Background - Privacy & Cybersecurity
Cybercrime Enforcement
CONTACTS +

Crowell & Moring’s Cybercrime Enforcement team has significant experience executing proactive strategies to address cybercrime, intellectual property theft and fraud, global enforcement of legal rights, mitigation of legal risk, and deterrence of adversaries. 

In today’s business, the digital domain is pervasive, encompassing intellectual property, sensitive and high-value data, and critical human interactions. Cybersecurity and technical risks follow, which present challenges to detect, assess, mitigate, attribute and deter.

As security becomes more sophisticated, so do cybercriminals. Cybercrime has emerged as a key issue for all companies and their leadership. It has been estimated that cybercrime cost the global economy $450 billion in 2017.

To address the challenges and threats, we have created a team that helps clients proactively manage their cybercrime enforcement efforts.  For example, we have established proven models for dismantling malicious technical infrastructure through a combination of civil enforcement, extra-judicial technical means, and global collaboration with government and private sector partners.  We have also carried out some of the most high profile and high-value enforcement actions to recover for trade secret misappropriation and business wrongs. 

Crowell & Moring’s Cybercrime Enforcement team has deep operational experience investigating complex incidents and reaching attribution of malicious cyber actors, parties engaged in intellectual property misappropriation and other insider or external threats engaged in fraudulent activities or theft.  We locate their front doors and assets. We collect, recover, and mitigate the injury and build robust law enforcement referrals.  Working with our clients, we aim for prompt and demonstrable disruption and deterrence of harmful conduct in digital domains. 

Areas we focus on include:

  • Hacking incidents and Internet-based misconduct
  • IP and asset theft
  • Critical competitive situations
  • Industrial espionage and complex fraud
  • Counterfeiting, piracy and gray-market activity related to content, devices, and products
  • Online abuse including advertising fraud, spam, phishing, malware, defamation and other forms of misconduct

This experience, coupled with our crisis management background and coordinated approach, enables us to work with clients in developing the best strategy to manage and resolve problems with minimum disruption and impact to their business.