Computer Crime and Intellectual Property Section

Last updated
Seal of the Department of Justice Seal of the United States Department of Justice.svg
Seal of the Department of Justice

The Computer Crime and Intellectual Property Section (CCIPS) is a section of the Criminal Division of the U.S. Department of Justice in charge of investigating computer crime (hacking, viruses, worms) and intellectual property crime. They are additionally responsible for prosecuting privacy invasions by criminals such as hackers, cyberstalkers, and purveyors of mobile spyware, and specializing in the search and seizure of digital evidence in computers and on networks.

CCIPS has been responsible [1] for:

Related Research Articles

<span class="mw-page-title-main">Cybercrime</span> Term for an online crime

Cybercrime is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrime may harm someone's security and financial health.

<span class="mw-page-title-main">No Electronic Theft Act</span> US federal law passed in 1997

The United States No Electronic Theft Act , a federal law passed in 1997, provides for criminal prosecution of individuals who engage in copyright infringement under certain circumstances, even when there is no monetary profit or commercial benefit from the infringement. Maximum penalties can be five years in prison with fines.

Operation Fastlink is a coordination of four separate, simultaneous undercover investigations by the Federal Bureau of Investigation (FBI) Cyber Division, the Department of Justice, the Computer Crimes and Intellectual Property Section (CCIPS) of the Criminal Division and Interpol. The four different investigations have not been publicly enumerated, but the U.S. Department of Justice has said in at least one press release that "Operation Higher Education" is the largest component, with participation from twelve nations. Mention has also been made of an investigation into pre-release music groups led by FBI agents from the Washington Field Office. As of March 6, 2009, the FBI states that Operation Fastlink has yielded 60 convictions. The raids occurred in similar fashion to those from Operation Buccaneer and Operation Site Down. Other somewhat-related law enforcement actions include Operation Gridlock and Operation D-Elite.

<span class="mw-page-title-main">Ransomware</span> Malicious software used in ransom demands

Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid. While some simple ransomware may lock the system without damaging any files, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies are used for the ransoms, making tracing and prosecuting the perpetrators difficult.

Megaupload Ltd was a Hong Kong-based online company established in 2005 that operated from 2005 to 2012 providing online services related to file storage and viewing.

The Prioritizing Resources and Organization for Intellectual Property Act of 2008 is a United States law that increases both civil and criminal penalties for trademark, patent and copyright infringement. The law also establishes a new executive branch office, the Office of the United States Intellectual Property Enforcement Representative (USIPER).

<span class="mw-page-title-main">Albert Gonzalez</span> American computer hacker and criminal

Albert Gonzalez is an American computer hacker and computer criminal who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and ATM numbers from 2005 to 2007: the biggest such fraud in history. Gonzalez and his accomplices used SQL injection to deploy backdoors on several corporate systems in order to launch packet sniffing attacks which allowed him to steal computer data from internal corporate networks.

Zeus, ZeuS, or Zbot is a Trojan horse malware package that runs on versions of Microsoft Windows. While it can be used to carry out many malicious and criminal tasks, it is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing. It is also used to install the CryptoLocker ransomware. Zeus is spread mainly through drive-by downloads and phishing schemes. First identified in July 2007 when it was used to steal information from the United States Department of Transportation, it became more widespread in March 2009. In June 2009 security company Prevx discovered that Zeus had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster.com, ABC, Oracle, Play.com, Cisco, Amazon, and BusinessWeek. Similarly to Koobface, Zeus has also been used to trick victims of technical support scams into giving the scam artists money through pop-up messages that claim the user has a virus, when in reality they might have no viruses at all. The scammers may use programs such as Command prompt or Event viewer to make the user believe that their computer is infected.

<span class="mw-page-title-main">Seizure of Megaupload</span>

The seizure of Megaupload, a popular filesharing website with 150 million registered users, occurred on January 19, 2012, following a US indictment accusing Megaupload of harbouring millions of copyrighted files. According to the indictment, Megaupload was costing copyright holders over $500 million in lost revenues.

<span class="mw-page-title-main">Megaupload legal case</span>

The Megaupload legal case concerns a number of related criminal indictments and enforcement actions taken against Megaupload owner Kim Dotcom in various jurisdictions. On 19 January 2012 the United States Department of Justice seized and shut down the file-hosting site Megaupload.com and commenced criminal cases against its owners and others. On 20 January 2012 Hong Kong Customs froze more than 300 million Hong Kong dollars in assets belonging to the company.

<span class="mw-page-title-main">FBI Cyber Division</span>

The Cyber Division (CyD) is a Federal Bureau of Investigation division which heads the national effort to investigate and prosecute internet crimes, including "cyber based terrorism, espionage, computer intrusions, and major cyber fraud." This division of the FBI uses the information it gathers during investigation to inform the public of current trends in cyber crime. It focuses around three main priorities: computer intrusion, identity theft, and cyber fraud. It was created in 2002.

<span class="mw-page-title-main">CryptoLocker</span> Malware

The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred from 5 September 2013 to late May 2014. The attack utilized a trojan that targeted computers running Microsoft Windows, and was believed to have first been posted to the Internet on 5 September 2013. It propagated via infected email attachments, and via an existing Gameover ZeuS botnet. When activated, the malware encrypted certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displayed a message which offered to decrypt the data if a payment was made by a stated deadline, and it threatened to delete the private key if the deadline passes. If the deadline was not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in bitcoin. There was no guarantee that payment would release the encrypted content.

Ira P. Rothken is an American high technology attorney and computer scientist who has handled numerous cases of first impression involving the internet and new technologies.

<span class="mw-page-title-main">Microsoft Digital Crimes Unit</span>

The Microsoft Digital Crimes Unit (DCU) is a Microsoft sponsored team of international legal and internet security experts employing the latest tools and technologies to stop or interfere with cyber crime and cyber threats. The Microsoft Digital Crimes Unit was assembled in 2008. In 2013, a Cybercrime center for the DCU was opened in Redmond, Washington. There are about 100 members of the DCU stationed just in Redmond, Washington at the original Cybercrime Center. Members of the DCU include lawyers, data scientists, investigators, forensic analysts, and engineers. The DCU has international offices located in major cities such as: Beijing, Berlin, Bogota, Delhi, Dublin, Hong Kong, Sydney, and Washington, D.C. The DCU's main focuses are child protection, copyright infringement and malware crimes. The DCU must work closely with law enforcement to ensure the perpetrators are punished to the full extent of the law. The DCU has taken down many major botnets such as the Citadel, Rustock, and Zeus. Around the world malware has cost users about $113 billion and the DCU's jobs is to shut them down in accordance with the law.

Operation Tovar is an international collaborative operation carried out by law enforcement agencies from multiple countries against the Gameover ZeuS botnet, which is believed by the investigators to have been used in bank fraud and the distribution of the CryptoLocker ransomware.

GameOverZeus is a peer-to-peer botnet based on components from the earlier ZeuS trojan. The malware was created by Russian hacker Evgeniy Mikhailovich Bogachev. It is believed to have been spread through use of the Cutwail botnet.

DeepDotWeb was a news site dedicated to events in and surrounding the dark web featuring interviews and reviews about darknet markets, Tor hidden services, privacy, bitcoin, and related news. The website was seized on May 7, 2019, during an investigation into the owners' affiliate marketing model, in which they received money for posting links to certain darknet markets, and for which they were charged with conspiracy to commit money laundering. In March 2021 site administrator Tal Prihar pleaded guilty to his charge of conspiracy to commit money laundering.

Xbox Underground was an international hacker group responsible for gaining unauthorized access to the computer network of Microsoft and its development partners, including Activision, Epic Games, and Valve, in order to obtain sensitive information relating to Xbox One and Xbox Live.

Dridex also known as Bugat and Cridex is a form of malware that specializes in stealing bank credentials via a system that utilizes macros from Microsoft Word.

References

  1. Department of Justice, Office of Public Affairs, Monday, October 31, 2016, Criminal Division’s Computer Crime and Intellectual Property Section Celebrates 20 Years, https://www.justice.gov/opa/pr/criminal-division-s-computer-crime-and-intellectual-property-section-celebrates-20-years
  2. Department of Justice, Office of Public Affairs, Friday March 26, 2010, Leader of Hacking Ring Sentenced for Massive Identity Thefts from Payment Processor and U.S. Retail Networks, https://www.justice.gov/opa/pr/leader-hacking-ring-sentenced-massive-identity-thefts-payment-processor-and-us-retail
  3. Department of Justice, Office of Public Affairs, Monday June 2, 2014, U.S. Leads Multi-National Action Against “Gameover Zeus” Botnet and “Cryptolocker” Ransomware, Charges Botnet Administrator, https://www.justice.gov/opa/pr/us-leads-multi-national-action-against-gameover-zeus-botnet-and-cryptolocker-ransomware
  4. "Organizer of International Securities Fraud Ring Perpetrated Through Botnets and Stock Manipulation Convicted". Federal Bureau of Investigation. Retrieved 19 December 2015.PD-icon.svg This article incorporates public domain material from this U.S government document.
  5. "Unable to handle request".
  6. Department of Justice, Office of Public Affairs, Thursday, January 19, 2012, Justice Department Charges Leaders of Megaupload with Widespread Online Copyright Infringement, https://www.justice.gov/opa/pr/justice-department-charges-leaders-megaupload-widespread-online-copyright-infringement
  7. Department of Justice, Office of Public Affairs, https://www.justice.gov/opa/pr/more-400-onion-addresses-including-dozens-dark-market-sites-targeted-part-global-enforcement