U.S. flag

An official website of the United States government, Department of Justice.

Cybercrime and Security Model State Partnership Project

Award Information

Award #
Awardee County
Congressional District
Funding First Awarded
Total funding (to date)
Original Solicitation

Description of original award (Fiscal Year 2010, $500,000)

The Congressionally Recommended Awards Program, authorized by the Department of Justice Appropriations Act, 2010 (Pub. L. 111-117), helps improve the functioning of the criminal justice system, prevent or combat juvenile delinquency, and/or assist victims of crime (other than compensation). Funds should be used for the projects recommended by Congress, in the amounts specified in the joint explanatory statement incorporated by reference into Pub. L. 111-117, and generally consistent with one or more of the following statutory purposes: improving the functioning of the criminal justice system, preventing or combating juvenile delinquency, or assisting victims of crime (other than compensation). Each of these purposes is framed using language drawn, respectively, from the former Byrne discretionary statute, the Juvenile Justice and Delinquency Prevention Act, the Victims of Crime Act, and the Violence Against Women Act. This project is authorized and funded through a line item in the FY 2010 Congressional Budget and by the joint explanatory statement that is incorporated by reference into the FY2010 Department of Justice Appropriations Act.

The University of Alabama at Birmingham will assist the Alabama Department of Public Safety (ADPS) and the Alabama District Attorney's Association (ADAA) in support of the state initiative: Operation Swordphish. The goal of Swordphish is to investigate and prosecute cyber-related financial crimes involving individuals and institutions. The University of Alabama will use a three-pronged strategy to help pursue investigations and prosecutions of cyber-related financial crimes: (1) media outreach to help develop leads for Swordphish Investigators; (2) create a clearinghouse for cyber victims to visit and discuss their victimization; and (3) provide technical support services to investigators as they pursue leads, as well as carry out a security assessment of possible vulnerabilities that may exist in the networks of key state agencies.


Date Created: September 6, 2010