SHARE
Facebook X Pinterest WhatsApp

Cyber Crime: Law Enforcement Fights Back

While cyber crime continued to dominate headlines and wreak havoc on organizations of all sizes across nearly every industry in the first half of 2014, it’s refreshing to note law enforcement also stepped it up. A surge of activity against individuals and criminal organizations occurred, resulting in scores of arrests, indictments and convictions. According to […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Aug 20, 2014

While cyber crime continued to dominate headlines and wreak havoc on organizations of all sizes across nearly every industry in the first half of 2014, it’s refreshing to note law enforcement also stepped it up. A surge of activity against individuals and criminal organizations occurred, resulting in scores of arrests, indictments and convictions.

According to the new report, “Trends in Cybercrime: A Social Look at the First Half 2014,” published by SurfWatch Labs, law enforcement – and the results of their actions – were a big portion of what people were talking about in the first half of 2014. The SurfWatch Labs report analyzes raw cyber data aggregated from social media, news and blogs, industry-specific data feeds, threat and security information, vulnerability data feeds, and partner and end-user submissions. This raw cyber data is standardized and transformed into CyberFacts, which tell you who’s behind the attack (actor), what they’re targeting (target), what the impact is (effect), and how the attack is being executed (practice).

Despite widespread reporting of arrests and indictments, it is still unclear if increased law enforcement activity will curb hacktivist, cyber espionage and cyber criminal behavior. What is becoming increasingly clear is that the U.S. government is becoming more aggressive in going after cyber criminals and is partnering with other governments in attempts to break up global botnets and prosecute malware creators and those who engaged in espionage.

Jason Polancich, founder and chief architect, SurfWatch Labs, is a serial entrepreneur focused on solving complex Internet security and cyber-defense problems, with more than 20 years of experience as an intelligence analyst, software engineer, systems architect and corporate executive. Prior to founding SurfWatch Labs, Mr. Polancich co-founded Novii Design, which assisted the U.S. intelligence community and Department of Defense in building some of the largest data warehouse and analysis systems ever put into operation within the government and defense contracting sectors.

Cyber Crime: Law Enforcement Fights Back - slide 1

Notable Examples of Law Enforcement Action

Click through for a closer look at how law enforcement fought back against some of the biggest cyber attacks during the first half of 2014, as identified by SurfWatch Labs.

Cyber Crime: Law Enforcement Fights Back - slide 2

How law enforcement stepped in

The most discussed cyber practices for law enforcement in the first half of 2014:

  • Criminal charges: 78 percent
  • Suspected hacker arrested: 15 percent
  • Law enforcement intervention: 2 percent

Cyber Crime: Law Enforcement Fights Back - slide 3

The following slides feature some of the high-profile law enforcement actions in the first half of 2014.

GameOver Zeus

The FBI, international law enforcement organizations and security vendors launched an operation to dismantle the GameOver Zeus botnet and the Department of Justice charged a Russian hacker with operating the botnet.

Cyber Crime: Law Enforcement Fights Back - slide 4

Blackshades

A joint operation across law enforcement agencies in the U.S., Europe and Asia resulted in dozens of arrests of users of the Blackshades malware.

Cyber Crime: Law Enforcement Fights Back - slide 5

Nuclear Black Hat

The U.S. government arrested and charged a former U.S. Navy system administrator (who referred to himself as “nuclear black hat”) with conspiring to hack into government systems.

Cyber Crime: Law Enforcement Fights Back - slide 6

Heartbleed

The Royal Canadian Mounted Police arrested and charged a teenage hacker with the theft of 900 social insurance numbers.

Cyber Crime: Law Enforcement Fights Back - slide 7

Chinese Military Hackers

The U.S. Department of Justice indicted five Chinese military hackers – who had targeted six U.S.-based nuclear power, metals and solar energy companies – for computer hacking, economic espionage and other offenses.

Cyber Crime: Law Enforcement Fights Back - slide 8

Timothy French, NullCrew

The FBI and Department of Justice arrested and charged Timothy French, a member of the hacker group NullCrew, for conspiracy to commit computer fraud by posting usernames and passwords online.

Cyber Crime: Law Enforcement Fights Back - slide 9

Guccifer

A Virginia federal grand Jury indicted the hacker known as Guccifer for breaking into social media accounts of U.S. government officials. The hacker was charged with wire fraud, unauthorized computer access, cyber stalking and aggravated identity theft.

Cyber Crime: Law Enforcement Fights Back - slide 10

The ‘Lorax’

The Australian government charged Adam John Bennett, a.k.a. the “Lorax,” for hacking into the database of telecommunications company AAPT, and stealing credit card and medicare numbers, addresses and phone numbers.

Recommended for you...

How DeFi is Reshaping the Future of Finance
Kihara Kimachia
Aug 25, 2022
Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.