Dedication
Toallcybercrimeinvestigators,past,present,andfuture,whose diligentandprofessionalworkkeepsussafe.
J.B.andA.M.
Tomywife,children,andparents. J.B.
Tomywonderfulfamily. A.M.
Chapter1 Introduction:TheNeedforGoodCybercrimeInvestigators................................3
1.1WhyThisBook............................................................................................3
1.2WhoInvestigatesCybercrime?.....................................................................5
1.3HowThisBookIsOrganized......................................................................6
1.4KeepingItFun:Anecdotes,Cases,Diagrams,andCartoons.......................7 1.5OnwardandUpward...................................................................................8
Chapter2 WhatIsCybercrimeandWhyIsItCommitted?..................................................9
2.1Introduction................................................................................................9
2.2WhatMakesa “Cyber” ActivityaCrime?AQuickIntroductiontoCybercrimeOffenses..............................................................................................9
2.2.1ComputerandNetworkIntrusions..............................................10
2.2.2DataBreaches,TheftofData,andDataTrafficking....................11
2.2.3TransmissionandUseofMalware...............................................11
2.2.4TamperingwithorDamagingaNetworkorSystem....................11
2.2.5IdentityTheftandImpersonation................................................12
2.2.6TheftofFundsandFraudSchemes.............................................12
2.2.7BlackmailandExtortion..............................................................13
2.2.8MoneyLaundering......................................................................13
2.2.9Harassment,Threats,Stalking,andRevengePorn.......................14
2.2.10Possessing,Selling,orSharingChildPornography......................15
2.2.11TraffickingofPhysicalContraband..............................................15
2.2.12Gambling.....................................................................................15
2.3Cybercrimevs.TraditionalStreetCrime:TheDifferences.........................15
2.3.1Technology,InternetandNetworks...............................................16
2.3.2Distance:TheNationalandInternationalNexus..........................16
2.3.3InvestigationRateandSolveRate.................................................17
2.3.4ConnectiontoaBroadCriminalEcosystem..................................17
2.4MotivesandActors...................................................................................18
2.4.1ProfitandGreed............................................................................18
2.4.2PersonalAttack.............................................................................18
2.4.3ThrillandBraggingRights............................................................18
2.4.4Activism.........................................................................................19
2.4.5CorporateEspionage.....................................................................19 2.4.6Nation-StateObjectives.................................................................19 2.4.7Terrorism.......................................................................................20
2.5TheCybercrime-For-ProfitEconomy........................................................20
2.5.1TheConnectionbetweenIdentityTheftandCybercrime...............21
2.5.2TheCybercrimeEconomyEarnsMoneyandRequiresPayments
2.6DigitalEvidence:TheBackboneofAnyCyberInvestigation (andTraditionalInvestigations,Too).........................................................23
3.3.1Case.............................................................................................29
3.3.2PowerSource...............................................................................30
3.3.3Processors(CPUs)........................................................................30
3.3.4Memory(VolatileStorage
3.3.5PersistentStorage(HDD/SSD)....................................................31
3.3.6CommunicatingwiththeUser:InterfacesforInput andOutput...................................................................................31
3.3.7CommunicatingwithOtherComputers(NIC).............................32
3.5.1.1NICandMACAddresses...............................................35
3.5.1.2Cables,Wireless,andNetworkSwitches.........................36
3.5.1.3Modem...........................................................................36
3.5.1.4Router.............................................................................36
3.5.2NetworkingCommunicationandInternetProtocol(IP)
3.5.3TCPversusUDP...........................................................................39
3.6Proxies,VPNs,andTor..............................................................................41 3.7Encryption.................................................................................................43
3.7.1EncryptioninTransit.....................................................................43
3.7.2EncryptionatRest.........................................................................43
3.8DigitalForensicsandEvidenceGathering.................................................44
3.8.1EnsuringIntegrityofStoredData:Hashing..................................45
3.8.2StoredData(PersistentStorage)inDevices:Forensically
3.8.3VolatileMemory:ConductingMemoryForensics.........................48
3.8.4WebsiteEvidence:ViewingandPreserving....................................48 3.8.5EmailsandEmailHeaders.............................................................48
4.2.1CIA:TheThreeInformationSecurityObjectives...........................51
4.2.2ControlstoProtectInformationSystems.......................................52
4.2.3AuthenticationtoGuardAccess...................................................52
4.2.4PrincipleofLeastPrivilege............................................................54
5.2.2TheCriminalJusticeProcess..........................................................66
5.2.3CriminalJusticeProtections...........................................................68
5.2.4HowInvestigationsandProsecutionsareStarted..........................69 5.2.5CategoriesofCriminalCharges.....................................................70
5.2.6ChargingtheDefendantandJudicialReview:Complaints,Indictments,GrandJury,PreliminaryHearings......................................71
5.2.7TheInvestigativeRoleoftheGrandJury.......................................72
5.3WhoInvestigatesandProsecutesCrimes?................................................72
5.3.1State/LocalEnforcementandFederalEnforcement.......................72
5.3.2JurisdictionandVenue...................................................................73
5.3.3Resources,Expertise,andCollaboration........................................74
5.4WhatConstitutesaCrimeandItsElements............................................74
5.4.1ActorOmission(actusreus)..........................................................75
5.4.2CulpableMentalStates(mensrea).................................................75
5.4.3AnticipatoryOffenses(SuchasAttemptandConspiracy).............76
5.5Defenses(SuchasSelf-defenseandEntrapment).....................................77
5.6TheFourthAmendment:ConstitutionalRulesforSearchandSeizure....77
5.6.1ExpectationofPrivacy...................................................................78
5.6.2Consent..........................................................................................79
5.6.3TheSearchWarrantRequirement..................................................80
5.6.4ExceptionstotheSearchWarrantRequirement............................80
5.6.5WorkplaceSearchesandMonitoring.............................................81
5.6.6PrivateSearchesversusPublicSearches.........................................81
5.7TheExclusionaryRule:ProtectionsandConsequences forImproperInvestigativeAction............................................................82
5.7.1PhysicalEvidence...........................................................................82
5.7.2OtherFormsofEvidence:UnlawfulArrests,Statements,andWitnessIdentifications.........................................................................82
5.7.3FruitofthePoisonousTreeDoctrine.............................................83
5.8CivilLawandProcedure..........................................................................84
5.8.1TheCivilLitigationProcess...........................................................84
5.8.2CausesofAction............................................................................85
5.8.2.1IntentionalTorts.............................................................85
5.8.2.2NegligenceTorts.............................................................86
5.8.2.3BreachofContract..........................................................87
5.8.2.4Cybercrime-SpecificCausesofAction............................87
6.3.1TheComputerFraudandAbuseAct(CFAA)...............................91 6.3.2TheWiretapAct............................................................................92
6.3.3UnlawfulAccesstoStoredCommunications.................................94
6.3.4TheControllingtheAssaultofNon-SolicitedPornographyand MarketingAct(CAN-SPAMAct).................................................94
6.3.5CommunicationInterference.........................................................95
6.4StateCybercrimeLaw................................................................................95
6.5 “Traditional” FederalandStateLawsthatApplytoCybercrime..............96
6.5.1Theft/Larceny...............................................................................97
6.5.2Possession/ReceivingofStolenProperty......................................98
6.5.2.1Property:AChangingConceptintheCyberAge...........98
6.5.3IdentityTheft...............................................................................99
6.5.4Impersonation............................................................................100
6.5.5Credit/DebitCardFraud...........................................................101
6.5.6BankFraud................................................................................102
6.5.7WireFraud.................................................................................102
6.5.8Forgery.......................................................................................102
6.5.9MoneyLaundering....................................................................103
6.5.10Harassment,Stalking,andSextortion........................................105
6.5.10.1FirstAmendmentConsiderations................................105
6.5.11ChildExploitationandPornography.........................................106
6.5.12Vandalism..................................................................................106
6.5.13OrganizedCrime........................................................................107
6.5.14AttemptandConspiracy............................................................107
6.6Conclusion................................................................................................108
Chapter7 TheLawEnforcementLegalToolkitforInvestigatingCybercrime: LawsforGatheringCriminalCyberEvidence..................................................110
7.1Introduction.............................................................................................110
7.2PrivacyandConsent:ApplyingThesePrinciplestoCommunications......111
7.2.1CommunicationsandPrivacy......................................................111
7.2.2CommunicationsandConsent.....................................................112
7.2.3ReasonableExpectationofPrivacyintheWorkplace..................113
7.3TheNineToolsforGatheringEvidence...................................................113
7.3.1Open-SourceInvestigation...........................................................114
7.3.2ObtainingConsent.......................................................................114
7.3.3SubpoenaDucesTecum...............................................................114
7.3.4Section2703(d)Order..................................................................115
7.3.5SearchWarrant............................................................................116
7.3.6PenRegisterandTrap-and-TraceDevice.....................................117
7.3.7Wiretap........................................................................................118
7.3.8LetterofPreservation..................................................................118
7.3.9Non-DisclosureRequestandOrder.............................................119
7.4TheElectronicCommunicationsPrivacyAct(ECPA):Applying theToolstoOnlineCommunications.......................................................119
7.4.1TheStoredCommunicationsAct:RecordsofPast Communications..........................................................................120
7.4.1.1TheRoleofThird-PartyProviders.................................121
7.4.1.2ServicesCoveredbytheSCA(ECSandRCS)...............121
7.4.1.3 “Content” vs. “Non-Content” Information...................123
7.4.1.4SubscriberandSessionInformation...............................123
7.4.1.5SensitiveNon-ContentInformation...............................123
7.4.1.6LocationInformation....................................................124
7.4.1.7ContentInformation......................................................124
7.4.1.8SCARulesforLettersofPreservation, Non-Disclosure,andDelayedDisclosureOrders............126
7.4.2ThePen/TrapStatute:LiveMonitoringofNon-Content Information.................................................................................127
7.4.3TheWiretapAct:LiveMonitoringofContentInformation........127
7.5ObtainingEvidenceLocatedinAnotherState..........................................128
7.5.1FederalInvestigations..................................................................129
7.5.2StateandLocalInvestigations.....................................................129
7.5.3SearchWarrantConsiderationsforOut-of-State DevicesandPhysicalPremises.....................................................130
7.6ObtainingEvidenceStoredOverseasbyU.S.Entities: TheCLOUDAct......................................................................................131
7.7ObtainingEvidenceLocatedinAnotherCountry....................................132
7.7.1PresenceofEvidenceorItsCustodianCorporation intheUnitedStates......................................................................133
7.7.2MutualLegalAssistanceTreaties(MLATs).................................133
7.7.3LettersRogatory..........................................................................133
7.7.4InformalAssistance.....................................................................134
7.7.5EgmontRequest..........................................................................134
7.7.6SuspectsLocatedinOtherStatesandForeignCountries (Preview)......................................................................................134
8.2LawsandMeasuresRelatingtoNation-StateandTerroristActivity........137
8.2.1CriminalLaws..............................................................................138
8.2.2CivilLawsandtheForeignSovereignImmunitiesAct(FSIA)....138
8.2.3InternationalTreaties,Agreements,andJudicialProcesses..........139
8.2.4LawsandPrinciplesofSovereigntyandWagingWar..................140
8.2.5Terrorism-RelatedMeasures........................................................141
8.2.6Espionage,ClandestineandCovertOperations, andPropaganda...........................................................................142
8.3TheMotivesandActionsofNation-States...............................................143
8.3.1GeneratingFunds........................................................................143
8.3.2Nation-StateCommercialEspionage...........................................145
8.3.3AttacksonInfrastructure............................................................146
8.3.4AttackstoAdvanceStrategicInterests........................................147
8.4TerroristFunding,Recruiting,Vandalism,andAttacks...........................150
8.4.1TerroristFunding.........................................................................150
8.4.2Recruitment.................................................................................151
8.4.3CyberVandalismandHacktivism................................................151
8.4.4IncitingLocalAttacks.................................................................151
8.5WhattoDoiftheInvestigationLeadstoaNation-StateorTerrorist.......152
8.6Conclusion................................................................................................152
9.1Introduction............................................................................................153
9.2Attorney
9.3CivilLawsuitsagainstCybercriminals:ActionsforIntentionalTorts.....154
9.4 “HackingBack”:IntentionalActsbyCybercrimeVictimsthatCould IncurLiability.........................................................................................155
9.5CybercrimeStatutoryCausesofAction..................................................156
9.6NegligentCyberTorts:TheReasonablePersonandtheStandardof
9.6.1NegligencethatDirectlyCausestheHarm..................................157
9.6.2NegligencethatAllowstheCommissionofaCrimebyaThird
9.6.2.1TheftofAutomobile......................................................159
9.6.2.2PremisesLiability...........................................................159
9.6.2.3CybercrimeLiability......................................................159
9.8.1FederalandStateLaws................................................................162
9.8.2TemporaryRestrainingOrders(TROs)........................................163
9.8.3BurdenofProof...........................................................................163
9.9.4.1FTCandStateAttorneysGeneral.................................167
9.9.4.2GDPR............................................................................167
9.9.4.3CaliforniaConsumerPrivacyAct..................................168
9.9.4.4ColoradoProtectionsforConsumerDataPrivacyAct
9.10CivilLawsandRegulationsforSpeci
9.10.1.1GLBA:Gramm-Leach-BlileyAct................................169
9.10.1.2FFIECandSECRequirements....................................169
9.10.1.3NewYorkInformationSecurityRequirementsforthe
9.10.2HealthSectorRegulations:HIPAAandHITECH.....................170
Chapter10 EmbarkingonaCybercrimeInvestigation:TheThreePerspectivesandKey AreasofFocus.................................................................................................173
10.1Introduction............................................................................................173
10.2CybercrimeInvestigationfromThreePerspectives:PrivateSector,Law Enforcement,andRegulatory.................................................................173 10.2.1PrivateSector.............................................................................174
10.2.2LawEnforcement.......................................................................175
Chapter11 GeneralInvestigationMethods:Organization,OpenSource,Records,and
11.7RecordsEvidence..................................................................................191
11.8.1ReadingEmailHeaders..............................................................196
11.8.2AnalyzingLargeSetsofEmails..................................................197
12.2IncidentResponse(andPrevention)......................................................201
12.3DiscoveryofCybercrimeIncidentsbyPrivateParties...........................202
12.3.1IsThisaCrimethePrivateEntityCanand ShouldInvestigate?....................................................................203
12.4DeterminingInvestigationGoalsandScope.........................................205
12.5ActivatingNecessaryPersonnel:In-HouseandExternal......................207
12.5.1ExternalServicestoConsider....................................................208
12.6ReportingandNotificationstoLawEnforcement,Regulatory Agencies,andOtherParties..................................................................209
12.6.1ReportingtoLawEnforcement..................................................209
12.6.2ReportingtoRegulatorsandAgenciesEnforcing SimilarLaws..............................................................................211
12.7IdentifyingPotentialWitnessesandEvidence:InternalandExternal...212
12.8CollectingEvidenceAvailableInternally...............................................212
12.8.1InterviewingInternalPersonnel.................................................213
12.8.2InternalRecordsandData.........................................................213
12.8.3ForensicsonInternalDevicesandNetworks.............................214
12.9CollectingEvidencefromExternalSources..........................................215
12.9.1Open-SourceResearchRevisited................................................215
12.9.2RequestingDataandInformationfromThirdParties...............215
12.9.3CivilLegalProcesstoCompelExternalPartiestoProduce Evidence:JohnDoeLawsuitsandSubpoenas............................216
12.9.4RespectingtheRightsofThirdParties.......................................218
13.4IsThisaCrimethatLawEnforcementCanandShouldInvestigate?....222
13.4.1NatureandExtentoftheHarm.................................................222
13.4.2NatureofInitiallyAvailableEvidence........................................222
13.4.3JurisdictionalAnalysis...............................................................223
13.4.4ResourcesandPersonnelNeeded...............................................223
13.4.5LikelihoodofApprehendingSuspects........................................223 13.4.6RelatedCivilImplications..........................................................224
13.4.7ImpactonSocietyandDeterrence.............................................224
13.4.8AdvisingtheVictim....................................................................224
13.5OpeningaCase.....................................................................................225
13.6AssessmentofInitialEvidence:WhatDoWeHave,What DoWeNeed?........................................................................................226
13.7GettingReadytoInvestigate:ARecapoftheTools..............................226 13.7.1Open-SourceInvestigation.........................................................227
13.7.2Consent......................................................................................227
13.7.3LetterofPreservation(IfAdditionalProcessIsContemplated) .....228
13.7.4Non-DisclosureOrderandRequest...........................................228
13.7.5Subpoena...................................................................................228
13.7.62703(d)Order.............................................................................229
13.7.7SearchWarrant..........................................................................230
13.7.8PenRegisterandTrap/TraceDevice(Includingwith LocationData)...........................................................................230 13.7.9Wiretap......................................................................................231
13.8SIMPLE:TheSix-StepInitialMini-PlanforLawEnforcement............232
13.9TheRecordsPhase:DiggingforCluesandConnections......................233
13.10TheDataSearchPhase:ZeroinginonInternetAccountsand theCriminalsUsingThem....................................................................235
13.11ThePhysicalWorldPhase:SearchingSpacesandDevices....................237
15.6.1WheretoFindEvidenceofFinancialActivity...........................261
15.6.2InvestigatingVirtualCurrencyTransactions:SpecificToolsand Resources...................................................................................262
15.6.3CryptocurrencyTransactionRecords.........................................263
15.7Conclusion..............................................................................................264
Chapter16 IdentificationoftheSuspect:AttributingCyberConducttoaPerson.............265
16.1Introduction............................................................................................265
16.2DoingIllicitBusinessOnline:CyberNicknamesandPseudonyms.........265
16.3TheAttributionProcessandDevelopingaSuspect:MappingCriminal ConducttoCyberPedigreeandPhysicalPedigreeInformation..............266
16.3.1TwoKindsofPedigreeInformation:PhysicalandCyber...........267
16.3.2TheID-PLUSAttributionProcess:SixStepstoLinkCriminal ConducttoCyberPedigreeandPhysicalPedigree.....................268
16.3.3Example:UsingID-PLUStoBuildanIdentification.................275
16.3.4Example:ASampleAttributionSummary(Workingfromthe CrimetoaSuspect)....................................................................277
16.3.5TheAttributionProcessfromAnotherLens:TypesofEvidence thatCanIdentifyCybercriminals...............................................279
16.4WritingandArticulationRevisited:ClearandEffectiveCyber Identification...........................................................................................281
16.5ExaminingIssuesofProof......................................................................282
16.6Apprehension:ConfirmingPedigreethroughStatementsandForensics.282
16.7Conclusion..............................................................................................284
17.2ChargingDecisions.................................................................................285
17.2.1MethodsforChargingaSuspect................................................286
17.2.2 “Sealing” ChargesversusPublicizingThem...............................287
17.3InterstateProceduresforArrestingandExtraditingDefendants............287
17.4InternationalProceduresforArrestingandExtraditingDefendants.......289
17.5ArrestStrategiesandtheHuntforEvidence...........................................290
17.6ASuccessfulArrestDoesNotMean “CaseClosed” ...............................291
18.1Introduction...........................................................................................295
18.2GoalsoftheLitigation...........................................................................295
18.3LitigationBegins:FilingofanAccusatoryInstrument...........................296
18.4TheDefendantEnterstheLitigation:Apprehension,Extradition,and Arraignment...........................................................................................297
18.5GuiltyPleas:PleaPositionandNegotiation...........................................298
18.6Discovery:SharingtheInvestigationwiththeDefense...........................299
18.7MotionPractice,Hearings,andPre-TrialDecisions:Testingthe
18.8Trial:TheInvestigationLaidBare..........................................................302
18.8.1PickingaJury............................................................................303
18.8.5TheDefense:Cross-ExaminationandCounterattackingwith
19.2.2CivilActionagainstCybercriminalforIntentionalTort............316
19.2.3CivilActionagainstCybercriminalunderaCybercrimeStatutory
19.2.4CivilActionagainstAnotherVictimforNegligent
19.2.7CivilActionbyCriminalProsecutortoFreezeandSeizeAssets318
19.3.1GovernmentAgencies................................................................319
19.3.2PrivateLitigants.........................................................................319
1 Introduction TheNeedforGood CybercrimeInvestigators
Thischapter(andbook)isfor:
• You
• Lawenforcementofalltypes:police,investigators,agents,prosecutors,analysts
• Thoseintheprivatesectorinvestigatingordealingwithcybercrime
• Regulators
• Thetechnicallyskilledandthosewhoarenot
• Beginningcyberinvestigators,intermediate,andevenexperiencedlookingfor acomprehensiveview
• Lawyersandnon-lawyers.
Atthestartofeachchapter,wewillidentifythetypeofcybercrimeinvestigatorfor whomthatchapterisprimarilyintended.Cybercrimeinvestigatorsdonotjusthavethe titleof “investigator”.Theycomefrommanyjobsandbackgrounds – lawyersandnonlawyers;technicalexpertsandtechnicalbeginners;experiencedtraditionalinvestigators whoarelearningaboutcybercrime,andinvestigatorswhoseonlyexperienceiswith cybercrime;lawenforcementagents,industryregulators,andmembersoftheprivate sector;andstudentsandtraineesjuststartingout.Giventhisdiversityofbackgrounds, werecognizethatsomereadersmightreadthebookstraightthrough,andsomemight skipchaptersbecausetheyareworkingonatime-sensitivematter,orbecauseexisting skillsetsmakecertainchapterslesscritical.Thatsaid,wethinkyouwillgetsomething outofeverychapter.
1.1WHYTHISBOOK
Letusstartwiththreefundamentaltruthsaboutinvestigatingcybercrime:
1. Weallcaninvestigatecybercrime.Cybercriminalsarerunningamokonlinepartly becauseofthemisconceptionthatonlyspecializedinvestigatorswithvasttechnologicalresourcescanworkthesecases.Techskillsandgadgetsaregreattohave, buttheyare,bynomeans,arequirementforhandlingacyberinvestigation.
2. Cybercrimecanbesolved.Justbecauseitisacybercrime,doesn’tmeanitishardto solve.Cybercriminals – likeeverytypeofcriminal – runthegamut,fromlow-level scammerstohighlysophisticatedorganizations.Theyarenotalltech-wizards. Theyarenotallhardto find.
3. Eventhemostsophisticatedcybercriminalscanbecaught.
Bottomline:thecommonpreconceptionthatcybercrimeistoodifficulttoinvestigateis wrong.Everycasecanandshouldbeinvestigated.Everyinvestigatorcantakepositivesteps tosolveacase.Insteadoflookingatacyberincidentandassumingthereisnotmuchthat canbedone,wecanusethesecoretruthsaboutcybercrimetoframeaplanofaction.
Cybercrimeisarelativelynewphenomenon.Maliciousactorsnolongerneedtobein theimmediatevicinityoftheirvictims,butcanattackandstealremotely,evenfromabroad. ThereachoftheInternetmeanscybercrimeisasafetyandsecurityproblemforeverycommunity,industry,business,andlawenforcementagency – largeorsmall.
Investigatingcybercrimeisanevennewerendeavorthancybercrimeitself,andbecauseit involvestechnology,itcanseemdauntingtomanyinvestigatorsandvictims.Howdoyou startinvestigatingwhenoneoftheseincidentshappens?Howdoyou figureoutwhodidit whentheperpetratorishidingonline?Whatdoyoudowithacrimethatseemstolead acrossthecountry,letalonearoundtheworld?
Whenwe firststartedworkingoncybercrimecasesasprosecutors,wehadthesame questions.Wedidnotcometothisworkfromatechbackground,andweoftenhadminimalresourcesavailable.Butthroughtime,effort,andcreativitywelearnedhowto findthe answers.Welearnedthatcybercrimecanbeinvestigated,offenderscanbefound,andcases canbesuccessfullyprosecuted.
Wewrotethisbooktosharethisknowledgewithyou,andtoinspiremorepeopleto becomecybercrimeinvestigators – especiallythosewhomightthinkcybercrimeistoochallengingtotakeon.
Weunderstandthat,insomeplaces,lawenforcementandprivatesecuritylackexperience,training,andresourceswhenitcomestocybercrime.Thatisanotherreasonwewrote thisbook.Wewanttogiveanyinterestedinvestigatortheknowledgeandtoolstohandle thesecases.Ascybercrimecontinuestogrow,weneedmoreinvestigatorsonthefrontlines ready,willingandabletotakeiton.Thereareconcretestepsthateveryinvestigatorcan taketotacklecybercrime.Thisbookisdesignedtomakethesestepsunderstandableand doableforinvestigatorseverywhere.
Whyisitsoimportanttobolstertheinvestigativeresponsetocybercrime?Let’slookat someofthemajorrepercussionsofcybercrimeintoday’sworld.
• ProfitandLosses.Cybercrimeisimmenselyprofitableforcybercriminals,but immenselycostlytotherestofus.Eachyear,U.S.businessesandconsumerslose billionsofdollarsthroughcybercrimewhilethecriminalandprivateinvestigation oftheseeventsremainscompletelyinadequate.Itisastonishingtoconsiderthatbillionsofdollarscanbestolenannuallywithoutproperinvestigationorredress.
• TerrorismandEspionage.Theprofitableanddisruptivenatureofcybercrimemeans itisanactivityofinterestforterroristsandnation-statesseekingincome,intelligence,orsimplyanewwaytoinflictharm.TheInternetprovidesagatewayand anetworkforallmannerofnefariousactivityatthelocal,national,andinternationallevels.Ourwilltoinvestigatethisactivitymustmeasureuptothethreatit presents.
• NewWaystoMoveMoney.Cybercriminalshavedevelopedinnovativemoneylaunderingtechniquestopayeachotheranddisguisetheirillicitincome.Virtualcurrenciesandcryptocurrencies,internationalwiretransferschemes,moneyheldand
movedinstored-valuecards(likegiftcards),criminalproceedsfunneledthrough multiplayervideogames – thesearesomeofthemethodscybercriminalsuse,along withmoretraditionalmoneylaunderingmechanisms.Onceprovensuccessful,these techniquesareadoptednotjustbycyberthieves,butbyothercriminalslookingto conductillicittransactions,suchaschildpornographers,narcoticsdealers,and terrorists.
• Stalking,Revenge,andHarassment.Stealingisnottheonlyformofcybercrime –theInternetisusedtocommitawidevarietyofcrimesmeanttoharass,stalk, menace,orotherwisetargetspecificindividuals.Theincreasinglysophisticated methodsusedtoconductthesecrimesarecapableofinflictingtremendous,ongoing harmtovictims.Thescenariosrangefromteensextingtocyber-revengeactsdirectedatemployers,intimatepartners,andpolitical figures – andoftenrequire aresponsefromacombinationoflawenforcementandprivatesectorinvestigators.
• CivilLiabilityandRegulation.Thescourgeofcybercrimehasanenormousimpact onbothourcivillawandregulatorysystems.Whencybercriminalsstealfundsor data,injuredvictimsmayusethecivillegalsystemtoseekredress,includingfor cybersecuritynegligence.Governmentregulatorscreateandenforcerulesthatdeal withtherealthreatsthatcybercrimepresentstosensitivedataandonline commerce.
Thisbookdiscussesallofthesetopics,andmanyotherpressingissuesaroundcybercrime, inamannerdesignedtohelpeverykindofinvestigator findusefulinformation.
1.2WHOINVESTIGATESCYBERCRIME?
Cybercrimecreatesmanytypesofvictims,anditsrippleeffectshaveledtoanintensefocus oncybersecurity,informationsecurity,andprivacy.Asaresult,cybercrimeisinvestigated foravarietyofreasons.Toprovideinformationinthemosteffectivewaythroughoutthis book,weconsideredtheneedsandconcernsofinvestigatorsrepresentingthesethree importantgroups:
• LawEnforcement
Lawenforcement,includingpolice,federallawenforcement,andprosecutors,receivethousandsofcybercrimereportseveryyearfromindividualandcorporatevictims.Whenstate andlocalpoliceinvestigatecybercrimes,alongwithprosecutors,itisusuallybecausethey getthe firstcallswhenlocalresidentsarevictimized.Traditionally,morecomplexcasesare tackledbyfederallawenforcementagencies(suchastheFBI,U.S.SecretService,and DepartmentofHomelandSecurity)andfederalprosecutors.Theseagenciesusemonetary thresholdsandothercriteriatotakeonaselectnumberofinvestigations.SomestateAttorneyGeneral’ sofficesalsohandle “bigger” cybercrimecases.AfewlocalDistrictAttorneys’ (DA)officeshandlesignificantcybercrimecases,aswedidwhileworkingattheManhattan DA’ soffice.Butthetruthis,thevastmajorityofcybercrimesgouninvestigated.
Oneofthisbook’sgoalsistochangethewayinvestigatorslookatcybercases.Historically,investigatorshavecategorizedcasestooquicklyasbeing “local” or “small”,onlyrealizing,aftersomeinvestigation,thattheyarereallyonepieceofalargerscheme.Nowadays, allpoliceagencies,whetheranenormousdepartmentliketheNewYorkCityPoliceDepartment,orasmall-townforcewithfewerthan20swornofficers,willbecalledupontotake acybercrimecomplaintandconductaninitialinvestigation – actionsthatmayleadto uncoveringlarger,additionalcrimes.Sincetheseinvestigationsnormallyrequireprosecutorialassistance,itisessentialthatprosecutorsinlocalDAs’ officesalsoknowhowto