<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" bill-type="olc" dms-id="HF49081E0BCD04956AC5971D4EA9EF7B6" key="H" public-private="public"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>115 HR 3067 IH: Online Safety Modernization Act of 2017</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2017-06-27</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">115th CONGRESS</congress><session display="yes">1st Session</session><legis-num display="yes">H. R. 3067</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20170627">June 27, 2017</action-date><action-desc><sponsor name-id="C001101">Ms. Clark of Massachusetts</sponsor> (for herself, <cosponsor name-id="B001284">Mrs. Brooks of Indiana</cosponsor>, and <cosponsor name-id="M001181">Mr. Meehan</cosponsor>) introduced the following bill; which was referred to the <committee-name committee-id="HJU00">Committee on the Judiciary</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To amend title 18, United States Code, to establish certain criminal violations for various aspects
			 of harassment using the interstate telecommunications system, and for
			 other purposes.</official-title></form>
	<legis-body id="HCCB4EF682C314D48B51A100D92C65146" style="OLC">
		<section id="H9BB8BC0F10A14271A7FF13A6408E9D49" section-type="section-one"><enum>1.</enum><header>Short title; table of contents</header>
 <subsection id="HF2A69C95CA5C4346985C124D1497EC2F"><enum>(a)</enum><header>Short title</header><text display-inline="yes-display-inline">This Act may be cited as the <quote><short-title>Online Safety Modernization Act of 2017</short-title></quote>.</text> </subsection><subsection id="HEE746E36C40D4C228BB0FBE390A01B99"><enum>(b)</enum><header>Table of contents</header><text>The table of contents for this Act is as follows:</text>
				<toc container-level="legis-body-container" lowest-bolded-level="division-lowest-bolded" lowest-level="section" quoted-block="no-quoted-block" regeneration="yes-regeneration">
					<toc-entry idref="H9BB8BC0F10A14271A7FF13A6408E9D49" level="section">Sec. 1. Short title; table of contents.</toc-entry>
					<toc-entry idref="H39AB5F69E5CF485FB9D809DE888826FE" level="title">Title I—Interstate Sextortion Prevention</toc-entry>
					<toc-entry idref="HBB6FF08847364E19B82A9C418DCB6ACD" level="section">Sec. 101. Coercion of sexual acts, sexual contact, or sexually intimate visual depictions.</toc-entry>
					<toc-entry idref="HB64EF4793F964E868F1717D139A89832" level="section">Sec. 102. Amendments to existing statutory offenses.</toc-entry>
					<toc-entry idref="HC0EBA2452ADF4BCB9E15F6046FEA93DC" level="title">Title II—Interstate Swatting Hoax</toc-entry>
					<toc-entry idref="H2418E7B1F7914D8CB9EF9FEEB3B237B5" level="section">Sec. 201. False communications to cause an emergency response.</toc-entry>
					<toc-entry idref="H0D33F5FDEA39493AACF3128A8222CD38" level="title">Title III—Interstate Doxxing Prevention</toc-entry>
					<toc-entry idref="H4528C1B567D54BEBA8116128AFE43053" level="section">Sec. 301. Disclosure of personal information with the intent to cause harm.</toc-entry>
					<toc-entry idref="HA6FC6895776D4E26B11F93C94071FE75" level="title">Title IV—Cybercrime Statistics</toc-entry>
					<toc-entry idref="H1D3EDFCD267C4DD9B588CBD7560EA726" level="section">Sec. 401. National strategy, classification, and reporting on cybercrime.</toc-entry>
					<toc-entry idref="H2DAD5FE601494C4292B078A43B2C5D16" level="title">Title V—Prioritizing Online Threat Enforcement</toc-entry>
					<toc-entry idref="H01C233F5DDAA47A49DFF26451F35B467" level="section">Sec. 501. Improved investigative and forensic resources for enforcement of laws related to
			 cybercrimes against individuals.</toc-entry>
					<toc-entry idref="H96DE9846235D4A74BB346EF67A632C0D" level="section">Sec. 502. Annual reports.</toc-entry>
					<toc-entry idref="H781B48B1B0EA4445A2EB0B13B0D30D3D" level="section">Sec. 503. Definition of cybercrimes against individuals.</toc-entry>
					<toc-entry idref="H2004AD740F2743F8AA1BE16C698799C1" level="title">Title VI—Cybercrime Enforcement Training Assistance</toc-entry>
					<toc-entry idref="H0A3C187477644A958C94198BB5C80263" level="section">Sec. 601. Local law enforcement grants.</toc-entry>
					<toc-entry idref="HC4E79B88B5AE41A1B1F12A445F6C548F" level="section">Sec. 602. National Resource Center Grant.</toc-entry>
				</toc>
			</subsection></section><title id="H39AB5F69E5CF485FB9D809DE888826FE"><enum>I</enum><header>Interstate Sextortion Prevention</header>
			<section id="HBB6FF08847364E19B82A9C418DCB6ACD"><enum>101.</enum><header>Coercion of sexual acts, sexual contact, or sexually intimate visual depictions</header>
 <subsection id="HA106B3E114454DBB8DEF9F1CA3F05B76"><enum>(a)</enum><header>In general</header><text>Part 1 of title 18, United States Code, is amended by adding at the end the following new chapter:</text> <quoted-block display-inline="no-display-inline" id="H637F23C8F3404653951EF08E6813116F" style="USC"> <chapter id="HAB0AD0AA930D4D7B87E294DD542193F5"><enum>124</enum><header>Coercion of Sexual Acts, Sexual Contact, or sexually intimate visual depictions</header> <toc container-level="chapter-container" idref="HAB0AD0AA930D4D7B87E294DD542193F5" lowest-bolded-level="division-lowest-bolded" lowest-level="section" quoted-block="no-quoted-block" regeneration="yes-regeneration"> <toc-entry idref="H270807B849984E5199D8C9C0AD7B9998" level="section">2751. Coercion of sexual acts.</toc-entry> <toc-entry idref="HF8478CFEE02D4445AD5990DD208164C3" level="section">2752. Coercion of sexual contact.</toc-entry> <toc-entry idref="H5E4B84442AF645639CAE33F0B0AC3622" level="section">2753. Coerced production of sexually intimate visual depictions.</toc-entry> <toc-entry idref="H76B12E194AFA4C9190ECBBE20FB0EC81" level="section">2754. Coercion using sexually intimate visual depictions.</toc-entry> <toc-entry idref="H1758A25BEC1D423EA9BB02572F82D60F" level="section">2755. Extortion using sexually intimate visual depictions.</toc-entry> <toc-entry idref="H7D4BDF322BB24FBF8133FA0D36AC488B" level="section">2756. Offenses involving minors.</toc-entry> <toc-entry idref="H7144BDA2B9854828998CC0DFB08D0475" level="section">2757. Offenses resulting in death or serious bodily injury.</toc-entry> <toc-entry idref="HDBB7BFBBB40C4A618C1342FF77C79F6D" level="section">2758. Attempt.</toc-entry> <toc-entry idref="HE03BE04444514AA297544C2E739FC62E" level="section">2759. Repeat offenders.</toc-entry> <toc-entry idref="H0011203C4267404F9AF14CB4CFD10130" level="section">2760. Forfeitures.</toc-entry> <toc-entry idref="HFB74192661C14E2C801D3F02938EF7A4" level="section">2761. Mandatory restitution.</toc-entry> <toc-entry idref="H172FEC828CDA45E390DD9AEA4BB6EFB2" level="section">2762. Civil action.</toc-entry> <toc-entry idref="H7A47B39CB5F94D2D8691DFE4EE7FC59B" level="section">2763. Definitions.</toc-entry> </toc> <section id="H270807B849984E5199D8C9C0AD7B9998"><enum>2751.</enum><header>Coercion of sexual acts</header> <subsection id="H95A421A01176438BAA92B98B37D00D4E"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Whoever, using the mail or any facility or means of interstate or foreign commerce, knowingly causes any person to engage in a sexual act with another through coercion, fraud, or a threat to injure the person, property, or reputation of any person, shall be fined under this title or imprisoned for any number of years or for life, or both.</text>
 </subsection><subsection id="H7BB1ADC83EDA490BA1B6951FA9357744"><enum>(b)</enum><header>Threats</header><text display-inline="yes-display-inline">Whoever, with the intent to cause any person to engage in a sexual act with another, knowingly transmits any communication containing a threat to injure the person, property, or reputation of any person, using the mail or any facility or means of interstate or foreign commerce, shall be fined under this title or imprisoned not more than 5 years, or both.</text>
								</subsection></section><section id="HF8478CFEE02D4445AD5990DD208164C3"><enum>2752.</enum><header>Coercion of sexual contact</header>
 <subsection id="HBEDED8A4F3D740D4AFF53C50032D26FC"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Whoever, using the mail or any facility or means of interstate or foreign commerce, knowingly causes any person to engage in sexual contact with another through coercion, fraud, or a threat to injure the person, property, or reputation of any person, shall be fined under this title or imprisoned for not more than 10 years, or both.</text>
 </subsection><subsection id="H094CEDBADFEB493D924C1564BC4100A3"><enum>(b)</enum><header>Threats</header><text>Whoever, with the intent to cause any person to engage in sexual contact with another, knowingly transmits any communication containing a threat to injure the person, property, or reputation of any person, using the mail or any facility or means of interstate or foreign commerce, shall be fined under this title or imprisoned not more than 5 years, or both.</text>
								</subsection></section><section id="H5E4B84442AF645639CAE33F0B0AC3622"><enum>2753.</enum><header>Coerced production of sexually intimate visual depictions</header>
 <subsection id="H1FB9E751F6F84235A869CCD931E35028"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Whoever, in a circumstance described in subsection (b), knowingly causes any person to produce a sexually intimate visual depiction of any person through coercion, fraud, or a threat to injure the person, property, or reputation of any person, shall—</text>
 <paragraph id="H062947F0958544728C9378E52BB138E7"><enum>(1)</enum><text>if a sexual act with another results, be fined under this title or imprisoned for any number of years or for life, or both; and</text>
 </paragraph><paragraph id="H8D3556082F17412B9B046E85A999B547"><enum>(2)</enum><text>in any other case, be fined under this title or imprisoned not more than 20 years, or both.</text> </paragraph></subsection><subsection id="H6D19BEA813164F87A33D5955E1AEA457"><enum>(b)</enum><header>Circumstances described</header><text display-inline="yes-display-inline">The circumstances referred to in subsection (a) are—</text>
 <paragraph id="H9BF9149120294857B3146D64E2775B83"><enum>(1)</enum><text>that the person used the mail or any facility or means of interstate or foreign commerce to cause any person to produce a sexually intimate visual depiction of any person;</text>
 </paragraph><paragraph id="HC2067164DA604CCD809783402B9DDE66"><enum>(2)</enum><text>that the person knows or has reason to know that such visual depiction will be—</text> <subparagraph id="HB8FDBCF15FCD4BD0B176024EBED75C09"><enum>(A)</enum><text>transported or transmitted using any means or facility of interstate or foreign commerce;</text>
 </subparagraph><subparagraph id="H2518FDB73CCE41529CF4845C624A84D5"><enum>(B)</enum><text>transported or transmitted in or affecting interstate or foreign commerce; or</text> </subparagraph><subparagraph id="HD32A727E17474E16B698379C10223E84"><enum>(C)</enum><text>mailed;</text>
 </subparagraph></paragraph><paragraph id="H49E8FC15E3484FE4B0647A25A8BB3668"><enum>(3)</enum><text>the visual depiction was produced or transmitted using materials that have been mailed, or shipped or transported in or affecting interstate or foreign commerce by any means, including by computer;</text>
 </paragraph><paragraph id="H30A4D709C7D24B6C99A83625CB4DC6F9"><enum>(4)</enum><text>such visual depiction has actually been—</text> <subparagraph id="HE39343E933B54BB2A519F32B4B7741A6"><enum>(A)</enum><text>transported or transmitted using any means or facility of interstate or foreign commerce;</text>
 </subparagraph><subparagraph id="HC13FF993181548EEBF716662F318A430"><enum>(B)</enum><text>transported or transmitted in or affecting interstate or foreign commerce; or</text> </subparagraph><subparagraph id="H14A338B04BEF4BB08D8BC30FABB26F35"><enum>(C)</enum><text>mailed; or</text>
 </subparagraph></paragraph><paragraph id="HAA8B0A02C31547AAAADEB7802B63A8A8"><enum>(5)</enum><text>any part of the offense occurred in a territory or possession of the United States or within the special maritime and territorial jurisdiction of the United States.</text>
 </paragraph></subsection><subsection id="H4D410F6A13CC4D49BBD8A9A80843BEC4"><enum>(c)</enum><header>Threats</header><text>Whoever, with the intent to cause another person to produce a sexually intimate visual depiction of any person, knowingly transmits any communication containing a threat to injure the person, property, or reputation of any person, using the mail or any facility or means of interstate or foreign commerce, shall be fined under this title or imprisoned not more than 5 years, or both.</text>
 </subsection><subsection id="HB607767E7FE9441FB36B4D0F2A8559EB"><enum>(d)</enum><header>Offenses involving minors</header><text>Notwithstanding any other provision of law, in any case under this section involving a victim under the age of 18 where the sexually intimate visual depiction constitutes child pornography as defined in section 2256(8), the offender shall be punished as provided in section 2251(e).</text>
 </subsection><subsection id="H5BE1A20310DB4A4C97DC764002957111"><enum>(e)</enum><header>Definition</header><text>In this section, the term <term>sexually intimate visual depiction</term> shall not include any computer-generated sexually intimate visual depiction.</text> </subsection></section><section id="H76B12E194AFA4C9190ECBBE20FB0EC81"><enum>2754.</enum><header>Coercion using sexually intimate visual depictions</header> <subsection id="H2D75D0CC78E04DFCBA6422C0AAE44A19"><enum>(a)</enum><header>In general</header><text>Whoever, using the mail or any facility or means of interstate or foreign commerce, knowingly causes another person to engage or refrain from engaging in conduct through a threat to publish any sexually intimate visual depiction of the addressee or of an immediate family member or intimate partner of the addressee, shall be fined under this title or imprisoned not more than 7 years or both.</text>
 </subsection><subsection id="HE725789EF205453681179EA54EE863E3"><enum>(b)</enum><header>Threats</header><text>Whoever, with the intent to cause another person to engage or refrain from engaging in conduct, knowingly transmits any communication containing a threat to publish any sexually intimate visual depiction of the addressee or of an immediate family member or intimate partner of the addressee, using the mail or any facility or means of interstate or foreign commerce, shall be fined under this title or imprisoned not more than 5 years, or both.</text>
 </subsection><subsection id="HA714CB4E326C47909AEFF29983309845"><enum>(c)</enum><header>Definition</header><text>In this section the term <term>sexually intimate visual depiction</term> includes any computer-generated sexually intimate visual depiction that is indistinguishable from an actual depiction of the addressee or of an immediate family member or intimate partner of the addressee.</text>
								</subsection></section><section id="H1758A25BEC1D423EA9BB02572F82D60F"><enum>2755.</enum><header>Extortion using sexually intimate visual depictions</header>
 <subsection id="HE678C18A34EB4EB2A12A059BC05A9D1B"><enum>(a)</enum><header>In general</header><text>Whoever, using the mail or any facility or means of interstate or foreign commerce, knowingly extorts any money, property, or other thing of value from another person through a threat to publish any sexually intimate visual depiction of the addressee or of an immediate family member or intimate partner of the addressee, shall be fined under this title or imprisoned not more than 7 years or both.</text>
 </subsection><subsection id="HD6D6893E366748BB8084B4E7BBDE4465"><enum>(b)</enum><header>Threats</header><text>Whoever, with the intent to extort any money, property, or other thing of value from any person, knowingly transmits any communication containing a threat to publish any sexually intimate visual depiction of the addressee or of an immediate family member or intimate partner of the addressee, using the mail or any facility or means of interstate or foreign commerce, shall be fined under this title or imprisoned not more than 5 years, or both.</text>
 </subsection><subsection id="HFCEADC90EEC14F9494B6FCFE62043557"><enum>(c)</enum><header>Definition</header><text>In this section the term <term>sexually intimate visual depiction</term> includes any computer-generated sexually intimate visual depiction that is indistinguishable from an actual depiction of the addressee or of an immediate family member or intimate partner of the addressee.</text>
								</subsection></section><section id="H7D4BDF322BB24FBF8133FA0D36AC488B"><enum>2756.</enum><header>Offenses involving minors</header>
 <subsection id="H52FDEF6A017240009808AEAAD6DBEF31"><enum>(a)</enum><header>Offenses involving minors under 18</header><text>If the conduct that violates this chapter involves a victim or intended victim who has attained the age of 12 years but has not attained the age of 18 years, or who the defendant believes has attained the age of 12 years but has not attained the age of 18 years, the maximum term of imprisonment authorized for that offense shall be increased by 5 years in addition to any penalty otherwise provided in this chapter.</text>
 </subsection><subsection id="HB109825D9DAB4EADBE981502E432AB84"><enum>(b)</enum><header>Offenses involving minors under 12</header><text>If the conduct that violates this chapter involves a victim or intended victim who has not attained the age of 12 years, or who the defendant believes has not attained the age of 12 years, the maximum term of imprisonment authorized for that offense shall be twice that otherwise provided in this chapter.</text>
								</subsection></section><section id="H7144BDA2B9854828998CC0DFB08D0475"><enum>2757.</enum><header>Offenses resulting in death or serious bodily injury</header>
 <subsection id="H47382498254B40D3A60F034446B84061"><enum>(a)</enum><header>Offenses resulting in death</header><text>A person who commits a violation of this chapter that results in the death of any person, shall be fined under this title or imprisoned for any number of years or for life, or both.</text>
 </subsection><subsection id="H375FC909F621483D9315BC6A306B6E46"><enum>(b)</enum><header>Offenses resulting in serious bodily injury</header><text>A person who commits a violation of this chapter that results in serious bodily injury to any person, shall be fined under this title or imprisoned not more than 20 years, or both.</text>
								</subsection></section><section id="HDBB7BFBBB40C4A618C1342FF77C79F6D"><enum>2758.</enum><header>Attempt</header>
 <subsection id="HD7EA780DCA754DCAB7C7B87BB20807FB"><enum>(a)</enum><header>In General</header><text display-inline="yes-display-inline">An attempt to violate section 2751(a), 2752(a), 2753(a), 2754(a), or 2755(a) shall be punishable in the same manner as a completed violation of that section.</text>
 </subsection><subsection id="HF692C5F65A6643BB85E3D3D23FA6CD7F"><enum>(b)</enum><header>Limitation</header><text display-inline="yes-display-inline">For the purposes of sections 2751, 2752, 2753, 2754, and 2755, conduct consisting exclusively of a violation of 2751(b), 2752(b), 2753(c), 2754(b), and 2755(b) shall not constitute an attempted violation of 2751(a), 2752(a), 2753(a), 2754(a), and 2755(a).</text>
								</subsection></section><section id="HE03BE04444514AA297544C2E739FC62E"><enum>2759.</enum><header>Repeat offenders</header>
 <subsection id="H3B280B8D318D47BBAC34CD91B25BC7AE"><enum>(a)</enum><header>Maximum term of imprisonment</header><text>The maximum term of imprisonment authorized for a violation of section 2751(a), 2752(a), or 2753(a)(1) after a prior sex offense conviction shall be twice the term of imprisonment otherwise provided by this chapter, unless section 3559(e) applies.</text>
 </subsection><subsection id="HAA84D1AF59704767A1EFC041150933D4"><enum>(b)</enum><header>Definitions</header><text>In this section—</text> <paragraph id="H2C63DD1034CD4F3FA097BCAD0104E666"><enum>(1)</enum><text>the term <term>prior sex offense conviction</term> means a conviction for an offense—</text>
 <subparagraph id="HDE33A76B92EC4F00935C20B836C3A608"><enum>(A)</enum><text>under chapter 109A, chapter 110, chapter 117 or section 1591, 2751(a), 2752(a), 2753(a)(1); or</text> </subparagraph><subparagraph id="H5277C6BB0A364436BD626217B28327AD"><enum>(B)</enum><text>under State law or the Uniform Code of Military Justice involving an offense described in subparagraph (A) or would be such an offense if committed under circumstances supporting federal jurisdiction; and</text>
 </subparagraph></paragraph><paragraph id="HEEA59E5375584B05B37B282971A2071F"><enum>(2)</enum><text>the term <term>State</term> means a State of the United States, the District of Columbia, and any commonwealth, territory, or possession of the United States.</text>
									</paragraph></subsection></section><section id="H0011203C4267404F9AF14CB4CFD10130"><enum>2760.</enum><header>Forfeitures</header>
 <subsection id="HCCA5614189AE44A4A5ADCB946C4260D5"><enum>(a)</enum><header>In general</header><text>The court, in imposing sentence on any person convicted of a violation of this chapter, shall order, in addition to any other sentence imposed and irrespective of any provision of State law, that such person shall forfeit to the United States—</text>
 <paragraph id="H2BEA0E4EA2D641E180651D576DB13472"><enum>(1)</enum><text>such person’s interest in any property, real or personal, that was used or intended to be used to commit or to facilitate the commission of such violation; and</text>
 </paragraph><paragraph id="H2A1669E5837B48788DAF607CDD26DE72"><enum>(2)</enum><text>any property, real or personal, constituting or derived from any proceeds that such person obtained, directly or indirectly, as a result of such violation.</text>
									</paragraph></subsection><subsection id="HF3FF20DC47B540BA8C9DE43A2BABCD07"><enum>(b)</enum><header>Property subject to forfeiture</header>
 <paragraph id="H722427A018CD4CA9A9B0AB4DC542BABA"><enum>(1)</enum><header>In general</header><text>The following shall be subject to forfeiture to the United States and no property right shall exist in them:</text>
 <subparagraph id="H4DDD8CA25BF6433C9AA307A36D589C31"><enum>(A)</enum><text>any property, real or personal, used or intended to be used to commit or to facilitate the commission of any violation of this chapter;</text>
 </subparagraph><subparagraph id="H7FE6BC1DA5044D4CB8FEABFEC0B0EDC9"><enum>(B)</enum><text>any property, real or personal, that constitutes or is derived from proceeds traceable to any violation of this chapter; and</text>
 </subparagraph><subparagraph id="H186DC7BB669A45209057BA6D6352D0C5"><enum>(C)</enum><text display-inline="yes-display-inline">any visual depiction that was produced, used, or intended for use in violation of this chapter.</text> </subparagraph></paragraph><paragraph id="HE8739E7F348B4CCE8C2BCC58C173DA31"><enum>(2)</enum><header>Applicability of chapter 46</header><text>The provisions of chapter 46 of this title relating to civil forfeitures shall apply to any seizure or civil forfeiture under this subsection.</text>
									</paragraph></subsection><subsection id="H60BF74E7B77C4320AFB844E6D9BE333E"><enum>(c)</enum><header>Transfer of forfeited assets</header>
 <paragraph id="H86223248FE9E45259FEB860F82902108"><enum>(1)</enum><header>In general</header><text>The Attorney General is authorized to transfer assets forfeited pursuant to this section, or the proceeds derived from the sale thereof, to satisfy victim restitution orders arising from violations of this chapter.</text>
 </paragraph><paragraph id="H427BF2F9AF264E4896218BD8D0B801C2"><enum>(2)</enum><header>Use of non-forfeited assets</header><text>Transfers pursuant to paragraph (1) shall not reduce or otherwise mitigate the obligation of a person convicted of a violation of this chapter to satisfy the full amount of a restitution order through the use of non-forfeited assets or to reimburse the Attorney General for the value of assets or proceeds transferred under this subsection through the use of non-forfeited assets.</text>
									</paragraph></subsection></section><section id="HFB74192661C14E2C801D3F02938EF7A4"><enum>2761.</enum><header>Mandatory restitution</header>
 <subsection id="H939C73AFD7794E6882DAF56A6E2A6841"><enum>(a)</enum><header>In general</header><text>Notwithstanding section 3663 or 3663A, and in addition to any other civil or criminal penalty authorized by law, the court shall order restitution for any offense under this chapter.</text>
								</subsection><subsection id="H8951DEED9A524A2DBD05D7324151DB4D"><enum>(b)</enum><header>Scope and nature of order</header>
 <paragraph id="H2421E09C4EC147BDAAF8DA170975ECFA"><enum>(1)</enum><header>Directions</header><text>The order of restitution under this section shall direct the defendant to pay to the victim (through the appropriate court mechanism) the full amount of the victim’s losses as determined by the court pursuant to paragraph (2).</text>
 </paragraph><paragraph id="H2CF48077CB294C059906C8798C63FB6F"><enum>(2)</enum><header>Enforcement</header><text>An order of restitution under this section shall be issued and enforced in accordance with section 3664 in the same manner as an order under section 3663A.</text>
 </paragraph><paragraph id="H1E84E295B91D4B539E4EE4E5AF155485"><enum>(3)</enum><header>Definition</header><text>For purposes of this subsection, the term <term>full amount of the victim’s losses</term> includes any costs incurred by the victim for—</text> <subparagraph id="HADE2BB876F7F4D43B800438FE8834815"><enum>(A)</enum><text>medical services relating to physical, psychiatric, or psychological care;</text>
 </subparagraph><subparagraph id="HB3409EA9332A4BD58DC2C6AB1D9F5A64"><enum>(B)</enum><text>physical and occupational therapy or rehabilitation;</text> </subparagraph><subparagraph id="H23B54871F10F462CA1656E0150F7F13A"><enum>(C)</enum><text>necessary transportation, temporary housing, and child care expenses;</text>
 </subparagraph><subparagraph id="H64BA0DA848D743E18FC7FE3DAC17A599"><enum>(D)</enum><text>lost income;</text> </subparagraph><subparagraph id="HC6A0E0559A0143E7A471A0D436342E6B"><enum>(E)</enum><text>attorneys’ fees, plus any costs incurred in obtaining a civil protection order; and</text>
 </subparagraph><subparagraph id="H6CBB6444AA704D52A1C3EBA84890A3C2"><enum>(F)</enum><text>any other losses suffered by the victim as a proximate result of the offense.</text> </subparagraph></paragraph><paragraph id="H60630718196641819D75AD8DCE1B6D32"><enum>(4)</enum><header>Order mandatory</header> <subparagraph id="H065A4753AE3E4EBDAF85B23B489FC712"><enum>(A)</enum><text>The issuance of a restitution order under this section is mandatory.</text>
 </subparagraph><subparagraph id="H7BA936715CAD46D1B70863071756DF99"><enum>(B)</enum><text>A court may not decline to issue an order under this section because of—</text> <clause id="HD4D0C72BADBF40AF95ACB5F4470C6954"><enum>(i)</enum><text>the economic circumstances of the defendant; or</text>
 </clause><clause id="H141011E675CB4B61A86A2F976D3C487D"><enum>(ii)</enum><text>the fact that a victim has, or is entitled to, receive compensation for his or her injuries from the proceeds of insurance or any other source.</text>
 </clause></subparagraph></paragraph></subsection><subsection id="H1893CC978B1E42A0A84A1AE0921A35F2"><enum>(c)</enum><header>Transfer of crime victim’s rights</header><text>In the case of a victim who is under 18 years of age, incompetent, incapacitated, or deceased, the legal guardian of the victim or representative of the victim’s estate, another family member, or any other person appointed as suitable by the court, may assume the crime victim’s rights under this chapter, but in no event shall the defendant be named as such representative or guardian.</text>
								</subsection></section><section id="H172FEC828CDA45E390DD9AEA4BB6EFB2"><enum>2762.</enum><header>Civil action</header>
 <subsection id="HC848C6B7E5C448A7A1DDA33664042AC8"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">An individual who is a victim of an offense under this chapter may bring a civil action against the perpetrator (or whoever knowingly benefits, financially or by receiving anything of value from participation in a venture which that person knew or should have known has engaged in an act in violation of this chapter) in an appropriate district court of the United States and may recover damages and any other appropriate relief, including reasonable attorney’s fees.</text>
 </subsection><subsection id="HA4CA97DA7A7B4756BBF259E3BCB910DD"><enum>(b)</enum><header>Joint and several liability</header><text>An individual who is found liable under this section shall be jointly and severally liable with each other person, if any, who is found liable under this section for damages arising from the same violation of this chapter.</text>
								</subsection><subsection id="H4EEE164BC93543858F67B637E5FB63BA"><enum>(c)</enum><header>Stay pending criminal action</header>
 <paragraph id="H6C4A3049A95E424EB8DCE12358779E95"><enum>(1)</enum><text>Any civil action filed under this section shall be stayed during the pendency of any criminal action arising out of the same occurrence in which the claimant is the victim.</text>
 </paragraph><paragraph id="H76CFCB398C82469EBF299549F2199ADC"><enum>(2)</enum><text>In this subsection, the term <term>criminal action</term> includes an investigation and prosecution that is pending, until final adjudication in the trial court.</text>
 </paragraph></subsection><subsection id="H56AA749EE62E4EF990845054E5AC0AA2"><enum>(d)</enum><header>Statute of limitations</header><text>No action may be maintained under this section unless it is commenced not later than the later of—</text> <paragraph id="H7674120D40E04A5C8415ED5B1DF92909"><enum>(1)</enum><text>10 years after the cause of action arose; or</text>
 </paragraph><paragraph id="H4969823B791945B78CBD4B5DE58421AA"><enum>(2)</enum><text>10 years after the victim reaches 18 years of age, if the victim was a minor at the time of the alleged offense.</text>
 </paragraph></subsection></section><section id="H7A47B39CB5F94D2D8691DFE4EE7FC59B"><enum>2763.</enum><header>Definitions</header><text display-inline="no-display-inline">In this chapter:</text> <paragraph id="HAA91DF812A104D2B9BAEE38F045F35CF"><enum>(1)</enum><header>Sexual act</header><text>The term <term>sexual act</term> means—</text>
 <subparagraph id="H46FE78C2BC2746BA88FF643DF31C5C8C"><enum>(A)</enum><text>any genital to genital, oral to genital, anal to genital, or oral to anal contact, not through the clothing;</text>
 </subparagraph><subparagraph id="HC2F34C8AC17B4C158785F8D6D8721629"><enum>(B)</enum><text>the penetration, however slight, of the anal or genital opening of any person by a hand or finger or by any object; or</text>
 </subparagraph><subparagraph id="H958442653701445A8D9158C639943AAB"><enum>(C)</enum><text>the intentional touching, not through the clothing, of the genitalia of or by any person.</text> </subparagraph></paragraph><paragraph id="HF692F8CC3FAD4BC496DB0577D2D2634A"><enum>(2)</enum><header>Coercion</header><text>The term <term>coercion</term> means—</text>
 <subparagraph id="H4D5DB5D6EB7E4BCE841AF0C3FF84EEC8"><enum>(A)</enum><text>threats of serious harm to or physical restraint against any person;</text> </subparagraph><subparagraph id="H997576D91F7B4B278702CF9BF10316D5"><enum>(B)</enum><text>any scheme, plan, or pattern intended to cause a person to believe that failure to perform an act would result in serious harm to or physical restraint against any person; or</text>
 </subparagraph><subparagraph id="HA35A2A46826547EBBB52A5D526A0B241"><enum>(C)</enum><text>the abuse or threatened abuse of law or the legal process.</text> </subparagraph></paragraph><paragraph id="H8FC25E76D47D4CE389D1DE96B4024926"><enum>(3)</enum><header>Sexual contact</header><text display-inline="yes-display-inline">The term <term>sexual contact</term> means the intentional touching, either directly or through the clothing, of the genitalia, anus, groin, breast, inner thigh, or buttocks of any person, or the intentional transmission or transfer of male or female ejaculate onto any part of another person's body.</text>
 </paragraph><paragraph id="H900A810759E94163BC66B414820ABA61"><enum>(4)</enum><header>Produce</header><text>The term <term>produce</term> means to create, make, manufacture, photograph, film, videotape, record, or transmit live a visual depiction.</text>
 </paragraph><paragraph id="H290765623B0E4B43A2377A37EECFD92A"><enum>(5)</enum><header>Sexually intimate visual depiction</header><text display-inline="yes-display-inline">The term <term>sexually intimate visual depiction</term> means any photograph, film, video, or other recording or live transmission of a person, whether produced by electronic, mechanical, or other means (including depictions stored on undeveloped film and videotape, data stored on computer disk or by any electronic means that is capable of conversion into a visual image, and data that is capable of conversion into a visual image that has been transmitted by any means, whether or not stored in a permanent format), that depicts—</text>
 <subparagraph id="HD3C1BACC05A14C228C183994F3A964A3"><enum>(A)</enum><text>the naked exhibition of the anus, the post-pubescent female nipple, the genitals, or the pubic area of any person;</text>
 </subparagraph><subparagraph id="HAE0218A5FE8F48E7869C870DD1748553"><enum>(B)</enum><text>any actual or simulated sexual contact or sexual act;</text> </subparagraph><subparagraph id="H7B72220ABF564924928E66CE4E2993BD"><enum>(C)</enum><text>bestiality; or</text>
 </subparagraph><subparagraph id="H7DA9F7B02D564221B3DB5644336E5A05"><enum>(D)</enum><text>sadistic or masochistic conduct.</text> </subparagraph></paragraph><paragraph id="H1D982CCCD4B4435A913FBD428C8AD905"><enum>(6)</enum><header>Victim</header><text>The term <term>victim</term> means the individual harmed as a result of a commission of a crime under this chapter.</text>
 </paragraph><paragraph id="HBF14DC13582544DB99F7E56A27756178"><enum>(7)</enum><header>Minor</header><text>The term <term>minor</term> means any person who has not attained the age of 18 years.</text> </paragraph><paragraph id="H5EC7ABE0BBB8401FAE0221D38DD8EE0D"><enum>(8)</enum><header>Publish</header><text display-inline="yes-display-inline">The term <term>publish</term> means to circulate, deliver, distribute, disseminate, transmit, or otherwise make available to another person, and includes the hosting or display on the internet by an information content provider.</text>
 </paragraph><paragraph id="H73D686CA6C7D4428A364784DC9C692D0"><enum>(9)</enum><header>Immediate family member</header><text>The term <term>immediate family member</term> means the addressee’s—</text> <subparagraph id="H68FFC994646941C48B654311D2658600"><enum>(A)</enum><text display-inline="yes-display-inline">spouse, parent, legal guardian, grandparent, sibling, child, grandchild, or person for whom the addressee serves as legal guardian; or</text>
 </subparagraph><subparagraph id="H5BA84424DB054612BBEFD65919BACD42"><enum>(B)</enum><text>any other person living in the addressee’s household and related to the addressee by blood or marriage.</text>
 </subparagraph></paragraph><paragraph id="HC04F18D33EEA43428BC47449F1997127"><enum>(10)</enum><header>Intimate partner</header><text>The term <term>intimate partner</term> means a person who is or has been in a social relationship of a romantic or intimate nature with the addressee, as determined by the length of the relationship, the type of relationship, and the frequency of interaction between the persons involved in the relationship.</text>
 </paragraph><paragraph id="HAD252C04722D4D75B176476EDD64DD2F"><enum>(11)</enum><header>Computer-generated sexually intimate visual depiction</header><text>The term <term>computer-generated sexually intimate visual depiction</term> means a depiction that has been created, adapted, or modified through the use of any computer technology to appear to be a sexually intimate visual depiction.</text>
 </paragraph><paragraph id="H12D28B9AE5544E609C221B1B6E7D80D2"><enum>(12)</enum><header>Indistinguishable</header><text>The term <term>indistinguishable</term>, means virtually indistinguishable, in that the computer-generated sexually intimate visual depiction is such that an ordinary person viewing the computer-generated depiction would conclude that it is an actual depiction of the addressee or of an immediate family member or intimate partner of the addressee. This definition does not apply to depictions that are drawings, cartoons, sculptures, or paintings depicting any person.</text>
 </paragraph><paragraph id="H5F50A848371E4ED9B1DE8348B1E30EC1"><enum>(13)</enum><header>Actual depiction</header><text>The term <term>actual depiction</term> means a depiction that has not been fabricated or materially altered to change the appearance or physical characteristics of the persons, objects, or activities depicted.</text>
 </paragraph><paragraph id="H0023FD400D684554A00C7D3CD6E2F409"><enum>(14)</enum><header>Serious bodily injury</header><text>The term <term>serious bodily injury</term> means bodily injury that involves a substantial risk of death, unconsciousness, extreme physical pain, protracted and obvious disfigurement, or protracted loss or impairment of the function of a bodily member, organ, or mental faculty.</text>
								</paragraph></section></chapter><after-quoted-block>.</after-quoted-block></quoted-block>
 </subsection><subsection id="H3AF42FE9F69E49FCB2F25F41E163ED88"><enum>(b)</enum><header>Clerical amendment</header><text>The table of chapters at the beginning of part 1 of title 18, United States Code, is amended adding at the end the following new item:</text>
					<quoted-block display-inline="no-display-inline" id="H3D71EAA646B04FCEAD7D5E8CBB78F5B8" style="USC">
						<toc regeneration="no-regeneration">
							<toc-entry bold="on" level="chapter">Chapter 124—Coercion of Sexual Acts, Sexual Contact, or sexually intimate visual depictions</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection><subsection id="HD12E2D041A0E40C2A692372AE925A65F"><enum>(c)</enum><header>Directive to United States Sentencing Commission</header>
 <paragraph id="HFA0E541960014A4EB10EF07F1F4C97CB"><enum>(1)</enum><header>In general</header><text>Pursuant to its authority under section 994(p) of title 28, United States Code, and in accordance with this section, the United States Sentencing Commission shall review and amend its guidelines and its policy statements applicable to persons convicted of an offense defined in chapter 124 added to title 18, United States Code, by this title, to ensure that the guidelines and policy statements are consistent with those amendments and reflect the intent of Congress that the guidelines reflect the seriousness and great harm caused by those offenses.</text>
 </paragraph><paragraph id="HA7448ED32BD94908B9050A7E2228B00F"><enum>(2)</enum><header>Considerations</header><text>In carrying out this section, the United States Sentencing Commission shall consider—</text> <subparagraph id="HBC2B1A1B46E0428699A799014E11063E"><enum>(A)</enum><text>the mandate of the United States Sentencing Commission, pursuant to its authority under section 994(p) of title 28, United States Code, to promulgate guidelines that meet the purposes of sentencing as set forth in section 3553(a)(2) of title 18, and in particular to ensure that sentencing courts properly consider the seriousness of the offense, to promote respect for the law, to provide just punishment for the offense, to afford adequate deterrence to criminal conduct, and to protect the public from further crimes of the defendant; and</text>
 </subparagraph><subparagraph id="H8E2710ED8B1349CFA76DAB9F0D96B275"><enum>(B)</enum><text>the intent of Congress that the penalties for defendants convicted of an offense under that chapter are appropriately severe and account for the nature of the visual depiction, the acts engaged in, and the potential harm resulting from the offense; the number and age of the victims involved; and the degree to which the victims have been harmed.</text>
						</subparagraph></paragraph></subsection></section><section id="HB64EF4793F964E868F1717D139A89832"><enum>102.</enum><header>Amendments to existing statutory offenses</header>
 <subsection id="HA842C0A4E55B4463AFE05B153AE20124"><enum>(a)</enum><text display-inline="yes-display-inline">Section 843(b)(2)(C) of title 10, United States Code (Art. 43(b)(2)(C) of the Uniform Code of Military Justice), is amended by inserting <quote>, 2751(a), 2752(a), or 2753(a)(1)</quote> after <quote>section 1591</quote>.</text>
 </subsection><subsection id="HF3490663CDDB41F199D1C9CAC6ACEDA4"><enum>(b)</enum><text>Section 1001(a) of title 18, United States Code, is amended by inserting <quote>2751(a), 2752(a), or 2753(a)(1),</quote> after <quote>section 1591,</quote>.</text> </subsection><subsection id="H31C1FCBA8C0E4C8BB8C5700A49B5371A"><enum>(c)</enum><text>Section 2251(e) of title 18, United States Code, is amended by inserting <quote>section 2751(a), section 2752(a), section 2753(a)(1),</quote> after <quote>section 1591,</quote>.</text>
 </subsection><subsection id="H7976AE7D4A5B4638AD94A56B8314B467"><enum>(d)</enum><text>Section 2252(b) of title 18, United States Code, is amended—</text> <paragraph id="H2ABE38BA744C465D8CB97720D7DF28AE"><enum>(1)</enum><text>in subsection (1) by inserting <quote>section 2751(a), section 2752(a), section 2753(a)(1),</quote> after <quote>section 1591,</quote>; and</text>
 </paragraph><paragraph id="H176ED9F11B7D4579911C7A6BED899B67"><enum>(2)</enum><text>in subsection (2) by inserting <quote>section 2751(a), section 2752(a), section 2753(a)(1),</quote> after <quote>under this chapter,</quote>.</text> </paragraph></subsection><subsection id="HFE806AC8C7A54BA1ACC61E2D5D4DFCDB"><enum>(e)</enum><text>Section 2252A(b) of title 18, United States Code, is amended—</text>
 <paragraph id="H13C41A1AC3F34F09B67AE691F39A7954"><enum>(1)</enum><text>in subsection (1) by inserting <quote>section 2751(a), section 2752(a), section 2753(a)(1),</quote> after <quote>section 1591,</quote>; and</text> </paragraph><paragraph id="HA2D0BF44682640A1B333E6160C01C7E9"><enum>(2)</enum><text>in subsection (2) by inserting <quote>section 2751(a), section 2752(a), section 2753(a)(1),</quote> after <quote>under this chapter,</quote>.</text>
 </paragraph></subsection><subsection id="H38979C1D3B3D49F7844F5C2E28AB3B08"><enum>(f)</enum><text>Section 2252A(g) of title 18, United States Code, is amended by inserting <quote>or section 2751(a), 2752(a), or 2753(a)(1) (involving a minor victim),</quote> after <quote>117 (involving a minor victim),</quote>.</text> </subsection><subsection id="HB0435674AEB84322A4EFF3BBF5E19557"><enum>(g)</enum><text>Section 2255(a) of title 18, United States Code, is amended—</text>
 <paragraph id="H45B6111F637C464BB5C5954EE3560A38"><enum>(1)</enum><text>by striking <quote>or</quote> after <quote>2422,</quote>; and</text> </paragraph><paragraph id="H7072EFED988D4C9A8DFD8FFBCAB400C8"><enum>(2)</enum><text>by inserting <quote>, 2751(a), 2752(a), or 2753(a)(1)</quote> after <quote>2423</quote>.</text>
 </paragraph></subsection><subsection id="HD248FAC12BA148DE97EE1B803EFF9F44"><enum>(h)</enum><text>Section 2260A of title 18, United States Code, is amended—</text> <paragraph id="HF00F72AD71534FE0A00F049E664A44CA"><enum>(1)</enum><text>by striking <quote>or</quote> after <quote>2423,</quote>; and</text>
 </paragraph><paragraph id="HE171E25C4F144DE2BED2A98FC914B9F0"><enum>(2)</enum><text>by inserting <quote>2751(a), 2752(a), or 2753(a)(1),</quote> after <quote>2425,</quote>.</text> </paragraph></subsection><subsection id="H3522D6BC9C6F4EFEADAB36BBCC21BD7C"><enum>(i)</enum><text>Section 2426(b)(1)(A) of title 18, United States Code, is amended—</text>
 <paragraph id="H9EDAE73560A6470FB0262FF4541F9413"><enum>(1)</enum><text>by striking <quote>or</quote> after <quote>chapter 110,</quote>; and</text> </paragraph><paragraph id="H779A6E31983C4D6FAB702C13E878C37F"><enum>(2)</enum><text>by inserting <quote>, section 2751(a), section 2752(a), or section 2753(a)(1)</quote> after <quote>section 1591</quote>.</text>
 </paragraph></subsection><subsection id="HF78F3062F89E42E2A27B0FCA824856B2"><enum>(j)</enum><text>Section 2516(1)(c) of title 18, United States Code, is amended by inserting <quote>sections 2751, 2752, 2753, 2754, and 2755 (relating to coercion of sexual acts and related crimes),</quote> after <quote>2425 (relating to transportation for illegal sexual activity and related crimes),</quote>.</text> </subsection><subsection id="HA4DDE0C6DD0A413892CDB0C467AEC824"><enum>(k)</enum><text>Section 3014(a) of title 18, United States Code, is amended—</text>
 <paragraph id="HE7DFBDC5BDAD41C19190AF4DE1A48B55"><enum>(1)</enum><text>by redesignating subsection (5) as subsection (6);</text> </paragraph><paragraph id="HBE78A5C5A96048DFACAC19875C3A9C85"><enum>(2)</enum><text>in subsection (4), by striking <quote>or</quote> at the end; and</text>
 </paragraph><paragraph id="HADE1005556804056B1BEDF7FB948C982"><enum>(3)</enum><text>by inserting after subsection (4) the following:</text> <quoted-block id="HC261572D832141779D4231A26E88B900" style="OLC"> <paragraph id="H739C8D3587304E1D8AE9FF5AD6722499"><enum>(5)</enum><text>section 2751(a), 2752(a), or 2753(a) (relating to coercion of sexual acts and related crimes); or</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block>
 </paragraph></subsection><subsection id="HE38112F530894592B71885F439E0A68E"><enum>(l)</enum><text>Section 3142 of title 18, United States Code, is amended—</text> <paragraph id="H549D1C1183CB494391C94D62AFD77546"><enum>(1)</enum><text>in subsection (c)—</text>
 <subparagraph id="HF8655E94F84A4F3F98E3D32664B0FE8C"><enum>(A)</enum><text>by striking <quote>or</quote> after <quote>2423,</quote>; and</text> </subparagraph><subparagraph id="HC88C398E6E1646708EF09B3A0362CAAD"><enum>(B)</enum><text>by inserting <quote>, 2751(a), 2752(a), or 2753(a)(1)</quote> after <quote>2425</quote>; and</text>
 </subparagraph></paragraph><paragraph id="H3A24B027E19546F7AD39BB3A410EEC7D"><enum>(2)</enum><text>in subsection (e)(3)(E)—</text> <subparagraph id="HC6DB57E8B2BD4BFD963DA241D9C72C16"><enum>(A)</enum><text>by striking <quote>or</quote> after <quote>2423,</quote>; and</text>
 </subparagraph><subparagraph id="HA8D29C48C1CC46F480A9807D4DFE0E5A"><enum>(B)</enum><text>by inserting <quote>, 2751(a), 2752(a), or 2753(a)(1)</quote> after <quote>2425</quote>.</text> </subparagraph></paragraph></subsection><subsection id="HA5611C8EC85D4CBD98B2406EB19A6EF1"><enum>(m)</enum><text>Section 3156(a)(4)(C) of title 18, United States Code, is amended by inserting <quote>section 2751(a), 2752(a), 2753(a)(1), or</quote> after <quote>any felony under</quote>.</text>
 </subsection><subsection id="H9ACD8862675D48DDA29BE50590989DE7"><enum>(n)</enum><text>Section 3282(b) of title 18, United States Code, is amended—</text> <paragraph id="H9F3FE4956EF74511ADED9E690D63F41C"><enum>(1)</enum><text>in paragraph (1), by inserting <quote>, section 2751(a), or section 2753(a)(1)</quote> after <quote>chapter 109A</quote>; and</text>
 </paragraph><paragraph id="HDA9CD7A01941486F86DB6C2BCF27D554"><enum>(2)</enum><text>in paragraph (2), by inserting <quote>, section 2751(a), or section 2753(a)(1)</quote> after <quote>chapter 109A</quote>.</text> </paragraph></subsection><subsection id="H5838D66068234BC6A53F0EDBCF3B49C5"><enum>(o)</enum><text>Section 3299 of title 18, United States Code, is amended by inserting <quote>, 2751(a), 2752(a), or 2753(a)(1)</quote> after <quote>section 1591</quote>.</text>
 </subsection><subsection id="HE5E01B1610EB40E8B0B5A174D80D56BC"><enum>(p)</enum><text>Section 3553(b)(2)(A) of title 18, United States Code, is amended by inserting <quote>2751(a), 2752(a), or 2753(a),</quote> after <quote>section 1591,</quote>.</text> </subsection><subsection id="H132059DBFE5144F798AEE5425FA9619A"><enum>(q)</enum><text>Section 3559(c)(2)(F)(i) of title 18, United States Code, is amended by inserting <quote>coerced sexual act (as described in sections 2751(a) and 2753(a)(1));</quote> after <quote>sexual abuse (as described in sections 2241 and 2242)</quote>.</text>
 </subsection><subsection id="H190410F972554478A321CA795E0C9C14"><enum>(r)</enum><text>Section 3559(e)(2)(A) of title 18, United States Code, is amended—</text> <paragraph id="H7FCECCC2ED79491EBDC858D41A9E48FD"><enum>(1)</enum><text>by striking <quote>or</quote> after <quote>2422(b) (relating to coercion and enticement of a minor into prostitution),</quote>; and</text>
 </paragraph><paragraph id="H5A2AF5B0777F40F1A8EADB65A9D29129"><enum>(2)</enum><text>by inserting <quote>, or 2751(a) and 2753(a)(1) (relating to coercion of sexual acts);</quote> after <quote>2423(a) (relating to transportation of minors)</quote>.</text> </paragraph></subsection><subsection id="H53C227F934B14F69AEC72A810FE9A2A7"><enum>(s)</enum><text>Section 3583(k) of title 18, United States Code, is amended—</text>
 <paragraph id="HF70FA194A58E4909ACAEDE8433E3FC82"><enum>(1)</enum><text>by striking <quote>or</quote> after <quote>2423,</quote>;</text> </paragraph><paragraph id="HD0E1B6E6858246CBAA07B071DAE8AEB9"><enum>(2)</enum><text>by inserting <quote>, 2751(a), 2752(a), or 2753(a)(1)</quote> after <quote>2425</quote>;</text>
 </paragraph><paragraph id="H2EDA58E1922C45348E2385DB24671A56"><enum>(3)</enum><text>by striking <quote>or</quote> after <quote>section 1201,</quote> the second place it occurs; and</text> </paragraph><paragraph id="H58D7F2E7C0AE48F089E3B8BDB5A71444"><enum>(4)</enum><text>by inserting <quote>2751(a), 2752(a), or 2753(a)(1),</quote> after <quote>1591,</quote> the second place it occurs.</text>
 </paragraph></subsection><subsection id="HED1338B200A149468A4735DF7184BF4C"><enum>(t)</enum><text>Section 2(1) of the PROTECT Our Children Act of 2008 (<external-xref legal-doc="usc" parsable-cite="usc/42/17601">42 U.S.C. 17601(1)</external-xref>) is amended—</text> <paragraph id="H1CB9DFA520F5492E85034B7B40226CE1"><enum>(1)</enum><text>by striking <quote>and</quote> after <quote>chapter 110,</quote>; and</text>
 </paragraph><paragraph id="H3008670E959C43E5845D6B6CFBDA52F9"><enum>(2)</enum><text>by inserting <quote>, and chapter 124</quote> after <quote>chapter 117</quote>.</text> </paragraph></subsection></section></title><title id="HC0EBA2452ADF4BCB9E15F6046FEA93DC"><enum>II</enum><header>Interstate Swatting Hoax</header> <section id="H2418E7B1F7914D8CB9EF9FEEB3B237B5"><enum>201.</enum><header>False communications to cause an emergency response</header> <subsection id="HB40A7E4F17C64EE3801794A817A972E1"><enum>(a)</enum><header>In general</header><text><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/47">Chapter 47</external-xref> of title 18, United States Code, is amended by adding at the end the following new section:</text>
					<quoted-block id="HF7AD3A0BF11F4CDCA2432CAA03E41063" style="USC">
						<section id="HB5A620D93D864C15BCE373C68B231304"><enum>1041.</enum><header>False communications to cause an emergency response</header>
 <subsection id="HA0F01E4440F94D7284F03570F1E99C95"><enum>(a)</enum><header>Criminal violation</header><text>Whoever, in the absence of circumstances reasonably requiring an emergency response, uses the mail or any facility or means of interstate or foreign commerce to knowingly transmit false or misleading information that would reasonably be expected to cause an emergency response, shall—</text>
 <paragraph id="HB24B17CC229A443D99DB28B9FDFA056D"><enum>(1)</enum><text>if an emergency response results, be fined under this title or imprisoned not more than 5 years, or both;</text>
 </paragraph><paragraph id="H55ED28AFB105441592AD0168E6A3ED96"><enum>(2)</enum><text>if serious bodily injury (as defined in section 1365) results, be fined under this title or imprisoned not more than 20 years, or both;</text>
 </paragraph><paragraph id="H50C3B6F69E0C40BC992B96AC981E0229"><enum>(3)</enum><text>if death results, be fined under this title or imprisoned for any number of years or for life, or both; and</text>
 </paragraph><paragraph id="H947088CD77814382856A670ECCEBB035"><enum>(4)</enum><text>in any other case, be fined under this title or imprisoned not more than 1 year, or both.</text> </paragraph></subsection><subsection id="HEB2FE17BFCCC4B0786EB1D29ABE30877"><enum>(b)</enum><header>Civil action</header> <paragraph id="H1F840B7C150744318A2B42CB674B6D84"><enum>(1)</enum><header>In general</header><text>Any party incurring damages incident to an offense under this section may bring a civil action against the perpetrator in an appropriate district court of the United States and may recover damages and any other appropriate relief, including reasonable attorney’s fees.</text>
 </paragraph><paragraph id="H2C5D54C5A1754B539CB6439D27E602F0"><enum>(2)</enum><header>Joint and several liability</header><text>An individual who is found liable under this subsection shall be jointly and severally liable with each other person, if any, who is found liable under this subsection for damages arising from the same violation of this section.</text>
								</paragraph><paragraph id="HA06EFEB41DEF4A049D2DB4F67BE714BF"><enum>(3)</enum><header>Stay Pending Criminal Action</header>
 <subparagraph id="H654A145DF8F14AD79BC0ACB555CE10F2"><enum>(A)</enum><text display-inline="yes-display-inline">Any civil action filed under this subsection shall be stayed during the pendency of any criminal action arising out of the same occurrence in which the claimant is the victim.</text>
 </subparagraph><subparagraph id="H0B9FC33E18DB4E0A808003691C82F8DD"><enum>(B)</enum><text>In this subsection, the term <term>criminal action</term> includes an investigation and prosecution that is pending, until final adjudication in the trial court.</text>
									</subparagraph></paragraph></subsection><subsection id="H89D96C818F7748F39C4C9B9841718623"><enum>(c)</enum><header>Reimbursement</header>
 <paragraph id="HEFB4E47783D9470FAC873F9663A53DCD"><enum>(1)</enum><header>In general</header><text>The court, in imposing a sentence on a defendant convicted of an offense under subsection (a), shall order the defendant to reimburse any party, any State or local government, or any private not-for-profit organization that provides fire or rescue service incurring expenses incident to any emergency response necessitated by such offense.</text>
 </paragraph><paragraph id="HB75D2CD8B66A48AAA3FBAE088F8C89A6"><enum>(2)</enum><header>Liability</header><text>A person ordered to make reimbursement under this subsection shall be jointly and severally liable for such expenses with each other person, if any, who is ordered to make reimbursement under this subsection for the same expenses.</text>
 </paragraph><paragraph id="HD486038C9ACC4511ADA998EFE0E8765E"><enum>(3)</enum><header>Civil judgment</header><text>An order of reimbursement under this subsection shall, for the purposes of enforcement, be treated as a civil judgment.</text>
 </paragraph></subsection><subsection id="HCBAECB28706B493C926DCA3763A6708A"><enum>(d)</enum><header>Definitions</header><text>In this section:</text> <paragraph id="H7BEDDD6B3B5D48B39B01EC143D58177A"><enum>(1)</enum><header>Emergency response</header><text>The term <term>emergency response</term> means any deployment of personnel or equipment, order or advice to evacuate, or issuance of a warning to the public or a threatened person, organization, or establishment, by an agency of the United States or a State charged with public safety functions, including any agency charged with detecting, preventing, or investigating crimes or with fire or rescue functions, or by a private not-for-profit organization that provides fire or rescue service.</text>
 </paragraph><paragraph id="H4CE934489E80425AA9CC57FB47C0F56B"><enum>(2)</enum><header>State</header><text>The term <term>State</term> means each of the several States, the District of Columbia, each commonwealth, territory, or possession of the United States, and each federally recognized Indian tribe.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
 </subsection><subsection id="H23BBDF477D954EF18634A3EC691D38E2"><enum>(b)</enum><header>Technical amendment</header><text>The table of sections for <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/47">chapter 47</external-xref> of title 18, United States Code, is amended by adding at the end the following new item:</text>
					<quoted-block id="HA1ACC0532C20446A8ABDA0FCE61DCFF1" style="USC">
						<toc regeneration="no-regeneration">
							<toc-entry level="section">1041. False communications to cause an emergency response.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection></section></title><title id="H0D33F5FDEA39493AACF3128A8222CD38"><enum>III</enum><header>Interstate Doxxing Prevention</header>
			<section id="H4528C1B567D54BEBA8116128AFE43053"><enum>301.</enum><header>Disclosure of personal information with the intent to cause harm</header>
 <subsection id="H2726110578604B52B0B693E1AC0F1E0F"><enum>(a)</enum><header>In general</header><text><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/41">Chapter 41</external-xref> of title 18, United States Code, is amended by adding at the end the following:</text> <quoted-block id="H4AA1CDC653D845BCAC149EE0CA250307" style="USC"> <section id="H7797CD37193C4BB89A01D68213AE0893"><enum>881.</enum><header>Publication of personally identifiable information with the intent to cause harm</header> <subsection id="H1667A700AAD84980AEFDF1BDB3410156"><enum>(a)</enum><header>Criminal violation</header><text>Whoever uses the mail or any facility or means of interstate or foreign commerce, to knowingly publish a person’s personally identifiable information—</text>
 <paragraph id="HC93C0990F286486F9B777AD4EF557639"><enum>(1)</enum><text display-inline="yes-display-inline">with the intent to threaten, intimidate, or harass any person, incite or facilitate the commission of a crime of violence against any person, or place any person in reasonable fear of death or serious bodily injury; or</text>
 </paragraph><paragraph id="H1A0878F61D434DF8B2A36FED6EA5955F"><enum>(2)</enum><text display-inline="yes-display-inline">with the intent that the information will be used to threaten, intimidate, or harass any person, incite or facilitate the commission of a crime of violence against any person, or place any person in reasonable fear of death or serious bodily injury,</text>
								</paragraph><continuation-text continuation-text-level="subsection">shall be fined under this title or imprisoned not more than 5 years, or both.</continuation-text></subsection><subsection id="H014E153DACDF4515B680AE6145893674"><enum>(b)</enum><header>Civil action</header>
 <paragraph id="HFAF35CFB58F6427B9918004EA0FFF069"><enum>(1)</enum><header>In general</header><text>An individual who is a victim of an offense under this section may bring a civil action against the perpetrator in an appropriate district court of the United States and may recover damages and any other appropriate relief, including reasonable attorney’s fees.</text>
 </paragraph><paragraph id="H7157E6890D7344928AE9FB6B6D5A937F"><enum>(2)</enum><header>Joint and several liability</header><text>An individual who is found liable under this subsection shall be jointly and severally liable with each other person, if any, who is found liable under this subsection for damages arising from the same violation of this section.</text>
								</paragraph><paragraph id="H5B34854A6E404FCA8DD65BFD5B0A36E7"><enum>(3)</enum><header>Stay Pending Criminal Action</header>
 <subparagraph id="HB2796226429F4175A8B4D8729A043A3C"><enum>(A)</enum><text display-inline="yes-display-inline">Any civil action filed under this subsection shall be stayed during the pendency of any criminal action arising out of the same occurrence in which the claimant is the victim.</text>
 </subparagraph><subparagraph id="H647299F2A5E041C589FC28D8F1ABEF98"><enum>(B)</enum><text>In this subsection, the term <term>criminal action</term> includes an investigation and prosecution that is pending, until final adjudication in the trial court.</text>
 </subparagraph></paragraph></subsection><subsection id="H4F79DE9667B349BD92B2F75C095A7917"><enum>(c)</enum><header>Definitions</header><text>In this section:</text> <paragraph id="H3889876B38BC4454BFECC93FE27EF063"><enum>(1)</enum><header>Publish</header><text>The term <term>publish</term> means to circulate, deliver, distribute, disseminate, transmit, or otherwise make available to another person.</text>
 </paragraph><paragraph id="HF2E6F16EA57F4A74865A65B5E529BB2B"><enum>(2)</enum><header>Crime of violence</header><text>The term <term>crime of violence</term> has the meaning given the term in section 16.</text> </paragraph><paragraph id="HEB438431EAE94A65ADAEE2F4CEE6A84F"><enum>(3)</enum><header>Personally identifiable information</header><text>The term <term>personally identifiable information</term> means—</text>
 <subparagraph id="H9E7473E7A2814ED88FD54C1132B1B05E"><enum>(A)</enum><text>any information that can be used to distinguish or trace an individual’s identity, such as name, prior legal name, alias, mother’s maiden name, social security number, date or place of birth, address, phone number, or biometric data;</text>
 </subparagraph><subparagraph id="H5CB6A7DB95AC48EFA62937D21057659C"><enum>(B)</enum><text>any information that is linked or linkable to an individual, such as medical, financial, education, consumer, or employment information, data, or records; or</text>
 </subparagraph><subparagraph id="HC3AB84B6A7CA4E5A9CD4C745549CBE98"><enum>(C)</enum><text display-inline="yes-display-inline">any other sensitive private information that is linked or linkable to a specific identifiable individual, such as gender identity, sexual orientation, or any sexually intimate visual depiction.</text>
 </subparagraph></paragraph><paragraph id="H80EDC68615FA4B90AC0527D774D3902C"><enum>(4)</enum><header>Sexually intimate visual depiction</header><text display-inline="yes-display-inline">The term <term>sexually intimate visual depiction</term> means any photograph, film, video, or other recording or live transmission of a person, whether produced by electronic, mechanical, or other means (including depictions stored on undeveloped film and videotape, data stored on computer disk or by any electronic means that is capable of conversion into a visual image, and data that is capable of conversion into a visual image that has been transmitted by any means, whether or not stored in a permanent format), that depicts—</text>
 <subparagraph id="H90ECF21E187C4DD387612AC5AC9034AF"><enum>(A)</enum><text>the naked exhibition of the anus, the post-pubescent female nipple, the genitals, or the pubic area of any person;</text>
 </subparagraph><subparagraph id="HCDC30A4D7A7E4D5EA153E8B7C9C8D49F"><enum>(B)</enum><text display-inline="yes-display-inline">any actual or simulated sexual contact or sexual act (as defined in section 2763);</text> </subparagraph><subparagraph id="HF8030D121FC7497DAF6E716BEF578B22"><enum>(C)</enum><text>bestiality; or</text>
 </subparagraph><subparagraph id="H985A6954E44B4C2D96E7A15971ED3A62"><enum>(D)</enum><text>sadistic or masochistic conduct.</text> </subparagraph></paragraph></subsection><subsection id="H0E3032E9C5E94538A5E99AED0E2D46D7"><enum>(d)</enum><header>Attempt</header><text>An attempt to violate this section shall be punishable in the same manner as a completed violation of this section.</text>
 </subsection><subsection id="HF8D85E8930284537894AA03C78F9CB37"><enum>(e)</enum><header>Activities of law enforcement</header><text>This section does not prohibit any lawfully authorized investigative, protective, or intelligence activity of a law enforcement agency of the United States, a State, or political subdivision of a State, or of an intelligence agency of the United States.</text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
 </subsection><subsection id="HB2628DE00D964BEA933A1C026E95A0B4"><enum>(b)</enum><header>Clerical amendment</header><text>The table of sections at the beginning of chapter 41 title 18, United States Code, is amended by adding at the end the following new item:</text>
					<quoted-block id="H9467B7ABBD534857B5D565789643B3F7" style="USC">
						<toc regeneration="no-regeneration">
							<toc-entry level="section">881. Publication of personally identifiable information with the intent to cause harm.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection></section></title><title id="HA6FC6895776D4E26B11F93C94071FE75"><enum>IV</enum><header>Cybercrime Statistics</header>
			<section id="H1D3EDFCD267C4DD9B588CBD7560EA726"><enum>401.</enum><header>National strategy, classification, and reporting on cybercrime</header>
 <subsection id="H0F79B39E71004FF2B37F4F7E5DDF9EDF"><enum>(a)</enum><header>National strategy</header><text display-inline="yes-display-inline">The Attorney General shall develop a national strategy to reduce the incidence of cybercrimes against individuals, coordinate investigations of cybercrimes against individuals by Federal law enforcement agencies, and increase the number of Federal prosecutions of cybercrimes against individuals.</text>
 </subsection><subsection id="H68D0FD322E934B02A77BB62671B133F1"><enum>(b)</enum><header>Classification of cybercrimes against individuals for purposes of crime reports</header><text display-inline="yes-display-inline">Pursuant to authority under section 534 of title 28, United States Code, the Director of the Federal Bureau of Investigation shall—</text>
 <paragraph id="HAEAAE069F9E44104B213A5F18CCD14B6"><enum>(1)</enum><text display-inline="yes-display-inline">design and create within the Uniform Crime Reports a category for offenses that constitute cybercrimes against individuals;</text>
 </paragraph><paragraph id="HF176B159EE51404ABA145BF5287D8DA4"><enum>(2)</enum><text display-inline="yes-display-inline">to the extent feasible, within the category established pursuant to paragraph (1), establish subcategories for each type of cybercrime against an individual which is an offense under Federal or State law;</text>
 </paragraph><paragraph id="H536D10D6AFF740088370814103213317"><enum>(3)</enum><text display-inline="yes-display-inline">classify the category established pursuant to paragraph (1) as a Part 1 crime in the Uniform Crime Reports; and</text>
 </paragraph><paragraph id="HF21B798B727441AC88D9EBB6AFA4C429"><enum>(4)</enum><text display-inline="yes-display-inline">classify each type of cybercrime against an individual which is an offense under Federal or State law as a Group A offense for the purpose of the National Incident-Based Reporting System.</text>
 </paragraph></subsection><subsection id="HEDB36174F2B64F2DAAF1F2EC5DCC78E4"><enum>(c)</enum><header>Annual summary</header><text display-inline="yes-display-inline">The Attorney General shall publish an annual summary of the information reported in the Uniform Crime Reports and the National Incident-Based Reporting System relating to cybercrimes against individuals.</text>
 </subsection><subsection id="H601CE89690784503850D34BB11707CE0"><enum>(d)</enum><header>Definitions</header><text>In this section:</text> <paragraph id="HDA0E3FD33BDA40A7922CEDC6F282F8D2"><enum>(1)</enum><text display-inline="yes-display-inline">The term <term>cybercrimes against individuals</term> means Federal, State, or local criminal offenses that involve the use of a computer to cause personal harm to an individual, such as the use of a computer to harass, threaten, stalk, extort, coerce, cause fear, intimidate, without consent distribute intimate images of, or violate the privacy of, an individual, except that—</text>
 <subparagraph id="H15D9535C9C7341BDBC5D0FC6AF98F448"><enum>(A)</enum><text>use of a computer need not be an element of such an offense; and</text> </subparagraph><subparagraph id="H39D2E13F0878490A9880D55E64E095F3"><enum>(B)</enum><text>such term does not include the use of a computer to cause harm to a commercial entity, government agency, or any non-natural persons.</text>
 </subparagraph></paragraph><paragraph id="H5D163BD2814147D5A3369DB5F7B285C3"><enum>(2)</enum><text>The term <term>computer</term> includes a computer network and any interactive electronic device.</text> </paragraph></subsection></section></title><title id="H2DAD5FE601494C4292B078A43B2C5D16"><enum>V</enum><header>Prioritizing Online Threat Enforcement</header> <section id="H01C233F5DDAA47A49DFF26451F35B467"><enum>501.</enum><header>Improved investigative and forensic resources for enforcement of laws related to cybercrimes against individuals</header> <subsection id="HE71F9B124A684BEBBE2FFB55ACAB7DCF"><enum>(a)</enum><header>In general</header><text>Subject to the availability of appropriations to carry out this subsection, the Attorney General, in consultation with the Director of the Federal Bureau of Investigation, shall, with respect to cybercrimes against individuals—</text>
 <paragraph id="H432AE70AF0664E0CA25CB60638B15141"><enum>(1)</enum><text>ensure that there are at least 10 additional operational agents of the Federal Bureau of Investigation designated to support the Criminal Division of the Department of Justice in the investigation and coordination of cybercrimes against individuals;</text>
 </paragraph><paragraph id="H525754E2110C45F29C7107AA38320A05"><enum>(2)</enum><text display-inline="yes-display-inline">ensure that each office of a United States Attorney designates at least 1 Assistant United States Attorney as responsible for investigating and prosecuting cybercrimes against individuals; and</text>
 </paragraph><paragraph id="HE8B4D4D4D58B42F68422185258409744"><enum>(3)</enum><text>ensure the implementation of a regular and comprehensive training program—</text> <subparagraph id="HB4F0448B90C1455BA29D3EBD39612536"><enum>(A)</enum><text>the purpose of which is to train agents of the Federal Bureau of Investigation in the investigation and prosecution of such crimes and the enforcement of laws related to cybercrimes against individuals; and</text>
 </subparagraph><subparagraph id="HE3BF06A350D740F588DEAF4F2AFC3913"><enum>(B)</enum><text>that includes relevant forensic training related to investigating and prosecuting cybercrimes against individuals.</text>
						</subparagraph></paragraph></subsection><subsection id="HBB2B3099229A451187351667F92311F7"><enum>(b)</enum><header>Additional funding for resources</header>
 <paragraph id="H8AB583CAC1C84E218FB281A55CBD473F"><enum>(1)</enum><header>Authorization</header><text display-inline="yes-display-inline">In addition to amounts otherwise authorized for resources to investigate and prosecute criminal activity, there are authorized to be appropriated to carry out this section $4,000,000 for each of fiscal years 2018 through 2022.</text>
 </paragraph><paragraph id="H6A5D1E8DAE8349C5A85E7CFE6F297F40"><enum>(2)</enum><header>Availability</header><text display-inline="yes-display-inline">Any amounts appropriated under paragraph (1) shall remain available until expended.</text> </paragraph><paragraph id="HD424636D81CE42DAB8F4BF166CD91D95"><enum>(3)</enum><header>Use of additional funding</header><text display-inline="yes-display-inline">Funds made available under this subsection shall be used by the Director of the Federal Bureau of Investigation and the Attorney General, for the Federal Bureau of Investigation and the Criminal Division of the Department of Justice, respectively, to—</text>
 <subparagraph id="HB04FA07B4364485FB6C594CF322826A2"><enum>(A)</enum><text display-inline="yes-display-inline">hire and train law enforcement officers to—</text> <clause id="H6989FEDAC6DB45058FC2788C091B3A7C"><enum>(i)</enum><text display-inline="yes-display-inline">investigate cybercrimes against person; and</text>
 </clause><clause id="HB7DD76F27FB541B38E35B9AED03AE08B"><enum>(ii)</enum><text>assist in the prosecution of such crimes; and</text> </clause></subparagraph><subparagraph id="H2C9FE7A400D84E678262610667029D8D"><enum>(B)</enum><text display-inline="yes-display-inline">enable relevant units of the Department of Justice, including units responsible for investigating cybercrimes against individuals, to procure advanced tools of forensic science and expert computer forensic assistance, including from nongovernmental entities, to investigate, prosecute, and study such crimes.</text>
						</subparagraph></paragraph></subsection></section><section id="H96DE9846235D4A74BB346EF67A632C0D"><enum>502.</enum><header>Annual reports</header>
 <subsection id="H515CD133361745719D06AFBE5C3FACDD"><enum>(a)</enum><header>Report of the attorney general</header><text display-inline="yes-display-inline">Not later than 1 year after the date of the enactment of this Act, and annually thereafter, the Attorney General shall submit a report to Congress on actions taken to carry out this title. The initial report required under this subsection shall be submitted by May 1, 2018. All subsequent annual reports shall be submitted by May 1st of each fiscal year thereafter. The report required under this subsection may be submitted as part of the annual performance report of the Department of Justice, and shall include, with respect to the authorizations under section 501, the following:</text>
 <paragraph id="HE345A8A2C2B3473D947F464BA90B745B"><enum>(1)</enum><text display-inline="yes-display-inline">The number of law enforcement officers hired and trained.</text> </paragraph><paragraph id="H1C5B617F6BD547F19A4A8B7E9BA41973"><enum>(2)</enum><text>The number and type of investigations and prosecutions resulting from law enforcement officers designated to cybercrimes against individuals.</text>
 </paragraph><paragraph id="HAAC842647C0D49818EE8E33A2B9FFF13"><enum>(3)</enum><text>The advanced tools of forensic science procured to investigate, prosecute, and study cybercrimes against individuals.</text>
 </paragraph></subsection></section><section commented="no" id="H781B48B1B0EA4445A2EB0B13B0D30D3D"><enum>503.</enum><header>Definition of cybercrimes against individuals</header><text display-inline="no-display-inline">The term <term>cybercrimes against individuals</term> means Federal, State, or local criminal offenses that involve the use of a computer to cause personal harm to an individual, such as the use of a computer to harass, threaten, stalk, extort, coerce, cause fear, intimidate, without consent distribute intimate images of, or violate the privacy of, an individual, except that—</text>
 <paragraph id="H9A65BC83CC3C4609A5D0E203D0B70D59"><enum>(1)</enum><text>use of a computer need not be an element of such an offense; and</text> </paragraph><paragraph id="H024A2163A8BA4550B5C9B1AC577C5856"><enum>(2)</enum><text display-inline="yes-display-inline">such term does not include the use of a computer to cause harm to a commercial entity, government agency, or any non-natural persons.</text>
				</paragraph></section></title><title id="H2004AD740F2743F8AA1BE16C698799C1"><enum>VI</enum><header>Cybercrime Enforcement Training Assistance</header>
			<section id="H0A3C187477644A958C94198BB5C80263"><enum>601.</enum><header>Local law enforcement grants</header>
 <subsection id="HD6DF045A5115433E83866F8A0E0182A0"><enum>(a)</enum><header>In general</header><text>Subject to the availability of appropriations, the Attorney General shall award grants under this section to States and units of local government for the prevention, enforcement, and prosecution of cybercrimes against individuals.</text>
				</subsection><subsection id="HBB909A7E0A6A4F8DAB2F10CC13956246"><enum>(b)</enum><header>Application</header>
 <paragraph id="H9329E8DC682E474EB73D663DBF67A3E2"><enum>(1)</enum><header>In general</header><text>To request a grant under this section, the chief executive officer of a State or unit of local government shall submit an application to the Attorney General within 90 days after the date on which funds to carry out this section are appropriated for a fiscal year, in such form as the Attorney General may require. Such application shall include the following:</text>
 <subparagraph id="HEDCE3CAFA85548A39F3208818EA99B68"><enum>(A)</enum><text>A certification that Federal funds made available under this section will not be used to supplant State or local funds, but will be used to increase the amounts of such funds that would, in the absence of Federal funds, be made available for law enforcement activities.</text>
 </subparagraph><subparagraph id="H8A555F92E2564FA881E418D0634821C4"><enum>(B)</enum><text>An assurance that, not fewer than 30 days before the application (or any amendment to the application) was submitted to the Attorney General, the application (or amendment) was submitted for review to the governing body of the State or unit of local government (or to an organization designated by that governing body).</text>
 </subparagraph><subparagraph id="HC1CDABE717634312997F40C4130FE249"><enum>(C)</enum><text>An assurance that, before the application (or any amendment to the application) was submitted to the Attorney General—</text>
 <clause id="H2410AAB7F7364029A0848669581996F3"><enum>(i)</enum><text>the application (or amendment) was made public; and</text> </clause><clause id="H3C3789DFD4B9402CB8047E3961AFBC89"><enum>(ii)</enum><text>an opportunity to comment on the application (or amendment) was provided to citizens and to neighborhood or community-based organizations, to the extent applicable law or established procedure makes such an opportunity available.</text>
 </clause></subparagraph><subparagraph id="HD69BB259438E4DBB955AC3862CF902C9"><enum>(D)</enum><text>An assurance that, for each fiscal year covered by an application, the applicant shall maintain and report such data, records, and information (programmatic and financial) as the Attorney General may reasonably require.</text>
 </subparagraph><subparagraph id="H60096452222F44ABA349AB4AEDC4638A"><enum>(E)</enum><text>A certification, made in a form acceptable to the Attorney General and executed by the chief executive officer of the applicant (or by another officer of the applicant, if qualified under regulations promulgated by the Attorney General), that—</text>
 <clause id="H31AA55D776A4496592E1B4717B779359"><enum>(i)</enum><text>the programs to be funded by the grant meet all the requirements of this section;</text> </clause><clause id="H69D659A22B26497C904FAD5155412F0A"><enum>(ii)</enum><text>all the information contained in the application is correct;</text>
 </clause><clause id="HB9D21B22F4F24B4DA18B9867672AB0A5"><enum>(iii)</enum><text>there has been appropriate coordination with affected agencies; and</text> </clause><clause id="HAA48F223162147B6B2594202FDE141A5"><enum>(iv)</enum><text>the applicant will comply with all provisions of this section and all other applicable Federal laws.</text>
 </clause></subparagraph><subparagraph id="H17B60EF79D414BFEA17C89143BA7F1FC"><enum>(F)</enum><text>A certification that the State or in the case of a unit of local government, the State in which the unit of local government is located, has in effect criminal laws which prohibit cybercrimes against individuals.</text>
 </subparagraph><subparagraph id="H6C1C5A629B724182A1454D0CE866424F"><enum>(G)</enum><text>A certification that any equipment described in subsection (c)(7) purchased using grant funds awarded under this section will be used primarily for investigations and forensic analysis of evidence in matters involving cybercrimes against individuals.</text>
 </subparagraph></paragraph></subsection><subsection id="H71037CA541CE474C98EE7462FC2F04FF"><enum>(c)</enum><header>Use of funds</header><text>Grants awarded under this section may only be used for programs that provide—</text> <paragraph id="H4A8327F6B0B14EF585F50CBD415FA4FC"><enum>(1)</enum><text>training for State or local law enforcement personnel relating to cybercrimes against individuals, including—</text>
 <subparagraph id="H11E677FF99F94C0AA6DEFFE713AC973C"><enum>(A)</enum><text>training such personnel to identify and protect victims of cybercrimes against individuals;</text> </subparagraph><subparagraph id="HE3359BB5FCA24FB2A656E0BC42C0A781"><enum>(B)</enum><text>training such personnel to utilize Federal, State, local, and other resources to assist victims of cybercrimes against individuals;</text>
 </subparagraph><subparagraph id="H9E0E265149E54418A4969F5ED4DEC2E8"><enum>(C)</enum><text>training such personnel to identify and investigate cybercrimes against individuals;</text> </subparagraph><subparagraph id="H3A36C8B2321447C6B1B33D5E940BD432"><enum>(D)</enum><text>training such personnel to enforce and utilize the laws that prohibit cybercrimes against individuals;</text>
 </subparagraph><subparagraph id="HECDAF480FA4F46B1AE5A401087F4D8F8"><enum>(E)</enum><text>training such personnel to utilize technology to assist in the investigation of cybercrimes against individuals and enforcement of laws that prohibit such crimes; and</text>
 </subparagraph><subparagraph id="H7E8F918A38B247C39DB90DD8B12F3AA7"><enum>(F)</enum><text>the payment of overtime incurred as a result of such training;</text> </subparagraph></paragraph><paragraph id="H431718D615B349299A68E6A2A08B3333"><enum>(2)</enum><text display-inline="yes-display-inline">training for State or local prosecutors, judges, and judicial personnel, relating to cybercrimes against individuals, including—</text>
 <subparagraph id="H99F20A6E235B4B81A6D9728692B27002"><enum>(A)</enum><text>training such personnel to identify, investigate, prosecute, or adjudicate cybercrimes against individuals;</text>
 </subparagraph><subparagraph id="H2D008179C177438AB097006863AF9741"><enum>(B)</enum><text>training such personnel to utilize laws that prohibit cybercrimes against individuals;</text> </subparagraph><subparagraph id="H2D776AADD97E40F6BA067795D6B22FBE"><enum>(C)</enum><text>training such personnel to utilize Federal, State, local, and other resources to assist victims of cybercrimes against individuals; and</text>
 </subparagraph><subparagraph id="HB18E8AC55B854FD6A5D5D95A09405E14"><enum>(D)</enum><text>training such personnel to utilize technology to assist in the prosecution or adjudication of acts of cybercrimes against individuals, including the use of technology to protect victims of such crimes;</text>
 </subparagraph></paragraph><paragraph id="HC6828CB0C7EC46A3AC51FA3ED4B95804"><enum>(3)</enum><text>training for State or local emergency dispatch personnel relating to cybercrimes against individuals, including—</text>
 <subparagraph id="HC40AD2DC4661445FBB988C319C16580F"><enum>(A)</enum><text>training such personnel to identify and protect victims of cybercrimes against individuals;</text> </subparagraph><subparagraph id="H2C82E82F72F94FA1807C70BCE5F81C8A"><enum>(B)</enum><text>training such personnel to utilize Federal, State, local, and other resources to assist victims of cybercrimes against individuals;</text>
 </subparagraph><subparagraph id="H114EEBECBE1C4D648E9A42E1ACF5EEB7"><enum>(C)</enum><text>training such personnel to utilize technology to assist in the identification of and response to cybercrimes against individuals; and</text>
 </subparagraph><subparagraph id="HB9C4964CA3FD461193956B6ED0E7BB4C"><enum>(D)</enum><text>the payment of overtime incurred as a result of such training;</text> </subparagraph></paragraph><paragraph id="H9A87D1A593924A548E10363FF89F437E"><enum>(4)</enum><text>assistance to State or local law enforcement agencies in enforcing laws that prohibit cybercrimes against individuals, including expenses incurred in performing enforcement operations, such as overtime payments;</text>
 </paragraph><paragraph id="H684F8BD9C84F4A118EBB65C68286F491"><enum>(5)</enum><text>assistance to State or local law enforcement agencies in educating the public in order to prevent, deter, and identify violations of laws that prohibit cybercrimes against individuals;</text>
 </paragraph><paragraph id="H1F01A563BFB445759CC5B510457A4773"><enum>(6)</enum><text display-inline="yes-display-inline">assistance to State or local law enforcement agencies to establish task forces that operate solely to conduct investigations, forensic analyses of evidence, and prosecutions in matters involving cybercrimes against individuals;</text>
 </paragraph><paragraph id="H3926FE8F4B774611A312D5F08A1FA0D6"><enum>(7)</enum><text>assistance to State or local law enforcement and prosecutors in acquiring computers, computer equipment, and other equipment necessary to conduct investigations and forensic analysis of evidence in matters involving cybercrimes against individuals, including expenses incurred in the training, maintenance, or acquisition of technical updates necessary for the use of such equipment for the duration of a reasonable period of use of such equipment;</text>
 </paragraph><paragraph id="HD09661171D584FB680EEC0D17AA0D463"><enum>(8)</enum><text>assistance in the facilitation and promotion of sharing, with State and local law enforcement officers and prosecutors, of the expertise and information of Federal law enforcement agencies about the investigation, analysis, and prosecution of matters involving laws that prohibit cybercrimes against individuals, including the use of multijurisdictional task forces; or</text>
 </paragraph><paragraph id="H983500A6E5054CC3A0E072DA0EE558B9"><enum>(9)</enum><text>assistance to State and local law enforcement and prosecutors in processing interstate extradition requests for violations of laws involving cybercrimes against individuals, including expenses incurred in the extradition of an offender from one State to another.</text>
 </paragraph></subsection><subsection id="H3034AF8A56284C0287FD1A1EA51F5311"><enum>(d)</enum><header>Report to the secretary</header><text>On the date that is one year after the date on which a State or unit of local government receives a grant under this section, and annually thereafter, the chief executive of such State or unit of local government shall submit to the Attorney General a report which contains—</text>
 <paragraph id="H7569F5DF28C6460493A34B3179CA2BAC"><enum>(1)</enum><text>a summary of the activities carried out during the previous year with any grant received by such State or unit of local government;</text>
 </paragraph><paragraph id="HCF92080DFB114D10AAF7157E074A205A"><enum>(2)</enum><text>an evaluation of the results of such activities; and</text> </paragraph><paragraph id="H2E4FE60D140145378AF10C97EFDD5095"><enum>(3)</enum><text>such other information as the Attorney General may reasonably require.</text>
 </paragraph></subsection><subsection id="HEA140DC856C14FAE8235F078E2AB5536"><enum>(e)</enum><header>Report to congress</header><text>Not later than November 1 of each even-numbered fiscal year, the Attorney General shall submit to the Committee on the Judiciary of the House of Representatives and the Committee on the Judiciary of the Senate a report that contains a compilation of the information contained in the report submitted under subsection (d).</text>
				</subsection><subsection id="H0AA7FCE4E2F042C584A4A81D5026098E"><enum>(f)</enum><header>Authorization of appropriations</header>
 <paragraph id="HB55900C6C37A41008E567D64F2F8EBDD"><enum>(1)</enum><header>In General</header><text>There are authorized to be appropriated to carry out this section $20,000,000 for each of fiscal years 2018 through 2022.</text>
 </paragraph><paragraph id="H3217E88FE0304CC0842518DFD790C425"><enum>(2)</enum><header>Limitation</header><text>Of the amount made available under paragraph (1) in any fiscal year, not more than 5 percent may be used for evaluation, monitoring, technical assistance, salaries, and administrative expenses.</text>
 </paragraph></subsection><subsection id="HBC4F8F5195F344BE88F1A4315B011744"><enum>(g)</enum><header>Definitions</header><text display-inline="yes-display-inline">In this section:</text> <paragraph id="H49C8735B29454DD68AB2C9738CBC619F"><enum>(1)</enum><text>The term <term>cybercrimes against individuals</term> means the criminal offenses applicable in the relevant State or unit of local government that involve the use of a computer to cause personal harm to an individual, such as the use of a computer to harass, threaten, stalk, extort, coerce, cause fear, intimidate, without consent distribute intimate images of, or violate the privacy of, an individual, except that—</text>
 <subparagraph id="H722D80D5A8B448C1B3028F18FD739132"><enum>(A)</enum><text>use of a computer need not be an element of such an offense; and</text> </subparagraph><subparagraph id="HEAD749AEE0424A33A26A413E193C441B"><enum>(B)</enum><text>such term does not include the use of a computer to cause harm to a commercial entity, government agency, or any non-natural persons.</text>
 </subparagraph></paragraph><paragraph id="H3A1D837B1C9144018AB6489E18C13965"><enum>(2)</enum><text>The term <term>computer</term> includes a computer network and an interactive electronic device.</text> </paragraph></subsection></section><section id="HC4E79B88B5AE41A1B1F12A445F6C548F"><enum>602.</enum><header>National Resource Center Grant</header> <subsection id="H0B5B3347148B43B6A7B61CC31F8A5776"><enum>(a)</enum><header>In general</header><text>Subject to the availability of appropriations, the Attorney General shall award a grant under this section to an eligible entity for the purpose of the establishment and maintenance of a National Resource Center on Cybercrimes Against Individuals to provide resource information, training, and technical assistance to improve the capacity of individuals, organizations, governmental entities, and communities to prevent, enforce, and prosecute cybercrimes against individuals.</text>
 </subsection><subsection id="HCD3AA18E8C5F419CB60D43CE25F1C73F"><enum>(b)</enum><header>Application</header><text display-inline="yes-display-inline">To request a grant under this section, an eligible entity shall submit an application to the Attorney General not later than 90 days after the date on which funds to carry out this section are appropriated for fiscal year 2018 in such form as the Attorney General may require. Such application shall include the following:</text>
 <paragraph id="H3AF74CE8345E4F0B9D6DE30EDAEC8D51"><enum>(1)</enum><text>An assurance that, for each fiscal year covered by an application, the applicant shall maintain and report such data, records, and information (programmatic and financial) as the Attorney General may reasonably require.</text>
 </paragraph><paragraph id="H5B03B19D10AC4EFE8C2635EFD66A783B"><enum>(2)</enum><text>A certification, made in a form acceptable to the Attorney General, that—</text> <subparagraph id="HDB3B374A27134BBFB07C8E9A0799DDFF"><enum>(A)</enum><text>the programs funded by the grant meet all the requirements of this section;</text>
 </subparagraph><subparagraph id="H434A43381B624D738CB056EB6EAD701F"><enum>(B)</enum><text>all the information contained in the application is correct; and</text> </subparagraph><subparagraph id="H841C21B1D0F24E738F4941354B463C26"><enum>(C)</enum><text>the applicant will comply with all provisions of this section and all other applicable Federal laws.</text>
 </subparagraph></paragraph></subsection><subsection id="H893508105094473E8CD075536FE315D6"><enum>(c)</enum><header>Use of funds</header><text>The eligible entity awarded a grant under this section shall use such amounts for the establishment and maintenance of a National Resource Center on Cybercrimes Against Individuals, which shall—</text>
 <paragraph id="HA709185A4E4B4354A63A3AED120A6F18"><enum>(1)</enum><text>offer a comprehensive array of technical assistance and training resources to Federal, State, and local governmental agencies, community-based organizations, and other professionals and interested parties, related to cybercrimes against individuals, including programs and research related to victims;</text>
 </paragraph><paragraph id="H9ABB33FCC39E4610B9A7F63E26C4DDA1"><enum>(2)</enum><text>maintain a resource library which shall collect, prepare, analyze, and disseminate information and statistics related to—</text>
 <subparagraph id="H8D515970755B4C7D84D009E9BA1F918F"><enum>(A)</enum><text>the incidence of cybercrimes against individuals;</text> </subparagraph><subparagraph id="H98FB8664F5FE476A943FB98BEF075AC8"><enum>(B)</enum><text>the enforcement, and prosecution of laws relating to cybercrimes against individuals; and</text>
 </subparagraph><subparagraph id="H3D69BA62F2244A0D84BEEADC1222A40C"><enum>(C)</enum><text>the provision of supportive services and resources for victims of cybercrimes against individuals; and</text>
 </subparagraph></paragraph><paragraph id="H424C684F602F47CC8F8B1092157F0D71"><enum>(3)</enum><text>conduct research related to—</text> <subparagraph id="H7533FB64139E4955BA19D3E19671392D"><enum>(A)</enum><text>the causes of cybercrimes against individuals;</text>
 </subparagraph><subparagraph id="H330CFBEC1E6347DCAFD179C0AE07D300"><enum>(B)</enum><text>the effect of cybercrimes against individuals on victims of such crimes; and</text> </subparagraph><subparagraph id="HAADBE2861A524AFD8B583BA3D8356E48"><enum>(C)</enum><text>model solutions to prevent or deter cybercrimes against individuals or to enforce the laws relating to cybercrimes against individuals.</text>
						</subparagraph></paragraph></subsection><subsection id="HC2DE0725CF224159AF11D9B95ADD1CC9"><enum>(d)</enum><header>Duration of grant</header>
 <paragraph id="HF13160EEAAA347F093B81EE9B6AA795D"><enum>(1)</enum><header>In general</header><text>The grant awarded under this section shall be awarded for a period of 5 years.</text> </paragraph><paragraph id="H3194E226C5B04D069FA310ED0785C23D"><enum>(2)</enum><header>Renewal</header><text display-inline="yes-display-inline">A grant under this section may be renewed for additional 5-year periods if the Attorney General determines that the funds made available to the recipient were used in a manner described in subsection (c), and if the recipient resubmits an application described in subsection (b) in such form, and at such time as the Attorney General may reasonably require.</text>
 </paragraph></subsection><subsection id="HBC7962761C0C47A68515F69260430A7F"><enum>(e)</enum><header>Subgrants</header><text>The eligible entity awarded a grant under this section may make subgrants to other nonprofit private organizations with relevant subject matter expertise in order to establish and maintain the National Resource Center on Cybercrimes Against Individuals in accordance with subsection (c).</text>
 </subsection><subsection id="H153DEB536F6D4D909C5B7EFCA0EC487D"><enum>(f)</enum><header>Report to the secretary</header><text>On the date that is one year after the date on which an eligible entity receives a grant under this section, and annually thereafter for the duration of the grant period, the entity shall submit to the Attorney General a report which contains—</text>
 <paragraph id="H2B2806FA17274E44B66DA8EFB7245707"><enum>(1)</enum><text>a summary of the activities carried out under the grant program during the previous year;</text> </paragraph><paragraph id="HCB168583D1954C2AB74498490BCF11C6"><enum>(2)</enum><text>an evaluation of the results of such activities; and</text>
 </paragraph><paragraph id="HF14B62FB62A3468BBE20681B583E15FB"><enum>(3)</enum><text>such other information as the Attorney General may reasonably require.</text> </paragraph></subsection><subsection id="H6976663E58E44B718568502A1514A9CE"><enum>(g)</enum><header>Report to congress</header><text>Not later than November 1 of each even-numbered fiscal year, the Attorney General shall submit to the Committee on the Judiciary of the House of Representatives and the Committee on the Judiciary of the Senate a report that contains a compilation of the information contained in the report submitted under subsection (d).</text>
 </subsection><subsection id="HFBA9A4B7DA594EA9A388695454656BF9"><enum>(h)</enum><header>Authorization of appropriations</header><text>There are authorized to be appropriated to carry out this section $4,000,000 for each of fiscal years 2018 through 2022.</text>
 </subsection><subsection id="H0D83EC1699814FA0B7F0AA68C84F5113"><enum>(i)</enum><header>Definitions</header><text>In this section:</text> <paragraph id="HAC261B7631AA4F979B154C8661E0CCED"><enum>(1)</enum><header>Cybercrimes against individuals</header><text display-inline="yes-display-inline">The term <term>cybercrimes against individuals</term> has the meaning given such term in section 601(g).</text>
 </paragraph><paragraph id="H3E529D2E43424D8BB319B4ED192AF8BB"><enum>(2)</enum><header>Eligible Entity</header><text>The term <term>eligible entity</term> means a nonprofit private organization that focuses on cybercrimes against individuals and that—</text> <subparagraph id="HC3202236D5BA45A6AE5580AA9A33F11C"><enum>(A)</enum><text>provides documentation to the Attorney General demonstrating experience working directly on issues of cybercrimes against individuals; and</text>
 </subparagraph><subparagraph id="H8D269E42ECC14EF89850FF6E06D423C4"><enum>(B)</enum><text>includes on the entity’s advisory board representatives who have a documented history of working directly on issues of cybercrimes against individuals and who are geographically and culturally diverse.</text>
						</subparagraph></paragraph></subsection></section></title></legis-body></bill>


