104-4), and would have no impact on the budgets of state, local, or tribal governments. If you wish further details on this estimate, we will be pleased to provide them. The CBO staff contacts are Jonathan Womer and Susanne Mehlman. Sincerely, June E. O'Neill, Director. VII. Changes in Existing Law In compliance with paragraph 12 of rule XXVI of the Standing Rules of the Senate, the changes in existing law made by the bill, as reported by the committee, are shown as follows (existing law proposed to be omitted is enclosed in bold brackets, new matter is printed in italic, and existing law with no changes is printed in roman): UNITED STATES CODE * * * * * * * TITLE 18--CRIMES AND CRIMINAL PROCEDURE PART I.--CRIMES Chapter Sec. 1. General provisions............................................. 1 * * * * * * * 89. Professions and occupations................................... 1821 90. Protection of Proprietary Economic Information................ 1831 * * * * * * * CHAPTER 90--PROTECTION OF PROPRIETARY ECONOMIC INFORMATION Sec. 1831. Definitions. 1832. Criminal activities affecting proprietary economic information. 1833. Criminal forfeiture. 1834. Import and export sanctions. 1835. Extraterritoriality. 1836. Construction with other laws. 1837. Preservation of confidentiality. 1838. Prior authorization requirement. 1839. Law enforcement and intelligence activities. Sec. 1831. Definitions As used in this chapter: (1) The term ``person'' means a natural person, corporation, agency, association, institution, or any other legal, commercial, or business entity. (2) The term ``proprietary economic information'' means all forms and types of financial, business, scientific, technical, economic, or engineering information, including data, plans, tools, mechanisms, compounds, formulas, designs, prototypes, processes, procedures, programs, codes, or commercial strategies, whether tangible or intangible, and whether stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing that-- (A) the owner thereof has taken reasonable measures to keep such information confidential; and (B) the information derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable, acquired, or developed by legal means by the public. The term does not include any general knowledge, experience, training, or skill that a person lawfully has acquired due his work as an employee of or as an independent contractor for any person. (3) The term ``owner'' means the person or persons in whom, or United States Government component, department, or agency in which, rightful legal, beneficial, or equitable title to, or license in, proprietary economic information is reposed. (4) The term ``United States person'' means-- (A) in the case of a natural person, or United States citizen or permanent resident alien; and (B) in the case of nonnatural person, an entity substantially owned or controlled by the United States Government or by United States citizens or permanent resident aliens, or incorporated in the United States. (5) The term ``without authorization'' means not permitted, expressly or implicitly, by the owner. Sec. 1832. Criminal activities affecting proprietary economic information (a) Any person, with intent to, or reason to believe that it will, injure any owner of proprietary economic information having a value of not less than $100,000 and with intent to convert it to his or her own use or benefit or the use or benefit of another, who knowingly-- (1) steals, or without authorization appropriates, takes, carries away, or conceals, or by fraud, artifice, or deception obtains such information; (2) without authorization copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys such information; (3) receives, buys, or possesses such information, knowing the same to have been stolen or appropriated, obtained, or converted without authorization; (4) attempts to commit any offense described in paragraphs (1) through (3); (5) wrongfully solicits another to commit any offense described in paragraphs (1) through (3); or (6) conspires with one or more other persons to commit any offense described in paragraphs (1) through (3), and one or more of such persons do any act to effect the object of the conspiracy, shall, except as provided in subsection (b), be fined up to $250,000, or twice the value of the proprietary economic information, whichever is greater, or imprisoned not more than 10 years, or both. (b) Any corporation that commits any offense described in paragraphs (1) through (6) of subsection (a) shall be fined up to $10,000,000, or twice the economic value of the proprietary economic information, whichever is greater. (c) This section does not prohibit the reporting of any suspected criminal activity or regulatory violation to any appropriate agency or instrumentality of the United States, or a political subdivision of a State, or to Congress. Sec. 1833. Criminal forfeiture (a) Notwithstanding any provision of State law, any person convicted of a violation under this chapter shall forfeit to the United States-- (1) any property, constituting or derived from, any proceeds the person obtained, directly or indirectly, as the result of such violations; and (2) any of the person's property used, or intended to be used, in any manner or part to commit or facilitate the commission of such violation. (b) The court, in imposing a sentence on such person, shall order, in addition to any other sentence imposed pursuant to this chapter, that the person forfeit to the United States all property described in this section. (c) Property subject to forfeiture under this section, any seizure and disposition thereof, and any administrative or judicial proceeding in relation thereto, shall be governed by section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853), except for subsection 413(d) which shall not apply to forfeitures under this section. (d) Notwithstanding section 524(c) of title 28, there shall be deposited in the Crime Victims Fund established under section 1402 of the Victims of Crime Act of 1984 (42 U.S.C. 10601) all amounts from the forfeiture of property under this section remaining after the payment of expenses and sale authorized by law. Sec. 1834. Import and export sanctions (a) The President may, to the extent consistent with international agreements to which the United States is a party, prohibit, for a period of not longer than 5 years, the importation into, or exportation from, the United States, whether by carriage of tangible items or by transmission, any merchandise produced, made, assembled, or manufactured by a person convicted of any offense described in section 1832 of this title, or in the case of an organization convicted of any offense described in such section, its successor entity or entities. (b)(1) The Secretary of the Treasury may impose on any person who knowingly violates any order of the President issued under the authority of this section, a civil penalty equal to not more than 5 times the value of the exports or imports involved, or $100,000, whichever is greater. (2) Any merchandise imported or exported in violation of an order of the President issued under this section shall be subject to seizure and forfeiture in accordance with sections 602 through 619 of the Tariff Act of 1930. (3) The provisions of law relating to seizure, summary and judicial forfeiture, and condemnation of property for violation of the United States customs laws, the disposition of such property or the proceeds from the sale thereof, the remission or mitigation of such forfeiture, and the compromise of claims, shall apply to seizures and forfeitures incurred, or alleged to have been incurred under this section to the extent that they are applicable and not inconsistent with the provisions of this chapter. Sec. 1835. Extraterritoriality (a) This chapter applies to conduct occurring within the United States. (b) This chapter applies to conduct occurring outside the territorial and special maritime jurisdiction of the United States, its territories, and possessions if-- (1) the offender is a United States person; or (2) an act in furtherance of the offense was committed in the United States. Sec. 1836. Construction with other laws This chapter shall not be construed to preempt or displace any other Federal or State remedies, whether civil or criminal, for the misappropriation of proprietary economic information, or to affect the otherwise lawful disclosure of information by any government employee under section 552 of title 5 (commonly known as the Freedom of Information Act). Sec. 1837. Preservation of confidentiality In any prosecution under this chapter, the court may enter such orders and take such other action as may be necessary and appropriate to preserve the confidentiality of proprietary economic information, consistent with rule 16 of the Federal Rules of Criminal Procedure, the Federal Rules of Evidence, and other applicable laws. An interlocutory appeal by the United States shall lie from a decision or order of a district court authorizing the disclosure of proprietary economic information. Sec. 1838. Prior authorization requirement The United States may not file a charge under this chapter or use a violation of this chapter as a predicate offense under any other law without the personal approval of the Attorney General, the Deputy Attorney General, or the Assistant Attorney General for the Criminal Division of the Department of Justice. Sec. 1839. Law enforcement and intelligence activities This chapter does not prohibit any and shall not impair otherwise lawful activity conducted by an agency or instrumentality of the United States, a State, or a political subdivision of a State, or an intelligence agency of the United States. * * * * * * * CHAPTER 119--WIRE INTERCEPTION AND INTERCEPTION OF ORAL COMMUNICATIONS * * * * * * * Sec. 2516. Authorization for interception of wire, oral, or electronic communications (1) The Attorney General, Deputy Attorney General, Associate Attorney General, or any Assistant Attorney General, any acting Assistant Attorney General, or any Deputy Assistant Attorney General in the Criminal Division specially designated by the Attorney General, may authorize an application to a Federal judge of competent jurisdiction for, and such judge may grant in conformity with section 2518 of this chapter an order authorizing or approving the interception of wire or oral communications by the Federal Bureau of Investigation, or a Federal agency having responsibility for the investigation of the offense as to which the application is made, when such interception may provide or has provided evidence of-- (a) any offense punishable by death or by imprisonment for more than one year under sections 2274 through 2277 of title 42 of the United States Code (relating to the enforcement of the Atomic Energy Act of 1954), section 2284 of title 42 of the United States Code (relating to sabotage of nuclear facilities or fuel), or under the following chapters of this title: chapter 90 (relating to economic espionage and protection of proprietary economic information in interstate and foreign commerce), chapter 37 (relating to espionage), chapter 105 (relating to sabotage), chapter 115 (relating to treason), chapter 102 (relating to riots) chapter 65 (relating to malicious mischief), chapter 111 (relating to destruction of vessels), or chapter 81 (relating to piracy); <greek-d>