CD INDEX

Note: Many of the documents in these subdirectories are in Adobe Acrobat format (pdf). If you do not already have a copy of the free Acrobat Reader, you can download it from Adobe's website.

International Agreements

Council of Europe
• Council of Europe Convention on Cybercrime (2001). (Word Document) (html)
• Explanation of the Council of Europe Convention on Cybercrime (2001). (website)

United Nations
• United Nations General Assembly Resolution 55-63: Combating the Criminal Misuse of Information Technologies (2000). (English pdf) (French pdf) (Russian pdf) (Spanish pdf)

APEC
• APEC Cybersecurity Strategy (2002). (Word Document) (html)

G8
• G8 Communiqué, Statement of Principles, and Action Plan (1997). (pdf) (Word Document)
• G8 Data Preservation Checklists. (html) (website)
• G8 Principles on the Availability of Data Essential to Protecting Public Safety. (html) (website)
• G8 Recommendations for Tracing Networked Communications Across National Borders in Terrorist and Criminal Investigations. (html) (website)

Organization of American States
• Permanent Council of the Organization of American States Final Report on the Meetings of Government Experts on Cyber Crime (1999). (pdf)

Resources on Drafting Cybercrime Laws

• Legal Frameworks for Combating Cybercrime: Components of Substantive Network Crimes Laws: How to Criminalize Attacks on Computer Networks and Information. Prepared by the Computer Crime and Intellectual Property Section, U.S. Department of Justice. (pdf) (Word Document)
• Legal Frameworks for Combating Cybercrime: Drafting Procedural Laws: Empowering Law Enforcement with the Legal Tools Needed to Investigate and Deter Cybercrime. Prepared by the Computer Crime and Intellectual Property Section, U.S. Department of Justice. (pdf) (Word Document)
• Legal Resources Available on the Internet. (html)

24-Hour Points-of-Contact Network

• Network of 24-Hour Points-of-Contact for High-tech Cases: Protocol Statement and Registration Form. (pdf) (Word Document)

United States Laws Criminalizing Attacks on Computer Networks and Governing the Collection of Electronic Evidence

• Computer Fraud and Abuse Act (18 U.S.C. § 1030). (pdf) (Word Document)
• Interception of Communications (18 U.S.C. § 2510 et. seq.). (pdf) (Word Document)
• Electronic Communications Privacy Act (18 U.S.C. § 2701 et. seq.). (pdf) (Word Document)
• Pen Register and Trap and Trace Devices (18 U.S.C. § 3121 et. seq.). (pdf) (Word Document)
• Federal Rules of Criminal Procedure: Rule 41 (Search and Seizure). (pdf) (Word Document)

Publications of the Computer Crime and Intellectual Property Section, U.S. Department of Justice

• Searching and Seizing Electronic Evidence. Revised Edition, July 2002. (pdf)
• Prosecuting Intellectual Property Crimes. November 2000. (pdf)