Muutke küpsiste eelistusi

Cybercrime Investigations: A Comprehensive Resource for Everyone [Pehme köide]

  • Formaat: Paperback / softback, 360 pages, kõrgus x laius: 254x178 mm, kaal: 630 g, 62 Illustrations, black and white
  • Ilmumisaeg: 29-Aug-2022
  • Kirjastus: CRC Press
  • ISBN-10: 1032399988
  • ISBN-13: 9781032399980
Teised raamatud teemal:
  • Formaat: Paperback / softback, 360 pages, kõrgus x laius: 254x178 mm, kaal: 630 g, 62 Illustrations, black and white
  • Ilmumisaeg: 29-Aug-2022
  • Kirjastus: CRC Press
  • ISBN-10: 1032399988
  • ISBN-13: 9781032399980
Teised raamatud teemal:

This book is a comprehensive resource for everyone who encounters and investigates cybercrime, no matter their title, including those working on behalf of law enforcement, private organizations, regulatory agencies, or individual victims. 



Cybercrime continues to skyrocket but we are not combatting it effectively yet. We need more cybercrime investigators from all backgrounds and working in every sector to conduct effective investigations. This book is a comprehensive resource for everyone who encounters and investigates cybercrime, no matter their title, including those working on behalf of law enforcement, private organizations, regulatory agencies, or individual victims. It provides helpful background material about cybercrime's technological and legal underpinnings, plus in-depth detail about the legal and practical aspects of conducting cybercrime investigations.

 

Key features of this book include:

  • Understanding cybercrime, computers, forensics, and cybersecurity
  • Law for the cybercrime investigator, including cybercrime offenses; cyber evidence-gathering; criminal, private and regulatory law, and nation-state implications
  • Cybercrime investigation from three key perspectives: law enforcement, private sector, and regulatory
  • Financial investigation
  • Identification (attribution) of cyber-conduct
  • Apprehension
  • Litigation in the criminal and civil arenas.

This far-reaching book is an essential reference for prosecutors and law enforcement officers, agents and analysts; as well as for private sector lawyers, consultants, information security professionals, digital forensic examiners, and more. It also functions as an excellent course book for educators and trainers. We need more investigators who know how to fight cybercrime, and this book was written to achieve that goal.

Authored by two former cybercrime prosecutors with a diverse array of expertise in criminal justice and the private sector, this book is informative, practical, and readable, with innovative methods and fascinating anecdotes throughout.

About the Authors xxi
Acknowledgments xxiii
PART I Understanding Cybercrime, Computers and Cybersecurity
1(62)
Chapter 1 Introduction: The Need for Good Cybercrime Investigators
3(6)
1.1 Why This Book
3(2)
1.2 Who Investigates Cybercrime?
5(1)
1.3 How This Book Is Organized
6(1)
1.4 Keeping It Fun: Anecdotes, Cases, Diagrams, and Cartoons
7(1)
1.5 On ward and Upward
8(1)
Chapter 2 What Is Cybercrime and Why Is It Committed?
9(17)
2.1 Introduction
9(1)
2.2 What Makes a "Cyber" Activity a Crime? A Quick Introduction to Cybercrime Offenses
9(6)
2.2.1 Computer and Network Intrusions
10(1)
2.2.2 Data Breaches, Theft of Data, and Data Trafficking
11(1)
2.2.3 Transmission and Use of Malware
11(1)
2.2.4 Tampering with or Damaging a Network or System
11(1)
2.2.5 Identity Theft and Impersonation
12(1)
2.2.6 Theft of Funds and Fraud Schemes
12(1)
2.2.7 Blackmail and Extortion
13(1)
2.2.8 Money Laundering
13(1)
2.2.9 Harassment, Threats, Stalking, and Revenge Porn
14(1)
2.2.10 Possessing, Selling, or Sharing Child Pornography
15(1)
2.2.11 Trafficking of Physical Contraband
15(1)
2.2.12 Gambling
15(1)
2.3 Cybercrime vs. Traditional Street Crime: The Differences
15(3)
2.3.1 Technology, Internet and Networks
16(1)
2.3.2 Distance: The National and International Nexus
16(1)
2.3.3 Investigation Rate and Solve Rate
17(1)
2.3.4 Connection to a Broad Criminal Ecosystem
17(1)
2.4 Motives and Actors
18(2)
2.4.1 Profit and Greed
18(1)
2.4.2 Personal Attack
18(1)
2.4.3 Thrill and Bragging Rights
18(1)
2.4.4 Activism
19(1)
2.4.5 Corporate Espionage
19(1)
2.4.6 Nation-State Objectives
19(1)
2.4.7 Terrorism
20(1)
2.5 The Cybercrime-For-Profit Economy
20(3)
2.5.1 The Connection between Identity Theft and Cybercrime
21(1)
2.5.2 The Cybercrime Economy Earns Money and Requires Payments
22(1)
2.6 Digital Evidence: The Backbone of Any Cyber Investigation (and Traditional Investigations, Too)
23(1)
2.7 Conclusion
24(2)
Chapter 3 Introduction to Computers, Networks, and Forensics
26(24)
3.1 Introduction
26(1)
3.2 How Computers Work
27(2)
3.3 Basic Hardware Parts of Computers
29(5)
3.3.1 Case
29(1)
3.3.2 Power Source
30(1)
3.3.3 Processors (CPUs)
30(1)
3.3.4 Memory (Volatile Storage - RAM)
31(1)
3.3.5 Persistent Storage (HDD/SSD)
31(1)
3.3.6 Communicating with the User: Interfaces for Input and Output
31(1)
3.3.7 Communicating with Other Computers (NIC)
32(1)
3.3.8 Physical Ports
32(1)
3.3.9 Putting the Parts Together
32(1)
3.3.10 External Storage, Servers and More
32(2)
3.4 Basic Computer Software Categories
34(1)
3.4.1 BIOS/UEFI
34(1)
3.4.2 Operating Systems
34(1)
3.4.3 Applications
35(1)
3.5 Basic Networking and Internet Usage
35(6)
3.5.1 Networking Hardware
35(1)
3.5.1.1 NIC and MAC Addresses
35(1)
3.5.1.2 Cables, Wireless, and Network Switches
36(1)
3.5.1.3 Modem
36(1)
3.5.1.4 Router
36(1)
3.5.2 Networking Communication and Internet Protocol (IP) Addresses
37(2)
3.5.3 TCP versus UDP
39(1)
3.5.4 Domain Name System (DNS)
39(1)
3.5.5 Website Hosting
40(1)
3.6 Proxies, VPNs, and Tor
41(2)
3.7 Encryption
43(1)
3.7.1 Encryption in Transit
43(1)
3.7.2 Encryption at Rest
43(1)
3.8 Digital Forensics and Evidence Gathering
44(5)
3.8.1 Ensuring Integrity of Stored Data: Hashing
45(1)
3.8.2 Stored Data (Persistent Storage) in Devices: Forensically Obtaining Evidence through Imaging and Analysis
46(1)
3.8.2.1 Preview/Triage
46(1)
3.8.2.2 Imaging
46(1)
3.8.2.3 Analysis
47(1)
3.8.3 Volatile Memory: Conducting Memory Forensics
48(1)
3.8.4 Website Evidence: Viewing and Preserving
48(1)
3.8.5 Emails and Email Headers
48(1)
3.8.6 Forensic Examination Tools
49(1)
3.9 Conclusion
49(1)
Chapter 4 Introduction to Information Security and Cybersecurity
50(13)
4.1 Introduction
50(1)
4.2 Basic Information Security and Cybersecurity Principles
50(6)
4.2.1 CIA: The Three Information Security Objectives
51(1)
4.2.2 Controls to Protect Information Systems
52(1)
4.2.3 Authentication to Guard Access
52(2)
4.2.4 Principle of Least Privilege
54(1)
4.2.5 Incident Response
55(1)
4.3 Information Security Frameworks
56(6)
4.3.1 The Four Pillars: Knowledge, Devices, Data, and Networks
57(1)
4.3.2 CIS Critical Security Controls
57(2)
4.3.3 NIST Cybersecurity Framework (CSF)
59(1)
4.3.4 NIST SP 800-53
59(1)
4.3.5 ISO/IEC 27000 Series
60(1)
4.3.6 AICPA SSAE 18
61(1)
4.3.7 Other Information Security Frameworks
61(1)
4.4 Conclusion
62(1)
PART II Law for the Cybercrime Investigator
63(110)
Chapter 5 Fundamental Principles of Criminal and Civil Law
65(25)
5.1 Introduction
65(1)
5.2 Criminal Law and Procedure
65(7)
5.2.1 The Participants
66(1)
5.2.2 The Criminal Justice Process
66(2)
5.2.3 Criminal Justice Protections
68(1)
5.2.4 How Investigations and Prosecutions are Started
69(1)
5.2.5 Categories of Criminal Charges
70(1)
5.2.6 Charging the Defendant and Judicial Review: Complaints, Indictments, Grand Jury, Preliminary Hearings
71(1)
5.2.7 The Investigative Role of the Grand Jury
72(1)
5.3 Who Investigates and Prosecutes Crimes?
72(2)
5.3.1 State/Local Enforcement and Federal Enforcement
72(1)
5.3.2 Jurisdiction and Venue
73(1)
5.3.3 Resources, Expertise, and Collaboration
74(1)
5.4 What Constitutes a Crime and Its Elements
74(3)
5.4.1 Act or Omission (actus reus)
75(1)
5.4.2 Culpable Mental States (mens red)
75(1)
5.4.3 Anticipatory Offenses (Such as Attempt and Conspiracy)
76(1)
5.5 Defenses (Such as Self-defense and Entrapment)
77(1)
5.6 The Fourth Amendment: Constitutional Rules for Search and Seizure
77(5)
5.6.1 Expectation of Privacy
78(1)
5.6.2 Consent
79(1)
5.6.3 The Search Warrant Requirement
80(1)
5.6.4 Exceptions to the Search Warrant Requirement
80(1)
5.6.5 Workplace Searches and Monitoring
81(1)
5.6.6 Private Searches versus Public Searches
81(1)
5.7 The Exclusionary Rule: Protections and Consequences for Improper Investigative Action
82(2)
5.7.1 Physical Evidence
82(1)
5.7.2 Other Forms of Evidence: Unlawful Arrests, Statements, and Witness Identifications
82(1)
5.7.3 Fruit of the Poisonous Tree Doctrine
83(1)
5.8 Civil Law and Procedure
84(4)
5.8.1 The Civil Litigation Process
84(1)
5.8.2 Causes of Action
85(1)
5.8.2.1 Intentional Torts
85(1)
5.8.2.2 Negligence Torts
86(1)
5.8.2.3 Breach of Contract
87(1)
5.8.2.4 Cybercrime-Specific Causes of Action
87(1)
5.8.2.5 Regulatory Actions
88(1)
5.9 Licensing and Regulatory Law
88(1)
5.10 Conclusion
89(1)
Chapter 6 Cybercrime Defined: The Criminal Statutes Outlawing Criminal Conduct Online
90(20)
6.1 Introduction
90(1)
6.2 Federal and State Law
90(1)
6.3 Federal Cybercrime Law
91(4)
6.3.1 The Computer Fraud and Abuse Act (CFAA)
91(1)
6.3.2 The Wiretap Act
92(2)
6.3.3 Unlawful Access to Stored Communications
94(1)
6.3.4 The Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM Act)
94(1)
6.3.5 Communication Interference
95(1)
6.4 State Cybercrime Law
95(1)
6.5 "Traditional" Federal and State Laws that Apply to Cybercrime
96(12)
6.5.1 Theft/Larceny
97(1)
6.5.2 Possession/Receiving of Stolen Property
98(1)
6.5.2.1 Property: A Changing Concept in the Cyber Age
98(1)
6.5.3 Identity Theft
99(1)
6.5.4 Impersonation
100(1)
6.5.5 Credit/Debit Card Fraud
101(1)
6.5.6 Bank Fraud
102(1)
6.5.7 Wire Fraud
102(1)
6.5.8 Forgery
102(1)
6.5.9 Money Laundering
103(2)
6.5.10 Harassment, Stalking, and Sextortion
105(1)
6.5.10.1 First Amendment Considerations
105(1)
6.5.11 Child Exploitation and Pornography
106(1)
6.5.12 Vandalism
106(1)
6.5.13 Organized Crime
107(1)
6.5.14 Attempt and Conspiracy
107(1)
6.6 Conclusion
108(2)
Chapter 7 The Law Enforcement Legal Toolkit for Investigating Cybercrime: Laws for Gathering Criminal Cyber Evidence
110(26)
7.1 Introduction
110(1)
7.2 Privacy and Consent: Applying These Principles to Communications
111(2)
7.2.1 Communications and Privacy
111(1)
7.2.2 Communications and Consent
112(1)
7.2.3 Reasonable Expectation of Privacy in the Workplace
113(1)
7.3 The Nine Tools for Gathering Evidence
113(1)
7.3.1 Open-Source Investigation
114(5)
7.3.2 Obtaining Consent
114(1)
7.3.3 Subpoena Duces Tecum
114(1)
7.3.4 Section 2703(d) Order
115(1)
7.3.5 Search Warrant
116(1)
7.3.6 Pen Register and Trap-and-Trace Device
117(1)
7.3.7 Wiretap
118(1)
7.3.8 Letter of Preservation
118(1)
7.3.9 Non-Disclosure Request and Order
119(1)
7.4 The Electronic Communications Privacy Act (ECRA): Applying the Tools to Online Communications
119(9)
7.4.1 The Stored Communications Act: Records of Past Communications
120(1)
7.4.1.1 The Role of Third-Party Providers
121(1)
7.4.1.2 Services Covered by the SCA (ECS and RCS)
121(2)
7.4.1.3 "Content" vs. "Non-Content" Information
123(1)
7.4.1.4 Subscriber and Session Information
123(1)
7.4.1.5 Sensitive Non-Content Information
123(1)
7.4.1.6 Location Information
124(1)
7.4.1.7 Content Information
124(2)
7.4.1.8 SCA Rules for Letters of Preservation, Non-Disclosure, and Delayed Disclosure Orders
126(1)
7.4.2 The Pen/Trap Statute: Live Monitoring of Non-Content Information
127(1)
7.4.3 The Wiretap Act: Live Monitoring of Content Information
127(1)
7.5 Obtaining Evidence Located in Another State
128(3)
7.5.1 Federal Investigations
129(1)
7.5.2 State and Local Investigations
129(1)
7.5.3 Search Warrant Considerations for Out-of-State Devices and Physical Premises
130(1)
7.6 Obtaining Evidence Stored Overseas by U.S. Entities: The CLOUD Act
131(1)
7.7 Obtaining Evidence Located in Another Country
132(3)
7.7.1 Presence of Evidence or Its Custodian Corporation in the United States
133(1)
7.7.2 Mutual Legal Assistance Treaties (MLATs)
133(1)
7.7.3 Letters Rogatory
133(1)
7.7.4 Informal Assistance
134(1)
7.7.5 Egmont Request
134(1)
7.7.6 Suspects Located in Other States and Foreign Countries (Preview)
134(1)
7.8 Conclusion
135(1)
Chapter 8 Cyber Investigations Linked to Nation-States or Terrorists
136(17)
8.1 Introduction
136(1)
8.2 Laws and Measures Relating to Nation-State and Terrorist Activity
137(6)
8.2.1 Criminal Laws
138(1)
8.2.2 Civil Laws and the Foreign Sovereign Immunities Act (FSIA)
138(1)
8.2.3 International Treaties, Agreements, and Judicial Processes
139(1)
8.2.4 Laws and Principles of Sovereignty and Waging War
140(1)
8.2.5 Terrorism-Related Measures
141(1)
8.2.6 Espionage, Clandestine and Covert Operations, and Propaganda
142(1)
8.3 The Motives and Actions of Nation-States
143(7)
8.3.1 Generating Funds
143(2)
8.3.2 Nation-State Commercial Espionage
145(1)
8.3.3 Attacks on Infrastructure
146(1)
8.3.4 Attacks to Advance Strategic Interests
147(3)
8.4 Terrorist Funding, Recruiting, Vandalism, and Attacks
150(2)
8.4.1 Terrorist Funding
150(1)
8.4.2 Recruitment
151(1)
8.4.3 Cyber Vandalism and Hacktivism
151(1)
8.4.4 Inciting Local Attacks
151(1)
8.5 What to Do if the Investigation Leads to a Nation-State or Terrorist
152(1)
8.6 Conclusion
152(1)
Chapter 9 Civil and Regulatory Implications of Cybercrime: Cyberlaw in the Civil and Regulatory Sectors
153(20)
9.1 Introduction
153(1)
9.2 Attorney-Client Privilege
153(1)
9.3 Civil Lawsuits against Cybercriminals: Actions for Intentional Torts
154(1)
9.4 "Hacking Back": Intentional Acts by Cybercrime Victims that Could Incur Liability
155(1)
9.5 Cybercrime Statutory Causes of Action
156(1)
9.6 Negligent Cyber Torts: The Reasonable Person and the Standard of Care
157(3)
9.6.1 Negligence that Directly Causes the Harm
157(1)
9.6.2 Negligence that Allows the Commission of a Crime by a Third Party
158(1)
9.6.2.1 Theft of Automobile
159(1)
9.6.2.2 Premises Liability
159(1)
9.6.2.3 Cybercrime Liability
159(1)
9.7 Actions under Contract Law
160(2)
9.7.1 Cyber Insurance Policies
162(1)
9.8 Civil Actions for Asset Forfeiture by the Government
162(2)
9.8.1 Federal and State Laws
162(1)
9.8.2 Temporary Restraining Orders (TROs)
163(1)
9.8.3 Burden of Proof
163(1)
9.9 General Civil Laws and Regulations Regarding Cybersecurity and Privacy
164(4)
9.9.1 Data Disposal Laws and Rules
165(1)
9.9.2 Information Security Laws
165(1)
9.9.3 Data Breach Notification Laws
166(1)
9.9.4 Privacy Laws and Who Enforces Them
166(1)
9.9.4.1 FTC and State Attorneys General
167(1)
9.9.4.2 GDPR
167(1)
9.9.4.3 California Consumer Privacy Act
168(1)
9.9.4.4 Colorado Protections for Consumer Data Privacy Act (PCDPA)
168(1)
9.10 Civil Laws and Regulations for Specific Sectors
168(2)
9.10.1 Financial Sector
169(1)
9.10.1.1 GLBA: Gramm-Leach-Bliley Act
169(1)
9.10.1.2 FFIEC and SEC Requirements
169(1)
9.10.1.3 New York Information Security Requirements for the Financial Sector
170(1)
9.10.2 Health Sector Regulations: HIPAA and HITECH
170(1)
9.11 Conclusion
170(3)
PART III The Cybercrime Investigation ill
Chapter 10 Embarking on a Cybercrime Investigation: The Three Perspectives and Key Areas of Focus
173(6)
10.1 Introduction
173(1)
10.2 Cybercrime Investigation from Three Perspectives: Private Sector, Law Enforcement, and Regulatory
173(3)
10.2.1 Private Sector
174(1)
10.2.2 Law Enforcement
175(1)
10.2.3 Regulatory
175(1)
10.3 Key Investigative Topics
176(1)
10.4 Ending the Investigation: Success or Exhaustion of Leads or Resources
176(2)
10.4.1 The End of Law Enforcement's Investigation
176(1)
10.4.2 The End of the Private Sector Investigation
177(1)
10.4.3 The End of the Regulatory Investigation
177(1)
10.5 Conclusion
178(1)
Chapter 11 General Investigation Methods: Organization, Open Source, Records, and Email
179(22)
11.1 Introduction
179(1)
11.2 Cybercrime Investigation: The Cyclical Process of Building Evidence
179(2)
11.3 Managing Cybercrime Evidence: Readily Available vs. Proprietary Investigation Tools
181(3)
11.3.1 Proprietary Tools
181(1)
11.3.2 Readily Available Tools
182(2)
11.4 Evidence Admissibility in Litigation
184(1)
11.5 Writing for Cybercrime Investigations
184(3)
11.5.1 The Dangers of Automatic Hyperlinking
185(2)
11.6 Open Source Investigation
187(4)
11.6.1 Open Source Investigation Resources
187(1)
11.6.2 Viewing and Preserving Open Source Clues
188(2)
11.6.3 Practical Tips to Maximize the Admissibility of Open Source Data
190(1)
11.7 Records Evidence
191(5)
11.7.1 The Workflow for Records Evidence
192(1)
11.7.2 Tracking Records Requests
193(1)
11.7.3 Organizing the Records
194(1)
11.7.4 Analyzing the Information in Records
194(1)
11.7.5 Admissibility of Records Evidence in Litigation
195(1)
11.8 Email Evidence
196(2)
11.8.1 Reading Email Headers
196(1)
11.8.2 Analyzing Large Sets of Emails
197(1)
11.9 The Importance of Cybercrime Intelligence
198(1)
11.10 Conclusion
199(2)
Chapter 12 Private Entity's Cybercrime Investigation
201(19)
12.1 Introduction
201(1)
12.2 Incident Response (and Prevention)
201(1)
12.3 Discovery of Cybercrime Incidents by Private Parties
202(3)
12.3.1 Is This a Crime the Private Entity Can and Should Investigate?
203(2)
12.4 Determining Investigation Goals and Scope
205(2)
12.5 Activating Necessary Personnel: In-House and External
207(2)
12.5.1 External Services to Consider A
208(1)
12.6 Reporting and Notifications to Law Enforcement, Regulatory Agencies, and Other Parties
209(3)
12.6.1 Reporting to Law Enforcement
209(2)
12.6.2 Reporting to Regulators and Agencies Enforcing Similar Laws
211(1)
12.7 Identifying Potential Witnesses and Evidence: Internal and External
212(1)
12.8 Collecting Evidence Available Internally
212(3)
12.8.1 Interviewing Internal Personnel
213(1)
12.8.2 Internal Records and Data
213(1)
12.8.3 Forensics on Internal Devices and Networks
214(1)
12.9 Collecting Evidence from External Sources
215(4)
12.9.1 Open-Source Research Revisited
215(1)
12.9.2 Requesting Data and Information from Third Parties
215(1)
12.9.3 Civil Legal Process to Compel External Parties to Produce Evidence: John Doe Lawsuits and Subpoenas
216(2)
12.9.4 Respecting the Rights of Third Parties
218(1)
12.10 Conclusion
219(1)
Chapter 13 Law Enforcement's Cybercrime Investigation
220(25)
13.1 Introduction
220(1)
13.2 How Cybercrime Comes to Law Enforcement's Attention
220(1)
13.3 Was There a Crime?
221(1)
13.4 Is This a Crime that Law Enforcement Can and Should Investigate?
222(3)
13.4.1 Nature and Extent of the Harm
222(1)
13.4.2 Nature of Initially Available Evidence
222(1)
13.4.3 Jurisdictional Analysis
223(1)
13.4.4 Resources and Personnel Needed
223(1)
13.4.5 Likelihood of Apprehending Suspects
223(1)
13.4.6 Related Civil Implications
224(1)
13.4.7 Impact on Society and Deterrence
224(1)
13.4.8 Advising the Victim
224(1)
13.5 Opening a Case
225(1)
13.6 Assessment of Initial Evidence: What Do We Have, What Do We Need?
226(1)
13.7 Getting Ready to Investigate: A Recap of the Tools
226(6)
13.7.1 Open-Source Investigation
227(1)
13.7.2 Consent
227(1)
13.7.3 Letter of Preservation (If Additional Process Is Contemplated)
228(1)
13.7.4 Non-Disclosure Order and Request
228(1)
13.7.5 Subpoena
228(1)
13.7.6 2703(d) Order
229(1)
13.7.7 Search Warrant
230(1)
13.7.8 Pen Register and Trap/Trace Device (Including with Location Data)
230(1)
13.7.9 Wiretap
231(1)
13.8 SIMPLE: The Six-Step Initial Mini-Plan for Law Enforcement
232(1)
13.9 The Records Phase: Digging for Clues and Connections
233(2)
13.10 The Data Search Phase: Zeroing in on Internet Accounts and the Criminals Using Them
235(2)
13.11 The Physical World Phase: Searching Spaces and Devices
237(3)
13.12 The Wiretap Phase: Special Cases Using Live Monitoring of Targets' Communications
240(1)
13.13 Traditional Shoe Leather Techniques
241(1)
13.14 Writing for Law Enforcement Investigations
241(1)
13.15 Working with the Private Sector
242(1)
13.16 Cybercrime Intelligence and Law Enforcement Investigations
243(1)
13.17 Conclusion
243(2)
Chapter 14 The Regulator's Investigation
245(7)
14.1 Introduction
245(1)
14.2 Regulatory Recap: Regulated Industries and Regulatory-Type Laws
245(2)
14.3 A Cybercrime Occurs: Reviewing the Report of the Affected Business
247(1)
14.4 Investigating the Cybercrime: Sufficiency of Cybersecurity Measures and Accuracy of the Report
247(2)
14.5 Balancing the Roles of Compliance and Enforcement
249(1)
14.6 Confidentiality and Information Sharing
250(1)
14.7 Conclusion
251(1)
Chapter 15 Financial Investigation: Following the Cybercrime Money
252(13)
15.1 Introduction
252(1)
15.2 Money Laundering 101
252(3)
15.3 Traditional Currency and Value
255(1)
15.4 Virtual Currency and Cryptocurrency
255(4)
15.4.1 History of Virtual Currency and Its Evolving Terminology
256(3)
15.5 Getting Started on the Money Trail: How Financial Details Can Prove Crimes and the Criminal's Identity
259(1)
15.6 Finding and Following the Money
260(4)
15.6.1 Where to Find Evidence of Financial Activity
261(1)
15.6.2 Investigating Virtual Currency Transactions: Specific Tools and Resources
262(1)
15.6.3 Cryptocurrency Transaction Records
263(1)
15.7 Conclusion
264(1)
Chapter 16 Identification of the Suspect: Attributing Cyber Conduct to a Person
265(20)
16.1 Introduction
265(1)
16.2 Doing Illicit Business Online: Cyber Nicknames and Pseudonyms
265(1)
16.3 The Attribution Process and Developing a Suspect: Mapping Criminal Conduct to Cyber Pedigree and Physical Pedigree Information
266(15)
16.3.1 Two Kinds of Pedigree Information: Physical and Cyber
267(1)
16.3.2 The ID-PLUS Attribution Process: Six Steps to Link Criminal Conduct to Cyber Pedigree and Physical Pedigree
268(7)
16.3.3 Example: Using ID-PLUS to Build an Identification
275(2)
16.3.4 Example: A Sample Attribution Summary (Working from the Crime to a Suspect)
277(2)
16.3.5 The Attribution Process from Another Lens: Types of Evidence that Can Identify Cybercriminals
279(2)
16.4 Writing and Articulation Revisited: Clear and Effective Cyber Identification
281(1)
16.5 Examining Issues of Proof
282(1)
16.6 Apprehension: Confirming Pedigree through Statements and Forensics
282(2)
16.7 Conclusion
284(1)
Chapter 17 Apprehending the Suspect and the Investigation that Follows
285(8)
17.1 Introduction
285(1)
17.2 Charging Decisions
285(2)
17.2.1 Methods for Charging a Suspect
286(1)
17.2.2 "Sealing" Charges versus Publicizing Them
287(1)
17.3 Interstate Procedures for Arresting and Extraditing Defendants
287(2)
17.4 International Procedures for Arresting and Extraditing Defendants
289(1)
17.5 Arrest Strategies and the Hunt for Evidence
290(1)
17.6 A Successful Arrest Does Not Mean "Case Closed"
291(1)
17.7 Conclusion
292(1)
PART IV Litigation
293(33)
Chapter 18 Criminal Litigation
295(20)
18.1 Introduction
295(1)
18.2 Goals of the Litigation
295(1)
18.3 Litigation Begins: Filing of an Accusatory Instrument
296(1)
18.4 The Defendant Enters the Litigation: Apprehension, Extradition, and Arraignment
297(1)
18.5 Guilty Pleas: Plea Position and Negotiation
298(1)
18.6 Discovery: Sharing the Investigation with the Defense
299(2)
18.7 Motion Practice, Hearings, and Pre-Trial Decisions: Testing the Investigation and Prosecution
301(1)
18.8 Trial: The Investigation Laid Bare
302(12)
18.8.1 Picking a Jury
303(1)
18.8.2 Opening Statements
303(1)
18.8.3 Presenting the Evidence: Legal Admissibility and Jury Comprehension
304(1)
18.8.4 The "Baby Step Exhibit" Technique
305(1)
18.8.4.1 The "Baby Step" Technique and the Laptop Computer
305(3)
18.8.4.2 The "Baby Step" Technique and Financial Records
308(2)
18.8.5 The Defense: Cross-Examination and Counterattacking with Evidence
310(2)
18.8.6 Closing Arguments
312(1)
18.8.7 Jury Instructions
312(1)
18.8.8 Jury Deliberations and Verdict
313(1)
18.8.9 Sentencing
313(1)
18.9 Appeals and Post-Conviction Litigation
314(1)
18.10 Conclusion
314(1)
Chapter 19 Civil Litigation
315(9)
19.1 Introduction
315(1)
19.2 Potential Litigation Scenarios Following a Cybercrime Investigation
315(3)
19.2.1 Civil Action to Further the Investigation or Stop Cybercrime Activity
316(1)
19.2.2 Civil Action against Cybercriminal for Intentional Tort
316(1)
19.2.3 Civil Action against Cybercriminal under a Cybercrime Statutory Cause of Action
316(1)
19.2.4 Civil Action against Another Victim for Negligent Cybersecurity
317(1)
19.2.5 Civil Action for Breach of Contract
317(1)
19.2.6 Civil or Regulatory Action by Government for Inadequate Cybersecurity
318(1)
19.2.7 Civil Action by Criminal Prosecutor to Freeze and Seize Assets
318(1)
19.3 Goals and Expectations
318(1)
19.3.1 Government Agencies
319(1)
19.3.2 Private Litigants
319(1)
19.4 Experts
319(1)
19.5 Settlement Negotiations
320(1)
19.6 The Civil Lawsuit and the Role of the Investigation
320(2)
19.7 Arbitration
322(1)
19.8 Conclusion
323(1)
Chapter 20 Conclusion
324(2)
Index 326
John Bandler and Antonia Merzon served together as Assistant District Attorneys at the New York County District Attorneys Office (DANY), hired by the legendary Robert Morgenthau. They investigated and prosecuted a wide variety of criminal offenses, ranging from those that garnered headlines to the many that received little attention but were equally essential for the administration of justice and protection of the public. Antonia founded and led the Identity Theft Unit (since renamed the Cybercrime and Identity Theft Bureau), recruiting John as an early member. The units work quickly revealed the close connection between identify theft and cybercrime, and brought amazing cases, including the Western Express case, which you will read about.

John Bandler runs a law firm and a consulting practice that helps organizations and individuals with cybersecurity, cybercrime investigations, and anti-money laundering efforts among other areas. Before becoming a prosecutor, he served as a State Trooper in the New York State Police for eight years, assigned to one of the states busiest stations that provided full police services to the local community. While serving in the State Police he attended law school at night at Pace University School of Law, and upon graduating he went to work for Mr. Morgenthau. Since leaving government service he has represented a range of clients, from individuals to banks, on many issues ranging from cybersecurity, privacy, anti-fraud, and threats. John is admitted to the bars of New York, Connecticut, and Washington D.C., holds a number of certifications, and writes, lectures, and teaches on law, cybersecurity, cybercrime, and more.

Antonia Merzon provides legal and consulting expertise related to security, investigations and law enforcement, especially as they intersect with the worlds of law, technology, privacy, and fraud. She graduated from Fordham University School of Law and then was hired by Mr. Morgenthau. During her time at DANY, she built the new Identity Theft Unit that investigated and prosecuted cybercrime and virtual currency money laundering before these areas were in the public awareness and developed the units digital forensic and investigative capacity. Cybercrime and traditional investigations are among her specialties, including developing best practices. She also is an expert on a diverse array of investigation and litigation best practices for law enforcement, including the use of body-worn cameras, eyewitness identification, and the electronic recording of custodial interrogations.