Data Attack of The Cybercrimial Investigating On The Digital Currencycybercrime

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

c o m p u t e r l a w & s e c u r i t y r e v i e w 2 8 ( 2 0 1 2 ) 2 0 1 e2 0 7

Available online at www.sciencedirect.com

www.compseconline.com/publications/prodclaw.htm

Data attack of the cybercriminal: Investigating the digital


currency of cybercrime

Paul Hunton
Hunton Woods Limited, UK

abstract

Keywords: It is increasingly argued that the primary motive of the cybercriminal and the major reason
Cybercrime for the continued growth in cyber attacks is financial gain. In addition to the direct financial
e-Crime impact of cybercrime, it can also be argued that the digital data and the information it
Internet Crime represents that can be communicated through the Internet, can have additional intrinsic
Hi-tech Crime value to the cybercriminal. In response to the perceived value and subsequent demand for
Cybercriminal illicit data, a sophisticated and self-sufficient underground digital economy has emerged.
Police The aim of this paper is to extend the author’s earlier research that first introduced the
Policing concept of the Cybercrime Execution Stack by examining in detail the underlying data
Law enforcement investigation objectives of the cybercriminal. Both technical and non-technical law enforcement
Digital investigation investigators need the ability to contextualise and structure the illicit activities of the
cybercriminal, in order to communicate this understanding amongst the wider law
enforcement community. By identifying the potential value of electronic data to the
cybercriminal, and discussing this data in the context of data collection, data supply and
distribution, and data use, demonstrates the relevance and advantages of utilising an
objective data perspective when investigating cybercrime.
ª 2012 Paul Hunton. Published by Elsevier Ltd. All rights reserved.

1. Introduction and background rights; money laundering; online grooming; cyber-bullying;


pornography and paedophilia. The concept of cyber security
As the Internet continues to grow and rapidly transform many extends this virtual threat even further when considering
aspects of modern life, the benefits and opportunities afforded such illicit activities as cyber terrorism and cyber warfare,
by a globalised digital society are arguably immense. industrial espionage and disinformation ranging from infor-
However, as networked communication technologies mation warfare to propaganda and political attack. It is now
continue to evolve and increasing reliance is placed on the argued that terrorists and extremists are utilising the content
extensive range of functions and services on offer, individ- rich interactivity of the Internet with the same level of tech-
uals, organisations and governments alike are increasingly nical sophistication as national governments (Qin et al., 2007).
exposed to the risks and threats of the cybercriminal. As Already highlighted by the author elsewhere (Hunton,
a consequence of this vast digital freedom, the Internet also 2009, 2010), are the many common issues and challenges
offers the motivated and organised cybercriminal new and faced by the global law enforcement community when
innovative opportunities to commit a vast range of repeatable investigating the complexity of cybercrime. These challenges
illicit activities against a global community with near include: under reporting of technology crime; potential for
anonymity (Bryant, 2008; Fletcher, 2007; Hoare, 2010). Daily mass and globally spread victims; the issue of jurisdiction;
examples of cyber related crimes are demonstrated by such evidence acquisition of distributed and volatile technology;
offences as: fraud; identity theft; theft of intellectual property evidence presentation; pace of changing technology; and the

0267-3649/$ e see front matter ª 2012 Paul Hunton. Published by Elsevier Ltd. All rights reserved.
doi:10.1016/j.clsr.2012.01.007
202 c o m p u t e r l a w & s e c u r i t y r e v i e w 2 8 ( 2 0 1 2 ) 2 0 1 e2 0 7

need for investigators to continually develop and maintain essential commodity, electronic data in addition to the
adequate technical skills and knowledge. The evolving state of immediate use and direct financial impact in crime can also be
technology is a major challenge for law enforcement, as the argued as having a wider intrinsic value to the cybercriminal.
dynamics of a specific technology environment become This additional value can be realised based on the opportu-
understood, that environment can again quickly change nities it represents to other criminals. Unlike a single physical
(Mitchell et al., 2010). Furthermore, the concept of cyber criminal activity that results in monetary gain, online crime
criminality is often clouded by the interchangeable, inaccu- has the potential to be repeated numerous times to commit
rate and even contradictory terms commonly used to describe such illicit activities as: online-banking transfers; credit card
the vast array of illicit activities and behaviours associated purchases or accessing secure networks. In response to the
with cybercrime and cyber security (Bryant, 2008; Sommer demand and subsequent value placed on illicit data,
and Brown, 2011; Wall, 2007). However, cybercrime is now a sophisticated and self-sufficient underground digital
considered a very real and serious global issue by many economy and marketplace has emerged (Cisco, 2010; DeBolt,
nations and a problem that has evolved to become a sophis- 2010; Europol, 2011; Symantec, 2009, 2010b). These digital
ticated transnational threat operating on an industrial scale criminal markets can be seen to facilitate the direct financial
(Cabinet Office, 2009; Commonwealth of Australia, 2010; gain from the: collection; sale; distribution and use of illicit
Cyberspace Policy Review, 2009; e-Crime Congress, 2009; data and the subsequent information it represents. Examples
Finklea, 2009; New Zealand Police, 2009). can include notorious sites and forums such as Darkweb,
Therefore, the aim of this paper is to extend the author’s Ghostmarket, Maza and Direct Connection that when exposed
earlier research that first introduced the concept of the where found to be conducting illicit trade with business like
Cybercrime Execution Stack (Hunton, 2009) by examining in scale, professionalism and coordination. The underground
detail the underlying data objectives of the cybercriminal trading of illicit data can include sensitive personal identity
when attempting to execute cyber attacks. By identifying the details, credit card and online account credentials through to
intrinsic value of electronic data to the cybercriminal and by intellectual property theft covering business data and even
discussing this data in the context of: data collection; data industrial espionage (Symantec, 2008, 2010a). Further exam-
supply and distribution; and data use, is aimed at demon- ples of the cybercriminals profiteering from the supply and
strating the advantages and relevance of utilising an objective demand for illicit data can also include digital copyright
data perspective when investigating cybercrime. The final infringement covering the distribution of eBooks, software
outcomes from this discussion are intended to provide addi- applications, music and videos through to the more depraved
tional insight into how the initial complexity of a cybercrime and sinister issue of paedophilia and pornography.
investigation can be broken down, the outcomes used to Knowledge and skills that can be used in an illicit context
directly assist understanding and knowledge sharing, and covering technical details such as system weaknesses, pre-
also influence and support further investigative enquires by defined attack scripts and purpose built crimeware toolkits
both technical and non-technical investigators. are also data driven and widely available at a cost within the
context of an underground illicit marketplace. In addition, to
support the conversion of digital currency into real-world
2. The digital currency of the cybercriminal profits, other services surrounding money laundering and
the use of ‘money mules’ are also increasingly available
It is increasingly argued that the primary pursuit of the (Cisco, 2010). Symantec (2009) estimate an average value for
cybercriminal and likewise, a major factor for the continued the potential opportunity for fraud, based on the many data-
growth in cybercrime is financial gain (Choo and Smith, 2008; centric goods and services offered for sale by cybercriminals
Commonwealth of Australia, 2010; Kapitanskaya, 2010; on the Internet, to be over £3.5 billion. Although many of these
Maple and Phillips, 2010; Symantec, 2009). The growing online criminal markets are concealed from public view,
problem, and the financial motivation behind cybercrime, can others are just discreetly placed amongst the numerous
be demonstrated when considering research in the Garlik legitimate Internet resources and can be found using
(2009) UK cybercrime report that suggests between 2007 and a conventional search engine or by following the discussions
2008 in the UK alone 40% (86,900) of all identity fraud was and links on social networking sites; online gaming and other
facilitated online. Again, during this period, online UK banking Internet community forums.
fraud increased from the previous year by 132%, totalling £52.5
million fraudulently obtained, and card fraud that took place
on the Internet accounted for a further £181.7 million in losses 3. Data attack of the cybercriminal
(Garlik, 2009). The UK government now suggest that the impact
of electronic crime on the economy is running into billions of A cybercriminal’s ability to use technology and exploit the
pounds annually (Cabinet Office, 2011), and that the wider Internet to directly access, manipulate and communicate
global impact is now calculated at $1 trillion per year (HM electronic data is a basic feature in the commission of cyber-
Government, 2010). From a UK law enforcement perspective, crime and other illicit or criminal behaviours. Internet related
cybercrime is considered to be one of the biggest threats to the technology can be used to commit crime either entirely within
country’s economic future well being (Orde, 2011). a technical environment, or to facilitate conventional crime by
Fundamental to all communication and interaction across using various elements of networked technology. Regardless
the Internet and other networked technology is electronic of the extent of networked technology used in the commission
data and the information it represents. Therefore, like any of cybercrime, the common technical activities of the
c o m p u t e r l a w & s e c u r i t y r e v i e w 2 8 ( 2 0 1 2 ) 2 0 1 e2 0 7 203

cybercriminal can be seen to converge on compromising the and Pittaro, 2009; Wall, 2007; Yar, 2006). However, the
legitimate use of electronic data held, communicated or complexity surrounding cybercrime investigation is further
exchanged by the networked technology that is the global hindered when considering the ability of the cybercriminal to
Internet. Exploitation of the Internet can range from low-level quickly evolve and react to the changing opportunities pre-
complex technical attacks through to user deception tech- sented by the Internet. An example of the evolving illicit
niques or as a means to facilitate discrete criminal interaction. activities of the cybercriminal can be demonstrated by the
A global study published in the Norton Cybercrime Report rapid growth in Smartphone sales and the resulting increase
(Norton, 2010) suggested that 65% of adults using the Internet in attacks towards such devices (Cisco, 2010). It is now
have fell victim to cybercrime, and over 50% had been sub- commonplace for cybercriminals to utilise a distributed
jected to a computer virus and malware attack. Marx (2007), approach in the commission of cybercrime when attempting
comments on the engineering of social control and the global to conceal their activities across a global landscape that can
impact caused by distributed technology, and suggests that by span several jurisdictions. Such distributed attacks can also
manipulating an individual based on their technical environ- include the use of multiple attack vectors and various aspects
ment can minimise the opportunity for alternative activity and of networked technology covering: infrastructure; access
result in an intended action being performed. Cybercriminals devices; and a range of other online resources.
are also becoming increasingly sophisticated in their attempts Already discussed in this paper is the fundamental
to make victims disclose personal data, utilising social engi- importance to the cybercriminal of electronic data and the
neering based deception attacks often linked to trusted digital information it represents. Also highlighted is the
Internet activities such as banking and social networking. potential value and opportunity for financial gain from such
Research by Symantec (2010a) found that during 2009 74% of all illicit data, and the key role this data plays in the growing
phishing attacks targeted the financial sector, whereas spam underground digital economy. From a law enforcement
emails were increasingly related to pharmaceuticals (Security perspective, the need to react and keep pace with the rapidly
Labs, 2010). The issue of cyber attack is also a major concern on changing threats of the cybercriminal is essential (ACPO,
a global scale for many organisations. Further research by 2009). A key feature of successful law enforcement investi-
Symantec (2010b) also found that 42% of the organisations gation is the effective and efficient knowledge sharing
studied perceived a cyber attack to be the most significant between all parties involved (Fahsing et al., 2008). Likewise, all
security risk. This risk is further highlighted when considering investigators need to learn from their experiences, with an
that nearly 90% of all inbound email to organisations repre- investigative focus capable of considering a range of potential
sents spam attacks (Security Labs, 2010). Government tech- hypotheses to include the broader implications of what
nology networks are also the direct target of cybercriminals offences have occurred, how were they committed and by
with UK government networks receiving more that twenty which suspects (Carson, 2009). This raises the further chal-
thousand malicious emails every month (Lobban, 2010). lenge for law enforcement surrounding the process of
Cybercrime has rapidly evolved from the idea of the lone knowledge management as cybercrime investigations like
teenager hacking into remote computer systems for personal physical investigations are information-rich and knowledge-
gain and kudos, to that of organised criminal networks mir- intensive and require the means of sharing, distributing,
roring structured business like models that would be more creating, capturing and understanding knowledge (Gottschalk
commonly associated with the activities of legitimate e- and Dean, 2010). Therefore, when considering the motivating
commerce. It is now suggested that the Internet not only factors specific to financial gain and the underlying relevance
provides organised criminals with the ability to commit crime of data driven attacks, it becomes vital for global law
online, but is also facilitating the wider access to other crim- enforcement to have the capability to rapidly gaining
inal markets and therefore, further enables other types of a detailed insight and common understanding of the illicit
organised crime to be committed (Johnson and Rt Hon, 2009). data attacks of the cybercriminal.
Cybercriminals are becoming increasingly more structured
and it is now suggested that 90% of all cyber attacks are as 4.1. Examining the attack of the cybercriminal
a direct result of organised crime (Norton, 2010). Regardless of
the exploitation tactics and attack vectors used, the Internet One such model aimed at providing law enforcement and
now provides motivated and organised cybercriminals with researchers alike with a framework for contextualising each
a global platform for electronic data attack by exposing the stage of the illicit activities surrounding a cyber attack, is the
means and opportunity to compromise, steal, change or Cybercrime Execution Stack shown in Fig. 1. The research first
totally destroy the information it holds (Cyberspace Policy introduced in Hunton (2009) and extended in Hunton (2011),
Review, 2009). highlights the relevance and benefit of modelling the logical
execution of cybercrime as a means of gaining a greater
understanding of a cyber attack.
4. The need for a data driven investigation The model in Fig. 1 provides a structured logical approach
perspective to identifying the wider technical and criminal characteristics
of cybercrime by following the progressive stages of an
The many challenges and difficulties of cybercrime investi- abstract cyber attack lifecycle. The Cybercrime Execution
gation are commonly highlighted throughout the literature Stack demonstrates the key entities of cybercrime based upon
(Brenner, 2007; Bryant, 2008; Gallagher, 2009; Hibbert and the data objectives of an attack, the exploitation tactics and
Robinson, 2009; McMurdie, 2010; Metcalfe, 2007; Schmalleger subsequent attack methods used, and finally the technical
204 c o m p u t e r l a w & s e c u r i t y r e v i e w 2 8 ( 2 0 1 2 ) 2 0 1 e2 0 7

Criminal or Illicit Intent intent of an attack. In turn, this will allow cybercrime inves-
tigators to consider the exploitation tactics and subsequent
attack methods used. As law enforcement response moves
towards low-level digital investigation, utilising a data objec-
Data
tive approach will also provide a logical structure to assist in
Objectives
examining, describing and communicating the various tech-
nical processes, methods and activities of the technology used
Exploitation
Tactics in the commission of an attack. Furthermore, by identifying
Globalised Evasion and the cybercriminals data attack strategies will also assist
Environment Concealment investigators to consider the potential scale and subsequent
Attack
Methods harm caused by an attack, and the likelihood of a repeat or
continuation of an attack.

Networked
Technology 4.2.1. Data collection
The value of electronic data and the information it represents
makes data collection a lucrative activity for the cybercrimi-
Fig. 1 e The Cybercrime Execution Stack.
nal. This illicit financial gain can be generated from both the
direct use of the data obtained, or based on the potential value
implementation of an attack. The model also considers the to others within an illicit underground digital market. Tar-
primary compounding factors covering the criminal or illicit geted data attacks can include attempts to retrieve a wide
intent, the issues of a globalised environment, and the range of information and, as already identified in this paper
implications of digital evasion and concealment by the can include personal identity, banking and credit card details,
attacking cybercriminal. and online account credentials. Data collection may also form
part of an accepted common purpose for an organised online
4.2. The illicit objectives of data driven attacks community, such as illegal file sharing or gathering attack
scripts and malware applications for further resale or distri-
When considering the primary data attack objectives of bution. One example of imposed data collection is commonly
cybercrime highlighted in this paper, a further layer of implemented by private peer-to-peer networks where
cybercrime investigation that considers the data driven members must comply to a defined ratio of shared or new data
motives of the cybercriminal can be identified. The data in order to remain a member.
objectives layer of the Cybercrime Execution Stack logically Large-scale data harvesting attacks such as spam emails
defines the primary aims of a data attack as data collection, and phishing websites that utilise sophisticated social engi-
data supply and distribution, and data use (see Fig. 2). The neering techniques aimed at deceiving the victim into
Cybercrime Execution Stack accepts that just as cybercrimi- disclosing personal data are common methods used by the
nals will likely use multiple attack vectors to commit cyber- cybercriminal. The specific use of email is continued to be
crime, there will also be multiple data objectives underlying seen as a major attack vector increasingly used against both
the various stages of a cyber attack. organisations and individuals alike (McAfee, 2010; Security
By utilising a data driven perspective based around the Labs, 2010; Symantec, 2010b). Alternatively, a direct
primary data objectives used in the commission of cybercrime computer based attack can result from the deployment of
will provide law enforcement with an additional level of malware such as trojans to form part of a Botnet and allow
logical abstraction. This approach is aimed at assisting law cybercriminals to covertly monitor and track user activity
enforcement when establishing the deliberate data attack from afar in an attempt to capture useful data. Symantec
strategies used in the commission of cybercrime. In turn this (2010a) suggest that during 2009, 6.7 million computers were
will support investigators to identify the many obscured and infected globally with an average of over 46.5 thousand
evasive activities of the cybercriminal. compromised devices being active each day.
The further intention of this approach is aimed at assisting From a cybercrime investigation perspective, by estab-
in the formulation of hypotheses of the likely criminal or illicit lishing the data collection objectives alongside the potential

Criminal or Illicit
Intent
Data Objectives

Data Data Supply Data


Collection & Distribution Use

Exploitation
Tactics

Fig. 2 e Cybercrime data objectives.


c o m p u t e r l a w & s e c u r i t y r e v i e w 2 8 ( 2 0 1 2 ) 2 0 1 e2 0 7 205

scale of an attack and the likely type and combination of credentials. Alternatively, the intended data use might be to
attack methods used, will further assist in establishing the make financial gain from resale within an online illicit
wider technology implications. For example, if a single indi- marketplace where the data in question might never even be
vidual has been targeted in contrast to a mass data harvesting used in the commission of crime. However, by identifying the
attack, the exploitation tactics and technology used may be intended data use can support cybercrime investigators to
significantly different. Again, in the scenario of peer-to-peer consider the likely attack vectors used and begin to identify
networking then in a distributed decentralised technical the technology exploited.
environment some form of additional Internet resources may
also be used. Such resources can act as a collective repository
to index the metadata about the data being gathered, or to 5. Example scenarios
facilitate access and communication for ongoing data collec-
tion and distribution amongst an online community. The relevance of using a formal objective data driven
However, by establishing what initial data is being collected in approach within a practical cybercrime investigation can be
the commission of cybercrime, can provide law enforcement demonstrated by a number of scenarios. Scenario one
with a better understanding of the illicit cyber activities and considers a simple example of a cybercrime where stolen
motives of the cybercriminals. credit card details are used over the Internet. In this scenario,
a data driven perspective can formally support cybercrime
4.2.2. Data supply and distribution investigators to consider the initial high-level data attack
The Internet can be used by cybercriminals to facilitate illicit objectives alongside traditional investigation processes and
interaction for many reasons, covering direct communication practices. Furthermore, this provides a starting point for
through to large-scale attacks. For this reason, the complexity investigators, when investigating the technical elements of
and variation in the technology exploited can be considerable. the cyber offence. Example questions to consider can include:
To further assist cybercrime investigators in gaining an how were the credit card details obtained (data collection);
understanding of illicit digital data exchange, a subtle were the credit card details supplied by other cybercriminals
distinction can be made between data supply and data or distributed through a wider organised criminal network
distribution. Data supply can be considered as the intentional (data supply and distribution); and how were the credit card
interactions between specific networked resources and details actually used to commit the offence. As each data
endpoints, such as illicit data exchange using individual objective is examined, and further information and additional
email, file transfer or website interaction. Whereas data lines of technical enquiry are identified, the process of
distribution is the exchange of data on a larger distributed considering the data attack objectives can be repeated again,
scale that can potentially involve a vast number of online each time moving towards the low-level technical activities of
devices, resources and managed by organised online the cybercriminal.
communities and criminal networks. Scenario two presents the abstract circumstances of an
The issue of large-scale decentralised data distribution can attack that is increasingly more complex than the previous
be further highlighted when considering Botnets were cited as scenario. This scenario is not intended to demonstrate an
being responsible for distributing 85% of all spam messages entire cybercrime investigation process, but highlight the
during 2009 (Symantec, 2010a). The use of Botnets is further specific benefits of including an objective data driven
demonstrated in the research by Microsoft (2010) that showed perspective. In this scenario, an email spam attack is consid-
in the first six months of 2010 there were more than 2.2 million ered, aimed at deceiving a victim into accepting a malware
affected computers in the US alone. These infected computers Trojan to be installed onto an access device such as a personal
are commonly used to distribute malicious data through such computer. The Trojan is then used to remotely deploy software
attack methods as spam and phishing emails or to launch that monitors activity in an attempt to capture personal details
data flood attacks. Alternatively, peer-to-peer networks can be and Internet banking credentials. The data captured is then
used in a range of criminal activities to supply and distribute offered for sale through an illicit underground website where it
copyright material, indecent images, crimeware applications is bought, and an attack against a bank account is made in the
and other illicit data on a global scale by individuals, criminal form of establishing a reoccurring low value standing order for
gangs and even terrorist groups (Taylor et al., 2010). the purchase of goods. Upon first reflection, this scenario is
a complex and technically distributed form of cyber attack that
4.2.3. Data use can make law enforcement investigation appear a daunting
When considering the need for investigators to quickly gain task. However, by applying a data driven perspective, based on
an understanding of the vast array of uses electronic data can the primary attack objectives described in this paper, can
be applied during the commission of cybercrime and other assist investigators to break down the complexity of an attack,
illicit online activity, specifically highlights the relevance of and establish further lines of investigation. The initial exami-
this approach. This can range from the fraudulent use of nation of what information is initially known about the attack
stolen credit card and banking details, through to complex may include the online activities of the individual whose bank
identity theft offences and low-level technology attacks. details have been obtained; any digital evidence relating to the
Alternatively, the use of data by the cybercriminal may be to malware attack on the initial victim’s computer; the business
facilitate evasion and concealment, and might include the use where the goods have been obtained from and any informa-
of such data as IP block lists identifying the known IP tion in relation to the banking transaction. Again by applying
addresses used by law enforcement or remote proxy network an objective data driven approach at each logical point of
206 c o m p u t e r l a w & s e c u r i t y r e v i e w 2 8 ( 2 0 1 2 ) 2 0 1 e2 0 7

attack, will provide investigators with a means to formally investigation framework, such as the model proposed by the
consider the actions of the cybercriminal, communicate what author elsewhere (Hunton, 2010), understanding the illicit
is found and finally assist in directing progressive lines of data motives of the cybercriminal becomes a vital and
research and investigation. intrinsic part of a structured cybercrime investigation.
The above two scenarios are intended to demonstrate how Finally, when considering the intrinsic value of electronic
the data objectives layer can be used within a cybercrime data amongst an online organised and underground criminal
investigation. The scenarios highlight how the underlying community, and the likely data attack objectives identified in
data activities can be contextualised across the entire attack this paper, the inclusion of a data driven investigation
or at specific points in an attack. This approach is also perspective becomes a fundamental feature in gaining
intended to be applied iteratively as further information is a detailed understanding of the illicit motives and activities of
identified and also to support the formulation of likely the cybercriminal.
hypotheses of the cybercriminals motives and intended
actions or outcomes from the attack. Paul Hunton (Paul.Hunton@huntonwoods.co.uk) Hunton Woods
Ltd.

6. Discussion/conclusions
Paul Hunton is an independent cyber-crime and security consul-
With the potential for a single cybercrime to exploit a vast tant, and specialist online Internet investigator with over 20 years
array of technology whilst spanning a globally distributed policing experience. For the majority of his police career, Dr. Hunton
crime scene that can cross several legislative boundaries, focused on the examination of data integration systems and net-
makes cybercrime investigation a challenging and often worked computer technologies. His expertise includes both technical
difficult task. As with all investigations, law enforcement criminal investigation and the development of data integration and
must quickly gather and evaluate what initial information is analysis systems to support business and criminal intelligence. Dr.
known about the illicit actions of the cybercriminal in order to Hunton has a D.Prof in Business Intelligence Systems and Data
establish the necessity and proportionality of any response. Integration and Analysis Technologies, an MSc in e-Business Tech-
Cybercrime investigation is further compounded by the nologies, a BSc in Business Computing, and has publications in
virtual yet highly technical online environment of the cybercrime investigation and distributed data integration. Dr. Hun-
Internet. Again, common to law enforcement investigations ton provides specialist technical support for complex digital inves-
and also a primary feature of cybercrime, will be the need to tigations, along with expert evidence reports and court testimony.
establish any criminal or illicit intent. However, more specific
to the distributed technical nature of the Internet are the
additional characteristics of a globalised environment and the
added opportunity for evasion and concealment available to
references
the cybercriminal. These three characteristics are primary
considerations at each stage of the Cybercrime Execution
ACPO. The Association of Chief Police Officers of England, Wales
Stack (see Fig. 1), and as such, equally apply at the data
and Northern Ireland, e-crime strategy. Available on the 17th
objectives layer.
October 2009 at: http://www.acpo.police.uk/asp/policies/Data/
Both technical and non-technical law enforcement inves- Ecrime%20Strategy%20Website%20Version.pdf; 2009.
tigators need the ability to contextualise and structure the Brenner SW. Privateepublic sector cooperation in combating
illicit activities of the cybercriminal, and further interpret and cybercrime: in search of a model. Journal of International Law
communicate this understanding amongst the wider law and Technology 2007;2(2).
enforcement community. As a starting point in the abstract Bryant R. Investigating digital crime. Wiley; 2008.
Cabinet Office. Cyber security strategy of the United Kingdom.
lifecycle of a cybercrime attack, the data objectives layer is
The Stationary Office; 2009.
placed at the top of the Cybercrime Execution Stack. Typically Cabinet Office. The cost of cyber crime. A Detica report in
a cybercrime attack will have multiple data objectives as an partnership with the Office of Cyber Security and Information
investigation unfolds. By considering the data objectives layer Assurance in the Cabinet Office. Available on the 20th
described in this paper against what is initially known about February 2011 at:, http://www.cabinetoffice.gov.uk/resource-
a given cybercrime, will allow law enforcement investigators library/cost-of-cyber-crime; 2011.
and technology examiners to formalise likely hypotheses Carson D. Detecting, developing and disseminating detectives’
‘creative’ skills. Policing and Society September 2009;19(3):
relating to the initial data attack strategies of the cybercri-
216e25.
minal. By formalising the initial data objectives, will also Choo KR, Smith RG. Criminal exploitation of online systems by
provide cybercrime investigators with the opportunity to organised crime groups. Asian Criminology 2008;3:37e59.
break down the attack in greater detail and move from Cisco. Cisco 2010 annual security report. Available on the 21st
a conceptual strategic data perspective towards the activities January 2010 at: http://www.cisco.com/en/US/prod/collateral/
necessary in a low-level technical investigation. As an integral vpndevc/security_annual_report_2010.pdf; 2010.
Commonwealth of Australia. Hackers, fraudsters and botnets:
part of the Cybercrime Execution Stack, this element is
tackling the problem of cyber crime. The Report of the Inquiry
intended to form part of an iterative approach, and will run
into Cyber Crime, Standing Committee on Communications.
alongside conventional law enforcement activities aimed at The Parliament of the Commonwealth of Australia; 2010.
establishing new information and additional lines of enquiries Cyberspace Policy Review. Assuring a trusted and resilient
as an investigation progresses. When placed inside a broader information and communications infrastructure. Available on
c o m p u t e r l a w & s e c u r i t y r e v i e w 2 8 ( 2 0 1 2 ) 2 0 1 e2 0 7 207

the 1st June 2010 at: http://www.whitehouse.gov/assets/ Marx GT. The engineering of social control: policing and
documents/Cyberspace_Policy_Review_final.pdf; 2009. technology. Policing: a Journal of Policy and Practice 2007;1(1):
DeBolt D. State of the Internet 2010: a report on the ever-changing 46e56.
threat landscape. CA Technologies Internet Security McAfee. 2010 threat predictions. Available on the 17th January
Intelligence Report. Available on the 19th January 2011 at:, 2011 at: http://www.mcafee.com/us/resources/reports/rp-
http://www.ca.com/w/media/Files/SecurityAdvisorNews/ threat-predictions-2010.pdf; 2010.
h12010threatreport_244199.pdf; 2010. McMurdie C. Cyber skills a top challenge, says police cyber crime
e-Crime Congress. e-crime survey 2009. The 7th Annual e-Crime unit. Available on the 12th November 2010 at: http://www.
Congress. Available on the 16th October 2010 at:, http://www. computerweekly.com/Articles/2010/11/11/243902/Cyber-
e-crimecongress.org/ecrime2009/documents/e- skills-a-top-challenge-says-UK-police-cyber-crime.htm;
CrimeSurvey2009_AKJ_KPMG(1).pdf; 2009. 2010.
Europol. Internet facilitated organised crime threat assessment. Metcalfe C. Policing operation ore. Criminal Justice Matters 2007;
Available on the 18th January 2011 at: http://www.europol. 68(1):8e9.
europa.eu/publications/Serious_Crime_Overviews/Internet% Microsoft. Battling botnets for control of computers; 2010.
20Facilitated%20Organised%20Crime%20iOCTA.pdf; 2011. Microsoft Security Intelligence Report, Volume 9 January
Fahsing IA, Glomseth R, Gottschalk P. Characteristics of effective through June 2010.
SIOs: a content analysis for management in police Mitchell KJ, Finkelhor D, Jones LM, Wolak J. Use of social
investigations. International Journal of Management and networking sites in online sex crime against minors: an
Enterprise Development 2008;5(6):708e22. examination of national incidence and means of utilization.
Finklea KM. Organised crime in the United States: trends and Journal of Adolescent Health 2010;47:183e90.
issues for Congress. Congressional Research Service; 2009. New Zealand Police. Electronic crime strategy, to 2010 policing
Fletcher N. Challenges for regulating financial fraud in with confidence; 2009.
cyberspace. Journal of Financial Crime 2007;14(2). Norton. Norton cybercrime report: the human impact. Available
Gallagher F. The future of fighting crime. Police Professional; on the 20th September 2010 at: http://www.symantec.com/
September 10, 2009. content/en/us/home_homeoffice/media/pdf/cybercrime_
Garlik. UK cybercrime report 2009. Available on the 1st October report/Norton_UK-Human%20Impact-A4_Aug4.pdf; 2010.
2010 at: http://www.garlik.com/cybercrime_report.php; 2009. Orde H. Police left behind by cyber criminals; January 26th 2011.
Gottschalk P, Dean G. Stages of knowledge management systems Daily Telegraph newspaper article.
in policing financial crime. International Journal of Law, Crime Qin J, Zhou Y, Reid E, Lai G, Chen H. Analyzing terror campaigns
and Justice 2010;38:94e108. on the Internet: technical sophistication, content richness,
Hibbert K, Robinson A. Combating e-Crime. Police Professional; and Web interactivity. International Journal of Human-
June 18, 2009. Issue 166. Computer Studies 2007;65:71e84.
HM Government. A strong Britain in an age of uncertainty: the Schmalleger F, Pittaro M. Crimes of the Internet. Prentice Hall;
National Security Strategy. The Stationary Office Limited; 2009.
2010. Security Labs. Security Labs report JanuaryeJune 2010 recap.
Hoare P. SOCA emphasises value of collaboration in fight against Available on 21st November 2010 at: http://www.m86security.
cyber crime. Police Professional; March 25, 2010. com/documents/pdfs/security_labs/m86_security_labs_
Hunton P. The growing phenomenon of crime and the Internet: report_1H2010.pdf; 2010.
a cybercrime execution and analysis model. Computer Law & Sommer P, Brown I. Reducing systemic cybersecurity risk. The
Security Review November 2009;25(6):528e35. Organisation for Economic Co-operation and Development
Hunton P. Cyber crime and security: a new model of law (OECD). Available on the 18th January 2001 at: http://www.
enforcement investigation. Policing: A Journal of Policy and oecd.org/dataoecd/3/42/46894657.pdf; 2011.
Practice December 2010;4(4):385e95. Symantec. Symantec report on the underground economy July
Hunton P. A rigorous approach to formalising the technical 07eJune 08. Symantec Corporation; 2008. Published November
investigation stages of cyber crime and criminality within 2008.
a UK law enforcement environment. Digital Investigation Symantec. Symantec global Internet security threat report, trends
April 2011;7(3e4):105e13. for 2008, vol. XIV. Symantec Corporation; 2009. Published April
Johnson A, Rt Hon MP. Home Secretary, Extending our reach: 2009.
a comprehensive approach to tackling serious organised Symantec. Symantec Internet security threat report, trends for
crime. The Stationary Office; 2009. 2009, vol. XV. Symantec Corporation; 2010a. Published April
Kapitanskaya A. Cybercrime and the risk of proliferation finance, 2010.
centre for the study of threat convergence. Occasional Symantec. State of enterprise security 2010. Symantec
Research Series; August 2010. Corporation; 2010b.
Lobban I. UK infrastructure faces cyber threat, says GCHQ chief. Taylor M, Haggerty J, Gresty D, Fergus P. Forensic investigation of
BBC News story. Available on the 13th of October 2010 at:, peer-to-peer networks. Journal of Network Security 2010;
http://www.bbc.co.uk/news/uk-11528371; 2010. 2010(9):12e5.
Maple C, Phillips A. UK security breach investigations report, an Wall D. Cybercrime: the transformation of crime in the
analysis of data cases. Available on the 16th July 2010 at: information age. Polity Press; 2007.
http://www.7safe.com/breach_report; 2010. Yar M. Cybercrime and society. Sage Publishing Ltd; 2006.

You might also like