- To aid in the investigation by identifying. - To identify the proper ISP, webhosting. - To use in search warrant affidavits for to

Similar documents
DRAFT: gtld Registration Dataflow Matrix and Information

Role of 24/7 points of contact regarding MLA requests for computer data/e-evidence, Cooperation with competent authorities

A Criminal Intrudes into a Bank in Geneva Korean agents. Canadian agents make the arrest. Argentinian investigators. discover. attack came from Seoul

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

G8 Lyon-Roma Group High Tech Crime Subgroup

International Cooperation in Cybercrime Investigations

Data Preservation Checklists

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

UNODC. International Cooperation and Assistance in Cybercrime Matters

CYBERCRIME RESPONDERS TRAININGS

ITU Model Cybercrime Law: Project Overview

Assistant Secretary-General Michèle Coninsx Executive Director, CTED

10007/16 MP/mj 1 DG D 2B

Legal Foundation and Enforcement: Promoting Cybersecurity

10025/16 MP/mj 1 DG D 2B

New Legal instruments for Cross-border Crime Investigation in EU

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

DNS Abuse Handling. FIRST TC Noumea New Caledonia. Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific

In the Balkans, UNODC is part of the consortium with GIZ and the Center for International Legal Cooperation of the Netherlands who will implement the

T-CY Guidance Note #8 Obtaining subscriber information for an IP address used in a specific communication within a criminal investigation

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

Europol Unclassified Basic Protection Level. Council Working Party on Information Exchange and Data Protection (DAPIX) Friends of Presidency

Guiding principles on the Global Alliance against child sexual abuse online

Comprehensive Study on Cybercrime

Cybercrime and e-evidence: challenges and solutions.

& Online Evidence Collection

UNODC tackling cybercrime in support of a safe and secure AP-IS

PURPOSE STATEMENT FOR THE COLLECTION AND PROCESSING OF WHOIS DATA

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

Topic LE /GAC position Registrar Position Agreement in Principle 1. Privacy and Proxy services

OFFICE OF THE PROSECUTING ATTORNEY DANIEL R. LUTZ 215 N. GRANT STREET WOOSTER, OHIO BAD CHECK PACKET

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

National Communications Authority

EXPERT GROUP MEETING ON CYBERCRIME

Policy recommendations. Technology fraud and online exploitation

Privacy and WHOIS Data Policy

The cost of cybercrime the benefits of cooperation

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

Thailand Initiatives and Challenges in Cyber Terrorism

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Explanation of Data Element Data Element Potentially Legitimate purposes for Collection/Retention

Supercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness

European Investigation Order: Frequently Asked Questions

Updates on Sharing Threat Data, Security Awareness and Policy Efforts to Fight Cybercrime

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

PROJECT RESULTS Summary

Anti-Phishing Working Group

Strategic and operational threat analysis at Europol's EC3

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

Statement of Chief Richard Beary President of the International Association of Chiefs of Police

Effective October 31, Privacy Policy

Registry Internet Safety Group (RISG)

American Dental Hygienists Association Privacy Policy

Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version

WHOIS ACCURACY and PUBLIC SAFETY

Snap Inc. Law Enforcement Guide

Act Pacific Islands Law Officers Network Cybercrime Workshop


Public Safety Working Group (PSWG)

Responding to Cybercrime:

15412/16 RR/dk 1 DGD 1C

Regional Cyber Security and Cyber Crime Best Practices Workshop November 28-30, 2011 Bogotá, Colombia

Emergency Nurses Association Privacy Policy

The European Spambox Project - Enforcement without borders. Rechtsanwalt Thomas Rickert Director Self-Regulation, eco ev

GDPR. The new landscape for enforcing and acquiring domains. You ve built your business and your brand. Now how do you secure and protect it?

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

WHOIS High-Level Technical Brief

KIK s GUIDE FOR LAW ENFORCEMENT

Republic of Mauritius CYBERCRIME STRATEGY Page

General Data Protection Regulation (GDPR)

Professional Training Course - Cybercrime Investigation Body of Knowledge -

The commission communication "towards a general policy on the fight against cyber crime"

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

Case 1:14-cr KBF Document 57 Filed 09/05/14 Page 1 of 10 : : : : : : : : : DECLARATION OF CHRISTOPHER TARBELL

TERMS AND CONDITIONIONS FOR WHOIS DATA COLLECTION AND DISPLAY

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

PRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement

ECTA POSITION PAPER ON WHOIS

Promoting Global Cybersecurity

FBI Role in Overseas Investigations

The importance of Whois data bases for spam enforcement

Blue Alligator Company Privacy Notice (Last updated 21 May 2018)

CSM-ACE 2010 KUALA LUMPUR CONVENTION CENTRE OCTOBER 2010

HOW WHOIS DATA ENSURES A SAFE AND SECURE INTERNET

Key United Nations counter-terrorism references & architecture: Impact on customs.

Cellular Site Simulator Usage and Privacy

GAC PRINCIPLES REGARDING gtld WHOIS SERVICES. Presented by the Governmental Advisory Committee March 28, 2007

Donor Countries Security. Date

SWIFT Response to the Committee on Payments and Market Infrastructures discussion note:

ASEAN s Cyber Confidence Building Measures

Criminal Justice System s Intervention to Cybersecurity Threats: Panacea or Pandora's Box?

Startup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ):

Cybersecurity and Privacy Innovation Forum Brussels, 28 April Keynote address. Giovanni Buttarelli European Data Protection Supervisor

Designing Robustness and Resilience in Digital Investigation Laboratories

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

COMPUTER FORENSICS (CFRS)

PRIVACY STATEMENT OF TIBBAA SMARTCARD

Summary. January 31, Jo Lim. Chief Operations and Policy Officer. Dear Jo,

Computer forensics Aiman Al-Refaei

Transcription:

User Story: User Type Data Elements Purpose Specification 1 As a [Insert User I use the following data For the purpose of [specify] Type from list] elements: [insert from list, 2 3 4 add anything missing] I frequently use data elements from WHOIS including but not limited to names, contact information, creation date, etc. WHOIS is used on a regular basis with almost every cybercrime / IP investigation to identify the domains, IP addresses, registrants, (countries), etc. WHOIS Helping identify possible suspects and victims, as well as trying to help locate relevant evidence and appropriate witnesses/custodians - To aid in the investigation by identifying the subjects of the investigation (or the victims) - To identify the proper ISP, webhosting company, or domain registrar to subpoena subscriber and transactional information - To use in search warrant affidavits for to support the probable cause - To use in court orders as part of the basis for the order - To use the results in trial as an exhibit (as a printout or screen shot sponsored by the agent) As an investigation develops and new IP addresses are discovered, WHOIS enables us to quickly determine where to serve process to find additional relevant information.

5 In international investigations, I routinely look up IP addresses in WhoIs to identify the specific service provider in formulating MLAT requests to Italy. For the purpose of providing the most detailed information possible about the ultimate source of the information we are seeking (including the address of the service provider) in order to facilitate and expedite our requests through the foreign justice system. 6 We use multiple elements from WHOIS lookups as an important first step in cybercrime investigations, and other criminal investigations to identify leads and critical next steps to advance the investigation. The important elements from WHOIS lookups include, among other things, the IP address. the registrant name and contact e-mail address, and ISP abuse contact information. Quickly determining the IP address and ISP belonging to malicious criminal infrastructure allows us to quickly take steps to preserve and issue legal process to obtain critical data. This can include quick outreach to other member nations that are part of the Budapest Convention on Cybercrime for preservation through the 24/7 Network, and outreach to foreign law enforcement partners to coordinate responses to common cybercrime threats that broadly impact security. That information allows us to find connections with other investigations that involved malicious imputer network infrastructure associated with the registrant, and issue legal

7 8 9 10 11 I use the following data elements: ICANN WHOIS I use all of the WHOIS information I use the following data elements: creation date, renewal date, and registrant s email address associated with a domain name I use all elements of WHOIS All elements process to obtain information as to payment for the computer network infrastructure, which can in turn assist with further identification of malicious networks that we can not only use to advance criminal investigations, but provide to victims to help protect their systems from ongoing criminal conduct. For the purpose of discovering who operates a given domain and how I can communicate with and/or serve legal process on them in the form of subpoenas and search warrants. To develop investigative leads. For the purpose of identifying accounts to search pursuant to search warrants, if we believe the website or domain is being used to facilitate a crime. The dates establish the time period to search, and renewal dates are helpful to freshen staleness issues. As a first step in nearly every cyber-crime criminal investigation in order to identify leads I use WHOIS on a daily basis. If I get a preservation request from one of our colleagues that does not have all the required provider information, I use WHOIS to quickly get that information so the request can be processed in a timely manner. Oftentimes, the requests are urgent and having this tool to help expedite the request is essential for performing my job.

12 13 14 15 All data elements are used I have used WHOIS information (including registrant and organization name, mailing address, and creation and update dates) in many of my criminal investigations. All data elements are critically used. We use WHOIS as a first step in nearly every criminal investigation in order to identify leads The use of WHOIS has facilitated several international investigations, which have allowed US prosecutors to share leads with foreign colleagues, leading both to extraditions to the US as well as investigations by our overseas partners. This international cooperation especially in cyber and terrorism matters would be hampered without the WHOIS lookup tool, as would the entire 24/7 Preservation system established by the Budapest Convention. I have used WHOIS to develop leads; help assess the likelihood of U.S. jurisdiction; assist in verifying actors identity; determine whether domestic tools can be used to seek additional information or whether a foreign request for evidence will be necessary (and determine, given the country, whether such a foreign request would likely be successful) It s the first step in most cases involving electronic information. When our agency receives a request, for access to software or documents, the person(s) responsible for reviewing those requests can make quick and time saving judgments (of disqualification), if the request comes from someone claiming, for example, to be a USbased University professor, but using an IP address leased out of another country. And they can only do this if they have access to WHOIS resources and can lookup IP addresses.

16 17 ent I personally use WHOIS lookups about as often as I use Google searches in my investigations. It is an essential part of my training and outreach with local law enforcement I use the following data elements: Domain and network registrant name and administrative contact. contact, location) contact, location) contact); DNS records; traceroute contact, location) Whois In a major fraud investigation, WHOIS lookups were critical to identifying conspirators responsible for registering fraudulent domains. We also have had several groups of individuals using Internet services to lure victims to robberies. Using a WHOIS lookup is critical to quickly aid us in finding the locations where these defendants are operating from, and have led to subpoenas and eventually to search warrants. In order to serve legal process for subscriber information, transactional data, and content of associated server. Identify location of threat Identify location of terrorist group supporter in Western European country Identify server location used by a foreign terrorist group Identify location of terrorist group supporter and communication conduit in Western Europe Internet based threat against US troops based in a foreign country.

All information WHOIS information has been essential in being able to connect what otherwise would have appeared to be multiple separate fraudulent schemes to a single actor. It is a crucial tool particularly in wide sweeping identity frauds and lack of the WHOIS resource will undermine our ability to investigate and prosecute identity fraud and protect our citizens from such schemes.