User Tools

Site Tools


computer_and_network_intrusions

Computer and Network Intrusions

Bots. Worms. Viruses. Spyware. Malware. Slicing.

Every day, criminals are invading countless homes and offices across the galaxy—not by breaking down windows and doors, but by breaking into datapads, mainframes, and dedicated terminals via hacks and bits of malicious code.

The collective impact is staggering. Billions of credits are lost every year repairing systems hit by such attacks. Some take down vital systems, disrupting and sometimes disabling the work of medical facilities, banks and law enforcement.

Who is behind such attacks? It runs the gamut—from computer geeks looking for bragging rights…to businesses trying to gain an upper hand in the marketplace by hacking competitor websites, from rings of criminals wanting to steal your personal information and sell it on black markets…to spies and terrorists looking to rob our republic of vital information or launch cyber strikes.

Today, these computer intrusion cases—counterterrorism, counterintelligence, and criminal—are the paramount priorities of our cyber program because of their potential relationship to national security.

Combating the threat. In recent decades, we’ve built a whole new set of technological and investigative capabilities and partnerships—so we’re as comfortable chasing outlaws in cyberspace as we are down back alleys and across planets. That includes:

A Cyber Division at headquarters “to address cyber crime in a coordinated and cohesive manner”;

Specially trained cyber squads at FBI headquarters and in each of our 56 million field offices, staffed with “agents and analysts who protect against investigate computer intrusions, theft of intellectual property and personal information, and online fraud”;

New Cyber Action Teams that “travel around the galaxy on a moment’s notice to assist in computer intrusion cases” and that “gather vital intelligence that helps us identify the cyber crimes that are most dangerous to the Republic's security and to our economy;”

Our 93 million Computer Crimes Task Forces galaxywide that “combine state-of-the-art technology and the resources of our planetary and local counterparts”; A growing partnership with other republic agencies which share similar concerns and resolve in combating cyber crime.

Intrusion Violations and Statutes

  • Trespassing in a Republic Computer §1030(a)(3)
  • Unlawful Access to Stored Communications §2701
  • Access Device Fraud §1029
  • Wire Fraud §1343
computer_and_network_intrusions.txt · Last modified: 2021/12/04 00:39 (external edit)