Charges

Name Persons Websites Organizations Groups
conspiring to commit aggravated identity theft 1 0 0 0
threatening the president 1 0 0 0
threatening a major candidate for the office of president 1 0 0 0
conspiracy to use a communication facility to commit commercial bribery 6 0 0 0
violating a license for radio communication 1 0 0 0
interfering with the operation of a satellite 1 0 0 0
possession of a device to obtain unauthorized use of computer 2 0 0 0
unauthorized use of a computer 2 0 0 0
computer use in an attempt to defraud a third-degree felony 1 0 0 0
a misdemeanor 1 0 0 0
interference with an education institution 1 0 0 0
unauthorized possession of a trade secret 1 0 0 0
unauthorized transmission of a trade secret 1 0 0 0
theft of a trade secret 1 0 0 0
and conspiracy to commit money laundering 1 0 0 0
Transmitting Threats to Law Enforcement Officer 1 0 0 0
obtaining information from computers 1 0 0 0
manufacture and distribute alprazolam tablets 2 0 0 0
illegally possessing firearms 2 0 0 0
unauthorized access to a protected computer in furtherance of fraud 1 0 0 0
unauthorized access to computer systems in furtherance of any criminal act in violation of state law 1 0 0 0
conspiracy to transport stolen property interstate 1 0 0 0
copyright infringement conspiracy 3 0 0 0
unlawful monetary transactions 1 0 0 0
Intentionally Accessing a Protected Computer Without Authorization and Recklessly Causing Damage 1 0 0 0
conspiracy to intentionally cause damage to a protected computer 2 0 0 0
drug distribution 3 0 0 0
conspiracy to distribute a controlled substance 1 0 0 0
transporting funds to promote unlawful activity 1 0 0 0
possessing with the intent to distribute methamphetamine 1 0 0 0
distribution of a controlled substance analogue 1 0 0 0
distribution of a controlled substance 1 0 0 0
conspiracy to possess with intent to distribute controlled substances 1 0 0 0
possession with intent to distribute methamphetamine 1 0 0 0
distributing methamphetamine 1 0 0 0
Bulletproof Exchangers 0 0 0 1
impairing electronic communications to/from computer 1 0 0 0
dealing with identity information to commit an indictable offence 1 0 0 0
unauthorised modification of data with intent to cause impairment 1 0 0 0
transmission of threatening communications in interstate commerce 1 0 0 0
intentional access of a protected computer 3 0 0 0
conspiracy to commit money laundering charges 1 0 0 0
conspiracy to commit theft of trade secrets 1 0 0 0
influencing a federal official by threat 1 0 0 0
transmitting a threat in interstate commerce 1 0 0 0
tax fraud 1 0 0 0
transmitting threats in interstate or foreign commerce 1 0 0 0
operating an unlicensed money transmitting business 4 0 0 1
conspiracy wire fraud 1 0 0 0
and conspiracy to commit bank 1 0 0 0
computer hacking 3 0 0 0
conspiracy to distribute and possess with the intent to distribute two controlled substances 2 0 0 0
conspiracy to commit wire fraud. 5 0 0 0
conspiring to commit wire fraud 13 0 0 0
extortion in relation to damage to a protected computer 1 0 0 0
Computer Crime 1 0 0 0
access to a protected computer in furtherance of fraud. 1 0 0 0
filing false tax returns 1 0 0 0
conducting an illegal gambling business 10 0 0 1
conspiracy to conduct an illegal gambling business 10 0 0 1
conspiracy to commit an offense against the United States 1 0 0 0
Aggravated identity theftRICO conspiracy 1 0 0 0
RICO conspiracy 20 0 0 1
Conspiracy to commit computer intrusions 2 0 0 1
transmitting a demand in relation to damaging a protected computer 2 0 0 0
using threats of force to intimidate or interfere with reproductive health services 1 0 0 0
transmitting threats to injure 1 0 0 0
conspiracy to cause intentional damage to a protected computer 1 0 0 0
distributing controlled substances 3 0 0 0
Wiretap Act violations 1 0 0 0
Computer Fraud and Abuse Act violations 1 0 0 0
production of child pornography 1 0 0 0
distribution of the controlled substance codeine 1 0 0 0
one count of aggravated identity theft 1 0 0 0
making hoax bomb threats 1 0 0 0
distribution of child pornography 1 0 0 0
money laundering and aiding and abetting 1 0 0 0
transmitting threats in interstate commerce 1 0 0 0
000 1 0 0 0
intentionally caused damage and loss that exceeded $5 1 0 0 0
knowingly caused the transmission of a code and command 1 0 0 0
exceeded authorized access 1 0 0 0
Conspiring to commit trade secret theft 3 0 0 0
aggravated identity thef 2 0 0 0
ank fraud 1 0 0 0
aggravated identiy theft 1 0 0 0
stolen mail 1 0 0 0
production or possession of modified telecommunications instrument 1 0 0 0
using an interactive computer service or electronic communication service 1 0 0 0
harass or intimidate another person 1 0 0 0
transmitting in interstate commerce communications containing threats to injure another person 1 0 0 0
possession with intent to distribute 1 0 0 0
conspiracy to import controlled substance 1 0 0 0
false representation of a social security number 1 0 0 0
using a carriage service to menace harass or cause offence 1 0 0 0
using a carriage service to make a threat to cause serious harm 1 0 0 0
threatening to cause harm to a Commonwealth public official 1 0 0 0
aggravated use of a carriage service to menace harass or cause offence involving the transmission publication or distribution of material of a private sexual nature 1 0 0 0
conspiracy to violate the Computer Fraud and Abuse Act 1 0 0 0
computer intrusion with intent to cause damage 1 0 0 0
interstate communication of a threat 1 0 0 0
sending threatening communications 1 0 0 0
accessing a computer in order to view child pornography over the Internet 1 0 0 0
conspiracy to commit bank 1 0 0 0
conspiracy to violate the Computer Fraud & Abuse Act 3 0 0 0
sending interstate threats 1 0 0 0
1 0 0 0
intentional access to a protected computer 1 0 0 0
conspiracy to possess with the intent to distribute controlled substances 1 0 0 0
conspiring to launder the proceeds of scams 1 0 0 0
computer fraud and aggravated identity theft 2 0 0 0
conspiracy to commit money laundering and one count 1 0 0 0
substantive money laundering 1 0 0 0
fraud and related activity in connection with computers 1 0 0 0
and violence 1 0 0 0
threats 1 0 0 0
conspiracy to interfere with commerce by force 1 0 0 0
Conspiracy to Interfere with Commerce by Threats and Violence 0 0 0 0
conspiracy to import controlled substances and launder money 1 0 0 0
conspiracy to traffic in counterfeit services 9 0 0 0
illegal removal of property to prevent its lawful seizure 1 0 0 0
conspiracy to unlawfully access computers in furtherance of a criminal act 1 0 0 0
conspiring to provide material support to the Islamic State of Iraq in al-Sham 1 0 0 0
Interfering in U.S. Political System 1 0 0 0
electronic communication service to intimidate or harass another person in another state 1 0 0 0
Threatening Interstate Communications 3 0 0 0
conspiring to access and install malicious software 1 0 0 0
posting of threatening messages 1 0 0 0
producing or using trafficking in a counterfeit access device 1 0 0 0
possession of 15 or more counterfeit or unauthorized access devices 1 0 0 0
threatening to injure the Secretary of Public Safety 1 0 0 0
threaten or harass any spec 1 0 0 0
whether or not conversation or communication ensues without disclosuing his identity and with inent to abuse 1 0 0 0
makes a telephone call or tilizes a telecommunications device 1 0 0 0
without authorization to accessess any nonpublic computer of a department or agencry that is exclusively for the use of the government of the united states. 1 0 0 0
intentionally 1 0 0 0
and therefor obtain information from any protected computer 1 0 0 0
and therefor obtain information from any department or agency 1 0 0 0
intentionally access a computer without authorization or exceed authorized access 2 0 0 0
a means of identification of another person during and in relation ro a specified felony violation 1 0 0 0
without lawful authority 1 0 0 0
or use 1 0 0 0
possess 1 0 0 0
Knownly transfer 1 0 0 0
or in such pretended character 1 0 0 0
and acts as such 1 0 0 0
agency or officer thereof 1 0 0 0
falsey assumes or pretends to be an officier or employee acting under the authority of the untied states or any department 1 0 0 0
attempting to access a protected computer without authorization 1 0 0 0
attempting to cause damage to protected computers 1 0 0 0
intentionally causing damage to protected computers 1 0 0 0
conspiracy to commit various forms of computer fraud 2 0 0 0
intentionally accessing a protected computer without authorization 1 0 0 0
conspiracy to cause damage to internet-connected computer 1 0 0 0
interstate threatening communications 1 0 0 0
theft of trade secrets 2 0 0 0
witness tampering 1 0 0 0
making public restricted personal information 1 0 0 0
Conspiracy to Commit Cyberstalking 1 0 0 0
committing counterfeiting acts outside the United States 1 0 0 0
conspiracy to launder money 13 0 0 0
conspiracy to manufacture/pass/transfer/sell counterfeit currency 1 0 0 0
conspiracy to access a protected computer 1 0 0 0
and fabricate false evidence with intent to mislead judicial tribunal 1 0 0 0
do act intending to pervert the course of justice (x2) 1 0 0 0
tamper with evidence with intent to mislead judicial tribunal 1 0 0 0
unauthorised function with intent serious offence 1 0 0 0
intentionally causing damage to a protected computer without authorization 1 0 0 0
use or possession of hardware or software configured to obtain telecommunications services 0 0 0 0
production or possession of modified telecommunications instruments 1 0 0 0
the use 1 0 0 0
Interstate communications with intent to extort 1 0 0 0
transmitting a program to a protected computer that intentionally caused damage 1 0 0 0
making extortionate threats via the internet 1 0 0 0
unauthorized access and intentional damage to a protected computer 0 0 0 1
conspiracy to commit economic espionage 1 0 0 1
making a false report resulting in a death 1 0 0 0
violation of the Computer Fraud and Abuse Act 0 0 0 1
making interstate threats against college students 1 0 0 0
conspiring to violate the Computer Fraud and Abuse Ac 2 0 0 0
possession of child pornography 3 0 0 0
possessing with intent to distribute a controlled substance 1 0 0 0
money laundering 1 0 0 0
wire and access device fraud 1 0 0 0
intentionally accessing without authorization and doing damage to the computer systems 1 0 0 0
consipracy 1 0 0 0
making a false threat involving explosives 1 0 0 0
intentionally accessing a protected computer without authorization and recklessly causing damage resulting in loss of more than $5000 during one year 1 0 0 0
interception of electronic communications. 1 0 0 0
unauthorized access of a protected computer 1 0 0 0
obstructing justice 1 0 0 0
interstate threats 1 0 0 0
stalking 2 0 0 0
intentionally accessing a protected computer without authorization and recklessly causing damage resulting in loss of more than $5 0 0 0 0
racketeering 10 0 0 1
threatening to damage a protected computer 2 0 0 0
damaging a protected computer 2 0 0 0
Damage to a Protected Computer 1 0 0 0
conspiracy to distribute controlled substances over the Dark Web 1 0 0 0
intentionally damaging computer equipment 1 0 0 0
cyberstalking 31 0 0 0
transmitting in interstate or foreign commerce a communication containing a threat to injure another person 1 0 0 0
money-laundering 4 0 0 0
Section 2 of the Computer Misuse Act 1990 1 0 0 0
money laundering with Bitcoin 1 0 0 0
damaging protected computers 2 0 0 0
Accessing a Computer and Obtaining Information 1 0 0 0
cryptocurrency fraud 1 0 0 0
violating the Computer Fraud and Abuse Act 1 0 0 0
Computer Misuse Act 1 0 0 0
computer fraud and abuse 3 0 0 0
unauthorised access to data, with intent to facilitate fraud 1 0 0 0
unauthorised acts to impair the operation of a computer 1 0 0 0
threatening to damage a computer 2 0 0 0
unauthorized access to, and theft of information from, computers 2 0 0 0
causing the transmission of a program and damaging a protected computer without authorization 1 0 0 0
accessing a protected computer with intent to defraud 1 0 0 0
intentionally accessing a computer without authorization 1 0 0 0
attempting to provide material support to a designated foreign terrorist organization 1 0 0 0
fraud in connection with email 1 0 0 0
threatening to damage a protected computer 0 0 0 0
accessing protected computers in furtherance of fraud 1 0 0 0
causing intentional damage to a protected computer 1 0 0 0
attempting to access a computer without authorization 1 0 0 0
endeavoring to intercept electronic communications 1 0 0 0
distributing and advertising an electronic communication interception device 1 0 0 0
violate the CAN-SPAM Act 5 0 0 0
unauthorized interception of electronic communications 2 0 0 0
transmission of a code or command 1 0 0 0
breach of probation 1 0 0 0
mischief to data 1 0 0 0
unauthorized use of a computer system 1 0 0 0
distribution of LSD 5 0 0 0
participating in a continuing criminal enterprise 2 0 0 0
conspiracy to distribute controlled substances 10 0 0 0
conspiracy to use unauthorized credit and debit cards 1 0 0 0
trafficking in device making equipment 1 0 0 0
unlawful transfer of false identification documents 1 0 0 0
distribution of narcotics 1 0 0 0
conspiracy to distribute narcotics 1 0 0 0
conspiracy to engage in racketeering 1 0 0 0
plus encouraging or assisting an offence 1 0 0 0
impairing the operation of computers 1 0 0 0
transmission of a program to cause damage to a computer 1 0 0 0
accessing a protected computer 2 0 0 0
Threat to Injure Property Through Interstate Communications 0 0 0 0
Threat to Damage a Computer 0 0 0 0
Fraud in Connection with Computers 3 0 0 0
theft of U.S. government funds 1 0 0 0
use of unauthorized account access devices 1 0 0 0
conspiracy to commit identity theft 3 0 0 0
conspiracy to commit mail fraud 5 0 0 0
Illegal Access to Computer Information protected by law, causing major damage and committed by an organized group by previous concert or by a person using his official position 3 0 0 0
Conspiracy to Commit Criminal Copyright Infringement 30 0 0 0
accessing a computer system for a dishonest purpose 1 0 0 0
use of a computer system with intent to commit an offence 1 0 0 0
fraudulently intercepting functions of a computer system 1 0 0 0
unauthorized use of computer services 1 0 0 0
aiding and abetting computer intrusions 3 0 0 0
intentionally accessing a computer network without authorization 1 0 0 0
intentionally issuing commands and codes that caused damage to the network 1 0 0 0
using facilities of interstate commerce to commit extortion 1 0 0 0
aiding and abetting misconduct in a public office 3 0 0 0
conspiracy to cause criminal damage to property 1 0 0 0
conspiracy to intercept communications unlawfully 2 0 0 0
conspiracy to cause unauthorised modification of computer material 2 0 0 0
use or possession of hardware or software configured to obtain telecommunications services 3 0 0 0
use, production or possession of modified telecommunications instruments 1 0 0 0
conspiracy to violate the criminal copyright laws 8 0 0 0
communicating false information 0 0 0 0
conspiracy to traffic in counterfeit service marks 3 0 0 0
intentionally causing a disruption of a computer system 1 0 0 0
supplying articles for use in fraud 2 0 0 0
obtaining articles for use in offence under Computer Misuse Act 1 0 0 0
supplying articles for use in an offence under the Computer Misuse Act 1 0 0 0
offering to supply an article for use in the course or in connection with fraud 1 0 0 0
offering an article to commit or assist in the commission of an offence and possession of an article for use in fraud 1 0 0 0
committing an unauthorised act in relation to a computer with intent to impair the operation of a computer or prevent or hinder access to a programme 1 0 0 0
adapting system-software 2 0 0 0
harmful access to a computer 1 0 0 0
conspiracy to enter into/be concerned in the acquisition/retention/use of control of criminal property 5 0 0 0
conspiracy to steal from another 5 0 0 0
unauthorised access with intent to commit or facilitate commission of further offences 5 0 0 0
conspiracy with others to commit computer misuse offences 5 0 0 0
attempting to commit fraud by false representation 3 0 0 0
conspiracy to commit fraud by false representation 5 0 0 0
conspiracy cause damage to protected computers 2 0 0 0
theft of government property 1 0 0 0
unauthorized removal and retention of classified documents or materials by government employee or contractor 1 0 0 0
fraud by false representation 4 0 0 0
unauthorised access to a computer system with intent to impair operation of a computer 1 0 0 0
unauthorised access of a computer system with intent to commit further offences 1 0 0 0
extortion by threat 1 0 0 0
makes a telephone call or tilizes a telecommunications device, whether or not conversation or communication ensues without disclosuing his identity and with inent to abuse, threaten or harass any spec 1 0 0 0
engage in conduct with intent to convey false or misleading information under circumstamcces where such information may reaspma;;y be belived and where such information indicates that an activity has 2 0 0 0
intentionally, without authorization to accessess any nonpublic computer of a department or agencry that is exclusively for the use of the government of the united states. 1 0 0 0
intentionally access a computer without authorization or exceed authorized access, and therefor obtain information from any protected computer 1 0 0 0
intentionally access a computer without authorization or exceed authorized access, and therefor obtain information from any department or agency 1 0 0 0
Knownly transfer, possess, or use, without lawful authority, a means of identification of another person during and in relation ro a specified felony violation 1 0 0 0
falsey assumes or pretends to be an officier or employee acting under the authority of the untied states or any department, agency or officer thereof, and acts as such, or in such pretended character 1 0 0 0
accessing a computer without authorization 1 0 0 0
intentional transmission causing damage to a protected computer 2 0 0 0
making interstate threats 3 0 0 0
computer hacking to steal information 1 0 0 0
unauthorised acts with intent to impair the operation of or prevent/hinder access to a computer 1 0 0 0
conspiracy to secure unauthorised access to computer material 3 0 0 0
conspiracy to cause unauthorised modification in computer material 3 0 0 0
conspiracy to obtain telecommunications services dishonestly 3 0 0 0
Theft of information 2 0 0 0
unauthorised modification of the contents of a computer 1 0 0 0
causing a computer to perform a function to secure or enable unauthorised access 1 0 0 0
obtaining or disclosing personal data 1 0 0 0
conspiracy to make or supply articles for use in fraud 1 0 0 0
conspiracy to cause unauthorised modification to computers 1 0 0 0
conspiracy to commit fraud 7 0 0 0
dapting an article intending it to be used to commit, or to assist in the commission of, an offence 1 0 0 0
possessing articles for use in fraud 2 0 0 0
encouraging or assisting offences 4 0 0 0
causing unauthorised modifications to computers 1 0 0 0
supplying and possessing an article for use in fraud 1 0 0 0
acquiring criminal property 3 0 0 0
possessing electronic files containing credit card information 1 0 0 0
unauthorised access to business computers 1 0 0 0
conspiring to do unauthorised acts, with intent to impair computer programmes 1 0 0 0
voyeurism 1 0 0 0
unauthorised access to computer material 5 0 0 0
Unauthorised acts with intent to impair operation of a computer 1 0 0 0
encouraging or assisting an offence 1 0 0 0
disclosing personal data 1 0 0 0
securing unauthorised access to computer material 2 0 0 0
breaching the Data Protection Act 1 0 0 0
Theft 1 0 0 0
felony computer crimes 2 0 0 0
communications fraud 1 0 0 0
pattern of unlawful activity 1 0 0 0
e-mail fraud 1 0 0 0
data espionage 1 0 0 0
wrongfully accessing TRW credit files 1 0 0 0
intercepting wire communications 1 0 0 0
obtaining information by computer from a protected computer 1 0 0 0
dishonestly manipulating a machine to benefit 1 0 0 0
possession or control of data to commit serious computer offences 1 0 0 0
modifying computer data to cause harm or inconvenience 1 0 0 0
criminal mischief 1 0 0 0
making, supplying or obtaining articles for use in computer offences 1 0 0 0
securing unauthorised access to computer material with intent 1 0 0 0
violation of the CAN-SPAM Act 1 0 0 0
immigration fraud 1 0 0 0
computer data sabotage 1 0 0 0
mischief to data and possession of stolen property 1 0 0 0
trafficking and prodiction of false identication documents 20 0 0 0
trafficking in, production of, and use of counterfeit access devices 20 0 0 0
Aiding and Abetting 0 0 0 0
Conspiracy to Unlawful Possession, Production and Trafficking in Device-Making Equipment 1 0 0 0
Unlawful Possession, Production, and Trafficking in Device-making Equipment 1 0 0 0
Possession of Fifteen or More Counterfeit and Unauthorized Access Devices 1 0 0 0
Trafficking in and Use of Counterfeit and Unauthorized Access Devices 1 0 0 0
Unlawful Transfer, Possession, and Use of a Means of Identification 0 0 0 0
Conspiracy to Unlawfully Transfer Identification Document, Authentication Feature, and False Identification Document 0 0 0 0
Attempt to Unlawful Trafficking in and Production of Counterfeit Identification Documents or Authentication Features 0 0 0 0
Unlawful Trafficking in and Production of Counterfeit Identification Documents or Authentication Features 7 0 0 0
Conspiracy to Engage in a Racketeer Influenced Corrupt Organization 12 0 0 0
Participate in a Racketeer Influenced Corrupt Organization 12 0 0 0
interfering and obstruction of the lawful use of a computer 3 0 0 0
unauthorized obtaining altering inserting, and erasing of data stored in a computer 3 0 0 0
sending bomb hoaxes 1 0 0 0
conspiring to commit access device fraud 0 0 0 0
damaging a computer 1 0 0 0
criminal conspiracy 1 0 0 0
unauthorized computer access with intent to defraud 1 0 0 0
cyberbullying 1 0 0 0
conspiracy to commit computer hacking 2 0 0 0
solicitation of a crime of violence 1 0 0 0
conspiring to provide material support to terrorists 1 0 0 0
possessing unauthorized access devices 2 0 0 0
illegally accessing computer networks, telecommunications networks, Internet or digital devices of other persons 1 0 0 0
conspiring to send spam 1 0 0 0
gaining unauthorised access to computer systems 2 0 0 0
obstruction of justice 4 0 0 0
false statements 2 0 0 0
conspiracy to access a government computer without authorization 2 0 0 0
access of a protected computer without authorization 2 0 0 0
conspiracy to access a protected computer without authorization 8 0 0 0
intentionally accessing and exceeding authorized access to a computer 1 0 0 0
conspiracy to make unauthorized access to a protected computer 3 0 0 0
Attempted Grand Larceny in the Third Degree 2 0 0 0
Criminal Possession of a Forged Instrument in the Second Degree 3 0 0 0
Attempted Criminal Possession of Stolen Property in the Third Degree 7 0 0 0
Grand Larceny in the Second Degree 5 0 0 0
Criminal Possession of Stolen Property in the First Degree 3 0 0 0
Grand Larceny in the First Degree 2 0 0 0
conspiring to disrupt service 3 0 0 0
Tampering with computer equipment 1 0 0 0
illegally accessing and altering computer files 1 0 0 0
conspiring to send malicious code 1 0 0 0
substantive computer fraud 3 0 0 0
access device fraud and extortion 3 0 0 0
conspiracy to commit wire fraud and bank fraud 4 0 0 0
racketeering conspiracy 40 0 0 0
Conspiracy in the Fifth Degree 12 0 0 0
Criminal Possession of Stolen Property in the Third Degree 1 0 0 0
Criminal Possession of Stolen Property in the Fourth Degree 10 0 0 0
Grand Larceny in the Fourth Degree 1 0 0 0
Grand Larceny in the Third Degree 6 0 0 0
Criminal Possession of Stolen Property in the Second Degree 5 0 0 0
Enterprise Corruption 6 0 0 0
Conspiracy in Fifth Degree 3 0 0 0
Scheme to Defraud in the First Degree 16 0 0 0
Money Laundering in the Fourth Degree 3 0 0 0
Money Laundering in the Second Degree 6 0 0 0
Money Laundering in the First Degree 2 0 0 0
fraud over $5,000 1 0 0 0
fraudulent use of credit-card data 1 0 0 0
Extortion 0 0 0 1
Breach of Recognizance 1 0 0 0
Public Mischief 1 0 0 0
disobeying a data access order to reveal his passwords 1 0 0 0
possession of identification information with the intent of committing an offense 1 0 0 0
dishonestly obtaining credit card information 1 0 0 0
possession of child exploitation material 1 0 0 0
using a carriage service to offend 1 0 0 0
unlawful transmission of computer code and command 1 0 0 0
inciting others to impair electronic communications 1 0 0 0
unauthorised access to restricted data 1 0 0 0
violating legislation involving the protection of internet-related communications 1 0 0 0
modifying its data to cause inconvenience 1 0 0 0
operating a restricted access computer system 1 0 0 0
trafficking unauthorized access devices 1 0 0 0
possession of 15 or more unauthorized access devices 2 0 0 0
obtaining information from a protected computer 2 0 0 0
intentionally causing damage to a protected computer 5 0 0 0
urging unknown person to commit an offence of causing an unauthorised impairment of electronic communication to or from a computer 1 0 0 0
suspicion of fraud by false representation 1 0 0 0
unauthorised access with intent to commit further offences 1 0 0 0
suspicion of unauthorised access to computer material 1 0 0 0
Unknown 19 0 0 0
consipracy to intentionally to cause damage to a protected computer 2 0 0 0
illegally intercepting a wire communication 1 0 0 0
conspiring to commit public nuisance 1 0 0 0
causing a computer to perform a function to secure unauthorised access to a program or data 2 0 0 0
conspiracy to commit wire fraud in a manner affecting a financial institution 1 0 0 0
conspiracy to commit the unauthorized access of protected computers 2 0 0 0
retaliation against a federal law officer 1 0 0 0
Conspiracy to make publically avaliable restricted personal information of an employee of the united states 1 0 0 0
Internet threats 1 0 0 0
possession of extreme pornography 1 0 0 0
possessing non-photographic prohibited images of children 1 0 0 0
possessing photographic indecent images of children 1 0 0 0
conspiracy to commit computer misuse 1 0 0 0
Conspiracy to Commit Unauthorised Access With Intent to Impair or with Recklessness as to Impair an Operation of a Computer 2 0 0 0
Conspiracy to Commit Unauthorised Access With Intent to Commit Further Offences 2 0 0 0
Conspiracy to Commit Unauthorised Access to Computer 2 0 0 0
conspiracy to access a computer without authorization 2 0 0 0
illegal access to computer systems 0 0 0 0
wiretapping 2 0 0 0
conspiracy to commit aggravated identity theft 1 0 0 0
Conspiracy to commit computer intrusion 5 0 0 0
conspiracy to commit extortion 1 0 0 0
sending extortionate threats 1 0 0 0
attempted extortion 1 0 0 0
unauthorized trafficking in recordings of live musical performances 0 0 0 0
unlawful use of a computer system 2 0 0 0
imparing the function of a computer 2 0 0 0
unlawful interception of an electronic communication 1 0 0 0
unauthorised access to computer systems using a telecommunications network 1 0 0 0
Trade Secret Theft 7 0 0 0
Economic Espionage 6 0 0 1
Transmitting a program, information, code, or command with the intent to cause damage to protected computers 5 0 0 0
Accessing or attempting to access a protected computer without authorization to obtain information for the purpose of commercial advantage and private financial gain 6 0 0 0
Conspiring to commit computer fraud and abuse 8 0 0 0
Unauthorized modifications of a computer contrary to section 3 of the computer misuse act 1990 1 0 0 0
Theft by the use of computer equipment, associated with unauthorized access to computer information 1 0 0 0
Unauthorized access to computer information, committed by mercenary or other personal interest 1 0 0 0
Securities Fraud Conspiracy 2 0 0 0
Securities Fraud 7 0 0 0
Conspiracy to commit securities fraud 4 0 0 0
Money laundering 32 0 0 2
Breaking and entering 1 0 0 0
Accessing government computers 1 0 0 0
Obtaining information from a protected computer for a fraudulent purpose 1 0 0 0
Conspiracy to hacking 10 0 0 0
Threats to kill 2 0 0 0
Unauthorized access with intent to commit further offences 1 0 0 0
Interstate communications of threats 1 0 0 0
Unauthorized impairment of a protected computer 4 0 0 0
Possession of hacking programs 1 0 0 0
Modifying, damaging and restricting access to data without authorization 2 0 0 0
Obtaining unauthorized access and causing severe disruptions to a computer system 1 0 0 0
Conspiracy to commit trademark counterfeiting 1 0 0 0
Criminal contempt 1 0 0 0
Intentional damage to a protected computer 8 0 0 0
Fraud and related activity in connection with electronic mail 1 0 0 0
Conspiracy to defraud 5 0 0 0
Data theft 4 0 0 0
Conspiracy to commit aggregated data theft 0 0 0 0
Attempted transmission of a malicious code 2 0 0 0
Transmission of a malicious code 1 0 0 0
Conspiracy to cause damage to a protected computer 1 0 0 0
Conspiracy to commit access device fraud 22 0 0 0
Conspiracy to commit money laundering 45 0 0 2
Criminal copyright infringement 3 0 0 0
Unauthorized intrusion 1 0 0 0
Invasion of privacy 2 0 0 0
Use of a telecommunications device the internet with intent to annoy, abuse, threaten or harass 1 0 0 0
Intentionally causing and attempting to cause damage to a protected computer 3 0 0 0
Transmitting interstate and foreign communications with intent to extort 1 0 0 0
Unauthorized access to a computer 7 0 0 0
Unauthorized access to wireless access points on computer systems 1 0 0 0
War-Driving 1 0 0 0
Making a false statement in connection with an internet fraud scheme 1 0 0 0
Attempted destruction of evidence 1 0 0 0
Mail fraud 14 0 0 0
Misuse of a social security number 1 0 0 0
Unauthorized access to a computer to obtain files and other account information 1 0 0 0
Copyright infringement 2 0 0 1
Fraud and related activity in connection with computer 3 0 0 0
Violating united states code section 1030 1 0 0 0
Transmission of code to cause damage to a protected compute 2 0 0 0
Operating a botnet 1 0 0 0
Illegally posting and using information on the internet 3 0 0 0
Conspiracy to commit bank fraud 10 0 0 1
Conspiracy to commit fraud and related activity in connection with electronic mail 2 0 0 0
Conspiracy to commit fraud and related activity in connection with computers 5 0 0 0
Unauthorized access to a program/data 1 0 0 0
Unauthorized access to a computer to facilitate the commission of an offense 1 0 0 0
Attempted witness harassment 1 0 0 0
Trademark misuse 1 0 0 0
Aiding and abetting the unauthorized use of an access device 1 0 0 0
E-mail fraud 1 0 0 0
Data spying 1 0 0 0
Device fraud 3 0 0 0
Access device fraud 26 0 0 1
Unlawful intercept of electronic communication 2 0 0 0
Trafficking in and offering to the public a software program that could circumvent technological protections on copyrighted material 1 0 0 0
Credit Card Fraud 5 0 0 0
Authorization accessed the email account of an employee of a financial services company for purposes of commercial advantage and private financial gain 1 0 0 0
Distributing indecent images of children 1 0 0 0
Black mail 3 0 0 0
Conspiracy 26 0 0 0
Unauthorized access to a protected computer to obtain information 3 0 0 0
Aiding and abetting computer intrusion 1 0 0 0
Unlawfully accessing and modifying data 1 0 0 0
Unauthorized and reckless act with the intent to impair computer operations 1 0 0 0
Money laundering conspiracy 37 0 0 2
Unauthorised modification of computer data 2 0 0 0
Conspiring to commit computer fraud 2 0 0 0
Computer abuse 5 0 0 0
Using a restricted computer 1 0 0 0
Attempting to gain unauthorized access to a computer 1 0 0 0
Committing unauthorised acts with intent to impair the operation of or access to a computer 6 0 0 0
Unauthorized access to a protected computer 6 0 0 0
Third-degree computer tampering 3 0 0 0
Fourth degree criminal solicitation 2 0 0 0
Eavesdropping 1 0 0 0
Second degree identity theft 1 0 0 0
Third degree burglary 1 0 0 0
Access device violations 1 0 0 0
Violating federal anti-money laundering laws 1 0 0 0
Aiding and abetting a bomb threat hoax 1 0 0 0
Conspiring to engage in a bomb threat hoax 1 0 0 0
Conspiracy to commit wire fraud 79 0 0 4
Hacking 23 0 0 1
Spam 3 0 0 0
Access a protected computer without authorization 0 0 0 0
Conspiracy to commit computer fraud 18 0 0 1
Computer theft 2 0 0 0
Posting content illegal 1 0 0 0
Accessing computer systems illegally 2 0 0 0
Computer tampering 5 0 0 0
Computer hacking to extort 2 0 0 0
Cyber stalking 6 0 0 0
Swatting 1 0 0 0
Altering or inserting files into pre-existing computer systems 1 0 0 0
Criminal damage to computer data 2 0 0 0
Commercial advantage and private financial gain 1 0 0 0
Accessing or attempting to access a protected computer without authorization 1 0 0 0
Identity fraud 1 0 0 0
Cyber harassment 3 0 0 0
Identity theft 16 0 0 1
Downloading unauthorised information 1 0 0 0
Commodities fraud 1 0 0 0
Mischief in relation to computer data 3 0 0 0
Unauthorized use of computer 2 0 0 0
Computer misuse 24 0 0 0
Unauthorized access to computer material 4 0 0 0
Unauthorized computer access with intent to commit other offences 2 0 0 0
Unauthorized acts with intent to impair operation of or prevent/hinder access to a computer 2 0 0 0
Fraud 22 0 0 2
Fraudulently falsify/destroy/alter/damage a record 1 0 0 0
Criminal code related to computer hacking 3 0 0 0
Computer fraud 39 0 0 0
Conspiracy to commit computer fraud and abuse 1 0 0 0
Unauthorized access to restricted data held in a computer 1 0 0 0
Aggravated identity theft 94 0 0 4
Unauthorized computer access 11 0 0 0
Wire fraud conspiracy 48 0 0 1
Breaching email systems 1 0 0 0
Unauthorized access to data with intent to commit serious offence 1 0 0 0
Unauthorized modification of computer data 2 0 0 0
Aid the unauthorized modification of a computer file 1 0 0 0
Computer trespass 3 0 0 0
Bank Fraud 20 0 0 0
Wire Fraud 124 0 0 4
Disclosing illegally intercepted electronic communications 1 0 0 0
Accessing protected computers to conduct fraud 1 0 0 0
Computer intrusion 41 0 0 1
Unauthorized access to restricted data 10 0 0 0
Possession of data with intent to commit a computer offence 1 0 0 0
Unauthorized access with intent to commit a serious offence 3 0 0 0
Unauthorized Modification of data to cause impairment 1 0 0 0
Computer Sabotage 11 0 0 0
Conspiracy to Infringe Copyrights 19 0 0 0