* subscribe at http://techPolice.com E-crime & Punishment;Over the last year, a host of old-fashioned crimes fraud, theft, and harassment have gone high-tech. A Philadelphia district attorney follows the trail and finds an innovative way to fight the new cyber crime. Edward Sherwin, American Lawyer Media Copyright 2001 American Lawyer Media, L.P. Fulton County Daily Report February 16, 2001 Friday Sitting alone at the defense table, his head in his hands, P.M. was virtually indistinguishable from any of the other young men before Philadelphia Family Court Judge Joseph C. Bruno. But while most juvenile defendants were being prosecuted for crimes of the streets-theft, drug possession, assault-P.M. was on trial for a crime of the future. In a deal with prosecutors, the 15-year-old admitted to making terroristic threats and possessing an instrument of crime in connection with a series of incidents at Temple University's Engineering School last fall. But the threat, made on the life of a federal judge in New York, wasn't scrawled on a piece of paper, and P.M. wasn't identified because of an errant fingerprint. Rather, the threat was communicated via e-mail, and P.M. was caught on the basis of the Internet Protocol address-the digital fingerprint-of the computer from which he sent his angry missive. P.M.'s case is representative of an escalating trend in the legal system, the migration of traditional crimes like fraud, theft and harassment from the pen-and-paper world to its digital counterpart. Meanwhile, headlines over the last year have hyped a host of new offenses-hacking into credit-card databases, spreading computer viruses, instigating denial-of-service attacks on World Wide Web sites-that would have been unimaginable a decade ago. In response, late last year the Philadelphia District Attorney's Office beefed up its manpower in the area of Internet and computer-related crime, and rechristened its economic crime division as the Economic and Cyber Crime Unit. "Economic crime, especially lately, has involved a lot of computer stuff; it's a natural progression," says James Berardinelli, the assistant district attorney who prosecuted P.M. "With the computer capabilities these kids have these days, we're going to see more of them." A Troubled Youth On Oct. 27 of last year, Philadelphia's NBC-10 and the editors of The New York Law Journal received e-mail messages from a man identifying himself as Shaykh Yaseem Bilal Abdur-Razzaq, a lieutenant in the international terrorist network of Saudi fugitive Osama bin Laden. The letter demanded the release of three Arab men imprisoned in connection with the failed 1993 plot to blow up several New York City landmarks. If they were not released, the letter claimed, bin Laden's forces would commence a "holy war" against the United States and Judge Michael B. Mukasey of the Southern District of New York, who sentenced the three men and seven others to long prison terms, would be killed. The FBI was brought into the case and traced the e-mail messages to a computer lab in Temple University's Engineering School through the IP address-the unique number given to each computer connected to the Internet-printed on the e-mails. The FBI set up surveillance in the building and one eyewitness present Oct. 27 gave a general description of the suspect matching that of P.M. On Nov. 3, P.M. was seen entering the computer lab and, upon failing to produce a Temple student ID card, was held for questioning. A Temple police officer found hard copies of the threatening e-mail messages in the youth's backpack and notified the FBI. P.M. later confessed to sending the e-mail messages-and to being responsible for the bomb scare that had shut down the engineering school the day before. P.M. was arrested and charged with burglary and criminal trespass-both felonies-and several misdemeanor charges, including making terroristic threats, criminal mischief and using facsimile bombs. As investigators learned, he was not connected to any international terrorist conspiracy, but rather to a gifted program at a Philadelphia high school, where, prosecutors believe, he had his first contact with computers. The case was assigned to Berardinelli, an attorney in the Economic and Cyber Crime Unit with previous experience in the district attorney's juvenile division. Staying Au Courant An "au courant prosecutors' office" is what Philadelphia District Attorney Lynne Abraham says she wants, and by getting funds last year from City Council for a cyber crime unit, she says her wish was granted. "When you pick up a newspaper, when you watch television or when you live your life, (you see) our lives are more and more dominated by computers and computer-related peripherals," she says. "Crime doesn't stand in the corner and wait." Indeed, the number of cyber crime cases handled by the DA's office has grown significantly. From 17 cases in 1999, prosecutors saw 57 cases in 2000, most dealing with identity theft, forgery or theft by deception. And, Economic and Cyber Crime Unit chief Len Deutchman adds dryly, "We do eBay cases." With its new funding, the unit has expanded significantly. It is in the process of hiring three new prosecutors and six new detectives principally devoted to cyber crime, and it has taken over two floors of the building at 1401 Arch St. in Philadelphia. Manpower is key, Deutchman says, because of the ephemeral nature of electronic records stored by Internet service providers. "With a cyber crime case, if you can't do it when the case comes in, the odds of getting evidence go quickly down to zero," he says. The challenges of solving and prosecuting computer-related crimes are more daunting still given that the perpetrators often have far greater technical expertise than the officers responsible for bringing them to justice. Only half-joking, Deutchman says that the Unix computer language-a favorite of hackers and other e-criminals-is only fully understood by "two cyber crime forensics investigators and a million 16-year-olds." "The world of computers and the Internet is not something you're going to be able to school yourself on during working hours," he adds. If investigators and attorneys don't come to the cyber crime unit with a solid understanding of computers, "it's going to be hard for you to keep up with people on the other side." Adds Abraham: "Sometimes you don't stay ahead of criminals but you stay even with them." Central to that task is cooperation with other law-enforcement agencies. Many, including the Secret Service, the Immigration and Naturalization Service, the Drug Enforcement Agency and the FBI-which took the leading role in catching P.M.-have special units devoted to cyber crime. Prosecutors in Philadelphia recognize that they do not have the funding yet to acquire all the hardware and software necessary to handle all investigations in-house, and that solving cases will frequently require going to other agencies for help. But while the city's resources may be limited, Abraham notes, "I've never been told the federal government doesn't have enough money to investigate." Private Practice Someone who knows that well is Henry Hockeimer, an associate at Philadelphia's Hangley Aronchick Segal & Pudlin. Hockeimer was on the front lines of the cyber crime war as an assistant U.S. attorney in Oklahoma City from 1995 until last year. In that capacity, he successfully prosecuted a phony Internet bank that raked in $8 million of deposits and a $12 million fraud to sell worthless railroad bonds. Hockeimer says he doubts that cyber criminals will be the scourge of future generations of law enforcement officials. "They have enough knowledge to make a lot of money," he says, "(but) they don't have enough sophistication to always get away with it. "I think as the criminals become more sophisticated, law enforcement becomes more sophisticated. But sooner or later, it comes back to traditional investigative methods. Once you follow the trail, it leads you to the criminals." White-collar criminal defense attorney Elizabeth Ainslie, a partner at Philadelphia's Schnader Harrison Segal & Lewis, sees computer-enabled crime not as a new phenomenon, but as old vices being conducted by other means. "The cases I've had have not been ones where use of the computer was an issue," says Ainslie, a former federal prosecutor. "The cases I've had have focused on the fraud itself. It's just a new vehicle for the same old issues." Many in private practice, however, have noted an increased concern over computer-related crime and in the use of e-mail as evidence in criminal cases. According to Philadelphia litigator Mark Aronchick, a partner at Hangley Aronchick, the e-mail sword cuts both ways. "Because the written word is so powerful in litigation a lot of e-mail puts (defendants) behind the eight-ball," he says. But Aronchick adds that e-mail also has helped him clear defendants at trial. "I've had cases where I said, 'Thank God I have all this archival e-mail,' because now it's not just a lot of memories," he said. "Now I have a lot of evidence that's exculpatory." P.M.'s Sentence Unfortunately for P.M., the e-mail evidence that would have been presented at his trial if he did not reach a deal with prosecutors would not have been exculpatory. Instead, according to Berardinelli, P.M. will likely spend much of the remainder of his adolescence away from his family. Since his arrest, P.M. has been treated for psychiatric problems at Friends Hospital, and all parties hope to move him soon to Laurel House, a secure residential treatment facility outside Scranton, Pa., recommended by his treating physician. Where, presumably, P.M. will have supervised access to a computer. Edward Sherwin writes for The Legal Intelligencer, a sister publication of the Daily Report. /=-=-=-=-Click Here & Support Our Sponsor-=-=-=-=-=-=-=-=-=\ Buy Shoes Online at Zappos.com: 1. Fast, Reliable Site 2. Devoted Customer Service 3. Great Shoe Selection 4. Price, Fit, and Satisfaction Guaranteed. http://click.topica.com/aaabe7b1dhr0b1uN1Ic/Zappos \=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=/ --via http://techPolice.com archive: http://theMezz.com/cybercrime/archive unsubscribe: [EMAIL PROTECTED] subscribe: [EMAIL PROTECTED] url: http://theMezz.com/alerts ____________________________________________________________ T O P I C A -- Learn More. Surf Less. Newsletters, Tips and Discussions on Topics You Choose. http://www.topica.com/partner/tag01